|Index||Introduction||Database||Detailed Entries||Updates||Concise List||HJT Forums||Rogues||Message Board|
If you're frustrated with the time it takes your Windows 8/7/Vista/XP PC to boot and then it seems to be running slowly you may have too many programs running at start-up - and you have come to the right place to identify them. This is the original start-up programs (as opposed to processes/tasks) list - one of the most accurate and comprehensive. Services are not included - see below. For further information on this and how to identify and disable start-up programs please visit the Introduction page.
See here for further information on random entries - which are typically added by viruses and other malware or unwanted programs.
Last database update :- 30th October, 2015
46765 items listed
Entries are sorted by the Command/Data field. Alternatively, you can search the full database or use the alphabetical index on that page.FIRST PREV ( Page 507 of 936 ) NEXT LAST
You can also manually change the page number in the address bar.
|Startup Item or Name||Status||Command or Data||Description||Tested|
|RBAH3ANDANYV.exe||X||RBAH3ANDANYV.exe||Detected by McAfee as RDN/Generic.bfr!ho and by Malwarebytes Anti-Malware as Trojan.Downloader.MDO||No|
|LOCKDOWN||X||rbDyvEH.exe||Added by the GBOT-I TROJAN!||No|
|rbenh lptt01||X||rbenh.exe||RapidBlaster variant (in a "RBEnhance" folder in Program Files). A dedicated "RapidBlaster Killer" removal tool used to be available but quality anti-malware tools will now remove it||No|
|rbnynkctv||X||rbnynkctv.exe||Detected by Sophos as Troj/Agent-GPA||No|
|sl4 rules||X||rbot32.exe||Added by the SDBOT-QC WORM!||No|
|Microsoft||X||rbssetup.exe||Detected by Malwarebytes Anti-Malware as Trojan.Agent.MSGen. The file is located in %AppData%\Windows||No|
|MicrosoftUpdate||X||RBuilder.exe||Detected by Sophos as Troj/Dloadr-BMV and by Malwarebytes Anti-Malware as Trojan.Agent.MUGen||No|
|Remote Control||N||Rc.exe||Hinet Hi-Five ISP software||No|
|ElsaCapiCtl||Y||Rcapi.exe||Assumed to stand for Remote Common Application Programming Interface (RCAPI), this was installed with an Elsa Microlink ISDN modem. If it is not there you can not bring up the dialog box which is sometimes needed to reset the modem||No|
|Windows Servce Agent||X||rcccgtwv.exe||Detected by Kaspersky as Backdoor.Win32.Rbot.bll and by Malwarebytes Anti-Malware as Trojan.Agent. The file is located in %System%||No|
|PacManStable||X||RCE.exe||Detected by Dr.Web as Trojan.MulDrop5.8591 and by Malwarebytes Anti-Malware as Trojan.Agent.PC||No|
|Win343Plugin||X||RCE.exe||Detected by Dr.Web as Trojan.Inject1.31572 and by Malwarebytes Anti-Malware as Trojan.Agent.E||No|
|Xenocode||X||RCE.exe||Detected by Malwarebytes Anti-Malware as Trojan.MSIL. The file is located in %UserTemp%\WinApp||No|
|Ring Central Fax||U||rcenterrll.exe||Only needed if you want a PC to answer faxes automatically||No|
|Rcf Driver||X||rcf.exe||Added by the RANDEX.BLD WORM!||No|
|RegClean Expert Scheduler||U||RCHelper.exe||"Registry Clean Expert scans the Windows registry and finds incorrect or obsolete information in the registry. By fixing these obsolete information in Windows registry, your system will run faster and error free"||No|
|.norton||X||rchost.exe||Detected by Sophos as Troj/Boxed-H||No|
|RCHotKey||U||RCHotKey.exe||Part of RingCentral Call Controller which "turns your PC into your personal business command center. It brings you real time control of your calls, and immediate access to faxing, your account, Microsoft Outlook® contacts, and many powerful business efficiency tools"||No|
|rcimlby.exe||X||rcimlby.exe||Added by the SDBOT-DHK WORM!||No|
|LTCISI||X||rckit.exe||Added by the IRCBOT-YJ BACKDOOR!||No|
