Index Introduction Database Detailed Entries Updates Concise List HJT Forums Rogues Message Board

Windows startup programs - Browse database

If you're frustrated with the time it takes your Windows 10/8/7/Vista/XP PC to boot and then it seems to be running slowly you may have too many programs running at start-up - and you have come to the right place to identify them. This is the original start-up programs (as opposed to processes/tasks) list - one of the most accurate and comprehensive. Services are not included - see below. For further information on this and how to identify and disable start-up programs please visit the Introduction page.

See here for further information on random entries - which are typically added by viruses and other malware or unwanted programs.

Last database update :- 29th June, 2018
53433 listed

Entries are sorted by the Command/Data field. Alternatively, you can search the full database or use the alphabetical index on that page.

FIRST PREV ( Page 1053 of 1069 ) NEXT LAST

You can also manually change the page number in the address bar.

Startup Item or Name Status Command or Data Description Tested
Microsoft Winedows updeteX[path to tygpuv.exe]Detected by Malwarebytes as Backdoor.AgentNo
ueynfxi4X[path to ueynfxi4.exe]Detected by Malwarebytes as Trojan.Agent.IXF. The file location is typically %ProgramFiles%\[various] - see examples here and hereNo
MediaNotifyerX[path to unpack.exe]Detected by Malwarebytes as Trojan.Downloader - see an example hereNo
system updataX[path to updata.exe]Detected by Sophos as Troj/Lineage-CNo
algX[path to update.exe]Detected by Malwarebytes as Trojan.Agent.LGNo
ATIDriverX[path to updater.exe]Detected by Symantec as Trojan.Didytak.B and by Malwarebytes as Trojan.Agent.ATSGenNo
iTunesX[path to uploadme.exe]Detected by Malwarebytes as Backdoor.BotNo
NcaoX[path to urpo.exe]Detected by Symantec as Adware.PurityScan - also see the archived version of Andrew Clover's pageNo
USB Device Server!X[path to usbserver.exe]Added by a variant of W32.IRCBotNo
[3-4 random letters]X[path to userinit.exe]Detected by Symantec as Adware.PurityScan - also see the archived version of Andrew Clover's page. Do not confuse with the legitimate Userinit Logon Application (userinit.exe) process which is always located in %System%No
User Sharing ServicesX[path to usnsvc.exe]Added by a variant of W32.IRCBotNo
NI.UWA7PT_0001_N96M1007X[path to UWA7PT_0001_N96M1007NetInstaller.exe]Installer for the WinAntiVirus Pro 2007 rogue security software - not recommended, removal instructions hereNo
NI.UWA7PV_0001_N96M0206X[path to UWA7PV_0001_N96M0206NetInstaller.exe]Installer for the WinAntiVirus Pro 2007 rogue security software - not recommended, removal instructions hereNo
windowsX[path to VBSyS.vbs]Detected by Sophos as VBS/Rock-DNo
Video.exeX[path to Video.exe]Detected by Malwarebytes as Trojan.Agent.VGenNo
Windows Video Monitor DriversX[path to videodrivers.exe]Detected by Microsoft as Worm:Win32/Slenfbot.ABPNo
VidSvrN[path to vidsvr.exe]MS WebTV for Windows Channel Guide. Used to display TV on your PC via a compatible video card with in-built tuner (such as ATI All-In-Wonder). If you don't use it - uninstall itNo
WinKernelX[path to virus]Detected by Symantec as W32.HLLP.PleaNo
3331T4BHOKUHS23.exeX[path to w0rms.exe]Detected by Malwarebytes as Backdoor.BotNo
[random]X[path to w?aclt.exe]Detected by Symantec as Adware.PurityScan - also see the archived version of Andrew Clover's pageNo
[random]X[path to w?auboot.exe]Detected by Symantec as Adware.PurityScan - also see the archived version of Andrew Clover's pageNo
[random]X[path to w?auclt.exe]Detected by Symantec as Adware.PurityScan - also see the archived version of Andrew Clover's pageNo
[random]X[path to w?crtupd.exe]Detected by Symantec as Adware.PurityScan - also see the archived version of Andrew Clover's pageNo
[random]X[path to w?nlogon.exe]Detected by Symantec as Adware.PurityScan - also see the archived version of Andrew Clover's pageNo
[random]X[path to w?nspool.exe]Detected by Symantec as Adware.PurityScan - also see the archived version of Andrew Clover's pageNo
[random]X[path to w?nword.exe]Detected by Symantec as Adware.PurityScan - also see the archived version of Andrew Clover's pageNo
[random]X[path to w?wexec.exe]Detected by Symantec as Adware.PurityScan - also see the archived version of Andrew Clover's pageNo
RcshX[path to weaa.exe]Detected by Symantec as Adware.PurityScan - also see the archived version of Andrew Clover's pageNo
WebConfigX[path to WebConfig.exe]Detected by Malwarebytes as Adware.KorAd - see examples here and hereNo
Winsock driverX[path to win.exe]Added by a variant of W32.IRCBot. The file is located in %System%No
win3208022-1336687X[path to win3208022-1336687.exe]Detected by Sophos as Troj/VB-CFGNo
winloginX[path to win32x.exe]Detected by Sophos as Troj/StartPa-DFNo
WinInitX[path to Win86.exe]Detected by Sophos as Troj/Small-PBNo
WinampX[path to winamp.exe]Detected by Trend Micro as WORM_AGOBOT.XI. Note - this is not the Winamp media player which is located in %ProgramFiles%\WinampNo
Winamp to Google TalkU[path to WinamptoGoogleTalk.exe]Winamp to Google Talk - shows your current Winamp track in your Google Talk status (now Google Hangouts)No
winanktX[path to winankt.exe]Detected by Malwarebytes as Rogue.TechSupportScamNo
NI.UWA7P_0001_N99M2908X[path to WinAntiVirusPro2007FreeInstall.exe]Installer for the WinAntiVirus Pro 2007 rogue security software - not recommended, removal instructions hereNo
NI.UWA7P_0001_N99M3103X[path to WinAntiVirusPro2007FreeInstall.exe]Installer for the WinAntiVirus Pro 2007 rogue security software - not recommended, removal instructions hereNo
NI.UWA7PU_0001_N96M1007X[path to WinAntiVirusPro2007FreeInstall_de.exe]Installer for the WinAntiVirus Pro 2007 rogue security software - not recommended, removal instructions hereNo
NI.UWA7PY_0001_N96M0206X[path to WinAntiVirusPro2007FreeInstall_es.exe]Installer for the WinAntiVirus Pro 2007 rogue security software - not recommended, removal instructions hereNo
NI.UWA7PV_0001_N96M0206X[path to WinAntiVirusPro2007FreeInstall_fr.exe]Installer for the WinAntiVirus Pro 2007 rogue security software - not recommended, removal instructions hereNo
NI.UWA7PM_0001_N96M0806X[path to WinAntiVirusPro2007FreeInstall_nl.exe]Installer for the WinAntiVirus Pro 2007 rogue security software - not recommended, removal instructions hereNo
winlog32X[path to windll32.exe]Detected by McAfee as W32/Sdbot.gen.anNo
WinDll32.exeX[path to WinDll32.exe]Detected by Malwarebytes as Backdoor.Agent.E - see examples here and hereNo
evoX[path to windns.exe]Detected by Malwarebytes as Trojan.Banker. The file location is typically %ProgramFiles%\[various] - see examples here and hereNo
Symantec Antivirus professionalX[path to windows .exe]Added by a variant of W32/Forbot-GenNo
cbdllX[path to WindowsApplication2.exe]Detected by Malwarebytes as Trojan.AgentNo
Configuration LoaderXWinHelper.exeDetected by Malwarebytes as Backdoor.BotNo
Windows HostsX[path to winhosts.exe]Added by a variant of W32.IRCBotNo
T4skM4n4g3rX[path to Wink3sk9.exe]Added by a variant of W32.IRCBotNo

