Index Introduction Database Detailed Entries Updates Concise List HJT Forums Rogues Message Board

Windows startup programs - Browse database

If you're frustrated with the time it takes your Windows 8/7/Vista/XP PC to boot and then it seems to be running slowly you may have too many programs running at start-up - and you have come to the right place to identify them. This is the original start-up programs (as opposed to processes/tasks) list - one of the most accurate and comprehensive. Services are not included - see below. For further information on this and how to identify and disable start-up programs please visit the Introduction page.

See here for further information on random entries - which are typically added by viruses and other malware or unwanted programs.

Last database update :- 30th September, 2015
46386 items listed

Entries are sorted by the Command/Data field. Alternatively, you can search the full database or use the alphabetical index on that page.

FIRST PREV ( Page 507 of 928 ) NEXT LAST

You can also manually change the page number in the address bar.

Startup Item or Name Status Command or Data Description Tested
Recycle Bin HandlerXrecycler.exeDetected by Sophos as Troj/Shuckbot-ANo
rec_gb_#Urec_gb_#.exeDetected by Malwarebytes Anti-Malware as PUP.Optional.Recover - where # represents one or more digits. The file is located in %ProgramFiles%\rec_gb_#. If bundled with another installer or not installed by choice then remove itNo
HKCUXred.exeDetected by Malwarebytes Anti-Malware as Backdoor.HMCPol.Gen. The file is located in %UserTemp%No
HKLMXred.exeDetected by Malwarebytes Anti-Malware as Backdoor.HMCPol.Gen. The file is located in %UserTemp%No
PoliciesXred.exeDetected by Malwarebytes Anti-Malware as Backdoor.Agent.PGen. The file is located in %UserTemp%No
LantronixRedirector?red32.exeRelated to either the Secure Com Port Redirector or Com Port Redirector from Latronix. What does it do and is it required?No
RedBull.exeXRedBull.exeDetected by McAfee as RDN/Generic.bfr!fg and by Malwarebytes Anti-Malware as Backdoor.Messa.ENo
RedeXRede.exeDetected by BitDefender as Win32.Rede.A@mmNo
RedeWiFi.exe NacionalXRedeWiFi.exeDetected by Kaspersky as Trojan-Downloader.Win32.Agent.eird and by Malwarebytes Anti-Malware as Trojan.AgentNo
Red FlagNredflag.exePMS prediction program with modes for guys and girls - no longer availableNo
Red GateXRedGate.exeDetected by Malwarebytes Anti-Malware as Trojan.Clicker. The file is located in %AppData%No
Bol IMNRediffMessenger.exeRediff Bol instant messengerNo
redirectXredirect*.exeDotcomtoolbar/Linksummary hijacker installer - where * is a random digitNo
FacebookXRedox.exeDetected by McAfee as Generic.dx and by Malwarebytes Anti-Malware as Backdoor.Agent.DCENo
red_bul_red_label_[digits].exeXred_bul_red_label_[digits].exeDetected by Malwarebytes Anti-Malware as Backdoor.Agent.E. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows starts - see an example hereNo
Reek 32 ServerXreek32.exeDetected by Symantec as W32.Randex.genNo
roenXreepn.exeDetected by McAfee as RDN/Generic.bfr!ep and by Malwarebytes Anti-Malware as Backdoor.Agent.DCENo
RefereeUreferee.exeMediaComm's monitor for file association changes. Stop rogue programs from screwing your settings either on installation or whenever they runNo
Reflex VisionUReflexVision.exeReflex Vision from Increment Software. "A background application for Windows XP that makes switching windows faster and easier"No
RefreshNRefresh.exe(Iomega) Refresh - loads the Iomega desktop icons at startupNo
Reg ToolXReg Tool.exeRegTool rogue registry cleaner - not recommended, removal instructions hereNo
RegXReg.htaPasson homepage hi-jackerNo
REG1XREG1.exeDetected by McAfee as Generic BackDoor and by Malwarebytes Anti-Malware as Backdoor.Agent.ENo
EregNreg32.exeEReg is a software registration tool incorporated on products such as those by Broderbund, Connectix, Hewlett-Packard, The Learning Company, and Sierra. Needless to say you don't need itNo
Microsoft System Firewall 2006.2Xreg32.exeAdded by a variant of W32/Sdbot.wormNo
reg32Xreg32.exeAdded by the NOUPDATE.B TROJAN!No
Reg32XReg32.exeHijacker - redirecting to only-virgins.comNo
Reg32Xreg33.exeCoolWebSearch parasite variant - also detected as the STARTPA-M TROJAN!No
RegAsmXRegAsm.exeDetected by Malwarebytes Anti-Malware as Trojan.Agent.SU. Note - this entry loads from the Windows Startup folder and the file is located in %CommonAppData%\RegAsmNo
ExploreXRegCheck.exeDetected by Malwarebytes Anti-Malware as Backdoor.Agent.DC. The file is located in %Windir%\SystemEntryNo
RegCleanXRegClean.exeRegClean rogue registry cleaner - not recommendedNo
Registry CleanerXRegclean.exeRegistry Cleaner misleading security software - not recommended, see hereNo
Windows Host Process CleanerXregcleaner.exeDetected by Dr.Web as Trojan.DownLoader7.31726No
RDReminderURegCleanPro.exeRegClean Pro registry cleaner by Systweak Software. Detected by Malwarebytes Anti-Malware as PUP.Optional.RegCleanPro. The file is located in %ProgramFiles%\RegClean Pro or %ProgramFiles%\RCP. If bundled with another installer or not installed by choice then remove itNo
Card MonitorNREGCNT09.exeFor the USB connection on a Panasonic PV-DV701 Digital Camcorder. Available via Start → ProgramsNo
CSHRZZXreGcoD.exeDetected by McAfee as RDN/Generic BackDoor!tj and by Malwarebytes Anti-Malware as Backdoor.Messa.ENo
SAClientNRegCon.exeAT&T or ComCast BBClient - monitors system and network-delivered services for availability. Your current network status is displayed on a color-coded web page in near-real time. When problems are detected, you're immediately notified by e-mail, pager, or text messagingNo
RegCompresXREGCPM32.EXEDetected by Sophos as Troj/Dasmin-FamNo
RegcxdinafXREGCXDINAF.EXEDetected by Sophos as Troj/Bancos-BWNo
RegcxnXRegcxn.exeDetected by Sophos as Troj/Coiboa-DNo
RegDefendUregdefend.exeRegDefend from Ghost Security - "is a kernel based registry protection system, designed to use as few resources as possible. Instead of polling the registry looking for changes, RegDefend intercepts the changes before they occur. RegDefend comes installed to protect registry autostarts and some special registry keys, custom rules can also be added." No longer supportedNo
Registro do WindowsXregdit.exeDetected by McAfee as Generic PWS.y and by Malwarebytes Anti-Malware as Trojan.Banker.WS. Note - this is not the valid Windows registry editor which resides in %Windir%. This one is located in %System%No
processXregdllhelper.exeDetected by McAfee as W32/Induc!noNo
Optim1Xregdtopt.exeDetected by Symantec as Trojan.Ramvicrype and by Malwarebytes Anti-Malware as Trojan.AgentNo
Optim2Xregdtopt.exeDetected by Symantec as Trojan.Ramvicrype and by Malwarebytes Anti-Malware as Trojan.AgentNo
Optim3Xregdtopt.exeDetected by Symantec as Trojan.Ramvicrype and by Malwarebytes Anti-Malware as Trojan.AgentNo
Optim4Xregdtopt.exeDetected by Symantec as Trojan.Ramvicrype and by Malwarebytes Anti-Malware as Trojan.AgentNo
regdvXregdv.exeDetected by McAfee as Generic.dx and by Malwarebytes Anti-Malware as Backdoor.Agent.GenNo
RegEasy.exeXRegEasy.exeRegistryEasy bogus registry cleaning utility - not recommended, see here and hereNo
spXregedit -s sp.dllMalicious javascript annoyance that changes the default search engine in IE to one of many including "topsearcher". See here for more and a fix. The "sp.dll" is located in %Windir%No


