啟動項目/檔案/命令名稱
程式分類
描述
Device Intelligent Identity Filtering ([path to trojan])
絕對不需要的程式
Detected by Malwarebytes as Trojan.Downloader.RND - see an example here
Disk Shadow Brightness Firewall Socket Detection ([path to trojan])
絕對不需要的程式
Detected by Malwarebytes as Trojan.Agent.RND - see an example here
DDriver ([path to svchost.exe])
絕對不需要的程式
Detected by Malwarebytes as Trojan.Agent.E.Generic. Note - this is not the legitimate svchost.exe process which is always located in %System%
Diagnostic Manager ([path to trojan])
絕對不需要的程式
Detected by Sophos as Troj/Agent-JPS and by Malwarebytes as Trojan.Downloader
DJASID ([path to trojan])
絕對不需要的程式
Detected by Malwarebytes as Trojan.Agent.SSP - see an example here
dfopdjgja ([path to trojan])
絕對不需要的程式
Detected by Dr.Web as Trojan.DownLoader11.33509 and by Malwarebytes as Trojan.Banker.E - see an example here
DFScreenS ([path to trojan])
絕對不需要的程式
Detected by Dr.Web as Trojan.MulDrop5.8532 and by Malwarebytes as Trojan.Agent.E
DCOM Class Sharing BitLocker Tunneling Mapper ([path to trojan])
絕對不需要的程式
Detected by Malwarebytes as Trojan.Downloader.RND
DCOM PNP-X Center Human COM Resource Program ([path to trojan])
絕對不需要的程式
Detected by Malwarebytes as Trojan.Agent.RND
DeamonDisk ([path to trojan])
絕對不需要的程式
Detected by Dr.Web as Trojan.DownLoader5.63227 and by Malwarebytes as Trojan.Agent
DATABASE MySql ([path] repcale.exe [path] beird.exe)
絕對不需要的程式
Detected by Sophos as W32/Randon-AL. Both files are often located in %System%\qsws