|Index||Introduction||Database||Detailed Entries||Updates||Concise List||HJT Forums||Rogues||Message Board|
If you're frustrated with the time it takes your Windows 8/7/Vista/XP PC to boot and then it seems to be running slowly you may have too many programs running at start-up - and you have come to the right place to identify them. This is the original start-up programs (as opposed to processes/tasks) list - one of the most accurate and comprehensive. Services are not included - see below. For further information on this and how to identify and disable start-up programs please visit the Introduction page.
See here for further information on random entries - which are typically added by viruses and other malware or unwanted programs.
Last database update :- 30th April, 2015
45214 items listed
Entries are sorted by the Command/Data field. Alternatively, you can search the full database or use the alphabetical index on that page.FIRST PREV ( Page 507 of 905 ) NEXT LAST
You can also manually change the page number in the address bar.
|Startup Item or Name||Status||Command or Data||Description||Tested|
|Windows Update||X||rrgw3nec.qmq.$$$$$$$$$||Detected by McAfee as RDN/Generic PWS.y!ut and by Malwarebytes Anti-Malware as Backdoor.Agent.E||No|
|Startup||X||rrining.exe||Detected by Dr.Web as Trojan.DownLoader9.9849 and by Malwarebytes Anti-Malware as Trojan.MSIL.RN||No|
|RRMedic||X||rrmedic.exe||Troubleshooting utility for the RoadRunner cable internet service. Not required and you are advised to completely uninstall it. Provides a lot of false alarms and gets a lot of people panicking about there internet connection||No|
|Windows LoL Layer||X||rrntsbq.exe||Detected by Kaspersky as Backdoor.Win32.Bifrose.dpoa and by Malwarebytes Anti-Malware as Backdoor.Bot. The file is located in %System%||No|
|Rapid Restore||U||rrpcsb.exe||XPoint "Rapid Restore PC" - "a Managed Recovery solution that enables IT Administrators to protect the corporate image, while offloading personal data backup and recovery chores to the end user"||No|
|AdobeReaderPro||X||rruxdkf.exe||Detected by Kaspersky as Backdoor.Win32.Rbot.adf and by Malwarebytes Anti-Malware as Backdoor.Bot. The file is located in %System%||No|
|rs32net||X||rs32net.exe||Detected by Sophos as Troj/Agent-IFH||No|
|arjtqhalyp||X||rsacir.exe||Detected by Malwarebytes Anti-Malware as Trojan.Agent. The file is located in %System%||No|
|[random characters]||X||rsbmsc.exe||Detected by AntiVir antivirus as the BDS/Agent.adt TROJAN!||No|
|Rsbot293.exe||X||Rsbot293.exe||Detected by Malwarebytes Anti-Malware as Trojan.MSIL.Bladabindi. The file is located in %AppData%\Microsoft||No|
|Rscmpt||U||Rscmpt.exe||Required on the GeFroce 64 meg MX card to show the full 64 meg memory and appears to be a software memory emulator running under the Win2K - see here. High CPU useage results - hence the U status||No|
|RandomScreen||U||RSD.exe||RandomScreen Deluxe by angGoGo Software - "is a powerful, easy to use utility for managing your screensavers and desktop wallpaper. You can run randomly your all screensavers or show favorite picture or flash in screensaver, change desktop wallpaper, play mp3 in screensaver background"||No|
|(Default)||X||rsddoser.exe||Detected by Microsoft as PWS:MSIL/Petun.A. Note - this malware actually changes the value data of the "(Default)" key in HKLM\Run and HKCU\Run in order to force Windows to launch it at boot. The name field in MSConfig may be blank||No|
|Red Swoosh EDN Client||U||RSEDNClient.exe||Red Swoosh distributed networking software - a desktop client that enables users to download and stream files from each other, rather than from webservers. Now superseded by the Akamai NetSession Interface download manager which is used by companies such as Adobe and Corel to download and install their online products. Required for the download to start and complete but once finished it can be disabled and re-instated at a later date if needed||No|
|(Default)||X||RSEpicbot2007.exe||Detected by Malwarebytes Anti-Malware as Trojan.Clicker. Note - this malware actually changes the value data of the "(Default)" key in HKCU\Run in order to force Windows to launch it at boot. The name field in MSConfig may be blank and the file is located in %AppData%\Microsoft\Windows\Start Menu\Programs (8/7/Vista) or %UserProfile%\Start Menu\Programs (XP)||No|
