Inc - Infection Database

These pages list all available infections that Spyware Doctor is capable of removing. Infections are presented by name, level of threat and a brief description and have been organised in alphabetical order by name.

On this page you can:

  • Browse through the infections by page or first letter.
  • Search for a specific infection using the Search field.
  • Click on an infection in the list below to view further details on a specific infection

Browse infections beginning with

All Infections | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Displaying infections 101-150 of 312 for "Inc" found.

Page 1 | Page 2 | Page 3 | Page 4 | Page 5 | Page 6 | Page 7

Name Threat Level Description
Application.Private_Eye High Private Eye is a PC activity monitoring tool. It records all keystrokes ...
Application.Real_Spy_Monitor-Keylogger High Real Spy Monitor is a commercial key logger which captures keystrokes typed, ...
Application.Revealer_Keylogger High Application.Revealer_Keylogger is a Keylogger software from Alan Sylvestre ...
Application.Snapkey High Snapkey is a keylogger which records all the keystrokes (including username, ...
Application.Solid_Key_Logger High Solid Key Logger is a keylogger software from Virtuoza, Inc. It can run in ...
Application.Spy_Lantern_Keylogger High Spy Latern Keylogger is a Keylogger software from Spydex Inc. It captures all ...
Application.Spy_Mail High Spy Mail is a monitoring software from InternetSafetySoftware.com Inc. It ...
Application.Spy_Software High Spy Software is a keylogger software from SoftWeb Ltd. It has the ability to ...
Application.SpyBuddy_Keylogger High SpyBuddy is not just a keylogger, but a monitoring software as well, that gives ...
Application.SpyEx Elevated SpyEx monitors and logs all activities performed on the system, including ...
Application.SpyKeySpy High SpyKeySpy is a Keylogger software from SoftArtStudio. It runs in stealth mode ...
Application.SpyMyPc High SpyMyPc is a keylogger software from Benutec software. It captures all the ...
Application.SpyMyPC_Pro High SpyMyPc Pro is a keylogger software from Benutec software. It captures all the ...
Application.SpyPal High SpyPal is a monitoring software from Thinkertec, Inc. It can run in stealth ...
Application.Stealth_Keyboard_Interceptor High Stealth Keyboard Interceptor is a spyware (Monitoring tool and a Keylogger) ...
Application.Stealth_Keylogger Info Stealth Keylogger is monitoring software from 'Amplusnet.' It can run in ...
Application.TrackingCookies Low A tracking cookie is any cookie that is shared among two or more unrelated ...
Application.Visage_Surveillance High Visage Surveillance is a Monitoring software from Realcode Development, Inc. It ...
Application.WhileYouSurf Elevated WhileYouSurf is a background process that monitors all internet activity. ...
Application.XP_Advanced_Keylogger High XP Advanced Keylogger is a monitoring software from YL Computing Inc. It can ...
Application.XP_Keylogger High XP Keylogger is a monitoring software from YL Computing Inc. It can run in ...
ARCV.330 Low ARCV.330 is a simple, encrypted DOS virus that infects .com files, including ...
Backdoor.Agent.AJU High Backdoor.Agent.AJU is a malicious backdoor trojan that is capable to run and ...
Backdoor.Agent.CU High Backdoor.Agent.CU is an IRC Bot capable of participating in DoS attacks. The ...
Backdoor.Agent.TX High Backdoor.Agent.TX runs invisibly in the background on an infected machine ...
Backdoor.Aimbot.AC High Backdoor.Aimbot.AC spreads to network shares by exploiting weak passwords. It ...
Backdoor.Assasin High Backdoor.Assasin is a backdoor which will open a port on a compromised computer ...
Backdoor.Beasty Elevated Backdoor.Beasty is a Trojan Horse that opens a listening port on your computer. ...
Backdoor.CIADoor High Backdoor.CIADoor is a Trojan which on execution installs itself as a legitimate ...
Backdoor.DarkMoon.YW Medium Backdoor.DarkMoon.YW can give unauthorized access to attackers and if the ...
Backdoor.Evivinc Elevated Backdoor.Evivinc is a Backdoor Trojan horse that installs WinVNC without a ...
Backdoor.Fadedoor High Backdoor.Fadedoor is a Remote Administrative Trojan (RAT), which gives ...
Backdoor.Hale Elevated Backdoor.Hale is a package of programs that provide backdoor access to an ...
Backdoor.Hogle Elevated Backdoor.Hogle is a proxy SMTP server that may be used as an anonymous spam ...
Backdoor.InCommander Elevated Backdoor.InCommander is a malicious application that runs in the background and ...
Backdoor.Netdex Elevated Backdoor.Netdex consists of several components, including JavaScript (JS) ...
Backdoor.Palukka Elevated Backdoor.Palukka is a backdoor Trojan horse that can give a hacker access to ...
Backdoor.Phoenix_Keylogger High Phoenix Keylogger is a PC activity monitoring tool. It records all keystrokes ...
Backdoor.Rado Elevated Backdoor.Rado is a Backdoor Trojan Horse that gives its creator unauthorized ...
Backdoor.Rbot High Backdoor.Rbot will open ports on an infected computer and connect to a remote ...
Backdoor.Sdbot.PG High Backdoor.Sdbot.PG runs in the background allowing remote intruders to issue ...
Backdoor.Sdbot.RB High Backdoor.Sdbot.RB runs in the background allowing remote intruders to issue ...
Backdoor.Sdbot.TR High Backdoor.Sdbot.TR runs in the background allowing remote intruders to issue ...
Backdoor.SDBot.XD High Backdoor.SDBot.XD connects to an IRC server in order to join a network of other ...
Backdoor.SecretService High Backdoor.SecretService is a Remote Administration Trojan. It installs a client ...
Backdoor.SilverFTP Elevated Backdoor.SilverFTP is a backdoor Trojan that gives an attacker unauthorized ...
Backdoor.Sincom Elevated Backdoor.Sincom is a Backdoor Trojan Horse that gives the Trojan's author ...
Backdoor.Small.HJ High Backdoor.Small.HJ installs itself into the system directory. It then attempts ...
Backdoor.Smokodoor Elevated Backdoor.Smokodoor is a Backdoor Trojan Horse that gives a remote hacker ...
Backdoor.Threadsys Elevated Backdoor.Threadsys is a backdoor Trojan horse that connects to a predefined ...

Page 1 | Page 2 | Page 3 | Page 4 | Page 5 | Page 6 | Page 7

Go to another page: MRC Home, Infection Database, Threat Levels, Glossary, Malware Dispute Form, Submit Spyware