Inc - Infection Database

These pages list all available infections that Spyware Doctor is capable of removing. Infections are presented by name, level of threat and a brief description and have been organised in alphabetical order by name.

On this page you can:

  • Browse through the infections by page or first letter.
  • Search for a specific infection using the Search field.
  • Click on an infection in the list below to view further details on a specific infection

Browse infections beginning with

All Infections | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Displaying infections 251-300 of 312 for "Inc" found.

Page 1 | Page 2 | Page 3 | Page 4 | Page 5 | Page 6 | Page 7

Name Threat Level Description
Trojan-PWS.LdPinch.CQM High Trojan-PWS.LdPinch.CQM steals passwords, system information and other data from ...
Trojan-PWS.LdPinch.DIS High Trojan-PWS.LdPinch.DIS steals passwords information stored on a users computer ...
Trojan-PWS.LdPinch.EJB High Trojan-PWS.LdPinch.EJB is a threat that steals necessary information related to ...
Trojan-PWS.LdPinch.EYZ High Trojan-PWS.LdPinch.EYZ is a threat that steals necessary information related to ...
Trojan-PWS.OnlineGames.AJNN High Trojan-PWS.OnlideGames.AJNN can capture all user keystrokes (including ...
Trojan-PWS.Sincom High Trojan.PWS.Sincom is a trojan that will attempt to steal passwords on an ...
Trojan-PWS.Small.GS Medium Trojan-PWS.Small.GS is a keylogger program that can capture all user keystrokes ...
Trojan-Spy.Banker.AFU High Trojan.Spy.Banker.AFU is a Trojan which on execution displays fake webpages of ...
Trojan-Spy.Banker.ALR High Trojan.Spy.Banker.ALR steals personal information from an infected PC by ...
Trojan-Spy.Banpaes.W High Trojan.Spy.Banpaes.W is a Trojan which on execution displays fake webpages of a ...
Trojan-Spy.Delf.MQ High Trojan.Spy.Delf.MQ is a trojan that will attempt to steal information including ...
Trojan-Spy.Dummy Elevated Trojan.Spy.Dummy will contact a remote server to send back information ...
Trojan-Spy.Goldsun Medium Trojan.Spy.Goldsun on execution installs itself as a legitimate file, hides its ...
Trojan-Spy.Harvester High Trojan-Spy.Harvester is Trojan that is used by the attacker to steal game ...
Trojan-Spy.Recodat High Trojan-Spy.Recodat logs all keystrokes to a file and sends it to attacker. It ...
Trojan-Spy.Sincom High Trojan-Spy.Sincom attempts to steal sensitive information such as usernames and ...
Trojan-Spy.Sisie High Trojan.Spy.Sisie will monitor the internet activities on an infected system ...
Trojan-Spy.WinFlux High Trojan.Spy.WinFlux is a Trojan which monitors users activities on the computer. ...
Trojan-Spy.Zonepal Medium Trojan.Spy.Zonepal will hide itself in the system folder and add a registry key ...
Trojan.0Cat_Yellowpages Elevated 0Cat Yellowpages adds a toolbar into your browser and hijacks your homepage to ...
Trojan.Agent.CL High The Trojan will download other malicious software to your computer, including ...
Trojan.Agent.IV High Trojan.Agent.IV will collect personal information from an infected computer ...
Trojan.Alset_Network Elevated Alset Network is a variant of HXDL AL, which is part of an automated helpdesk ...
Trojan.Banbra High Trojan.Banbra is a Trojan which on execution displays fake webpages of a ...
Trojan.Banbra.BA High Trojan.Banbra.BA is a Trojan which on execution displays fake webpages of a ...
Trojan.Banbra.EB High Trojan.Banbra.EB is a Trojan which on execution displays fake webpages of a ...
Trojan.Bombibom Elevated Trojan.Bombibom is a trojan horse that collects personal information, includes ...
Trojan.CallerID High Trojan.CallerID installs itself on infected machines and monitors incoming ...
Trojan.Chaincodr Medium Trojan.Chaincodr monitors Windows applications and may use the infected ...
Trojan.Delf.BY Elevated Trojan.Delf.BY is a tool mainly used by hackers to perform certain actions on a ...
Trojan.Diablo_Keylogger High Diablo Keylogger logs all keystrokes including usernames and passwords to ...
Trojan.Dogrobot.A High This trojan is downloaded and encrypted using exploit from ...
Trojan.Dumaru High Trojan.Dumaru opens a backdoor on the infected machine. It can log keystrokes ...
Trojan.FakeAlert High Trojan.FakeAlert will hijack the desktop background with an image alerting the ...
Trojan.GenteeKiller.A High Trojan.GenteeKiller.A deletes files from the affected system including system ...
Trojan.Gromp Medium Trojan.Gromp reports a users browsing habits and search terms back to its ...
Trojan.HacDef High Trojan.HacDef allows unauthorized access to the infected system and can also be ...
Trojan.Hydraq.GEN High Trojan.Hydraq.GEN installs a backdoor trojan that listens for incoming commands ...
Trojan.IESpawn High Trojan.IESpawn creates an instance of Internet Explorer which it hides from ...
Trojan.ISTbar High ISTbar is a Trojan downloader which will download additional malware components ...
Trojan.Keylogger.Winchkr High Trojan.Keylogger.Winchkr captures keystrokes typed in the infected machine. ...
Trojan.Koblu High Trojan.Koblu attempts to drop a malicious file and run it on the compromised ...
Trojan.LdPinch High Trojan.LdPinch steals passwords, system information and other data from a ...
Trojan.LdPinch.L High Trojan.LdPinch.L is a password stealing trojan with backdoor functionality. ...
Trojan.Liduan.A High Trojan.Liduan.A will record a users activities to a hidden log file. This ...
Trojan.LolaWeb.A Medium Trojan.LolaWeb.A displays various porn pop-ups and downloads other malware ...
Trojan.Pacuks Medium Trojan Pacuks is a threat that creates a hidden process of either the Windows ...
Trojan.Pakes High Trojan.Pakes downloads various malware including Internet Optimizer, ISTBar, ...
Trojan.PCAgent_Keylogger High PCAgent Keylogger monitors users activities on the computer. It captures all ...
Trojan.Pcik High Trojan.Pcik is a trojan that will attempt to steal local information including ...

Page 1 | Page 2 | Page 3 | Page 4 | Page 5 | Page 6 | Page 7

Go to another page: MRC Home, Infection Database, Threat Levels, Glossary, Malware Dispute Form, Submit Spyware