Index Introduction Database Detailed Entries Updates Concise List HJT Forums Rogues Message Board

Windows startup programs - Browse database

If you're frustrated with the time it takes your Windows 10/8/7/Vista/XP PC to boot and then it seems to be running slowly you may have too many programs running at start-up - and you have come to the right place to identify them. This is the original start-up programs (as opposed to processes/tasks) list - one of the most accurate and comprehensive. Services are not included - see below. For further information on this and how to identify and disable start-up programs please visit the Introduction page.

See here for further information on random entries - which are typically added by viruses and other malware or unwanted programs.

Last database update :- 31st May, 2018
53377 listed

Entries are sorted by the Command/Data field. Alternatively, you can search the full database or use the alphabetical index on that page.

FIRST PREV ( Page 1057 of 1068 ) NEXT LAST

You can also manually change the page number in the address bar.

Startup Item or Name Status Command or Data Description Tested
Microsoft UpToDate Driver (32-bits)X[random filename].exeDetected by Symantec as W32.Spybot.LXJNo
WIN prosessor16X[random filename].exeAdded by a variant of W32/Sdbot.wormNo
Windows LoL LayerX[random filename].exeDetected by Sophos as W32/Rbot-GMD and by Malwarebytes as Backdoor.BotNo
WindowsReg% updateX[random filename].exeDetected by Sophos as W32/Rbot-HHNo
SidebarX[random filename].exeDetected by Symantec as Backdoor.SalgoreaNo
Mickey Mouse CerealX[random filename].exeDetected by Symantec as Backdoor.Ranky.QNo
Windows Microsoft ServicesX[random filename].exeDetected by Trend Micro as WORM_KOLAB.AW and by Malwarebytes as Backdoor.Bot. The file is located in %System%No
reszrvX[random filename].exeAdded by a variant of W32/Sdbot.worm. The file is located in %System%No
Microsot NT SupportX[random filename].exeDetected by Sophos as W32/Rbot-CTINo
WiFix serviceX[random filename].exeDetected by Trend Micro as TROJ_MALP33.ANo
Windows Serviece AgentsX[random filename].exeDetected by Trend Micro as TROJ_AGENT.BHR and by Malwarebytes as Backdoor.Bot. The file is located in %System%No
Web ServiceX[random filename].exeDetected by Symantec as Trojan.AdmincashNo
KadocX[random filename].exeDetected by Symantec as Backdoor.StaprewNo
(Default)X[random filename].exeDetected by Symantec as W32.Blackmal@mm. Note - this malware actually changes the value data of the "(Default)" key in HKLM\Run and HKLM\RunServices in order to force Windows to launch it at boot. The name field in MSConfig may be blankNo
AdPopupX[random filename].exeAdpopup adware, The most common filenames are epswad3.exe, epswad4.exe and dcf5678.exe - all found in %Windir%No
WinFixer serviceX[random filename].exeAdded by a variant of W32/Sdbot.worm. The file is located in %System%No
Windows ASN ServiceX[random filename].exeDetected by Sophos as W32/Agobot-TCNo
W32LoadX[random filename].scrDetected by Symantec as W32.HLLW.CaspidNo
OperaX[random hex numbers]-VT.binDetected by Malwarebytes as Trojan.Agent. The file is located in %Temp% - see examples here and hereNo
MSN 9.0 PlusX[random letters].exeDetected by Sophos as W32/Rbot-ALYNo
WinLoaderX[random letters].exeAdded by variants of the SUBSEVEN TROJAN!No
Windows RecyclerX[random name]Detected by Sophos as W32/Rbot-EMHNo
ezLifeX[random name].dllDetected by Symantec as Adware.EZLife and by Malwarebytes as Adware.EzlifeNo
[random]X[random name].dllSearchNet adwareNo
svchostX[random name].exeDetected by Sophos as W32/VBSAuto-A and by Malwarebytes as Backdoor.Bot.ENo
regdiitX[random name].exeDetected by Sophos as W32/VBSAuto-A and by Malwarebytes as Backdoor.PoisonIvyNo
Windows Data ServerX[random name].exeDetected by Sophos as W32/Spybot-DSNo
Google EarthX[random name].pifDetected by Sophos as W32/Rbot-AXKNo
vbeX[random name].vbeDetected by Sophos as W32/Uisgon-ANo
reactorX[random name]32.exeAdded by an earlier variant of W32.Bofra.A@mmNo
Reactor3X[random name]32.exeDetected by Kaspersky as Email-Worm.Win32.Bofra.b. The file is located in %System%No
Reactor5X[random name]32.exeDetected by Symantec as W32.Bofra.D@mmNo
Reactor6X[random name]32.exeDetected by Symantec as W32.Bofra.C@mmNo
Reactor7X[random name]32.exeDetected by Symantec as W32.Bofra.B@mmNo
Reactor8X[random name]32.exeDetected by Sophos as W32/Bofra-DNo
Reactor9X[random name]32.exeDetected by Symantec as W32.Bofra.E@mmNo
centerX[random name]32.exeDetected by Kaspersky as Email-Worm.Win32.Bofra.c. The file is located in %System%No
RhinoX[random name]32.exeDetected by Kaspersky as Email-Worm.Win32.Bofra.a. The file is located in %System%No
MozzilaFirefoxX[random numbers].exeDetected by Malwarebytes as Backdoor.Agent. The file is located in %AppData%No
ttoolX[random numbers].exeDetected by Sophos as Troj/Hiload-C and by Malwarebytes as Trojan.Agent. The filename seen most often is "9129837.exe"No
pnpsvc_lockX[random numbers].exeBrowser hijackerNo
winIongonX[random numbers].exeDetected by Malwarebytes as Backdoor.Agent. The file is located in %AppData%No
Malware CleanerX[random numbers].exeMalware Cleaner rogue security software - not recommended, removal instructions hereNo
IMJDC1X[random string]Detected by Dr.Web as BackDoor.Paper.43 and by Malwarebytes as Trojan.Agent.Gen - see an example hereNo
WINDOWSNTX[random]Detected by Malwarebytes as Trojan.Agent.WNT. The file is located in %Temp%No
ShellX[random],explorer.exeDetected by Malwarebytes as Backdoor.Agent.RND. Note - this entry adds an illegal HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon "Shell" entry. The value data points to "explorer.exe" (which is a legitimate file located in %Windir% and shouldn't be deleted) and "[random]" (which is located in %AppData%\dYbXGdDiNL), see an example hereNo
ShellX[random],explorer.exeDetected by Malwarebytes as Backdoor.Messa. Note - this entry adds an illegal HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon "Shell" entry. The value data points to "explorer.exe" (which is a legitimate file located in %Windir% and shouldn't be deleted) and "[random]" (which is located in %AppData%\lEVccUVyMd), see an example hereNo
2600X[random].comDetected by Symantec as Downloader.DromedanNo
Topic MSNGR32X[random].comDetected by Malwarebytes as Backdoor.IRCBot - see examples here and hereNo
bxproxyX[random].dllSoftStop rogue security software - not recommendedNo

