Index Introduction Database Detailed Entries Updates Concise List HJT Forums Rogues Message Board

Windows startup programs - Browse database

If you're frustrated with the time it takes your Windows 10/8/7/Vista/XP PC to boot and then it seems to be running slowly you may have too many programs running at start-up - and you have come to the right place to identify them. This is the original start-up programs (as opposed to processes/tasks) list - one of the most accurate and comprehensive. Services are not included - see below. For further information on this and how to identify and disable start-up programs please visit the Introduction page.

See here for further information on random entries - which are typically added by viruses and other malware or unwanted programs.

Last database update :- 31st August, 2018
53515 listed

Entries are sorted by the Command/Data field. Alternatively, you can search the full database or use the alphabetical index on that page.

FIRST PREV ( Page 1057 of 1071 ) NEXT LAST

You can also manually change the page number in the address bar.

Startup Item or Name Status Command or Data Description Tested
RavTimeXPX[path to worm]Detected by Symantec as W32.Wullik.B@mm and by Malwarebytes as Worm.WuKillNo
RavTimXPX[path to worm]Detected by Symantec as W32.Wullik.B@mmNo
Windows Console MonitorX[path to worm]Detected by Symantec as W32.Kedebe@mmNo
Tok-CirrhatusX[path to worm]Detected by Sophos as W32/Brontok-F and by Malwarebytes as Worm.BrontokNo
wsa32.testX[path to wsa32.test]Detected by Dr.Web as Trojan.MulDrop5.9305 and by Malwarebytes as Trojan.Agent.ENo
Microsoft UpdateX[path to wssvr.exe]Detected by Sophos as W32/Rbot-OD and by Malwarebytes as Backdoor.BotNo
NotnX[path to wtta.exe]Detected by Symantec as Adware.PurityScan - also see the archived version of Andrew Clover's pageNo
[random]X[path to wucrtupd.exe]Detected by Symantec as Adware.PurityScan - also see the archived version of Andrew Clover's page. Do not confuse with the legitimate Windows Critical Update Notification (wucrtupd.exe) processNo
winkernel32X[path to wWin32.com]Detected by Symantec as Trojan.BansapNo
Windo Servic Agent 32X[path to xagw.exe]Added by a variant of W32.IRCBotNo
xhardware32.exeX[path to xhardware32.exe]Detected by Malwarebytes as Trojan.Agent.AINo
WINDOWSX[path to ymssgr.exe]Detected by Sophos as Troj/Bckdr-PS. Note - deactivates the Microsoft Internet Connection Firewall (ICF)No
CrashReportCheckerX[path to zumodrive.exe]Detected by Malwarebytes as Trojan.Agent.SDNo
Microsoft Winedows updeteX[path to zxbvml.exe]Detected by Malwarebytes as Backdoor.AgentNo
{GUID}X[path to {GUID}.exe]Detected by Malwarebytes as Trojan.Agent.CLDGen - see an example hereNo
Adobe Update Service ®X[path trojan]Detected by Dr.Web as Trojan.DownLoader8.32080No
print sharingX[path] hidden32.exe [path] explorer.exeDetected by Symantec as Backdoor.IRC.Zcrew.BNo
KAZAAN[path] kpp.exe [path] kazaalite.kppSystem Tray access to later versions of the Kazaa Lite P2P file sharing utility - namely the K++ and Resurrection variants. Kazaa Lite is the unauthorized modification of the original Kazaa Media Desktop - with the malware removedNo
CCleaner MonitoringX[path] mfhqpzk.exe /c [path] CCleaner64.exeDetected by Malwarebytes as Trojan.Agent.SW. Note - this entry replaces the legitimate CCleaner file "CCleaner64.exe" located in %ProgramFiles%\CCleaner with the file "mfhqpzk.exe" from %AppData%\Microsoft\MfhqpzkNo
taskmngrX[path] msnve.exe [path] task.exeDetected by Sophos as Troj/Flood-EK and by Malwarebytes as Trojan.Agent.TSKNo
Optim[NUMBER]X[path] regdtopt.exeDetected by Symantec as Trojan.Ramvicrype and by Malwarebytes as Trojan.AgentNo
SysSearchX[path] REGEDIT.EXE -s [path] sysreg.regDetected by Sophos as Troj/StartPa-ME. Both files are located in %Windir%No
