R - Infection Database
These pages list all available infections that Spyware Doctor is capable of removing. Infections are presented by name, level of threat and a brief description and have been organised in alphabetical order by name.
On this page you can:
- Browse through the infections by page or first letter.
- Search for a specific infection using the Search field.
- Click on an infection in the list below to view further details on a specific infection
Browse infections beginning with
Displaying infections 201-225 of 225 for "R" found.
|Rootkit.Foop||Rootkit.Foop is rootkit that opens up a backdoor on infected computer allowing ...|
|Rootkit.FU_Rootkit||FU rootkit is a popular rootkit which can hide processes, elevate process ...|
|Rootkit.Fuzen||Rootkit.Fuzen can hide the presence of any process on the infected machine in ...|
|Rootkit.He4Hook_Rootkit||He4Hook Rootkit is a Russian rootkit which enables attackers to hide processes ...|
|Rootkit.Hearse||Rootkit.Hearse is downloaded in conjunciton with Worm.Alcra. It is a keylogger ...|
|Rootkit.HideProc||Rootkit.HideProc is a rootkit that hides its presence on infected machine and ...|
|Rootkit.Koutodoor||Rootkit.Koutodoor is a software with the rootkit-specific techniques designed ...|
|Rootkit.MintRoot||Rootkit.MintRoot may be used to hide malicious threats from the user. ...|
|Rootkit.Namana||Rootkit.Namana is a software with the rootkit-specific techniques designed to ...|
|Rootkit.NT_Rootkit||NT Rootkit allows attackers to hide processes, files, registry entries and ...|
|Rootkit.Order||Rootkit.Order hides files with filenames containing the word "order" in them. ...|
|Rootkit.Podnuha||Rootkit.Podnuha hides its presence in the infected machine in order to ...|
|Rootkit.Protector||Rootkit.Protector is a threat that relies on rootkit-specific techniques in ...|
|Rootkit.Qandr||Rootkit.Qandr hides its presence on the infected machine in order to perform ...|
|Rootkit.Qhost||Rootkit.Qhost uses an rootkit technology to hide itself. It attempts to create ...|
|Rootkit.Rustock.A||Rootkit.Rustock.A is a rootkit that hides presence in infected machine in order ...|
|Rootkit.Se500mdm||Rootkit.Se500MDM is bundled with other malware that has rootkit functionality ...|
|Rootkit.Small||Rootkit.Small hides its presence on the infected machine in order to perform ...|
|Rootkit.Stuxnet||Rookit.Stuxnet is a software with rootkit-specific techniques designed to hide ...|
|Rootkit.TDSS||Rootkit.TDSS can hide the presence of any process on the infected machine in ...|
|Rootkit.TDSS.v1||Rootkit.TDSS.v1 attempts to hide itself from detection by anti malware ...|
|Rootkit.TDSS.v2||Rootkit.TDSS.v2 attempts to hide itself from detection by anti malware ...|
|Rootkit.TDSS.v3||Rootkit.TDSS.v3 attempts to hide itself from detection by anti malware ...|
|Rootkit.TDSS.v4||Rootkit.TDSS.v4 attempts to hide itself from detection by anti malware ...|
|Rootkit.Vanti||Rookit.Vanti places itself in the temporary folder and hooks itself to a ...|