Просмотр кода страницы lo страница
**Оглавление ((/ПроцессыWindows Справочника))**
----
>>**| ((01 #)) | ((1 0-9)) | ((A)) | ((B)) | ((C)) | ((D)) | ((E)) | ((F)) | ((G)) | ((H)) | ((I)) | ((J)) | ((K)) | L | ((M)) | ((N)) | ((O)) | ((P)) | ((Q)) | ((R)) | ((S)) | ((T)) | ((U)) | ((V)) | ((W)) | ((X)) | ((Y)) | ((Z)) |**<<
====L==
----
**| ((la)) | lo |**
<#
<table border="1" width="100%">
<tr>
<tr align="center">
<td><b>Процесс</b></td>
<td><b>Статус</b></td>
<td><b>Приложение</b></td>
<td><b>Описание</b></td>
</tr>
<tr>
<td rowspan="2"><b>load.exe</b></td>
<td>Вирус</td>
<td><a href="http://www.viruslist.com/ru/viruses/encyclopedia?virusid=22799">I-Worm.Nimda</a></td>
<td>-</td>
</tr>
<tr>
<td><a href="http://wiki.compowiki.info/Spyware">Spyware</a></td>
<td><a href="http://www3.ca.com/securityadvisor/pest/pest.aspx?id=453075759">CWS</a><br>
<a href="http://www3.ca.com/securityadvisor/pest/pest.aspx?id=453074934">PeopleOnPage</a></td>
<td>-</td>
</tr>
<tr>
<td><b>load32.exe</b></td>
<td>Вирус</td>
<td><a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.bambo.html">W32.Bambo</a><br>
<a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.nibu.d.html">Backdoor.Nibu.D</a><br>
<a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.nibu.c.html">Backdoor.Nibu.C</a><br>
<a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.dumaru.b@mm.html">W32.Dumaru.B@mm</a><br>
<a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.dumaru.ai.html">W32.Dumaru.AI</a><br>
<a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.dumaru.m@mm.html">W32.Dumaru.M@mm</a><br>
<a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.nibu.b.html">Backdoor.Nibu.B</a><br>
<a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.nibu.html">Backdoor.Nibu</a><br>
<a href="http://www.viruslist.com/ru/viruses/encyclopedia?virusid=22128">I-Worm.Dumaru.a</a><br>
<a href="http://www.viruslist.com/ru/viruses/encyclopedia?virusid=22129">I-Worm.Dumaru.b</a><br>
<a href="http://www.viruslist.com/ru/viruses/encyclopedia?virusid=22130">I-Worm.Dumaru.c</a><br>
<a href="http://www3.ca.com/securityadvisor/pest/pest.aspx?id=453075311">SearchV</a></td>
<td>-</td>
</tr>
<tr>
<td><b>loadcashmeet.exe</b></td>
<td><a href="http://wiki.compowiki.info/Spyware">Spyware</a></td>
<td><a href="http://www3.ca.com/securityadvisor/pest/pest.aspx?id=59266">Lop.com</a></td>
<td>-</td>
</tr>
<tr>
<td><b>loaddll.exe</b></td>
<td><a href="http://wiki.compowiki.info/Spyware">Spyware</a></td>
<td><a href="http://securityresponse.symantec.com/avcenter/venc/data/spyware.winvest.html">Spyware.Winvest</a></td>
<td>-</td>
</tr>
<tr>
<td><b>loader.exe</b></td>
<td>Вирус</td>
<td><a href="http://securityresponse.symantec.com/avcenter/venc/data/downloader.tooncom.html">Downloader.Tooncom</a><br>
<a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.simali.html#technicaldetails">Backdoor.Simali</a><br>
<a href="http://www3.ca.com/securityadvisor/pest/pest.aspx?id=453075759">CWS</a><br>
<a href="http://www3.ca.com/securityadvisor/pest/pest.aspx?id=453080760">TrojanDropper.Win32.Small</a></td>
<td>-</td>
</tr>
<tr>
<td><b>loadkk.exe</b></td>
<td><a href="http://wiki.compowiki.info/Spyware">Spyware</a></td>
<td><a href="http://www3.ca.com/securityadvisor/pest/pest.aspx?id=453076373">KeyKey</a></td>
<td>-</td>
</tr>
<tr>
<td><b>loader_name.exe</b></td>
<td>Вирус</td>
