首頁 » 絕對不需要的程式

按照字母順序瀏覽[絕對不需要的程式]:


0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
啟動項目/檔案/命令名稱
程式分類
描述
loginServer (.Doc)
絕對不需要的程式
Detected by Malwarebytes as Backdoor.Agent.DCO. The file is located in %AppData%
win32 (%System%:taskk.exe)
絕對不需要的程式
Detected by Kaspersky as Backdoor.Win32.Rbot.kts and by Malwarebytes as Backdoor.Agent.Gen. Note that the target is a Windows Alternate Data Stream (ADS)
sInErA (\.exe)
絕對不需要的程式
Detected by Sophos as W32/SillyFDC-AB. Note the space at the beginning of the filename
Windows Services (#adobeair.exe)
絕對不需要的程式
Detected by Sophos as Troj/VB-FHF and by Malwarebytes as Backdoor.Bot
sdsd (.exe)
絕對不需要的程式
Detected by McAfee as RDN/Ransom and by Malwarebytes as Trojan.Agent.XX
Alternativo (%Windir%Updatex.exe)
絕對不需要的程式
Detected by Dr.Web as Trojan.FakeAV.14091 and by Malwarebytes as Trojan.Banker
Microsoft Windows Update XP64 (********.exe)
絕對不需要的程式
Detected by Malwarebytes as Trojan.MWF.Gen - where * represents a random character. The file is located in %System%
$sys$umaiyo ($sys$sos$sys$.exe)
絕對不需要的程式
Detected by Symantec as Trojan.Welomoch
Minecon Cape Link Generator (.exe)
絕對不需要的程式
Detected by McAfee as RDN/Generic.bfr and by Malwarebytes as Backdoor.Agent.DCE
svchost ( svchost.exe)
絕對不需要的程式
Detected by Malwarebytes as Backdoor.Bot.E. Note - this is not the legitimate svchost.exe process which is always located in %System%. This one is also located in %System% but has a space at the beginning of the filename
WinSysQQ (##QQ.exe)
絕對不需要的程式
Detected by Malwarebytes as Trojan.Agent.WS - where # represents a digit, see examples here and here
GoogleUpdate (%GoogleUpdate%)
絕對不需要的程式
Detected by McAfee as Downloader.a!bn3
IJ_GGG (.exe)
絕對不需要的程式
Detected by McAfee as RDN/Generic Dropper!sq and by Malwarebytes as Trojan.Agent.RNS
Win.Update (%System%:Win.Update.exe)
絕對不需要的程式
Detected by Kaspersky as Backdoor.Win32.Poison.ldq. Note that the target is a Windows Alternate Data Stream (ADS)
DiagnosticUtility (\.exe)
絕對不需要的程式
Detected by Malwarebytes as Backdoor.Agent.E. The file is located in %AppData%
WinSysW (#L.exe)
絕對不需要的程式
Detected by Malwarebytes as Spyware.OnlineGames - where # represents one or more digits. The file is located in %Windir% - see examples here and here
Microsoft Store (.exe)
絕對不需要的程式
Detected by McAfee as RDN/Generic.bfr and by Malwarebytes as Backdoor.PasswordStealer
SystemWideHook for Windows NT (%WinHook32.exe)
絕對不需要的程式
Detected by Symantec as W32.Mydoom.AC@mm
web (******.exe)
絕對不需要的程式
Added by a variant of Backdoor:Win32/Rbot - where * represents a random character. The file is located in %System%
$sys$crash ($sys$WeLoveMcCOL.exe)
絕對不需要的程式
Detected by Symantec as Trojan.Welomoch