Emsisoft HiJackFree

Support

Über uns

Auszeichnung


ZDNet.de - Download des Tages

ZDNet.de - Download des Tages


NBC Giga - Tool of the Day

NBC Giga - Tool of the Day


Tipp der Redaktion

Tipp der Redaktion



Autorun Information: (Default)

Name: (Default)
Aufruf: media_driver.exe
Status: Definitely not required. Usually Malware.
Beschreibung: Added by the TUPEG VIRUS! Note - this malware actually changes the value data of the "(Default)" key in HKLM\Run in order to force Windows to launch it at boot. The name field in MSConfig may be blank

Name: (Default)
Aufruf: Shania.vbs
Status: Definitely not required. Usually Malware.
Beschreibung: Added by the SHANIA BACKDOOR! Note - this malware actually changes the value data of the "(Default)" key in HKLM\Run in order to force Windows to launch it at boot. The name field in MSConfig may be blank

Name: (Default)
Aufruf: NOTEPAD.exe
Status: Definitely not required. Usually Malware.
Beschreibung: Added by the RUSTY WORM! Note - not to be confused with the valid Windows "NOTEPAD" text editor! Note - this malware actually changes the value data of the "(Default)" key in HKLM\Run in order to force Windows to launch it at boot. The name field in MSConfig may be blank

Name: (Default)
Aufruf: [random filename].exe
Status: Definitely not required. Usually Malware.
Beschreibung: Added by the BLACKMAL WORM! Note - this malware actually changes the value data of the "(Default)" key in HKLM\Run and HKLM\RunServices in order to force Windows to launch it at boot. The name field in MSConfig may be blank

Name: (Default)
Aufruf: twunk_32.exe
Status: Definitely not required. Usually Malware.
Beschreibung: Added by the BLACKMAL.C WORM! Note - this malware actually changes the value data of the "(Default)" key in HKLM\Run in order to force Windows to launch it at boot. The name field in MSConfig may be blank

Name: (Default)
Aufruf: winhelp.exe
Status: Definitely not required. Usually Malware.
Beschreibung: Added by the BLACKMAL.C WORM! Note - this malware actually changes the value data of the "(Default)" key in HKLM\Run in order to force Windows to launch it at boot. The name field in MSConfig may be blank

Name: (Default)
Aufruf: spolsvr2.exe
Status: Definitely not required. Usually Malware.
Beschreibung: Added by the EVILSOCK.10 TROJAN! Note - this malware actually changes the value data of the "(Default)" key in HKLM\Run in order to force Windows to launch it at boot. The name field in MSConfig may be blank

Name: (Default)
Aufruf: winbas12.exe
Status: Definitely not required. Usually Malware.
Beschreibung: Adware, CoolWebSearch parasite related - detected by Kaspersky as the VB.DU TROJAN! Note - this malware actually changes the value data of the "(Default)" key in HKLM\Run in order to force Windows to launch it at boot. The name field in MSConfig may be blank

Name: (Default)
Aufruf: Systrsy.exe
Status: Definitely not required. Usually Malware.
Beschreibung: Added by the CDTRAY TROJAN! Note - this malware actually changes the value data of the "(Default)" key in HKLM\Run in order to force Windows to launch it at boot. The name field in MSConfig may be blank

Name: (Default)
Aufruf: llsass.exe
Status: Definitely not required. Usually Malware.
Beschreibung: Added by the PROXY-GG TROJAN! Note - this malware actually changes the value data of the "(Default)" key in HKLM\Run in order to force Windows to launch it at boot. The name field in MSConfig may be blank

Name: (Default)
Aufruf: syspol.exe
Status: Definitely not required. Usually Malware.
Beschreibung: Added by the DREMN-B TROJAN! Note - this malware actually changes the value data of the "(Default)" key in HKCU\Run in order to force Windows to launch it at boot. The name field in MSConfig may be blank

Name: (default)
Aufruf: winlog.exe
Status: Definitely not required. Usually Malware.
Beschreibung: Added by the RBOT-CVY WORM! Note - this malware actually changes the value data of the "(Default)" key in HKLM\Run and HKLM\RunServices in order to force Windows to launch it at boot. The name field in MSConfig may be blank

