首頁 » 絕對不需要的程式 » 0-9 (第 2 頁)

按照字母順序瀏覽[絕對不需要的程式]:


0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
啟動項目/檔案/命令名稱
程式分類
描述
@Crack Magebot (.exe)
絕對不需要的程式
Detected by McAfee as Generic BackDoor and by Malwarebytes as Backdoor.XTRat.E
####.vbs (####.vbs)
絕對不需要的程式
Detected by Malwarebytes as Trojan.Agent.VBS.Generic - where # represents a digit. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows starts
$sys$crash ($sys$WeLoveMcCOL.exe)
絕對不需要的程式
Detected by Symantec as Trojan.Welomoch
(Default) (.exe)
絕對不需要的程式
Detected by Malwarebytes as Trojan.Agent. Note - this malware actually changes the value data of the "(Default)" key in HKLM\Run and HKCU\Run in order to force Windows to launch it at boot. The name field in MSConfig may be blank and the file is located in %AppData%
# (#.exe)
絕對不需要的程式
Detected by Malwarebytes as Trojan.Agent.DGGen - where # represents a digit. The file is located in a %AppData%\Windows - see an example here
$sys$momomomochin ($sys$WeLoveMcCOL.exe)
絕對不需要的程式
Detected by Symantec as Trojan.Welomoch
.exe (.exe)
絕對不需要的程式
Detected by Malwarebytes as Trojan.Agent. The file is located in %AppData%
#.vbs (#.vbs)
絕對不需要的程式
Detected by Malwarebytes as Trojan.Agent.VBS - where # represents a digit. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows starts
$sys$umaiyo ($sys$WeLoveMcCOL.exe)
絕對不需要的程式
Detected by Symantec as Trojan.Welomoch
%Temp%\delwdef2008.bat (%Temp%\delwdef2008.bat)
絕對不需要的程式
WinDefender 2008 rogue privacy program - not recommended, removal instructions here
000ihh000 (000usrs000.pif)
絕對不需要的程式
Detected by Dr.Web as Trojan.MulDrop4.26046 and by Malwarebytes as Trojan.Agent.PFE
12341234@@ (12341234@@.exe)
絕對不需要的程式
Detected by McAfee as RDN/Generic PWS.y!ti and by Malwarebytes as Backdoor.Agent.RSA
3OZNVRSG6X8B0 (05GKMUQPILL0.exe)
絕對不需要的程式
Detected by McAfee as RDN/Generic Dropper!sq and by Malwarebytes as Trojan.Agent.E
[various names] (10010.exe)
絕對不需要的程式
Fake startup entry created by the Wareout rogue spyware and dialer remover - not recommended, removal instructions here. Archived version of Andrew Clover's original page
0027c24170fe7ac53f44da6d5ca60bb1.exe (0027c24170fe7ac53f44da6d5ca60bb1.exe)
絕對不需要的程式
Detected by Malwarebytes as Trojan.MSIL. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows starts
0fficekey.exe (0fficekey.exe)
絕對不需要的程式
Detected by Malwarebytes as Trojan.Agent. The file is located in %AppData%\Microsoft
082094b0627eab42aff3a5cb0627aaeb.exe (082094b0627eab42aff3a5cb0627aaeb.exe)
絕對不需要的程式
Detected by McAfee as RDN/Generic.tfr!t and by Malwarebytes as Trojan.Agent. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows starts
111111 (111111.EXE)
絕對不需要的程式
Detected by Malwarebytes as Trojan.Backdoor.CDR. The file is located in %Windir%
004fb0d5f18058896ceb5f3c108cf7c4.exe (004fb0d5f18058896ceb5f3c108cf7c4.exe)
絕對不需要的程式
Detected by Malwarebytes as Trojan.MSIL. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows starts
0lOMDnxDT1B.exe (0lOMDnxDT1B.exe)
絕對不需要的程式
Detected by McAfee as RDN/Generic Dropper!rf and by Malwarebytes as Trojan.Agent.RNS