Index Introduction Database Detailed Entries Updates Concise List HJT Forums Rogues Message Board

Windows startup programs - Browse database

If you're frustrated with the time it takes your Windows 10/8/7/Vista/XP PC to boot and then it seems to be running slowly you may have too many programs running at start-up - and you have come to the right place to identify them. This is the original start-up programs (as opposed to processes/tasks) list - one of the most accurate and comprehensive. Services are not included - see below. For further information on this and how to identify and disable start-up programs please visit the Introduction page.

See here for further information on random entries - which are typically added by viruses and other malware or unwanted programs.

Last database update :- 30th April, 2018
53178 listed

Entries are sorted by the Command/Data field. Alternatively, you can search the full database or use the alphabetical index on that page.

FIRST PREV ( Page 1049 of 1064 ) NEXT LAST

You can also manually change the page number in the address bar.

Startup Item or Name Status Command or Data Description Tested
winlogonX[path to wins.exe]Detected by Malwarebytes as Trojan.Agent.TraceNo
[random]X[path to WinsidebarV2.exe]Detected by Malwarebytes as Trojan.Downloader.WSB - see examples hereNo
Microsoft binderX[path to winsock.exe]Detected by Malwarebytes as Trojan.Binder. Note - this entry loads from the Windows Startup folder - see an example hereNo
winsock.exeX[path to winsock.exe]Detected by Malwarebytes as Backdoor.Bot - see an example hereNo
Windows SpoolX[path to winspool.exe]Added by a variant of W32.IRCBotNo
Windows UDPX[path to winudp.exe]Detected by Trend Micro as WORM_IRCBOT.GATNo
Microsoft World ServiceX[path to winworld.exe]Added by a variant of W32.IRCBotNo
FolderUpdaterX[path to wisptis.exe]Detected by Malwarebytes as Trojan.Downloader - see an example hereNo
ShellX[path to wiupdat.exe]Detected by Malwarebytes as Trojan.Ransom. Note - this entry adds an illegal HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon "Shell" entry. The value data points to "wiupdat.exe"No
Windows Media UtilityX[path to wmediautil.exe]Added by a variant of W32.Spybot.WormNo
File System ServiceX[path to wmiprvsc.exe]Detected by Sophos as Troj/Agobot-HZNo
Working Facebook Auto Liker.exeX[path to Working Facebook Auto Liker.exe]Detected by Malwarebytes as Trojan.Agent.AINo
BnexeX[path to worm]Detected by Trend Micro as WORM_ARGEN.ANo
Flash Player2X[path to worm]Detected by Trend Micro as WORM_IRCBOT.PDNo
Microsoft System SaverX[path to worm]Detected by Malwarebytes as Backdoor.RbotNo
DR serviceX[path to worm]Detected by Sophos as W32/Rbot-CZTNo
PromoRegX[path to worm]Detected by Trend Micro as WORM_WALEDAC.C and by Malwarebytes as Trojan.AgentNo
RavTimeXPX[path to worm]Detected by Symantec as W32.Wullik.B@mm and by Malwarebytes as Worm.WuKillNo
RavTimXPX[path to worm]Detected by Symantec as W32.Wullik.B@mmNo
FindHackX[path to worm]Detected by Sophos as W32/Kelvir-BANo
himem.exeX[path to worm]Detected by Sophos as W32/Stration-FWNo
C7X[path to worm]Detected by Symantec as W32.Mediakill.A@mmNo
HP Software Updater v1.4X[path to worm]Detected by Symantec as W32.Ackantta.H@mmNo
RPC PatcherX[path to worm]Detected by Symantec as W32.Bolgi.WormNo
ansjavaX[path to worm]Detected by Sophos as W32/Randon-ANNo
MsgmgrX[path to worm]Detected by Symantec as W32.Babybear@mmNo
Cisco SystemsX[path to worm]Detected by Kaspersky as Worm.Win32.AutoRun.uhr. The file is located in %System%No
SYSTEM service helperX[path to worm]Detected by Sophos as W32/Monkbd-ANo
Windows Taskbar ManagerX[path to worm]Detected by Symantec as W32.Protoride.BNo
brwdiagX[path to worm]Detected by Sophos as W32/Stratio-BNNo
MyappX[path to worm]Detected by Symantec as W32.HLLW.Fatee.BNo
ara-keyX[path to worm]Detected by Symantec as W32.HLLW.AntinnyNo
MouseDrvX[path to worm]Detected by Sophos as W32/Zoload-BNo
Windows Service algeX[path to worm]Detected by Trend Micro as WORM_RBOT.GJONo
ArmanX[path to worm]Detected by Sophos as W32/IRCBot-TGNo
SysPrntX[path to worm]Detected by Symantec as W32.Degnax@mmNo
NAV Live UpdateX[path to worm]Detected by Symantec as W32.HLLW.Deborms.C. Note - this is not a valid Norton Anti-Virus (NAV) entry from SymantecNo
MSPRO32X[path to worm]Detected by Symantec as W32.IberioNo
[decimal number]X[path to worm]Detected by Sophos as W32/Opossum-A. The decimal number can be anything, eg, 0.12345678No
ACCDEFRAGINFOX[path to worm]Detected by Sophos as W32/Darby-ONo
[Ephemeral 2.4] by TreeHugger, X[path to worm]Detected by Sophos as W32/Lemoor-A. Note that there is a space at the end of the "Startup Item" fieldNo
[Ephemeral 2.5] by TreeHugger, X[path to worm]Detected by Sophos as W32/Lemoor-C. Note that there is a space at the end of the "Startup Item" fieldNo
[Ephemeral 2.x] by TreeHugger, X[path to worm]Detected by Symantec as W32.Lemoor.A - where "x" represents 3 or 4. Note that there is a space at the end of the "Startup Item" fieldNo
Windows Update HostX[path to worm]Detected by Sophos as W32/Sdbot-CSWNo
ffX[path to worm]Detected by Sophos as W32/Rbot-XLNo
SYDNEYX[path to worm]Detected by Symantec as W32.HLLW.Syney@mmNo
user logonX[path to worm]Detected by Sophos as W32/Pahatia-ANo
messngerX[path to worm]Detected by Symantec as W32.HLLW.Deloder. The most common filename is Dvldr32.exe in %System%No
CekirgeX[path to worm]Detected by Symantec as W32.Kergez.A@mmNo
TaskRegX[path to worm]Detected by Trend Micro as WORM_CBLADNo

