Infection Database

These pages list all available infections that Spyware Doctor is capable of removing. Infections are presented by name, level of threat and a brief description and have been organised in alphabetical order by name.

On this page you can:

  • Browse through the infections by page or first letter.
  • Search for a specific infection using the Search field.
  • Click on an infection in the list below to view further details on a specific infection

Browse infections beginning with

All Infections | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Displaying infections 10101-10150 of 11067 found.

Page 1 ... Page 199 | Page 200 | Page 201 | Page 202 | Page 203 | Page 204 | Page 205 | Page 206 | Page 207 ... Page 222

Name Threat Level Description
Trojan.Agent.HR High Trojan.Agent.HR hooks on to the default web browser. It then targets users with ...
Trojan.Agent.HS High Trojan.Agent.HS is a trojan which modifies the Windows system file, ...
Trojan.Agent.HT High Trojan.Agent.HT is a trojan that runs silently in the background. It hides ...
Trojan.Agent.IM High Trojan.Agent.IM is a threat that steals users' password and modifies WinSock2 ...
Trojan.Agent.IV High Trojan.Agent.IV will collect personal information from an infected computer ...
Trojan.Agent.JQW High Trojan.Agent.JQW is a trojan that drops and registers a dll which is loaded ...
Trojan.Agent.KQ High Trojan.Agent.KQ automatically runs from Windows startup and attempt to access ...
Trojan.Agent.KWZ High Trojan.Agent.KWZ is a trojan that attempts to connect to the Internet either to ...
Trojan.Agent.LRY High Trojan.Win32.Agent.LRY on execution drops and executes various other malicious ...
Trojan.Agent.M High Torjan.Agent.M is a threat that will modify the system files and contact ...
Trojan.Agent.MAZ High Trojan.Agent.MAZ is a malicious trojan horse or bot that may represent security ...
Trojan.Agent.QW High Trojan.Agent.QW is a trojan which adds a runkey to run at startup and accesses ...
Trojan.Agent.QZY High Trojan.Agent.QZY is a threat that drops another malicious file known as ...
Trojan.Agent.SAC Elevated Trojan.Agent.SAC attempts to contact external server to notify of its presence ...
Trojan.Agent.SD High Trojan.Agent.SD attempts to connect to an external server to download ...
Trojan.Agent.STF High Trojan.Agent.STF attempts to record information about infected computers and ...
Trojan.Agent.TUK High Trojan.Agent.TUK is a trojan that attempts to connect to the Internet either to ...
Trojan.Agent.UT High Trojan.Agent.UT is a trojan, which on execution drops other malicious files ...
Trojan.Agent.VG High Trojan.Agent.VG contacts various websites to download additional malwar ...
Trojan.Agent.VM High Trojan.Agent.VM is a threat that attempts to create backdoors and allows an ...
Trojan.Agent.VP High Trojan.Agent.VP installs a Browser Helper Object to the infected system without ...
Trojan.Agent.VPQ Medium Trojan.Agent.VPQ is a malicious trojan horse or bot that may represent security ...
Trojan.Agent.VQ High Trojan.Agent.VQ is a threat that drops malicious files onto a users computer ...
Trojan.Agent.VQS High Trojan.Agent.VQS is a trojan horse or bot that attempts to create backdoors and ...
Trojan.Agent.WWV High Trojan.Agent.WWV is a trojan that is dropped onto the computer by another ...
Trojan.Agent.XJ High Trojan.Agent.XJ runs silently in the background as a process which starts up ...
Trojan.Agent.XJT High Trojan.Agent.XJT attempts to perform malicious actions on an infected ...
Trojan.Agent.YU High Trojan.Agent.YU is a trojan which allows remote intruders to gain access and ...
Trojan.Agent.YWY High Trojan.Agent.YWY drops potentially malicious files on the system. ...
Trojan.Agent.YXC Low Trojan.Agent.YXC runs in the background and allows remote access to the ...
Trojan.Agent.ZJC High Trojan.Agent.ZJC runs in the background and allows remote intruders to gain ...
Trojan.Agent.ZQ Elevated Trojan.Agent.ZQ runs silently in the background as a hidden process which ...
Trojan.AgentBypass.Gen High Trojan.AgentBypass.GEN is a malicious trojan which attempts to inject malicious ...
Trojan.Alasrou High Alasrou is an email harvesting worm which is spread by exploits and is capable ...
Trojan.Alfacentavr High Trojan.Alfacentavr constantly connects to an external server alfacentavr.com to ...
Trojan.Almanahe High Trojan.Almanahe may be installed on a system when users unknowingly visit ...
Trojan.Alset_Network Elevated Alset Network is a variant of HXDL AL, which is part of an automated helpdesk ...
Trojan.Alureon.B High Trojan.Alureon.B downloads a script that contains a list of malicious code. ...
Trojan.Alureon.Gen High Trojan.Alureon.Gen is a program that downloads files to the local computer that ...
Trojan.Alureon.J High Trojan.Alureon.J on execution drops copies of itself and also tries to download ...
Trojan.Antavmu.DZO Medium Trojan.Antavmu.DZO is downloaded onto the computer by another threat and ...
Trojan.AntiAV High Trojan.AntiAV is a threat that downloads files to the local computer, and ...
Trojan.AntiFireWall High Trojan.AntiFireWall will change the security policy of an infected computer ...
Trojan.AntiMcAfee.B High Trojan.AntiMcAfee.B is a trojan horse that conceals itself as a McAfee Security ...
Trojan.AOL.PS High Trojan.AOL.PS installs itself into the system folder. It logs all activity when ...
Trojan.AOLPass.B High Trojan.AOLPass.B runs in the background and steals passwords for AOL Messenger. ...
Trojan.ASF.Hijacker Medium Trojan.ASF.Hijacker injects multimedia files such as MP3 files and converts to ...
Trojan.Asimov High Trojan.Asimov will contact hackers web sites to try and get further information ...
Trojan.Astro.B Medium Trojan.Astro.B is a trojan which installs itself as a Browser Helper Object ...
Trojan.Atraps.A High Trojan.Atraps.A is a trojan that installs a malicious component as a default ...

Page 1 ... Page 199 | Page 200 | Page 201 | Page 202 | Page 203 | Page 204 | Page 205 | Page 206 | Page 207 ... Page 222

Go to another page: MRC Home, Infection Database, Threat Levels, Glossary, Malware Dispute Form, Submit Spyware