按照字母順序瀏覽[絕對不需要的程式]:


0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
啟動項目/檔案/命令名稱
程式分類
描述
(Default) (%ProgramFiles%:Server.exe)
絕對不需要的程式
Detected by Malwarebytes as Trojan.Agent.ADS. Note - this malware actually changes the value data of the "(Default)" key in HKLM\Run in order to force Windows to launch it at boot. The name field in MSConfig may be blank and the target is a Windows Alternate Data Stream (ADS)
 pola.exe ( pola.exe)
絕對不需要的程式
Detected by McAfee as RDN/Generic Downloader.x!hn and by Malwarebytes as Backdoor.Agent.DCE
$sys$crash ($sys$sonyTimer.exe)
絕對不需要的程式
Detected by Symantec as Trojan.Welomoch
%svchost%.exe (%svchost%.exe)
絕對不需要的程式
Detected by McAfee as RDN/Generic.tfr!dn and by Malwarebytes as Trojan.MSIL. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows starts
 WUAUCLT_UPDATE ( wuauclt.exe)
絕對不需要的程式
Detected by McAfee as RDN/Ransom and by Malwarebytes as Backdoor.Agent.E. Note the space at the beginning of the "Startup Item" and "Command" fields
$sys$momomomochin ($sys$sonyTimer.exe)
絕對不需要的程式
Detected by Symantec as Trojan.Welomoch
11 (%System%:11.exe)
絕對不需要的程式
Detected by Malwarebytes as Trojan.Agent. Note that the target is a Windows Alternate Data Stream (ADS)
íàïîìèíàíèå.txt (íàïîìèíàíèå.txt)
絕對不需要的程式
Detected by Malwarebytes as Trojan.Agent. The file is located in %UserStartup% and its presence there ensures it runs when Windows starts
$sys$umaiyo ($sys$sonyTimer.exe)
絕對不需要的程式
Detected by Symantec as Trojan.Welomoch
‘AdwarePro’ (‘AdwarePro’.exe)
絕對不需要的程式
AdWarePro rogue security software - not recommended
$sys$crash ($sys$sos$sys$.exe)
絕對不需要的程式
Detected by Symantec as Trojan.Welomoch
! My Image.scr (! My Image.scr)
絕對不需要的程式
Detected by Dr.Web as Win32.HLLW.Autoruner2.2804 and by Malwarebytes as Trojan.Agent.AI. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows starts
$sys$momomomochin ($sys$sos$sys$.exe)
絕對不需要的程式
Detected by Symantec as Trojan.Welomoch
.NET. (-NET-SERVICES-.exe)
絕對不需要的程式
Detected by Dr.Web as Trojan.MulDrop3.8518 and by Malwarebytes as Trojan.Agent
[6 characters] (!satana!.txt)
絕對不需要的程式
Detected by Malwarebytes as Ransom.Satana. The file is located in %UserTemp%
$sys$umaiyo ($sys$sos$sys$.exe)
絕對不需要的程式
Detected by Symantec as Trojan.Welomoch
@Crack Magebot (.exe)
絕對不需要的程式
Detected by McAfee as Generic BackDoor and by Malwarebytes as Backdoor.XTRat.E
####.vbs (####.vbs)
絕對不需要的程式
Detected by Malwarebytes as Trojan.Agent.VBS.Generic - where # represents a digit. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows starts
$sys$crash ($sys$WeLoveMcCOL.exe)
絕對不需要的程式
Detected by Symantec as Trojan.Welomoch
(Default) (.exe)
絕對不需要的程式
Detected by Malwarebytes as Trojan.Agent. Note - this malware actually changes the value data of the "(Default)" key in HKLM\Run and HKCU\Run in order to force Windows to launch it at boot. The name field in MSConfig may be blank and the file is located in %AppData%