Windows Startup Entries, Symbol: [(]

! | ' | $ | % | ( | * | , | - | . | / | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | \ | space | ? | @ | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | ^ | _ | {

(Default)

File Name: Systrsy.exe
Description:
Added by the External: CDTRAY TROJAN! Note - this malware actually changes the value data of the "(Default)" key in HKLM\Run in order to force Windows to launch it at boot. The name field in MSConfig may be blank
Bad startup (0) | Good startup (0) | (0)

(Default)

File Name: llsass.exe
Description:
Added by the External: PROXY-GG TROJAN! Note - this malware actually changes the value data of the "(Default)" key in HKLM\Run in order to force Windows to launch it at boot. The name field in MSConfig may be blank
Bad startup (0) | Good startup (0) | (0)

(Default)

File Name: syspol.exe
Description:
Added by the External: DREMN-B TROJAN! Note - this malware actually changes the value data of the "(Default)" key in HKCU\Run in order to force Windows to launch it at boot. The name field in MSConfig may be blank
Bad startup (0) | Good startup (0) | (0)

(default)

File Name: winlog.exe
Description:
Added by the External: RBOT-CVY WORM! Note - this malware actually changes the value data of the "(Default)" key in HKLM\Run and HKLM\RunServices in order to force Windows to launch it at boot. The name field in MSConfig may be blank
Bad startup (0) | Good startup (0) | (0)

(default)

File Name: rundll32.exe [path to DLL file],Do98Work
Description:
Added by the External: HESIVE.B TROJAN! Note that External: rundll32.exe is a legitimate Microsoft file used to launch DLL file types and shouldn't be deleted. Note - this malware actually changes the value data of the "(Default)" key in HKCU\Run, HKLM\Run and HKLM\RunServices in order to force Windows to launch it at boot. The name field in MSConfig may be blank
Bad startup (0) | Good startup (0) | (0)

(Default)

File Name: winligom.exe
Description:
Added by the External: RBOT-GAI WORM! Note - this malware actually changes the value data of the "(Default)" key in HKCU\Run, HKLM\Run and HKLM\RunServices in order to force Windows to launch it at boot. The name field in MSConfig may be blank
Bad startup (0) | Good startup (0) | (0)

(Default)

File Name: 5640.exe
Description:
Added by the External: DOWNLD-ABF TROJAN! Note - this malware actually changes the value data of the "(Default)" key in HKCU\Run, HKLM\Run and HKLM\RunServices in order to force Windows to launch it at boot. The name field in MSConfig may be blank
Bad startup (0) | Good startup (0) | (0)

(Default)

File Name: ajsha5.exe
Description:
Added by the External: SPYBOT-NX WORM! Note - this malware actually changes the value data of the "(Default)" key in HKLM\Run, HKLM\RunServices and HKCU\Run in order to force Windows to launch it at boot. The name field in MSConfig may be blank
Bad startup (0) | Good startup (0) | (0)

(Default)

File Name: QQUpdate.exe
Description:
Added by the External: QUADRULE.A WORM! Note - this malware actually changes the value data of the "(Default)" key in HKLM\Run in order to force Windows to launch it at boot. The name field in MSConfig may be blank
Bad startup (0) | Good startup (0) | (0)

(Default)

File Name: Mcafee.exe
Description:
Added by the External: AGENT.AY TROJAN! Note - this is not a valid McAfee program and is located in %System%. This malware actually changes the value data of the "(Default)" key in HKCU\Run in order to force Windows to launch it at boot. The name field in MSConfig may be blank
Bad startup (0) | Good startup (0) | (0)
1 | 2 | 3 | 4