首頁 » 絕對不需要的程式 » S (第 2 頁)

按照字母順序瀏覽[絕對不需要的程式]:


0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
啟動項目/檔案/命令名稱
程式分類
描述
Service PAck SFVP (****.exe)
絕對不需要的程式
Added by a variant of Backdoor:Win32/Rbot - where * represents a random character
Shell (2.exe,explorer.exe)
絕對不需要的程式
Detected by Malwarebytes as Hijack.ShellA.Gen. Note - this entry adds an illegal HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon "Shell" entry. The value data points to "explorer.exe" (which is a legitimate file located in %Windir% and shouldn't be deleted) and "2.exe" (which is located in %AppData%\Windows)
SpyClean (1ClickSpyClean.exe)
絕對不需要的程式
1 Click Spy Clean uses a database that was stolen from SpybotS&D. Not recommended, see here
sysfiles (3232.exe)
絕對不需要的程式
Detected by McAfee as RDN/Generic.bfr!hw and by Malwarebytes as Backdoor.Agent.SFGen
SoundMier (360.vbs)
絕對不需要的程式
Detected by Dr.Web as Trojan.StartPage1.5061 and by Malwarebytes as Trojan.StartPage
SWISSKNIFE (38FAEB.exe)
絕對不需要的程式
Detected by Malwarebytes as Trojan.Agent. The file is located in %AppData%\38FAEB
Server Registry SV (1Process Server.exe)
絕對不需要的程式
Detected by Dr.Web as Trojan.DownLoader12.24848 and by Malwarebytes as Trojan.Downloader.SVR
svnhost.exe (1svnhost.exe)
絕對不需要的程式
Detected by Malwarebytes as Trojan.MaskedTeamViewer. The file is located in %System%
Shell (1systemsmss.exe,explorer.exe)
絕對不需要的程式
Detected by Malwarebytes as Hijack.Shell.Generic. Note - this entry adds an illegal HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon "Shell" entry. The value data points to "explorer.exe" (which is a legitimate file located in %Windir% and shouldn't be deleted) and "1systemsmss.exe" (which is located in %Windir%\System64)
Startup Name (654322211.exe)
絕對不需要的程式
Detected by McAfee as RDN/Generic.bfr and by Malwarebytes as Backdoor.Agent.E
sysinfo (6670805261Wsy.DLL)
絕對不需要的程式
Detected by Malwarebytes as Trojan.Downloader. The file is located in %UserTemp%
Shell (7iRxOsZ5mUTl.exe,explorer.exe)
絕對不需要的程式
Detected by Malwarebytes as Hijack.ShellA.Gen. Note - this entry adds an illegal HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon "Shell" entry. The value data points to "explorer.exe" (which is a legitimate file located in %Windir% and shouldn't be deleted) and "7iRxOsZ5mUTl.exe" (which is located in %AppData%\win)
se5dryth (5rdesuh.exe)
絕對不需要的程式
Detected by McAfee as RDN/Generic.dx!be and by Malwarebytes as Trojan.Agent
stat2 (aatb.bat)
絕對不需要的程式
Detected by Sophos as Troj/Mdrop-FBG and by Malwarebytes as Trojan.Agent
sexsex12345 (9uA0OA7p)
絕對不需要的程式
Detected by Malwarebytes as Backdoor.Bot
Shell (9VSL73v.exe,explorer.exe)
絕對不需要的程式
Detected by McAfee as RDN/Ransom!eb and by Malwarebytes as Backdoor.Agent.DCE. Note - this entry adds an illegal HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon "Shell" entry. The value data points to "explorer.exe" (which is a legitimate file located in %Windir% and shouldn't be deleted) and "9VSL73v.exe" (which is located in %Temp%\UovrEIZq)
Smile (a.exe)
絕對不需要的程式
Detected by Dr.Web as Trojan.MulDrop5.8935 and by Malwarebytes as Trojan.Agent.SM
svchots (8qAHdqzNINQ2.exe)
絕對不需要的程式
Detected by McAfee as RDN/Generic.bfr and by Malwarebytes as Backdoor.Agent.SVC
shell (8URJ51t.exe,explorer.exe)
絕對不需要的程式
Detected by Dr.Web as Trojan.Siggen6.6500 and by Malwarebytes as Backdoor.Agent.DCE. Note - this entry adds an illegal HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon "Shell" entry. The value data points to "explorer.exe" (which is a legitimate file located in %Windir% and shouldn't be deleted) and "8URJ51t.exe" (which is located in %AppData%\G9hdquLc)
System (abcdefg.exe)
絕對不需要的程式
Detected by Sophos as W32/Harwig-B