<td><a href="http://www.viruslist.com/ru/viruses/encyclopedia?virusid=57346">I-Worm.Bagle.aa</a></td>
<td>-</td>
</tr>
<tr>
<td><b>loadqm.exe</b></td>
<td>Приложение</td>
<td>MSN Queue Manager Loader</td>
<td>-</td>
</tr>
<tr>
<td><b>loadwc.exe</b></td>
<td>Системный</td>
<td>Load WebCheck</td>
<td>???</td>
</tr>
<tr>
<td><b>loadwin.exe</b></td>
<td><a href="http://wiki.compowiki.info/Spyware">Spyware</a></td>
<td><a href="http://www3.ca.com/securityadvisor/pest/pest.aspx?id=453078790">Loadwin.exe</a></td>
<td>-</td>
</tr>
<tr>
<td><b>locator.exe</b></td>
<td>Системный</td>
<td>RPC Locator</td>
<td>Локатор удаленного вызова процедур</td>
</tr>
<tr>
<td><b>locker.exe</b></td>
<td><a href="http://wiki.compowiki.info/Spyware">Spyware</a></td>
<td><a href="http://www3.ca.com/securityadvisor/pest/pest.aspx?id=453079340">Locker</a></td>
<td>-</td>
</tr>
<tr>
<td><b>lockx.exe</b></td>
<td>Вирус</td>
<td><a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.loxbot.a.html">W32.Loxbot.A</a></td>
<td>-</td>
</tr>
<tr>
<td><b>log32zx.exe</b></td>
<td>Вирус</td>
<td><a href="http://www.hackzona.ru/hz.php?name=News&file=article&sid=3392"> W32.Mydoom.W@mm</a></td>
<td>-</td>
</tr>
<tr>
<td><b>loganalyser.exe</b></td>
<td><a href="http://wiki.compowiki.info/Spyware">Spyware</a></td>
<td><a href="http://www3.ca.com/securityadvisor/pest/pest.aspx?id=71065">Ultimate Spy Personal Edition</a></td>
<td>-</td>
</tr>
<tr>
<td><b>logger.exe</b></td>
<td><a href="http://wiki.compowiki.info/Spyware">Spyware</a></td>
<td><a href="http://securityresponse.symantec.com/avcenter/venc/data/spyware.hslablogger.html">Spyware.HSLABLogger</a></td>
<td>-</td>
</tr>
<tr>
<td><b>logic.exe</b></td>
<td>Вирус</td>
<td><a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.mytob.ic@mm.html">W32.Mytob.IC@mm</a></td>
<td>-</td>
</tr>
<tr>
<td><b>logo vc.exe</b></td>
<td><a href="http://wiki.compowiki.info/Spyware">Spyware</a></td>
<td> <a href="http://www3.ca.com/securityadvisor/pest/pest.aspx?id=59266">Lop.com</a></td>
<td>-</td>
</tr>
<tr>
<td><b>logon.exe</b></td>
<td>Вирус</td>
<td><a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.zins.b.html">Backdoor.Zins.B</a></td>
<td>-</td>
</tr>
<tr>
<td><b>logonui.exe</b></td>
<td>Системный</td>
<td>Microsoft Logon User Interface</td>
<td>-</td>
</tr>
<tr>
<td><b>logwatnt.exe</b></td>
<td>Приложение</td>
<td>Computer Associates</td>
<td>-</td>
</tr>
<tr>
<td><b>longonlineplay.exe</b></td>
<td><a href="http://wiki.compowiki.info/Spyware">Spyware</a></td>
<td><a href="http://www3.ca.com/securityadvisor/pest/pest.aspx?id=59266">Lop.com</a></td>
<td>-</td>
</tr>
<tr>
<td><b>lookupsys.exe</b></td>
<td>Вирус</td>
<td><a href="http://securityresponse.symantec.com/avcenter/venc/data/trojan.norio.html">Trojan.Norio</a></td>
<td>-</td>
</tr>
<tr>
<td><b>lopsearc.exe</b></td>
<td><a href="http://wiki.compowiki.info/Spyware">Spyware</a></td>
<td><a href="http://www3.ca.com/securityadvisor/pest/pest.aspx?id=59266">Lop.com</a></td>
<td>-</td>
</tr>
<tr>
<td><b>lopsearch.exe</b></td>
<td><a href="http://wiki.compowiki.info/Spyware">Spyware</a></td>
<td><a href="http://www3.ca.com/securityadvisor/pest/pest.aspx?id=59266">Lop.com</a></td>
<td>-</td>
</tr>
<tr>
<td><b>lorena.exe</b></td>
<td>Вирус</td>
<td><a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.mapson.c.worm.html">W32.Mapson.C.Worm</a></td>
<td>-</td>
</tr>
<tr>
<td><b>Lorraine.exe</b></td>
