Startup Entries

Powered by: sysinfo.org

! | ' | $ | % | ( | * | , | - | . | / | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | \ | space | ? | @ | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | ^ | _ | {
LoadWatcher
(0) | (0) | (0)
File Name: Test.exe
Description:
Reportedly part of a webcam surveillance program that's supposed to test SMTP dialling in the event of an alert? Is this correct?
LoadWatcher
(0) | (0) | (0)
File Name: watcher.exe
Description:
Watcher spyware
loadwin
(0) | (0) | (0)
File Name: winset.exe
Description:
Added by the QQPASS-I TROJAN!
loadwin
(0) | (0) | (0)
File Name: winsys.exe
Description:
Added by the QQPASS-J TROJAN!
LoadWindowsFile
(0) | (0) | (0)
File Name: Kernel32.exe
Description:
Added by the DELF.B BACKDOOR!
Local Area Network
(0) | (0) | (0)
File Name: OpenGL.exe
Description:
Added by a variant of the RBOT WORM!
Local Authority Service
(0) | (0) | (0)
File Name: lsass.exe
Description:
Added by the MARKTMAN-C TROJAN! Note - this is not the legitimate lsass.exe process which is always located in %System% and should not normally figure in Msconfig/Startup! This one is located in %Windir%
Local Internet Connection
(0) | (0) | (0)
File Name: LIC.exe
Description:
Added by the SDBOT-YA WORM!
LOCAL INTERNET WEB DRIVERS FOR WIN32
(0) | (0) | (0)
File Name: phqghume.exe
Description:
Added by a variant of the RBOT WORM!
Local Page
(0) | (0) | (0)
File Name: http://find.naupoint.com
Description:
Naupoint browser hijacker
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | 46 | 47 | 48 | 49 | 50 | 51 | 52 | 53 | 54 | 55 | 56 | 57 | 58 | 59 | 60 | 61 | 62 | 63 | 64 | 65 | 66 | 67 | 68