首頁 » 絕對不需要的程式 (第 3 頁)

按照字母順序瀏覽[絕對不需要的程式]:


0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
啟動項目/檔案/命令名稱
程式分類
描述
aa (\.exe)
絕對不需要的程式
Detected by Malwarebytes as Trojan.FakeMS. The file is located in %AppData%
#.vbs (#.vbs)
絕對不需要的程式
Detected by Malwarebytes as Trojan.Agent.VBS - where # represents a digit. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows starts
WinRAR (.exe)
絕對不需要的程式
Detected by Malwarebytes as Backdoor.Agent.DC. The file is located in %UserTemp%
winlgon (%Windir%:winlgon.exe)
絕對不需要的程式
Detected by Dr.Web as Trojan.DownLoader6.47245 and by Malwarebytes as Trojan.Backdoor. Note that the target is a Windows Alternate Data Stream (ADS)
Control handler (***********.exe)
絕對不需要的程式
CoolWebSearch parasite variant - where * represents a random character. The file is located in %System%
$sys$momomomochin ($sys$sos$sys$.exe)
絕對不需要的程式
Detected by Symantec as Trojan.Welomoch
.exe (.exe)
絕對不需要的程式
Detected by Malwarebytes as Trojan.Agent. The file is located in %AppData%
Regcxmarq ( REGCXMARQ.EXE)
絕對不需要的程式
Detected by Trend Micro as TSPY_BANCOS.DK. Note the space at the beginning of the filename
app_## (##.exe)
絕對不需要的程式
Detected by Malwarebytes as Ransom.PadCrypt.Generic - where # represents a digit. The file is located in %AppData%\PadCrypt
Shell (%EX%.exe)
絕對不需要的程式
Detected by Malwarebytes as Hijack.ShellA.Gen. Note - this entry adds an illegal HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon "Shell" entry. The value data points to "explorer.exe" (which is a legitimate file located in %Windir% and shouldn't be deleted) and "%EX%.exe" (which is located in %LocalAppData%\Google)
loginServer (.Doc)
絕對不需要的程式
Detected by Malwarebytes as Backdoor.Agent.DCO. The file is located in %AppData%
win32 (%System%:taskk.exe)
絕對不需要的程式
Detected by Kaspersky as Backdoor.Win32.Rbot.kts and by Malwarebytes as Backdoor.Agent.Gen. Note that the target is a Windows Alternate Data Stream (ADS)
sInErA (\.exe)
絕對不需要的程式
Detected by Sophos as W32/SillyFDC-AB. Note the space at the beginning of the filename
Windows Services (#adobeair.exe)
絕對不需要的程式
Detected by Sophos as Troj/VB-FHF and by Malwarebytes as Backdoor.Bot
sdsd (.exe)
絕對不需要的程式
Detected by McAfee as RDN/Ransom and by Malwarebytes as Trojan.Agent.XX
Alternativo (%Windir%Updatex.exe)
絕對不需要的程式
Detected by Dr.Web as Trojan.FakeAV.14091 and by Malwarebytes as Trojan.Banker
Microsoft Windows Update XP64 (********.exe)
絕對不需要的程式
Detected by Malwarebytes as Trojan.MWF.Gen - where * represents a random character. The file is located in %System%
$sys$umaiyo ($sys$sos$sys$.exe)
絕對不需要的程式
Detected by Symantec as Trojan.Welomoch
Minecon Cape Link Generator (.exe)
絕對不需要的程式
Detected by McAfee as RDN/Generic.bfr and by Malwarebytes as Backdoor.Agent.DCE
svchost ( svchost.exe)
絕對不需要的程式
Detected by Malwarebytes as Backdoor.Bot.E. Note - this is not the legitimate svchost.exe process which is always located in %System%. This one is also located in %System% but has a space at the beginning of the filename