按照字母順序瀏覽[絕對不需要的程式]:


0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
啟動項目/檔案/命令名稱
程式分類
描述
kftc2014 (\a.exe)
絕對不需要的程式
Detected by Malwarebytes as Trojan.Downloader. The file is located in %UserTemp%
KAZAACuf (9)
絕對不需要的程式
Detected by Trend Micro as WORM_ARGEN.A
kernel system daemon (ACTIVAT0R.exe)
絕對不需要的程式
Detected by Symantec as W32.Randex.AW
kis (apocalyps32.exe)
絕對不需要的程式
Detected by Malwarebytes as BackDoor.Bot. The file is located in %Windir%
King_ar (arking.exe)
絕對不需要的程式
Detected by Sophos as Troj/PWS-BOS and by Malwarebytes as Spyware.OnlineGames.Kinggen
Kooping (assist.exe)
絕對不需要的程式
Detected by Dr.Web as Trojan.StartPage.38694
kb (AUTO.txt)
絕對不需要的程式
Detected by Sophos as W32/Brontok-CV
kernel32dll (Avcomsys.exe)
絕對不需要的程式
Detected by Malwarebytes as Trojan.Agent. The file is located in %System%
Keyboard Driver (bfscv.exe)
絕對不需要的程式
Detected by McAfee as Generic.dx and by Malwarebytes as Backdoor.Agent.IMN
kfgpeTkw (bDM5c2IZ.exe)
絕對不需要的程式
Detected by Malwarebytes as Trojan.MSIL. The file is located in %AppData%\DXDMqcZS
Kernel (bboy.exe)
絕對不需要的程式
Detected by Microsoft as Worm:Win32/Mumu.A. The file is located in %Windir%
Key Name (chr0me.exe)
絕對不需要的程式
Detected by McAfee as RDN/Generic.dx!c2t and by Malwarebytes as Backdoor.Agent.E
kamsoft (ckvo.exe)
絕對不需要的程式
Detected by Sophos as Troj/Gamania-BW and by Malwarebytes as Trojan.Agent
KLMY (csrss.exe)
絕對不需要的程式
Detected by McAfee as RDN/Generic.dx!cvn and by Malwarebytes as Backdoor.Agent.KL. Note - this is not the legitimate csrss.exe process which is always located in %System%. This one is located in %LocalAppData%\Google
KernellApps (csrss.exe)
絕對不需要的程式
Detected by Sophos as Troj/Bancban-AC and by Malwarebytes as Trojan.Agent. Note - this is not the legitimate csrss.exe process which is always located in %System%. This one is located in a "System" sub-folder
Key Logger (csrss.exe)
絕對不需要的程式
Detected by Symantec as W32.Buchon.A@mm and by Malwarebytes as Trojan.Agent. Note - this is not the legitimate csrss.exe process which is always located in %System%. This one is located in %Root%
Krnlcheck (csrss.exe)
絕對不需要的程式
Detected by Symantec as Backdoor.Botnachala and by Malwarebytes as Trojan.Agent. Note - this is not the legitimate csrss.exe process which is always located in %System%. This one is located in %Windir%
KV_HOST (cxjx.exe)
絕對不需要的程式
Detected by Sophos as Troj/LegMir-BB
Kaspersky (ctfmons.exe)
絕對不需要的程式
Detected by Dr.Web as Trojan.DownLoader10.36987 and by Malwarebytes as Trojan.Agent.E
Klce (cyxevwtj.exe)
絕對不需要的程式
Detected by Malwarebytes as Trojan.Dropper. The file is located in %System%