首頁 » 絕對不需要的程式 » E (第 2 頁)

按照字母順序瀏覽[絕對不需要的程式]:


0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
啟動項目/檔案/命令名稱
程式分類
描述
Eac_Cnry (canary.exe)
絕對不需要的程式
Detected by Kaspersky as Trojan-Downloader.Win32.Wren.m
Essancial (calc.exe)
絕對不需要的程式
Detected by Malwarebytes as Hijack.Shell.Gen. Note - this is not the legitimate Windows calculator file of the same name which is located in %System%. This one is located in %AppData%\calc
exkataj (cbkdkiw.exe)
絕對不需要的程式
Detected by Sophos as W32/Fanbot-F
ExploreDLL (ChromeDll.exe)
絕對不需要的程式
Detected by Dr.Web as Trojan.DownLoader12.25355 and by Malwarebytes as Trojan.Downloader.DLL
explor (chrome.exe)
絕對不需要的程式
Detected by Malwarebytes as Trojan.Downloader.E. Note - this entry loads from the Windows Startup folder, The file is located in %MyDocuments% and is not the legitimate Google Chrome browser which is normally located in %ProgramFiles%\Google\Chrome\Application
Explorer (Chome.exe)
絕對不需要的程式
Detected by McAfee as RDN/Generic.bfr!hi and by Malwarebytes as Trojan.Agent
eixfi (china.bat)
絕對不需要的程式
Detected by Trend Micro as BAT_WCUP.A
error report checker (ckvpr.exe)
絕對不需要的程式
Detected by McAfee as RDN/Generic Downloader.x
ecko (claro.exe)
絕對不需要的程式
Detected by Sophos as Troj/Dloadr-AQJ
Ethernet Driver (cmsrrs.exe)
絕對不需要的程式
Added by a variant of Backdoor:Win32/Rbot. The file is located in %System%
e (cmd.exe)
絕對不需要的程式
Detected by Dr.Web as Trojan.DownLoader6.3470. Note - this is not the legitimate cmd.exe process which is always located in %System%. This one is located in %AppData%\Microsoft\Windows\Start Menu (10/8/7/Vista) or %UserProfile%\Start Menu (XP)
eset (computer.exe)
絕對不需要的程式
Detected by Malwarebytes as Trojan.Crypt. The file is located in %AppData%\pdf
Explorer5 (config_.com)
絕對不需要的程式
Detected by Trend Micro as WORM_VB.CBG
Explorer (config_.com)
絕對不需要的程式
Detected by Sophos as W32/Floppy-D and by Malwarebytes as Trojan.Agent
ExplorerRun (conime.exe)
絕對不需要的程式
Detected by Trend Micro as TROJ_PROXY.ABL and by Malwarebytes as Trojan.Downloader. Note - this is not the legitimate Microsoft Console IME process of the same filename which is located in %System% and is used when an Asian language is used in Windows. This one is located in %UserTemp%
explirer (crack Internet Download Manager.exe)
絕對不需要的程式
Detected by Dr.Web as Trojan.Siggen6.25813 and by Malwarebytes as Backdoor.Agent.IXP
Explorer.exe (csrss.exe)
絕對不需要的程式
Detected by Sophos as W32/Juego-B and by Malwarebytes as Trojan.Agent. Note - this is not the legitimate csrss.exe process which is always located in %System%. This one is located in %AppData%\Microsoft
ethernet adapter (csrmss.exe)
絕對不需要的程式
Added by a variant of Backdoor:Win32/Rbot. The file is located in %System%
Execution Control Services (csrss32.exe)
絕對不需要的程式
Detected by Malwarebytes as Trojan.Agent.CSR. The file is located in %ProgramFiles%\Windows Service
Especial (Deneca.bat)
絕對不需要的程式
Detected by Symantec as W97M.Deluz