|Microsoft Server||X||rserv.exe||Detected by Trend Micro as WORM_AGOBOT.AVS||No|
|Synchronization Manager||X||rservers.exe||Added by the FORBOT-FM WORM!||No|
|rsmb||X||rsmb.exe||Detected by Sophos as W32/Stration-H||No|
|rsmb32||X||rsmb32.exe||Added by the STRATION.AV WORM!||No|
|Enterprise Harmony||U||rsMenu.exe||Enterprise Harmony 99 for CASIO - synchronization software for use with Microsoft® Outlook 97/98/2000||No|
|Enterprise Harmony '99||U||rsMenu.exe||Enterprise Harmony 99 for CASIO - synchronization software for use with Microsoft® Outlook 97/98/2000||No|
|Randsoft Harmony '98||U||rsMenu.exe||Randsoft Harmony '98 (superseded by Enterprise Harmony 99) for CASIO - synchronization software for use with Microsoft® Outlook 97/98/2000||No|
|rsMenu||U||rsMenu.exe||Enterprise Harmony 99 for CASIO - synchronization software for use with Microsoft® Outlook 97/98/2000. Formally Randsoft Harmony '98||No|
|rsn32.exe||X||rsn32.exe||Detected by Malwarebytes Anti-Malware as Trojan.Agent.TMGen. The file is located in %Temp%||No|
|defrag.exe||X||rsnotify.exe||Detected by Malwarebytes Anti-Malware as Trojan.Agent. The file is located in %AppData%\pe explorer||No|
|Resource Meter||N||rsrcmtr.exe||Windows Resource Meter. Available via Start → Programs. You may want this enabled if your PC is suffering from crashes and want to know potential causes||No|
|VgaDriver||X||RsrVga32.exe||Detected by Sophos as Troj/Keylog-AH||No|
|rsrvmon.exe||X||rsrvmon.exe||Added by the AGENT.NY TROJAN!||No|
|RssReader||U||RssReader.exe||RssReader - a free RSS reader able to display any RSS and Atom news feed (XML)||No|
|WinFix service||X||rsswjzgp.exe||Added by the RBOT-FAE WORM!||No|
|Alcohol120||X||rst.exe||Detected by Dr.Web as Trojan.Siggen5.37516 and by Malwarebytes Anti-Malware as Trojan.Agent.E||No|
|Random Interface Network||X||rst.exe||Detected by Sophos as W32/Delbot-P||No|
|SCISound||X||rstray.exe||Detected by Kaspersky as Trojan-Spy.Win32.KeyLogger.cpn and by Malwarebytes Anti-Malware as Trojan.Keylogger.OL||No|
|*Restore||Y||rstrui.exe||Part of Windows System Restore and added as a RunOnce registry entry. Leave alone||No|
|SystemRestore||X||rstrui_w.exe||Detected by Malwarebytes Anti-Malware as Backdoor.Bot. The file is located in %Windir%||No|
|RSV Start||X||RSV.exe||Detected by Malwarebytes Anti-Malware as Trojan.Ardamax. The file is located in %System%\KIRKSW||No|
|MSN UPDATER||X||RSVC32.EXE||Added by the RBOT-HW WORM!||No|
|Network Administration Service||X||rsvc32.exe||Added by the RBOT.ABH WORM!||No|
|rsvp||X||rsvp.exe /waitservice||Detected by Microsoft as TrojanDownloader:Win32/Horst.Q. Note - this is not the legitimate rsvp.exe which is always located in %System%. This one is located in either %Windir%, %Windir%\System, %Temp%, %AppData%, %AppData%\Microsoft or %System%\drivers||No|
|Remote Access Domain||X||rswsvc.exe||Detected by Microsoft as Worm:Win32/Slenfbot.FP||No|
|rtasks||X||rtasks.exe||Part of rogue software including members of the AVSystemCare security suite family (see here for examples), WinAntiVirus Pro 2006 and WinAntiVirus Pro 2007||No|
|rtcdll||U||rtcdll.exe||RTCDLL is "Real Time Communication" and is associated with Windows Messenger (the IM application, not messenger service). It is only necessary if you use Windows Messenger. Most people use MSN Messenger instead, so it is not required in those cases||No|
|startkey||X||rtfmsv.exe||Detected by Sophos as Troj/Edepol-C and by Malwarebytes Anti-Malware as Backdoor.Bot||No|
|NET||X||RTHDCPL.EX||Detected by Malwarebytes Anti-Malware as Backdoor.Agent.DEM. The file is located in %AppData%\Media||No|
|WIN||X||RTHDCPL.EX||Detected by Malwarebytes Anti-Malware as Backdoor.Agent.DEM. The file is located in %AppData%\Media||No|
|Realtek HD Audio Sound Effect Manager||X||Rthdcpl.exe||Detected by Malwarebytes Anti-Malware as Trojan.Agent.FI. Note the space at the beginning and end of the "Startup Item" field and this is not the legitimate Realtek file of the same name which is normally located in %System%. This one is located in %MyDocuments%\Realtek||No|
