Просмотр кода страницы V страница
**Оглавление ((/ПроцессыWindows Справочника))**
----
>>**| ((01 #)) | ((1 0-9)) | ((A)) | ((B)) | ((C)) | ((D)) | ((E)) | ((F)) | ((G)) | ((H)) | ((I)) | ((J)) | ((K)) | ((L)) | ((M)) | ((N)) | ((O)) | ((P)) | ((Q)) | ((R)) | ((S)) | ((T)) | ((U)) | V | ((W)) | ((X)) | ((Y)) | ((Z)) |**<<
<#
<h2>V</h2>
<table border="1" width="100%" cellspacing="0">
<tr>
<tr align="center">
<td><b>Процесс</b></td>
<td><b>Статус</b></td>
<td><b>Приложение</b></td>
<td><b>Описание</b></td>
</tr>
<tr>
<td><b>vagrnocker-client12.exe</b></td>
<td><a href="http://wiki.compowiki.info/Spyware">Spyware</a></td>
<td><a href="http://www3.ca.com/securityadvisor/pest/pest.aspx?id=45372">Vagrnocker 1.2</a></td>
<td>-</td>
</tr>
<tr>
<td><b><nobr>vagrnocker-server12.exe</nobr></b></td>
<td><a href="http://wiki.compowiki.info/Spyware">Spyware</a></td>
<td><a href="http://www3.ca.com/securityadvisor/pest/pest.aspx?id=45372">Vagrnocker 1.2</a></td>
<td>-</td>
</tr>
<tr>
<td><b>VB6.EXE</b></td>
<td>Вирус</td>
<td><a href="http://www.viruslist.com/ru/viruses/encyclopedia?virusid=70377">IM-Worm.Win32.VB.a</a><br>
<a href="http://www.hackzona.ru/hz.php?name=News&file=article&sid=3921">W32.Mugly.D@mm</a></td>
<td>IM-Worm.Win32.VB.a - Вирус-червь, распространяющийся по сетям интернет при помощи интернет-пейджера MSN Messenger.</td>
</tr>
<tr>
<td><b>vbserver.exe</b></td>
<td><a href="http://wiki.compowiki.info/Spyware">Spyware</a></td>
<td><a href="http://www3.ca.com/securityadvisor/pest/pest.aspx?id=453068279">Keylogger DLL</a></td>
<td>-</td>
</tr>
<tr>
<td><b>v young.exe</b></td>
<td><a href="http://wiki.compowiki.info/Spyware">Spyware</a></td>
<td><a href="http://www3.ca.com/securityadvisor/pest/pest.aspx?id=3816">Mosucker</a></td>
<td>-</td>
</tr>
<tr>
<td><b>vbouncerinner.exe</b></td>
<td><a href="http://wiki.compowiki.info/Spyware">Spyware</a></td>
<td><a href="http://www3.ca.com/securityadvisor/pest/pest.aspx?id=453076771">Virtual Bouncer</a></td>
<td>-</td>
</tr>
<tr>
<td><b>vcatch.exe</b></td>
<td><a href="http://wiki.compowiki.info/Spyware">Spyware</a></td>
<td><a href="http://www3.ca.com/securityadvisor/pest/pest.aspx?id=453086263">VCatch 3.0</a></td>
<td>-</td>
</tr>
<tr>
<td><b>vctadpi7099.exe</b></td>
<td><a href="http://wiki.compowiki.info/Spyware">Spyware</a></td>
<td><a href="http://www3.ca.com/securityadvisor/pest/pest.aspx?id=453086263">VCatch 3.0</a></td>
<td>-</td>
</tr>
<tr>
<td><b>vdt_16.exe</b></td>
<td>Вирус</td>
<td><a href="http://www.hackzona.ru/hz.php?name=News&file=article&sid=3530">Backdoor.Haxdoor.C</a></td>
<td>-</td>
</tr>
<tr>
<td><b>veloz.exe</b></td>
<td><a href="http://wiki.compowiki.info/Spyware">Spyware</a></td>
<td><a href="http://www.securemost.com/articles/trou_3_remove_eanthology.htm">eAnthology</a></td>
<td>-</td>
</tr>
<tr>
<td><b>veloz_enu_msi9x.exe</b></td>
<td><a href="http://wiki.compowiki.info/Spyware">Spyware</a></td>
<td><a href="http://www.securemost.com/articles/trou_3_remove_eanthology.htm">eAnthology</a></td>
<td>-</td>
</tr>
<tr>
<td><b>velozsys.exe</b></td>
<td><a href="http://wiki.compowiki.info/Spyware">Spyware</a></td>
<td><a href="http://www.securemost.com/articles/trou_3_remove_eanthology.htm">eAnthology</a></td>
<td>-</td>
</tr>
<tr>
<td><b>ver 4.0.2.exe</b></td>
<td><a href="http://wiki.compowiki.info/Spyware">Spyware</a></td>
<td><a href="http://www3.ca.com/securityadvisor/pest/pest.aspx?id=453076396">MSN Messenger Exploit</a></td>
<td>-</td>
</tr>
<tr>
<td><b>VERCLSID.EXE</b></td>
<td>Приложение</td>
<td><a href="http://support.microsoft.com/kb/918165/ru">Компонент патча MS06-015</a></td>
<td>Проверяет расширения оболочки перед тем как они пропишутся в Windows Shell или Windows Explorer. На некоторых компьютерах VERCLSID.EXE перестает отвечать на запросы пользователей. Проблема присутствует в системах, в которых установлены некоторые программы для работы с принтерами, сканерами и фотоаппаратами Hewlett-Packard. Также известно о конфликте с Kerio Personal Firewall. Возможны также конфликты с другими программами.
