This document describes the most common load points that are used by malicious software. These files or registry locations allows running the malware automatically once you log on or start the machine etc.            ## Startup folders (including all users)- The file stored inside of these folders will be executed after user logs on. -#HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\User […]