|Inters Configuration Loader||X||RCL0ADERS.exe||Added by the SDBOT-KX WORM!||No|
|RCleanMain||X||RCleanT.exe||Detected by Malwarebytes Anti-Malware as Rogue.Agent.K. The file is located in %ProgramFiles%\RClean||No|
|RemoteCenter||U||RcMan.exe||Remote control for Creative MediaSource - plays back music in DVD-Audio, MP3, WMA, WAV and other media formats||No|
|rCron||X||rcron.exe||PageOn1 - Switch dialer and hijacker variant, see here||No|
|ANSII Rkit||X||rcs.exe||Detected by Malwarebytes Anti-Malware as Trojan.Agent.CD. The file is located in %AppData% - see here||No|
|RCScheduleCheck||U||RCSCHED.EXE||Scheduler for Recovery Commander by Avanquest (was VCOM) - which "can restore your non-booting system back to normal. It only takes a few minutes to get your system back up and running"||No|
|RegClean Expert Scheduler||U||RCScheduler.exe||"Registry Clean Expert scans the Windows registry and finds incorrect or obsolete information in the registry. By fixing these obsolete information in Windows registry, your system will run faster and error free"||No|
|BuzMe||U||RCUI.exe||Display Client for the BuzMe Internet Call Waiting Service||No|
|svchost||X||rcv.exe||Detected by Malwarebytes Anti-Malware as Trojan.FkFox. The file is located in %AppData%||No|
|rcwinHyper||U||rcwinHyper.exe||Allows you to select a word or phrase within a document, application, web-page, etc and search for it within an older version the "Le Grand Robert & Collins" French/English dictionary from Le Robert. See here for more information||No|
|rCwYoAkw.exe||X||rCwYoAkw.exe||Detected by Malwarebytes Anti-Malware as Backdoor.Bot. The file is located in %UserProfile%\SiEgcgUQ||No|
|Stask||X||rcxsafwv.exe||Detected by Dr.Web as Trojan.AVKill.33413||No|
|WGdDR8N7QV||X||rd92olL.exe.lnk||Detected by Sophos as Troj/MSILInj-BF and by Malwarebytes Anti-Malware as Backdoor.Agent.RND||No|
|rD9b0UL||X||rD9b0UL.exe||Detected by McAfee as RDN/Generic BackDoor!ti and by Malwarebytes Anti-Malware as Backdoor.Agent.DCE||No|
|RDAgent||X||RDAgent.exe||RegDefense rogue registry cleaner - not recommended||No|
|RDClient||U||RDCLIENT.EXE||Remote Disconnection Utility from Twiga. Used for connecting and disconnecting dial up connections on a network - only needed if there is a shared internet connection||No|
|Real Desktop||Y||rdesc.exe||Real Desktop by Schillergames "replaces the ordinary Windows desktop by using a 3D user interface, wherein the current configuration of the Windows desktop remains unchanged"||No|
|sxwiutqj||X||rdkablgr.exe||Detected by Malwarebytes Anti-Malware as Trojan.Weelsof. The file is located in %LocalAppData%||No|
|RDListener||X||RDListener.exe||RegDefense rogue registry cleaner - not recommended||No|
|rdmh.exe||X||rdmh.exe||Detected by Malwarebytes Anti-Malware as Trojan.Autoit. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows starts, see here||No|
|rdmh.exe||X||rdmh.exe||Detected by Malwarebytes Anti-Malware as Trojan.Autoit. Note - this entry loads from HKLM\Run and HKCU\Run and the file is located in %UserTemp%, see here||No|
|rdmouw||X||rdmouw.exe||Detected by Dr.Web as Trojan.DownLoader7.32785 and by Malwarebytes Anti-Malware as Trojan.Agent.Gen||No|
|RDM+ Control Panel||U||rdmpserv_cpanel.exe||Remote Desktop for Mobiles - "Access remotely your computer even through NAT and Firewall from mobile. You can send and receive emails, edit word documents, surf web, manage files and folders and do hundreds of other things that you usually do sitting in front of your home or office computer"||No|
|ucquwf||X||rdpclipi.exe||Detected by Dr.Web as Trojan.DownLoader8.37095||No|
|RDPlatinum v5||X||RDPlatinumv5.exe||Registry Defender Platinum rogue registry cleaner - not recommended, removal instructions here||No|
