Infection Database

These pages list all available infections that Spyware Doctor is capable of removing. Infections are presented by name, level of threat and a brief description and have been organised in alphabetical order by name.

On this page you can:

  • Browse through the infections by page or first letter.
  • Search for a specific infection using the Search field.
  • Click on an infection in the list below to view further details on a specific infection

Browse infections beginning with

All Infections | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Displaying infections 10601-10650 of 11067 found.

Page 1 ... Page 209 | Page 210 | Page 211 | Page 212 | Page 213 | Page 214 | Page 215 | Page 216 | Page 217 ... Page 222

Name Threat Level Description
Trojan.QQHook.A High Trojan.QQHook.A is a Trojan that attempts to steal information from the ...
Trojan.QQHook.B High Trojan.QQHook.B is a trojan which hooks itself onto a popular Chinese instant ...
Trojan.QQPass.LHF High Trojan.QQPass.LHF steals passwords, usernames and other sensitive data and ...
Trojan.QQPass.LN High Trojan.QQPass.LN steals passwords, usernames and other sensitive data and sends ...
Trojan.Rabbit Elevated Trojan.Rabbit is a trojan horse or bot that may represent security risk for the ...
Trojan.Ragrok.A High Trojan.Ragrok.A attempts to log keystrokes and mouse movements to send this ...
Trojan.Ranck.Gen High Trojan.Ranck.Gen is a family of trojans that allows HTTP traffic to be relayed ...
Trojan.Ransomware High Trojan.Ransomware is a trojan which encrypt or hides files on the compromised ...
Trojan.Rasaper High Trojan.Rasaper is a malicious program that does not infect other files but may ...
Trojan.Rcadnatu High Trojan.Rcadnatu may represent security risk for the compromised system and/or ...
Trojan.Rebooter High Trojan.Rebooter allows an attacker to gain remote access of the infected ...
Trojan.Rebooter.M High Trojan.Rebooter.M allows an attacker to gain remote access of the infected ...
Trojan.Refpron.GEN High Trojan.Refpron.GEN on execution runs in the background and can download other ...
Trojan.Refroso High Trojan.Refroso is a malicious trojan horse or bot that may represent security ...
Trojan.Regfreeze Low Regfreeze is a Rogue Anti-Spyware product which installs itself via a trojan ...
Trojan.RegSubsDat High Trojan.RegSubsDat normally arrives via a malformed excel file. It modifies some ...
Trojan.Repton.Info High Trojan.Repton.Info opens ports and sends identifiable information to an ...
Trojan.Revop.A High Trojan.Revop.A is an adware trojan which will display pop-up advertisements ...
Trojan.Revop.C Medium Trojan.Revop.C is a trojan which runs in the background and allows unauthorised ...
Trojan.Revop.E High Trojan.Revop.E is a trojan that tries to open a website using an internet ...
Trojan.Riler.AO High Trojan.Riler.AO is a threat that attempts to connect from a remote host accross ...
Trojan.Rincux High Trojan.Rincux has built-in DDoS attack functionality making it possible for it ...
Trojan.RisingFree Medium Trojan.RisingFree is a risky program that can download harmful threats once be ...
Trojan.RouterChanger High Trojan.RouterChanger attempts to modify the router settings on the network ...
Trojan.RPCC_Spammer High RPCC Spammer is a spam relay trojan which uses the infected machine to send ...
Trojan.Runex High Trojan.Runex attempts to contact remote servers and downloads code that may ...
Trojan.RunKeys High Trojan.RunKeys installs autorun registry entries for other malware. It is ...
Trojan.Runner High Trojan.Runner normally arrives on a system as a component of another malware. ...
Trojan.Runner.F High Trojan.Runner.F contacts a remote server in order to download additional ...
Trojan.Rustock.WY Medium Trojan.Rustock.WY is a Trojan that with rootkit ability to hide its presence in ...
Trojan.Rux High Trojan.Rux runs silently in the background detecting for Zone Alarm firewall ...
Trojan.Sadenav.GEN Medium Trojan.Sadenav.GEN is a trojan horse which monitor users keyboard strokes in ...
Trojan.Sasfis High Trojan.Sasfis runs silently in the background and can download and install ...
Trojan.SC_Keylogger High SC Keylogger has been created by Alexander van Trijffel. It can run in stealth ...
Trojan.Sdbot-QG High Contains backdoor Trojan functions that allows unauthorised remote access to ...
Trojan.Sdbot.AAN High Trojan.Sdbot.AAN is a worm and an IRC backdoor for the Windows platform. It ...
Trojan.SDranck High Trojan.SDranck is a network propagating worm that sends malicious attachments ...
Trojan.SecondThought.l Medium This trojan acts as a BHO and supports awdware. It also installs a malicious ...
Trojan.SectorEraser High Trojan.SectorEraser deletes data from every sector of the harddrive installed ...
Trojan.Selfdel High Trojan.Selfdel attempts to disable security-related applications based on their ...
Trojan.Semki High Trojan.Semki runs silently in the background and can download and install ...
Trojan.SendExe High Trojan.SendExe is a malicious program that does not infect other files but ...
Trojan.Senkrad High Trojan.Senkrad attempts to listen for commands from a command and control ...
Trojan.Sheldor High Trojan.Sheldor will bring you to one of its advertisement websites when you ...
Trojan.Shutdowner High Trojan.Shutdowner forces the system to shut down after some time. ...
Trojan.SickleBot High SickleBot will attempt to connect to a compromised web server in order to ...
Trojan.Silly.Runit Medium Trojan.Silly.Runit is a malicious trojan horse or bot that may represent ...
Trojan.SillyWorm High Trojan.SillyWorm produces fake error messages to entice user to activate ...
Trojan.Siloth.A High Trojan.Siloth.A hijacks the computer screen causing it to become inoperable. ...
Trojan.Sintan High A malicious trojan horse or bot that may represent security risk for the ...

Page 1 ... Page 209 | Page 210 | Page 211 | Page 212 | Page 213 | Page 214 | Page 215 | Page 216 | Page 217 ... Page 222

Go to another page: MRC Home, Infection Database, Threat Levels, Glossary, Malware Dispute Form, Submit Spyware