啟動項目/檔案/命令名稱
程式分類
描述
[UserName] ([UserName]-PC.exe)
絕對不需要的程式
Detected by Malwarebytes as Trojan.Banker. The file is located in %AppData%\[UserName]-HOST
[UserName] ([UserName].exe)
絕對不需要的程式
Detected by Malwarebytes as Trojan.LVBP. The file is located in %UserProfile%
[UserName]-PC ([UserName].exe)
絕對不需要的程式
Detected by Malwarebytes as Trojan.Agent.DMAGen. The file is located in %AppData%
[user]NV1 ([user]-SysPluginv*.exe)
絕對不需要的程式
Detected by Malwarebytes as Trojan.Agent.Gen. The file is located in %AppData%\Microsoft\[user]
[user]NV[random] ([user]SysPluginv*.exe)
絕對不需要的程式
Detected by Malwarebytes as Spyware.Banker. The file is located in %AppData%\[user]
[user]NV7R1 ([user]SysPluginv*.exe)
絕對不需要的程式
Detected by Malwarebytes as Trojan.Delf. The file is located in %AppData%\[user]
[random numbers] ([user][random numbers]svhost.exe)
絕對不需要的程式
Detected by Malwarebytes as Trojan.Agent.USV. The file is located in %Root%\Users (10/8/7/Vista) or %Root%\Documents and Settings (XP)
[virus name].exe ([virus name].exe)
絕對不需要的程式
Detected by Dr.Web as Trojan.AVKill.3582 and by Malwarebytes as Backdoor.StormSyn.Gen. The file is located in %AppData%\Sysutils_Update - see examples here and here
[Windows username].exe ([Windows username].exe)
絕對不需要的程式
Detected by Malwarebytes as Backdoor.Agent . Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows starts
[various names] (_ctcp.exe)
絕對不需要的程式
Fake startup entry created by the Wareout rogue spyware and dialer remover - not recommended, removal instructions here. Archived version of Andrew Clover's original page
_ZZZZAdobe Flash Accelearator (_E39msnmsgrskypess.exe)
絕對不需要的程式
Detected by Malwarebytes as Worm.Agent.ZZZH. The file is located in %AppData%\Microsoft\_ZZZZCertifiededd
_mzu_stonedrv7 (_mzu_stonedrv7.exe)
絕對不需要的程式
Added by a variant of Troj/DwnLdr-FTB. The file is located in %System%
_mzu_stonedrv8 (_mzu_stonedrv8.exe)
絕對不需要的程式
Detected by Super Ad Blocker as Trojan.Downloader-MZU. The file is located in %System%