Infection Database

These pages list all available infections that Spyware Doctor is capable of removing. Infections are presented by name, level of threat and a brief description and have been organised in alphabetical order by name.

On this page you can:

  • Browse through the infections by page or first letter.
  • Search for a specific infection using the Search field.
  • Click on an infection in the list below to view further details on a specific infection

Browse infections beginning with

All Infections | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Displaying infections 9951-10000 of 11067 found.

Page 1 ... Page 196 | Page 197 | Page 198 | Page 199 | Page 200 | Page 201 | Page 202 | Page 203 | Page 204 ... Page 222

Name Threat Level Description
Trojan-Spy.VB.AWX High Trojan-Spy.VB.AWX is a trojan which will capture all keystrokes from users and ...
Trojan-Spy.VB.CR High Trojan-Spy.VB.CR is a trojan that collects information by monitoring user ...
Trojan-Spy.VB.EK High Trojan-Spy.VB.EK steals information gathered from your computer and sends it to ...
Trojan-Spy.VB.EY High Trojan-Spy.VB.EY steals information gathered from your computer and sends it to ...
Trojan-Spy.VB.FF High Trojan-Spy.VB.FF steals information gathered from your computer and sends it to ...
Trojan-Spy.VB.FX High Trojan-Spy.VB.FX is a trojan that attempts to collect information by collected ...
Trojan-Spy.VB.GG High Trojan.Spy.VB.GG steals information gathered from your computer and sends it to ...
Trojan-Spy.VB.GT High Trojan-Spy.VB.GT is a threat that monitors all user activities and logs them ...
Trojan-Spy.VB.HJ High Trojan.Spy.VB.HJ logs keystrokes and send them to the attacker via email. ...
Trojan-Spy.VB.HK High Trojan-Spy.VB.HK is a threat that tries to monitor user activities related to ...
Trojan-Spy.VB.HXE High Trojan-Spy.VB.HXE is a threat that affects system by logging information such ...
Trojan-Spy.VB.HY High Trojan-Spy.VB.HY is a threat that tries to monitor user activities related to ...
Trojan-Spy.VB.IV High Trojan-Spy.VB.IV is a trojan that collects information by monitoring user ...
Trojan-Spy.VB.JB High Trojan-Spy.VB.JB is a trojan which will capture all keystrokes from users and ...
Trojan-Spy.VB.JF High Trojan-Spy.VB.JF is a threat that tries to monitor user activities related to ...
Trojan-Spy.VB.JR High Trojan-Spy.VB.JR capture all keystrokes from infected machine and then send ...
Trojan-Spy.VB.KA High Trojan-Spy.VB.KA steals information gathered from your computer and sends it to ...
Trojan-Spy.VB.KC High Trojan-Spy.VB.KC is a trojan that monitors user activities and has capabilities ...
Trojan-Spy.VB.KE High Trojan-Spy.VB.KE steals information gathered from your computer and sends it to ...
Trojan-Spy.VB.KJ High Trojan-Spy.VB.KJ attempts to create backdoors and allows an attacker ...
Trojan-Spy.VB.MS High Trojan-Spy.VB.MS steals information gathered from your computer and sends it to ...
Trojan-Spy.VB.NB High Trojan.Spy.VB.NB is a trojan which will capture all keystrokes from users and ...
Trojan-Spy.VB.OI High Trojan-Spy.VB.OI steals information gathered from your computer and sends it to ...
Trojan-Spy.VB.PR High Trojan-Spy.VB.PR steals information gathered from your computer and sends it to ...
Trojan-Spy.VB.QF Medium Trojan.Spy.VB.QF tries to download malicious files, searches the URL cache to ...
Trojan-Spy.VB.QL High Trojan-Spy.VB.QL is a trojan which monitors and logs keystrokes without user's ...
Trojan-Spy.VB.W High Trojan-Spy.VB.W attempts to create backdoors and allows an attacker ...
Trojan-Spy.VBS.IEStart Medium Trojan.VBS.IEStart attempts to hijacks users Internet Explorer startpage to ...
Trojan-Spy.VxDemulator High Trojan-Spy.VxDemulator is a malicious application that attempts to steal ...
Trojan-Spy.Webmoner.AB High Trojan.Spy.Webmoner.AB is a trojan that pretends to be a system process and ...
Trojan-Spy.WebMoner.AG High Trojan-Spy.WebMoner.AG is a trojan that tries to steal information from ...
Trojan-Spy.Webmoner.AL High Trojan-Spy.Webmoner.AL is a trojan that tries to steal information from ...
Trojan-Spy.Webmoner.AR High Trojan-Spy.Webmoner.AR is a trojan that pretends to be a system process and ...
Trojan-Spy.Webmoner.CO High Trojan-Spy.Webmoner.CO is a trojan that tries to steal information from ...
Trojan-Spy.Webmoner.FQ High Trojan-Spy.Webmoner.FQ is a trojan which logs keystrokes and steals information ...
Trojan-Spy.Webmoner.FU High Trojan-Spy.Webmoner.FU is a trojan that tries to steal information from ...
Trojan-Spy.Webmoner.GM Medium Trojan-Spy.Webmoner.GM is a trojan that attempts to steal passwords, login ...
Trojan-Spy.Webmoner.I High Trojan-Spy.Webmoner.I is a trojan that tries to steal information from affected ...
Trojan-Spy.Webmoner.J High Trojan-Spy.Webmoner.J is a trojan that tries to steal information from affected ...
Trojan-Spy.Webmoner.S High Trojan-Spy.Webmoner.S is a threat that tries to steal information from ...
Trojan-Spy.Webmoner.X High Trojan-Spy.Webmoner.X is a trojan that tries to steal information from affected ...
Trojan-Spy.Win32.Banker.CIJ High Trojan-Spy.Win32.Banker.CIJ monitors users browsing activities and logs ...
Trojan-Spy.WinFlux High Trojan.Spy.WinFlux is a Trojan which monitors users activities on the computer. ...
Trojan-Spy.Winhawk Medium Trojan-Spy.Winhawk is a malicious application that attempts to steal passwords, ...
Trojan-Spy.Winspy.K High Trojan-Spy.WinSpy.K is a trojan that tries to monitor user activities in hopes ...
Trojan-Spy.WinSpy.U High Trojan-Spy.WinSpy.U is a trojan that attempts to steal important user ...
Trojan-Spy.WinSpy.XD Medium Trojan-Spy.WinSpy.XD is a trojan that tries to monitor user activities in hopes ...
Trojan-Spy.WMForce High Trojan-Spy.WMForce is a malicious application that attempts to steal ...
Trojan-Spy.Wmhack High Trojan-Spy.Wmhack is a trojan that poses as a certain fake application to ...
Trojan-Spy.Wostel.A High Trojan-Spy.Wostel.A is a trojan that attempts to steal valuable information ...

Page 1 ... Page 196 | Page 197 | Page 198 | Page 199 | Page 200 | Page 201 | Page 202 | Page 203 | Page 204 ... Page 222

Go to another page: MRC Home, Infection Database, Threat Levels, Glossary, Malware Dispute Form, Submit Spyware