Infection Database

These pages list all available infections that Spyware Doctor is capable of removing. Infections are presented by name, level of threat and a brief description and have been organised in alphabetical order by name.

On this page you can:

  • Browse through the infections by page or first letter.
  • Search for a specific infection using the Search field.
  • Click on an infection in the list below to view further details on a specific infection

Browse infections beginning with

All Infections | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Displaying infections 8801-8850 of 11067 found.

Page 1 ... Page 173 | Page 174 | Page 175 | Page 176 | Page 177 | Page 178 | Page 179 | Page 180 | Page 181 ... Page 222

Name Threat Level Description
Trojan-Proxy.Agent.MU High Trojan-Proxy.Agent.MU opens a random ports to allow attackers to gain full ...
Trojan-Proxy.Agent.Q High Trojan.Proxy.Agent.Q allows a remote intruder to gain unauthorized access to ...
Trojan-Proxy.Agent.TKN High Trojan.Proxy.Agent.TKN opens random ports allowing an attacker unauthorized ...
Trojan-Proxy.Agent.ZM Medium Trojan-Proxy.Agent.ZM opens port to allow hackers to gain full access to ...
Trojan-Proxy.BH High Trojan.Proxy.BH has the ability to redirect traffic and download additional ...
Trojan-Proxy.BK High Trojan.Proxy.BK lowers some Windows security settings and opens a random TCP ...
Trojan-Proxy.Bobax High Trojan.Proxy.Bobax will operate silently in the background, attempting to send ...
Trojan-Proxy.Bunitu Medium Trojan-Proxy.Bunitu listens to random ports for incoming requests. It contacts ...
Trojan-Proxy.Cimuz High Trojan-Proxy.Cimuz is a malicious trojan that starts a proxy server and allows ...
Trojan-Proxy.Corpes High Trojan-Proxy.Corpes opens a TCP port and allows a remote attacker to gain ...
Trojan-Proxy.Corpse High Trojan.Proxy.Corpse downloads configuration information from a remote server ...
Trojan-Proxy.Delf.AN High This Trojan modifies Windows system in order to by-pass Firewall protection and ...
Trojan-Proxy.Delf.CK High Trojan-Proxy.Delf.CK opens a port to allow remote users unauthorized access to ...
Trojan-Proxy.DiskMaster.B High Trojan-Proxy.DiskMaster.B is a backdoor application which runs in the ...
Trojan-Proxy.Dlena.AV Medium Trojan-Proxy.Dlena.AV is a malicious application that attempts to steal ...
Trojan-Proxy.Glukelira.GEN Medium Trojan-Proxy.Glukelira.GEN opens port to allow hackers to gain full access to ...
Trojan-Proxy.GN High Trojan.Proxy.GN uses a hidden process to open a random TCP port which allows ...
Trojan-Proxy.Horst High Trojan-Proxy.Horst is a trojan horse that is used by malicious users to hide ...
Trojan-Proxy.Jaber High Trojan-Proxy.Jaber injects itself into the Layered Service Provider (LSP) ...
Trojan-Proxy.Jaber.G Low Trojan-Proxy.Jaber.G installs onto infected machine silently and adds itself to ...
Trojan-Proxy.Lager High Trojan.Proxy.Lager contacts a remote server to download and install malwares, ...
Trojan-Proxy.Lager.f High Trojan.Proxy.Lager.F contacts a remote server to download and install another ...
Trojan-Proxy.Livevids High Trojan-Proxy.Livevids attempts to open a random TCP port and connect to a ...
Trojan-Proxy.Mitglieder High Trojan-Proxy.Mitglieder is a threat that compromises computer by opening a ...
Trojan-Proxy.OPU High Trojan.Proxy.OPU will receive a list of servers addresses from ...
Trojan-Proxy.Ranky High Trojan-Proxy.Ranky is a Proxy Trojan which is designed to listen on a specified ...
Trojan-Proxy.Ranky.AN High Trojan.Proxy.Ranky.AN is a Proxy Trojan which is designed to listen to a ...
Trojan-Proxy.Ranky.BC High Trojan-Proxy.Ranky.BC is a threat that compromises computer by opening a proxy ...
Trojan-Proxy.Ranky.EK High Trojan.Proxy.Ranky.EK is a proxy server trojan which allows remote attackers to ...
Trojan-Proxy.Ranky.EL High Trojan.Proxy.Ranky.EL opens ports 1900 and 2869 and attempts to contact a ...
Trojan-Proxy.Ranky.GI High Trojan.Proxy.Ranky.GI is a Proxy Trojan which is designed to listen on a ...
Trojan-Proxy.Saturn.M High Trojan-Proxy.Saturn.M is a malicious trojan horse or bot that may represent ...
Trojan-Proxy.Slaper High Trojan.Proxy.Slaper is variant of Trojan.Mailbot that allows a infected system ...
Trojan-Proxy.Small.AV High Trojan-Proxy.Small.AV is a Trojan horse which opens and listens on a random ...
Trojan-Proxy.Small.BO High Trojan.Proxy.Small.BO silently installs itself onto a computer and ensures that ...
Trojan-Proxy.Small.BP High Trojan.Proxy.Small.BP is a trojan that installs itself onto the infected ...
Trojan-Proxy.Small.BT High Trojan.Proxy.Small.BT is a Trojan horse which opens and listens on a random ...
Trojan-Proxy.Small.BU High Trojan.Proxy.Small.BU connects to remote servers and allows remote users to ...
Trojan-Proxy.Small.CK High Trojan-Proxy.Small.CK is a Trojan horse which opens and listens on a random ...
Trojan-Proxy.Small.CO High Trojan.Proxy.Small.CO is downloaded and installed as part of ...
Trojan-Proxy.Small.CR.8 High Trojan.Proxy.Small.CR.8 attempts to connect to smoke.all.the.marijuanabuds.info ...
Trojan-Proxy.Small.CT High Trojan.Proxy.Small.CT will attempt to connect to the Internet to contact a ...
Trojan-Proxy.Small.DJ High Trojan.Proxy.Small.DJ is a Trojan that attempts to connect to the Internet to ...
Trojan-Proxy.Small.DU High Trojan.Proxy.Small.DU is a Trojan that will steal locally stored email ...
Trojan-Proxy.Small.DV High Trojan.Proxy.Small.DV opens a proxy server on TCP port 1030 which allows remote ...
Trojan-Proxy.Small.EM High Trojan.Proxy.Small.EM is a proxy trojan which will allow an attacker to use the ...
Trojan-Proxy.SRSHost High Trojan.Proxy.SRSHost is a SOCKS proxy server which runs over a randomly ...
Trojan-Proxy.Steredir High Trojan-Proxy.Steredir is a malicious trojan that starts a proxy server and ...
Trojan-Proxy.Symbab High Trojan-Proxy.Symbab is a malicious trojan that starts a proxy server and allows ...
Trojan-Proxy.VB.I High Trojan-Proxy.VB.I opens port to allow hackers to gain full access to infected ...

Page 1 ... Page 173 | Page 174 | Page 175 | Page 176 | Page 177 | Page 178 | Page 179 | Page 180 | Page 181 ... Page 222

Go to another page: MRC Home, Infection Database, Threat Levels, Glossary, Malware Dispute Form, Submit Spyware