Windows Startup Entries, Symbol: [(]

! | ' | $ | % | ( | * | , | - | . | / | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | \ | space | ? | @ | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | ^ | _ | {

(Default)

File Name: fada.exe
Description:
Added by the External: VB.HEI TROJAN! Note - this malware actually changes the value data of the "(Default)" key in HKLM\Run, HKLM\RunServices and HKCU\Run in order to force Windows to launch it at boot. The name field in MSConfig may be blank
Bad startup (0) | Good startup (0) | (0)

(Default)

File Name: Default.exe
Description:
Added by the External: AUTORUN.BUK WORM! Note - this malware actually changes the value data of the "(Default)" key in HKLM\RunOnce & HKCU\RunOnce in order to force Windows to launch it at boot. The name field in MSConfig may be blank
Bad startup (0) | Good startup (0) | (0)

(Default)

File Name: KEYBOARD.exe
Description:
Added by the External: AUTORUN.BUK WORM! Note - this malware actually changes the value data of the "(Default)" key in HKLM\Run in order to force Windows to launch it at boot. The name field in MSConfig may be blank
Bad startup (0) | Good startup (0) | (0)

(Default)

File Name: msarti.com
Description:
Added by the External: SILLYFDC.CJ WORM! Note - this malware actually changes the value data of the "(Default)" key in HKLM\..\Policies\Explorer\Run in order to force Windows to launch it at boot. The name field in MSConfig may be blank
Bad startup (0) | Good startup (0) | (0)

(Default)

File Name: gbpm.exe
Description:
Added by the External: DLOADR.ZZD WORM! Note - this malware actually changes the value data of the "(Default)" key in HKLM\Run in order to force Windows to launch it at boot. The name field in MSConfig may be blank
Bad startup (0) | Good startup (0) | (0)

(Default)

File Name: msnupdate.exe
Description:
Added by the External: RBOT-GWT BACKDOOR! Note - this malware actually changes the value data of the "(Default)" key in HKLM\Run & HKLM\RunServices in order to force Windows to launch it at boot. The name field in MSConfig may be blank
Bad startup (0) | Good startup (0) | (0)

(Default)

File Name: regedit.exe /s appboost.reg
Description:
Added by the External: APPIX.D WORM! Note - this malware actually changes the value data of the "(Default)" key in HKLM\Run and HKCU\RunServices in order to force Windows to launch it at boot. The name field in MSConfig may be blank. The Windows registry editor (External: regedit.exe) is a legitimate Microsoft file located in %Windir% and shouldn't be deleted. The file "appboost.reg" is located in %Windir%
Bad startup (0) | Good startup (0) | (0)

(Default)

File Name: xtreme.exe
Description:
Added by the External: DROPR-CZ TROJAN! Note - this malware actually changes the value data of the "(Default)" key in HKLM\Run in order to force Windows to launch it at boot. The name field in MSConfig may be blank
Bad startup (0) | Good startup (0) | (0)

(default)

File Name: WINLOGON.EXE
Description:
Added by the External: DELF-LP TROJAN! Note - this malware actually changes the value data of the "(default)" key in HKCU\Policies\Explorer\Run in order to force Windows to launch it at boot. The name field in MSConfig may be blank
Bad startup (0) | Good startup (0) | (0)

(Default)

File Name: diagcfg.exe
Description:
Added by the External: GWGIRL BACKDOOR! Note - this malware actually changes the value data of the "(Default)" key in HKLM\RunServices in order to force Windows to launch it at boot. The name field in MSConfig may be blank
Bad startup (0) | Good startup (0) | (0)
1 | 2 | 3 | 4