Index Introduction Database Detailed Entries Updates Concise List HJT Forums Rogues Message Board

Windows startup programs - Browse database

If you're frustrated with the time it takes your Windows 8/7/Vista/XP PC to boot and then it seems to be running slowly you may have too many programs running at start-up - and you have come to the right place to identify them. This is the original start-up programs (as opposed to processes/tasks) list - one of the most accurate and comprehensive. Services are not included - see below. For further information on this and how to identify and disable start-up programs please visit the Introduction page.

See here for further information on random entries - which are typically added by viruses and other malware or unwanted programs.

Last database update :- 30th June, 2016
49849 items listed

Entries are sorted by the Command/Data field. Alternatively, you can search the full database or use the alphabetical index on that page.

FIRST PREV ( Page 507 of 997 ) NEXT LAST

You can also manually change the page number in the address bar.

Startup Item or Name Status Command or Data Description Tested
pikaXpika.exeAdded by the SWISYN-AI TROJAN!No
pikachuXpikachu.exeDetected by Dr.Web as Trojan.MulDrop3.2712 and by Malwarebytes Anti-Malware as Trojan.AgentNo
gpmceXpikirrr.exeDetected by Intel Security/McAfee as RDN/Autorun.worm!cwNo
pilifXpilif.exeAdded by the FILI WORM!No
VistENXpill.exeDetected by Dr.Web as Trojan.Inject1.30318 and by Malwarebytes Anti-Malware as Trojan.Agent.ENo
Windows his LayerXpilotGame.exeDetected by Trend Micro as WORM_RBOT.GLXNo
[3-4 random letters]Xping.exeDetected by Symantec as Adware.PurityScan - also see the archived version of Andrew Clover's page. Note - do not confuse with the Microsoft utility of the same name as described hereNo
HKCUXping.exeDetected by Malwarebytes Anti-Malware as Backdoor.HMCPol.Gen. The file is located in %System%No
HKLMXping.exeDetected by Malwarebytes Anti-Malware as Backdoor.HMCPol.Gen. The file is located in %System%No
pingXping.exeAdded by the SCAR-AK TROJAN! Note - do not confuse with the Microsoft utility of the same name as described hereNo
PoliciesXping.exeDetected by Malwarebytes Anti-Malware as Backdoor.Agent.PGen. The file is located in %System%No
PingTimeout InstitutionXpingchek.exeDetected by Sophos as W32/Sdbot-VYNo
PingerNpinger.exePinger is the resident program for Toshiba updates. Periodically checks to see if there are any software/driver upgrades for your particular computer model. If it finds any, it posts a notificationNo
ToshibaPingerNpinger.exePinger is the resident program for Toshiba Upgrades. Periodically checks to see if there are any software/driver upgrades for your particular computer model. If it finds any, it posts a notificationNo
firefoxXpingits.exeDetected by Intel Security/McAfee as Generic Downloader.il and by Malwarebytes Anti-Malware as Trojan.BankerNo
processXpingkil.exeDetected by Intel Security/McAfee as Generic Downloader.il and by Malwarebytes Anti-Malware as Trojan.BankerNo
PPPOEOXpingppac.exeDetected by Symantec as W32.Spybot.KHCNo
PinGuideXPinGuide.exeDetected by Microsoft as Adware:Win32/PinGuideNo
pingwab.exeXpingwab.exeDetected by Intel Security/McAfee as Generic Downloader.il and by Malwarebytes Anti-Malware as Trojan.BankerNo
pingweb.exeXpingweb.exeDetected by Intel Security/McAfee as Generic Downloader.il and by Malwarebytes Anti-Malware as Trojan.BankerNo
kissXpingy.exeAdded by a variant of the IRCBOT BACKDOOR! The file is located in a random sub-folder of %ProgramFiles%No
Pink CalendarUPinkCal.exePink Calendar & Day PlannerNo
MartiniXpinmart.exeAdded by a variant of W32/Sdbot.wormNo
PI NotifyNPINotify.exeProperty Intellect from Wild Rabbit Software Ltd - "is widely used in the residential lettings markets to help landlords, investors and managing agents deal with the day-to-day aspects of looking after property"No
PINotifyNPINotify.exeProperty Intellect from Wild Rabbit Software Ltd - "is widely used in the residential lettings markets to help landlords, investors and managing agents deal with the day-to-day aspects of looking after property"No
pinuohibsukpXpinuohibsukp.exeDetected by Intel Security/McAfee as RDN/Generic Dropper!vb and by Malwarebytes Anti-Malware as Trojan.Agent.USNo
PioletNpiolet.exePiolet - peer-to-peer file sharing clientNo
CMKFIJXPiowlR.exeDetected by Intel Security/McAfee as RDN/Generic BackDoor and by Malwarebytes Anti-Malware as Backdoor.Agent.DCENo
pipamyvaczoqXpipamyvaczoq.exeDetected by Intel Security/McAfee as Generic.tfr!cq and by Malwarebytes Anti-Malware as Trojan.Agent.USNo
PIPE SYSTEMXpipe.exeDetected by Sophos as W32/Mytob-FFNo
directxXPipeCmd.exeDetected by Symantec as Backdoor.Sdbot.DNo
PIPUPIPInstaller_HIP_.exeDetected by Malwarebytes Anti-Malware as PUP.Optional.Spigot. The file is located in %UserTemp%\ns[random].tmp. If bundled with another installer or not installed by choice then remove itNo
pipzonesippiXpipzonesippi.exeDetected by Intel Security/McAfee as RDN/Generic.dx!d2u and by Malwarebytes Anti-Malware as Trojan.Agent.USNo
piqxyhibragpXpiqxyhibragp.exeDetected by Malwarebytes Anti-Malware as Trojan.Agent.US. The file is located in %UserProfile% - see hereNo
000Upit.exePrivateEye surveillance software. Uninstall this software unless you put it there yourselfNo
Pittsburgh Penguins WeatherUPittsburgh Penguins Weather.exeWeather gadget included with the Pittsburgh Penguins theme for MyColors from Stardock CorporationNo
pivywytiqomzXpivywytiqomz.exeDetected by Intel Security/McAfee as Generic.grp and by Malwarebytes Anti-Malware as Trojan.Agent.USNo
Pixel32XPixel32.exeDetected by Symantec as Trojan.GemaNo
Pixelpwr32XPixelpwr32.exeDetected by Symantec as Trojan.GemaNo
PixelsvrXPixelsvr.exeAdded by the GEMA TROJAN!No
ewtsxqibXpixxevuh.exeDetected by Malwarebytes Anti-Malware as Backdoor.Bot. The file is located in %LocalAppData%No
[various names]Xpizda.exeFake startup entry created by the Wareout rogue spyware and dialer remover - not recommended, removal instructions here. Archived version of Andrew Clover's original pageNo
xxxXpi_server.exeDetected by Dr.Web as Trojan.DownLoader9.26692 and by Malwarebytes Anti-Malware as Backdoor.Agent.XENo
PJAOQxanYhXPJAOQxanYh.exeDetected by Intel Security/McAfee as RDN/Generic.bfr and by Malwarebytes Anti-Malware as Backdoor.Agent.ENo
pjedkfpnXpjedkfpn.datDetected by Malwarebytes Anti-Malware as Trojan.Ransom.Gend. The file is located in %CommonAppData%No
pjpcslvmXpjpcslvm.exeDetected by Malwarebytes Anti-Malware as Trojan.Banker. The file is located in %UserProfile%\pjpcslvmNo
pjsieqXpjsieq.exeDetected by Malwarebytes Anti-Malware as Trojan.FakeAlert. The file is located in %UserProfile% - see hereNo
pjWebCamUpjWebCam.exeWebcam automation software that saves regular photos from webcam and can also act as HTTP serverNo
Microsoft Update 2.5XPK1.exeDetected by Intel Security/McAfee as RDN/Generic Downloader.x and by Malwarebytes Anti-Malware as Backdoor.BotNo
Microsoft Update 2.5XPK2.exeDetected by Sophos as Troj/Agent-ABLE and by Malwarebytes Anti-Malware as Backdoor.BotNo

