Here is a list of the malware names and their meanings that are displayed after the 360 antivirus scan is complete for user reference.
name |
Description |
virus program |
virus is defined by copying from A malicious program that infects other normal files, infected files can be restored to normal by purging the virus, and some of the infected files cannot be purged, and it is recommended that you remove the file and reinstall the application. |
Trojan horse program |
> Trojan is a kind of disguised as normal file Malicious software, usually by stealth means to obtain the right to run, and then steal the user's privacy information, or other malicious acts. |
theft Trojan |
> This is a way to steal online games, silver Line, credit card and other accounts for the main purpose of the Trojan program. |
advertising software |
Adware is often used to pass windows or Open the browser page to display ads to users, in addition, it will monitor the user's advertising browsing behavior, thus popping more "relevant" ads. Adware is usually bundled with free software and installed together with free software. |
worm |
A malicious program copied to another computer on the network, unlike a common virus, usually does not infect other programs on the computer, but rather steals confidential information on other computers.。 |
Backdoor program |
> Backdoor procedure refers to a user who does not know A program that connects remotely to a user's computer and gets permission to operate. |
suspicious program |
suspicious procedure means a third party installation and A program that is potentially risky. Although the program itself is harmless, experience has shown that such programs have a higher likelihood of being used for malicious purposes than normal programs, often with HTTP and socks proxies, remote management programs, and so on. Such programs can usually be installed without the user's knowledge, and will be completely hidden from the user after installation |
test code |
|
malicious program |
|