Index Introduction Database Detailed Entries Updates Concise List HJT Forums Rogues Message Board

Windows startup programs - Browse database

If you're frustrated with the time it takes your Windows 10/8/7/Vista/XP PC to boot and then it seems to be running slowly you may have too many programs running at start-up - and you have come to the right place to identify them. This is the original start-up programs (as opposed to processes/tasks) list - one of the most accurate and comprehensive. Services are not included - see below. For further information on this and how to identify and disable start-up programs please visit the Introduction page.

See here for further information on random entries - which are typically added by viruses and other malware or unwanted programs.

Last database update :- 30th November, 2017
52420 listed

Entries are sorted by the Command/Data field. Alternatively, you can search the full database or use the alphabetical index on that page.

FIRST PREV ( Page 1047 of 1049 ) NEXT LAST

You can also manually change the page number in the address bar.

Startup Item or Name Status Command or Data Description Tested
[UserName] - HostX[UserName]-host.EXEDetected by Malwarebytes as Trojan.Banker.USR. The file is located in %AppData%\[UserName]-hostNo
[UserName]X[UserName]-PC.exeDetected by Malwarebytes as Trojan.Banker. The file is located in %AppData%\[UserName]-HOSTNo
Microsoft Update 2.5X[UserName].exeDetected by Malwarebytes as Backdoor.Bot. The file is located in %AppData%No
Microsoft RunX[UserName].exeDetected by Malwarebytes as Trojan.Agent.MRGen. The file is located in %LocalAppData%No
[UserName]X[UserName].exeDetected by Malwarebytes as Trojan.LVBP. The file is located in %UserProfile%No
[UserName].exeU[UserName].exeDetected by Malwarebytes as PUP.Optional.HomeTask. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows starts. If bundled with another installer or not installed by choice then remove itNo
[UserName]-PCX[UserName].exeDetected by Malwarebytes as Trojan.Agent.DMAGen. The file is located in %AppData%No
Vaganza-XPloit-[UserName]X[UserName].exeDetected by Symantec as W32.Gavgent.ANo
Local-Settings-of-[UserName]X[UserName].exeDetected by Symantec as W32.Gavgent.ANo
Microsoft DefenderX[UserName]Controle.exeDetected by McAfee as RDN/Generic PUP.x and by Malwarebytes as Trojan.Downloader.DWNGen. The file is located in %CommonAppData%No
Microsoft DefenderX[UserName]Controle.exeDetected by McAfee as RDN/Generic Downloader.x and by Malwarebytes as Trojan.Downloader.DWNGen. The file is located in %LocalAppData%No
Microsoft DefenderX[UserName]Processo.exeDetected by Sophos as Troj/MSIL-BNW and by Malwarebytes as Trojan.Downloader.DWNGenNo
Microsoft DefenderX[UserName]Rapid.exeDetected by Malwarebytes as Trojan.Downloader.DWNGen. The file is located in %CommonAppData% or %CommonAppData%\[UserName]FoldNo
Microsoft DefenderX[UserName]Safe.exeDetected by Sophos as Troj/Zbot-JLX and by Malwarebytes as Trojan.Downloader.DWNGenNo
WinDefenseX[UserName]Salva.exeDetected by Malwarebytes as Trojan.Banker. The file is located in %CommonAppData%\QuickTimeNo
Microsoft Update 1.0X[UserName]_Control.exeDetected by Malwarebytes as Backdoor.Bot. The file is located in %LocalAppData%No
Microsoft Update 2.0X[UserName]_Control.exeDetected by Dr.Web as Trojan.PWS.Banker1.14653 and by Malwarebytes as Backdoor.BotNo
Microsoft RunX[UserName]_Control.exeDetected by Malwarebytes as Trojan.Agent.MRGen. The file is located in %LocalAppData%No
[user]NV1X[user]-SysPluginv*.exeDetected by Malwarebytes as Trojan.Agent.Gen. The file is located in %AppData%\Microsoft\[user]No
[user]NV[random]X[user]SysPluginv*.exeDetected by Malwarebytes as Spyware.Banker. The file is located in %AppData%\[user]No
[user]NV7R1X[user]SysPluginv*.exeDetected by Malwarebytes as Trojan.Delf. The file is located in %AppData%\[user]No
[random numbers]X[user][random numbers]svhost.exeDetected by Malwarebytes as Trojan.Agent.USV. The file is located in %Root%\Users (10/8/7/Vista) or %Root%\Documents and Settings (XP)No
exampleX[variable].exeDetected by Symantec as Backdoor.Nuclear. The file is located in %Windir%\NRNo
Update for WindowsX[various filenames]Detected by Sophos as W32/Lerpa-A. Note - the file name will be one of the following common.exe, common.pif, common.scr, Sexo.exe, Sexo.jpg.pif, ini_file__.pif, load_me__.tmp, msfile.pif, system_load_.pif or zipped.rar.pifNo
SystemEmergencyX[various filenames]CoolWebSearch Smartsearch parasite variant. Also detected as the GOWEH.A WORM! Typical filenames include internet.exe, systeem.exe, explore.exe and directx.exeNo
Dll Boot Loader on Startup (do not remove this)X[various filenames]Added by unidentified malware. The file is located in %System%No
MicrosoftWindowsX[various filenames]Detected by Microsoft as Trojan:Win32/Goweh.F and by Malwarebytes as Trojan.Agent.GenNo
SNInstallX[various filenames]SpySheriff rogue spyware remover - not recommended, removal instructions here. File names spotted include VXH8JKDQ2.EXE, NS6281400.so, CVXH8JKDQ2.EXE, down3.exe, sefe.exe, winstall.exe and tool2.exeNo
Service PackX[various filenames]Detected by Sophos as W32/Lerpa-A. Note - the file name will be one of the following common.exe, common.pif, common.scr, Sexo.exe, Sexo.jpg.pif, ini_file__.pif, load_me__.tmp, msfile.pif, system_load_.pif or zipped.rar.pifNo
Visual Element FX5X[various filenames]ClearStream Accelerator adwareNo
PrivateNetX[various filenames]Premium rate Adult content dialerNo
ZStartX[various filenames]VX2.Transponder parasite updater/installer relatedNo
WinzipX[various filenames]Detected by Sophos as W32/Lerpa-A. Note - the file name will be one of the following common.exe, common.pif, common.scr, Sexo.exe, Sexo.jpg.pif, ini_file__.pif, load_me__.tmp, msfile.pif, system_load_.pif or zipped.rar.pifNo
clockX[various filenames]LiveChat Adware - known file names include: mssetup.exe, kstatus.exe, spoolsv.exe, sptsupd.exe, osk.exe, msswchx.exe, netdde.exe, msbkup.exeNo
coolwebprogramX[various filenames]CoolWebSearch Smartsearch parasite variant. Typical filenames include internet.exe, systeem.exe, explore.exe and directx.exe. Detected by Microsoft as Trojan:Win32/Goweh.ENo
Windows System Cleaner 2012X[various].scrDetected by Malwarebytes as Trojan.Agent. The file is located in %AppData%No
[virus name].exeX[virus name].exeDetected by Dr.Web as Trojan.AVKill.3582 and by Malwarebytes as Backdoor.StormSyn.Gen. The file is located in %AppData%\Sysutils_Update - see examples here and hereNo
[Windows username].exeX[Windows username].exeDetected by Malwarebytes as Backdoor.Agent - see here. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows startsNo
Services004X[worm filename]Detected by Symantec as W32.Bugbros@mmNo
SysPrntX[worm filename]Added by the DEGNAX WORM!No
InterceptedSystemX[worm filename]Detected by Sophos as W32/Anacon-B. Note - the filename is SysAna32.exe, Anacon.exe or Syspoly32.exe and is located in %System%No
Win2DrvX[worm filename]Detected by Symantec as W32.Wintoo.WormNo
CompliantX[worm filename]Detected by Sophos as W32/Rbot-LBNo
Microsoft Update MachineX[worm filename]Detected by Sophos as W32/Rbot-GWD and by Malwarebytes as Backdoor.BotNo
Windows System ServiceX[worm filename]Detected by Trend Micro as WORM_RBOT.XGNo
risingX[worm filename]Detected by Sophos as W32/AutoRun-AWNo
MSN Message Background loaderX[worm filename]Detected by Sophos as W32/Rbot-AIENo
rdvsX[worm filename]Detected by Trend Micro as WORM_ULTIMAX.BNo
Config LoaderX[worm filename]Detected by Sophos as W32/Agobot-AENo
Msgsvc32X[worm filename]Detected by Sophos as W32/Nautical-A. The file is located in %System%No

