Index Introduction Database Detailed Entries Updates Concise List HJT Forums Rogues Message Board

Windows startup programs - Browse database

If you're frustrated with the time it takes your Windows 10/8/7/Vista/XP PC to boot and then it seems to be running slowly you may have too many programs running at start-up - and you have come to the right place to identify them. This is the original start-up programs (as opposed to processes/tasks) list - one of the most accurate and comprehensive. Services are not included - see below. For further information on this and how to identify and disable start-up programs please visit the Introduction page.

See here for further information on random entries - which are typically added by viruses and other malware or unwanted programs.

Last database update :- 29th March, 2018
52980 listed

Entries are sorted by the Command/Data field. Alternatively, you can search the full database or use the alphabetical index on that page.

FIRST PREV ( Page 507 of 1060 ) NEXT LAST

You can also manually change the page number in the address bar.

Startup Item or Name Status Command or Data Description Tested
NTFSCLUPYNTFSCLUP.EXEPart of an older version of ConfigSafe from imagine LAN, Inc. - which lets you identify changes to the registry, INI files, System asset files, system hardware, network connections, and operating system versions - provides a restore function. "Checks if an ntfssos restore has been performed since it was last run. It exits immediately after running. 99+% of the time it will only execute about a dozen instructions before exiting"No
ConfigSafeYNTFSCLUP.EXEPart of an older version of ConfigSafe from imagine LAN, Inc. - which lets you identify changes to the registry, INI files, System asset files, system hardware, network connections, and operating system versions - provides a restore function. "Checks if an ntfssos restore has been performed since it was last run. It exits immediately after running. 99+% of the time it will only execute about a dozen instructions before exiting"No
*ntfsqueuedns.exeXntfsqueuedns.exeDetected by Sophos as Troj/FakeAV-EMNNo
ntfyappXntfyapp.exeDetected by McAfee as Tibs-PackedNo
GinaDllXntgina.dllDetected by Trend Micro as WORM_ANIG.ANo
WSAConfigurationXntguard32.exeAdded by a variant of WORM_AGOBOT.GEN. The file is located in %System%No
Norton Guard 32Xntguard32.exeAdded by a variant of Backdoor:Win32/Rbot. The file is located in %System%No
WinSocketComponentXnthost.exeAdded by an unidentified VIRUS, WORM or TROJAN!No
settingsXnthost32.exeDetected by McAfee as Generic.mfrNo
kayXntibcpsaq.exeDetected by Malwarebytes as Trojan.Inject. The file is located in %CommonAppData%\kayNo
ntiMUIUntiMUI.exePart of NTI CD & DVD Maker from NTI Corporation - now superseded by NTI Media MakerNo
ewrohpbvXntiwpeal.exeDetected by Malwarebytes as Backdoor.Bot. The file is located in %LocalAppData%No
NT Kernel ServiceXNTKernel.exe -rundll32 /SYSTEM32 taskmgr.exeDetected by Dr.Web as Trojan.DownLoader10.14467. Note - do not delete the legitimate taskmgr.exe process which is always located in %System%No
AdobeReaderProXntkernell32.exeDetected by Sophos as W32/Rbot-ATY and by Malwarebytes as Backdoor.BotNo
Compaq Service DriversXNtKernelSystem.exeDetected by Malwarebytes as Backdoor.IRCBot. The file is located in %System%No
Kernel LoaderXntkrnl.exeDetected by Symantec as W32.Cervivec.A@mmNo
NT Kernel and SystemXntkrnl64.exeDetected by Dr.Web as Trojan.DownLoader7.10083 and by Malwarebytes as Trojan.AgentNo
NT Kernel PatchNntkrnlpt.exePart of Bitware from 2Point Communications, Inc - "a Windows based solution that allows users to integrate your voice messaging and faxing to an individual PC." Now known as Simply Messenger PRONo
gdihareXntkrunas.exeDetected by Sophos as Troj/Ursnif-AH and by Malwarebytes as Trojan.Agent.OSKNo
Win PatchXntldr.exeDetected by Sophos as W32/SdBot-GS and by Malwarebytes as Trojan.AgentNo
sys32exXNTLDR.exeDetected by Malwarebytes as Trojan.Agent.SX. The file is located in %System%No
ntldrXntldr.exeBrowser hijacker - redirecting to search-control.com. The file is located in %System%. In addition to the registry changes, it also creates the following files: C:\m.exe, %Windir%\Search-For-You.url, C:\n.bat, C:\q.exe and C:\r.batNo
win32bootloaderXntldr32.exeDetected by Dr.Web as Trojan.DownLoader4.12819 and by Malwarebytes as Backdoor.IRCBotNo
shell32Xntldrt.exeDetected by Sophos as W32/Jlok-ANo
sysclxXntldrt.exeDetected by Sophos as W32/Jlok-ANo
Windows NT 32Xntlogin32.exeDetected by Symantec as W32.Randex.BRDNo
Windows NT LoginXntlogin32.exeDetected by Trend Micro as WORM_SDBOT.WGNo
csrssXntmdi.exeDetected by Malwarebytes as Trojan.FakeAdobe. The file is located in %UserProfile%No
ntmsevtXntmsevt.exeDetected by Sophos as Troj/Stoped-BNo
FastStartXntnut32.exeDetected by Symantec as Trojan.StartPage.LNo
NotepadXntoepad.exeDetected by Sophos as W32/Delbot-AKNo
ntokrnlXntokrnl.exeDetected by Trend Micro as TSPY_BANKER-2.001No
NT ServiceXNTOKSRNL.EXEDetected by Sophos as W32/Rbot-AAGNo
NvCplDXntopengl.exeEnterOne - Switch dialer and hijacker variant, see hereNo
userinitXntos.exeDetected by Malwarebytes as Trojan.Proxy. The file is located in %AppData%No
userinitXntos.exeDetected by Symantec as Trojan.Gpcoder.E and by Malwarebytes as Trojan.Agent. The file is located in %System%No
Osa32XNTOSA32.exeDetected by Symantec as W32.HLLW.AnigNo
RealActiveXntoscore.exeAdded by the VIRUT.VQ VIRUS!No
Kernal Fault CheckXntosrkl.exeAdded by a variant of W32/Sdbot.worm. The file is located in %System%No
NTProviderXNTProvider.exeDetected by Malwarebytes as Backdoor.Alina. The file is located in %AppData%\[9 digits] - see an example hereNo
NTProviderXNTProvider.exeDetected by Malwarebytes as Trojan.Agent.MNT. The file is located in %AppData%\Microsoft CorpNo
NVIDIA ActiveArmorYntrayfw.exeSystem Tray access to the NVIDIA ActiveArmor hardware-optimized firewall built into some older nForce 3 and 4 series motherboard chipsetsNo
nTrayFwYntrayfw.exeSystem Tray access to the NVIDIA ActiveArmor hardware-optimized firewall built into some older nForce 3 and 4 series motherboard chipsetsNo
NTrtcNntrtc.exeDell year 2000 tool to deal with non-standard applications. Only required on older Dell PCs that may need this supportNo
MS taskbarXnts.exeDetected by Sophos as W32/Rbot-AGBNo
EasySync Pro - LtNts4UNtsAgent.exeLotus Notes 4 specific translator for IBM® Lotus® EasySync® Pro - "a personal productivity solution that provides data synchronization between your IBM Lotus Notes® desktop and handheld devices running PalmOS and Windows CE/Pocket PC operating systems"No
XTNDConnect PC - LtNts4UNtsAgnt.exe(IBM) Lotus Notes 4 specific translator for XTNDConnect PC - "award-winning desktop-sync application that enables you to easily synchronize your contacts, calendar, tasks, email and notes between your mobile devices and popular PC applications"No
Laplink PDASync 3.0 - LtNts4UNtsAgnt.exeLaplink PDASync for (IBM) Lotus Notes 4 - PDA synchronisation utilityNo
cssysXntserver.exeDetected by Symantec as Trojan.Ransomcrypt.AA and by Malwarebytes as Ransom.FileCryptor.ENo
Microsoft VersionXntservice.exeDetected by Dr.Web as Trojan.Siggen6.23973 and by Malwarebytes as Trojan.Agent.VRSGenNo

