Startup Entries

! | ' | $ | % | ( | * | , | - | . | / | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | \ | space | ? | @ | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | ^ | _ | {
(*)API Machine
File Name: winSOCKS.exe
Description:
Homepage hijacker, see External: here (* = any digit)
(0) | (0) | (0)
(*)Run
File Name: win32API.exe
Description:
Homepage hijacker, see External: here (* = any digit)
(0) | (0) | (0)
(Default)
File Name: media_driver.exe
Description:
Added by the External: TUPEG VIRUS! Note - this malware actually changes the value data of the "(Default)" key in HKLM\Run in order to force Windows to launch it at boot. The name field in MSConfig may be blank
(0) | (0) | (0)
(Default)
File Name: Shania.vbs
Description:
Added by the External: SHANIA BACKDOOR! Note - this malware actually changes the value data of the "(Default)" key in HKLM\Run in order to force Windows to launch it at boot. The name field in MSConfig may be blank
(0) | (0) | (0)
(Default)
File Name: NOTEPAD.exe
Description:
Added by the External: RUSTY WORM! Note - not to be confused with the valid Windows "NOTEPAD" text editor! Note - this malware actually changes the value data of the "(Default)" key in HKLM\Run in order to force Windows to launch it at boot. The name field in MSConfig may be blank
(0) | (0) | (0)
(Default)
File Name: [random filename].exe
Description:
Added by the External: BLACKMAL WORM! Note - this malware actually changes the value data of the "(Default)" key in HKLM\Run and HKLM\RunServices in order to force Windows to launch it at boot. The name field in MSConfig may be blank
(0) | (0) | (0)
(Default)
File Name: twunk_32.exe
Description:
Added by the External: BLACKMAL.C WORM! Note - this malware actually changes the value data of the "(Default)" key in HKLM\Run in order to force Windows to launch it at boot. The name field in MSConfig may be blank
(0) | (0) | (0)
(Default)
File Name: winhelp.exe
Description:
Added by the External: BLACKMAL.C WORM! Note - this malware actually changes the value data of the "(Default)" key in HKLM\Run in order to force Windows to launch it at boot. The name field in MSConfig may be blank
(0) | (0) | (0)
(Default)
File Name: spolsvr2.exe
Description:
Added by the EVILSOCK.10 TROJAN! Note - this malware actually changes the value data of the "(Default)" key in HKLM\Run in order to force Windows to launch it at boot. The name field in MSConfig may be blank
(0) | (0) | (0)
(Default)
File Name: winbas12.exe
Description:
Adware, External: CoolWebSearch parasite related - detected by External: Kaspersky as the VB.DU TROJAN! Note - this malware actually changes the value data of the "(Default)" key in HKLM\Run in order to force Windows to launch it at boot. The name field in MSConfig may be blank
(0) | (0) | (0)
1 | 2 | 3 | 4