T - Infection Database

These pages list all available infections that Spyware Doctor is capable of removing. Infections are presented by name, level of threat and a brief description and have been organised in alphabetical order by name.

On this page you can:

  • Browse through the infections by page or first letter.
  • Search for a specific infection using the Search field.
  • Click on an infection in the list below to view further details on a specific infection

Browse infections beginning with

All Infections | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Displaying infections 3151-3200 of 3390 for "T" found.

Page 1 ... Page 60 | Page 61 | Page 62 | Page 63 | Page 64 | Page 65 | Page 66 | Page 67 | Page 68

Name Threat Level Description
Trojan.QHost.IT High Trojan.QHost.IT is a trojan that modifies the system host file and drops other ...
Trojan.QHost.ZU High Trojan.QHost.ZU is a trojan that modifies the host file to block user access to ...
Trojan.Qhosts High Trojan.Qhosts is a trojan that modifies your network settings to point to a ...
Trojan.Qoologic High Qoologic monitors users keystrokes and mouse movements and displays pop up ...
Trojan.QQFake High Trojan.QQFake is a trojan that conceals itself as QQ software to steal QQ ...
Trojan.QQHook.A High Trojan.QQHook.A is a Trojan that attempts to steal information from the ...
Trojan.QQHook.B High Trojan.QQHook.B is a trojan which hooks itself onto a popular Chinese instant ...
Trojan.QQPass.LHF High Trojan.QQPass.LHF steals passwords, usernames and other sensitive data and ...
Trojan.QQPass.LN High Trojan.QQPass.LN steals passwords, usernames and other sensitive data and sends ...
Trojan.Rabbit Elevated Trojan.Rabbit is a trojan horse or bot that may represent security risk for the ...
Trojan.Ragrok.A High Trojan.Ragrok.A attempts to log keystrokes and mouse movements to send this ...
Trojan.Ranck.Gen High Trojan.Ranck.Gen is a family of trojans that allows HTTP traffic to be relayed ...
Trojan.Ransomware High Trojan.Ransomware is a trojan which encrypt or hides files on the compromised ...
Trojan.Rasaper High Trojan.Rasaper is a malicious program that does not infect other files but may ...
Trojan.Rcadnatu High Trojan.Rcadnatu may represent security risk for the compromised system and/or ...
Trojan.Rebooter High Trojan.Rebooter allows an attacker to gain remote access of the infected ...
Trojan.Rebooter.M High Trojan.Rebooter.M allows an attacker to gain remote access of the infected ...
Trojan.Refpron.GEN High Trojan.Refpron.GEN on execution runs in the background and can download other ...
Trojan.Refroso High Trojan.Refroso is a malicious trojan horse or bot that may represent security ...
Trojan.Regfreeze Low Regfreeze is a Rogue Anti-Spyware product which installs itself via a trojan ...
Trojan.RegSubsDat High Trojan.RegSubsDat normally arrives via a malformed excel file. It modifies some ...
Trojan.Repton.Info High Trojan.Repton.Info opens ports and sends identifiable information to an ...
Trojan.Revop.A High Trojan.Revop.A is an adware trojan which will display pop-up advertisements ...
Trojan.Revop.C Medium Trojan.Revop.C is a trojan which runs in the background and allows unauthorised ...
Trojan.Revop.E High Trojan.Revop.E is a trojan that tries to open a website using an internet ...
Trojan.Riler.AO High Trojan.Riler.AO is a threat that attempts to connect from a remote host accross ...
Trojan.Rincux High Trojan.Rincux has built-in DDoS attack functionality making it possible for it ...
Trojan.RisingFree Medium Trojan.RisingFree is a risky program that can download harmful threats once be ...
Trojan.RouterChanger High Trojan.RouterChanger attempts to modify the router settings on the network ...
Trojan.RPCC_Spammer High RPCC Spammer is a spam relay trojan which uses the infected machine to send ...
Trojan.Runex High Trojan.Runex attempts to contact remote servers and downloads code that may ...
Trojan.RunKeys High Trojan.RunKeys installs autorun registry entries for other malware. It is ...
Trojan.Runner High Trojan.Runner normally arrives on a system as a component of another malware. ...
Trojan.Runner.F High Trojan.Runner.F contacts a remote server in order to download additional ...
Trojan.Rustock.WY Medium Trojan.Rustock.WY is a Trojan that with rootkit ability to hide its presence in ...
Trojan.Rux High Trojan.Rux runs silently in the background detecting for Zone Alarm firewall ...
Trojan.Sadenav.GEN Medium Trojan.Sadenav.GEN is a trojan horse which monitor users keyboard strokes in ...
Trojan.Sasfis High Trojan.Sasfis runs silently in the background and can download and install ...
Trojan.SC_Keylogger High SC Keylogger has been created by Alexander van Trijffel. It can run in stealth ...
Trojan.Sdbot-QG High Contains backdoor Trojan functions that allows unauthorised remote access to ...
Trojan.Sdbot.AAN High Trojan.Sdbot.AAN is a worm and an IRC backdoor for the Windows platform. It ...
Trojan.SDranck High Trojan.SDranck is a network propagating worm that sends malicious attachments ...
Trojan.SecondThought.l Medium This trojan acts as a BHO and supports awdware. It also installs a malicious ...
Trojan.SectorEraser High Trojan.SectorEraser deletes data from every sector of the harddrive installed ...
Trojan.Selfdel High Trojan.Selfdel attempts to disable security-related applications based on their ...
Trojan.Semki High Trojan.Semki runs silently in the background and can download and install ...
Trojan.SendExe High Trojan.SendExe is a malicious program that does not infect other files but ...
Trojan.Senkrad High Trojan.Senkrad attempts to listen for commands from a command and control ...
Trojan.Sheldor High Trojan.Sheldor will bring you to one of its advertisement websites when you ...
Trojan.Shutdowner High Trojan.Shutdowner forces the system to shut down after some time. ...

Page 1 ... Page 60 | Page 61 | Page 62 | Page 63 | Page 64 | Page 65 | Page 66 | Page 67 | Page 68

Go to another page: MRC Home, Infection Database, Threat Levels, Glossary, Malware Dispute Form, Submit Spyware