Index Introduction Database Detailed Entries Updates Concise List HJT Forums Rogues Message Board

Windows startup programs - Browse database

If you're frustrated with the time it takes your Windows 10/8/7/Vista/XP PC to boot and then it seems to be running slowly you may have too many programs running at start-up - and you have come to the right place to identify them. This is the original start-up programs (as opposed to processes/tasks) list - one of the most accurate and comprehensive. Services are not included - see below. For further information on this and how to identify and disable start-up programs please visit the Introduction page.

See here for further information on random entries - which are typically added by viruses and other malware or unwanted programs.

Last database update :- 30th November, 2017
52420 listed

Entries are sorted by the Command/Data field. Alternatively, you can search the full database or use the alphabetical index on that page.

FIRST PREV ( Page 1048 of 1049 ) NEXT LAST

You can also manually change the page number in the address bar.

Startup Item or Name Status Command or Data Description Tested
Proc992X[worm filename]Detected by Sophos as W32/Ixbot-CNo
SpeedBossX[worm filename]Detected by Symantec as W32.Opaserv.AD.WormNo
Win I5oahderX[worm filename]Detected by Sophos as W32/Agobot-DSNo
G00123X[worm filename]Detected by Symantec as W32.Bugbros@mmNo
SilentSoftechX[worm filename]Detected by Sophos as W32/SillyFDC-BLNo
Microsoft UpdatesX[worm filename]Detected by Sophos as W32/Agobot-AIZ and by Malwarebytes as Backdoor.BotNo
NotePadX[worm filename]Detected by Sophos as W32/SillyFDC-GNo
Random Unique IDX[worm filename]Detected by Sophos as W32/Xrove-ANo
Win Secure UpdateX[worm filename]Detected by Sophos as W32/Rbot-AGINo
AHUX[worm filename]Detected by Sophos as W32/Anacon-B. Note - the filename is SysAna32.exe, Anacon.exe or Syspoly32.exe and is located in %System%No
DNSX[worm filename]Detected by Sophos as W32/Bckdr-CQGNo
NocanaX[worm filename]Detected by Sophos as W32/Anacon-B. Note - the filename is SysAna32.exe, Anacon.exe or Syspoly32.exe and is located in %System%No
educational writerX[worm filename].exeDetected by Sophos as W32/Rbot-LZNo
VBS.Ipnuker@mmX[worm filename].vbsDetected by Symantec as VBS.NukipNo
SaMailX[worm filename].vbsDetected by Symantec as VBS.LidoNo
WindowzX[worm filename].vbsDetected by Symantec as VBS.Nukip and by Malwarebytes as Backdoor.Messa.GenNo
Flash MediaX^ ^ % ^ % % ^ ^ ^%% ^% %%^^.exeDetected by Trend Micro as BKDR_IRCBOT.BAW. The file is located in %System%No
Flash MediaX^ ^^^ %% % ^% ^%%^ %^ .exeAdded by a variant of W32.IRCBotNo
Flash MediaX^%%^%%%^% %^ ^ .exeAdded by a variant of W32.IRCBot. The file is located in %System%No
Flash MediaX^%^^^%% ^ ^ %^^^^^ %^ ^%^^ ^%^^^^^ %^ ^^^%^%%.exeAdded by a variant of W32.IRCBot. The file is located in %System%No
Flash MediaX^^% ^ %%% %^%%%^%%^%^% % ^^%% % %^^^^ ^%%^%% .exeAdded by a variant of W32.IRCBotNo
Flash MediaX^^^^^.exeDetected by Trend Micro as TROJ_AGENT.ZOY. The file is located in %System% - see hereNo
Flash MediaX^^^^^^.exeDetected by Symantec as Backdoor.IRC.Bot. The file is located in %System% - see hereNo
Swf32X_backup.exeDetected by Symantec as W32.HLLW.Symten@mmNo
CyberDefender Early Detection CenterX_cdas[random].exeCyberDefender Early Detection Center rogue security software - not recommended. On testing with a clean image, this reported registry entries pointing to the legitimate Java "jqs_plugin.dll" file (located in %ProgramFiles%\Java\jre6\lib\deploy\jqs\ie as the Anticlear rogue (see an example here). In addition, it claimed that the installer for an older version of HashTab contained W32.MalwareF.KJAE and quarantined a valid 7-zip file ("7zCon.sfx" in %ProgramFiles%\7-Zip) as W32/Malware. Also read this post where a Tech Support person uses other free tools such as MBAM to fix a problemNo
[various names]X_ctcp.exeFake startup entry created by the Wareout rogue spyware and dialer remover - not recommended, removal instructions here. Archived version of Andrew Clover's original pageNo
DefaultX_default.pifDetected by Sophos as W32/Rubble-CNo
GraphicsX_default.pifDetected by Symantec as W32.AutoskyNo
A5118rX_default32142.pifDetected by Sophos as W32/Brontok-AKNo
Bron-Spizaetus-5118REPMX_default32142.pifDetected by Sophos as W32/Brontok-RNo
[random]X_default[8 random characters].pifDetected by Sophos as W32/Brontok-AINo
_ZZZZAdobe Flash AccelearatorX_E39msnmsgrskypess.exeDetected by Malwarebytes as Worm.Agent.ZZZH. The file is located in %AppData%\Microsoft\_ZZZZCertifiededdNo
snifferX_ex-08.exeDetected by Sophos as Troj/Oficla-X and by Malwarebytes as Trojan.DownloaderNo
IntelAgentX_ex-08.exeDetected by Sophos as Troj/FakeAV-FIP and by Malwarebytes as Trojan.AgentNo
_explore managerX_explore.exeDetected by Sophos as Troj/Spexta-CNo
lolololX_hideme_imhiddenlololol.exeDetected by Sophos as Troj/Hideme-ANo
loadX_Kerne1.exeDetected by Sophos as Troj/Lineage-AN. Note - this entry modifies the legitimate HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows "load" value data to include the file "_Kerne1.exe" (which is located in %System%)No
nor_virX_K_M_1_HookAndSend.exeDetected by Dr.Web as Trojan.KeyLogger.25295 and by Malwarebytes as Trojan.KeyLoggerNo
ad_virX_K_M_1_OnAdminWorks.exeDetected by Dr.Web as Trojan.KeyLogger.25295 and by Malwarebytes as Trojan.KeyLoggerNo
_mzu_stonedrv2X_mzu_stonedrv2.exeDetected by Symantec as Trojan.Jupillites.BNo
_mzu_stonedrv3X_mzu_stonedrv3.exeDetected by Sophos as Troj/DwnLdr-FTBNo
_mzu_stonedrv7X_mzu_stonedrv7.exeAdded by a variant of the DWNLDR-FTB TROJAN!No
_mzu_stonedrv8X_mzu_stonedrv8.exeDetected by Super Ad Blocker as Trojan.Downloader-MZU. The file is located in %System%No
_ntrdlhostX_Ntrdlhost.exeDetected by Sophos as Troj/Dloader-JVNo
_ntrRescueServiceX_ntrrs.exeDetected by Sophos as Troj/Dloader-JVNo
_pnd_Panda AntivirusX_pnd_*****.exe [* = random char/digit]Added by the AGENT.NAK TROJAN!No
Microsoft Internet ExplorerX_svchost.exeDetected by Trend Micro as TROJ_TINY.LX. The file is located in %System%No
svchost32.exeX_svchost32.exeDetected by Sophos as W32/AutoRun-XU and by Malwarebytes as Backdoor.Bot.ENo
_System_RunX_svchost_.exeDetected by Sophos as Troj/Lineage-ZNo
_tdiserv_X_tdicli_.exeDetected by Symantec as W32.Tdiserv.ANo