|Realtek HD Audio Sound Effect Manager||U||RTHDCPL.EXE||Realtek HD Audio Control Panel, installed with the XP/2K drivers for on-board Realtek HD audio codecs. Provides a default (but optional) System Tray icon which allows you to manage audio device settings and gives you access to the Sound Manager and other multimedia functions. You will also receive notifications when devices are plugged into and removed from the jacks (such as headphones and a microphone). In some cases, if this is not running when such a device is plugged it it may not be detected and therefore may not work||Yes|
|RTHDCPL||U||RTHDCPL.EXE||Realtek HD Audio Control Panel, installed with the XP/2K drivers for on-board Realtek HD audio codecs. Provides a default (but optional) System Tray icon which allows you to manage audio device settings and gives you access to the Sound Manager and other multimedia functions. You will also receive notifications when devices are plugged into and removed from the jacks (such as headphones and a microphone). In some cases, if this is not running when such a device is plugged it it may not be detected and therefore may not work||Yes|
|HD Audio Background Process||?||RtHDVBg.exe||Installed with the 32-bit 8/7/Vista drivers for on-board Realtek HD audio codecs. The exact purpose is unknown at present||No|
FIRST PREV ( Page 507 of 905 ) NEXT LAST
You can also manually change the page number in the address bar.
If you can help identify new entries and verify/identify those entries with a "?" status (especially hardware specific - such as laptops and motherboards) then please E-mail us (startups_at_pacs-portal_dot_co_dot_uk).
DISCLAIMER: It is assumed that users are familiar with the operating system they are using and comfortable with making the suggested changes. We will not be held responsible if changes you make cause a system failure.
WARNING: This is NOT a list of tasks/processes taken from the Task Manager (CTRL+SHIFT+ESC) "Processes" tab. This displays some startup programs AND other background tasks and "Services". These pages are concerned with startup programs from the common startup locations shown above ONLY. Please do not submit entries collected from this method as they will not be used. For a list of tasks/processes you should try the list at PC Pitstop, the Process Library from Uniblue or one of the many others now available.
Therefore, before ending a task/process via CTRL+SHIFT+ESC just because it has an "X" recommendation, please check whether it's in the registry or common startup locations first. An example would be "svchost.exe" - which doesn't appear in either under normal conditions but does via CTRL+SHIFT+ESC. If in doubt, don't do anything.
To avoid the database becoming too large, all malware entries are only shown using the registry version which is common to all Windows versions. Otherwise there would be multiple entries for popular filenames that viruses often use - such as "svchost.exe" above for example. Multiple malware can also use the same start-up entries, in this case only those with significant differences (such as file location) are repeated in this database.
As more than 25K entries in this database related to malware you should use a quality internet security package. Which ever you choose, keep it updated and get the latest version at least every two years.
There are a number of virus and malware entries listed in this database where specific removal instructions haven't been given. If this is the case then you could try ComboFix, a program written by sUBs that can remove many different types of Trojans and Worms. See here for a tutorial on how to use the program.
NOTE: A number of entries are repeated due to the way that different operating systems display startup items. For example, WinMe lists "POPROXY.EXE" as "Norton eMail Protect" in both MSCONFIG and the registry whereas WinXP lists it as "Poproxy" in MSCONFIG and "Norton eMail Protect" in the registry.
SERVICES: "Services" from the Windows 8/7/Vista/XP/2K/NT operating systems are not included. We fully understand that some programs with these OS's use "Services" as an alternative to load their component parts at startup but these are handled in a different way. We recommend you try BlackViper for information on services for the relevant operating systems.
Presentation, format & comments Copyright © 2001 - 2015 Pacman's Portal
Portions Copyright © Peter Forrest, Denny Denham, Sylvain Prevost, Tony Klein, CastleCops & Bleeping Computer
Powered by Malwarebytes
All rights reserved