Index Introduction Database Detailed Entries Updates Concise List HJT Forums Rogues Message Board

Windows startup programs - Browse database

If you're frustrated with the time it takes your Windows 7/Vista/XP PC to boot and then it seems to be running slowly you may have too many programs running at start-up - and you have come to the right place to identify them. This is the original start-up programs (as opposed to processes/tasks) list - one of the most accurate and comprehensive. Services are not included - see below. For further information on this and how to identify and disable start-up programs please visit the Introduction page.

See here for further information on random entries - which are typically added by viruses and other malware or unwanted programs.

Last database update :- 28th March, 2014
38961 items listed

Alternatively, you can search the full database or use the alphabetical index on that page.

FIRST PREV ( Page 4 of 780 ) NEXT LAST

You can also manually change the page number in the address bar.

Startup Item or Name Status Command or Data Description Tested
0pvfbwx.exeX0pvfbwx.exeDetected by Malwarebytes Anti-Malware as Trojan.Agent. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows startsNo
[ComputerName].UPX0r1i1n.exeDetected by Malwarebytes Anti-Malware as Trojan.Banker. The file is located in %ProgramFiles%\[folder]No
Java UpdateX0SLW1VGAA8.exeDetected by Malwarebytes Anti-Malware as Trojan.Agent. The file is located in %AppData%No
0x00.exeX0x00.exeDetected by McAfee as RDN/Generic PWS.y and by Malwarebytes Anti-Malware as Trojan.PWS.DF. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows startsNo
Numerical Xterm AgentX0x32.exeAdded by the RBOT-FWP WORM!No
vbcX1 (1).exeDetected by Malwarebytes Anti-Malware as Trojan.MSIL. The file is located in %UserTemp%No
1 Million Serial Keys For SoftwaresX1 Million Serial Keys For Softwares.exeDetected by Malwarebytes Anti-Malware as Trojan.MSIL. The file is located in %AppData%\1 Million Serial Keys For SoftwaresNo
Microsoft Securitys Firewall 1.0.0.0.0.7X1.0.0.0.0.7_security_fire.exeDetected by Malwarebytes Anti-Malware as Trojan.MSIL. The file is located in %UserTemp%No
JavaUpdateX1.0.0.0JavaUpdate.exeDetected by McAfee as Generic Dropper!1p3No
Startup KeyX1.0.0.0wininit.exeDetected by Dr.Web as Trojan.DownLoader10.38645No
1.cplX1.cplDetected by Malwarebytes Anti-Malware as Trojan.Agent.CPL. The file is located in %System%No
1X1.exeDetected by Symantec as Trojan.EsteemsNo
1.exeX1.exeDetected by Malwarebytes Anti-Malware as Trojan.Agent.AI. The file is located in %UserTemp%No
1.exeX1.exeDetected by Sophos as Troj/Multidr-CF. The file is located in %Windir%No
aaaX1.exeDetected by Dr.Web as Trojan.PWS.Siggen.7352 and by Malwarebytes Anti-Malware as Trojan.AgentNo
PoliciesX1.exeDetected by McAfee as RDN/Generic.dx!cmk and by Malwarebytes Anti-Malware as Backdoor.Agent.PgenNo
ZXCASFASFX1.exeDetected by McAfee as Generic BackDoorNo
ZZChw4ZycSefR9mX1.exeDetected by McAfee as RDN/Ransom!a and by Malwarebytes Anti-Malware as Trojan.RansomNo
Microsoft (R) Windows Network Latency ControllerX1.tmpAdded by a generic password stealer TROJAN - see hereNo
windwosX1.tmpAdded by the POISON.PG BACKDOOR!No
wind32X10.scrDetected by Kaspersky as Trojan-Proxy.Win32.Puma.bvz and by Malwarebytes Anti-Malware as Backdoor.MessaNo
[various names]X10010.exeFake startup entry created by the Wareout rogue spyware and dialer remover - not recommended, removal instructions here. Archived version of Andrew Clover's original pageNo
ASDPLUGINX100171be.exeAsdPlug premium rate adult content dialerNo
ASDPLUGINX100176br.exeAsdPlug premium rate adult content dialerNo
HKCUX100FUD.exeDetected by Malwarebytes Anti-Malware as Backdoor.HMCPol.Gen. The file is located in %System%\InstallDirNo
HKLMX100FUD.exeDetected by Malwarebytes Anti-Malware as Backdoor.HMCPol.Gen. The file is located in %System%\InstallDirNo
101ClipsU101Clips.exe101Clips - "the simplest of all multi-clipboard programs. Just have it running minimized and it captures everything you cut or copy from other programs. It keeps the last 25"No
ODBCX102559.exeDetected by McAfee as RDN/Spybot.bfr!h and by Malwarebytes Anti-Malware as Trojan.DownloaderNo
QdqsX1028L.exeDetected by Malwarebytes Anti-Malware as Adware.SanctionedMedia. The file is located in %System%No
XXSKHOMIX1031X.exeDetected by Malwarebytes Anti-Malware as Trojan.Agent. The file is located in %System% - see hereNo
WUpdateX1037v.exeDetected by Sophos as Troj/Clagger-ARNo
MGFJPMNBJEBNNAFX1111.exeDetected by McAfee as RDN/Generic BackDoor and by Malwarebytes Anti-Malware as Backdoor.IRCBot.ENo
111111X111111.EXEDetected by Malwarebytes Anti-Malware as Trojan.Backdoor.CDR. The file is located in %Windir%No
load32X1111a.exeAdded by the DUMARU.AH WORM!No
1111swapmgr.exeX1111swapmgr.exeAdded by the BDOOR-IC BACKDOOR!No
ImagePathX115br.exeDetected by Dr.Web as Trojan.DownLoader7.5700 and by Malwarebytes Anti-Malware as Trojan.DownloaderNo
N5rG4t9NX11mW2Tizd.exeDetected by Malwarebytes Anti-Malware as Backdoor.Agent.DC. The file is located in %AppData%\xhmH2zsEB - see hereNo
11shoppingBuyX11shoppingGom.exeDetected by Malwarebytes Anti-Malware as Trojan.K.Clicker. The file is located in %UserTemp%No
11shoppingtvX11shoppingtv.exeDetected by Malwarebytes Anti-Malware as Adware.Korad. The file is located in %UserTemp%No
upsatX12.exeDetected by Malwarebytes Anti-Malware as Trojan.Fakecleaner. The file is located in %AppData%No
WatchU1200UBWATCH.EXEButton press monitor for the Mustek 1200 UB ScannerNo
cheatengineX123.exeDetected by McAfee as RDN/Generic.dx and by Malwarebytes Anti-Malware as Backdoor.Agent.DCENo
12341234@@X12341234@@.exeDetected by McAfee as RDN/Generic PWS.y!ti and by Malwarebytes Anti-Malware as Backdoor.Agent.RSANo
ANAX1243924.exeDetected by McAfee as Generic Downloader.x and by Malwarebytes Anti-Malware as Trojan.Downloader.DGINo
12Ghosts SaveLayoutU12autosl.exe12Ghosts SaveLayout - "Always (always!) keep the layout of your desktop icons"No
12Ghosts BackupU12backup.exe12Ghosts Backup - "Automatic Backups, HyperBackup for Multiple Versions, Registry Backup"No
MyScrapNook_12 Browser Plugin LoaderU12brmon.exeMy Scrap Nook toolbar - powered by the MyWebSearch or Ask Partner Network toolbars by Mindspark Interactive Network, Inc. Detected by Malwarebytes Anti-Malware as PUP.Optional.MindSpark. The file is located in %ProgramFiles%\MyScrapNook_12\bar\*.bin - where * represents a number or letter. If bundled with another installer or not installed by choice then remove itNo
12Ghosts ClipU12clip.exe12Ghosts Clip - "Screen shots made easy"No
12Ghosts SetColorU12color.exe12Ghosts SetColor - "Change your desktop icon text colors, also to transparent"No
12Ghosts Popup-KillerU12popup.exe12Ghosts Popup-KillerNo

