NEC - Infection Database

These pages list all available infections that Spyware Doctor is capable of removing. Infections are presented by name, level of threat and a brief description and have been organised in alphabetical order by name.

On this page you can:

  • Browse through the infections by page or first letter.
  • Search for a specific infection using the Search field.
  • Click on an infection in the list below to view further details on a specific infection

Browse infections beginning with

All Infections | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Displaying infections 51-100 of 612 for "NEC" found.

Page 1 | Page 2 | Page 3 | Page 4 | Page 5 | Page 6 ... Page 13

Name Threat Level Description
Backdoor.Agobot.AGZ High Backdoor.Agobot.AGZ runs in the background , allowing attackers to connect to ...
Backdoor.Agobot.ATZ High Backdoor.Agobot.ATZ runs in the background, allowing attackers to connect to it ...
Backdoor.AIMVision Elevated Backdoor.AIMVision is a Trojan horse that allows unauthorized access to an ...
Backdoor.Aphexdoor.B High Backdoor.Aphexdoor.B is a threat that attempts to connect to a certain ...
Backdoor.Augodor.GEN High Backdoor.Augodor.GEN listens for intstructions from external hackers through ...
Backdoor.Bifrose.CJ High Backdoor.Bifrose.CJ is an email spamming worm that propagates through the local ...
Backdoor.Bifrose.EF High Backdoor.Bifrose.EF is an internet worm that propagates through the local ...
Backdoor.Bifrose.R High Backdoor.Bifrose.R is an email spamming Backdoor that propagates through the ...
Backdoor.Bifrose.YH High Backdoor.Bifrose.YH is an internet worm that propagates through the local ...
Backdoor.Bobic.K High Backdoor.Bobic.K is a trojan backdoor which allows attackers to gain access to ...
Backdoor.Carufax Elevated Backdoor.Carufax is a trojan horse that will attempt to download files, open a ...
Backdoor.CIADoor.13 High Backdoor.CIADoor.13 is a backdoor application which runs in the background, ...
Backdoor.Clt Elevated Backdoor.Clt is a Backdoor Trojan Horse that gives a hacker complete access to ...
Backdoor.CXH High Backdoor.CXH connects to a web based centralized bot aministration system and ...
Backdoor.Cybspy Elevated The Backdoor.Cybspy Backdoor Trojan opens a port on the computer and allows a ...
Backdoor.Delf.CEG High Backdoor.Delf.CEG attempts to connect to several remote sites in order to give ...
Backdoor.DGRat Medium Backdoor.DGRat is a remote administrative trojan. It connects to remote host ...
Backdoor.DirectConnection High Backdoor.DirectConnection is a remote administration tool which provides an ...
Backdoor.DTR Elevated Backdoor.DTR is a Trojan horse that allows unauthorized access to an infected ...
Backdoor.Forbot High Backdoor.Forbot connects to a remote IRC server from which attackers can gain ...
Backdoor.GrayBird.GU High Backdoor.GrayBird.GU is a backdoor trojan which places itself in the windows ...
Backdoor.GrayBird.Q High Backdoor.GrayBird.Q is a backdoor trojan which places itself in the system ...
Backdoor.GrayBird.X High Backdoor.GrayBird.X is a backdoor trojan which places itself in the system ...
Backdoor.GRM Elevated Backdoor.GRM is a backdoor Trojan that allows unauthorized remote access to an ...
Backdoor.Hacarmy Elevated Backdoor.Hacarmy is a Trojan horse that connects to a predetermined IRC server ...
Backdoor.Hethat Elevated Backdoor.Hethat is a backdoor Trojan that attempts to steal the login name and ...
Backdoor.Hogle Elevated Backdoor.Hogle is a proxy SMTP server that may be used as an anonymous spam ...
Backdoor.Hupigon.EVG High Backdoor.Hupigon.EVG is a threat that attempts to connect to a certain ...
Backdoor.Imiserv Elevated Backdoor.Imiserv connects and sends data to a predefined Web site. It is ...
Backdoor.IRC.LSA High Backdoor.IRC.LSA attempts to connect to an external IRC server to allow an ...
Backdoor.IRCBot.AAC High Backdoor.IRCBot.AAC starts up when Windows starts and tries to connect to an ...
Backdoor.IRCBot.AAQ High Backdoor.IRCBot.AAQ is an IRC backdoor that attempts to connect to a predefined ...
Backdoor.IRCBot.ACF High Backdoor.IRCBot.ACF connects to the internet to download further malware and ...
Backdoor.IRCBot.ADJ High Backdoor.IRCBot.ADJ connects to the internet to download further malware and ...
Backdoor.IRCBot.AHJ Medium Backdoor.Ircbot.AHJ is a backdoor threat that uses the mirc network to control ...
Backdoor.IRCBot.AZ High Backdoor.IRCBot.AZ connects to the internet to download further malware and ...
Backdoor.IRCBot.BFB High Backdoor.IRCBot.BFB connects to the internet to download further malware and ...
Backdoor.IRCBot.BMD High Backdoor.IRCBot.BMD connects to the internet to download further malware and ...
Backdoor.IRCBot.CJD High Backdoor.IRCBot.CJD is an IRC backdoor that attempts to connect to a predefined ...
Backdoor.IRCBot.DD High Backdoor.IRCBot.DD connects to the internet to download further malware and ...
Backdoor.Ircbot.E High Backdoor.Ircbot.E is a backdoor threat that uses the mirc network to control ...
Backdoor.IRCBot.ew Medium Backdoor.IRCBot.ew connects to the internet to download further malware and ...
Backdoor.IRCBot.ex Medium Backdoor.IRCBot.ex connects to the internet to download further malware and ...
Backdoor.IRCBot.fa Medium Backdoor.IRCBot.fa connects to the internet to download further malware and ...
Backdoor.IRCBot.fb Medium Backdoor.IRCBot.fb connects to the internet to download further malware and ...
Backdoor.IRCBot.fd Medium Backdoor.IRCBot.fd connects to the internet to download further malware and ...
Backdoor.IRCBot.FP High Backdoor.IRCBot.FP connects to the internet to download further malware and ...
Backdoor.IRCBot.GW High Backdoor.IRCBot.GW connects to the internet to download further malware and ...
Backdoor.IRCbot.GZ High Backdoor.IRCBot.GZ connects to the internet to download further malware and ...
Backdoor.IRCBot.ST High Backdoor.IRCBot.ST uses Microsoft MS06-040 Exploit to spread. It opens ports, ...

Page 1 | Page 2 | Page 3 | Page 4 | Page 5 | Page 6 ... Page 13

Go to another page: MRC Home, Infection Database, Threat Levels, Glossary, Malware Dispute Form, Submit Spyware