Index Introduction Database Detailed Entries Updates Concise List HJT Forums Rogues Message Board

Windows startup programs - Browse database

If you're frustrated with the time it takes your Windows 8/7/Vista/XP PC to boot and then it seems to be running slowly you may have too many programs running at start-up - and you have come to the right place to identify them. This is the original start-up programs (as opposed to processes/tasks) list - one of the most accurate and comprehensive. Services are not included - see below. For further information on this and how to identify and disable start-up programs please visit the Introduction page.

See here for further information on random entries - which are typically added by viruses and other malware or unwanted programs.

Last database update :- 27th June, 2014
40644 items listed

Entries are sorted by the Command/Data field. Alternatively, you can search the full database or use the alphabetical index on that page.

FIRST PREV ( Page 507 of 813 ) NEXT LAST

You can also manually change the page number in the address bar.

Startup Item or Name Status Command or Data Description Tested
Services.EXEXservices.exeDetected by Symantec as W32.HLLW.Kazping. Note - this is not the legitimate services.exe process which is always located in %System%. This one is located in %Windir% and loads from the HKLM\Run & HKLM\RunServices keysNo
Services++Xservices.exeDetected by Symantec as W32.SillyFDC.BDM. Note - this is not the legitimate services.exe process which is always located in %System%. This one is located in %Recycled%No
ServicesAdministratorXSERVICES.EXEDetected by Sophos as W32/Punya-B and by Malwarebytes Anti-Malware as Trojan.Agent. Note - this is not the legitimate services.exe process which is always located in %System%. This one is located in %LocalAppData%\WINDOWSNo
ServicesaraXservices.exeDetected by Sophos as W32/Brontok-BS and by Malwarebytes Anti-Malware as Backdoor.Agent. Note - this is not the legitimate services.exe process which is always located in %System%. This one is located in %LocalAppData%\WINDOWSNo
Spooler de ImpressXservices.exeAdded by the AGENT-NEX TROJAN! Note - this is not the legitimate services.exe process which is always located in %System%. This one is located in %User%No
Srv32WinXservices.exeDetected by Trend Micro as TROJ_DLOADER.UEF. Note - this is not the legitimate services.exe process which is always located in %System%. This one is located in %ProgramFiles%No
sservicesXservices.exeSpyOnePro spyware. Note - this is not the legitimate services.exe process which is always located in %System%. This one is located in %System%\sopdirNo
SuperBar.ComponentXservices.exeAdded by the SMALL-AQ TROJAN! Note - this is not the legitimate services.exe process which is always located in %System%. This one is located in the "inetsrv" sub-folderNo
sysinitXservices.exeAdded by the NEWLFRM-A TROJAN! Note - this is not the legitimate services.exe process which is always located in %System%. This one is located in %System%\golummNo
SysServiceUSERVICES.EXENSKeyLogger keystroke logger/monitoring program - remove unless you installed it yourself! Note - this is not the legitimate services.exe process which is always located in %System%. This one is located in %ProgramFiles%\NSkeyloggerNo
SysServicesXSERVICES.EXEAdded by the DELF-EY TROJAN! Note - this is not the legitimate services.exe process which is always located in %System%. This one is located in %Windir%No
systemXservices.exeAdded by the DELF-LQ TROJAN! Note - this is not the legitimate services.exe process which is always located in %System%. This one is located in %Windir%\HELPNo
System Update2Xservices.exeDetected by Sophos as Troj/Autotroj-C. Note - this is not the legitimate services.exe process which is always located in %System%No
SystemBootXservices.exeAdded by the SOBER-Q TROJAN! Note - this is not the legitimate services.exe process which is always located in %System%. This one is located in %Windir%\Help\HelpNo
SystemCheckXservices.exeAdded by the SOBER-M WORM! Note - this is not the legitimate services.exe process which is always located in %System%. This one is located in %Windir%\Config\systemNo
TaskhostXservices.exeDetected by Dr.Web as Trojan.Packed.23496 and by Malwarebytes Anti-Malware as Trojan.Buterat. Note - this is not the legitimate services.exe process which is always located in %System%. This one is located in %AppData%No
TEXTCONVXservices.exeAdded by the NEVEG.B or NEVEG.C WORMS! Note - this is not the legitimate services.exe processNo
Torjan ProgramXservices.exeAdded by the AUTEX.C WORM! Note - this is not the legitimate services.exe process which is always located in %System%. This one is located in %Windir%No
