T - Infection Database

These pages list all available infections that Spyware Doctor is capable of removing. Infections are presented by name, level of threat and a brief description and have been organised in alphabetical order by name.

On this page you can:

  • Browse through the infections by page or first letter.
  • Search for a specific infection using the Search field.
  • Click on an infection in the list below to view further details on a specific infection

Browse infections beginning with

All Infections | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Displaying infections 2451-2500 of 3390 for "T" found.

Page 1 ... Page 46 | Page 47 | Page 48 | Page 49 | Page 50 | Page 51 | Page 52 | Page 53 | Page 54 ... Page 68

Name Threat Level Description
Trojan-Spy.Pophot.AAS Medium Trojan-Spy.Pophot.AAS is a trojan which logs keystrokes and steals information ...
Trojan-Spy.Pophot.AHV High Trojan-Spy.Pophot.AHV downloads additional malware and monitors the infected ...
Trojan-Spy.Pophot.ASO High Trojan-Spy.Pophot.ASO modifies Windows security settings on infected computer ...
Trojan-Spy.Pophot.GEN High Trojan-Spy.Pophot.GEN is a trojan which monitors an infected computer for ...
Trojan-Spy.Pophot.GNH High Trojan-Spy.Pophot.GNH is a trojan which monitors an infected computer for ...
Trojan-Spy.Pophot.WX High Trojan-Spy.Pophot.WX is a malicious application that attempts to steal ...
Trojan-Spy.PSpy High Trojan-Spy.PSpy is a malicious application that logs keystrokes and attempts to ...
Trojan-Spy.Qeds High Trojan-Spy.Qeds is a malicious application that logs keystrokes and attempts to ...
Trojan-Spy.QuickPass High Trojan-Spy.QuickPass is a malicious application that logs keystrokes and ...
Trojan-Spy.Qukart High Trojan.Spy.Qukart.C is a trojan which will attempt to steal password on the ...
Trojan-Spy.Ransom.A High Trojan.Spy.Random.A is a trojan which scatters or hides files on the ...
Trojan-Spy.Ransom.VB.A High Trojan-Spy.Ransom.VB.A on execution encrypts some files on the infected ...
Trojan-Spy.Recodat High Trojan-Spy.Recodat logs all keystrokes to a file and sends it to attacker. It ...
Trojan-Spy.Rion High Trojan-Spy.Rion steals password and other confidential information and sends ...
Trojan-Spy.Rockfi High Trojan-Spy.Rockfi is a threat downloaded by Trojan-Downloader.Rockfi that drops ...
Trojan-Spy.RtR Medium Trojan-Spy.RtR logs keystrokes and collects personal information from the users ...
Trojan-Spy.Ruby.Kakkeys High Trojan.Spy.Ruby.Kakkeys is a trojan which logs keystrokes and steals ...
Trojan-Spy.Satur High Trojan.Spy.Satur is a keylogger that will capture all keystrokes made on an ...
Trojan-Spy.Sels Elevated Trojan-Spy.Sels is a malicious application that attempts to steal passwords, ...
Trojan-Spy.SendWM Medium Trojan.Spy.SendWM will attempt to monitor and log keystrokes in order to steal ...
Trojan-Spy.Silentbanker High Trojan.Silentbanker uses randomly-generated and system-related filenames in ...
Trojan-Spy.Sincom High Trojan-Spy.Sincom attempts to steal sensitive information such as usernames and ...
Trojan-Spy.Sisie High Trojan.Spy.Sisie will monitor the internet activities on an infected system ...
Trojan-Spy.Small High Trojan.Spy.Small establish connection to the Internet through random ports to ...
Trojan-Spy.Small.AC High Trojan-Spy.Small.AC is a trojan spyware that tries to steal certain information ...
Trojan-Spy.Small.AD High Trojan-Spy.Small.AD establishes a connection to the Internet to monitor user ...
Trojan-Spy.Small.AS High Trojan-Spy.Small.AS establishes a connection to the Internet to monitor user ...
Trojan-Spy.Small.BSK High Trojan-Spy.Small.BSK is a trojan which captures all keystrokes on the infected ...
Trojan-Spy.Small.BSZ High Trojan-Spy.Small.BSZ is a trojan which captures all keystrokes on the infected ...
Trojan-Spy.Small.BY High Trojan-Spy.Small.BY is a trojan which will capture all keystrokes from users ...
Trojan-Spy.Small.CQ High Trojan-Spy.Small.CQ is a trojan that tries to monitor user activities and logs ...
Trojan-Spy.Small.EK High Trojan-Spy.Small.EK is a trojan which will capture all keystrokes from users ...
Trojan-Spy.Small.FN High Trojan-Spy.Small.FN is a trojan which will capture all keystrokes from users ...
Trojan-Spy.Small.FP High Trojan-Spy.Small.FP is a trojan which will capture all keystrokes from users ...
Trojan-Spy.Small.GE High Trojan-Spy.Small.GE is a trojan which will capture all keystrokes from users ...
Trojan-Spy.Small.K High Trojan-Spy.Small.K is a trojan spyware that tries to steal certain information ...
Trojan-Spy.Small.N High Trojan-Spy.Small.N is a trojan spyware that tries to steal certain information ...
Trojan-Spy.Speil High Trojan-Spy.Speil is a trojan that will log user activity and information onto a ...
Trojan-Spy.SpyAnyTime.C High Trojan-Spy.SpyAnyTime.C is a trojan that deceives the user that it is the ...
Trojan-Spy.Spybox High Trojan-Spy.Spybox is trojan that tries to monitors user activities in hopes to ...
Trojan-Spy.Sters.AE High Trojan-Spy.Sters.AE is trojan file that tries to monitor user activities in ...
Trojan-Spy.Sters.C High Trojan-Spy.Sters.C is a trojan that tries to monitor user activities and logs ...
Trojan-Spy.Sters.I High Trojan-Spy.Sters.I is a trojan that tries to monitor user activities and logs ...
Trojan-Spy.Sters.U High Trojan-Spy.Sters.U is a trojan that tries to monitor user activities and logs ...
Trojan-Spy.Suyi High Trojan-Spy.Suyi is a threat that tries to monitor user activities related to ...
Trojan-Spy.TheRat High Trojan-Spy.TheRat steals sensitive information and send the stolen information ...
Trojan-Spy.Tigr High Trojan-Spy.Tigr is a trojan that attempts to steal passwords from users of the ...
Trojan-Spy.Tiny High Trojan-Spy.Tiny hides in the background without user knowledge and records ...
Trojan-Spy.Tofger High Trojan-Spy.Tofger is a trojan that tries to obtain certain information from ...
Trojan-Spy.Tofger.AU High Trojan-Spy.Tofger.AU is a Trojan that will allow unauthorized access to the ...

Page 1 ... Page 46 | Page 47 | Page 48 | Page 49 | Page 50 | Page 51 | Page 52 | Page 53 | Page 54 ... Page 68

Go to another page: MRC Home, Infection Database, Threat Levels, Glossary, Malware Dispute Form, Submit Spyware