SP2 dataX[path] repcale.exe [path] apc.exeAdded by a variant of the RANDON.AN WORM! Both files are often located in %System%\winstatNo
DATABASE MySqlX[path] repcale.exe [path] beird.exeDetected by Sophos as W32/Randon-AL. Both files are often located in %System%\qswsNo
NBT System aliasX[path] repcale.exe [path] beird.exeAdded by a variant of the RANDON.AN WORM! Both files are often located in %System%No
PreInstall WindowsX[path] repcale.exe [path] beird.exeAdded by a variant of the RANDON.AN WORM! Both files are located in %System%\detrNo
ALTER DATAX[path] repcale.exe [path] beird.exeDetected by Trend Micro as TROJ_IRCFLOOD.CD. Both files are located in %System%\ccdewNo
Installs SP4X[path] repcale.exe [path] p0rd.exeDetected by Sophos as W32/Randon-AK. Both files are located in %System%\ekrlgcNo
element furthX[path] repcale.exe [path] palsp.exeAdded by a variant of the RANDON.AN WORM! Both files are often located in %System%\vertNo
Installs SP2X[path] repcale.exe [path] palsp.exeAdded by a variant of the RANDON.AN WORM! Both files are located in %System%\qpalspNo
BoarddataX[path] repcale.exe [path] palsp.exeAdded by a variant of the RANDON.AN WORM! Both files are often located in %System%No
PrinterSpoolX[path] RESTORE.EXE [path] SPOOL.EXEDetected by Symantec as Backdoor.IRC.Aladinz.K. Both files are located in %System%\PLUGINSNo
Background Intelligent Transfer ServiceX[path] rundll32.exeDetected by Sophos as Troj/VB-ZD. Note - this is not the legitimate rundll32.exe process, which is located in %Windir% (Me/98) or %System% (10/8/7/Vista/XP/2K/NT)No
ProtectionX[path] runtask.exe [path] protection.exeAdded by a variant of the AGENT.3.AU TROJAN! Both files are located in %Windir%No
LanzarL2007?[path] setup.exeThe file is located in %UserTemp%\[various]\[various]\..\..\L2007tmp. What does it do and is it required?No
AddrPlus3X[path] stup.exe [path] Adplus.dll Rundll32TCent adware. Both files are located in %ProgramFiles%\TENCENT\AdplusNo
[path]Àhelpctl.exeX[path]Àhelpctl.exeDetected by Symantec as Trojan.Gaslide. The file is located in %Root% or %Temp%No
MICROSFT ANTIVIRUS UPDATE SUPPORTX[random 10-letter filename].EXEDetected by Sophos as W32/Rbot-AQANo
Windows Standard SecurtyX[random 3-letter filename]Detected by Sophos as W32/Rbot-ALFNo
msconfig.iniX[random digits].exeDetected by Malwarebytes as Trojan.Agent. Note - this entry loads from the Windows Startup folder and the file is located in %CommonAppData% - see examples here and hereNo
Windows.iniX[random digits].exeDetected by Malwarebytes as Trojan.Agent. Note - this entry loads from the Windows Startup folder and the file is located in %CommonAppData% - see examples here and hereNo
Malware DoctorX[random digits].exeMalware Doctor rogue security software - not recommended. Detected by Malwarebytes as Rogue.MalwareDoc. The file is located in %Windir%\ServiceProfiles\LocalService\AppData\Roaming (10/8/7/Vista) or %Root%\Documents and Settings\LocalService\Application Data (XP)No
Microsoft.comX[random digits].exeDetected by Malwarebytes as Malware.Trace. Note - this entry loads from the Windows Startup folder and the file is located in %CommonAppData% - see examples here and hereNo
MICROSFT RAMA UPDATE SUPPORTX[random filename]Detected by Sophos as W32/Rbot-ASM. The file is located in %System%No
Windows Update V6X[random filename]Detected by Sophos as W32/Rbot-KTNo
Windows Update.exeX[random filename]Detected by Malwarebytes as Backdoor.IRCBotNo
AIM Instant Message CookiesX[random filename]Detected by Sophos as W32/Rbot-AFVNo
Windows ExpIorerX[random filename]Detected by Sophos as W32/Rbot-AKONo
Microsft Windows Adapter 5.1.3013X[random filename]Detected by Kaspersky as Trojan-Downloader.Win32.Small.hit. The file is located in %AppData%No
Quicktime TaskX[random filename]Detected by Symantec as Dialer.TrafficadvanceNo

