啟動項目/檔案/命令名稱
程式分類
描述
Cryptographic SSDP Controls TP Diagnostic ([path to trojan])
絕對不需要的程式
Detected by Malwarebytes as Trojan.Downloader.RND - see an example here
Cisco Systems ([path to worm])
絕對不需要的程式
Detected by Kaspersky as Worm.Win32.AutoRun.uhr. The file is located in %System%
Certificate BranchCache TCP/IP Net.Tcp PnP-X ([path to trojan])
絕對不需要的程式
Detected by Malwarebytes as Trojan.Agent.RND - see an example here
Certificate Link Session Internet Driver ([path to trojan])
絕對不需要的程式
Detected by Malwarebytes as Trojan.Agent.RND
Configurations Loader ([path to winrtx.exe])
絕對不需要的程式
Detected by McAfee as W32/Gaobot.worm.gen.e and by Malwarebytes as Backdoor.Agent
center ([random name]32.exe)
絕對不需要的程式
Detected by Kaspersky as Email-Worm.Win32.Bofra.c. The file is located in %System%
CCleaner Monitoring ([path] mfhqpzk.exe /c [path] CCleaner64.exe)
絕對不需要的程式
Detected by Malwarebytes as Trojan.Agent.SW. Note - this entry replaces the legitimate CCleaner file "CCleaner64.exe" located in %ProgramFiles%\CCleaner with the file "mfhqpzk.exe" from %AppData%\Microsoft\Mfhqpzk
ChromeSettingsStart3264 ([random].exe)
絕對不需要的程式
Detected by Symantec as Trojan.Cryptolocker.AE and by Malwarebytes as Ransom.Agent
cVZqldpe ([random].exe)
絕對不需要的程式
Detected by Malwarebytes as Ransom.Agent.E. Note - this entry loads from the Windows Startup folder and the file is located in %AppData%