Startup Entries

Powered by: sysinfo.org

! | ' | $ | % | ( | * | , | - | . | / | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | \ | space | ? | @ | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | ^ | _ | {
he3e3fc4
(0) | (0) | (0)
File Name: rundll32.exe he3e3fc4.dll, EnableRunDLL32
Description:
LZIO.com adware downloader. Note that rundll32.exe is a legitimate Microsoft file used to launch DLL file types and shouldn't be deleted. The "he3e3fc4.dll" file is found in %System%
Hekio Startups
(0) | (0) | (0)
File Name: Hnksvc32.exe
Description:
Added by the AGOBOT-QE WORM!
HELLBOT TEST
(0) | (0) | (0)
File Name: 1hellbot.exe
Description:
Added by the MYDOOM.BO WORM!
HELLBOT3
(0) | (0) | (0)
File Name: coolbot.exe
Description:
Added by the MYTOB.AB WORM!
hellfire
(0) | (0) | (0)
File Name: svchost.exe
Description:
Added by the LEOX.D TROJAN! Note - this is not the legitimate svchost.exe process which is always located in %System% and should not normally figure in Msconfig/Startup! This one is located in %Windir%
hellodolly
(0) | (0) | (0)
File Name: shost.exe
Description:
Added by the YODO WORM!
HelloInt
(0) | (0) | (0)
File Name: hello3.exe
Description:
Added by the CASAL.A TROJAN!
helloserv
(0) | (0) | (0)
File Name: helloserv.exe
Description:
Added by the ZHELATI.BHA WORM!
helloworld
(0) | (0) | (0)
File Name: nb32ext2.exe
Description:
Added by the MYDOOM.BV WORM!
helloworld
(0) | (0) | (0)
File Name: nb32ext3.exe
Description:
Added by the MYTOB.JT WORM!
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | 46 | 47 | 48 | 49