Windows Startup Programs database Startup Programs - Dangerous - O
Home
Features  
   On-line Guide
   Help On-line
   Screenshots

Order
Download  
    Localization
Awards
Support  
   NI Forum
   Mickey Forum
   Greatis Forum

Startup Programs
Application Database

Hot!
Download:
RegRun 4.0 beta 2

What's new?

Greatis Home


Subscribe:

The Application Database suggests you which Windows startup programs are usefual and which are bad.
The recommended tool for quickly removing the useless programs is RegRun Startup Optimizer.
www.startupapps.com


Get RegRun now! Buy Now! Purchase RegRun Suite
Download Download RegRun Suite
Search Database for:

RegRun > Greatis Startup Application Database > Dangerous > O

Dangerous 

odbc.exe
odjiwjf.exe
olemon32.exe
oleproc.exe
onz.exe
optimize.exe
opwinclient.exe
orcmw.exe
otcxxh.exe
otms.exe
oxiioifr.exe
oxney.vbs

odbc.exe
Telecommando trojan

odjiwjf.exe
W32/Rbot-DN
It is a worm which attempts to spread to remote network shares.
It also contains backdoor Trojan functionality, allowing unauthorised remote access to the infected computer via IRC channels.
Copies itself to the Windows System32 folder as ODJIWJF.EXE

Manual removal:
Locate the HKEY_LOCAL_MACHINE entries:
HKLM\Software\Microsoft\Windows\CurrentVersion\Run
HKLM\Software\Microsoft\Windows\CurrentVersion\RunServices
and remove any reference to ODJIWJF.EXE.

olemon32.exe
Remote Access / FTP server / CQ trojan
InCommand can bind (join or wrap) its server to any other .exe file, and can also add extra legth to it to avoid searches on specific file length. It uses selfinstalling plug-ins to add features to the trojan and can thousands of icons stored inside the EditServer file.

oleproc.exe
Remote Access / Novell NetWare trojan
Donald Dick looks like Donald Duck as a fat and smoking decadent Soviet Spetsnaz soldier.

onz.exe
Remote Access / ActiveX trojan / Downloading trojan / Worm / Mail trojan / IRC trojan / Virus / Network trojan
By just viewing a HTML file or reading a mail a trojan can be downloaded to the users computer. As of now it installs The Thing 1.6 server. Spreads through MS Outlook, shared drives and IRC.

optimize.exe
Spyware
Changes browser home page.
http://www.2-spyware.com/remove-internet...
Remove it from Windows startup.

opwinclient.exe
Remote Access
Alters Win.ini and System.ini.

orcmw.exe
Remote Access
May alter System.ini and/or Win.ini. One can choose to let Mosucker randomly decide what autostart method to use. Produces an error message while installing ""Could not find setuplog.bat"" which apparently is used for autostarting. It copies itself to $temp first, as a file named pkg*.exe, ""pkg"" being a fix string. It also copied itself to $windows/unin0686.exe.

otcxxh.exe
Backdoor.Carool is a Backdoor Trojan horse that allows unauthorized remote access your computer.
The Trojan also installs a keylogger and steals cached passwords.

Creates the following files:
%System%\OTCXXH.EXE
%System%\zpvkkom.dll
%System%\fpxjjgd.dll
%System%\keussm.dll
%System%\bdphhwls.tmp

Executes the OTCXXH.EXE file.

Adds the value: "otcx"="%System%\otcxxh.exe"
to the registry key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Connects to a predetermined URL and uploads a keystroke log.

Listens for connections from the remote attacker on random TCP ports.
If they connect, an attacker can perform any of these following actions:
- Logs keystrokes
- Steals .pwl files
- Opens and closes the CD-ROM drive

RegRun Startup Optimizer will help you to remove this trojan.

otms.exe
Greeting card spammer.
Full remove instructions:
http://www.permissionedmedia.com/support...

When the Control Panel window opens, double-click on the Add/Remove Programs icon.
When the Add/Remove Programs Properties window opens, locate "WinSrv Reg" in the list of installed programs

oxiioifr.exe
Remote Access
May alter System.ini and/or Win.ini. One can choose to let Mosucker randomly decide what autostart method to use. Produces an error message while installing ""Could not find setuplog.bat"" which apparently is used for autostarting. It copies itself to $temp first, as a file named pkg*.exe, ""pkg"" being a fix string. It also copied itself to $windows/unin0686.exe.

oxney.vbs
VBS.Yeno@mm is a mass-mailing worm that sends itself to all the email addresses that it finds in the Microsoft Outlook Address Book.
The email has the following characteristics:
Subject: Fw: give some ...
Attachment: Variable file name.
This worm also adds comments to .vbs, .vbe, .htm, and .html files in the root folder of the C drive.

Creates a copy of itself as %System%\Oxney.vbs and sets the System attribute.

Adds the value: "SPINX" = "Oxney.vbs"
to the registry key: HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run

Adds the value: "SPINX" = "why you'r still drunk ???"
to the registry key: HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion

Adds the following comment to all the .vbs and .vbe files that it finds in the root of the C drive.
'I'm sorry friend, I have no money !!
Adds other comments to all the .htm and .html files that it finds in the root of the C drive.

Automatic removal:
Use RegRun Startup Optimizer.

Copyright © 1998-2004 Greatis Software | Privacy Policy | Recommend to a friend