啟動項目/檔案/命令名稱
程式分類
描述
RDKI (%TEMP%.scr)
絕對不需要的程式
Detected by McAfee as RDN/Generic Dropper!ge and by Malwarebytes as Backdoor.Agent
rsystem ( hhhh.exe)
絕對不需要的程式
Detected by Malwarebytes as Ransom.Jigsaw. The file is located in %AppData%\rsystem
Regcxmarq ( REGCXMARQ.EXE)
絕對不需要的程式
Detected by Trend Micro as TSPY_BANCOS.DK. Note the space at the beginning of the filename
regedit ( svchost.exe ccRegVfy)
絕對不需要的程式
Detected by Symantec as Trojan.Hotword.B. Note - this is not the legitimate svchost.exe process which is always located in %System%. This one is also located in %System% but has a space at the beginning of the filename
ResWin (2q1S8o.exe)
絕對不需要的程式
Detected by Malwarebytes as Trojan.Banker.VMP. The file is located in %UserProfile%\5p0F0e4H8P5S2z
rundll32 (adaRg.exe)
絕對不需要的程式
Detected by Malwarebytes as Trojan.Agent.E. The file is located in %UserProfile%\rundll32
Repil (acim.exe)
絕對不需要的程式
Detected by Malwarebytes as Trojan.Banker.IM. The file is located in %AppData%\WireX
rdchelp (acl6.exe)
絕對不需要的程式
Detected by McAfee as RDN/Generic PWS.y!tr and by Malwarebytes as Trojan.Banker.E
RavAv (AdobeR.exe)
絕對不需要的程式
Detected by Trend Micro as WORM_RJUMP.D and by Malwarebytes as Worm.RJump
Roblox (amddriv.exe)
絕對不需要的程式
Detected by Malwarebytes as Trojan.Agent.MNR. The file is located in %AppData%\windos
Registry Key Name (ame.vbs)
絕對不需要的程式
Detected by Malwarebytes as Trojan.Agent.RKN.Generic. Loads via the HKCU\RunOnce registry key and the file is located in %UserTemp%\subfolder
Remote Registry Service (alive.exe)
絕對不需要的程式
Detected by McAfee as RDN/Sdbot.bfr!d and by Malwarebytes as Backdoor.IRCBot.RSGen
RX4LXWW (All.exe)
絕對不需要的程式
Detected by McAfee as RDN/Generic.bfr!k and by Malwarebytes as Backdoor.Agent