</td>
</tr>
<tr>
<td><b>version.exe</b></td>
<td><a href="http://wiki.compowiki.info/Spyware">Spyware</a></td>
<td><a href="http://www3.ca.com/securityadvisor/pest/pest.aspx?id=453075481">Unknown Pest</a></td>
<td>-</td>
</tr>
<tr>
<td><b>vestufck.exe</b></td>
<td><a href="http://wiki.compowiki.info/Spyware">Spyware</a></td>
<td><a href="http://www3.ca.com/securityadvisor/pest/pest.aspx?id=59266">Lop.com</a></td>
<td>-</td>
</tr>
<tr>
<td><b>vfthrcbr.exe</b></td>
<td><a href="http://wiki.compowiki.info/Spyware">Spyware</a></td>
<td><a href="http://www3.ca.com/securityadvisor/pest/pest.aspx?id=59266">Lop.com</a></td>
<td>-</td>
</tr>
<tr>
<td><b>vga admin.exe</b></td>
<td><a href="http://wiki.compowiki.info/Spyware">Spyware</a></td>
<td><a href="http://www3.ca.com/securityadvisor/pest/pest.aspx?id=59266">Lop.com</a></td>
<td>-</td>
</tr>
<tr>
<td><b>vi.exe</b></td>
<td><a href="http://wiki.compowiki.info/Spyware">Spyware</a></td>
<td><a href="http://www3.ca.com/securityadvisor/pest/pest.aspx?id=453075326">Virutek</a></td>
<td>-</td>
</tr>
<tr>
<td><b>VIDACCEL.EXE</b></td>
<td>Вирус</td>
<td><a href="http://www.viruslist.com/ru/viruses/encyclopedia?virusid=19603">Win16.Apparition.a</a></td>
<td>-</td>
</tr>
<tr>
<td><b>videoaction_se.exe</b></td>
<td><a href="http://wiki.compowiki.info/Spyware/Dialer">Dialer</a></td>
<td><a href="http://www.securemost.com/articles/trou_3_remove_autosearch.htm">AutoSearch</a></td>
<td>-</td>
</tr>
<tr>
<td><b>videodrv.exe</b></td>
<td>Вирус</td>
<td><a href="http://www.viruslist.com/ru/viruses/encyclopedia?virusid=22633">I-Worm.Mimail.a</a><br>
<a href="http://www.viruslist.com/ru/viruses/encyclopedia?virusid=22636">I-Worm.Mimail.d</a><br>
<a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.mimail.a@mm.html ">W32.Mimail.A@mm</a></td>
<td>Вирус-червь. Распространяется через интернет в виде файлов, прикрепленных к зараженным письмам.</td>
</tr>
<tr>
<td><b>videomgr.exe</b></td>
<td>Вирус</td>
<td><a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.pandem.c.worm.html">W32.Pandem.C.Worm</a></td>
<td>-</td>
</tr>
<tr>
<td><b>videons32.exe</b></td>
<td>Вирус</td>
<td><a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.gaobot.azt.html">W32.Gaobot.AZT</a></td>
<td>-</td>
</tr>
<tr>
<td><b>videosd32.exe</b></td>
<td>Вирус</td>
<td><a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.ircbot.g.html">W32.IRCBot.G</a></td>
<td>-</td>
</tr>
<tr>
<td><b>view.exe</b></td>
<td><a href="http://wiki.compowiki.info/Spyware">Spyware</a></td>
<td><a href="http://securityresponse.symantec.com/avcenter/venc/data/spyware.pcacme.b.html">Spyware.PCAcme.B</a><br>
<a href="http://www3.ca.com/securityadvisor/pest/pest.aspx?id=453074386">Orbit</a><br>
<a href="http://www3.ca.com/securityadvisor/pest/pest.aspx?id=453068071">Xupiter</a><br>
<a href="http://securityresponse.symantec.com/avcenter/venc/data/adware.orbitexplorer.html">Adware.OrbitExplorer</a></td>
<td>-</td>
</tr>
<tr>
<td><b>view_sex_now.exe</b></td>
<td><a href="http://wiki.compowiki.info/Spyware">Spyware</a></td>
<td><a href="http://www3.ca.com/securityadvisor/pest/pest.aspx?id=453072536">MoneyTree</a></td>