 

FIRST PREV ( Page 4 of 780 ) NEXT LAST

You can also manually change the page number in the address bar.

Notes & Warnings

If you can help identify new entries and verify/identify those entries with a "?" status (especially hardware specific - such as laptops and motherboards) then please E-mail us (startups_at_pacs-portal_dot_co_dot_uk).

"Status" key:

Variables:

DISCLAIMER: It is assumed that users are familiar with the operating system they are using and comfortable with making the suggested changes. We will not be held responsible if changes you make cause a system failure.

WARNING: This is NOT a database of tasks/processes taken from Task Manager or the Close Program window (CTRL+ALT+DEL) but a database of start-up applications, although you will find some of them listed via this method. Pressing CTRL+ALT+DEL identifies programs that are currently running - not necessarily at start-up. For a list of tasks/processes you should try the Process Library from Uniblue, the list at PC Pitstop or one of the many others now available. Therefore, before ending a task/process via CTRL+ALT+DEL just because it has an "X" recommendation, please check whether it's in MSConfig or the registry first. An example would be "svchost.exe" - which doesn't appear in either under normal conditions but does via CTRL+ALT+DEL. If in doubt, don't do anything.

To avoid the database becoming too large, all malware entries are only shown using the registry version which is common to all Windows versions. Otherwise there would be multiple entries for popular filenames that viruses often use - such as "svchost.exe" above for example. Multiple malware can also use the same start-up entries, in this case only those with significant differences (such as file location) are repeated in this database.

As more than 15K entries in this database related to malware you should use a quality internet security package. Which ever you choose, keep it updated and get the latest version at least every two years.

There are a number of virus and malware entried listed in this database where specific removal instructions haven't been given. If this is the case then you could try ComboFix, a program written by sUBs that can remove many different types of Trojans and Worms. See here for a tutorial on how to use the program

NOTE: A number of entries are repeated due to the way that different operating systems display startup items. For example, WinMe lists "POPROXY.EXE" as "Norton eMail Protect" in both MSCONFIG and the registry whereas WinXP lists it as "Poproxy" in MSCONFIG and "Norton eMail Protect" in the registry.

SERVICES: "Services" from the NT/2K/XP/Vista/7 operating systems are not included. We fully understand that some programs with these OS's use "Services" as an alternative to load their component parts at startup but these are handled in a different way. We recommend you try BlackViper for information on services for the relevant operating systems.

Copyright

Presentation, format & comments Copyright © 2001 - 2014 Pacman's Portal
Portions Copyright © Peter Forrest, Denny Denham, Sylvain Prevost, Tony Klein, CastleCops & Bleeping Computer
Powered by Malwarebytes
All rights reserved

Valid XHTML 1.0 Transitional

Privacy Policy Site Map Home