T - Infection Database

These pages list all available infections that Spyware Doctor is capable of removing. Infections are presented by name, level of threat and a brief description and have been organised in alphabetical order by name.

On this page you can:

  • Browse through the infections by page or first letter.
  • Search for a specific infection using the Search field.
  • Click on an infection in the list below to view further details on a specific infection

Browse infections beginning with

All Infections | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Displaying infections 2351-2400 of 3390 for "T" found.

Page 1 ... Page 44 | Page 45 | Page 46 | Page 47 | Page 48 | Page 49 | Page 50 | Page 51 | Page 52 ... Page 68

Name Threat Level Description
Trojan-Spy.FBCheck Medium Trojan-Spy.FBCheck monitors user activities on the social networking site, ...
Trojan-Spy.Fearless High Trojan-Spy.Fearless is a keylogger Trojan, which creates its log file in the ...
Trojan-Spy.Flecsip.C High Trojan.Spy.Flecsip.C is a keylogger, trojan which can steal your information ...
Trojan-Spy.Flux High Trojan.Spy.Flux captures keystrokes and screenshots at random interval to steal ...
Trojan-Spy.FlyStudio.E High Trojan-Spy.FlyStudio.E attempts to monitor keyboard stroke activities made by ...
Trojan-Spy.FlyStudio.MM Medium Trojan-Spy.FlyStudio.MM attempts to monitor keyboard stroke activities made by ...
Trojan-Spy.FtpSpy High Trojan-Spy.FtpSpy monitors user's File Transfer Protocol (FTP) activities and ...
Trojan-Spy.Gampass High Trojan-Spy.Gampass is a malicious application that attempts to steal passwords, ...
Trojan-Spy.Gepost High Trojan.Spy.Gepost is a trojan which logs keystrokes and steals information from ...
Trojan-Spy.Gimmiv.A Medium Trojan-Spy.Gimmiv.A attempts to monitor and steal confidential information on ...
Trojan-Spy.Gimmiv.B High Trojan-Spy.Gimmiv.B attempts to scan the network for computers to exploit ...
Trojan-Spy.Godmoney High Trojan-Spy.Godmoney attempts to steal confidential information of a specific ...
Trojan-Spy.Goldsun Medium Trojan.Spy.Goldsun on execution installs itself as a legitimate file, hides its ...
Trojan-Spy.Goldun High Trojan-Spy.Goldun is a trojan that attempts to steal passwords, login details ...
Trojan-Spy.Goldun.AJ High Trojan-Spy.Goldun.AJ is trojan that tries to monitors user activities in hopes ...
Trojan-Spy.Goldun.BA High Trojan-Spy.Goldun.BA is trojan that tries to monitors user activities in hopes ...
Trojan-Spy.Goldun.BE High Trojan.Spy.Goldun.BE steals financial information such as bank accounts, ...
Trojan-Spy.Goldun.BI High Trojan-Spy.Goldun.BI is trojan that tries to monitors user activities in hopes ...
Trojan-Spy.Goldun.BT High Trojan-Spy.Goldun.BT is trojan file that tries to monitors user activities in ...
Trojan-Spy.Goldun.C High Trojan-Spy.Goldun.C steal authentication information in order to gain access to ...
Trojan-Spy.Goldun.DN High Trojan-Spy.Goldun.DN is trojan file that tries to monitors user activities in ...
Trojan-Spy.Goldun.DW High Trojan-Spy.Goldun.DW steals financial information such as bank accounts, ...
Trojan-Spy.Goldun.EB High Trojan-Spy.Goldun.EB is trojan file that tries to monitors user activities in ...
Trojan-Spy.Goldun.EC High Trojan-Spy.Goldun.EC is trojan that tries to monitors user activities in hopes ...
Trojan-Spy.Goldun.ED High Trojan-Spy.Goldun.ED is trojan file that tries to monitors user activities in ...
Trojan-Spy.Goldun.EF High Trojan-Spy.Goldun.EF is trojan file that tries to monitors user activities in ...
Trojan-Spy.Goldun.EI High Trojan-Spy.Goldun.EI is trojan file that tries to monitors user activities to ...
Trojan-Spy.Goldun.EW High Trojan-Spy.Goldun.EW is trojan file that tries to monitors user activities in ...
Trojan-Spy.Goldun.EX High Trojan-Spy.Goldun.EX is a password stealing trojan which sends e-gold-related ...
Trojan-Spy.Goldun.FJ High Trojan-Spy.Goldun.FJ steals financial information such as bank accounts, ...
Trojan-Spy.Goldun.HM High Trojan-Spy.Goldun.HM is a trojan that attempts to steal information from the ...
Trojan-Spy.Goldun.IK High Trojan.Spy.Goldun.IK will generate excessive amounts of traffic on the infected ...
Trojan-Spy.Goldun.N High Trojan.Spy.Goldun.N is a password stealing trojan which sends e-gold-related ...
Trojan-Spy.Goldun.NDU Elevated Trojan.Goldun.NDU is a rootkit program that steals personal identity and sends ...
Trojan-Spy.Goldun.NQ High Trojan.Spy.Goldun.NQ is a password stealing trojan which monitors browsing ...
Trojan-Spy.Goldun.TV High Trojan-Spy.Goldun.TV is a trojan file that tries to monitors user activities in ...
Trojan-Spy.Gologger High Trojan-Spy.Gologger logs the keystrokes of the infected machine and this might ...
Trojan-Spy.Graball High Trojan-Spy.Graball is trojan file that tries to monitors user activities in ...
Trojan-Spy.Gritz.C High Trojan.Spy.Gritz.C is a trojan which runs silently in the background. It hides ...
Trojan-Spy.Gunbot High Trojan-Spy.Gunbot is a threat that attempts to steal information from the user ...
Trojan-Spy.GWGhost High Trojan.Spy.GWGhost is a trojan which steals login information, such as login ...
Trojan-Spy.Hachilem High Trojan-Spy.Hachilem steals sensitive information gathered from the infected ...
Trojan-Spy.Harvester High Trojan-Spy.Harvester is Trojan that is used by the attacker to steal game ...
Trojan-Spy.Haxspy.A High Trojan-Spy.Haxspy.A is a trojan that tries to steal information by monitoring ...
Trojan-Spy.Haxspy.AF High Trojan-Spy.Haxspy.AF is a malicious application that hides itself from the user ...
Trojan-Spy.Haxspy.AQ High Trojan-Spy.Haxspy.AQ is a malicious application that hides itself from the user ...
Trojan-Spy.Haxspy.H High Trojan-Spy.Haxspy.H is a malicious application that attempts to steal sensitive ...
Trojan-Spy.Haxspy.V High Trojan-Spy.Haxspy.V is a malicious application that attempts to steal sensitive ...
Trojan-Spy.Hibik High Trojan-Spy.Hibik is a malicious application that attempts to steal passwords, ...
Trojan-Spy.Hsow High Trojan-Spy.Hsow is a malicious application that attempts to steal passwords, ...

Page 1 ... Page 44 | Page 45 | Page 46 | Page 47 | Page 48 | Page 49 | Page 50 | Page 51 | Page 52 ... Page 68

Go to another page: MRC Home, Infection Database, Threat Levels, Glossary, Malware Dispute Form, Submit Spyware