T - Infection Database

These pages list all available infections that Spyware Doctor is capable of removing. Infections are presented by name, level of threat and a brief description and have been organised in alphabetical order by name.

On this page you can:

  • Browse through the infections by page or first letter.
  • Search for a specific infection using the Search field.
  • Click on an infection in the list below to view further details on a specific infection

Browse infections beginning with

All Infections | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Displaying infections 2401-2450 of 3390 for "T" found.

Page 1 ... Page 45 | Page 46 | Page 47 | Page 48 | Page 49 | Page 50 | Page 51 | Page 52 | Page 53 ... Page 68

Name Threat Level Description
Trojan-Spy.HTML.BankFraud High Trojan-Spy.HTML.BankFraud attempts to steal sensitive banking-related ...
Trojan-Spy.HTML.Bankfraud.IX High Trojan.Spy.HTML.Bankfraud.lX is a trojan that creates a fake email as an ...
Trojan-Spy.Iespy High Trojan.Spy.Iespy is a Trojan that pretends to be windows process. It start as a ...
Trojan-Spy.Irex Elevated Trojan.Spy.Irex is installed without the user's full knowledge and consent. ...
Trojan-Spy.Janet Medium Trojan-Spy.Janet is a malicious application that attempts to steal passwords, ...
Trojan-Spy.Jiospy.A High Trojan-Spy.Jiospy.A is a trojan that attempts to steal user information by ...
Trojan-Spy.JSChrome Medium Trojan-Spy.JSChrome is a malicious JavaScript that runs in Mozilla Firefox. It ...
Trojan-Spy.JSStealus High Trojan-Spy.JSStealus steals sensitive banking-related credentials by using a ...
Trojan-Spy.Justin High Trojan.Spy.Justin downloads a file to the Windows folder and upon execution, ...
Trojan-Spy.Kbrdspy High Trojan-Spy.Kbrdspy is a malicious application that records the keystrokes and ...
Trojan-Spy.Keylogger High Trojan-Spy.Keylogger is a generic detection for malware that logs a user's ...
Trojan-Spy.KeyLogger.ab High Trojan.Spy.KeyLogger.ab runs in the background and records all keystrokes on ...
Trojan-Spy.KeyLogger.AO High Trojan-Spy.KeyLogger.AO is a trojan which will capture all keystrokes from ...
Trojan-Spy.Keylogger.AP High Trojan.Spy.Keylogger.AP collects all keystrokes and saves them in a log file ...
Trojan-Spy.Keylogger.BA High Trojan.Spy.Keylogger.BA runs in stealth mode, captures all keystrokes and ...
Trojan-Spy.Keylogger.BF High Trojan.Spy.Keylogger.BF captures all keystrokes and saves them in a log file ...
Trojan-Spy.Keylogger.BMG High Trojan-Spy.Keylogger.BMG is a generic detection for malware that logs a user's ...
Trojan-Spy.Keylogger.BX High Trojan-Spy.Keylogger.BX collects all keystrokes and saves them in a log file ...
Trojan-Spy.KeyLogger.CX High Trojan-Spy.KeyLogger.CX is a trojan which will capture all keystrokes from ...
Trojan-Spy.KeyLogger.ej High Trojan.Spy.KeyLogger.ej runs in the background and records all keystrokes on ...
Trojan-Spy.Keylogger.FI High Trojan-Spy.Keylogger.FI is a malicious application that attempts to steal ...
Trojan-Spy.KeyLogger.GS High Trojan-Spy.KeyLogger.GS is a trojan which will capture all keystrokes from ...
Trojan-Spy.KeyLogger.JC High Trojan.Spy.KeyLogger.JC runs in the background and records all keystrokes on ...
Trojan-Spy.KeyLogger.JH High Trojan-Spy.KeyLogger.JH is a trojan which will capture all keystrokes from ...
Trojan-Spy.Keylogger.P High Trojan-Spy.Keylogger.P is a trojan which will capture keystrokes from infected ...
Trojan-Spy.Kik High Trojan-Spy.Kik is a keystroke logger which secretly send the keys captured on ...
Trojan-Spy.Klogger High Trojan-Spy.Klogger is a malicious application that attempts to steal passwords, ...
Trojan-Spy.KongHoo Medium Trojan-Spy.KongHoo is a malicious application that attempts to steal passwords, ...
Trojan-Spy.Kronos.B High Trojan-Spy.Kronos.B is trojan that tries to monitors user activities in hopes ...
Trojan-Spy.LAO High Trojan-Spy.LAO steals sensitive information by using a fake web page from AOL's ...
Trojan-Spy.Lodis High Trojan.Spy.Lodis is a malicious application that attempts to steal passwords, ...
Trojan-Spy.Loper Elevated Trojan.Spy.Loper will log the keystrokes of a user which is then accessible ...
Trojan-Spy.Lorex High Trojan-Spy.Lorex is a threat that tries to monitor user activities related to ...
Trojan-Spy.Luhn.A High Trojan.Spy.Luhn.A masquerades itself as a Windows update distributed via email. ...
Trojan-Spy.Lyndra High Trojan-Spy.Lyndra is a trojan that will steal user information and then send ...
Trojan-Spy.MA Medium Trojan.Spy.MA installs itself to the system and records specific events on an ...
Trojan-Spy.Malabas Medium Trojan-Spy.Malabas is a malicious application that attempts to steal passwords, ...
Trojan-Spy.Matman High Trojan-Spy.Matman is a malicious application that attempts to steal passwords, ...
Trojan-Spy.Mico High Trojan-Spy.Mico is a malicious application that attempts to steal passwords, ...
Trojan-Spy.Montp.W High Trojan-Spy.Montp.W steals password and other confidential information and sends ...
Trojan-Spy.Msdivxdec High Trojan-Spy.Msdivxdec is an unsafe application that attempts to steal ...
Trojan-Spy.MSN.B High Trojan.Spy.MSN.B is a trojan that conceals itself to be Windows Explorer and ...
Trojan-Spy.MSNLogThief High Trojan.Spy.MSNLogThief is a trojan horse that logs MSN messenger login ...
Trojan-Spy.MultiBanker High Trojan-Spy.MultiBanker steals information such as bank accounts, usernames, ...
Trojan-Spy.Netgett.D High Trojan.Spy.Netgett.D is a trojan which steals information from your computer ...
Trojan-Spy.Offkey Elevated Trojan.Spy.Offkey is a trojan which logs keystrokes and steals information from ...
Trojan-Spy.Ozone High Trojan.Spy.Ozone steals username and passwords from the system and mails them ...
Trojan-Spy.PassKiller.B High Trojan.Spy.PassKiller.B steals login information such as usernames and ...
Trojan-Spy.Pino High Trojan.Spy.Pino is installed without going through secure procedure which might ...
Trojan-Spy.Pophot High Trojan-Spy.Pophot attempts to monitor users activities and logs confidential ...

Page 1 ... Page 45 | Page 46 | Page 47 | Page 48 | Page 49 | Page 50 | Page 51 | Page 52 | Page 53 ... Page 68

Go to another page: MRC Home, Infection Database, Threat Levels, Glossary, Malware Dispute Form, Submit Spyware