首頁 » 絕對不需要的程式 » P (第 65 頁)

按照字母順序瀏覽[絕對不需要的程式]:


0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
啟動項目/檔案/命令名稱
程式分類
描述
Pacth.exe ([path to Pacth.exe])
絕對不需要的程式
Detected by Malwarebytes as Trojan.Injector.AI
Printer PDF Service ([path to pdfservice.exe])
絕對不需要的程式
Detected by Malwarebytes as Trojan.Agent
Peer Resource Notification Proxy ([path to trojan])
絕對不需要的程式
Detected by Malwarebytes as Trojan.Downloader.RND - see an example here
programmname ([path to programm.exe])
絕對不需要的程式
Detected by Dr.Web as Trojan.Inject1.36150 and by Malwarebytes as Trojan.Agent.Gen
popuppers64 ([path to trojan])
絕對不需要的程式
Detected by Sophos as Troj/LowZone-AA
prov ([path to prov.exe])
絕對不需要的程式
Added by a variant of W32.IRCBot. The file is located in %System%
PorJat ([path to trojan])
絕對不需要的程式
Detected by Dr.Web as Trojan.DownLoader13.33703 and by Malwarebytes as Trojan.Banker.E
PopRock ([path to trojan])
絕對不需要的程式
Detected by Sophos as Troj/Agent-LNU and by Malwarebytes as Trojan.Downloader
PVRNPWWDTS ([path to trojan])
絕對不需要的程式
Detected by Malwarebytes as Trojan.Agent.RND - see an example here
Pservice ([path to trojan])
絕對不需要的程式
Detected by Dr.Web as Trojan.BtcMine.28
prunnet ([path to trojan])
絕對不需要的程式
Detected by Sophos as Troj/Agent-HVB
pro ([path to trojan])
絕對不需要的程式
Detected by Sophos as Troj/Spywad-F
Performance Biometric Base Store Procedure VC ([path to trojan])
絕對不需要的程式
Detected by Malwarebytes as Trojan.Agent.RND
Persistence ! System ([path to trojan])
絕對不需要的程式
Detected by Panda as Banbra.GQU and by Malwarebytes as Trojan.Banker. The most common filename seen is "spoolsvr32.exe" but examples have been seen where the filename is "dchcp.exe" or "spoolfsvs.exe"
Persistence[random] ([path to trojan])
絕對不需要的程式
Detected by Sophos as Troj/MLogin-A
PHIME2OO2ASyst ([path to trojan])
絕對不需要的程式
Detected by Sophos as Troj/DBdoor-B
Parental Application Modules Client Usermode ([path to trojan])
絕對不需要的程式
Detected by Malwarebytes as Trojan.Downloader.RND
PreInstall Windows ([path] repcale.exe [path] beird.exe)
絕對不需要的程式
Added by a variant of the RANDON.AN WORM! Both files are located in %System%\detr
PrinterSpool ([path] RESTORE.EXE [path] SPOOL.EXE)
絕對不需要的程式
Detected by Symantec as Backdoor.IRC.Aladinz.K. Both files are located in %System%\PLUGINS
Protection ([path] runtask.exe [path] protection.exe)
絕對不需要的程式
Added by a variant of the AGENT.3.AU TROJAN! Both files are located in %Windir%