首頁 » 絕對不需要的程式 » Z (第 2 頁)

按照字母順序瀏覽[絕對不需要的程式]:


0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
啟動項目/檔案/命令名稱
程式分類
描述
zhgxkhocpv (logmanq.exe)
絕對不需要的程式
Detected by Malwarebytes as Adware.SanctionedMedia. The file is located in %System%
ZincgrubInc (Lsass.exe)
絕對不需要的程式
Detected by Sophos as W32/Voumit-A and by Malwarebytes as Trojan.Agent. Note - this is not the legitimate lsass.exe process which is always located in %System%. This one is located in %Root%\mirc32
ZipArichieServic (main.exe)
絕對不需要的程式
Detected by Dr.Web as Trojan.KeyLogger.18648 and by Malwarebytes as Trojan.KeyLogger.E. The file is located in %ProgramFiles%\ArchivCache
zldrv (mshost.exe)
絕對不需要的程式
Detected by Dr.Web as Trojan.AVKill.28906 and by Malwarebytes as Trojan.Agent.PS
zldrv (mssvc.exe)
絕對不需要的程式
Detected by Malwarebytes as Trojan.Agent.FT. The file is located in %AppData%\Microsoft\DVX
zzz (Name.exe)
絕對不需要的程式
Detected by Dr.Web as Trojan.MulDrop5.17442 and by Malwarebytes as Trojan.Agent.E
ZDDROI (nkHdCI.exe)
絕對不需要的程式
Detected by McAfee as RDN/Generic PWS.y!vs and by Malwarebytes as Backdoor.Agent.E
ZangoOE (OEAddOn.exe)
絕對不需要的程式
nCase/Zango adware - detected by Malwarebytes as Adware.Zango. Also see the archived version of Andrew Clover's page. The file is typically located in %ProgramFiles%\Zango\bin\[version]
Zeno (nwinrqez.exe)
絕對不需要的程式
Added by unidentified malware. The file is located in %System%
zvb0dl2X8tt (NVUKZ.exe)
絕對不需要的程式
Detected by Sophos as Troj/Agent-LBS and by Malwarebytes as Worm.AutoRun
Zipbrowse (ocreg.exe)
絕對不需要的程式
Detected by Malwarebytes as Trojan.Agent. The file is located in %AppData%\Ieinit
zcproo (qssstiej.exe)
絕對不需要的程式
Possible homepage hijacker installing a toolbar: http://tdko.com/ ,Lop.com in disguise
zonealarm (removeme.exe)
絕對不需要的程式
Detected by Sophos as W32/Forbot-BG
Zonesoft Cleaner (rnsys.exe)
絕對不需要的程式
Added by a variant of W32/Sdbot.worm. The file is located in %System%
zt (rundll32.exe)
絕對不需要的程式
Detected by Sophos as Troj/Lineag-ABA. Note - this is not the legitimate rundll32.exe process, which is located in %Windir% (Me/98) or %System% (10/8/7/Vista/XP/2K/NT). This one is located in %Windir%\Intel
zhtngyzTdd (rundll32.exe)
絕對不需要的程式
Detected by Malwarebytes as Trojan.Agent. Note - this is not the legitimate rundll32.exe process, which is located in %Windir% (Me/98) or %System% (10/8/7/Vista/XP/2K/NT). This one is located in %UserTemp%
zsmscc (rundll32.exe zsmscc071001.dll mymain)
絕對不需要的程式
Detected by Trend Micro as TROJ_GENETIK.KQ. Note that rundll32.exe is a legitimate Microsoft file used to launch DLL file types and shouldn't be deleted. The "zsmscc071001.dll" file is located in %System%
zxcd (runr.exe)
絕對不需要的程式
Detected by Dr.Web as Trojan.DownLoader6.46754 and by Malwarebytes as Trojan.Yoddos
zsmscc (rundll32.exe [path] mycc071208.dll mymain)
絕對不需要的程式
Detected by Kaspersky as Trojan-Downloader.Win32.Agent.fzk. Note that rundll32.exe is a legitimate Microsoft file used to launch DLL file types and shouldn't be deleted. The "mycc071208.dll" file is located in %System%
Zenet (rundll32.exe [path] CNBabe.dll,DllStartup)
絕對不需要的程式
CommonName/Zenet search hijacker - see the archived version of Andrew Clover's page. Note that rundll32.exe is a legitimate Microsoft file used to launch DLL file types and shouldn't be deleted. The "CNBabe.dll" file is located in %ProgramFiles%\CommonName\Toolbar