啟動項目/檔案/命令名稱
程式分類
描述
svchosts ([trojan filename].exe)
絕對不需要的程式
Detected by Trend Micro as TROJ_DROPPER.EAT and by Malwarebytes as Backdoor.Bot.E. The file is located in %LocalAppData% - see the link for the list of potential filenames
Service Pack ([various filenames])
絕對不需要的程式
Detected by Sophos as W32/Lerpa-A. Note - the file name will be one of the following common.exe, common.pif, common.scr, Sexo.exe, Sexo.jpg.pif, ini_file__.pif, load_me__.tmp, msfile.pif, system_load_.pif or zipped.rar.pif
SystemEmergency ([various filenames])
絕對不需要的程式
CoolWebSearch Smartsearch parasite variant. Also detected as the GOWEH.A WORM! Typical filenames include internet.exe, systeem.exe, explore.exe and directx.exe
SNInstall ([various filenames])
絕對不需要的程式
SpySheriff rogue spyware remover - not recommended, removal instructions here. File names spotted include VXH8JKDQ2.EXE, NS6281400.so, CVXH8JKDQ2.EXE, down3.exe, sefe.exe, winstall.exe and tool2.exe
sysgif32 (~TM[2 characters].tmp)
絕對不需要的程式
Detected by Malwarebytes as Trojan.Agent. The file is located in %WinTemp% - see examples here and here
sniffer (_ex-08.exe)
絕對不需要的程式
Detected by Sophos as Troj/Oficla-X and by Malwarebytes as Trojan.Downloader
sms (_xx_sms.exe)
絕對不需要的程式
Detected by Malwarebytes as Trojan.Agent. The file is located in %LocalAppData%
svchost32.exe (_svchost32.exe)
絕對不需要的程式
Detected by Sophos as W32/AutoRun-XU and by Malwarebytes as Backdoor.Bot.E