首頁 » 絕對不需要的程式 » L (第 2 頁)

按照字母順序瀏覽[絕對不需要的程式]:


0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
啟動項目/檔案/命令名稱
程式分類
描述
LaunchApp (Alaunch.exe)
絕對不需要的程式
Detected by McAfee as RDN/Generic.dx and by Malwarebytes as Trojan.Agent.AI. Note - this is not the legitimate Acer eRecovery file of the same name which is normally located in %Windir%. This one is located in %AppData%\LaunchApp
lnternet Explorer (AMSNDMGR.EXE)
絕對不需要的程式
Detected by Symantec as W32.Kwbot.R.Worm. Note that the first "l" is a lower case "L" and not an upper case "i"
load (aply4.exe)
絕對不需要的程式
Detected by McAfee as RDN/Generic.bfr!hp and by Malwarebytes as Backdoor.Agent.E. Note - this entry modifies the legitimate HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows "load" value data to include the file "aply4.exe" (which is located in %AppData%\play3) and also adds an illegal HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows "load" entry pointing to the same file
load (app.exe)
絕對不需要的程式
Detected by Malwarebytes as Trojan.Agent. Note - this entry modifies the legitimate HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows "load" value data to include the file "app.exe" (which is located in %AppData%)
load (aqs.exe)
絕對不需要的程式
Detected by Malwarebytes as Backdoor.Agent. Note - this entry modifies the legitimate HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows "load" value data to include the file "aqs.exe" (which is located in %Windir%\web, see here)
Layer (Applicationcntrl.com)
絕對不需要的程式
Detected by Dr.Web as Trojan.DownLoader9.49791 and by Malwarebytes as Trojan.Agent.E
load (ApplicationFrameHost.exe)
絕對不需要的程式
Detected by Malwarebytes as Backdoor.Agent.AF. Note - this entry modifies the legitimate HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows "load" value data to include the file "ApplicationFrameHost.exe" (which is located in %AppData%\ApplicationFrameHost)
load (appzzh.exe)
絕對不需要的程式
Detected by Malwarebytes as Trojan.Injector.E. Note - this entry modifies the legitimate HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows "load" value data to include the file "appzzh.exe" (which is located in %AppData%)
LoadPowerProfile (ASDAPI.EXE)
絕對不需要的程式
Detected by Symantec as Backdoor.Cabro. Not to be confused with the valid LoadPowerProfile entry where the command is Rundll32.exe powrprof.dll
load (asdf.exe)
絕對不需要的程式
Detected by Malwarebytes as Trojan.Injector.MSIL. Note - this entry modifies the legitimate HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows "load" value data to include the file "asdf.exe" (which is located in %Temp%\adad, see here)
load (arbt.exe)
絕對不需要的程式
Detected by Malwarebytes as Trojan.Agent. Note - this entry modifies the legitimate HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows "load" value data to include the file "arbt.exe" (which is located in %CommonAppData%\Temp)
load (AudoDriver.exe)
絕對不需要的程式
Detected by Malwarebytes as Trojan.Injector.E. Note - this entry modifies the legitimate HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows "load" value data to include the file "AudoDriver.exe" (which is located in %AppData%\AudioDriver)
load (AudioDriver.exe)
絕對不需要的程式
Detected by Malwarebytes as Backdoor.Agent.BDB. Note - this entry modifies the legitimate HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows "load" value data to include the file "AudioDriver.exe" (which is located in %AppData%\Microsoft\Speech)
lhosts (Audiodriver.exe)
絕對不需要的程式
Detected by Dr.Web as Trojan.DownLoader10.25966 and by Malwarebytes as Trojan.Agent.DR
load (audiollc.exe)
絕對不需要的程式
Detected by Malwarebytes as Backdoor.Agent.E. Note - this entry modifies the legitimate HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows "load" value data to include the file "audiollc.exe" (which is located in %UserTemp%\audiollc)
load (Audio.exe)
絕對不需要的程式
Detected by Malwarebytes as Trojan.Injector. Note - this entry modifies the legitimate HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows "load" value data to include the file "Audio.exe" (which is located in %AppData%\Audio)
LTM2 (bible.exe)
絕對不需要的程式
Detected by Malwarebytes as Backdoor.Litmus. The file is located in %Windir%\litmus
LoadDBackUp (BcTool.exe)
絕對不需要的程式
Detected by Symantec as W32.Gibe@mm
LAUNCHQUICK (bbaka14.exe)
絕對不需要的程式
Detected by McAfee as Downloader-CJD
load (BMDStreamingServer.exe)
絕對不需要的程式
Detected by Dr.Web as Trojan.DownLoader9.15424. Note - this entry modifies the legitimate HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows "load" value data to include the file "BMDStreamingServer.exe" (which is located in %Root%\{$1284-9213-2940-1289$})