Name: (default)
Aufruf: rundll32.exe [path to DLL file],Do98Work
Status: Definitely not required. Usually Malware.
Beschreibung: Added by the HESIVE.B TROJAN! Note that rundll32.exe is a legitimate Microsoft file used to launch DLL file types and shouldn't be deleted. Note - this malware actually changes the value data of the "(Default)" key in HKCU\Run, HKLM\Run and HKLM\RunServices in order to force Windows to launch it at boot. The name field in MSConfig may be blank

Name: (Default)
Aufruf: winligom.exe
Status: Definitely not required. Usually Malware.
Beschreibung: Added by the RBOT-GAI WORM! Note - this malware actually changes the value data of the "(Default)" key in HKCU\Run, HKLM\Run and HKLM\RunServices in order to force Windows to launch it at boot. The name field in MSConfig may be blank

Name: (Default)
Aufruf: 5640.exe
Status: Definitely not required. Usually Malware.
Beschreibung: Added by the DOWNLD-ABF TROJAN! Note - this malware actually changes the value data of the "(Default)" key in HKCU\Run, HKLM\Run and HKLM\RunServices in order to force Windows to launch it at boot. The name field in MSConfig may be blank

Name: (Default)
Aufruf: ajsha5.exe
Status: Definitely not required. Usually Malware.
Beschreibung: Added by the SPYBOT-NX WORM! Note - this malware actually changes the value data of the "(Default)" key in HKLM\Run, HKLM\RunServices and HKCU\Run in order to force Windows to launch it at boot. The name field in MSConfig may be blank

Name: (Default)
Aufruf: QQUpdate.exe
Status: Definitely not required. Usually Malware.
Beschreibung: Added by the QUADRULE.A WORM! Note - this malware actually changes the value data of the "(Default)" key in HKLM\Run in order to force Windows to launch it at boot. The name field in MSConfig may be blank

Name: (Default)
Aufruf: Mcafee.exe
Status: Definitely not required. Usually Malware.
Beschreibung: Added by the AGENT.AY TROJAN! Note - this is not a valid McAfee program and is located in %System%. This malware actually changes the value data of the "(Default)" key in HKCU\Run in order to force Windows to launch it at boot. The name field in MSConfig may be blank

Name: (Default)
Aufruf: fada.exe
Status: Definitely not required. Usually Malware.
Beschreibung: Added by the VB.HEI TROJAN! Note - this malware actually changes the value data of the "(Default)" key in HKLM\Run, HKLM\RunServices and HKCU\Run in order to force Windows to launch it at boot. The name field in MSConfig may be blank

Name: (Default)
Aufruf: Default.exe
Status: Definitely not required. Usually Malware.
Beschreibung: Added by the AUTORUN.BUK WORM! Note - this malware actually changes the value data of the "(Default)" key in HKLM\RunOnce & HKCU\RunOnce in order to force Windows to launch it at boot. The name field in MSConfig may be blank

Name: (Default)
Aufruf: KEYBOARD.exe
Status: Definitely not required. Usually Malware.
Beschreibung: Added by the AUTORUN.BUK WORM! Note - this malware actually changes the value data of the "(Default)" key in HKLM\Run in order to force Windows to launch it at boot. The name field in MSConfig may be blank

Name: (Default)
Aufruf: msarti.com
Status: Definitely not required. Usually Malware.
Beschreibung: Added by the SILLYFDC.CJ WORM! Note - this malware actually changes the value data of the "(Default)" key in HKLM\..\Policies\Explorer\Run in order to force Windows to launch it at boot. The name field in MSConfig may be blank

Name: (Default)
Aufruf: gbpm.exe
Status: Definitely not required. Usually Malware.
Beschreibung: Added by the DLOADR.ZZD WORM! Note - this malware actually changes the value data of the "(Default)" key in HKLM\Run in order to force Windows to launch it at boot. The name field in MSConfig may be blank

Name: (Default)
Aufruf: msnupdate.exe
Status: Definitely not required. Usually Malware.
Beschreibung: Added by the RBOT-GWT BACKDOOR! Note - this malware actually changes the value data of the "(Default)" key in HKLM\Run & HKLM\RunServices in order to force Windows to launch it at boot. The name field in MSConfig may be blank

