按照字母順序瀏覽[絕對不需要的程式]:


0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
啟動項目/檔案/命令名稱
程式分類
描述
loginServer (.Doc)
絕對不需要的程式
Detected by Malwarebytes as Backdoor.Agent.DCO. The file is located in %AppData%
logonui (\raw.exe)
絕對不需要的程式
Detected by Malwarebytes as Trojan.Agent. The file is located in %Temp%
load32 (1111a.exe)
絕對不需要的程式
Detected by Symantec as W32.Dumaru.AH@mm
lansetting (00035B60.exe)
絕對不需要的程式
Detected by McAfee as RDN/Generic Downloader.x!ce and by Malwarebytes as Trojan.Banker
lansetting (00039DA8.exe)
絕對不需要的程式
Detected by Malwarebytes as Trojan.Banker. The file is located in %Temp%
LJKKPNOJ (2007 Microsoft Office system.exe)
絕對不需要的程式
Detected by McAfee as RDN/Generic.bfr!hy and by Malwarebytes as Backdoor.Agent.NTG
lsass (5209AF68CA8EE09AEFCB1486212890B52B0A061C)
絕對不需要的程式
Detected by McAfee as RDN/Generic Dropper!hl and by Malwarebytes as Trojan.Agent
LHINRDD (73[private subnet]FDB1B5A15491D053D55DAFE73D8)
絕對不需要的程式
Detected by McAfee as RDN/PWS-Banker!da and by Malwarebytes as Trojan.Agent.FM
LREC75DND7 (?.exe)
絕對不需要的程式
Detected by Malwarebytes as Trojan.Agent - where ? represents a single character. The file is located in %UserTemp%
load (a1g.exe)
絕對不需要的程式
Detected by Symantec as W32.Atak.B@mm. Note - this entry modifies the legitimate HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows "load" value data to include the file "a1g.exe" (which is located in %System%)
Lavasoft Ad-Aware (Ad-Aware.exe)
絕對不需要的程式
Detected by Sophos as W32/Rbot-SO. Note - this is not the popular Ad-Aware anti-malware tool and is located in %System%
LonelyWalker (ACRecover.exe)
絕對不需要的程式
Added by a variant of RDN/Generic.dx. The file is located in %ProgramFiles%\NetNucleous\ActiveCollector
load (Adobe.exe)
絕對不需要的程式
Detected by Malwarebytes as Backdoor.Agent.ADB. Note - this entry modifies the legitimate HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows "load" value data to include the file "Adobe.exe" (which is located in %AppData%\Adobe)
load (AdobeSerDate.exe)
絕對不需要的程式
Detected by Malwarebytes as Trojan.Agent.ADB. Note - this entry modifies the legitimate HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows "load" value data to include the file "AdobeSerDate.exe" (which is located in %CommonAppData%\Adobe)
load (AdobeARMservice.exe)
絕對不需要的程式
Detected by Sophos as Troj/MSIL-DFW and by Malwarebytes as Trojan.Agent.MSIL. Note - this entry modifies the legitimate HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows "load" value data to include the file "AdobeARMservice.exe" (which is located in %AppData%\Microsoft\Windows)
load (airappinstaller.exe)
絕對不需要的程式
Detected by Malwarebytes as Trojan.Agent.ADB. Note - this entry modifies the legitimate HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows "load" value data to include the file "airappinstaller.exe" (which is located in %UserTemp%\Adobe)
load (afdsa.exe)
絕對不需要的程式
Detected by Malwarebytes as Trojan.Agent.E. Note - this entry modifies the legitimate HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows "load" value data to include the file "afdsa.exe" (which is located in %UserTemp%\dada, see here)
LoginScreen (aIg.exe)
絕對不需要的程式
Detected by McAfee as Generic.dx!cxd
lsass (Android.exe)
絕對不需要的程式
Detected by Malwarebytes as Trojan.Agent. The file is located in %UserTemp%\AppsAndroid
load (Amazon.pdf)
絕對不需要的程式
Detected by Malwarebytes as Backdoor.Agent.PDL. Note - this entry modifies the legitimate HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows "load" value data to include the file "Amazon.pdf" (which is located in %LocalAppData%\Microsoft\Windows)