 

FIRST PREV ( Page 1057 of 1068 ) NEXT LAST

You can also manually change the page number in the address bar.

Notes & Warnings

If you can help identify new entries and verify/identify those entries with a "?" status (especially hardware specific - such as laptops and motherboards) then please E-mail us (startups_at_pacs-portal_dot_co_dot_uk).

"Status" key:

Variables:

DISCLAIMER: It is assumed that users are familiar with the operating system they are using and comfortable with making the suggested changes. We will not be held responsible if changes you make cause a system failure.

WARNING: This is NOT a list of tasks/processes taken from the Task Manager (CTRL+SHIFT+ESC) "Processes" tab. This displays some startup programs AND other background tasks and "Services". These pages are concerned with startup programs from the common startup locations shown above ONLY. Please do not submit entries collected from this method as they will not be used. For a list of tasks/processes you should try the list at PC Pitstop, the Process Library from Uniblue or one of the many others now available.

Therefore, before ending a task/process via CTRL+SHIFT+ESC just because it has an "X" recommendation, please check whether it's in the registry or common startup locations first. An example would be "svchost.exe" - which doesn't appear in either under normal conditions but does via CTRL+SHIFT+ESC. If in doubt, don't do anything.

To avoid the database becoming too large, all malware entries are only shown using the registry version which is common to all Windows versions. Otherwise there would be multiple entries for popular filenames that viruses often use - such as "svchost.exe" above for example. Multiple malware can also use the same start-up entries, in this case only those with significant differences (such as file location) are repeated in this database.

As more than 25K entries in this database related to malware you should use a quality internet security package. Which ever you choose, keep it updated and get the latest version at least every two years.

There are a number of virus and malware entries listed in this database where specific removal instructions haven't been given. If this is the case then you could try ComboFix, a program written by sUBs that can remove many different types of Trojans and Worms. See here for a tutorial on how to use the program.

NOTE: A number of entries are repeated due to the way that different operating systems display startup items. For example, WinMe lists "POPROXY.EXE" as "Norton eMail Protect" in both MSCONFIG and the registry whereas WinXP lists it as "Poproxy" in MSCONFIG and "Norton eMail Protect" in the registry.

SERVICES: "Services" from the Windows 8/7/Vista/XP/2K/NT operating systems are not included. We fully understand that some programs with these OS's use "Services" as an alternative to load their component parts at startup but these are handled in a different way. We recommend you try BlackViper for information on services for the relevant operating systems.

Copyright

Presentation, format & comments Copyright © 2001 - 2017 Pacman's Portal
Portions Copyright © Peter Forrest, Denny Denham, Sylvain Prevost, Tony Klein, CastleCops & Bleeping Computer
Powered by Malwarebytes
All rights reserved

Valid XHTML 1.0 Transitional

Privacy Policy Site Map Home