首頁 » 絕對不需要的程式 » C (第 82 頁)

按照字母順序瀏覽[絕對不需要的程式]:


0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
啟動項目/檔案/命令名稱
程式分類
描述
Cool ([random].exe)
絕對不需要的程式
Detected by Malwarebytes as Trojan.Injector.E. The file is located in %AppData%
ChromeSettingsStart3264 ([random].exe)
絕對不需要的程式
Detected by Symantec as Trojan.Cryptolocker.AE and by Malwarebytes as Ransom.Agent
cVZqldpe ([random].exe)
絕對不需要的程式
Detected by Malwarebytes as Ransom.Agent.E. Note - this entry loads from the Windows Startup folder and the file is located in %AppData%
CNN News Ticker ([random].exe)
絕對不需要的程式
Detected by Malwarebytes as Trojan.Neurevt.Generic. The file is located in %CommonAppData%\CNN News Ticker
crypto13 ([random].exe)
絕對不需要的程式
Detected by Symantec as Trojan.Cryptolocker.N and by Malwarebytes as Trojan.FileCoder
Cryptographic Service ([random].exe)
絕對不需要的程式
Detected by Symantec as W32.Korgo.W and by Malwarebytes as Backdoor.Bot
ctfmon32 ([random].exe)
絕對不需要的程式
Detected by Sophos as W32/Rbot-GSN
CertificatesCheck ([random].exe)
絕對不需要的程式
Detected by Malwarebytes as Ransom.FileCryptor.E. The file is located in %AppData%\Microsoft\SystemCertificates\My\Certificates
chickenkiller ([random].exe)
絕對不需要的程式
Detected by Malwarebytes as Trojan.Agent.CHK. The file is located in %CommonAppData%
CreativeAudio ([random].exe)
絕對不需要的程式
Detected by Malwarebytes as Backdoor.Bot. The file is located in %CommonAppData%\Creative Audio
Classes ([random].exe)
絕對不需要的程式
Detected by Malwarebytes as Backdoor.Agent. Note - this entry loads from the HKCU\Policies\Explorer\Run key and the file is typically located in %AppData% or a sub-folder
crashDump ([trojan filename].exe)
絕對不需要的程式
Detected by Trend Micro as TROJ_DROPPER.EAT. The file is located in %LocalAppData% - see the link for the list of potential filenames
ctfmon ([trojan filename])
絕對不需要的程式
Detected by Malwarebytes as Trojan.Agent.Gen. The file is located in %Root%\Temp or a sub-folder
clock ([various filenames])
絕對不需要的程式
Detected by Symantec as Adware.Livechat - known file names include mssetup.exe, w32tm.exe, sptsupd.exe, autolfn.exe, mshta.exe, osk.exe, msswchx.exe and netdde.exe. The file is located in %Windir%
coolwebprogram ([various filenames])
絕對不需要的程式
CoolWebSearch Smartsearch parasite variant. Typical filenames include internet.exe, systeem.exe, explore.exe and directx.exe. Detected by Microsoft as Trojan:Win32/Goweh.E
CRSDT (~svhost.exe)
絕對不需要的程式
Detected by McAfee as RDN/Generic.tfr!eh and by Malwarebytes as Trojan.Agent.CRS
Compliant ([worm filename])
絕對不需要的程式
Detected by Sophos as W32/Rbot-LB
Config Loader ([worm filename])
絕對不需要的程式
Detected by Sophos as W32/Agobot-AE
CyberDefender Early Detection Center (_cdas[random].exe)
絕對不需要的程式
CyberDefender Early Detection Center rogue security software - not recommended. On testing with a clean image, this reported registry entries pointing to the legitimate Java "jqs_plugin.dll" file (located in %ProgramFiles%\Java\jre6\lib\deploy\jqs\ie as the Anticlear rogue (see an example here). In addition, it claimed that the installer for an older version of HashTab contained W32.MalwareF.KJAE and quarantined a valid 7-zip file ("7zCon.sfx" in %ProgramFiles%\7-Zip) as W32/Malware. Also read this post where a Tech Support person uses other free tools such as MBAM to fix a problem
CryptoLocker ({GUID}.exe)
絕對不需要的程式
CryptoLocker Ransomware - removal instructions here. Detected by Malwarebytes as Trojan.Ransom. The file is located in %AppData%