ttplayXservices.exeDetected by Malwarebytes Anti-Malware as Trojan.ChinAd. Note - this is not the legitimate services.exe process which is always located in %System%. This one is located in %CommonFiles%\TencentNo
upDpacketoXservices.exeDetected by Sophos as W32/Nafbot-A and by Malwarebytes Anti-Malware as Worm.P2P. Note - this is not the legitimate services.exe process which is always located in %System%. This one is located in %Windir%No
WinCheckXservices.exeAdded by the SOBER.S WORM! Note - this is not the legitimate services.exe process which is always located in %System%. This one is located in %Windir%\ConnectionStatus\MicrosoftNo
WindowsXservices.exeAdded by the DLOADR-GW TROJAN! Note - this is not the legitimate services.exe process which is always located in %System%. This one is located in a "Windows" sub-folderNo
WindowsXservices.exeAdded by the SOBER-Z WORM! Note - this is not the legitimate services.exe process which is always located in %System%. This one is located in %Windir%\WinSecurityNo
Windows DesktopXservices.exeAdded by the DWNLDR-JAN TROJAN! Note - this is not the legitimate services.exe process which is always located in %System%. This one is located in %Windir%No
Windows Logon ApplicationXservices.exeDetected by Sophos as Troj/Ciadoor-L and by Malwarebytes Anti-Malware as Backdoor.Bot. Note - this is not the legitimate services.exe process which is always located in %System%. This one is located in %Windir%No
Windows ServiceXservices.exeDetected by Sophos as W32/Kalel-A. Note - this is not the legitimate services.exe processNo
Windows Service ControllerXservices.exeAdded by the KALEL-B WORM! Note - this is not the legitimate services.exe processNo
Windows Service HostXservices.exeDetected by Sophos as Mal/Autorun-BB and by Malwarebytes Anti-Malware as Trojan.Agent. Note - this is not the legitimate services.exe process which is always located in %System%. This one is located in %AppData%\microsoftNo
Windows ServicesXservices.exeDetected by Sophos as Troj/Agent-MVC. Note - this is not the legitimate services.exe process which is always located in %System%. This one is located in %Windir%No
WINDQ32_TRLVXservices.exeDetected by McAfee as Generic VB.z and by Malwarebytes Anti-Malware as Trojan.Downloader. Note - this is not the legitimate services.exe process which is always located in %System%. This one is located in %ProgramFiles%\Winqows PublrlvNo
winsrv3Xservices.exeDetected by Sophos as W32/Nafbot-A and by Malwarebytes Anti-Malware as Worm.P2P. Note - this is not the legitimate services.exe process which is always located in %System%. This one is located in %Windir%No
WMAudioXservices.exeAdded by the NEVEG.B or NEVEG.C WORMS! Note - this is not the legitimate services.exe processNo
wservicezXservices.exeDetected by Malwarebytes Anti-Malware as Backdoor.IRCBot. The file is located in %AppData%\MicrosoftNo
WSVCSUSERVICES.EXEWSLogger keystroke logger/monitoring program - remove unless you installed it yourself! Note - this is not the legitimate services.exe process which is always located in %System%. This one is located in a WALI\SVCS sub-directoryNo
xp_systemXservices.exeDetected by Sophos as Troj/Krepper-N and variants and by Malwarebytes Anti-Malware as Trojan.Downloader. Note - this is not the legitimate services.exe process which is always located in %System%. The one is located in a %Windir%\inet***** - where ***** varies dependent upon the variant, examples are 10066, 20001, 20088No
XpsystemXSERVICES.EXEAdded by the DAEMOZ.A TROJAN! Note - this is not the legitimate services.exe process which is always located in %System%. This one is located in %System%\SERVICESNo
xpsystemXservices.exeCoolWebSearch parasite variant. Note - this is not the legitimate services.exe processNo
ServiceXservices.exe -servAdded by the NETSKY or NETSKY.B WORMS! Note - this is not the legitimate services.exe process which is always located in %System%. This one is located in %Windir%No
Windows StartupXservices21.exeAdded by the AGOBOT-MX WORM!No
Microsoft System DebugXservices32.exeDetected by Trend Micro as WORM_RBOT.AKHNo
Sygate Personal Firewall StartXservices32.exeAdded by the RBOT-MB WORM!No
system32.exeXservices32.exeAdded by a variant of W32.IRCBot. The file is located in %System%No
Win ServicesXServices32.exeAdded by the SYGINRE TROJAN!No
Wins Update 32Xservices32.exeAdded by the FORBOT-FN WORM!No
System33Xservices33.exeAdded by the RBOT-VQ WORM!No
MSNXservices51651.exeAdded by the IRCBOT-AAL TROJAN!No
win32servXservicesetup.exeAdded by a variant of the PUSHBOT WORM! A family of worms that spread using MSN MessengerNo
ServicesNotifyUServicesNotify.exeDefender Pro AntispyNo
Configuration LoaderXServicess.exeDetected by Symantec as W32.HLLW.Gaobot.AO and by Malwarebytes Anti-Malware as Backdoor.BotNo
HKCUXServicess.exeDetected by Malwarebytes Anti-Malware as Backdoor.HMCPol.Gen. The file is located in %System%\installNo

