T - Infection Database

These pages list all available infections that Spyware Doctor is capable of removing. Infections are presented by name, level of threat and a brief description and have been organised in alphabetical order by name.

On this page you can:

  • Browse through the infections by page or first letter.
  • Search for a specific infection using the Search field.
  • Click on an infection in the list below to view further details on a specific infection

Browse infections beginning with

All Infections | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Displaying infections 1401-1450 of 3390 for "T" found.

Page 1 ... Page 25 | Page 26 | Page 27 | Page 28 | Page 29 | Page 30 | Page 31 | Page 32 | Page 33 ... Page 68

Name Threat Level Description
Trojan-Proxy.Small.EM High Trojan.Proxy.Small.EM is a proxy trojan which will allow an attacker to use the ...
Trojan-Proxy.SRSHost High Trojan.Proxy.SRSHost is a SOCKS proxy server which runs over a randomly ...
Trojan-Proxy.Steredir High Trojan-Proxy.Steredir is a malicious trojan that starts a proxy server and ...
Trojan-Proxy.Symbab High Trojan-Proxy.Symbab is a malicious trojan that starts a proxy server and allows ...
Trojan-Proxy.VB.I High Trojan-Proxy.VB.I opens port to allow hackers to gain full access to infected ...
Trojan-Proxy.VB.X High Trojan-Proxy.VB.X opens random ports and contacts badsite in order to download ...
Trojan-Proxy.Webber High Trojan-Proxy.Webber is a malicious trojan that compromises computer by opening ...
Trojan-Proxy.Webber.O High Trojan.Proxy.Webber.O will attempt to steal local passwords and sensitive ...
Trojan-Proxy.Wopla High Trojan-Proxy.Wopla opens a backdoor on the infected computer and setup a proxy ...
Trojan-Proxy.Wopla.AC High Trojan.Proxy.Wopla.AC opens a backdoor on the infected computer and setup a ...
Trojan-Proxy.Wopla.AT High Trojan-Proxy.Wopla.AT opens up a backdoor on the infected computer allowing a ...
Trojan-Proxy.Xorpix High Trojan.Proxy.Xorpix is a trojan which allows hackers to remotely access the ...
Trojan-PWS.About High Trojan-PWS.About is a trojan that attempts to steal passwords from the infected ...
Trojan-PWS.Abrada High Trojan.PWS.Abrada is a trojan which periodically connects to a remote server to ...
Trojan-PWS.AcidShiver High Trojan-PWS.AcidShiver is a malicious application that attempts to steal ...
Trojan-PWS.Afigen High Trojan-PWS.Afigen is a malicious application that attempts to steal passwords, ...
Trojan-PWS.Agent High Trojan-PWS.Agent is a trojan that will attempt to steal local passwords and ...
Trojan-PWS.Agent.AA High Trojan.PWS.Agent.AA is a trojan that will steal locally stored passwords on the ...
Trojan-PWS.Agent.AJ High Trojan-PWS.Agent.AJ is a malicious application that attempts to steal ...
Trojan-PWS.Agent.AM High Trojan-PSW.Agent.AM is a malicious application that attempts to steal ...
Trojan-PWS.Agent.AN High Trojan-PWS.Agent.AN is a malicious application that attempts to steal ...
Trojan-PWS.Agent.AQ High Trojan-PWS.Agent.AQ is a malicious application that attempts to steal ...
Trojan-PWS.Agent.AR High Trojan-PWS.Agent.AR is a malicious application that attempts to steal ...
Trojan-PWS.Agent.AY High Trojan-PWS.Agent.AY is a malicious application that attempts to steal ...
Trojan-PWS.Agent.BA High Trojan-PWS.Agent.BA is a malicious application that attempts to steal ...
Trojan-PWS.Agent.BF High Trojan-PWS.Agent.BF is a malicious application that attempts to steal ...
Trojan-PWS.Agent.BG High Trojan-PWS.Agent.BG is a malicious application that attempts to steal ...
Trojan-PWS.Agent.BL High Trojan.PSW.Agent.BL attempts to steal sensitive identifiable data, such as ...
Trojan-PWS.Agent.BR High Trojan-PWS.Agent.BR attempts to steal sensitive identifiable data, such as ...
Trojan-PWS.Agent.BU High Trojan-PWS.Agent.BU is a malicious application that attempts to steal ...
Trojan-PWS.Agent.C High Trojan.PWSteal.Agent.C runs silently in the background and monitors Yahoo! ...
Trojan-PWS.Agent.CB High Trojan-PWS.Agent.CB is a malicious application that attempts to steal ...
Trojan-PWS.Agent.CK High Trojan.PSW.Agent.CK logs keystrokes and steals login information for ICQ and ...
Trojan-PWS.Agent.CP High Trojan-PWS.Agent.CP is a malicious application that attempts to steal ...
Trojan-PWS.Agent.CU High Trojan-PWS.Agent.CU is a malicious application that attempts to steal ...
Trojan-PWS.Agent.CW High Trojan.PSW.Agent.CW is a trojan that attempts to steal passwords from the ...
Trojan-PWS.Agent.DA High Trojan.PSW.Agent.DA is a trojan which attempts to connect to the internet to ...
Trojan-PWS.Agent.DC High Trojan-PWS.Agent.DC is a trojan that will attempt to steal local passwords and ...
Trojan-PWS.Agent.DM High Trojan-PSW.Agent.DM is a trojan which attempts to steal confidential ...
Trojan-PWS.Agent.FA High Trojan-PWS.Agent.FA is a trojan that will attempt to steal local passwords and ...
Trojan-PWS.Agent.FJ High Trojan-PWS.Agent.FJ is a trojan that will attempt to steal local passwords and ...
Trojan-PWS.Agent.FL High Trojan-PWS.Agent.FL is a trojan that will attempt to steal local passwords and ...
Trojan-PWS.Agent.FV High Trojan.PSW.Agent.FV attempts to steal local passwords to send off to a remote ...
Trojan-PWS.Agent.GR High Trojan.PSW.Agent.GR is a Trojan that will attempt to steal local passwords and ...
Trojan-PWS.Agent.GT Medium Trojan-PWS.Agent.GT is a malicious application that attempts to steal ...
Trojan-PWS.Agent.GX High Trojan-PWS.Agent.GX is a malicious application that attempts to steal ...
Trojan-PWS.Agent.IX High Trojan.PSW.Agent.IX is a trojan that will steal sensitive identifiable data ...
Trojan-PWS.Agent.K High Trojan.PWSteal.Agent.K steals banking information stored on a users PC and ...
Trojan-PWS.Agent.kfr High A keylogger program that can capture all user keystrokes (including ...
Trojan-PWS.Agent.KNT High Trojan-PWS.Agent.KNT contacts a remote server in order to download additional ...

Page 1 ... Page 25 | Page 26 | Page 27 | Page 28 | Page 29 | Page 30 | Page 31 | Page 32 | Page 33 ... Page 68

Go to another page: MRC Home, Infection Database, Threat Levels, Glossary, Malware Dispute Form, Submit Spyware