NEC - Infection Database

These pages list all available infections that Spyware Doctor is capable of removing. Infections are presented by name, level of threat and a brief description and have been organised in alphabetical order by name.

On this page you can:

  • Browse through the infections by page or first letter.
  • Search for a specific infection using the Search field.
  • Click on an infection in the list below to view further details on a specific infection

Browse infections beginning with

All Infections | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Displaying infections 501-550 of 612 for "NEC" found.

Page 1 ... Page 7 | Page 8 | Page 9 | Page 10 | Page 11 | Page 12 | Page 13

Name Threat Level Description
Trojan-Dropper.Vidro High Trojan.Dropper.Vidro will copy itself into the system folder which then ...
Trojan-Proxy.3proxy High Trojan-Proxy.3proxy requests a bunch of other malicious files from ...
Trojan-Proxy.Agent.AAJ High Trojan-Proxy.AAJ is a trojan proxy agent that sets the computer up as a proxy ...
Trojan-Proxy.Agent.AWK High Trojan-Proxy.Agent.AWK is a trojan proxy agent that sets the computer up as a ...
Trojan-Proxy.Agent.JL High Trojan.Proxy.Agent.JL connects to an external server to download additional ...
Trojan-Proxy.Agent.LL Elevated Trojan-Proxy.Agent.LL connects to several specific websites to download files ...
Trojan-Proxy.Livevids High Trojan-Proxy.Livevids attempts to open a random TCP port and connect to a ...
Trojan-Proxy.Small.BU High Trojan.Proxy.Small.BU connects to remote servers and allows remote users to ...
Trojan-Proxy.Small.CR.8 High Trojan.Proxy.Small.CR.8 attempts to connect to smoke.all.the.marijuanabuds.info ...
Trojan-Proxy.Small.CT High Trojan.Proxy.Small.CT will attempt to connect to the Internet to contact a ...
Trojan-Proxy.Small.DJ High Trojan.Proxy.Small.DJ is a Trojan that attempts to connect to the Internet to ...
Trojan-PWS.Abrada High Trojan.PWS.Abrada is a trojan which periodically connects to a remote server to ...
Trojan-PWS.Agent.DA High Trojan.PSW.Agent.DA is a trojan which attempts to connect to the internet to ...
Trojan-PWS.Barrio High Trojan-PWS.Barrio is a password stealing trojan that gathers user password, ...
Trojan-PWS.Delta High Trojan.PSW.Delta is a password-stealing Trojan which attempts to steal the ...
Trojan-PWS.Dripper High Trojan.PSW.Dripper is a password-stealing trojan which attempts to steal the ...
Trojan-PWS.LdPinch.EJB High Trojan-PWS.LdPinch.EJB is a threat that steals necessary information related to ...
Trojan-PWS.LdPinch.EYZ High Trojan-PWS.LdPinch.EYZ is a threat that steals necessary information related to ...
Trojan-PWS.OnlineGames High Trojan-PWS.OnlineGames is a threat that attempts to steal vital information ...
Trojan-PWS.OnlineGames.GLZ High Trojan-PWS.OnlineGames.GLZ is a threat that attempts to steal vital information ...
Trojan-PWS.OnlineGames.UDPQ Medium Trojan-PWS.OnlineGames.UDPQ is a threat that attempts to steal vital ...
Trojan-PWS.Ring0 High Trojan-PWS.Ring0 actively search for random proxy server and send the ...
Trojan-Spy.Dirt High Trojan-Spy.Dirt has ability to access files from a remote server by using ...
Trojan-Spy.Haxspy.A High Trojan-Spy.Haxspy.A is a trojan that tries to steal information by monitoring ...
Trojan-Spy.Jiospy.A High Trojan-Spy.Jiospy.A is a trojan that attempts to steal user information by ...
Trojan-Spy.Kronos.B High Trojan-Spy.Kronos.B is trojan that tries to monitors user activities in hopes ...
Trojan-Spy.Small High Trojan.Spy.Small establish connection to the Internet through random ports to ...
Trojan-Spy.Small.AD High Trojan-Spy.Small.AD establishes a connection to the Internet to monitor user ...
Trojan-Spy.Small.AS High Trojan-Spy.Small.AS establishes a connection to the Internet to monitor user ...
Trojan-Spy.VB.NB High Trojan.Spy.VB.NB is a trojan which will capture all keystrokes from users and ...
Trojan.Adex.A High Trojan.Adex.A is a trojan that attempts to connect to a certain website ...
Trojan.Agent-BZ Medium Trojan.Agent-BZ creates a registry entry to ensure it executes on every ...
Trojan.Agent.AHD High Trojan.Agent.AHD attempts to connect to the Internet to contact a predetermined ...
Trojan.Agent.AMX High Trojan.Agent.AMX is a threat that attempts to connect to the Internet either to ...
Trojan.Agent.ASQN High Trojan.Agent.ASQN on execution drops and executes other malware. It also ...
Trojan.Agent.BIY High Trojan.Agent.BIY copies itself onto an infected computer as nsssvc.exe which ...
Trojan.Agent.BRP High Trojan.Agent.BRP employs stealth rootkit techniques to hide its presence on the ...
Trojan.Agent.EQP High Trojan.Agent.EQP is a threat dropped by Exploit.MSWord that acts as a proxy ...
Trojan.Agent.FQR High Trojan.Agent.FQR is a threat that attempts to connect to the Internet either to ...
Trojan.Agent.HDZ High Trojan.Agent.HDZ is a threat that attempts to connect to the Internet either to ...
Trojan.Agent.KWZ High Trojan.Agent.KWZ is a trojan that attempts to connect to the Internet either to ...
Trojan.Agent.SD High Trojan.Agent.SD attempts to connect to an external server to download ...
Trojan.Agent.TUK High Trojan.Agent.TUK is a trojan that attempts to connect to the Internet either to ...
Trojan.Alfacentavr High Trojan.Alfacentavr constantly connects to an external server alfacentavr.com to ...
Trojan.Alset_Network Elevated Alset Network is a variant of HXDL AL, which is part of an automated helpdesk ...
Trojan.AOL.PS High Trojan.AOL.PS installs itself into the system folder. It logs all activity when ...
Trojan.BankAsh High Trojan bankAsh tries to steal email addresses and passwords stored in ...
Trojan.BAT.Flood High Trojan.BAT.Flood is a kind of batch file that overloads a connection by any ...
Trojan.CableBoost High Trojan CableBoost will attempt to connect to a pre-determined websites. It also ...
Trojan.Conycspa High Trojan.Conycspa attempts to connect to mail servers to send out spam ema ...

Page 1 ... Page 7 | Page 8 | Page 9 | Page 10 | Page 11 | Page 12 | Page 13

Go to another page: MRC Home, Infection Database, Threat Levels, Glossary, Malware Dispute Form, Submit Spyware