T - Infection Database

These pages list all available infections that Spyware Doctor is capable of removing. Infections are presented by name, level of threat and a brief description and have been organised in alphabetical order by name.

On this page you can:

  • Browse through the infections by page or first letter.
  • Search for a specific infection using the Search field.
  • Click on an infection in the list below to view further details on a specific infection

Browse infections beginning with

All Infections | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Displaying infections 2801-2850 of 3390 for "T" found.

Page 1 ... Page 53 | Page 54 | Page 55 | Page 56 | Page 57 | Page 58 | Page 59 | Page 60 | Page 61 ... Page 68

Name Threat Level Description
Trojan.BHO.OCL Medium This trojan drops and installs its BHO component in the infected machine in ...
Trojan.BHO.UMT Medium Trojan.BHO.UMT is a BHO component that monitors system activity in the ...
Trojan.BHO.XTI High Trojan.BHO.XTI registers itself as a Browser Helper Object (BHO) in order to ...
Trojan.BHO.YYF High Trojan.BHO.YYF registered as a Browser Helper Object in the infected machine in ...
Trojan.BioNet_3.12 High Spyware Trojan, Bionet variant, kills antivirus and other security software, ...
Trojan.BlazeFind Elevated BlazeFind, alias TrojanClicker.Win32.Delf.r, is a BHO toolbar that hijacks your ...
Trojan.Block-Checker High Block-checker is a program which is used to check if your friends are blocking ...
Trojan.Boaxxe.F High Trojan.Boaxxe.F may represent security risk for the compromised system and/or ...
Trojan.Bombibom Elevated Trojan.Bombibom is a trojan horse that collects personal information, includes ...
Trojan.Brogger.A High Trojan.Brogger.A is a Trojan which runs in the background, monitors users ...
Trojan.Browserplugin_com Medium Browserplugin.com, also called WebHelper is a Browser Helper Object that is ...
Trojan.BrowserToolbar Elevated This program is a Trojan. Troj/DLoader-A has several components. It downloads ...
Trojan.Bube High Trojan.Bube is a trojan downloader which infects explorer.exe in order to ...
Trojan.Bumerang High Trojan.Bumerang is a nasty trojan which can wipe out entire networks. It ...
Trojan.Burnaby_Module High Burnaby Module is a variant of Ortyc.Trojan, a Trojan horse that displays ...
Trojan.BurningHardDisk.HOAX Medium The BurningHardDisk.Haox is being spread through email. The email warns of a ...
Trojan.Buzus High Trojan.Buzus opens a backdoor on the infected machine and tries to steal ...
Trojan.Buzus.AACI High Trojan.Buzus.AACI opens a backdoor on the infected machine and tries to steal ...
Trojan.Buzus.AASA High Trojan.Buzus.AASA attempts to contact a predetermined host which can download ...
Trojan.Buzus.AFCO High Trojan.Buzus.AFCO opens a backdoor on the infected machine and tries to steal ...
Trojan.Buzus.AMX High Trojan.Buzus.AMX is a malicious program that may represent security risk for ...
Trojan.C-One_v.1.0.0 High C-One is a remote administrative trojan. It allows an attacker to take full ...
Trojan.CableBoost High Trojan CableBoost will attempt to connect to a pre-determined websites. It also ...
Trojan.CallerID High Trojan.CallerID installs itself on infected machines and monitors incoming ...
Trojan.Cariez High Trojan.Cariez is a malicious trojan horse or bot that may represent security ...
Trojan.CD1_Dialer Elevated CD1 Dialer is a premium rate dialer which is used to access pornographic ...
Trojan.CDOpen Elevated Trojan.CDOpen will disable the users desktop and continuously open and close ...
Trojan.CDur High Trojan.CDur is a malicious program that does not infect other files but may ...
Trojan.Chaincodr Medium Trojan.Chaincodr monitors Windows applications and may use the infected ...
Trojan.Chifrax.a High Trojan.Chifrax.a monitors Windows applications and may use the infected ...
Trojan.Cidra High Trojan.Cidra is a backdoor proxy trojan that lowers security settings of the ...
Trojan.Clagger.H High Trojan.Clagger.H comes as an attachment to unsuspecting PayPal customer. When ...
Trojan.Clampi.Gen Medium Trojan.Clampi.Gen is a malicious program that does not infect other files but ...
Trojan.CleverIEHooker High This is a hostile Java applet which can cause denial of service in your machine ...
Trojan.ClientMan High Common Components for ClientMan and Trojan.Downloader. ...
Trojan.Comeli.GEN Medium Trojan.Comeli.GEN is a trojan that hijacks Internet Explorer start and search ...
Trojan.Component.Tibs High Common Components used by Email-Worm.Zhelatin, Trojan-Downloader.Small.BET, ...
Trojan.Comsa High Trojan.Comsa can download and execute additional malware onto a users computer ...
Trojan.Conspy High Trojan.Conspy is a trojan which hijacks Internet Explorers homepage and ...
Trojan.Conycspa High Trojan.Conycspa attempts to connect to mail servers to send out spam ema ...
Trojan.CoolOnlineOffers High CoolOnlineOffers is a malicious program from CoolOnlineOffers.com that ...
Trojan.CoolWebSearch_AnalyzeIE High CWS.AnalyzeIE is a variant of CWS that hijacks Internet Explorer's default ...
Trojan.CoolWebSearch_CustomIE High Trojan.CoolWebSearch_CustomIE is a Brower Helper Object which monitors user ...
Trojan.CoolWebSearch_PayForTraffic.net Elevated CWS.PayForTraffic is a hijacker which redirects your browsers start page. ...
Trojan.CoolWebSearch_SearchCounter High Adware.SearchCounter changes Internet Explorer's search and home pages, ...
Trojan.CoolWebSearch_VIPSearcher High CWS.VIPSearcher is a variant of CoolWebSearch which alters your Internet ...
Trojan.CoolWebSearch_XPSystem High Trojan.CoolWebSearch_XPSystem hijacks user's Internet Explorer startpage. It ...
Trojan.Cosmu High Trojan.Cosmu is a threat that duplicates itself on infected machines, it runs ...
Trojan.Crypt.A High Trojan.Crypt.A will download additional malware components which are ...
Trojan.Crypt.AIT Elevated Trojan.Crypt.AIT is a trojan which downloads additional malicious software and ...

Page 1 ... Page 53 | Page 54 | Page 55 | Page 56 | Page 57 | Page 58 | Page 59 | Page 60 | Page 61 ... Page 68

Go to another page: MRC Home, Infection Database, Threat Levels, Glossary, Malware Dispute Form, Submit Spyware