 

FIRST PREV ( Page 507 of 813 ) NEXT LAST

You can also manually change the page number in the address bar.

Notes & Warnings

If you can help identify new entries and verify/identify those entries with a "?" status (especially hardware specific - such as laptops and motherboards) then please E-mail us (startups_at_pacs-portal_dot_co_dot_uk).

"Status" key:

Variables:

DISCLAIMER: It is assumed that users are familiar with the operating system they are using and comfortable with making the suggested changes. We will not be held responsible if changes you make cause a system failure.

WARNING: This is NOT a list of tasks/processes taken from the Task Manager (CTRL+SHIFT+ESC) "Processes" tab. This displays some startup programs AND other background tasks and "Services". These pages are concerned with startup programs from the common startup locations shown above ONLY. Please do not submit entries collected from this method as they will not be used. For a list of tasks/processes you should try the list at PC Pitstop, the Process Library from Uniblue or one of the many others now available.

Therefore, before ending a task/process via CTRL+SHIFT+ESC just because it has an "X" recommendation, please check whether it's in the registry or common startup locations first. An example would be "svchost.exe" - which doesn't appear in either under normal conditions but does via CTRL+SHIFT+ESC. If in doubt, don't do anything.

To avoid the database becoming too large, all malware entries are only shown using the registry version which is common to all Windows versions. Otherwise there would be multiple entries for popular filenames that viruses often use - such as "svchost.exe" above for example. Multiple malware can also use the same start-up entries, in this case only those with significant differences (such as file location) are repeated in this database.

As more than 25K entries in this database related to malware you should use a quality internet security package. Which ever you choose, keep it updated and get the latest version at least every two years.

There are a number of virus and malware entries listed in this database where specific removal instructions haven't been given. If this is the case then you could try ComboFix, a program written by sUBs that can remove many different types of Trojans and Worms. See here for a tutorial on how to use the program.

NOTE: A number of entries are repeated due to the way that different operating systems display startup items. For example, WinMe lists "POPROXY.EXE" as "Norton eMail Protect" in both MSCONFIG and the registry whereas WinXP lists it as "Poproxy" in MSCONFIG and "Norton eMail Protect" in the registry.

SERVICES: "Services" from the Windows 8/7/Vista/XP/2K/NT operating systems are not included. We fully understand that some programs with these OS's use "Services" as an alternative to load their component parts at startup but these are handled in a different way. We recommend you try BlackViper for information on services for the relevant operating systems.

Copyright

Presentation, format & comments Copyright © 2001 - 2014 Pacman's Portal
Portions Copyright © Peter Forrest, Denny Denham, Sylvain Prevost, Tony Klein, CastleCops & Bleeping Computer
Powered by Malwarebytes
All rights reserved

Valid XHTML 1.0 Transitional

Privacy Policy Site Map Home