按照字母順序瀏覽[絕對不需要的程式]:


0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
啟動項目/檔案/命令名稱
程式分類
描述
svchost (.exe)
絕對不需要的程式
Detected by Malwarebytes as Backdoor.Bot.E. The file is located in %AppData%
Shell (%EX%.exe)
絕對不需要的程式
Detected by Malwarebytes as Hijack.ShellA.Gen. Note - this entry adds an illegal HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon "Shell" entry. The value data points to "explorer.exe" (which is a legitimate file located in %Windir% and shouldn't be deleted) and "%EX%.exe" (which is located in %LocalAppData%\Google)
sdsd (.exe)
絕對不需要的程式
Detected by McAfee as RDN/Ransom and by Malwarebytes as Trojan.Agent.XX
svchost.exe (%System%:csrsc.exe)
絕對不需要的程式
Detected by Kaspersky as Trojan.Win32.Buzus.aaup and by Malwarebytes as Backdoor.Bot.E. Note that the target is a Windows Alternate Data Stream (ADS)
Système dӥxploitation Microsoft® Windows® (.exe)
絕對不需要的程式
Detected by Malwarebytes as Backdoor.Agent.DCGen. The file is located in %Temp%
Service (%System%:Service.exe)
絕對不需要的程式
Detected by Kaspersky as Trojan.Win32.Buzus.dpde and by Malwarebytes as Trojan.Agent. Note that the target is a Windows Alternate Data Stream (ADS)
svcchost (%System%:svcchost.exe)
絕對不需要的程式
Detected by McAfee as Generic.dx and by Malwarebytes as Backdoor.Sdbot. Note that the target is a Windows Alternate Data Stream (ADS)
system64 (%System%:system86x.exe)
絕對不需要的程式
Detected by Kaspersky as Trojan.Win32.Refroso.lcx. Note that the target is a Windows Alternate Data Stream (ADS)
SystemWideHook for Windows NT (%WinHook32.exe)
絕對不需要的程式
Detected by Symantec as W32.Mydoom.AC@mm
svchost ( svchost.exe)
絕對不需要的程式
Detected by Malwarebytes as Backdoor.Bot.E. Note - this is not the legitimate svchost.exe process which is always located in %System%. This one is also located in %System% but has a space at the beginning of the filename
sInErA (\.exe)
絕對不需要的程式
Detected by Sophos as W32/SillyFDC-AB. Note the space at the beginning of the filename
Svchost (*1.exe)
絕對不需要的程式
Detected by Malwarebytes as Backdoor.Bot.E - where * represents a character. The file is located in %AppData%
strongright ((c).exe)
絕對不需要的程式
Detected by Malwarebytes as Backdoor.Downloader.DK. The file is located in %AppData%
swe (.exe)
絕對不需要的程式
Detected by McAfee as RDN/Ransom and by Malwarebytes as Trojan.Agent.E
SeekmoToolbar (${HOOKOE_FILE})
絕對不需要的程式
Seekmo Search Assistant adware. The file is typically located in %ProgramFiles%\SeekmoToolbar\Bin\[version]
stup (138762763.exe)
絕對不需要的程式
Detected by Sophos as Troj/FireSpy-A. It will attempt to register the dropped component as a Firefox plugin and begin monitoring the user's browsing habits, stealing information including monitoring and logging information from Web forms
Skype (1394.inf_x86_3)
絕對不需要的程式
Detected by McAfee as RDN/Generic.dx and by Malwarebytes as Backdoor.Agent.SK
Startup Key (1.0.0.0wininit.exe)
絕對不需要的程式
Detected by Dr.Web as Trojan.DownLoader10.38645
svchoost (/sv.exe)
絕對不需要的程式
Detected by Dr.Web as Trojan.Inject1.3788 and by Malwarebytes as Backdoor.Agent.SVC
SYSTEMDLL (0DE4CCD36709D58AC976A7CD423919A[private subnet])
絕對不需要的程式
Detected by Malwarebytes as Backdoor.Agent. The file is located in %Root%\System