 

FIRST PREV ( Page 1047 of 1049 ) NEXT LAST

You can also manually change the page number in the address bar.

Notes & Warnings

If you can help identify new entries and verify/identify those entries with a "?" status (especially hardware specific - such as laptops and motherboards) then please E-mail us (startups_at_pacs-portal_dot_co_dot_uk).

"Status" key:

Variables:

DISCLAIMER: It is assumed that users are familiar with the operating system they are using and comfortable with making the suggested changes. We will not be held responsible if changes you make cause a system failure.

WARNING: This is NOT a list of tasks/processes taken from the Task Manager (CTRL+SHIFT+ESC) "Processes" tab. This displays some startup programs AND other background tasks and "Services". These pages are concerned with startup programs from the common startup locations shown above ONLY. Please do not submit entries collected from this method as they will not be used. For a list of tasks/processes you should try the list at PC Pitstop, the Process Library from Uniblue or one of the many others now available.

Therefore, before ending a task/process via CTRL+SHIFT+ESC just because it has an "X" recommendation, please check whether it's in the registry or common startup locations first. An example would be "svchost.exe" - which doesn't appear in either under normal conditions but does via CTRL+SHIFT+ESC. If in doubt, don't do anything.

To avoid the database becoming too large, all malware entries are only shown using the registry version which is common to all Windows versions. Otherwise there would be multiple entries for popular filenames that viruses often use - such as "svchost.exe" above for example. Multiple malware can also use the same start-up entries, in this case only those with significant differences (such as file location) are repeated in this database.

As more than 25K entries in this database related to malware you should use a quality internet security package. Which ever you choose, keep it updated and get the latest version at least every two years.

There are a number of virus and malware entries listed in this database where specific removal instructions haven't been given. If this is the case then you could try ComboFix, a program written by sUBs that can remove many different types of Trojans and Worms. See here for a tutorial on how to use the program.

NOTE: A number of entries are repeated due to the way that different operating systems display startup items. For example, WinMe lists "POPROXY.EXE" as "Norton eMail Protect" in both MSCONFIG and the registry whereas WinXP lists it as "Poproxy" in MSCONFIG and "Norton eMail Protect" in the registry.

SERVICES: "Services" from the Windows 8/7/Vista/XP/2K/NT operating systems are not included. We fully understand that some programs with these OS's use "Services" as an alternative to load their component parts at startup but these are handled in a different way. We recommend you try BlackViper for information on services for the relevant operating systems.

Copyright

Presentation, format & comments Copyright © 2001 - 2017 Pacman's Portal
Portions Copyright © Peter Forrest, Denny Denham, Sylvain Prevost, Tony Klein, CastleCops & Bleeping Computer
Powered by Malwarebytes
All rights reserved

Valid XHTML 1.0 Transitional

Privacy Policy Site Map Home