FIRST PREV ( Page 1048 of 1049 ) NEXT LAST

You can also manually change the page number in the address bar.

Notes & Warnings

If you can help identify new entries and verify/identify those entries with a "?" status (especially hardware specific - such as laptops and motherboards) then please E-mail us (startups_at_pacs-portal_dot_co_dot_uk).

"Status" key:


DISCLAIMER: It is assumed that users are familiar with the operating system they are using and comfortable with making the suggested changes. We will not be held responsible if changes you make cause a system failure.

WARNING: This is NOT a list of tasks/processes taken from the Task Manager (CTRL+SHIFT+ESC) "Processes" tab. This displays some startup programs AND other background tasks and "Services". These pages are concerned with startup programs from the common startup locations shown above ONLY. Please do not submit entries collected from this method as they will not be used. For a list of tasks/processes you should try the list at PC Pitstop, the Process Library from Uniblue or one of the many others now available.

Therefore, before ending a task/process via CTRL+SHIFT+ESC just because it has an "X" recommendation, please check whether it's in the registry or common startup locations first. An example would be "svchost.exe" - which doesn't appear in either under normal conditions but does via CTRL+SHIFT+ESC. If in doubt, don't do anything.

To avoid the database becoming too large, all malware entries are only shown using the registry version which is common to all Windows versions. Otherwise there would be multiple entries for popular filenames that viruses often use - such as "svchost.exe" above for example. Multiple malware can also use the same start-up entries, in this case only those with significant differences (such as file location) are repeated in this database.

As more than 25K entries in this database related to malware you should use a quality internet security package. Which ever you choose, keep it updated and get the latest version at least every two years.

There are a number of virus and malware entries listed in this database where specific removal instructions haven't been given. If this is the case then you could try ComboFix, a program written by sUBs that can remove many different types of Trojans and Worms. See here for a tutorial on how to use the program.

NOTE: A number of entries are repeated due to the way that different operating systems display startup items. For example, WinMe lists "POPROXY.EXE" as "Norton eMail Protect" in both MSCONFIG and the registry whereas WinXP lists it as "Poproxy" in MSCONFIG and "Norton eMail Protect" in the registry.

SERVICES: "Services" from the Windows 8/7/Vista/XP/2K/NT operating systems are not included. We fully understand that some programs with these OS's use "Services" as an alternative to load their component parts at startup but these are handled in a different way. We recommend you try BlackViper for information on services for the relevant operating systems.


Presentation, format & comments Copyright © 2001 - 2017 Pacman's Portal
Portions Copyright © Peter Forrest, Denny Denham, Sylvain Prevost, Tony Klein, CastleCops & Bleeping Computer
Powered by Malwarebytes
All rights reserved

Valid XHTML 1.0 Transitional

Privacy Policy Site Map Home