首頁 » 絕對不需要的程式 (第 1826 頁)
啟動項目/檔案/命令名稱
程式分類
描述
Microsoft Defender ([UserName reversed]Defense.exe)
絕對不需要的程式
Detected by Malwarebytes as Trojan.Downloader.DWNGen. The file is located in %CommonAppData%\[Username]Salva
Nocana ([worm filename])
絕對不需要的程式
Detected by Sophos as W32/Anacon-B. Note - the filename is SysAna32.exe, Anacon.exe or Syspoly32.exe and is located in %System%
ad_vir (_K_M_1_OnAdminWorks.exe)
絕對不需要的程式
Detected by Dr.Web as Trojan.KeyLogger.25295 and by Malwarebytes as Trojan.KeyLogger
~backup~ (~backup.exe)
絕對不需要的程式
Detected by Malwarebytes as Trojan.Cidox. The file is located in %MyDocuments%\MyApplicationData
Data controll ({K7IN9-QQMAO-QOOFI-YQP13-2JQSA}.exe)
絕對不需要的程式
Detected by Dr.Web as Trojan.DownLoader11.40617 and by Malwarebytes as Trojan.Agent.DCL
CryptoLocker ({GUID}.exe)
絕對不需要的程式
CryptoLocker Ransomware - removal instructions here. Detected by Malwarebytes as Trojan.Ransom. The file is located in %AppData%
{Binda}.exe ({Binda}.exe)
絕對不需要的程式
Detected by McAfee as Generic.grp!in and by Malwarebytes as Trojan.Agent. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows starts
Microsoft Windows DHCP (___r.exe)
絕對不需要的程式
Detected by Symantec as W32.Maslan.A@mm and by Malwarebytes as Trojan.MWF.Gen
[various names] (___.exe)
絕對不需要的程式
Fake startup entry created by the Wareout rogue spyware and dialer remover - not recommended, removal instructions here. Archived version of Andrew Clover's original page
Window Firewall Service (_xx_temp.exe)
絕對不需要的程式
Detected by McAfee as RDN/Generic Dropper!uf and by Malwarebytes as Backdoor.Agent.WF
sms (_xx_sms.exe)
絕對不需要的程式
Detected by Malwarebytes as Trojan.Agent. The file is located in %LocalAppData%
ahnlabV3Agent (_xx_ahnlabV3Agent.exe)
絕對不需要的程式
Detected by Malwarebytes as Trojan.Backdoor.DF. The file is located in %Windir%