首頁 » 絕對不需要的程式 » U (第 54 頁)

按照字母順序瀏覽[絕對不需要的程式]:


0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
啟動項目/檔案/命令名稱
程式分類
描述
Update service ([path to file])
絕對不需要的程式
Detected by Malwarebytes as Spyware.Passwords.XGen. Note - this entry loads from the HKLM\policies\Explorer\Run key
Uate ([path to oocs.exe])
絕對不需要的程式
Detected by Symantec as Adware.PurityScan - also see the archived version of Andrew Clover's page
Usrr ([path to rncr.exe])
絕對不需要的程式
Detected by Symantec as Adware.PurityScan - also see the archived version of Andrew Clover's page
Usrr ([path to rpen.exe])
絕對不需要的程式
Detected by Symantec as Adware.PurityScan - also see the archived version of Andrew Clover's page
UsbD ([path to trojan])
絕對不需要的程式
Detected by Sophos as Troj/Cidra-F
User32 ([path to trojan])
絕對不需要的程式
Detected by Symantec as W32.HLLW.Nettrash
USBHWINFO ([path to trojan])
絕對不需要的程式
Detected by Sophos as Troj/LowZone-I
usbn ([path to trojan])
絕對不需要的程式
Detected by Sophos as Troj/Hogil-C
user logon ([path to worm])
絕對不需要的程式
Detected by Sophos as W32/Pahatia-A
USB Device Server! ([path to usbserver.exe])
絕對不需要的程式
Added by a variant of W32.IRCBot
User Sharing Services ([path to usnsvc.exe])
絕對不需要的程式
Added by a variant of W32.IRCBot
ueynfxi4 ([path to ueynfxi4.exe])
絕對不需要的程式
Detected by Malwarebytes as Trojan.Agent.IXF. The file location is typically %ProgramFiles%\[various] - see examples here and here
UpdSys ([random filename])
絕對不需要的程式
Detected by Sophos as Troj/Delf-Z. The most common filename seen is "system.exe" located in %ProgramFiles%\Internet Explorer
upme ([path to worm])
絕對不需要的程式
Detected by Symantec as W32.Mugly.F@mm
userinit ([random].exe)
絕對不需要的程式
Detected by Lavasoft Ad-Aware as Backdoor.Win32.Shiz and by Malwarebytes as Trojan.Agent. The file is located in %Windir%\apppatch
Update for Windows ([various filenames])
絕對不需要的程式
Detected by Sophos as W32/Lerpa-A. Note - the file name will be one of the following common.exe, common.pif, common.scr, Sexo.exe, Sexo.jpg.pif, ini_file__.pif, load_me__.tmp, msfile.pif, system_load_.pif or zipped.rar.pif
UPNP ([trojan filename].exe)
絕對不需要的程式
Detected by Trend Micro as TROJ_DROPPER.EAT. The file is located in %LocalAppData% - see the link for the list of potential filenames