P - Infection Database

These pages list all available infections that Spyware Doctor is capable of removing. Infections are presented by name, level of threat and a brief description and have been organised in alphabetical order by name.

On this page you can:

  • Browse through the infections by page or first letter.
  • Search for a specific infection using the Search field.
  • Click on an infection in the list below to view further details on a specific infection

Browse infections beginning with

All Infections | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Displaying infections 1-50 of 77 for "P" found.

Page 1 | Page 2

Name Threat Level Description
P2P-Worm.Adil High P2P-Worm.Adil spreads through file-sharing applications and creates multiple ...
P2P-Worm.Backterra.A High P2P-Worm.Backterra.A is a worm that propagates by dropping copies of itself in ...
P2P-Worm.Backterra.C High P2P-Worm.Backterra.C is a worm that propagates by dropping copies of itself in ...
P2P-Worm.Bare.A High P2P-Worm.Bare.A is a worm that propagates by dropping copies of itself in ...
P2P-Worm.Bare.B High P2P-Worm.Bare.B is a worm that propagates by dropping copies of itself in ...
P2P-Worm.Bare.C High P2P-Worm.Bare.C is a worm that propagates by dropping copies of itself in ...
P2P-Worm.Bare.D High P2P-Worm.Bare.D is a worm that propagates by dropping copies of itself in ...
P2P-Worm.Benjamin.A High P2P-Worm.Benjamin.A is a worm that propagates by using specific Peer to Peer ...
P2P-Worm.Blandie.A High P2P-Worm.Blandie.A is a worm that propagates by dropping copies of itself in ...
P2P-Worm.Blaxe High P2P-Worm.Blaxe is a worm that propagates by dropping copies of itself in shared ...
P2P-Worm.Blinkom High P2P-Worm.Blinkom is a worm that propagates through shared network drives and ...
P2P-Worm.Cake High P2P-Worm.Cake is a Worm that propagates across pre-determined peer-to-peer ...
P2P-Worm.Capside High P2P-Worm.Capside is a worm that spreads through network shares and P2P ...
P2P-Worm.Cozit High P2P-Worm.Cozit is a worm that propagates by dropping copies of itself in shared ...
P2P-Worm.Delf.B High P2P-Worm.Delf.B is a worm that propagates by dropping copies of itself in ...
P2P-Worm.Delf.H High P2P-Worm.Delf.H is a worm that propagates by dropping copies of itself in ...
P2P-Worm.Delf.P High P2P-Worm.Delf.P is a worm that propagates by dropping copies of itself in ...
P2P-Worm.Delf.S High P2P-Worm.Delf.S is a worm that propagates by dropping copies of itself in ...
P2P-Worm.Druagz High P2P-Worm.Druagz is a Worm that propagates utilizing a certain Peer-To-Peer ...
P2P-Worm.Gizmo High P2P-Worm.Gizmo spreads through network shares and P2P applications. When a ...
P2P-Worm.Gotorm High P2P.Worm.Gotorm communicates with other systems across networks and transmits ...
P2P-Worm.Inter High P2P-Worm.Inter is a worm that spreads through network shares and P2P ...
P2P-Worm.Kapucen High P2P-Worm.Kapucen is worm that spreads through P2P communications by infecting ...
P2P-Worm.Kingdom High P2P-Worm.Kingdom is a Worm that propagates utilizing a certain Peer-To-Peer ...
P2P-Worm.Mandragore High P2P-Worm.Mandragore is a worm that spreads through Gnutella network. When ...
P2P-Worm.Nugg High P2P-Worm.Nugg uses peer-to-peer propagation techniques in order to infect other ...
P2P-Worm.Opex Medium P2P.Worm.Opex spreads through file-sharing application and creates numbers of ...
P2P-Worm.Palevo Elevated P2P-Worm.Palevo is a Worm that propagates utilizing a certain Peer-To-Peer ...
P2P-Worm.Poopoo High P2P-Worm.Poopoo is a Worm that propagates utilizing a certain Peer-To-Peer ...
P2P-Worm.Purga High P2P-Worm.Purga is a Worm that propagates utilizing a certain Peer-To-Peer ...
P2P-Worm.Relmony High P2P-Worm.Relmony will display a hovering icon which cannot be terminated using ...
P2P-Worm.Silly High P2P-Worm.Silly propagates by dropping copies of itself in shared folders ...
P2P-Worm.Smeagol High P2P-Worm.Smeagol is a Worm that attempts to replicate across an existing ...
P2P-Worm.Surnova.G High P2P-Worm.Surnova.G is a worm that propagates by dropping copies of itself in ...
P2P-Worm.Togod High P2P-Worm.Togod is a worm that spreads through network shares and P2P ...
P2P-Worm.VB.A High P2P-Worm.VB.A is a Worm that propagates across pre-determined peer-to-peer ...
P2P-Worm.VB.AF High P2P-Worm.VB.AF is a Worm that propagates across pre-determined peer-to-peer ...
P2P-Worm.VB.AH High P2P-Worm.VB.AH is a worm that propagates by dropping copies of itself in shared ...
P2P-Worm.VB.BB High P2P-Worm.VB.BB is a Worm that propagates across pre-determined peer-to-peer ...
P2P-Worm.VB.T High P2P-Worm.VB.T is a Worm that propagates across pre-determined peer-to-peer ...
P2P-Worm.Winur High P2P-Worm.Winur is a worm that propagates through specific Peer to Peer ...
P2P-Worm.Zaka High P2P-Worm.Zaka is a network worm that spreads across different transmission ...
Porn-Dialer.Agent.BN Medium Porn-Dialer.Agent.BN is a dialer that will make changes to the dial-up setting ...
Porn-Dialer.Agent.P Elevated PornDialer.Agent.P is a dialer program which is used to access pornographic ...
Porn-Dialer.Agent.V Low PornDialer.Agent.V is a dialer program which is used to access pornographic ...
Porn-Dialer.Akilog High PornDialer.Akilog is a dialer that dials high-cost phone calls to services ...
Porn-Dialer.GBDialer.J Elevated Porn-Dialer.GBDialer.J is a dialer program which is used to access pornographic ...
Porn-Dialer.HQ High PornDialer.HQ is a dialer that will make changes to the dial up settings of ...
Porn-Dialer.Juicy Elevated PornDialer.Juicy is a dialer which when executed is used to access pornographic ...
Porn-Dialer.Salc Elevated PornDialer.Salc is a program used to dial a high-cost international phone ...

Page 1 | Page 2

Go to another page: MRC Home, Infection Database, Threat Levels, Glossary, Malware Dispute Form, Submit Spyware