 

FIRST PREV ( Page 1049 of 1064 ) NEXT LAST

You can also manually change the page number in the address bar.

Notes & Warnings

If you can help identify new entries and verify/identify those entries with a "?" status (especially hardware specific - such as laptops and motherboards) then please E-mail us (startups_at_pacs-portal_dot_co_dot_uk).

"Status" key:

Variables:

DISCLAIMER: It is assumed that users are familiar with the operating system they are using and comfortable with making the suggested changes. We will not be held responsible if changes you make cause a system failure.

WARNING: This is NOT a list of tasks/processes taken from the Task Manager (CTRL+SHIFT+ESC) "Processes" tab. This displays some startup programs AND other background tasks and "Services". These pages are concerned with startup programs from the common startup locations shown above ONLY. Please do not submit entries collected from this method as they will not be used. For a list of tasks/processes you should try the list at PC Pitstop, the Process Library from Uniblue or one of the many others now available.

Therefore, before ending a task/process via CTRL+SHIFT+ESC just because it has an "X" recommendation, please check whether it's in the registry or common startup locations first. An example would be "svchost.exe" - which doesn't appear in either under normal conditions but does via CTRL+SHIFT+ESC. If in doubt, don't do anything.

To avoid the database becoming too large, all malware entries are only shown using the registry version which is common to all Windows versions. Otherwise there would be multiple entries for popular filenames that viruses often use - such as "svchost.exe" above for example. Multiple malware can also use the same start-up entries, in this case only those with significant differences (such as file location) are repeated in this database.

As more than 25K entries in this database related to malware you should use a quality internet security package. Which ever you choose, keep it updated and get the latest version at least every two years.

There are a number of virus and malware entries listed in this database where specific removal instructions haven't been given. If this is the case then you could try ComboFix, a program written by sUBs that can remove many different types of Trojans and Worms. See here for a tutorial on how to use the program.

NOTE: A number of entries are repeated due to the way that different operating systems display startup items. For example, WinMe lists "POPROXY.EXE" as "Norton eMail Protect" in both MSCONFIG and the registry whereas WinXP lists it as "Poproxy" in MSCONFIG and "Norton eMail Protect" in the registry.

SERVICES: "Services" from the Windows 8/7/Vista/XP/2K/NT operating systems are not included. We fully understand that some programs with these OS's use "Services" as an alternative to load their component parts at startup but these are handled in a different way. We recommend you try BlackViper for information on services for the relevant operating systems.

Copyright

Presentation, format & comments Copyright © 2001 - 2017 Pacman's Portal
Portions Copyright © Peter Forrest, Denny Denham, Sylvain Prevost, Tony Klein, CastleCops & Bleeping Computer
Powered by Malwarebytes
All rights reserved

Valid XHTML 1.0 Transitional

Privacy Policy Site Map Home