啟動項目/檔案/命令名稱
程式分類
描述
Peer Resource Notification Proxy ([path to trojan])
絕對不需要的程式
Detected by Malwarebytes as Trojan.Downloader.RND - see an example here
programmname ([path to programm.exe])
絕對不需要的程式
Detected by Dr.Web as Trojan.Inject1.36150 and by Malwarebytes as Trojan.Agent.Gen
prov ([path to prov.exe])
絕對不需要的程式
Added by a variant of W32.IRCBot. The file is located in %System%
PorJat ([path to trojan])
絕對不需要的程式
Detected by Dr.Web as Trojan.DownLoader13.33703 and by Malwarebytes as Trojan.Banker.E
PopRock ([path to trojan])
絕對不需要的程式
Detected by Sophos as Troj/Agent-LNU and by Malwarebytes as Trojan.Downloader
PVRNPWWDTS ([path to trojan])
絕對不需要的程式
Detected by Malwarebytes as Trojan.Agent.RND - see an example here
Performance Biometric Base Store Procedure VC ([path to trojan])
絕對不需要的程式
Detected by Malwarebytes as Trojan.Agent.RND
Persistence ! System ([path to trojan])
絕對不需要的程式
Detected by Panda as Banbra.GQU and by Malwarebytes as Trojan.Banker. The most common filename seen is "spoolsvr32.exe" but examples have been seen where the filename is "dchcp.exe" or "spoolfsvs.exe"
Parental Application Modules Client Usermode ([path to trojan])
絕對不需要的程式
Detected by Malwarebytes as Trojan.Downloader.RND
PreInstall Windows ([path] repcale.exe [path] beird.exe)
絕對不需要的程式
Added by a variant of the RANDON.AN WORM! Both files are located in %System%\detr
PrinterSpool ([path] RESTORE.EXE [path] SPOOL.EXE)
絕對不需要的程式
Detected by Symantec as Backdoor.IRC.Aladinz.K. Both files are located in %System%\PLUGINS
Protection ([path] runtask.exe [path] protection.exe)
絕對不需要的程式
Added by a variant of the AGENT.3.AU TROJAN! Both files are located in %Windir%