Infection Database

These pages list all available infections that Spyware Doctor is capable of removing. Infections are presented by name, level of threat and a brief description and have been organised in alphabetical order by name.

On this page you can:

  • Browse through the infections by page or first letter.
  • Search for a specific infection using the Search field.
  • Click on an infection in the list below to view further details on a specific infection

Browse infections beginning with

All Infections | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Displaying infections 10251-10300 of 11067 found.

Page 1 ... Page 202 | Page 203 | Page 204 | Page 205 | Page 206 | Page 207 | Page 208 | Page 209 | Page 210 ... Page 222

Name Threat Level Description
Trojan.BlazeFind Elevated BlazeFind, alias TrojanClicker.Win32.Delf.r, is a BHO toolbar that hijacks your ...
Trojan.Block-Checker High Block-checker is a program which is used to check if your friends are blocking ...
Trojan.Boaxxe.F High Trojan.Boaxxe.F may represent security risk for the compromised system and/or ...
Trojan.Bombibom Elevated Trojan.Bombibom is a trojan horse that collects personal information, includes ...
Trojan.Brogger.A High Trojan.Brogger.A is a Trojan which runs in the background, monitors users ...
Trojan.Browserplugin_com Medium Browserplugin.com, also called WebHelper is a Browser Helper Object that is ...
Trojan.BrowserToolbar Elevated This program is a Trojan. Troj/DLoader-A has several components. It downloads ...
Trojan.Bube High Trojan.Bube is a trojan downloader which infects explorer.exe in order to ...
Trojan.Bumerang High Trojan.Bumerang is a nasty trojan which can wipe out entire networks. It ...
Trojan.Burnaby_Module High Burnaby Module is a variant of Ortyc.Trojan, a Trojan horse that displays ...
Trojan.BurningHardDisk.HOAX Medium The BurningHardDisk.Haox is being spread through email. The email warns of a ...
Trojan.Buzus High Trojan.Buzus opens a backdoor on the infected machine and tries to steal ...
Trojan.Buzus.AACI High Trojan.Buzus.AACI opens a backdoor on the infected machine and tries to steal ...
Trojan.Buzus.AASA High Trojan.Buzus.AASA attempts to contact a predetermined host which can download ...
Trojan.Buzus.AFCO High Trojan.Buzus.AFCO opens a backdoor on the infected machine and tries to steal ...
Trojan.Buzus.AMX High Trojan.Buzus.AMX is a malicious program that may represent security risk for ...
Trojan.C-One_v.1.0.0 High C-One is a remote administrative trojan. It allows an attacker to take full ...
Trojan.CableBoost High Trojan CableBoost will attempt to connect to a pre-determined websites. It also ...
Trojan.CallerID High Trojan.CallerID installs itself on infected machines and monitors incoming ...
Trojan.Cariez High Trojan.Cariez is a malicious trojan horse or bot that may represent security ...
Trojan.CD1_Dialer Elevated CD1 Dialer is a premium rate dialer which is used to access pornographic ...
Trojan.CDOpen Elevated Trojan.CDOpen will disable the users desktop and continuously open and close ...
Trojan.CDur High Trojan.CDur is a malicious program that does not infect other files but may ...
Trojan.Chaincodr Medium Trojan.Chaincodr monitors Windows applications and may use the infected ...
Trojan.Chifrax.a High Trojan.Chifrax.a monitors Windows applications and may use the infected ...
Trojan.Cidra High Trojan.Cidra is a backdoor proxy trojan that lowers security settings of the ...
Trojan.Clagger.H High Trojan.Clagger.H comes as an attachment to unsuspecting PayPal customer. When ...
Trojan.Clampi.Gen Medium Trojan.Clampi.Gen is a malicious program that does not infect other files but ...
Trojan.CleverIEHooker High This is a hostile Java applet which can cause denial of service in your machine ...
Trojan.ClientMan High Common Components for ClientMan and Trojan.Downloader. ...
Trojan.Comeli.GEN Medium Trojan.Comeli.GEN is a trojan that hijacks Internet Explorer start and search ...
Trojan.Component.Tibs High Common Components used by Email-Worm.Zhelatin, Trojan-Downloader.Small.BET, ...
Trojan.Comsa High Trojan.Comsa can download and execute additional malware onto a users computer ...
Trojan.Conspy High Trojan.Conspy is a trojan which hijacks Internet Explorers homepage and ...
Trojan.Conycspa High Trojan.Conycspa attempts to connect to mail servers to send out spam ema ...
Trojan.CoolOnlineOffers High CoolOnlineOffers is a malicious program from CoolOnlineOffers.com that ...
Trojan.CoolWebSearch_AnalyzeIE High CWS.AnalyzeIE is a variant of CWS that hijacks Internet Explorer's default ...
Trojan.CoolWebSearch_CustomIE High Trojan.CoolWebSearch_CustomIE is a Brower Helper Object which monitors user ...
Trojan.CoolWebSearch_PayForTraffic.net Elevated CWS.PayForTraffic is a hijacker which redirects your browsers start page. ...
Trojan.CoolWebSearch_SearchCounter High Adware.SearchCounter changes Internet Explorer's search and home pages, ...
Trojan.CoolWebSearch_VIPSearcher High CWS.VIPSearcher is a variant of CoolWebSearch which alters your Internet ...
Trojan.CoolWebSearch_XPSystem High Trojan.CoolWebSearch_XPSystem hijacks user's Internet Explorer startpage. It ...
Trojan.Cosmu High Trojan.Cosmu is a threat that duplicates itself on infected machines, it runs ...
Trojan.Crypt.A High Trojan.Crypt.A will download additional malware components which are ...
Trojan.Crypt.AIT Elevated Trojan.Crypt.AIT is a trojan which downloads additional malicious software and ...
Trojan.Crypt.D High Trojan.Crypt.D is a trojan that will connect to an IRC server and lisen for ...
Trojan.Crypt.E High Trojan.Crypt.E is a trojan which downloads additional malicious software and ...
Trojan.Crypt.GEN Medium Trojan.Crypt.GEN downloads additional malicious components when executed and ...
Trojan.Crypt.I High Trojan.Crypt.I will download additional malware components which are ...
Trojan.Crypt.K High Trojan.Crypt.K tries to download additional malicious components when it is ...

Page 1 ... Page 202 | Page 203 | Page 204 | Page 205 | Page 206 | Page 207 | Page 208 | Page 209 | Page 210 ... Page 222

Go to another page: MRC Home, Infection Database, Threat Levels, Glossary, Malware Dispute Form, Submit Spyware