啟動項目/檔案/命令名稱
程式分類
描述
Update service ([path to file])
絕對不需要的程式
Detected by Malwarebytes as Spyware.Passwords.XGen. Note - this entry loads from the HKLM\policies\Explorer\Run key
Uate ([path to oocs.exe])
絕對不需要的程式
Detected by Symantec as Adware.PurityScan - also see the archived version of Andrew Clover's page
Usrr ([path to rncr.exe])
絕對不需要的程式
Detected by Symantec as Adware.PurityScan - also see the archived version of Andrew Clover's page
Usrr ([path to rpen.exe])
絕對不需要的程式
Detected by Symantec as Adware.PurityScan - also see the archived version of Andrew Clover's page
ueynfxi4 ([path to ueynfxi4.exe])
絕對不需要的程式
Detected by Malwarebytes as Trojan.Agent.IXF. The file location is typically %ProgramFiles%\[various] - see examples here and here
UpdSys ([random filename])
絕對不需要的程式
Detected by Sophos as Troj/Delf-Z. The most common filename seen is "system.exe" located in %ProgramFiles%\Internet Explorer
userinit ([random].exe)
絕對不需要的程式
Detected by Lavasoft Ad-Aware as Backdoor.Win32.Shiz and by Malwarebytes as Trojan.Agent. The file is located in %Windir%\apppatch
Update for Windows ([various filenames])
絕對不需要的程式
Detected by Sophos as W32/Lerpa-A. Note - the file name will be one of the following common.exe, common.pif, common.scr, Sexo.exe, Sexo.jpg.pif, ini_file__.pif, load_me__.tmp, msfile.pif, system_load_.pif or zipped.rar.pif
UPNP ([trojan filename].exe)
絕對不需要的程式
Detected by Trend Micro as TROJ_DROPPER.EAT. The file is located in %LocalAppData% - see the link for the list of potential filenames