These locations are often exploited by viruses to gain control of the system as soon as possible at startup, thus damaging the user's computer.
These self-starting locations include:
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsNTCurrentVersionWinlogonUserinit
Multiple programs can run with commas. The comma after userinit.exe cannot be omitted.
HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesExplorerRun
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionPoliciesExplorerRun
HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRunServicesOnce
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionRunServicesOnce
HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRunServices
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows CurrentVersionRunServices
HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRun
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionRun
HKEY_CURRENT_USERSoftwareMicrosoftWindowsNTCurrentVersionWindowsload
HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRunOnce
There may be other locations where self-starting programs exist.
When we suspect that the system has a trojan virus, these locations need to be carefully checked, and we can often find clues to create conditions for us to better scan and kill the trojan virus.
When the system is normal, some of the key values mentioned above may not exist. If there are any suspicious items, we recommend that you promptly handle them.