<td>Вирус</td>
<td><a href="http://www.viruslist.com/ru/viruses/encyclopedia?virusid=22599">I-Worm.Mapson.a</a></td>
<td>-</td>
</tr>
<tr>
<td><b>loudmove.exe</b></td>
<td><a href="http://wiki.compowiki.info/Spyware">Spyware</a></td>
<td><a href="http://www3.ca.com/securityadvisor/pest/pest.aspx?id=59266">Lop.com</a></td>
<td>-</td>
</tr>
<tr>
<td><b>loyftzhg.exe</b></td>
<td><a href="http://wiki.compowiki.info/Spyware">Spyware</a></td>
<td><a href="http://www3.ca.com/securityadvisor/pest/pest.aspx?id=59266">Lop.com</a></td>
<td>-</td>
</tr>
<tr>
<td><b>lp.exe</b></td>
<td>Вирус</td>
<td><a href="http://www3.ca.com/securityadvisor/pest/pest.aspx?id=453072543">RapidBlaster</a></td>
<td>-</td>
</tr>
<tr>
<td><b>lpr123.exe</b></td>
<td><a href="http://wiki.compowiki.info/Spyware">Spyware</a></td>
<td><a href="http://securityresponse.symantec.com/avcenter/venc/data/spyware.rempsteal.html">Spyware.RemPSteal</a></td>
<td>-</td>
</tr>
<tr>
<td><b>lrgluoot.exe</b></td>
<td><a href="http://wiki.compowiki.info/Spyware">Spyware</a></td>
<td><a href="http://www3.ca.com/securityadvisor/pest/pest.aspx?id=59266">Lop.com</a></td>
<td>-</td>
</tr>
<tr>
<td><b>lsas.exe</b></td>
<td>Троян</td>
<td><a href="http://www.boredguru.com/modules/newbb/viewtopic.php?topic_id=749&forum=24">W32/Agobot-LM</a></td>
<td>IRC Backdoor</td>
</tr>
<tr>
<td><b>lsasrv.exe</b></td>
<td>Вирус</td>
<td><a href="http://www.viruslist.com/ru/viruses/encyclopedia?virusid=70034">Email-Worm.Win32.Mydoom.ae</a><br>
<a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.mydoom.ag@mm.html">W32.Mydoom.AG@mm</a><br>
<a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.mydoom.ai@mm.html">W32.Mydoom.AI@mm</a><br>
<a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.netsky.al@mm.html">W32.Netsky.AL@mm</a><br>
<a href="http://www.hackzona.ru/hz.php?name=News&file=article&sid=4607">W32.Netsky.AL@mm</a><br>
<a href="http://www.hackzona.ru/hz.php?name=News&file=article&sid=4020">W32.Mydoom.AM@mm</a>
</td>
<td>Email-Worm.Win32.Mydoom.ae - вирус-червь, распространяющийся через интернет в виде файлов, прикрепленных к зараженным письмам, а также по сетям файлообмена.</td>
</tr>
<tr>
<td rowspan="3"><b>lsass.exe</b></td>
<td>Системный</td>
<td><a href="https://mywebpc.ru/windows/lsass-exe/">Local Security Authority Service</a></td>
<td>Служба подсистемы локальной безопасности работает как компонент политики безопасности Windows 10. Выполняет проверку пользователя на сервере, изменение пароля и аутентификацию пользователя во время входа в систему или выхода из системы. lsass.exe активируется, когда запускается winlogon.exe, и если пароль верный, он передает полномочия, или показывает сообщение, что пароль не совпадает. Расположение файла Lsass.exe всегда является путь C:\Windows\System32.</td>
</tr>
<tr>
<td>Вирус</td>
<td><a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.irc.aladinz.f.html">Backdoor.IRC.Aladinz.F</a><br>
<a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.ahker.g@mm.html">W32.Ahker.G@mm</a><br>
<a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.ahker.n@mm.html">W32.Ahker.N@mm</a></td>
<td>-</td>
</tr>
<tr>
<td><a href="http://wiki.compowiki.info/Spyware">Spyware</a></td>
<td><a href="http://www3.ca.com/securityadvisor/pest/pest.aspx?id=453077594">OnTarget 1.2.1</a></td>
<td>-</td>
</tr>
<tr>
<td><b>lsassx.exe</b></td>
<td>Вирус</td>
