Index Introduction Database Detailed Entries Updates Concise List HJT Forums Rogues Message Board

Windows startup programs - Browse database

If you're frustrated with the time it takes your Windows 10/8/7/Vista/XP PC to boot and then it seems to be running slowly you may have too many programs running at start-up - and you have come to the right place to identify them. This is the original start-up programs (as opposed to processes/tasks) list - one of the most accurate and comprehensive. Services are not included - see below. For further information on this and how to identify and disable start-up programs please visit the Introduction page.

See here for further information on random entries - which are typically added by viruses and other malware or unwanted programs.

Last database update :- 30th November, 2017
52420 listed

Entries are sorted by the Command/Data field. Alternatively, you can search the full database or use the alphabetical index on that page.

FIRST PREV ( Page 507 of 1049 ) NEXT LAST

You can also manually change the page number in the address bar.

Startup Item or Name Status Command or Data Description Tested
nvvsvcXnvvsvc32.exeDetected by McAfee as Generic.bfrNo
nvvsvc64.exeXnvvsvc64.exeDetected by McAfee as RDN/Generic PWS.y!ux and by Malwarebytes as PasswordStealer.Tibia. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows startsNo
loadXnvvswc.exeDetected by Malwarebytes as Backdoor.Agent.PDL. Note - this entry modifies the legitimate HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows "load" value data to include the file "nvvswc.exe" (which is located in %AppData%\Microsoft\Blend\14.0\FeedCache)No
loadXnvvswc.exeDetected by Malwarebytes as Trojan.AutoRun. Note - this entry modifies the legitimate HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows "load" value data to include the file "nvvswc.exe" (which is located in %AppData%\WinRAR)No
Microsoft® Windows® Operating SystemXnvxdsinc.exeDetected by Dr.Web as Trojan.DownLoader5.40693 and by Malwarebytes as Backdoor.AgentNo
kernel32Xnvxdsync.exeDetected by Malwarebytes as Trojan.Agent. The file is located in %UserTemp%No
nvxdsyncUnvxdsync.exeDetected by Malwarebytes as PUP.Optional.SurfVox. The file is located in %LocalAppData%\nvxdsync. If bundled with another installer or not installed by choice then remove itNo
nvmainAppXnvxdvr.exeDetected by Malwarebytes as Backdoor.Agent.E. The file is located in %AppData%\NvxdvrNo
myNetWatchmanUnwclient.exeSends your firewall alerts to a website, which then filters them and forwards details of suspicious activities to the host ISP they originated from. Only needs to be running when your firewall is runningNo
Norman Worl System AbilityXnwcss32.exeDetected by Trend Micro as TROJ_DELF.IO. The file is located in %System%No
HKCUXNWD GAMESDetected by Malwarebytes as Backdoor.HMCPol.Gen. The file is located in %System%\InstallDirNo
HKLMXNWD GAMESDetected by Malwarebytes as Backdoor.HMCPol.Gen. The file is located in %System%\InstallDirNo
Windows Services TsXnwdpqqoiwm.exeDetected by Sophos as W32/Rbot-GRVNo
ZenoXnwinrqez.exeAdded by unidentified malware. The file is located in %System%No
csrssXnwiz.exeDetected by Sophos as W32/Chode-JNo
Norton WizzardXnwiz.exeDetected by Symantec as W32.Gaobot.ADV. Note - this is not the valid NVIDIA application that shares the same nameNo
nwizUnwiz.exePart of NVIDIA's NVIEW Display Management Software - included in drivers for consumer and professional graphics products. This entry runs the "NVIDIA Display Setup Wizard" if you connect (or already have connected) an additional display once the drivers have been installed. In later drivers it also loads the "nView Desktop Manager" (if you enable it via Control Panel → NVIDIA nView Desktop Manager) if you want to use features such as Hot Keys and Zoom. In both cases nwiz.exe doesn't remain in memoryYes
