|Index||Introduction||Database||Detailed Entries||Updates||Concise List||HJT Forums||Rogues||Message Board|
If you're frustrated with the time it takes your Windows 8/7/Vista/XP PC to boot and then it seems to be running slowly you may have too many programs running at start-up - and you have come to the right place to identify them. This is the original start-up programs (as opposed to processes/tasks) list - one of the most accurate and comprehensive. Services are not included - see below. For further information on this and how to identify and disable start-up programs please visit the Introduction page.
See here for further information on random entries - which are typically added by viruses and other malware or unwanted programs.
Last database update :- 28th July, 2016
49996 items listed
Entries are sorted by the Command/Data field. Alternatively, you can search the full database or use the alphabetical index on that page.FIRST PREV ( Page 507 of 1000 ) NEXT LAST
You can also manually change the page number in the address bar.
|Startup Item or Name||Status||Command or Data||Description||Tested|
|DRam prmaessor||X||pHELLd.exe||Detected by Malwarebytes Anti-Malware as Backdoor.IRCBot. The file is located in %System%||No|
|Hyper Files||X||phfhost.exe||Detected by Sophos as Troj/Agent-JQO||No|
|PhiBtn||Y||PhiBtn.exe||Snapshot and Launch button application from Philips belonging to Philips SPC 900NC Camera||No|
|Philips Intelligent Agent||U||Philips Intelligent Agent.exe||Philips Intelligent Agent searches automatically the correct update for your recordable drive in only three simple steps||No|
|PhilipsRemote||U||PhilipsRemote.exe||Remote control support for MusicMatch Jukebox on Philips audio players such as the AZ2555 Sound Machine - see here||No|
|Peres||X||Phisyco.scr||Detected by Intel Security/McAfee as PWS-Banker.dldr!s and by Malwarebytes Anti-Malware as Trojan.Banker||No|
|GamecomSound||U||Phoebus_x64.exe||Support for the ASUS ROG Xonar Phoebus soundcard||No|
|Dialgo SDK||U||PhoneAnswer.exe||Dialgo Wave Modem ActiveX SDK - telephone answering machine for scripting your own professional call center business scripts using a voice modem. "Features Caller ID Extraction, Digit Monitor and Playback, Wave File Playback and Recording on Phone Line. With this application you can save your Wave File in more than 20 Audio Formats"||No|
|PhoneFree version 6.2||U||PHONEF??.EXE||An Internet telephony application. Complicated registration and ad banners tailored to your profile - see here||No|
|Client Agent||X||photes.exe||Detected by Sophos as Troj/PPdoor-P||No|
|photo sex #.exe||X||photo sex #.exe||Detected by Malwarebytes Anti-Malware as Trojan.Agent.E - where # represents one or more digits. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows starts||No|
|Photo||X||Photo.exe||Detected by Sophos as W32/SillyFDC-KH and by Malwarebytes Anti-Malware as Worm.SFDC.Gen||No|
|POUR||X||photo.exe||Detected by Intel Security/McAfee as RDN/Autorun.bfr!d and by Malwarebytes Anti-Malware as Worm.AutoRun.E||No|
|Run||X||Photo.exe||Detected by Malwarebytes Anti-Malware as Backdoor.Agent.TRJE. The file is located in %AppData%||No|
|Startup||X||Photo.exe||Detected by Malwarebytes Anti-Malware as Trojan.Agent.STU. The file is located in %CommonAppData%\Microsoft\Windows\Start Menu\Programs (8/7/Vista) or %AllUsersProfile%\Start Menu\Programs (XP)||No|
|Drsktop||X||Photo49.exe||Detected by Dr.Web as Win32.HLLW.Autoruner2.14589 and by Malwarebytes Anti-Malware as Backdoor.Agent.E||No|
|winsys32||X||Photobucket Energi3.exe||Detected by Malwarebytes Anti-Malware as Backdoor.Agent. The file is located in %AppData% - see here||No|
|PhotoCAL Startup||N||PhotoCAL.exe||PhotoCAL wizard driven monitor calibration software from ColorVision for beginners and photo enthusiasts||No|
|PhotoJoy||N||PhotoJoy.exe||PhotoJoy by IncrediMail Ltd - utility to turn photos into PhotoToys, 3D Screensavers and Wallpaper Collages||No|
