按照字母順序瀏覽[絕對不需要的程式]:


0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
啟動項目/檔案/命令名稱
程式分類
描述
WinSysM (#M.exe)
絕對不需要的程式
Detected by Malwarebytes as Trojan.Agent - where # represents one or more digits. The file is located in %Windir% - see an example here
Windows Atapi x64 Driver ( expIorer.exe)
絕對不需要的程式
Detected by Dr.Web as Trojan.DownLoader12.19100 and by Malwarebytes as Trojan.Downloader.ATP. Note the space at the beginning of the filename and the upper case "i" in place of a lower case "L"
Windows Serivces (#[name].exe)
絕對不需要的程式
Detected by Malwarebytes as Trojan.PasswordStealer. The file is located in %AppData%\Microsoft - see examples here and here
WindowsUpdatem2 ( svchost.exe)
絕對不需要的程式
Detected by Malwarebytes as Backdoor.IRCBot.Gen. Note - this is not the legitimate svchost.exe process which is always located in %System%. This one is located in %Windir% and has a space at the beginning of the filename
WINSVC (%AppData%winini.exe)
絕對不需要的程式
Detected by Malwarebytes as Backdoor.Messa
Windows Auto Updater ( WINDOWSUPDATE.EXE)
絕對不需要的程式
Detected by Trend Micro as WORM_SDBOT.PB. Note the space at the beginning of the filename
windows.jpg.exe (%MyPictures%)
絕對不需要的程式
Detected by Dr.Web as Trojan.Hosts.13138 and by Malwarebytes as Trojan.Downloader
WINDOWS (\windows.exe)
絕對不需要的程式
Detected by Sophos as Troj/Monbot-A
Windows System (\winsys32.exe)
絕對不需要的程式
Detected by Sophos as W32/Mytob-IS and by Malwarebytes as Backdoor.Agent
web (******.exe)
絕對不需要的程式
Added by a variant of Backdoor:Win32/Rbot - where * represents a random character. The file is located in %System%
WinRAR (.exe)
絕對不需要的程式
Detected by Malwarebytes as Backdoor.Agent.DC. The file is located in %UserTemp%
WinSysQQ (##QQ.exe)
絕對不需要的程式
Detected by Malwarebytes as Trojan.Agent.WS - where # represents a digit, see examples here and here
win32 (%System%:taskk.exe)
絕對不需要的程式
Detected by Kaspersky as Backdoor.Win32.Rbot.kts and by Malwarebytes as Backdoor.Agent.Gen. Note that the target is a Windows Alternate Data Stream (ADS)
WinUp (#.#.#.#WinUpdate.exe)
絕對不需要的程式
Detected by Malwarebytes as Trojan.Agent.E - where # represents a digit. The file is located in %AppData%\AcompanyXXX\aproductXXX
Win.Update (%System%:Win.Update.exe)
絕對不需要的程式
Detected by Kaspersky as Backdoor.Win32.Poison.ldq. Note that the target is a Windows Alternate Data Stream (ADS)
Windows Services (#adobeair.exe)
絕對不需要的程式
Detected by Sophos as Troj/VB-FHF and by Malwarebytes as Backdoor.Bot
Winsock.exe (%System%:Winlogon.exe)
絕對不需要的程式
Detected by Kaspersky as Backdoor.Win32.Poison.arnv. Note that the target is a Windows Alternate Data Stream (ADS)
WinSysW (#L.exe)
絕對不需要的程式
Detected by Malwarebytes as Spyware.OnlineGames - where # represents one or more digits. The file is located in %Windir% - see examples here and here
winlgon (%Windir%:winlgon.exe)
絕對不需要的程式
Detected by Dr.Web as Trojan.DownLoader6.47245 and by Malwarebytes as Trojan.Backdoor. Note that the target is a Windows Alternate Data Stream (ADS)
WUpdate (1037v.exe)
絕對不需要的程式
Detected by Sophos as Troj/Clagger-AR