|Index||Introduction||Database||Detailed Entries||Updates||Concise List||HJT Forums||Rogues||Message Board|
If you're frustrated with the time it takes your Windows 10/8/7/Vista/XP PC to boot and then it seems to be running slowly you may have too many programs running at start-up - and you have come to the right place to identify them. This is the original start-up programs (as opposed to processes/tasks) list - one of the most accurate and comprehensive. Services are not included - see below. For further information on this and how to identify and disable start-up programs please visit the Introduction page.
See here for further information on random entries - which are typically added by viruses and other malware or unwanted programs.
Last database update :- 30th November, 2016
Entries are sorted by the Command/Data field. Alternatively, you can search the full database or use the alphabetical index on that page.FIRST PREV ( Page 507 of 1011 ) NEXT LAST
You can also manually change the page number in the address bar.
|Startup Item or Name||Status||Command or Data||Description||Tested|
|PCWatch||U||pcwatch.exe||PCWatch surveillance software. Uninstall this software if you did not install it yourself||No|
|WPMN1JWI05||X||PCWire.exe.lnk||Detected by Intel Security/McAfee as RDN/Generic.dx!ddb and by Malwarebytes Anti-Malware as Backdoor.Agent.IMN||No|
|Xtrem parental control||U||pcx.exe||ParentXtreme - surveillance software. Uninstall this software unless you put it there yourself||No|
|Shell||X||PCyrNJb.exe,explorer.exe||Detected by Intel Security/McAfee as RDN/Generic BackDoor!wu and by Malwarebytes Anti-Malware as Backdoor.Agent.DCE. Note - this entry adds an illegal HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon "Shell" entry. The value data points to "explorer.exe" (which is a legitimate file located in %Windir% and shouldn't be deleted) and "PCyrNJb.exe" (which is located in %AppData%\B4b6loG5)||No|
|PC Live Guard||X||PC[random].exe||PC Live Guard rogue security software - not recommended, removal instructions here. Detected by Malwarebytes Anti-Malware as Rogue.PCLiveGuard. The file is located in %CommonAppData%\[random]||No|
|PC Antispyware 2010||X||PC_Antispyware2010.exe||PC Antispyware 2010 rogue security software - not recommended, removal instructions here||No|
|PC Security 2009||X||PC_Security2009.exe||PC Security 2009 rogue security software - not recommended, removal instructions here||No|
|PC_GIZMOS||U||PC_[version].exe.exe||Detected by Malwarebytes Anti-Malware as PUP.Optional.PCGizmos. The file is located in %AppData%\PC-Gizmos. If bundled with another installer or not installed by choice then remove it||No|
|Popup Defender||U||PD.exe||Popup Defender - pop-up killer||No|
|Windows Service||X||pd14.exe||Adware - detected by DiamondCS TDS-3 anti-trojan as the DELF.DG TROJAN!||No|
|Windows Service||X||pd7.exe||Detected by Trend Micro as TROJ_SMALL.VZ||No|
|Pd71Pan||U||Pd71Pan.Exe||Audiotrak Prodigy 7.1 sound card control panel||No|
|PdaNet Desktop||U||PdaNetPC.exe||PdaNet from June Fabrics Technology Inc. Allows you to use iPhone, Android, Blackberry, Windows Mobile or PocketPC smartphones as wireless modem for your PC||No|
|PDASCAN||X||pdascan.exe||Detected by Sophos as W32/Agobot-QY||No|
|MICROSOFT Windows update||X||pdate.exe||Detected by Trend Micro as WORM_RBOT.BZT and by Malwarebytes Anti-Malware as Trojan.MWF.Gen||No|
|Dialog Helper||N||PDDLGHLP.EXE||Dialog Helper from PowerDesk Pro by Ontrack. Helps with the standard Open and Save As dialog boxes by showing recently used files and folders. Available via Start → Programs||No|
|PDDM||U||pddm.exe||Patchlink Update - "core product of the leading patch and vulnerability management software solution for medium and large enterprise network security"||No|
|Personal Defender 2009||X||pdefendr.exe||Personal Defender 2009 rogue security software - not recommended, removal instructions here||No|
|PDEngine||U||PDEngine.exe||PerfectDisk from Raxco - disk defragmenter. Only required if you schedule disk defragmenting at re-boot||No|
|AdobeReaderU||X||PDEngines.exe||Detected by Intel Security/McAfee as RDN/Generic Downloader.x and by Malwarebytes Anti-Malware as Backdoor.Agent.ADBE||No|
|Matrox Powerdesk||N||PDesk.exe||"Matrox PowerDesk software provides extra multi-display desktop management controls"||No|
|PowerDesk||N||PDExplo.exe||Older version of the PowerDesk Pro file management utility by Avanquest. Previously by V Communications, Inc (now part of Avanquest) who acquired it from Kroll OnTrack||No|
|PowerDesk [version]||N||PDExplo.exe||Older version of the PowerDesk Pro file management utility by Avanquest. Previously by V Communications, Inc (now part of Avanquest) who acquired it from Kroll OnTrack||No|
|PDF FoxitReader.exe||X||PDF FoxitReader.exe||Detected by Intel Security/McAfee as W32/Worm-FFX!5AC005CEBD74 and by Malwarebytes Anti-Malware as Trojan.Ransom.GAR. Note - this is not the legitimate Foxit Reader and the file is located in %UserStartup% and its presence there ensures it runs when Windows starts||No|
|adobe2||X||pdf.exe||Detected by Malwarebytes Anti-Malware as Trojan.Agent.PFD. The file is located in %AppData%\adobe2||No|
|adobea1||X||pdf.exe||Detected by Malwarebytes Anti-Malware as Backdoor.NetWiredRC. The file is located in %AppData%\adobea1||No|