<td>-</td>
</tr>
<tr>
<td><b>virtualbouncer.exe</b></td>
<td><a href="http://wiki.compowiki.info/Spyware">Spyware</a></td>
<td><a href="http://www3.ca.com/securityadvisor/pest/pest.aspx?id=453076771">Virtual Bouncer</a></td>
<td>-</td>
</tr>
<tr>
<td><b>virumake.exe</b></td>
<td><a href="http://wiki.compowiki.info/Spyware">Spyware</a></td>
<td><a href="http://www3.ca.com/securityadvisor/pest/pest.aspx?id=5806">MosuckeSubSeven 2.2r</a></td>
<td>-</td>
</tr>
<tr>
<td><b>virus_cleaner.exe</b></td>
<td>Вирус</td>
<td><a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.panol@mm.html">W32.Panol@mm</a></td>
<td>-</td>
</tr>
<tr>
<td><b>virutasm.exe</b></td>
<td><a href="http://wiki.compowiki.info/Spyware">Spyware</a></td>
<td><a href="http://www3.ca.com/securityadvisor/pest/pest.aspx?id=5806">MosuckeSubSeven 2.2r</a></td>
<td>-</td>
</tr>
<tr>
<td><b>vividgal.exe</b></td>
<td><a href="http://wiki.compowiki.info/Spyware">Spyware</a></td>
<td><a href="http://www3.ca.com/securityadvisor/pest/pest.aspx?id=453075481">Unknown Pest</a></td>
<td>-</td>
</tr>
<tr>
<td><b>vividgalut.exe<b></td>
<td><a href="http://wiki.compowiki.info/Spyware">Spyware</a></td>
<td><a href="http://www3.ca.com/securityadvisor/pest/pest.aspx?id=453077019">VividGalut</a></td>
<td>-</td>
</tr>
<tr>
<td><b>vizigoth.exe<b></td>
<td><a href="http://wiki.compowiki.info/Spyware">Spyware</a></td>
<td><a href="http://www3.ca.com/securityadvisor/pest/pest.aspx?id=453093387">Win32/IRC.Flood!Trojan</a></td>
<td>-</td>
</tr>
<tr>
<td><b>vlluafrq.exe</b></td>
<td><a href="http://wiki.compowiki.info/Spyware">Spyware</a></td>
<td><a href="http://www3.ca.com/securityadvisor/pest/pest.aspx?id=59266">Lop.com</a></td>
<td>-</td>
</tr>
<tr>
<td><b>vpataszc.exe</b></td>
<td><a href="http://wiki.compowiki.info/Spyware">Spyware</a></td>
<td><a href="http://www3.ca.com/securityadvisor/pest/pest.aspx?id=453077027">Unknown BHO</a></td>
<td>-</td>
</tr>
<tr>
<td><b>vpc32.exe</b></td>
<td>Приложение</td>
<td>Symantec Internet Security Suite</td>
<td>-</td>
</tr>
<tr>
<td><b>vpinst.exe</b></td>
<td><a href="http://wiki.compowiki.info/Spyware">Spyware</a></td>
<td><a href="http://www3.ca.com/securityadvisor/pest/pest.aspx?id=453077027">Unknown BHO</a></td>
<td>-</td>
</tr>
<tr>
<td><b>vptray.exe</b></td>
<td>Приложение</td>
<td>Norton AntiVirus</td>
<td>-</td>
</tr>
<tr>
<td><b>vqloqv.exe</b></td>
<td><a href="http://wiki.compowiki.info/Spyware">Spyware</a></td>
<td><a href="http://www.viruslist.com/ru/viruses/encyclopedia?virusid=93859">Worm.Win32.Eyeveg.m</a></td>
<td>Собирает нажатия клавиш, пароли и др. конфиденциальные данные и отсылает их на адрес автора.</td>
</tr>
<tr>
<td><b>vshwin32.exe</b></td>
<td>Приложение</td>
<td>McAfee VirusScan</td>
<td>-</td>
</tr>
<tr>
<td><b>vsmon.exe</b></td>
<td>Приложение</td>
<td>ZoneAlarm</td>
<td>-</td>
</tr>
<tr>
<td><b>vsstat.exe</b></td>
<td>Приложение</td>
<td>McAfee VirusScan</td>
<td>-</td>
</tr>
<tr>
<td><b>vssvc.exe</b></td>
<td>Системный</td>
<td>Volume Shadow Copy</td>