|Auto Run Software for Photo Frame||U||PhotoManager.exe||Management software for Philips digital PhotoFrame range. Used to edit photos and transfer them directly from a PC via a USB cable. Start manually when you connect the device||Yes|
|PhotoManager||U||PhotoManager.exe||Management software for Philips digital PhotoFrame range. Used to edit photos and transfer them directly from a PC via a USB cable. Start manually when you connect the device||Yes|
|Photos Widget (HTC Home)||N||Photos.exe||Photos Widget from HTC Home - which is "a free set of widgets for Windows like on HTC Smartphones." The default installation includes the QuickShare ad-supported browser enhancement which can in turn install the Delta toolbar||Yes|
|Photos.exe||X||Photos.exe||Detected by Malwarebytes Anti-Malware as Backdoor.Messa. The file is located in %AppData%||No|
|PhotoScape#.exe||X||PhotoScape#.exe||Detected by Malwarebytes Anti-Malware as Password.Stealer.E - where # represents 4 or more digits. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows starts||No|
|PhotoScape||X||PhotoScape.exe||Detected by Malwarebytes Anti-Malware as Backdoor.Agent.E. The file is located in %AppData%||No|
|PhotoshopElementsSyncAgent||U||PhotoshopElementsSyncAgent.exe||Part of Adobe Photoshop Elements products in the US. "When you sign in with your Adobe ID, you can back up your albums and catalogs to Photoshop.com servers. Backing up and synchronizing your albums and catalogs are essential for protecting your photos and media files"||No|
|PhotoShop||X||photoshoxp.exe||Detected by Malwarebytes Anti-Malware as Backdoor.Messa. The file is located in %AppData%||No|
|I&F Viewer toolbar||U||phototoolkitmem.exe||Part of Photo Toolkit from VicMan Software, Inc - which "is powerful multifunctional software offering a complete set of image editing tools. It contains anything a digital camera owner might need to correct or enhance their photos"||No|
|photo_id||X||photo_id.exe||Detected by Sophos as Troj/Agent-LTF and by Malwarebytes Anti-Malware as Backdoor.Bot||No|
|VMGOATPOSTREBOOTAN||X||phphelp.exe||Detected by Intel Security/McAfee as RDN/Generic PWS.y!bb3 and by Malwarebytes Anti-Malware as Backdoor.Agent.GTO||No|
|VCXD Settings||X||phqg.EXE||Added by the RBOT.BRF WORM!||No|
|WEB DRIVERS FOR WIN32||X||phqgh.exe||Added by the SDBOT.BPE WORM!||No|
|VID INTERNET WEB DRIVERS FOR WIN32||X||phqghu.exe||Added by the RBOT.BUD WORM!||No|
|VIEW POINT DRIVERS FOR WIN32||X||phqghu.exe||Added by the RBOT.BUD WORM!||No|
|KYM Control Settings||X||phqghum.exe||Added by the RBOT.BQD WORM!||No|
|Microsoft Update SERVICE||X||phqghum.exe||Added by a variant of Backdoor:Win32/Rbot. The file is located in %System%||No|
|VIEW POINT DRIVERS||X||phqghum.exe||Detected by Trend Micro as WORM_RBOT.BRX||No|
|LOCAL INTERNET WEB DRIVERS FOR WIN32||X||phqghume.exe||Added by the RBOT.BTL WORM!||No|
|Optional Web Drivers For WIN32||X||phqghume.exe||Added by a variant of Backdoor:Win32/Rbot||No|
|Microsoft Update||X||phqghumea.exe||Detected by Trend Micro as WORM_SDBOT.AFO and by Malwarebytes Anti-Malware as Backdoor.Bot||No|
|PhraseExpress||N||phrase.exe||"PhraseExpress organizes your frequently used text snippets in customizable categories for quick access"||No|
|PhraseExpress||U||phraseexpress.exe||PhraseExpress® by Bartels Media GmbH - "organizes your frequently used text snippets in customizable categories for quick access"||No|
|PhysicsUpdater||X||PhysicsUpdater.exe||Detected by Intel Security/McAfee as RDN/Generic.dx and by Malwarebytes Anti-Malware as Backdoor.Agent.DCE||No|
|PI Monitor||U||PI Monitor.exe||Part of older versions of the ArcSoft PhotoImpression photo management software that monitors for new images being added to watched folders||No|
|pibmyrpimqaq||X||pibmyrpimqaq.exe||Detected by Intel Security/McAfee as Generic Downloader.x and by Malwarebytes Anti-Malware as Spyware.Password||No|
