Index Introduction Database Detailed Entries Updates Concise List HJT Forums Rogues Message Board

Windows startup programs - Browse database

If you're frustrated with the time it takes your Windows 10/8/7/Vista/XP PC to boot and then it seems to be running slowly you may have too many programs running at start-up - and you have come to the right place to identify them. This is the original start-up programs (as opposed to processes/tasks) list - one of the most accurate and comprehensive. Services are not included - see below. For further information on this and how to identify and disable start-up programs please visit the Introduction page.

See here for further information on random entries - which are typically added by viruses and other malware or unwanted programs.

Last database update :- 31st October, 2018
53549 listed

Entries are sorted by the Command/Data field. Alternatively, you can search the full database or use the alphabetical index on that page.

FIRST PREV ( Page 1048 of 1071 ) NEXT LAST

You can also manually change the page number in the address bar.

Startup Item or Name Status Command or Data Description Tested
hs38tughg8asegushgjfgd4fX[path to trojan]Detected by Malwarebytes as Trojan.Downloader - see an example hereNo
mousepadX[path to trojan]Detected by Sophos as Troj/Winsysba-ENo
appmain_plus_[random]X[path to trojan]Detected by Malwarebytes as Trojan.Agent.APMNo
hsa8ffushf83hoigjhs98jgijg9sd8eX[path to trojan]Detected by Malwarebytes as Trojan.Downloader - see an example hereNo
Shell22X[path to trojan]Detected by Dr.Web as Trojan.Packed.26606 and by Malwarebytes as Trojan.Agent.RNSNo
csrss.exeX[path to trojan]Detected by Malwarebytes as Trojan.AgentNo
ServiceX[path to trojan]Detected by Symantec as Backdoor.Kaitex.ENo
thostsX[path to trojan]Detected by Dr.Web as Trojan.DownLoader12.25768 and by Malwarebytes as Trojan.Agent.TH - see an example hereNo
KrisX[path to trojan]Detected by Sophos as Troj/Agent-TODNo
aaprotectX[path to trojan]Detected by Sophos as Troj/Bancban-MJNo
C3LLDG9TX[path to trojan]Detected by Malwarebytes as Trojan.Agent.CQQ - see an example hereNo
REGRUNX[path to trojan]Detected by Sophos as Troj/LowZone-AHNo
WinMediaX[path to trojan]Detected by Sophos as Troj/Zerobe-ANo
ADOBEDAILYUPDATEX[path to trojan]Detected by Malwarebytes as Trojan.Downloader.E - see an example hereNo
hse897ifdsjf98u3heuidhfddX[path to trojan]Detected by Malwarebytes as Trojan.Downloader - see an example hereNo
Locator Workstation Human Socket SupportX[path to trojan]Detected by Malwarebytes as Trojan.Agent.RND - see an example hereNo
Activex Application UpdaterX[path to trojan]Detected by Dr.Web as Trojan.Siggen4.39988 and by Malwarebytes as Trojan.Agent. The file is normally located in %Templates%No
Assitant Manager Time AcuisitionX[path to trojan]Detected by Malwarebytes as Trojan.Agent.RNDNo
hsef87ehf3jishfs87fhuishfsgggfdgs4gX[path to trojan]Detected by Trend Micro as TROJ_ERTFOR.AL and by Malwarebytes as Trojan.Downloader - see examples here and hereNo
wificonecX[path to trojan]Detected by Dr.Web as Trojan.DownLoader11.27545 and by Malwarebytes as Trojan.Downloader.WF - see examples here and hereNo
Windows System Recover!X[path to trojan]Detected by Malwarebytes as Trojan.Downloader. The file is typically located in %UserTemp%No
XpAspyX[path to trojan]Detected by Sophos as Troj/Delf-WHNo
hsehf98u34i9tjioaugy987iuegdsgX[path to trojan]Detected by Malwarebytes as Trojan.Downloader - see examples here and hereNo
SaymfX[path to trojan]Detected by Malwarebytes as Trojan.Agent.ENo
keyboardX[path to trojan]Detected by Sophos as Troj/Dloadr-AOZNo
LockAppX[path to trojan]Detected by Dr.Web as Trojan.KillProc.22584 and by Malwarebytes as Trojan.Delf.WLNo
WindowsSystemX[path to trojan]Detected by Malwarebytes as Trojan.Agent - see examples here and hereNo
aaviraX[path to trojan]Detected by Malwarebytes as Trojan.Agent.ENo
Sysyem CleanerX[path to trojan]Detected by Sophos as Troj/Ransom-QR and by Malwarebytes as Trojan.AgentNo
Chave_usbX[path to trojan]Detected by Dr.Web as Trojan.PWS.Banker1.15254 and by Malwarebytes as Trojan.Banker.ENo
hsf7husjnfg98gi498aejhiugjkdg4X[path to trojan]Detected by Malwarebytes as Trojan.Downloader - see examples here and hereNo
Microsoft Windows Update x86X[path to trojan]Detected by Malwarebytes as Trojan.MWF.Gen. Filenames seen include (but are not limited to) firefox.exe, opera.exe, taskmrg.exe, aim.exe, Winxdiag.exe and usnesvc.exeNo
hsf7husjnfg98gi498aejhiugjkdg4X[path to trojan]Detected by Malwarebytes as Trojan.Downloader - see examples here and hereNo
MeAllX[path to trojan]Detected by Dr.Web as Trojan.DownLoader9.55572 and by Malwarebytes as Trojan.Downloader.E - see an example here"No
hsf87sdhfush87fsufhuie3fddfX[path to trojan]Detected by Malwarebytes as Trojan.Downloader - see examples here and hereNo
yahoo.exeX[path to trojan]Detected by Malwarebytes as Trojan.Agent.GenNo
FilelX[path to trojan]Detected by Malwarebytes as Trojan.Agent. The file is located in %System% - see an example hereNo
hsf8973uhs87fdiufs3rfdX[path to trojan]Detected by Malwarebytes as Trojan.Downloader - see examples here and hereNo
system32xxxX[path to trojan]Detected by Dr.Web as Trojan.PWS.Banker1.10206 and by Malwarebytes as Trojan.Banker.ENo
cicidreamX[path to trojan]Detected by Malwarebytes as Trojan.StartPageNo
hsfe8owijfisjhgs7ye39gjsoighsd7y3euX[path to trojan]Detected by Malwarebytes as Trojan.Downloader - see examples here and hereNo
Internal Configuration Serving StateX[path to trojan]Detected by Malwarebytes as Trojan.Agent - see an example hereNo
StuckYouX[path to trojan]Detected by Dr.Web as Trojan.DownLoader11.6807 and by Malwarebytes as Trojan.Downloader.ENo
hsfg9w8gujsokgahi8gysgnsdgefshyjyX[path to trojan]Detected by Trend Micro as TROJ_CLICKER.GAT and by Malwarebytes as Trojan.Downloader - see examples here and hereNo
StartUpDateX[path to trojan]Detected by Symantec as Backdoor.Bifrose.FNo
AVFuckstarterX[path to trojan]Detected by Dr.Web as Trojan.PWS.Siggen.36856No
Reeg_X[path to trojan]Detected by Sophos as Troj/Bancban-AWNo
[username] configX[path to trojan]Detected by Sophos as Troj/Mosuck-HNo
CSRSWINX[path to trojan]Detected by Symantec as Backdoor.WinShell.50No
REEGRUNX[path to trojan]Detected by Trend Micro as TROJ_SECDROP.AINo

