NEC - Infection Database

These pages list all available infections that Spyware Doctor is capable of removing. Infections are presented by name, level of threat and a brief description and have been organised in alphabetical order by name.

On this page you can:

  • Browse through the infections by page or first letter.
  • Search for a specific infection using the Search field.
  • Click on an infection in the list below to view further details on a specific infection

Browse infections beginning with

All Infections | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Displaying infections 101-150 of 612 for "NEC" found.

Page 1 | Page 2 | Page 3 | Page 4 | Page 5 | Page 6 | Page 7 ... Page 13

Name Threat Level Description
Backdoor.IRCBot.TA High Backdoor.IRCBot.TA starts up when Windows starts and tires to connect to an IRC ...
Backdoor.IRCBot.WinSMX High Backdoor.IRCBot.WinSMX establishes a connection to a pre-defined IRC server ...
Backdoor.IRCBot.YH High Backdoor.IRCBot.YH establishes a connection to a pre-defined server upon ...
Backdoor.Killwi.A High Backdoor.Killwi.A is a backdoor which connects to the internet to download ...
Backdoor.Kurbadur.11 High Backdoor.Kurbadur.11 collects information from the victims PC and e-mails the ...
Backdoor.Lolok Elevated Backdoor.Lolok is a backdoor Trojan that uses the mIRC client to give a hacker ...
Backdoor.Loony.E High Backdoor.Loony.E runs in the background, allowing attackers to connect to it ...
Backdoor.Marotob Elevated Backdoor.Marotob is a Trojan horse that steals email addresses and other ...
Backdoor.Mipsiv Elevated Backdoor.Mipsiv is a Trojan horse that connects to an IRC server and allows an ...
Backdoor.Mots Elevated Backdoor.Mots is a Backdoor Trojan Horse that will connect to an IRC server to ...
Backdoor.MSNCorrupt Elevated Backdoor.MSNCorrupt is a backdoor Trojan that uses MSN Messenger to connect to ...
Backdoor.Mxsender Elevated Backdoor.Mxsender is a Backdoor Trojan Horse that gives an attacker ...
Backdoor.Net_Pay_GmbH High Net Pay GmbH connects to various domain name registrars when installed on a ...
Backdoor.NetControle Elevated Backdoor.NetControle is a Trojan horse that allows a hacker to remotely control ...
Backdoor.Nucleroot High Backdoor.Nucleroot is a rootkit trojan which is used to hide processes, ...
Backdoor.Oscar High Backdoor.Oscar runs in the background and connects to an IRC server. The threat ...
Backdoor.Paproxy High Backdoor.Paproxy is a threat that tries to establish a connection to a remote ...
Backdoor.Platrash Elevated Backdoor.Platrash is a Trojan horse that can allow unauthorized access to an ...
Backdoor.Prosiak Elevated Backdoor.Prosiak is the client software corresponding to the Backdoor.Prosiak ...
Backdoor.R3C Elevated Backdoor.R3C is a Trojan horse that allows unauthorized access to an infected ...
Backdoor.Rbot High Backdoor.Rbot will open ports on an infected computer and connect to a remote ...
Backdoor.Rbot.BEC High Backdoor.Rbot.BEC opens port and connects to external IRC servers without users ...
Backdoor.Rbot.UR High Backdoor.Rbot.UR will attempt to connect to a predetermined IRC server and ...
Backdoor.Sazo Elevated Backdoor.Sazo is a Trojan horse that connects to the hacker's FTP site and ...
Backdoor.SdBot.AJH High Backdoor.SdBot.AJH is a backdoor application that allows attackers to remotely ...
Backdoor.SdBot.GEN High Backdoor.SdBot.GEN installs itself into the registry forcing it to load up with ...
Backdoor.SdBot.WL High A worm/trojan which is installed onto user's PC unknowingly through a unsecured ...
Backdoor.SDBot.XD High Backdoor.SDBot.XD connects to an IRC server in order to join a network of other ...
Backdoor.Sfcdis High Backdoor.Sfcdis opens a connection for remote attackers to connect to. It also ...
Backdoor.Sincom Elevated Backdoor.Sincom is a Backdoor Trojan Horse that gives the Trojan's author ...
Backdoor.SmokeDown Elevated Backdoor.SmokeDown is a backdoor Trojan horse which tries to connect to a ...
Backdoor.Smokodoor Elevated Backdoor.Smokodoor is a Backdoor Trojan Horse that gives a remote hacker ...
Backdoor.Smorph Elevated Backdoor.Smorph is a polymorphic Trojan horse. It is distributed as an ...
Backdoor.Smother Elevated Backdoor.Smother gives its creator complete access to your computer. By ...
Backdoor.Snami Elevated Backdoor.Snami is a Backdoor Trojan Horse that attempts to connect to an IRC ...
Backdoor.Socksbot Elevated Backdoor.Socksbot is a backdoor Trojan that connects to IRC and allows a hacker ...
Backdoor.SpyBoter.BY High Backdoor.SpyBoter.BY is a backdoor worm which spreads via a network connection. ...
Backdoor.TDS Elevated Backdoor.TDS is a backdoor Trojan that is written in the Delphi language. When ...
Backdoor.Threadsys Elevated Backdoor.Threadsys is a backdoor Trojan horse that connects to a predefined ...
Backdoor.Thunk.E High The backdoor opens a random TCP port to listen for commands from a remote host. ...
Backdoor.TSADBOT Medium TSADBOT displays a stream of flashing ad banners when certain software is ...
Backdoor.Tuimer Elevated Backdoor.Tuimer is a back door Trojan horse that connects to the 0503.pass.as ...
Backdoor.Udps Elevated Backdoor.Udps is a typical backdoor Trojan that gives a remote attacker full ...
Backdoor.Ugy Elevated Backdoor.Ugy is a backdoor Trojan horse that gives an attacker unauthorized ...
Backdoor.Unpdoor Elevated Backdoor.Unpdoor is a Trojan horse that opens a random port and connects to a ...
Backdoor.VB.Age High Backdoor.VB.Age runs in the background and opens a port allowing attackers to ...
Backdoor.VB.EVC Elevated Backdoor.VB.EVC opens a port allowing attackers to connect and gain control of ...
Backdoor.VB.HX High Backdoor.VB.HX is a threat that tries to take control of the affected system by ...
Backdoor.VB.ZK High Backdoor.VB.ZK is a remote access trojan (RAT) client that is used to connect ...
Backdoor.Wincrash Elevated When installed on a Microsoft Windows system, this backdoor Trojan horse ...

Page 1 | Page 2 | Page 3 | Page 4 | Page 5 | Page 6 | Page 7 ... Page 13

Go to another page: MRC Home, Infection Database, Threat Levels, Glossary, Malware Dispute Form, Submit Spyware