B - Infection Database

These pages list all available infections that Spyware Doctor is capable of removing. Infections are presented by name, level of threat and a brief description and have been organised in alphabetical order by name.

On this page you can:

  • Browse through the infections by page or first letter.
  • Search for a specific infection using the Search field.
  • Click on an infection in the list below to view further details on a specific infection

Browse infections beginning with

All Infections | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Displaying infections 901-950 of 2233 for "B" found.

Page 1 ... Page 15 | Page 16 | Page 17 | Page 18 | Page 19 | Page 20 | Page 21 | Page 22 | Page 23 ... Page 45

Name Threat Level Description
Backdoor.Qiwei Elevated Backdoor.Qiwei is a backdoor Trojan that gives an attacker unauthorized access ...
Backdoor.Queen Elevated Backdoor.Queen is a backdoor Trojan that runs only under Windows NT, Windows ...
Backdoor.Quimera Elevated Backdoor.Quimera is a Trojan horse that allows unauthorized access to your ...
Backdoor.R3C Elevated Backdoor.R3C is a Trojan horse that allows unauthorized access to an infected ...
Backdoor.Radmin High Backdoor.Radmin is a remote access tool which allows unauthorized access to ...
Backdoor.Radmin.J High Backdoor.Radmin.J is a Backdoor software that once installed will pretend to be ...
Backdoor.Rado Elevated Backdoor.Rado is a Backdoor Trojan Horse that gives its creator unauthorized ...
Backdoor.Raid Elevated Backdoor.Raid is a backdoor Trojan that gives a hacker remote access to your ...
Backdoor.Raintreck Elevated Backdoor.Raintreck is a malicious application that runs in the background and ...
Backdoor.Ranky Elevated Backdoor.Ranky is a back door program that allows a compromised computer to be ...
Backdoor.Rat Elevated Backdoor.Rat is a client program which allows access to Backdoor.R ...
Backdoor.Ratal Elevated Backdoor.Ratal is a malicious application that runs in the background and ...
Backdoor.Ratcrack Elevated Backdoor.Ratcrack is a malicious application that runs in the background and ...
Backdoor.Ratega Elevated Backdoor.Ratega is a Trojan Horse that gives a hacker complete access to your ...
Backdoor.Raznew Medium A proxy backdoor that can be used to foward Spam e-mails. ...
Backdoor.Rbot High Backdoor.Rbot will open ports on an infected computer and connect to a remote ...
Backdoor.Rbot.ADF High Backdoor.Rbot.ADF is a trojan which opens network ports and allows attackers to ...
Backdoor.Rbot.ADV High Backdoor.Rbot.ADV runs silently in the background providing a backdoor service ...
Backdoor.Rbot.ADZ High Backdoor.Rbot.ADZ runs silently in the background which starts up with Windows. ...
Backdoor.Rbot.AEU High Backdoor.Rbot.AEU is a backdoor trojan which opens network ports and attempts ...
Backdoor.Rbot.AJK High Backdoor.Rbot.AJK will open various ports allowing unauthorized access to an ...
Backdoor.RBot.AS High Backdoor.RBot.AS is a malicious backdoor that acts as a server and executes ...
Backdoor.RBot.ASF High Backdoor.RBot.ASF runs in the background and acts as a backdoor, allowing ...
Backdoor.Rbot.AYG High Backdoor.Rbot.AYG will open various ports allowing unauthorized access to an ...
Backdoor.Rbot.AYL High Backdoor.Rbot.AYL is a backdoor that after execution will create run keys in ...
Backdoor.Rbot.BEC High Backdoor.Rbot.BEC opens port and connects to external IRC servers without users ...
Backdoor.Rbot.BEH High Backdoor.Rbot.BEH runs silently in the background providing a backdoor service ...
Backdoor.Rbot.BF High Backdoor.Rbot.BF will open various ports allowing unauthorized access to an ...
Backdoor.Rbot.BGP High Backdoor.Rbot.BGP attempts to open ports and allows an attacker unauthorized ...
Backdoor.Rbot.BHQ High Backdoor.Rbot.BHQ runs silently in the background providing a backdoor service ...
Backdoor.Rbot.C High Backdoor.Rbot.C is an IRC controlled backdoor that can be used to gain ...
Backdoor.Rbot.CRT High Backdoor.Rbot.crt runs silently in the background providing a backdoor service ...
Backdoor.Rbot.DJT High Backdoor.Rbot.DJT will open various ports allowing unauthorized access to an ...
Backdoor.Rbot.ENI High Backdoor.Rbot.ENI will open various ports allowing unauthorized access to an ...
Backdoor.Rbot.FAM High Backdoor.Rbot.FAM is an IRC controlled backdoor that can be used to gain ...
Backdoor.Rbot.GCG Medium Backdoor.Rbot.GCG attempts to open ports and allows an attacker unauthorized ...
Backdoor.Rbot.GEN High Backdoor.Rbot.GEN is an IRC controlled backdoor (or "bot") that can be used to ...
Backdoor.Rbot.UR High Backdoor.Rbot.UR will attempt to connect to a predetermined IRC server and ...
Backdoor.Rbot.WI High Backdoor.Rbot.WI is a worm which searches for shared folders and saves these ...
Backdoor.Rbot.XE High Backdoor.Rbot.XE steals your personal information and allows others to have ...
Backdoor.Rbot.XG High Backdoor.Rbot.XG runs silently in the background providing a backdoor service ...
Backdoor.Rbot.YH High Backdoor.Rbot.YH is capable of spreading to computers on the local network ...
Backdoor.Rbot.ZJ High Backdoor.Rbot.ZJ attempts to open ports allowing a remote attacker unauthorized ...
Backdoor.RCServ Elevated Backdoor.RCServ is a Backdoor Trojan Horse that gives a hacker unauthorized ...
Backdoor.Recerv Elevated Backdoor.Recerv is a Trojan Horse that gives a hacker complete access to your ...
Backdoor.Recub High Backdoor.Recub hooks itself to explorer.exe. The process is not visible and has ...
Backdoor.Redghost High Backdoor.Redghost is a trojan which allows the attacker unauthorized remote ...
Backdoor.Redkod Elevated Backdoor.Redkod is a Backdoor Trojan that gives its creator full control over ...
Backdoor.Redvoz Medium Backdoor.Redvoz allows attackers unauthorized access to infected machi ...
Backdoor.Refpron High Backdoor.Refpron opens a backdoor on infected computer to allow attackers ...

Page 1 ... Page 15 | Page 16 | Page 17 | Page 18 | Page 19 | Page 20 | Page 21 | Page 22 | Page 23 ... Page 45

Go to another page: MRC Home, Infection Database, Threat Levels, Glossary, Malware Dispute Form, Submit Spyware