FIRST PREV ( Page 507 of 928 ) NEXT LAST

You can also manually change the page number in the address bar.

Notes & Warnings

If you can help identify new entries and verify/identify those entries with a "?" status (especially hardware specific - such as laptops and motherboards) then please E-mail us (startups_at_pacs-portal_dot_co_dot_uk).

"Status" key:


DISCLAIMER: It is assumed that users are familiar with the operating system they are using and comfortable with making the suggested changes. We will not be held responsible if changes you make cause a system failure.

WARNING: This is NOT a list of tasks/processes taken from the Task Manager (CTRL+SHIFT+ESC) "Processes" tab. This displays some startup programs AND other background tasks and "Services". These pages are concerned with startup programs from the common startup locations shown above ONLY. Please do not submit entries collected from this method as they will not be used. For a list of tasks/processes you should try the list at PC Pitstop, the Process Library from Uniblue or one of the many others now available.

Therefore, before ending a task/process via CTRL+SHIFT+ESC just because it has an "X" recommendation, please check whether it's in the registry or common startup locations first. An example would be "svchost.exe" - which doesn't appear in either under normal conditions but does via CTRL+SHIFT+ESC. If in doubt, don't do anything.

To avoid the database becoming too large, all malware entries are only shown using the registry version which is common to all Windows versions. Otherwise there would be multiple entries for popular filenames that viruses often use - such as "svchost.exe" above for example. Multiple malware can also use the same start-up entries, in this case only those with significant differences (such as file location) are repeated in this database.

As more than 25K entries in this database related to malware you should use a quality internet security package. Which ever you choose, keep it updated and get the latest version at least every two years.

There are a number of virus and malware entries listed in this database where specific removal instructions haven't been given. If this is the case then you could try ComboFix, a program written by sUBs that can remove many different types of Trojans and Worms. See here for a tutorial on how to use the program.

NOTE: A number of entries are repeated due to the way that different operating systems display startup items. For example, WinMe lists "POPROXY.EXE" as "Norton eMail Protect" in both MSCONFIG and the registry whereas WinXP lists it as "Poproxy" in MSCONFIG and "Norton eMail Protect" in the registry.

SERVICES: "Services" from the Windows 8/7/Vista/XP/2K/NT operating systems are not included. We fully understand that some programs with these OS's use "Services" as an alternative to load their component parts at startup but these are handled in a different way. We recommend you try BlackViper for information on services for the relevant operating systems.


Presentation, format & comments Copyright © 2001 - 2015 Pacman's Portal
Portions Copyright © Peter Forrest, Denny Denham, Sylvain Prevost, Tony Klein, CastleCops & Bleeping Computer
Powered by Malwarebytes
All rights reserved

Valid XHTML 1.0 Transitional

Privacy Policy Site Map Home