按照字母順序瀏覽[絕對不需要的程式]:


0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
啟動項目/檔案/命令名稱
程式分類
描述
QWE (%Windir%:BlackNixBuildr.exe)
絕對不需要的程式
Detected by Malwarebytes as Trojan.Agent.DE. Note that the target is a Windows Alternate Data Stream (ADS)
Qdqs (1028L.exe)
絕對不需要的程式
Detected by Malwarebytes as Adware.SanctionedMedia. The file is located in %System%
QQ (360update.exe)
絕對不需要的程式
Detected by Malwarebytes as Trojan.Agent.QQ. The file is located in %Root%\$360Section\360SD
Quick Office (activate.exe)
絕對不需要的程式
Detected by Symantec as Trojan.Ransomlock.D and by Malwarebytes as Trojan.SMSer. Note - this infection hooks the keyboard to prevent anything except numbers from being typed and displays a Russian message requesting a valid license key
QuickShock (AvMsUpd.exe)
絕對不需要的程式
Detected by Trend Micro as TROJ_BANLOAD.DAT
Quasar Client Startup (Bitcoin-QT.exe)
絕對不需要的程式
Detected by Malwarebytes as Trojan.Qausar. The file is located in %AppData%\Bitcoins
QualcommAtheros (Bqsadmin.exe)
絕對不需要的程式
Detected by Malwarebytes as Trojan.BitCoinMiner. The file is located in %AppData%\Splwow
qqegubig (bsaaxcgl.exe)
絕對不需要的程式
Detected by Malwarebytes as Trojan.Ransom.WSF. The file is located in %LocalAppData%
QwaT[random] (bsod.hta)
絕對不需要的程式
Detected by Malwarebytes as Rogue.TechSupportScam. The file is located in %AllUsersStartup%
QWGD (chrome.exe)
絕對不需要的程式
Detected by Malwarebytes as Backdoor.SpyNet. Note - this is not the legitimate Google Chrome browser which is normally located in %ProgramFiles%\Google\Chrome\Application. This one is located in %System%\google
QWQQ (chrome.exe)
絕對不需要的程式
Detected by Malwarebytes as Backdoor.SpyNet. Note - this is not the legitimate Google Chrome browser which is normally located in %ProgramFiles%\Google\Chrome\Application. This one is located in %System%\google
QClient Update (Client.exe)
絕對不需要的程式
Detected by Malwarebytes as Trojan.PasswordStealer.MSIL. The file is located in %AppData%\SubDir
Quasar Client Startup (Client.exe)
絕對不需要的程式
Detected by Malwarebytes as Trojan.PasswordStealer.MSIL. The file is located in %AppData%\SubDir
QuickInstallPack (CLN_2009FreeInstall.exe)
絕對不需要的程式
Installed and used by rogue security products such as Cleaner2009, AntiMalwareSuite, SecureExpertCleaner and System Guard Center
QA6XM3H2LQ (Converterdll.exe)
絕對不需要的程式
Detected by McAfee as RDN/Generic.bfr and by Malwarebytes as Backdoor.Agent.DCE
Quicktlme (cp.exe)
絕對不需要的程式
QuickPage - Switch dialer and hijacker variant, see here. Also detected by Sophos as Dial/Switch-A
QQPLUS (ctfmon.exe)
絕對不需要的程式
Detected by McAfee as Generic BackDoor and by Malwarebytes as Worm.AutoRun. Note - this is not the legitimate ctfmon.exe process associated with alternate language and method inputs which is always located in %System%. This one is located in %ProgramFiles%\MSFCache
Qmguste (C_28597X.exe)
絕對不需要的程式
Detected by Malwarebytes as Adware.SanctionedMedia. The file is located in %System%
QQ2013 (dsfsfdsdf.exe)
絕對不需要的程式
Detected by McAfee as RDN/Generic PWS.y and by Malwarebytes as Trojan.Agent.QPGen
qwerty (file.exe)
絕對不需要的程式
Detected by Malwarebytes as Backdoor.Bot.E. The file is located in %Temp%