 

FIRST PREV ( Page 1053 of 1069 ) NEXT LAST

You can also manually change the page number in the address bar.

Notes & Warnings

If you can help identify new entries and verify/identify those entries with a "?" status (especially hardware specific - such as laptops and motherboards) then please E-mail us (startups_at_pacs-portal_dot_co_dot_uk).

"Status" key:

Variables:

DISCLAIMER: It is assumed that users are familiar with the operating system they are using and comfortable with making the suggested changes. We will not be held responsible if changes you make cause a system failure.

WARNING: This is NOT a list of tasks/processes taken from the Task Manager (CTRL+SHIFT+ESC) "Processes" tab. This displays some startup programs AND other background tasks and "Services". These pages are concerned with startup programs from the common startup locations shown above ONLY. Please do not submit entries collected from this method as they will not be used. For a list of tasks/processes you should try the list at PC Pitstop, the Process Library from Uniblue or one of the many others now available.

Therefore, before ending a task/process via CTRL+SHIFT+ESC just because it has an "X" recommendation, please check whether it's in the registry or common startup locations first. An example would be "svchost.exe" - which doesn't appear in either under normal conditions but does via CTRL+SHIFT+ESC. If in doubt, don't do anything.

To avoid the database becoming too large, all malware entries are only shown using the registry version which is common to all Windows versions. Otherwise there would be multiple entries for popular filenames that viruses often use - such as "svchost.exe" above for example. Multiple malware can also use the same start-up entries, in this case only those with significant differences (such as file location) are repeated in this database.

As more than 25K entries in this database related to malware you should use a quality internet security package. Which ever you choose, keep it updated and get the latest version at least every two years.

There are a number of virus and malware entries listed in this database where specific removal instructions haven't been given. If this is the case then you could try ComboFix, a program written by sUBs that can remove many different types of Trojans and Worms. See here for a tutorial on how to use the program.

NOTE: A number of entries are repeated due to the way that different operating systems display startup items. For example, WinMe lists "POPROXY.EXE" as "Norton eMail Protect" in both MSCONFIG and the registry whereas WinXP lists it as "Poproxy" in MSCONFIG and "Norton eMail Protect" in the registry.

SERVICES: "Services" from the Windows 8/7/Vista/XP/2K/NT operating systems are not included. We fully understand that some programs with these OS's use "Services" as an alternative to load their component parts at startup but these are handled in a different way. We recommend you try BlackViper for information on services for the relevant operating systems.

Copyright

Presentation, format & comments Copyright © 2001 - 2017 Pacman's Portal
Portions Copyright © Peter Forrest, Denny Denham, Sylvain Prevost, Tony Klein, CastleCops & Bleeping Computer
Powered by Malwarebytes
All rights reserved

Valid XHTML 1.0 Transitional

Privacy Policy Site Map Home