nwiz.exeUnwiz.exePart of NVIDIA's NVIEW Display Management Software - included in drivers for consumer and professional graphics products. This entry runs the "NVIDIA Display Setup Wizard" if you connect (or already have connected) an additional display once the drivers have been installed. In later drivers it also loads the "nView Desktop Manager" (if you enable it via Control Panel → NVIDIA nView Desktop Manager) if you want to use features such as Hot Keys and Zoom. In both cases nwiz.exe doesn't remain in memoryYes
NvUpdaterXnwiz32.exeAdded by a variant of Backdoor:Win32/Rbot. The file is located in %System%No
nwiz32Xnwiz32.exeDetected by Sophos as Troj/Sinbank-ANo
Microsoft Autorun1Xnwizdh.exeDetected by Symantec as W32.Ogleon.ANo
Microsoft Autorun20Xnwizfy.exeDetected by Symantec as W32.Ogleon.ANo
Microsoft Autorun3Xnwizhx2.exeDetected by Symantec as W32.Ogleon.ANo
nwizsXnwizs.exeDetected by Symantec as W32.Queshare. Note - the file is located in %ProgramFiles%\NVIDIA Corporation\PhysX\Common but is not a valid NVIDA PhysX fileNo
Microsoft Autorun7Xnwiztlbu.exeDetected by Symantec as W32.Ogleon.ANo
Microsoft Autorun11Xnwizwlwzs.exeDetected by Symantec as W32.Ogleon.ANo
Microsoft Autorun10Xnwizwmgjs.exeDetected by Symantec as W32.Ogleon.ANo
Microsoft Autorun12Xnwizzhuxians.exeDetected by Symantec as W32.Ogleon.ANo
loadYnwpopup.exeBroadcast message handler part of Novell (now part of Micro Focus) Netware that displays server, printer and other messages. This entry loads from the "load=" section of WIN.INI (in %Windir%) on Win9x/Me and the file is located in %Root%\NOVELL\CLIENT32No
SCHTASKSXnwscript.exe.lnkDetected by McAfee as RDN/Generic.bfr and by Malwarebytes as Backdoor.Agent.ENo
NWTRAYYNWTRAY.EXEPart of Novell (now part of Micro Focus) Netware. Displays the red "N" tray icon which can be disabled (by right-click on the icon) but is also needed by the clientNo
NVIDIA_SettingsXnwtray32.exeDetected by Malwarebytes as Trojan.Agent.E. The file is located in %Templates%No
Microsoft WindowsXnwxdse.exeDetected by Malwarebytes as Backdoor.IRCBot. The file is located in %Windir%\SetNo
Microsoft OfficeXNxcao.exeDetected by Sophos as W32/Rbot-ZE and by Malwarebytes as Backdoor.Agent.MONo
Microsoft OfficeXnxcxtpr.exeDetected by Sophos as W32/Rbot-YG and by Malwarebytes as Backdoor.Agent.MONo
Dialog TrackerUNxdlghlp.exeExplorerPlus advanced file management alternative to Windows Explorer from Novatix. No longer availableNo
KPeerNexonEUNnxEULauncher.exeLauncher for the EU version of the Korean Nexon on-line game/content service providerNo
nxfballaq.exeXnxfballaq.exeDetected by McAfee as RDN/Generic.bfr!ib and by Malwarebytes as Trojan.Banker.IDF. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows startsNo
JDOSKDCCSXnxgdspsaaaf.exeDetected by McAfee as RDN/Generic.bfr!gj and by Malwarebytes as Backdoor.Agent.ENo
NYXNY.exeDetected by Malwarebytes as Trojan.Agent.Generic. The file is located in %CommonAppData%\InstallShield Installation InformationNo
nybriqkildokXnybriqkildok.exeDetected by Malwarebytes as Trojan.Agent.US. The file is located in %UserProfile%No
nycris.exeXnycris.exeDetected by McAfee as RDN/Generic.bfr and by Malwarebytes as Backdoor.Agent.ENo
Nyet.exeXNyet.exeDetected by Microsoft as TrojanDownloader:Win32/Delf.MP and by Malwarebytes as Trojan.BankerNo
nyllelcerybfXnyllelcerybf.exeDetected by Malwarebytes as Trojan.Agent.US. The file is located in %UserProfile% - see hereNo
nylycwamkosuXnylycwamkosu.exeDetected by Malwarebytes as Trojan.Agent.US. The file is located in %UserProfile% - see hereNo
WindowS32Xnynimiqo.exeDetected by Malwarebytes as Trojan.Agent.IMN. The file is located in %AppData%\WindowDriverSysNo
nyqvemedjeawXnyqvemedjeaw.exeDetected by McAfee as RDN/Downloader.gen.a and by Malwarebytes as Trojan.PWS.ZbotNo
nyzamufdelygXnyzamufdelyg.exeDetected by McAfee as RDN/Generic.dx and by Malwarebytes as Trojan.Ransom.RRENo
nyzxarrozaguXnyzxarrozagu.exeDetected by McAfee as Generic.dx and by Malwarebytes as Trojan.Agent.USNo
NZ01XNZ01.exeDetected by Sophos as Troj/Scar-KNo