|Shell||X||pdf.exe||Detected by Malwarebytes Anti-Malware as Trojan.Agent.AI. Note - this entry adds an illegal HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon "Shell" entry. The value data points to "pdf.exe" (which is located in %Temp%)||No|
|Update||X||pdf.exe||Detected by Malwarebytes Anti-Malware as Trojan.Agent.UPD. The file is located in %AppData%\pdf||No|
|PDFPrint||N||pdf24.exe||PDF24 Creator - free PDF converter utility||No|
|PDFCreatorClient||N||PDFClient.exe||Jaws PDF Creator by Jaws PDF Technologies - "is an affordable and reliable means of creating high quality PDF files from virtually any document, in any application"||No|
|PDFHook||U||pdfcreate5hook.exe||Prevents the "Trial Version www.Nuance.com" watermark appearing in PDF documents created by the PDF creating/editing utilities from Nuance (was ScanSoft) when the product has been installed but not activated properly. See here for more information||No|
|PDFHook||U||pdfcreate6hook.exe||Prevents the "Trial Version www.Nuance.com" watermark appearing in PDF documents created by the PDF creating/editing utilities from Nuance (was ScanSoft) when the product has been installed but not activated properly. See here for more information||No|
|Nuance PDF Products||U||pdfcreate7hook.exe||Prevents the "Trial Version www.Nuance.com" watermark appearing in PDF documents created by the PDF creating/editing utilities from Nuance (was ScanSoft) when the product has been installed but not activated properly. See here for more information||No|
|Nuance PDF Products||U||pdfcreate8hook.exe||No|
|Startname||X||PDFF2.exe||Detected by Malwarebytes Anti-Malware as Backdoor.Agent.DCE. The file is located in %ProgramFiles% - see here||No|
|Perfect Defender 2009||X||pdfndr.exe||Perfect Defender 2009 rogue security software - not recommended, removal instructions here||No|
|Proof Defender 2009||X||pdfndr.exe||Proof Defender 2009 rogue security software - not recommended, removal instructions here||No|
|Nuance PDF Products||U||pdfpro7hook.exe||No|
|Nuance PDF Products||U||pdfpro8hook.exe||No|
FIRST PREV ( Page 507 of 1011 ) NEXT LAST
You can also manually change the page number in the address bar.
If you can help identify new entries and verify/identify those entries with a "?" status (especially hardware specific - such as laptops and motherboards) then please E-mail us (startups_at_pacs-portal_dot_co_dot_uk).
DISCLAIMER: It is assumed that users are familiar with the operating system they are using and comfortable with making the suggested changes. We will not be held responsible if changes you make cause a system failure.
WARNING: This is NOT a list of tasks/processes taken from the Task Manager (CTRL+SHIFT+ESC) "Processes" tab. This displays some startup programs AND other background tasks and "Services". These pages are concerned with startup programs from the common startup locations shown above ONLY. Please do not submit entries collected from this method as they will not be used. For a list of tasks/processes you should try the list at PC Pitstop, the Process Library from Uniblue or one of the many others now available.
Therefore, before ending a task/process via CTRL+SHIFT+ESC just because it has an "X" recommendation, please check whether it's in the registry or common startup locations first. An example would be "svchost.exe" - which doesn't appear in either under normal conditions but does via CTRL+SHIFT+ESC. If in doubt, don't do anything.
To avoid the database becoming too large, all malware entries are only shown using the registry version which is common to all Windows versions. Otherwise there would be multiple entries for popular filenames that viruses often use - such as "svchost.exe" above for example. Multiple malware can also use the same start-up entries, in this case only those with significant differences (such as file location) are repeated in this database.
As more than 25K entries in this database related to malware you should use a quality internet security package. Which ever you choose, keep it updated and get the latest version at least every two years.
There are a number of virus and malware entries listed in this database where specific removal instructions haven't been given. If this is the case then you could try ComboFix, a program written by sUBs that can remove many different types of Trojans and Worms. See here for a tutorial on how to use the program.
NOTE: A number of entries are repeated due to the way that different operating systems display startup items. For example, WinMe lists "POPROXY.EXE" as "Norton eMail Protect" in both MSCONFIG and the registry whereas WinXP lists it as "Poproxy" in MSCONFIG and "Norton eMail Protect" in the registry.
SERVICES: "Services" from the Windows 8/7/Vista/XP/2K/NT operating systems are not included. We fully understand that some programs with these OS's use "Services" as an alternative to load their component parts at startup but these are handled in a different way. We recommend you try BlackViper for information on services for the relevant operating systems.
Presentation, format & comments Copyright © 2001 - 2016 Pacman's Portal
Portions Copyright © Peter Forrest, Denny Denham, Sylvain Prevost, Tony Klein, CastleCops & Bleeping Computer
Powered by Malwarebytes
All rights reserved