DATABASE OF Trojans PARASITES

Total Trojans parasites in our DB: 2035


# | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

    11
    1
    t
  • Tobfy virus July 2nd, 2014 | No Comments
    Tobfy virus is a malicious trojan horse, which is used to spread cyber threats that belong to 'ransomware' cat...

  • Trojan.Agent January 22nd, 2014 | 13 Comments
    Trojan.Agent is a malicious trojan horse, which can be used for various fraudulent activities. As soon as it i...

  • Trojan:JS/Febipos.A November 15th, 2013 | No Comments
    Trojan:JS/Febipos.A is a malicious trojan horse, which is used to hijack Facebook profiles. When this virus is...

  • Trojan.Coinliteminer June 18th, 2013 | No Comments
    Trojan.Coinliteminer is an extremely dangerous trojan horse, which is mostly used for mining Litecoins. That&n...

  • Trojan.Botime June 18th, 2013 | No Comments
    Trojan.Botime is a Trojan horse, which is used by cyber criminals for downloading malicious files onto its tar...

  • Trojan.agent.cn December 13th, 2012 | No Comments
    Trojan.agent.cn is a dangerous virus, which belongs to the category of 'trojan horses'. Such viruses are used ...

  • Trojan.Reveton.O December 12th, 2012 | No Comments
    Trojan.Reveton.O is a Trojan horse, which attacks unprotected computers and Windows systems running on them. T...

  • Trojan.Winlock.7372 December 1st, 2012 | No Comments
    Trojan.Winlock.7372 is a trojan horse, which blocks the entire computer's system and downloads ransomware viru...

  • Trojan.Ransomlock.R October 1st, 2012 | No Comments
    Trojan.Ransomlock.R is malicious trojan horse that is used to lock computers down and disable users from getti...

  • Trojan.Chaspin.A September 27th, 2012 | No Comments
    Trojan.Chaspin.A is a trojan horse, which should never be ignored and kept on the system. If you letthis virus...

  • Trojan.LockScreen September 22nd, 2012 | No Comments
    Trojan.LockScreen is an especially dangerous cyber threat that helps for ransomware infections to come inside ...

  • Trojan.Sirefef.HH September 14th, 2012 | No Comments
    Trojan.Sirefef.HH is malicious Trojan horse from a Sirefef family, which has already managed to infect thousan...

  • Trojan:win64/sirefef/AF September 14th, 2012 | No Comments
    Trojan:win64/sirefef/AF is a trojan horse that belongs to a dangerous multi-component family called Sirefef. T...

  • Trojan.Zeroaccess September 14th, 2012 | 3 Comments
    Trojan.ZeroAccess is a Trojan horse that hides itself in the system with the help of the advanced ZeroAccess...

  • Trojan.ZeroAccess.ee September 14th, 2012 | No Comments
    Trojan.ZeroAccess.ee is a malicious trojan, which hails from the especially harmful ZeroAccess rootkit family....

  • Trojan.Zeroaccess!inf8 September 2nd, 2012 | No Comments
    Trojan.Zeroaccess!inf8 is a Trojan horse that belongs to extremely malicious Trojan.Zeroaccess. This infection...

  • Trojan.Maljava!Gen24 August 30th, 2012 | No Comments
    Trojan.Maljava!Gen24 is the latest Java exploit that belongs to Trojan.Maljava family. It was noticed in Augus...

  • Trojan.Zeroaccess!g13 August 27th, 2012 | No Comments
    Trojan.Zeroaccess!g13 is a dangerous Trojan infection which is associated with Trojan.Zeroaccess. This th...

  • Trojan.Zeroaccess!g12 August 27th, 2012 | 1 Comments
    Trojan.Zeroaccess!g12 is a trojan horse that belongs to Trojan.Zeroaccess family. It's really hard to notice t...

  • TR/Rootkit.Gen2 August 27th, 2012 | No Comments
    TR/Rootkit.Gen2 is a trojan horse infection that is connected to Sirefef group of threats. This nasty virus is...

1 | | 3 | 4 | 5 | 6 | 7 | 8 | 9 | NEXT

Additional resources related to Trojans:

Attention: If you know or you have a website or page about Trojans removal, feel free to add a link to this list: add url


more resources
Like us on Facebook
News
Subscribe
Ask us
Parasites
Tags
Files
What's your antispyware?
Compare
add text box
rss feed
help other
Spreading the knowledge: It is very hard to fight against computer parasites on the Internet alone. If you have a website, we would be more than happy if you would like to cooperate and help us spread the information about latest threats. Remember, knowledge is the most powerful weapon. Help your visitors protect their computers!