Startup Entries

Powered by: sysinfo.org

! | ' | $ | % | ( | * | , | - | . | / | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | \ | space | ? | @ | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | ^ | _ | {
(*)API Machine
(0) | (0) | (0)
File Name: winSOCKS.exe
Description:
Homepage hijacker, see here (* = any digit)
(*)Run
(0) | (0) | (0)
File Name: win32API.exe
Description:
Homepage hijacker, see here (* = any digit)
(Default)
(0) | (0) | (0)
File Name: media_driver.exe
Description:
Added by the TUPEG VIRUS! Note - this malware actually changes the value data of the "(Default)" key in HKLM\Run in order to force Windows to launch it at boot. The name field in MSConfig may be blank
(Default)
(0) | (0) | (0)
File Name: Shania.vbs
Description:
Added by the SHANIA BACKDOOR! Note - this malware actually changes the value data of the "(Default)" key in HKLM\Run in order to force Windows to launch it at boot. The name field in MSConfig may be blank
(Default)
(0) | (0) | (0)
File Name: NOTEPAD.exe
Description:
Added by the RUSTY WORM! Note - not to be confused with the valid Windows "NOTEPAD" text editor! Note - this malware actually changes the value data of the "(Default)" key in HKLM\Run in order to force Windows to launch it at boot. The name field in MSConfig may be blank
(Default)
(0) | (0) | (0)
File Name: [random filename].exe
Description:
Added by the BLACKMAL WORM! Note - this malware actually changes the value data of the "(Default)" key in HKLM\Run and HKLM\RunServices in order to force Windows to launch it at boot. The name field in MSConfig may be blank
(Default)
(0) | (0) | (0)
File Name: twunk_32.exe
Description:
Added by the BLACKMAL.C WORM! Note - this malware actually changes the value data of the "(Default)" key in HKLM\Run in order to force Windows to launch it at boot. The name field in MSConfig may be blank
(Default)
(0) | (0) | (0)
File Name: winhelp.exe
Description:
Added by the BLACKMAL.C WORM! Note - this malware actually changes the value data of the "(Default)" key in HKLM\Run in order to force Windows to launch it at boot. The name field in MSConfig may be blank
(Default)
(0) | (0) | (0)
File Name: spolsvr2.exe
Description:
Added by the EVILSOCK.10 TROJAN! Note - this malware actually changes the value data of the "(Default)" key in HKLM\Run in order to force Windows to launch it at boot. The name field in MSConfig may be blank
(Default)
(0) | (0) | (0)
File Name: winbas12.exe
Description:
Adware, CoolWebSearch parasite related - detected by Kaspersky as the VB.DU TROJAN! Note - this malware actually changes the value data of the "(Default)" key in HKLM\Run in order to force Windows to launch it at boot. The name field in MSConfig may be blank
1 | 2 | 3 | 4