|RAMDrive||U||RDTask.exe||Virtual Hard Drive Pro from Farstone - "takes a portion of your system memory and creates a RAM disk drive, which functions like a physical hard drive, only with much better access rates." No longer available||No|
|RE.exe||U||RE.exe||RegistryEasy registry cleaner - regarded by Symantec as a potentially unwanted application, see here||No|
|RealP1ayer||X||rea1p1ayer.exe||Added by the RPLAY.A TROJAN! Note that the name has a number "1" in place of the second lower case "L". The filename has a number "1" in place of both lower case "L"||No|
FIRST PREV ( Page 507 of 936 ) NEXT LAST
You can also manually change the page number in the address bar.
If you can help identify new entries and verify/identify those entries with a "?" status (especially hardware specific - such as laptops and motherboards) then please E-mail us (startups_at_pacs-portal_dot_co_dot_uk).
DISCLAIMER: It is assumed that users are familiar with the operating system they are using and comfortable with making the suggested changes. We will not be held responsible if changes you make cause a system failure.
WARNING: This is NOT a list of tasks/processes taken from the Task Manager (CTRL+SHIFT+ESC) "Processes" tab. This displays some startup programs AND other background tasks and "Services". These pages are concerned with startup programs from the common startup locations shown above ONLY. Please do not submit entries collected from this method as they will not be used. For a list of tasks/processes you should try the list at PC Pitstop, the Process Library from Uniblue or one of the many others now available.
Therefore, before ending a task/process via CTRL+SHIFT+ESC just because it has an "X" recommendation, please check whether it's in the registry or common startup locations first. An example would be "svchost.exe" - which doesn't appear in either under normal conditions but does via CTRL+SHIFT+ESC. If in doubt, don't do anything.
To avoid the database becoming too large, all malware entries are only shown using the registry version which is common to all Windows versions. Otherwise there would be multiple entries for popular filenames that viruses often use - such as "svchost.exe" above for example. Multiple malware can also use the same start-up entries, in this case only those with significant differences (such as file location) are repeated in this database.
As more than 25K entries in this database related to malware you should use a quality internet security package. Which ever you choose, keep it updated and get the latest version at least every two years.
There are a number of virus and malware entries listed in this database where specific removal instructions haven't been given. If this is the case then you could try ComboFix, a program written by sUBs that can remove many different types of Trojans and Worms. See here for a tutorial on how to use the program.
NOTE: A number of entries are repeated due to the way that different operating systems display startup items. For example, WinMe lists "POPROXY.EXE" as "Norton eMail Protect" in both MSCONFIG and the registry whereas WinXP lists it as "Poproxy" in MSCONFIG and "Norton eMail Protect" in the registry.
SERVICES: "Services" from the Windows 8/7/Vista/XP/2K/NT operating systems are not included. We fully understand that some programs with these OS's use "Services" as an alternative to load their component parts at startup but these are handled in a different way. We recommend you try BlackViper for information on services for the relevant operating systems.
Presentation, format & comments Copyright © 2001 - 2015 Pacman's Portal
Portions Copyright © Peter Forrest, Denny Denham, Sylvain Prevost, Tony Klein, CastleCops & Bleeping Computer
Powered by Malwarebytes
All rights reserved