NEC - Infection Database

These pages list all available infections that Spyware Doctor is capable of removing. Infections are presented by name, level of threat and a brief description and have been organised in alphabetical order by name.

On this page you can:

  • Browse through the infections by page or first letter.
  • Search for a specific infection using the Search field.
  • Click on an infection in the list below to view further details on a specific infection

Browse infections beginning with

All Infections | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Displaying infections 251-300 of 612 for "NEC" found.

Page 1 | Page 2 | Page 3 | Page 4 | Page 5 | Page 6 | Page 7 | Page 8 | Page 9 | Page 10 ... Page 13

Name Threat Level Description
HeurEngine.Packed.RLPack Low Files detected as HeurEngine.Packed.RLPack are files found to have an ...
HeurEngine.Packed.SoftCompress Low Files detected as HeurEngine.Packed.SoftCompress are files found to have an ...
HeurEngine.Packed.SPack Low Files detected as HeurEngine.Packed.SPack are files found to have an encryption ...
HeurEngine.Packed.Themida Low Files detected as HeurEngine.Packed.Themida are files found to have an ...
HeurEngine.Packed.Themida.RGa Low Files detected as HeurEngine.Packed.Themida.RGa are files found to have an ...
HeurEngine.Packed.Upack Low Files detected as HeurEngine.Packed.Upack are files found to have an encryption ...
HeurEngine.Packed.UPC Low Files detected as HeurEngine.Packed.UPC are files found to have an encryption ...
HeurEngine.Packed.X Low Files detected as HeurEngine.Packed.X are files found to have an encryption or ...
HeurEngine.Packed.Yoda Low Files detected as HeurEngine.Packed.Yoda are files found to have an encryption ...
HeurEngine.Packed.YZPack Low Files detected as HeurEngine.Packed.YZPack are files found to have an ...
HeurEngine.Packed.ZCrypt Low Files detected as HeurEngine.Packed.ZCrypt are files found to have an ...
Net-Worm.Francette.H High Net-Worm.Francette.H is a worm that takes advantage of a particular Windows ...
Nuker.NoName Medium Nuker.NoName is a network-aware trojan which allows an attacker to compromise a ...
Nuker.Portfu Medium Nuker.PortFu is an executable designed to flood a TCP port on a remote computer ...
Nuker.Trillident Medium Nuker.Trillident is a network-aware trojan that allows an attacker to ...
Nuker.Vmunix Medium Nuker.Vmunix is a network-aware trojan allows an attacker to compromise a ...
P2P-Worm.Silly High P2P-Worm.Silly propagates by dropping copies of itself in shared folders ...
P2P-Worm.Winur High P2P-Worm.Winur is a worm that propagates through specific Peer to Peer ...
PSWTool.ViewSecret High PSWTool.ViewSecret is an application which scan systems or monitor activity on ...
PWSTool.Qwak Medium PWSTool.Qwak is a hacking tool that can be used to steal passwords from other ...
RogueAntiSpyware.VaccineClear High RogueAntiSpyware.VaccineClear is a RogueAntiSpyware intended for Korean ...
Rootkit.AFX_Rootkit High AFX Rootkit allows attackers to hide process, services, files, registry entries ...
Rootkit.Agent.GK High Rootkit.Agent.GK uses rootkit to hides its files and process. It is used to ...
Rootkit.NT_Rootkit High NT Rootkit allows attackers to hide processes, files, registry entries and ...
Spyware.FavoriteMan High FavoriteMan is a Browser Helper Object, which connects to its controlling ...
Spyware.NetRadar Medium NetRadar is spyware, defined as any product that employs a user's Internet ...
Spyware.Netword_Agent Medium Netword Agent is spyware, defined as any product that employs a user's Internet ...
Spyware.Stealth_Web_Page_Recorder Elevated Author's Description: "Stealth Web Page Recorder is a simple spy software ...
Trojan-Clicker.Aditer High Trojan.Clicker.Aditer is a Trojan which runs silently in the background ...
Trojan-Clicker.Agent.AO High Trojan-Clicker.Agent.AO is a trojan which runs silently in the background and ...
Trojan-Clicker.Agent.BFU High Trojan-Clicker.Agent.BFU is a trojan which runs silently in the background and ...
Trojan-Clicker.Agent.BIP Medium Trojan-Clicker.Agent.BIP is a trojan that silently runs in the background and ...
Trojan-Clicker.Agent.BUJ Medium Trojan-Clicker.Agent.BUJ is a Trojan which runs silently in the background ...
Trojan-Clicker.Agent.CIH Medium Trojan.Clicker.Agent.CIH is a Trojan which runs silently in the background ...
Trojan-Clicker.Agent.DB High Trojan-Clicker.Agent.DB is a trojan that silently runs in the background and ...
Trojan-Clicker.Agent.DW High Trojan-Clicker.Agent.DW is a trojan that silently runs in the background and ...
Trojan-Clicker.Agent.EK High Trojan-Clicker.Agent.EK is a trojan that silently runs in the background and ...
Trojan-Clicker.Agent.EL High Trojan-Clicker.Agent.EL is a trojan that silently runs in the background and ...
Trojan-Clicker.Agent.EQ High Trojan-Clicker.Agent.EQ is a trojan that silently runs in the background and ...
Trojan-Clicker.Agent.FB High Trojan.Clicker.Agent.FB runs silently in the background and connects to a ...
Trojan-Clicker.Agent.GEN High Trojan-Clicker.Agent.GEN modifies system settings and connects remote server ...
Trojan-Clicker.Agent.JB High Trojan-Clicker.Agent.JB connects to various domains in order to report back the ...
Trojan-Clicker.Agent.LS High Trojan-Clicker.Agent.LS is a Trojan that runs silently in the background and ...
Trojan-Clicker.Agent.PB Medium Trojan.Clicker.Agent.PB runs silently in the background and connects to a ...
Trojan-Clicker.Agent.V High Trojan.Clicker.Agent.V is a Trojan which runs in the background and uses a ...
Trojan-Clicker.BHO.F High Trojan.Clicker.BHO.F is a Trojan originated from China. Once executed, it will ...
Trojan-Clicker.Delf.AZ High Trojan-Clicker.Delf.AZ is a trojan that silently runs in the background and ...
Trojan-Clicker.Delf.DY Elevated Trojan.Clicker.Delf.DY will generate hundreds of HTTP requests to various ...
Trojan-Clicker.Feidin High Trojan-Clicker.Feidin is a trojan that silently runs in the background and ...
Trojan-Clicker.Flyst High Trojan-Clicker.Flyst is a trojan that silently runs in the background and ...

Page 1 | Page 2 | Page 3 | Page 4 | Page 5 | Page 6 | Page 7 | Page 8 | Page 9 | Page 10 ... Page 13

Go to another page: MRC Home, Infection Database, Threat Levels, Glossary, Malware Dispute Form, Submit Spyware