T - Infection Database

These pages list all available infections that Spyware Doctor is capable of removing. Infections are presented by name, level of threat and a brief description and have been organised in alphabetical order by name.

On this page you can:

  • Browse through the infections by page or first letter.
  • Search for a specific infection using the Search field.
  • Click on an infection in the list below to view further details on a specific infection

Browse infections beginning with

All Infections | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Displaying infections 3201-3250 of 3390 for "T" found.

Page 1 ... Page 61 | Page 62 | Page 63 | Page 64 | Page 65 | Page 66 | Page 67 | Page 68

Name Threat Level Description
Trojan.SickleBot High SickleBot will attempt to connect to a compromised web server in order to ...
Trojan.Silly.Runit Medium Trojan.Silly.Runit is a malicious trojan horse or bot that may represent ...
Trojan.SillyWorm High Trojan.SillyWorm produces fake error messages to entice user to activate ...
Trojan.Siloth.A High Trojan.Siloth.A hijacks the computer screen causing it to become inoperable. ...
Trojan.Sintan High A malicious trojan horse or bot that may represent security risk for the ...
Trojan.Sjkr High Trojan.Sjkr runs silently in the background and can download and install ...
Trojan.Skintrim.GEN High Trojan.Skintrim.GEN runs without user notification after initial installation ...
Trojan.SkypSnif Medium This trojan targets machines that Skype application installed. Upon execution, ...
Trojan.Small_related High A trojan downloader which hijacks Internet Explorer browser settings and ...
Trojan.Small.AH High Trojan.Small.AH is a trojan which connects to the internet and runs silently in ...
Trojan.Small.AHX High Trojan.Small.AHX will change the search page and start page of a compu ...
Trojan.Small.AMH High Trojan.Small.AMH is a threat that attempts to connect from a remote host ...
Trojan.Small.BJY High Trojan.Small.BJY infects a users machine by installing itself into the system ...
Trojan.Small.DL High Trojan.Small.DL connects to preconfigured internet sites to download data and ...
Trojan.Small.FH High Trojan.Small.FH will use the computer network resources to perform a denial of ...
Trojan.Small.IP High Trojan-Downloader.Small.IP is a trojan that attempts to connect to the internet ...
Trojan.Small.LG High Trojan.Small.LG installs itself in the system folder. It then contacts remote ...
Trojan.Small.O High Trojan.Small.O will attempt to spread by copying itself to a number of ...
Trojan.Small.TT Medium Trojan.Small.TT tries to download and run malicious files from the Internet on ...
Trojan.Small.XTA Medium Trojan.Small.XTA connects to remote sites to download other malicious fil ...
Trojan.Small.XUT High Trojan.Small.XUT connects to remote sites to download other malicious fil ...
Trojan.Small.YQL High Trojan.Small.YQL on execution tries to connect to the Internet in order to ...
Trojan.Smallfeg High Trojan.Smallfeg connects to an external IRC server to allow an attacker ...
Trojan.SmartFinder Elevated SmartFinder downloads other malicious software from a remote server without the ...
Trojan.Sonic.Worm Medium Sonic Worm is an email worm which spreads by emailing itself to addresses in ...
Trojan.SpamBot High Trojan.SpamBot is a Trojan that sends out mass spam e-mails, consuming and ...
Trojan.Spamer High Trojan.Spamer is a trojan horse, which spreads via Internet downloads, FTP, IRC ...
Trojan.SpamThru High Trojan.SpamThru opens random ports allowing unauthorized access to the infected ...
Trojan.SpBot.B High Trojan.SpBot.B is a trojan that exploits the infected computer so that it can ...
Trojan.Spedia_Surf Medium This description of Surf+ is quoted from scumware.com: If you see the big red ...
Trojan.Spooner Elevated This trojan will create links in memory to a search engine on specific words ...
Trojan.Spy.Banker.SB Medium Trojan.Spy.Banker.SB is a trojan which will attempt to steal banking ...
Trojan.Spy.Keylogger.AJ High Trojan.Spy.Keylogger.AJ runs in the background and records all keystrokes on ...
Trojan.Spybot Medium Trojan.Spybot is a worm that spreads using P2P network sharing such as Kazaa ...
Trojan.Spybot.GL High Trojan.Spybot.GL runs silently in the background opening up a port to listen ...
Trojan.Spyeye High This trojan captures keystrokes and steals sensitive information and sends the ...
Trojan.Spyrat High Trojan.Spyrat drops itself onto infected machine and allows unauthorized access ...
Trojan.Spywad.A High Trojan.Spywad.A creates an HTML file which claims that your computer is ...
Trojan.Spywad.B High Trojan.Spywad.B hijacks windows desktop settings and changes users wallpaper. ...
Trojan.Srchspy High Trojan.Srchspy is a malicious program that may represent security risk for your ...
Trojan.SRRS High Trojan.SRRS contacts a remote server in order to download additional malware ...
Trojan.Startpage High Trojan.Startpage attempts to hijacks users Internet Explorer startpage to ...
Trojan.Startpage_9991_com Low Trojan.Startpage.9991.com often bundled with other Chinese adware, changes ...
Trojan.StartPage.ACW High Trojan.StartPage.ACW is a trojan which hijacks Internet Explorers homepage and ...
Trojan.StartPage.ACZ High Trojan.StartPage.ACZ is a trojan which hijacks Internet Explorers homepage and ...
Trojan.StartPage.ADH High Trojan.StartPage.ADH is a trojan which attempts to download other trojans and ...
Trojan.Startpage.AEB High Trojan.Startpage.AEB is a trojan with adware capabilities which displays ...
Trojan.Startpage.AEN High Trojan.Startpage.AEN is a trojan with adware capabilities and will also ...
Trojan.Startpage.AFB High Trojan.StartPage.AFB is a trojan horse which hijacks the Internet Explorer home ...
Trojan.StartPage.AKF Elevated Trojan.StartPage.AKF is a trojan which hijacks Internet Explorers homepage and ...

Page 1 ... Page 61 | Page 62 | Page 63 | Page 64 | Page 65 | Page 66 | Page 67 | Page 68

Go to another page: MRC Home, Infection Database, Threat Levels, Glossary, Malware Dispute Form, Submit Spyware