 

FIRST PREV ( Page 1057 of 1071 ) NEXT LAST

You can also manually change the page number in the address bar.

Notes & Warnings

If you can help identify new entries and verify/identify those entries with a "?" status (especially hardware specific - such as laptops and motherboards) then please E-mail us (startups_at_pacs-portal_dot_co_dot_uk).

"Status" key:

Variables:

DISCLAIMER: It is assumed that users are familiar with the operating system they are using and comfortable with making the suggested changes. We will not be held responsible if changes you make cause a system failure.

WARNING: This is NOT a list of tasks/processes taken from the Task Manager (CTRL+SHIFT+ESC) "Processes" tab. This displays some startup programs AND other background tasks and "Services". These pages are concerned with startup programs from the common startup locations shown above ONLY. Please do not submit entries collected from this method as they will not be used. For a list of tasks/processes you should try the list at PC Pitstop, the Process Library from Uniblue or one of the many others now available.

Therefore, before ending a task/process via CTRL+SHIFT+ESC just because it has an "X" recommendation, please check whether it's in the registry or common startup locations first. An example would be "svchost.exe" - which doesn't appear in either under normal conditions but does via CTRL+SHIFT+ESC. If in doubt, don't do anything.

To avoid the database becoming too large, all malware entries are only shown using the registry version which is common to all Windows versions. Otherwise there would be multiple entries for popular filenames that viruses often use - such as "svchost.exe" above for example. Multiple malware can also use the same start-up entries, in this case only those with significant differences (such as file location) are repeated in this database.

As more than 25K entries in this database related to malware you should use a quality internet security package. Which ever you choose, keep it updated and get the latest version at least every two years.

There are a number of virus and malware entries listed in this database where specific removal instructions haven't been given. If this is the case then you could try ComboFix, a program written by sUBs that can remove many different types of Trojans and Worms. See here for a tutorial on how to use the program.

NOTE: A number of entries are repeated due to the way that different operating systems display startup items. For example, WinMe lists "POPROXY.EXE" as "Norton eMail Protect" in both MSCONFIG and the registry whereas WinXP lists it as "Poproxy" in MSCONFIG and "Norton eMail Protect" in the registry.

SERVICES: "Services" from the Windows 8/7/Vista/XP/2K/NT operating systems are not included. We fully understand that some programs with these OS's use "Services" as an alternative to load their component parts at startup but these are handled in a different way. We recommend you try BlackViper for information on services for the relevant operating systems.

Copyright

Presentation, format & comments Copyright © 2001 - 2017 Pacman's Portal
Portions Copyright © Peter Forrest, Denny Denham, Sylvain Prevost, Tony Klein, CastleCops & Bleeping Computer
Powered by Malwarebytes
All rights reserved

Valid XHTML 1.0 Transitional

Privacy Policy Site Map Home