T - Infection Database

These pages list all available infections that Spyware Doctor is capable of removing. Infections are presented by name, level of threat and a brief description and have been organised in alphabetical order by name.

On this page you can:

  • Browse through the infections by page or first letter.
  • Search for a specific infection using the Search field.
  • Click on an infection in the list below to view further details on a specific infection

Browse infections beginning with

All Infections | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Displaying infections 2851-2900 of 3390 for "T" found.

Page 1 ... Page 54 | Page 55 | Page 56 | Page 57 | Page 58 | Page 59 | Page 60 | Page 61 | Page 62 ... Page 68

Name Threat Level Description
Trojan.Crypt.D High Trojan.Crypt.D is a trojan that will connect to an IRC server and lisen for ...
Trojan.Crypt.E High Trojan.Crypt.E is a trojan which downloads additional malicious software and ...
Trojan.Crypt.GEN Medium Trojan.Crypt.GEN downloads additional malicious components when executed and ...
Trojan.Crypt.I High Trojan.Crypt.I will download additional malware components which are ...
Trojan.Crypt.K High Trojan.Crypt.K tries to download additional malicious components when it is ...
Trojan.Crypt.LHF High Trojan.Crypt.LHF is a trojan which downloads additional malicious software and ...
Trojan.Crypt.Q High Trojan.Crypt.Q downloads additional malicious components when executed and ...
Trojan.Crypt.S High Trojan.Crypt.S is a backdoor trojan which opens a random port and allows ...
Trojan.Crypt.T High Trojan.Crypt.T will download additional malware components when execut ...
Trojan.Crypt.U High Trojan.Crypt.U contacts a list of ad-servers, and pops advertising and ...
Trojan.Crypter.C High Trojan.Crypter.C runs in the background as a process and tries to download ...
Trojan.CWS High CWS is a trojan that hijacks Internet Explorer start and search settings to one ...
Trojan.Dadar High Trojan.Dadar is a malicious program that does not infect other files but may ...
Trojan.Dadobra High Trojan.Dadobra contacts a remote server in order to download additional malware ...
Trojan.Daemonize High Trojan.Daemonize is a backdoor program that logs keystrokes and opens a random ...
Trojan.DAMZip High Trojan.DAMZip is a damaged archive which is usually seen or attached in ...
Trojan.Danmec.C High Trojan.Danmec.C downloads malicious code from the internet. It then copies ...
Trojan.Daoser.A High Trojan.Daoser.A remains active in memory by automatically running at startup, ...
Trojan.Daugeru High Trojan.Daugeru opens port 80 on infected machines and attempts to use infected ...
Trojan.Dbit High Trojan.Dbit is a malicious program that does not infect other files but may ...
Trojan.DeathPack.B High Trojan.DeathPack.B is a configurable trojan that may cause damage to the ...
Trojan.Decept High Trojan.Decept is a trojan binder that is used for merging other malwares such ...
Trojan.DelAll.B High Trojan.DelAll.B attempts to delete files from the affected system. ...
Trojan.Delf High Trojan.Delf is a generic detection for trojans compiled in Delphi. They run ...
Trojan.Delf.AO Elevated Trojan.Delf.AO runs silently in the background and monitors user activities on ...
Trojan.Delf.BV High Trojan.Delf.BV is a keylogger that runs silently in the background and monitors ...
Trojan.Delf.BY Elevated Trojan.Delf.BY is a tool mainly used by hackers to perform certain actions on a ...
Trojan.Delf.BZ High Trojan.Delf.BZ is a trojan that tries to install itself as a legitimate program ...
Trojan.Delf.CDI High Trojan.Delf.CDI is a trojan which gets installed as a legitimate service on the ...
Trojan.Delf.DVJ Medium Trojan.Delf.DVJ is a trojan attempts to steal password information on infected ...
Trojan.Delf.ECE Medium Trojan.Delf.QN is a malicious trojan horse or bot that may represent security ...
Trojan.Delf.EQ High Trojan.Delf.EQ is a keylogger that runs silently in the background and monitors ...
Trojan.Delf.GZ High Trojan.Delf.GZ is a Trojan which on execution installs itself as a legitimate ...
Trojan.Delf.IT High Trojan.Delf.IT monitors your browsing habits and sends the information back to ...
Trojan.Delf.JM High Trojan.Delf.JM runs silently in the backgound and can open up a port to allow ...
Trojan.Delf.KH High Trojan.Delf.KH uses a process which acts as a spam relayer in order to ...
Trojan.Delf.PH High Trojan.Delf.PH is a trojan attempts to steal password information on infected ...
Trojan.Delf.PX High Trojan.Delf.PX is a Trojan program which on execution installs itself as a ...
Trojan.Delf.QN High Trojan.Delf.QN is a tool used by hackers to scan for usernames and password ...
Trojan.Delf.STO Medium Trojan.Delf.STO is a malicious program that modify system settings and steal ...
Trojan.Delf.XI High Trojan.Delf.XI is a trojan which attempts to steal sensitive information on ...
Trojan.Delf.ZJ Medium Trojan.Delf.ZJ drops and installs several BHO components on the infected ...
Trojan.Delfiles.A High Trojan.Delfiles.A will pose as a Norton Upgrade setup, but when executed will ...
Trojan.Desktop_Hijacker High Desktop Hijacker hijacks the Windows desktop background to display alerts of ...
Trojan.Desktopscam High Trojan.Desktopscam contacts Rogue Anti Spyware product websites and downloads ...
Trojan.Detroie High Trojan.Detroie is a software that allows an attacker to transfer viruses to ...
Trojan.Diablo_Keylogger High Diablo Keylogger logs all keystrokes including usernames and passwords to ...
Trojan.Dialer High Trojan.Dialer is a program used to dial a high-cost international phone number ...
Trojan.Dialer.CEJ Elevated Trojan.Dialer.CEJ is a program used to dial a high-cost international phone ...
Trojan.Dialer.CWG High Trojan.Dialer.CWG is a signature that tries to connect or dial to a certain ...

Page 1 ... Page 54 | Page 55 | Page 56 | Page 57 | Page 58 | Page 59 | Page 60 | Page 61 | Page 62 ... Page 68

Go to another page: MRC Home, Infection Database, Threat Levels, Glossary, Malware Dispute Form, Submit Spyware