T - Infection Database

These pages list all available infections that Spyware Doctor is capable of removing. Infections are presented by name, level of threat and a brief description and have been organised in alphabetical order by name.

On this page you can:

  • Browse through the infections by page or first letter.
  • Search for a specific infection using the Search field.
  • Click on an infection in the list below to view further details on a specific infection

Browse infections beginning with

All Infections | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Displaying infections 2301-2350 of 3390 for "T" found.

Page 1 ... Page 43 | Page 44 | Page 45 | Page 46 | Page 47 | Page 48 | Page 49 | Page 50 | Page 51 ... Page 68

Name Threat Level Description
Trojan-Spy.Chadem Medium Trojan-Spy.Chadem is a trojan that can steal user's information on infected ...
Trojan-Spy.Chazer Elevated Trojan-Spy.Chazer is a malicious application that attempts to steal passwords, ...
Trojan-Spy.Clipper High Trojan.Spy.Clipper is a trojan which attempts to steal password and other ...
Trojan-Spy.CmjSpy High Trojan-Spy.CmjSpy attempts to steal confidential information such as usernames ...
Trojan-Spy.Coiboa High Trojan.Spy.Coiboa is a malicious application that attempts to steal passwords, ...
Trojan-Spy.Czad High Trojan-Spy.Czad is an unwanted application that attempts to steal passwords, ...
Trojan-Spy.Darto High Trojan-Spy.Darto is a malicious application that attempts to steal passwords, ...
Trojan-Spy.Delf.AA High Trojan-Spy.Delf.AA is a trojan which logs keystrokes and steals information ...
Trojan-Spy.Delf.ABI High Trojan-Spy.Delf.ABI is trojan that tries to pose as a fake internet explorer ...
Trojan-Spy.Delf.AF High Trojan.Spy.Delf.AF is a keylogging trojan which logs keystrokes to a html file. ...
Trojan-Spy.Delf.AK High Trojan-Spy.Delf.AK is a trojan which logs keystrokes and steals information ...
Trojan-Spy.Delf.AR High Trojan-Spy.Delf.AR is a malicious application that attempts to steal passwords, ...
Trojan-Spy.Delf.AS High Trojan-Spy.Delf.AS is a trojan which logs keystrokes and steals information ...
Trojan-Spy.Delf.AX High Trojan-Spy.Delf.AX is a trojan which logs keystrokes and steals information ...
Trojan-Spy.Delf.AZQ High Trojan-Spy.Delf.AZQ is a threat that injects itself onto processes and monitors ...
Trojan-Spy.Delf.BG High Trojan-Spy.Delf.BG is a trojan which logs keystrokes and steals information ...
Trojan-Spy.Delf.BJI High Trojan-Spy.Delf.BJI monitors users internet activities and captures information ...
Trojan-Spy.Delf.BW High Trojan-Spy.Delf.BW is a trojan which logs keystrokes and steals information ...
Trojan-Spy.Delf.CB High Trojan-Spy.Delf.CB is a trojan which logs keystrokes and steals information ...
Trojan-Spy.Delf.CNK High Trojan-Spy.Delf.CNK is trojan file that tries to monitors user activities in ...
Trojan-Spy.Delf.CU High Trojan-Spy.Delf.CU attempts to monitor and log keystrokes in order to steal ...
Trojan-Spy.Delf.DO High Trojan.Spy.Delf.DO is a trojan which logs keystrokes and steals information ...
Trojan-Spy.Delf.EGG High Trojan-Spy.Delf.EGG is trojan file that tries to monitors user activities in ...
Trojan-Spy.Delf.ESE High Trojan-Spy.Delf.ESE attempts to monitor and log keystrokes in order to steal ...
Trojan-Spy.Delf.EW High Trojan-Spy.Delf.EW attempts to monitor and log keystrokes in order to steal ...
Trojan-Spy.Delf.FK High Trojan.Delf.FK monitors users browsing habits and sends the information back to ...
Trojan-Spy.Delf.GEN High Trojan.Spy.Delf.GEN is a trojan which logs keystrokes and steals information ...
Trojan-Spy.Delf.GW High Trojan-Spy.Delf.GW is a trojan which logs keystrokes and steals information ...
Trojan-Spy.Delf.JR High Trojan-Spy.Delf.JR is a trojan which logs keystrokes and steals information ...
Trojan-Spy.Delf.JU High Trojan-Spy.Delf.JU open ports and allows attackers unauthorized access to an ...
Trojan-Spy.Delf.KF High Trojan.Spy.Delf.KF is a Trojan which installs itself as a legitimate program ...
Trojan-Spy.Delf.MQ High Trojan.Spy.Delf.MQ is a trojan that will attempt to steal information including ...
Trojan-Spy.Delf.NC High Trojan.Spy.Delf.NC is a trojan which logs keystrokes and steals information ...
Trojan-Spy.Delf.NT High Trojan.Spy.Delf.NT will attempt to monitor and log keystrokes in order to steal ...
Trojan-Spy.Delf.O High Trojan-Spy.Delf.O open ports and allow attackers unauthorized access to an ...
Trojan-Spy.Delf.OI High Trojan.Spy.Delf.OI is a trojan which on execution displays a fake banking ...
Trojan-Spy.Delf.OX High Trojan-Spy.Delf.OX attempts to monitor and log keystrokes in order to steal ...
Trojan-Spy.Delf.R High Trojan.Spy.Delf.R is a trojan which logs keystrokes and steals information from ...
Trojan-Spy.Delf.RY High Trojan-Spy.Delf.RY attempts to monitor and log keystrokes in order to steal ...
Trojan-Spy.Delf.SE High Trojan-Spy.Delf.SE is a trojan which logs keystrokes and steals information ...
Trojan-Spy.Delf.UC High Trojan.Spy.Delf.UC open ports and allows attackers unauthorized access to an ...
Trojan-Spy.Delf.W High Trojan-Spy.Delf.W open ports and allows attackers unauthorized access to an ...
Trojan-Spy.Delf.YETH Medium Trojan-Spy.Delf.YETH logs keystrokes and steals vital information from the ...
Trojan-Spy.DiabloII High Trojan.Spy.DiabloII is a trojan which monitors users activities. It captures ...
Trojan-Spy.DiabloII.D High Trojan-Spy.DiabloII.D is a trojan that tries to steal valuable user information ...
Trojan-Spy.DiabloII.G High Trojan-Spy.DiabloII.G is a trojan that tries to steal valuable user information ...
Trojan-Spy.Dirt High Trojan-Spy.Dirt has ability to access files from a remote server by using ...
Trojan-Spy.Dumarin.A High Trojan-Spy.Dumarin.A steals password and other confidential information and ...
Trojan-Spy.Dummy Elevated Trojan.Spy.Dummy will contact a remote server to send back information ...
Trojan-Spy.EgySpy High Trojan.Spy.EgySpy logs keystrokes and steals information from the users ...

Page 1 ... Page 43 | Page 44 | Page 45 | Page 46 | Page 47 | Page 48 | Page 49 | Page 50 | Page 51 ... Page 68

Go to another page: MRC Home, Infection Database, Threat Levels, Glossary, Malware Dispute Form, Submit Spyware