R - Infection Database

These pages list all available infections that Spyware Doctor is capable of removing. Infections are presented by name, level of threat and a brief description and have been organised in alphabetical order by name.

On this page you can:

  • Browse through the infections by page or first letter.
  • Search for a specific infection using the Search field.
  • Click on an infection in the list below to view further details on a specific infection

Browse infections beginning with

All Infections | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Displaying infections 201-225 of 225 for "R" found.

Page 1 | Page 2 | Page 3 | Page 4 | Page 5

Name Threat Level Description
Rootkit.Foop High Rootkit.Foop is rootkit that opens up a backdoor on infected computer allowing ...
Rootkit.FU_Rootkit High FU rootkit is a popular rootkit which can hide processes, elevate process ...
Rootkit.Fuzen Medium Rootkit.Fuzen can hide the presence of any process on the infected machine in ...
Rootkit.He4Hook_Rootkit High He4Hook Rootkit is a Russian rootkit which enables attackers to hide processes ...
Rootkit.Hearse High Rootkit.Hearse is downloaded in conjunciton with Worm.Alcra. It is a keylogger ...
Rootkit.HideProc Medium Rootkit.HideProc is a rootkit that hides its presence on infected machine and ...
Rootkit.Koutodoor High Rootkit.Koutodoor is a software with the rootkit-specific techniques designed ...
Rootkit.MintRoot Medium Rootkit.MintRoot may be used to hide malicious threats from the user. ...
Rootkit.Namana High Rootkit.Namana is a software with the rootkit-specific techniques designed to ...
Rootkit.NT_Rootkit High NT Rootkit allows attackers to hide processes, files, registry entries and ...
Rootkit.Order High Rootkit.Order hides files with filenames containing the word "order" in them. ...
Rootkit.Podnuha High Rootkit.Podnuha hides its presence in the infected machine in order to ...
Rootkit.Protector High Rootkit.Protector is a threat that relies on rootkit-specific techniques in ...
Rootkit.Qandr High Rootkit.Qandr hides its presence on the infected machine in order to perform ...
Rootkit.Qhost High Rootkit.Qhost uses an rootkit technology to hide itself. It attempts to create ...
Rootkit.Rustock.A High Rootkit.Rustock.A is a rootkit that hides presence in infected machine in order ...
Rootkit.Se500mdm High Rootkit.Se500MDM is bundled with other malware that has rootkit functionality ...
Rootkit.Small High Rootkit.Small hides its presence on the infected machine in order to perform ...
Rootkit.Stuxnet High Rookit.Stuxnet is a software with rootkit-specific techniques designed to hide ...
Rootkit.TDSS High Rootkit.TDSS can hide the presence of any process on the infected machine in ...
Rootkit.TDSS.v1 High Rootkit.TDSS.v1 attempts to hide itself from detection by anti malware ...
Rootkit.TDSS.v2 High Rootkit.TDSS.v2 attempts to hide itself from detection by anti malware ...
Rootkit.TDSS.v3 High Rootkit.TDSS.v3 attempts to hide itself from detection by anti malware ...
Rootkit.TDSS.v4 High Rootkit.TDSS.v4 attempts to hide itself from detection by anti malware ...
Rootkit.Vanti High Rookit.Vanti places itself in the temporary folder and hooks itself to a ...

Page 1 | Page 2 | Page 3 | Page 4 | Page 5

Go to another page: MRC Home, Infection Database, Threat Levels, Glossary, Malware Dispute Form, Submit Spyware