<td><a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.kelvir.e.html">W32.Kelvir.E</a><br>
<a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.kelvir.c.html">W32.Kelvir.C</a></td>
<td>-</td>
</tr>
<tr>
<td><b>lsess.exe</b></td>
<td>Вирус</td>
<td><a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.sinnaka.a@mm.html">W32.Sinnaka.A@mm</a></td>
<td>-</td>
</tr>
<tr>
<td><b>LSMAS.exe</b></td>
<td>Вирус</td>
<td><a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.gaobot.ajj.html">W32.Gaobot.AJJ</a></td>
<td>-</td>
</tr>
<tr>
<td><b>lsocnmju.exe</b></td>
<td><a href="http://wiki.compowiki.info/Spyware">Spyware</a></td>
<td><a href="http://www3.ca.com/securityadvisor/pest/pest.aspx?id=59266">Lop.com</a></td>
<td>-</td>
</tr>
<tr>
<td><b>lspmonitor.exe</b></td>
<td><a href="http://wiki.compowiki.info/Spyware">Spyware</a></td>
<td><a href="http://www.securemost.com/articles/trou_3_remove_eanthology.htm">eAnthology</a></td>
<td>-</td>
</tr>
<tr>
<td><b>lssas.exe</b></td>
<td><a href="http://wiki.compowiki.info/Spyware">Spyware</a></td>
<td><a href="http://sarc.com/avcenter/venc/data/pf/adware.easysearch.html">Adware.EasySearch</a></td>
<td>-</td>
</tr>
<tr>
<td><b>lsvchost.exe</b></td>
<td>Вирус</td>
<td><a href="http://www.symantec.com/avcenter/venc/data/trojan.webus.d.html">Trojan.Webus.D</a></td>
<td>-</td>
</tr>
<tr>
<td><b>lsvr.exe</b></td>
<td><a href="http://wiki.compowiki.info/Spyware">Spyware</a></td>
<td><a href="http://www3.ca.com/securityadvisor/pest/pest.aspx?id=453074932">PowerStrip</a></td>
<td>-</td>
</tr>
<tr>
<td><b>ltdmgr.exe</b></td>
<td><a href="http://wiki.compowiki.info/Spyware">Spyware</a></td>
<td><a href="http://securityresponse.symantec.com/avcenter/venc/data/adware.pstrip.html">Adware.PStrip</a><br>
<a href="http://www3.ca.com/securityadvisor/pest/pest.aspx?id=453074932">PowerStrip</a></td>
<td>-</td>
</tr>
<tr>
<td><b>ltie.exe</b></td>
<td><a href="http://wiki.compowiki.info/Spyware">Spyware</a></td>
<td><a href="http://www3.ca.com/securityadvisor/pest/pest.aspx?id=453088359">TrojanDownloader.Win32.PurityScan</a></td>
<td>-</td>
</tr>
<tr>
<td><b>luall.exe</b></td>
<td>Приложение</td>
<td>Symantec LiveUpdate</td>
<td>-</td>
</tr>
<tr>
<td><b>lucoms.exe</b></td>
<td>Приложение</td>
<td>Symantec Internet Security Suite</td>
<td>-</td>
</tr>
<tr>
<td><b>lucomserver.exe</b></td>
<td>Приложение</td>
<td>Live Update Server</td>
<td>-</td>
</tr>
<tr>
<td><b>lvcoms.exe</b></td>
<td>Приложение</td>
<td>Logitech QuickCam</td>
<td>-</td>
</tr>
<tr>
<td><b>LVCOMSX.EXE</b></td>
<td>Приложение</td>
<td>Logitech Multimedia</td>
<td>-</td>
</tr>
<tr>
<td><b>lvsrev.exe</b></td>
<td>Вирус</td>
<td><a href="http://securityresponse.symantec.com/avcenter/venc/data/pwsteal.flecsip.b.html">PWSteal.Flecsip.B</a></td>
<td>-</td>
</tr>
<tr>
<td><b>lxmstart.exe</b></td>
<td>Вирус</td>
<td><a href="http://www.pestpatrol.com/pestinfo/t/trojan_win32_starter.asp">Trojan.Win32.Starter</a></td>
<td>-</td>
</tr>
<tr>
<td><b>lxsupmon.exe</b></td>
<td>Приложение</td>
<td>Lexmark Monitor</td>
<td>-</td>
</tr>
</table>
#>
**| ((la)) | lo |**
----
>>**| ((01 #)) | ((1 0-9)) | ((A)) | ((B)) | ((C)) | ((D)) | ((E)) | ((F)) | ((G)) | ((H)) | ((I)) | ((J)) | ((K)) | L | ((M)) | ((N)) | ((O)) | ((P)) | ((Q)) | ((R)) | ((S)) | ((T)) | ((U)) | ((V)) | ((W)) | ((X)) | ((Y)) | ((Z)) |**<<
----
>>((OfflineВерсия Скачать offline-версию Справочника)).<<