<td>Управляет созданием теневых копий дисковых томов, которые используются для архивации и восстановления или для других целей.</td>
</tr>
<tr>
<td><b>vstskmgr.exe</b></td>
<td>Приложение</td>
<td>McAfee Internet Security Suite</td>
<td>-</td>
</tr>
<tr>
<td><b>VTTimer.exe</b></td>
<td>Драйвер</td>
<td>VIA Graphics Card Driver</td>
<td>-</td>
</tr>
<tr>
<td><b>VVSN.exe</b></td>
<td><a href="http://wiki.compowiki.info/Spyware/Adware">Adware</a></td>
<td><a href="http://www.liutilities.com/products/wintaskspro/processlibrary/VVSN/">WhenU adware</a></td>
<td>Рекламный модуль, ставится в нагрузку к некоторым программам</td>
</tr>
<tr>
<td><b>vvuijoe.exe</b></td>
<td><a href="http://wiki.compowiki.info/Spyware">Spyware</a></td>
<td><a href="http://www3.ca.com/securityadvisor/pest/pest.aspx?id=3816">Mosucker</a></td>
<td>-</td>
</tr>
<tr>
<td><b>vxdmgr32.exe</b></td>
<td>Вирус</td>
<td><a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.nibu.c.html">Backdoor.Nibu.C</a><br>
<a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.dumaru@mm.html">W32.Dumaru@mm</a><br>
<a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.dumaru.b@mm.html">W32.Dumaru.B@mm</a><br>
<a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.dumaru.ai.html">W32.Dumaru.AI</a><br>
<a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.dumaru.m@mm.html">W32.Dumaru.M@mm</a><br>
<a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.nibu.b.html">Backdoor.Nibu.B</a><br>
<a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.nibu.html">Backdoor.Nibu</a><br>
<a href="http://www.viruslist.com/ru/viruses/encyclopedia?virusid=22128">I-Worm.Dumaru.a</a><br>
<a href="http://www.viruslist.com/ru/viruses/encyclopedia?virusid=22129">I-Worm.Dumaru.b</a><br>
<a href="http://www.viruslist.com/ru/viruses/encyclopedia?virusid=22130">I-Worm.Dumaru.c</a><br>
<a href="http://www3.ca.com/securityadvisor/pest/pest.aspx?id=453075311">SearchV</a></td>
<td>-</td>
</tr>
<tr>
<td><b>vxst.exe</b></td>
<td>Вирус</td>
<td><a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.nopir.a.html">W32.Nopir.A</a><br>
<a href="http://www.viruslist.com/ru/viruses/encyclopedia?virusid=79247">P2P-Worm.Win32.VB.cz</a></td>
<td>-</td>
</tr>
<tr>
<td><b>vygaeifz.exe</b></td>
<td><a href="http://wiki.compowiki.info/Spyware">Spyware</a></td>
<td><a href="http://www3.ca.com/securityadvisor/pest/pest.aspx?id=59266">Lop.com</a></td>
<td>-</td>
</tr>
<tr>
<td><b>vyz1.exe</b></td>
<td><a href="http://wiki.compowiki.info/Spyware">Spyware</a></td>
<td><a href="http://www3.ca.com/securityadvisor/pest/pest.aspx?id=59266">Lop.com</a></td>
<td>-</td>
</tr>
<tr>
<td><b>vzmhfjyb.exe</b></td>
<td><a href="http://wiki.compowiki.info/Spyware">Spyware</a></td>
<td><a href="http://www3.ca.com/securityadvisor/pest/pest.aspx?id=59266">Lop.com</a></td>
<td>-</td>
</tr>
</table>
#>
>>**| ((01 #)) | ((1 0-9)) | ((A)) | ((B)) | ((C)) | ((D)) | ((E)) | ((F)) | ((G)) | ((H)) | ((I)) | ((J)) | ((K)) | ((L)) | ((M)) | ((N)) | ((O)) | ((P)) | ((Q)) | ((R)) | ((S)) | ((T)) | ((U)) | V | ((W)) | ((X)) | ((Y)) | ((Z)) |**<<
----
>>((OfflineВерсия Скачать offline-версию Справочника)).<<