Index Introduction Database Detailed Entries Updates Concise List HJT Forums Rogues Message Board

Windows startup programs - Browse database

If you're frustrated with the time it takes your Windows 10/8/7/Vista/XP PC to boot and then it seems to be running slowly you may have too many programs running at start-up - and you have come to the right place to identify them. This is the original start-up programs (as opposed to processes/tasks) list - one of the most accurate and comprehensive. Services are not included - see below. For further information on this and how to identify and disable start-up programs please visit the Introduction page.

See here for further information on random entries - which are typically added by viruses and other malware or unwanted programs.

Last database update :- 31st January, 2017
50984 listed

Entries are sorted by the Command/Data field. Alternatively, you can search the full database or use the alphabetical index on that page.

FIRST PREV ( Page 507 of 1020 ) NEXT LAST

You can also manually change the page number in the address bar.

Startup Item or Name Status Command or Data Description Tested
PowerArchiver TrayNPASTARTER.EXESystem Tray access to PowerArchiver from ConeXware, Inc - file compression support toolNo
paswonmyrytrXpaswonmyrytr.exeDetected by Malwarebytes as Trojan.Agent.US. The file is located in %UserProfile% - see hereNo
PaSystemXpasystem.exeTargetsaver adware variantNo
PASystemTrayYPASystemTray.exePart of the Panda Security range of enterprise/business internet security productsNo
MicroUpdateXPatch 2.11.exeDetected by Intel Security/McAfee as RDN/Generic BackDoor and by Malwarebytes as Backdoor.Agent.DCENo
GoogleAppsXPatch.exeDetected by Malwarebytes as Trojan.Agent.Gen. The file is located in %AppData%\MicrosoftNo
Telechips,MassUpatch.exeRemovable disk driver for the Muro MP3 playerNo
Win PatchXpatch.exeAdded by the SDBOT-GL BACKDOOR!No
DC-STARTXpatch1.exeDetected by Malwarebytes as Backdoor.Agent.DCGen. The file is located in %AppData% - see hereNo
AV ClientXpatch31345.exeAdded by the MYDOOM.AD WORM!No
AV IndustryXpatch31345.exeAdded by the MYDOOM.AD WORM!No
gameXpatcher.scrDetected by Sophos as Troj/PSW-EDNo
PathNvidiaTV?patchnvidiaTVout.exeRelated to a Gigabyte NVIDIA based video card - typical file location is %ProgramFiles%\Gigabyte\NvidiaNo
patchsetup70700.exeXpatchsetup70700.exeDetected by Malwarebytes as Trojan.FakeAlert. The file is located in %AppData%\[32 hex characters]No
PatchUp_PlusXPatchUpInit.exePatchUp_Plus rogue security software - not recommended, removal instructions hereNo
patgeasukumpXpatgeasukump.exeDetected by Dr.Web as Trojan.DownLoader11.6956 and by Malwarebytes as Trojan.Agent.USNo
[blank]Xpathex.exeDetected by Sophos as Troj/Mkmoose-A. Note - has a blank entry under the Startup Item/Name fieldNo
pathnameXpathname.exeDetected by Symantec as Backdoor.IrcContactNo
SDHT14Xpatrent3.exeDetected by Intel Security/McAfee as RDN/PWS-Banker!db and by Malwarebytes as Backdoor.Agent.DRNo
HKC UPDATE MANAGERXpatrick_schwazy.exeDetected by Intel Security/McAfee as RDN/Generic Downloader.x!iz and by Malwarebytes as Trojan.Downloader.ENo
ManagerXpatrick_schwazy.exeDetected by Intel Security/McAfee as RDN/Generic Downloader.x!jb and by Malwarebytes as Trojan.KBayi.FLANo
Podcast Update ManagerXpatrick_schwazy.exeDetected by Intel Security/McAfee as RDN/Ransom!dw and by Malwarebytes as Trojan.KBayi.FLANo
Paladin AntivirusXpav.exePaladin Antivirus rogue security software - not recommended, removal instructions hereNo
PAVXpav.exePersonal Antivirus rogue security software - not recommended. Located in %ProgramFiles%\PAVNo
PAV.EXEYPAV.EXEPER Antivirus - no longer availableNo
PersonalAVXpav.exePersonalAV rogue security software - not recommended. Located in %ProgramFiles%\PersonalAVNo
Panda CleanerYpavdr.exePart of an older version of the Panda Security range of internet security products. Possibly the ActiveScan on-line scanner?No
PAVFIRESYPavFires.exeFirewall included with older versions of the Panda Security range of internet security products. Runs as a service on Windows XPNo
PAVFNSVRYPavFnSvr.exePart of an older version of the Panda Security range of internet security products. Runs as a service on Windows XPNo
Pavkre9xYpavkre9x.exePart of an older version of the Panda Security range of internet security productsNo
PER Email ProtectionYpavmail.exeE-mail scanner part of PER Antivirus - no longer availableNo
PavProtYPavProt.exePart of an older version of the Panda Security range of internet security productsNo
Pavprot9YPavprot9.exePart of an older version of the Panda Security range of internet security productsNo
PavProcYPavPrS9x.exePart of the Panda Security range of internet security productsNo
Panda SchedulerUpavsched.exeScheduler for older versions of the Panda Security range of internet security products. Required if you have scans scheduled on a regular basisNo
PandaSchedulerUpavsched.exeScheduler for older versions of the Panda Security range of internet security products. Required if you have scans scheduled on a regular basisNo
Microsoft Update MachineXpaxrxo.exeDetected by Intel Security/McAfee as W32/Pushbot.a and by Malwarebytes as Backdoor.Bot. The file is located in %System%No
System InitializationXpayload.datAdded by the ROXY BACKDOOR!No
Microsoft WordXPayment Slip.exeDetected by Malwarebytes as Backdoor.Agent.V. The file is located in %AppData%No
updateXpayment-main.exeDetected by Sophos as Troj/Mdrop-FBP and by Malwarebytes as Trojan.Agent.PMNo
PayTimeXpaytime.exeDetected by Sophos as Troj/StartPa-YRNo
PoliciesXPb Hack.exeDetected by Malwarebytes as Backdoor.Agent.PGen. The file is located in %Windir%\installNo
UEBCQ7L6PUXpb70njK.exe.lnkDetected by Intel Security/McAfee as RDN/Generic BackDoor!tm and by Malwarebytes as Backdoor.Agent.DCENo
ShellXpb7ZmiJ.exe,explorer.exeDetected by Intel Security/McAfee as RDN/Generic Dropper!tn and by Malwarebytes as Backdoor.Messa.E. Note - this entry adds an illegal HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon "Shell" entry. The value data points to "explorer.exe" (which is a legitimate file located in %Windir% and shouldn't be deleted) and "pb7ZmiJ.exe" (which is located in %AppData%\9DKFTWfE)No
pbagentUpbagent.exeProbot keystroke logger/monitoring program - remove unless you installed it yourself!No
pguFnnXPBcyLZ.exeDetected by Intel Security/McAfee as RDN/Generic.dx!crz and by Malwarebytes as Backdoor.Messa.ENo
FirewallXPBHax.exeDetected by Malwarebytes as Trojan.Injector.MSIL. The file is located in %CommonAppData%\Microsoft\Windows\Start Menu\PointBlank (10/8/7/Vista) or %AllUsersProfile%\Start Menu\PointBlank (XP)No
{1290A33C-85F5-4164-A1BE-7DD299D4986A}UPBKScheduler.exePart of the PowerBackup archiving/backup utility from CyberLink. The entry is present if you have any backup jobs scheduledYes
PBKSchedulerUPBKScheduler.exePart of the PowerBackup archiving/backup utility from CyberLink. The entry is present if you have any backup jobs scheduledYes
PowerBackupUPBKScheduler.exePart of the PowerBackup archiving/backup utility from CyberLink. The entry is present if you have any backup jobs scheduledYes