 

FIRST PREV ( Page 507 of 1049 ) NEXT LAST

You can also manually change the page number in the address bar.

Notes & Warnings

If you can help identify new entries and verify/identify those entries with a "?" status (especially hardware specific - such as laptops and motherboards) then please E-mail us (startups_at_pacs-portal_dot_co_dot_uk).

"Status" key:

Variables:

DISCLAIMER: It is assumed that users are familiar with the operating system they are using and comfortable with making the suggested changes. We will not be held responsible if changes you make cause a system failure.

WARNING: This is NOT a list of tasks/processes taken from the Task Manager (CTRL+SHIFT+ESC) "Processes" tab. This displays some startup programs AND other background tasks and "Services". These pages are concerned with startup programs from the common startup locations shown above ONLY. Please do not submit entries collected from this method as they will not be used. For a list of tasks/processes you should try the list at PC Pitstop, the Process Library from Uniblue or one of the many others now available.

Therefore, before ending a task/process via CTRL+SHIFT+ESC just because it has an "X" recommendation, please check whether it's in the registry or common startup locations first. An example would be "svchost.exe" - which doesn't appear in either under normal conditions but does via CTRL+SHIFT+ESC. If in doubt, don't do anything.

To avoid the database becoming too large, all malware entries are only shown using the registry version which is common to all Windows versions. Otherwise there would be multiple entries for popular filenames that viruses often use - such as "svchost.exe" above for example. Multiple malware can also use the same start-up entries, in this case only those with significant differences (such as file location) are repeated in this database.

As more than 25K entries in this database related to malware you should use a quality internet security package. Which ever you choose, keep it updated and get the latest version at least every two years.

There are a number of virus and malware entries listed in this database where specific removal instructions haven't been given. If this is the case then you could try ComboFix, a program written by sUBs that can remove many different types of Trojans and Worms. See here for a tutorial on how to use the program.

NOTE: A number of entries are repeated due to the way that different operating systems display startup items. For example, WinMe lists "POPROXY.EXE" as "Norton eMail Protect" in both MSCONFIG and the registry whereas WinXP lists it as "Poproxy" in MSCONFIG and "Norton eMail Protect" in the registry.

SERVICES: "Services" from the Windows 8/7/Vista/XP/2K/NT operating systems are not included. We fully understand that some programs with these OS's use "Services" as an alternative to load their component parts at startup but these are handled in a different way. We recommend you try BlackViper for information on services for the relevant operating systems.

Copyright

Presentation, format & comments Copyright © 2001 - 2017 Pacman's Portal
Portions Copyright © Peter Forrest, Denny Denham, Sylvain Prevost, Tony Klein, CastleCops & Bleeping Computer
Powered by Malwarebytes
All rights reserved

Valid XHTML 1.0 Transitional

Privacy Policy Site Map Home