|pic.bmp||X||pic.bmp||Detected by Intel Security/McAfee as RDN/Generic PWS.y and by Malwarebytes Anti-Malware as Trojan.Agent.E. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows starts||No|
|(Default)||X||pic.exe||Detected by Malwarebytes Anti-Malware as Backdoor.Agent.Gen. Note - this malware actually changes the value data of the "(Default)" key in HKCU\Run in order to force Windows to launch it at boot and the name field in MSConfig may be blank. The file is located in %AppData%||No|
|whatever||X||pic.exe||Detected by Intel Security/McAfee as RDN/Generic.bfr!hp and by Malwarebytes Anti-Malware as Backdoor.Agent.X||No|
|Picaboo||N||PicabooMain.exe||Picaboo - "Easily create stunning photo books and cards with your digital photos"||No|
FIRST PREV ( Page 507 of 1000 ) NEXT LAST
You can also manually change the page number in the address bar.
If you can help identify new entries and verify/identify those entries with a "?" status (especially hardware specific - such as laptops and motherboards) then please E-mail us (startups_at_pacs-portal_dot_co_dot_uk).
DISCLAIMER: It is assumed that users are familiar with the operating system they are using and comfortable with making the suggested changes. We will not be held responsible if changes you make cause a system failure.
WARNING: This is NOT a list of tasks/processes taken from the Task Manager (CTRL+SHIFT+ESC) "Processes" tab. This displays some startup programs AND other background tasks and "Services". These pages are concerned with startup programs from the common startup locations shown above ONLY. Please do not submit entries collected from this method as they will not be used. For a list of tasks/processes you should try the list at PC Pitstop, the Process Library from Uniblue or one of the many others now available.
Therefore, before ending a task/process via CTRL+SHIFT+ESC just because it has an "X" recommendation, please check whether it's in the registry or common startup locations first. An example would be "svchost.exe" - which doesn't appear in either under normal conditions but does via CTRL+SHIFT+ESC. If in doubt, don't do anything.
To avoid the database becoming too large, all malware entries are only shown using the registry version which is common to all Windows versions. Otherwise there would be multiple entries for popular filenames that viruses often use - such as "svchost.exe" above for example. Multiple malware can also use the same start-up entries, in this case only those with significant differences (such as file location) are repeated in this database.
As more than 25K entries in this database related to malware you should use a quality internet security package. Which ever you choose, keep it updated and get the latest version at least every two years.
There are a number of virus and malware entries listed in this database where specific removal instructions haven't been given. If this is the case then you could try ComboFix, a program written by sUBs that can remove many different types of Trojans and Worms. See here for a tutorial on how to use the program.
NOTE: A number of entries are repeated due to the way that different operating systems display startup items. For example, WinMe lists "POPROXY.EXE" as "Norton eMail Protect" in both MSCONFIG and the registry whereas WinXP lists it as "Poproxy" in MSCONFIG and "Norton eMail Protect" in the registry.
SERVICES: "Services" from the Windows 8/7/Vista/XP/2K/NT operating systems are not included. We fully understand that some programs with these OS's use "Services" as an alternative to load their component parts at startup but these are handled in a different way. We recommend you try BlackViper for information on services for the relevant operating systems.
Presentation, format & comments Copyright © 2001 - 2016 Pacman's Portal
Portions Copyright © Peter Forrest, Denny Denham, Sylvain Prevost, Tony Klein, CastleCops & Bleeping Computer
Powered by Malwarebytes
All rights reserved