 

FIRST PREV ( Page 1048 of 1071 ) NEXT LAST

You can also manually change the page number in the address bar.

Notes & Warnings

If you can help identify new entries and verify/identify those entries with a "?" status (especially hardware specific - such as laptops and motherboards) then please E-mail us (startups_at_pacs-portal_dot_co_dot_uk).

"Status" key:

Variables:

DISCLAIMER: It is assumed that users are familiar with the operating system they are using and comfortable with making the suggested changes. We will not be held responsible if changes you make cause a system failure.

WARNING: This is NOT a list of tasks/processes taken from the Task Manager (CTRL+SHIFT+ESC) "Processes" tab. This displays some startup programs AND other background tasks and "Services". These pages are concerned with startup programs from the common startup locations shown above ONLY. Please do not submit entries collected from this method as they will not be used. For a list of tasks/processes you should try the list at PC Pitstop, the Process Library from Uniblue or one of the many others now available.

Therefore, before ending a task/process via CTRL+SHIFT+ESC just because it has an "X" recommendation, please check whether it's in the registry or common startup locations first. An example would be "svchost.exe" - which doesn't appear in either under normal conditions but does via CTRL+SHIFT+ESC. If in doubt, don't do anything.

To avoid the database becoming too large, all malware entries are only shown using the registry version which is common to all Windows versions. Otherwise there would be multiple entries for popular filenames that viruses often use - such as "svchost.exe" above for example. Multiple malware can also use the same start-up entries, in this case only those with significant differences (such as file location) are repeated in this database.

As more than 25K entries in this database related to malware you should use a quality internet security package. Which ever you choose, keep it updated and get the latest version at least every two years.

There are a number of virus and malware entries listed in this database where specific removal instructions haven't been given. If this is the case then you could try ComboFix, a program written by sUBs that can remove many different types of Trojans and Worms. See here for a tutorial on how to use the program.

NOTE: A number of entries are repeated due to the way that different operating systems display startup items. For example, WinMe lists "POPROXY.EXE" as "Norton eMail Protect" in both MSCONFIG and the registry whereas WinXP lists it as "Poproxy" in MSCONFIG and "Norton eMail Protect" in the registry.

SERVICES: "Services" from the Windows 8/7/Vista/XP/2K/NT operating systems are not included. We fully understand that some programs with these OS's use "Services" as an alternative to load their component parts at startup but these are handled in a different way. We recommend you try BlackViper for information on services for the relevant operating systems.

Copyright

Presentation, format & comments Copyright © 2001 - 2017 Pacman's Portal
Portions Copyright © Peter Forrest, Denny Denham, Sylvain Prevost, Tony Klein, CastleCops & Bleeping Computer
Powered by Malwarebytes
All rights reserved

Valid XHTML 1.0 Transitional

Privacy Policy Site Map Home