Home > Articles > Security > Network Security

  • Print
  • + Share This

Detecting Spyware Autostart Methods in MS Windows-based Machines

Removing the autostart method is one of the most important steps in disinfection. If a system admin can remove the malware entry from autostart method used, the malware will fail to execute on reboot (even if the executable files have not been removed).

Following is a list of commonly used autostart methods for malware:

Autostart Folder

All items in the autostart folder will autostart.




Shell=Explorer.exe malware.exe



Registry Shell Open


A key with the value "%1 %*", will be executed each time you execute an .exe file. "malware.exe %1 %*" .

Alternate Registry Keys

[HKEY_CLASSES_ROOT\.exe] @="myexefile"]
[HKEY_LOCAL_MACHINE\Software\CLASSES\myexefile\shell\open\command\ @="malwaree.exe %1 %*"]

A batch file that autostarts with Windows.

Main Registry




This file is called upon when windows loads, it is then deleted.


When editing system.ini, pay careful attention to the Shell=Explorer.exe malware.exe line. Delete only the malware entry. Do not delete Explorer.exe; if you do, the system will not boot into windows.

An invaluable tool for system admins is Start_ups.exe. This program features more than 4000 different startup entries, and many are malware. System admins can use this tool to search for suspected spyware startup entries—avoiding damage caused by deleting legitimate entries. A non-OS-specific HTML version can be downloaded here; it has all the features of the executable, but can be run on all operating systems (that support HTML).

  • + Share This
  • 🔖 Save To Your Account

Related Resources

There are currently no related titles. Please check back later.