首頁 » 絕對不需要的程式 » I (第 59 頁)

按照字母順序瀏覽[絕對不需要的程式]:


0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
啟動項目/檔案/命令名稱
程式分類
描述
inetsys ([path to trojan])
絕對不需要的程式
Detected by Sophos as Troj/Delf-NV
iexplower ([path to trojan])
絕對不需要的程式
Detected by Microsoft as TrojanDownloader:Win32/Mavradoi.A and by Malwarebytes as Trojan.Agent.RNS
Internal Configuration Serving State ([path to trojan])
絕對不需要的程式
Detected by Malwarebytes as Trojan.Agent - see an example here
Installs SP4 ([path] repcale.exe [path] p0rd.exe)
絕對不需要的程式
Detected by Sophos as W32/Randon-AK. Both files are located in %System%\ekrlgc
Installs SP2 ([path] repcale.exe [path] palsp.exe)
絕對不需要的程式
Added by a variant of the RANDON.AN WORM! Both files are located in %System%\qpalsp
IMJDC1 ([random string])
絕對不需要的程式
Detected by Dr.Web as BackDoor.Paper.43 and by Malwarebytes as Trojan.Agent.Gen - see an example here
ist service uninstall ([random filename])
絕對不需要的程式
ISTBar adware related
Instance 001 ([path to worm])
絕對不需要的程式
Detected by Sophos as W32/Alasrou-A
ICQ Center ([path to worm])
絕對不需要的程式
Detected by Symantec as W32.Randin
Imsoft ([trojan filename].exe)
絕對不需要的程式
Detected by Malwarebytes as Trojan.Agent.E. The file is located in %LocalAppData%\Imsoft
iexplorer ([random].exe)
絕對不需要的程式
Detected by Malwarebytes as Trojan.Agent. The file is located in %LocalAppData%\Microsoft\Windows\INetCache\[random] (Win10/8) or %LocalAppData%\Microsoft\Windows\Temporary Internet Files\[random] (Win7) or %UserProfile%\Local Settings\Temporary Internet Files\[random] (XP)
Intenium ([random].exe)
絕對不需要的程式
Detected by Malwarebytes as Trojan.Agent. Note - this entry loads from the HKCU\Policies\Explorer\Run key and the file is typically located in %AppData% or a sub-folder
Intel(R) Comom Inteface ([random].exe)
絕對不需要的程式
Detected by Malwarebytes as Trojan.Banker. The file is located in %ProgramFiles%\[random]
InstagramBots ([random].exe)
絕對不需要的程式
Detected by Malwarebytes as Trojan.Agent.IGB. The file is located in %AppData%
IEAgent update check ([trojan filename])
絕對不需要的程式
Detected by Symantec as Trojan.Bomka
ICompXpSp ([trojan filename])
絕對不需要的程式
Detected by Sophos as Troj/Bancos-BLX and by Malwarebytes as Trojan.Banker. The file is located in %Root%
Internal ([trojan filename])
絕對不需要的程式
Detected by Symantec as Backdoor.Smother
Internat ([trojan filename])
絕對不需要的程式
Detected by Sophos as Troj/CmjSpy-Y
init ([trojan filename].exe)
絕對不需要的程式
Detected by Trend Micro as TROJ_DROPPER.EAT. The file is located in %LocalAppData% - see the link for the list of potential filenames
InterceptedSystem ([worm filename])
絕對不需要的程式
Detected by Sophos as W32/Anacon-B. Note - the filename is SysAna32.exe, Anacon.exe or Syspoly32.exe and is located in %System%