Name: (Default)
Aufruf: regedit.exe /s appboost.reg
Status: Definitely not required. Usually Malware.
Beschreibung: Added by the APPIX.D WORM! Note - this malware actually changes the value data of the "(Default)" key in HKLM\Run and HKCU\RunServices in order to force Windows to launch it at boot. The name field in MSConfig may be blank. The Windows registry editor (regedit.exe) is a legitimate Microsoft file located in %Windir% and shouldn't be deleted. The file "appboost.reg" is located in %Windir%

Name: (Default)
Aufruf: xtreme.exe
Status: Definitely not required. Usually Malware.
Beschreibung: Added by the DROPR-CZ TROJAN! Note - this malware actually changes the value data of the "(Default)" key in HKLM\Run in order to force Windows to launch it at boot. The name field in MSConfig may be blank

Name: (default)
Aufruf: WINLOGON.EXE
Status: Definitely not required. Usually Malware.
Beschreibung: Added by the DELF-LP TROJAN! Note - this malware actually changes the value data of the "(default)" key in HKCU\Policies\Explorer\Run in order to force Windows to launch it at boot. The name field in MSConfig may be blank

Name: (Default)
Aufruf: diagcfg.exe
Status: Definitely not required. Usually Malware.
Beschreibung: Added by the GWGIRL BACKDOOR! Note - this malware actually changes the value data of the "(Default)" key in HKLM\RunServices in order to force Windows to launch it at boot. The name field in MSConfig may be blank

Name: (Default)
Aufruf: asdfsd343f.exe
Status: Definitely not required. Usually Malware.
Beschreibung: Added by the AUTORUN-BBB WORM! Note - this malware actually changes the value data of the "(Default)" key in HKLM\Run in order to force Windows to launch it at boot. The name field in MSConfig may be blank

Name: (default)
Aufruf: svchost.exe
Status: Definitely not required. Usually Malware.
Beschreibung: Added by the AUTORUN-CN WORM! Note - this is not the legitimate svchost.exe process which is always located in %System% and should not normally figure in Msconfig/Startup! This one is located in a %ProgramFiles%\Common Files\Services. Note - this malware actually changes the value data of the "(Default)" key in HKLM\Run in order to force Windows to launch it at boot. The name field in MSConfig may be blank

Name: (Default)
Aufruf: avg.exe
Status: Definitely not required. Usually Malware.
Beschreibung: Added by the BANKER-ETV TROJAN! Note - this malware actually changes the value data of the "(Default)" key in HKLM\Run in order to force Windows to launch it at boot. The name field in MSConfig may be blank

Name: (Default)
Aufruf: axeWen.exe
Status: Definitely not required. Usually Malware.
Beschreibung: Added by the SCAR-AL WORM! Note - this malware actually changes the value data of the "(Default)" key in HKLM\Run in order to force Windows to launch it at boot. The name field in MSConfig may be blank

Name: (Default)
Aufruf: ifconfig.exe
Status: Definitely not required. Usually Malware.
Beschreibung: Added by the RBOT-GFW WORM! Note - this malware actually changes the value data of the "(Default)" key in HKLM\Run, HKLM\RunServices and HKCU\Run in order to force Windows to launch it at boot. The name field in MSConfig may be blank

Name: (Default)
Aufruf: winweng.exe
Status: Definitely not required. Usually Malware.
Beschreibung: Added by the AGENT-SB MALWARE! Note - this malware actually changes the value data of the "(Default)" key in HKLM\Run in order to force Windows to launch it at boot. The name field in MSConfig may be blank

Name: (Default)
Aufruf: ctmon.exe
Status: Definitely not required. Usually Malware.
Beschreibung: Added by the BANCOS.AAN TROJAN! Note - this malware actually changes the value data of the "(Default)" key in HKLM\Run in order to force Windows to launch it at boot. The name field in MSConfig may be blank

Zurück zur Autorun-Liste

Diese Autorun Daten werden Ihnen präsentiert in Zusammenarbeit mit Sysinfo.org

Tipp: Emsisoft Anti-Malware - Testsieger!

Testsieg für Emsisoft Anti-Malware beim Antiviren-Vergleichstest von MRG - Malware Research Group - Juni 2009
Mehr über den Testsieger erfahren