 

FIRST PREV ( Page 507 of 1060 ) NEXT LAST

You can also manually change the page number in the address bar.

Notes & Warnings

If you can help identify new entries and verify/identify those entries with a "?" status (especially hardware specific - such as laptops and motherboards) then please E-mail us (startups_at_pacs-portal_dot_co_dot_uk).

"Status" key:

Variables:

DISCLAIMER: It is assumed that users are familiar with the operating system they are using and comfortable with making the suggested changes. We will not be held responsible if changes you make cause a system failure.

WARNING: This is NOT a list of tasks/processes taken from the Task Manager (CTRL+SHIFT+ESC) "Processes" tab. This displays some startup programs AND other background tasks and "Services". These pages are concerned with startup programs from the common startup locations shown above ONLY. Please do not submit entries collected from this method as they will not be used. For a list of tasks/processes you should try the list at PC Pitstop, the Process Library from Uniblue or one of the many others now available.

Therefore, before ending a task/process via CTRL+SHIFT+ESC just because it has an "X" recommendation, please check whether it's in the registry or common startup locations first. An example would be "svchost.exe" - which doesn't appear in either under normal conditions but does via CTRL+SHIFT+ESC. If in doubt, don't do anything.

To avoid the database becoming too large, all malware entries are only shown using the registry version which is common to all Windows versions. Otherwise there would be multiple entries for popular filenames that viruses often use - such as "svchost.exe" above for example. Multiple malware can also use the same start-up entries, in this case only those with significant differences (such as file location) are repeated in this database.

As more than 25K entries in this database related to malware you should use a quality internet security package. Which ever you choose, keep it updated and get the latest version at least every two years.

There are a number of virus and malware entries listed in this database where specific removal instructions haven't been given. If this is the case then you could try ComboFix, a program written by sUBs that can remove many different types of Trojans and Worms. See here for a tutorial on how to use the program.

NOTE: A number of entries are repeated due to the way that different operating systems display startup items. For example, WinMe lists "POPROXY.EXE" as "Norton eMail Protect" in both MSCONFIG and the registry whereas WinXP lists it as "Poproxy" in MSCONFIG and "Norton eMail Protect" in the registry.

SERVICES: "Services" from the Windows 8/7/Vista/XP/2K/NT operating systems are not included. We fully understand that some programs with these OS's use "Services" as an alternative to load their component parts at startup but these are handled in a different way. We recommend you try BlackViper for information on services for the relevant operating systems.

Copyright

Presentation, format & comments Copyright © 2001 - 2017 Pacman's Portal
Portions Copyright © Peter Forrest, Denny Denham, Sylvain Prevost, Tony Klein, CastleCops & Bleeping Computer
Powered by Malwarebytes
All rights reserved

Valid XHTML 1.0 Transitional

Privacy Policy Site Map Home