Infection Database

These pages list all available infections that Spyware Doctor is capable of removing. Infections are presented by name, level of threat and a brief description and have been organised in alphabetical order by name.

On this page you can:

  • Browse through the infections by page or first letter.
  • Search for a specific infection using the Search field.
  • Click on an infection in the list below to view further details on a specific infection

Browse infections beginning with

All Infections | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Displaying infections 9901-9950 of 11067 found.

Page 1 ... Page 195 | Page 196 | Page 197 | Page 198 | Page 199 | Page 200 | Page 201 | Page 202 | Page 203 ... Page 222

Name Threat Level Description
Trojan-Spy.Pophot.WX High Trojan-Spy.Pophot.WX is a malicious application that attempts to steal ...
Trojan-Spy.PSpy High Trojan-Spy.PSpy is a malicious application that logs keystrokes and attempts to ...
Trojan-Spy.Qeds High Trojan-Spy.Qeds is a malicious application that logs keystrokes and attempts to ...
Trojan-Spy.QuickPass High Trojan-Spy.QuickPass is a malicious application that logs keystrokes and ...
Trojan-Spy.Qukart High Trojan.Spy.Qukart.C is a trojan which will attempt to steal password on the ...
Trojan-Spy.Ransom.A High Trojan.Spy.Random.A is a trojan which scatters or hides files on the ...
Trojan-Spy.Ransom.VB.A High Trojan-Spy.Ransom.VB.A on execution encrypts some files on the infected ...
Trojan-Spy.Recodat High Trojan-Spy.Recodat logs all keystrokes to a file and sends it to attacker. It ...
Trojan-Spy.Rion High Trojan-Spy.Rion steals password and other confidential information and sends ...
Trojan-Spy.Rockfi High Trojan-Spy.Rockfi is a threat downloaded by Trojan-Downloader.Rockfi that drops ...
Trojan-Spy.RtR Medium Trojan-Spy.RtR logs keystrokes and collects personal information from the users ...
Trojan-Spy.Ruby.Kakkeys High Trojan.Spy.Ruby.Kakkeys is a trojan which logs keystrokes and steals ...
Trojan-Spy.Satur High Trojan.Spy.Satur is a keylogger that will capture all keystrokes made on an ...
Trojan-Spy.Sels Elevated Trojan-Spy.Sels is a malicious application that attempts to steal passwords, ...
Trojan-Spy.SendWM Medium Trojan.Spy.SendWM will attempt to monitor and log keystrokes in order to steal ...
Trojan-Spy.Silentbanker High Trojan.Silentbanker uses randomly-generated and system-related filenames in ...
Trojan-Spy.Sincom High Trojan-Spy.Sincom attempts to steal sensitive information such as usernames and ...
Trojan-Spy.Sisie High Trojan.Spy.Sisie will monitor the internet activities on an infected system ...
Trojan-Spy.Small High Trojan.Spy.Small establish connection to the Internet through random ports to ...
Trojan-Spy.Small.AC High Trojan-Spy.Small.AC is a trojan spyware that tries to steal certain information ...
Trojan-Spy.Small.AD High Trojan-Spy.Small.AD establishes a connection to the Internet to monitor user ...
Trojan-Spy.Small.AS High Trojan-Spy.Small.AS establishes a connection to the Internet to monitor user ...
Trojan-Spy.Small.BSK High Trojan-Spy.Small.BSK is a trojan which captures all keystrokes on the infected ...
Trojan-Spy.Small.BSZ High Trojan-Spy.Small.BSZ is a trojan which captures all keystrokes on the infected ...
Trojan-Spy.Small.BY High Trojan-Spy.Small.BY is a trojan which will capture all keystrokes from users ...
Trojan-Spy.Small.CQ High Trojan-Spy.Small.CQ is a trojan that tries to monitor user activities and logs ...
Trojan-Spy.Small.EK High Trojan-Spy.Small.EK is a trojan which will capture all keystrokes from users ...
Trojan-Spy.Small.FN High Trojan-Spy.Small.FN is a trojan which will capture all keystrokes from users ...
Trojan-Spy.Small.FP High Trojan-Spy.Small.FP is a trojan which will capture all keystrokes from users ...
Trojan-Spy.Small.GE High Trojan-Spy.Small.GE is a trojan which will capture all keystrokes from users ...
Trojan-Spy.Small.K High Trojan-Spy.Small.K is a trojan spyware that tries to steal certain information ...
Trojan-Spy.Small.N High Trojan-Spy.Small.N is a trojan spyware that tries to steal certain information ...
Trojan-Spy.Speil High Trojan-Spy.Speil is a trojan that will log user activity and information onto a ...
Trojan-Spy.SpyAnyTime.C High Trojan-Spy.SpyAnyTime.C is a trojan that deceives the user that it is the ...
Trojan-Spy.Spybox High Trojan-Spy.Spybox is trojan that tries to monitors user activities in hopes to ...
Trojan-Spy.Sters.AE High Trojan-Spy.Sters.AE is trojan file that tries to monitor user activities in ...
Trojan-Spy.Sters.C High Trojan-Spy.Sters.C is a trojan that tries to monitor user activities and logs ...
Trojan-Spy.Sters.I High Trojan-Spy.Sters.I is a trojan that tries to monitor user activities and logs ...
Trojan-Spy.Sters.U High Trojan-Spy.Sters.U is a trojan that tries to monitor user activities and logs ...
Trojan-Spy.Suyi High Trojan-Spy.Suyi is a threat that tries to monitor user activities related to ...
Trojan-Spy.TheRat High Trojan-Spy.TheRat steals sensitive information and send the stolen information ...
Trojan-Spy.Tigr High Trojan-Spy.Tigr is a trojan that attempts to steal passwords from users of the ...
Trojan-Spy.Tiny High Trojan-Spy.Tiny hides in the background without user knowledge and records ...
Trojan-Spy.Tofger High Trojan-Spy.Tofger is a trojan that tries to obtain certain information from ...
Trojan-Spy.Tofger.AU High Trojan-Spy.Tofger.AU is a Trojan that will allow unauthorized access to the ...
Trojan-Spy.Turtuk High Trojan-Spy.Turtuk is a malicious application that attempts to steal passwords, ...
Trojan-Spy.UltimSpy High Trojan-Spy.UltimSpy is a malicious application that attempts to steal ...
Trojan-Spy.Vagon.A High Trojan.Spy.Vagon.A is a Trojan which will give hackers access to an infected ...
Trojan-Spy.VB High Trojan-Spy.VB is a trojan which will capture all keystrokes from users and then ...
Trojan-Spy.VB.AF High Trojan.Spy.VB.AF drops other spying malware, such as SpyAnyTime Keylogger and ...

Page 1 ... Page 195 | Page 196 | Page 197 | Page 198 | Page 199 | Page 200 | Page 201 | Page 202 | Page 203 ... Page 222

Go to another page: MRC Home, Infection Database, Threat Levels, Glossary, Malware Dispute Form, Submit Spyware