 

FIRST PREV ( Page 507 of 1020 ) NEXT LAST

You can also manually change the page number in the address bar.

Notes & Warnings

If you can help identify new entries and verify/identify those entries with a "?" status (especially hardware specific - such as laptops and motherboards) then please E-mail us (startups_at_pacs-portal_dot_co_dot_uk).

"Status" key:

Variables:

DISCLAIMER: It is assumed that users are familiar with the operating system they are using and comfortable with making the suggested changes. We will not be held responsible if changes you make cause a system failure.

WARNING: This is NOT a list of tasks/processes taken from the Task Manager (CTRL+SHIFT+ESC) "Processes" tab. This displays some startup programs AND other background tasks and "Services". These pages are concerned with startup programs from the common startup locations shown above ONLY. Please do not submit entries collected from this method as they will not be used. For a list of tasks/processes you should try the list at PC Pitstop, the Process Library from Uniblue or one of the many others now available.

Therefore, before ending a task/process via CTRL+SHIFT+ESC just because it has an "X" recommendation, please check whether it's in the registry or common startup locations first. An example would be "svchost.exe" - which doesn't appear in either under normal conditions but does via CTRL+SHIFT+ESC. If in doubt, don't do anything.

To avoid the database becoming too large, all malware entries are only shown using the registry version which is common to all Windows versions. Otherwise there would be multiple entries for popular filenames that viruses often use - such as "svchost.exe" above for example. Multiple malware can also use the same start-up entries, in this case only those with significant differences (such as file location) are repeated in this database.

As more than 25K entries in this database related to malware you should use a quality internet security package. Which ever you choose, keep it updated and get the latest version at least every two years.

There are a number of virus and malware entries listed in this database where specific removal instructions haven't been given. If this is the case then you could try ComboFix, a program written by sUBs that can remove many different types of Trojans and Worms. See here for a tutorial on how to use the program.

NOTE: A number of entries are repeated due to the way that different operating systems display startup items. For example, WinMe lists "POPROXY.EXE" as "Norton eMail Protect" in both MSCONFIG and the registry whereas WinXP lists it as "Poproxy" in MSCONFIG and "Norton eMail Protect" in the registry.

SERVICES: "Services" from the Windows 8/7/Vista/XP/2K/NT operating systems are not included. We fully understand that some programs with these OS's use "Services" as an alternative to load their component parts at startup but these are handled in a different way. We recommend you try BlackViper for information on services for the relevant operating systems.

Copyright

Presentation, format & comments Copyright © 2001 - 2017 Pacman's Portal
Portions Copyright © Peter Forrest, Denny Denham, Sylvain Prevost, Tony Klein, CastleCops & Bleeping Computer
Powered by Malwarebytes
All rights reserved

Valid XHTML 1.0 Transitional

Privacy Policy Site Map Home