 

FIRST PREV ( Page 507 of 997 ) NEXT LAST

You can also manually change the page number in the address bar.

Notes & Warnings

If you can help identify new entries and verify/identify those entries with a "?" status (especially hardware specific - such as laptops and motherboards) then please E-mail us (startups_at_pacs-portal_dot_co_dot_uk).

"Status" key:

Variables:

DISCLAIMER: It is assumed that users are familiar with the operating system they are using and comfortable with making the suggested changes. We will not be held responsible if changes you make cause a system failure.

WARNING: This is NOT a list of tasks/processes taken from the Task Manager (CTRL+SHIFT+ESC) "Processes" tab. This displays some startup programs AND other background tasks and "Services". These pages are concerned with startup programs from the common startup locations shown above ONLY. Please do not submit entries collected from this method as they will not be used. For a list of tasks/processes you should try the list at PC Pitstop, the Process Library from Uniblue or one of the many others now available.

Therefore, before ending a task/process via CTRL+SHIFT+ESC just because it has an "X" recommendation, please check whether it's in the registry or common startup locations first. An example would be "svchost.exe" - which doesn't appear in either under normal conditions but does via CTRL+SHIFT+ESC. If in doubt, don't do anything.

To avoid the database becoming too large, all malware entries are only shown using the registry version which is common to all Windows versions. Otherwise there would be multiple entries for popular filenames that viruses often use - such as "svchost.exe" above for example. Multiple malware can also use the same start-up entries, in this case only those with significant differences (such as file location) are repeated in this database.

As more than 25K entries in this database related to malware you should use a quality internet security package. Which ever you choose, keep it updated and get the latest version at least every two years.

There are a number of virus and malware entries listed in this database where specific removal instructions haven't been given. If this is the case then you could try ComboFix, a program written by sUBs that can remove many different types of Trojans and Worms. See here for a tutorial on how to use the program.

NOTE: A number of entries are repeated due to the way that different operating systems display startup items. For example, WinMe lists "POPROXY.EXE" as "Norton eMail Protect" in both MSCONFIG and the registry whereas WinXP lists it as "Poproxy" in MSCONFIG and "Norton eMail Protect" in the registry.

SERVICES: "Services" from the Windows 8/7/Vista/XP/2K/NT operating systems are not included. We fully understand that some programs with these OS's use "Services" as an alternative to load their component parts at startup but these are handled in a different way. We recommend you try BlackViper for information on services for the relevant operating systems.

Copyright

Presentation, format & comments Copyright © 2001 - 2016 Pacman's Portal
Portions Copyright © Peter Forrest, Denny Denham, Sylvain Prevost, Tony Klein, CastleCops & Bleeping Computer
Powered by Malwarebytes
All rights reserved

Valid XHTML 1.0 Transitional

Privacy Policy Site Map Home