Index Introduction Database Detailed Entries Updates Concise List HJT Forums Rogues Message Board

Windows startup programs - Browse database

If you're frustrated with the time it takes your Windows 8/7/Vista/XP PC to boot and then it seems to be running slowly you may have too many programs running at start-up - and you have come to the right place to identify them. This is the original start-up programs (as opposed to processes/tasks) list - one of the most accurate and comprehensive. Services are not included - see below. For further information on this and how to identify and disable start-up programs please visit the Introduction page.

See here for further information on random entries - which are typically added by viruses and other malware or unwanted programs.

Last database update :- 31st March, 2015
44943 items listed

Entries are sorted by the Command/Data field. Alternatively, you can search the full database or use the alphabetical index on that page.

FIRST PREV ( Page 507 of 899 ) NEXT LAST

You can also manually change the page number in the address bar.

Startup Item or Name Status Command or Data Description Tested
WindowsComponentXRun32dll.exeDetected by McAfee as RDN/Generic.bfr!he and by Malwarebytes Anti-Malware as Backdoor.Agent.ENo
winstroXRUN32DLL.exeDetected by Symantec as Backdoor.FTP_AnaNo
Run32Xrun33.exeDetected by Sophos as Troj/StartPa-BT and by Malwarebytes Anti-Malware as Worm.AutoITNo
adsminiXrunadsmini.exeDetected by Dr.Web as Trojan.DownLoader7.20916 and by Malwarebytes Anti-Malware as Trojan.DownLoader.GenNo
Introduction-RegistrationNRUNALL.EXEFor Compaq PC's. Should only run on first use for PC Introduction and Compaq registrationNo
runAPNrunAP.exeNot required but what is it?No
runAPI68XrunAPI35.exeDetected by Dr.Web as Trojan.Inject.57495 and by Malwarebytes Anti-Malware as Backdoor.AgentNo
runAPI78XrunAPI47.exeDetected by Sophos as Troj/Mdrop-DRE and by Malwarebytes Anti-Malware as Backdoor.AgentNo
runAPI82XrunAPI57.exeDetected by McAfee as RDN/Generic BackDoor!uz and by Malwarebytes Anti-Malware as Backdoor.AgentNo
runAPI83XrunAPI68.exeDetected by McAfee as Generic.bfr!ei and by Malwarebytes Anti-Malware as Backdoor.AgentNo
runAPI35XrunAPI82.exeDetected by Sophos as Mal/MsilDyn-C and by Malwarebytes Anti-Malware as Backdoor.AgentNo
runAPI35XrunAPI92.exeDetected by Dr.Web as Trojan.Siggen3.5133 and by Malwarebytes Anti-Malware as Backdoor.AgentNo
Microsoft DllXrunapidll.exeAdded by the RBOT-GRG WORM!No
Runapp32XRunapp32.exeDetected by Symantec as Backdoor.NeodurkNo
jyoryOu1u3CDhOVgYarHXrunas.exeDetected by Malwarebytes Anti-Malware as Trojan.Ransom.IS. The file is located in %AppData%\Adobe\Flash Player\AssetCacheNo
SystemRunXrunas.exeDetected by Malwarebytes Anti-Malware as Trojan.Agent. The file is located in %Windir% - see hereNo
AlfaAntivirusXrunbst.exeAlfaAntiVirus rogue security software - not recommendedNo
Taskbell.exeXRund1.exeAdded by the YIPID TROJAN!No
Rund11XRund11.EXEDetected by Sophos as W32/Mario-C. Notice the digit "1" used in both the startup entry and filename, rather than a lower case "L"No
AvptaskXrund1132.exeDetected by Trend Micro as TROJ_AGENT.PKZNo
RavshellXrund1132.exeDetected by Trend Micro as TROJ_AGENT.OKZNo
ravtaskXrund1132.exeDetected by Trend Micro as TROJ_DLOADER.IYTNo
rund1132Xrund1132.exeDetected by Sophos as W32/Dopbot-A and by Malwarebytes Anti-Malware as Virus.SalityNo
Rund1132.exeXRund1132.exeDetected by Sophos as Troj/StartPa-HS and by Malwarebytes Anti-Malware as Virus.SalityNo
sys001Xrund1132.exeDetected by Sophos as Troj/Small-DLDNo
Tencent QQXRund1132.exe qq.dll,Rundll32Detected by Symantec as Trojan.PWS.QQPass.FNo
runddlfileXrunddl.exeDetected by Kaspersky as Trojan-PSW.Win32.Delf.dNo
Local ServiceXrunddl32.exeDetected by Trend Micro as WORM_RBOT.ACJ and by Malwarebytes Anti-Malware as Backdoor.AgentNo
Rundll32XRUNDDLL32.EXEAdded by the STARTPAGE.AXH TROJAN!No
SysDeskqqfxXRunddll32.exeDetected by Symantec as Infostealer.Changgame and by Malwarebytes Anti-Malware as Backdoor.Agent.SDNo
Windows AutomaticUpdaterXrunddls.exeAdded by a variant of Backdoor:Win32/RbotNo
Windows ExplorerXRundII.exeDetected by Trend Micro as WORM_WOOTBOT.BXNo
filename processXRundil16.exeAdded by the GAOBOT.ZX WORM!No
ctfnomXrundIl32.exeDetected by Sophos as Troj/LegMir-AW and by Malwarebytes Anti-Malware as Backdoor.Agent. Note that the letter after the "d" in the filename is an upper case "i"No
LoadPowerProfileXrundl.exeAdded by the TOFAZZOL TROJAN! Not to be confused with the valid LoadPowerProfile entry where the command is Rundll32.exe powrprof.dllNo
RUN DLLXrundl1.exeDetected by McAfee as Downloader-MX and by Malwarebytes Anti-Malware as Trojan.Downloader.MHNo
PowerPrifileXrundl132 kenel.dll,PowerProfileEnableAdded by the INMOTA WORM!No
loadXrundl132.exeDetected by Sophos as W32/Looked-CKNo
ryyXrundl132.exeDetected by Sophos as Troj/PWS-ANA and by Malwarebytes Anti-Malware as Worm.VikingNo
[random name]Xrundl13a.exeDetected by Sophos as Troj/Gampass-LNo
NvCplXrundl32.exeDetected by Sophos as W32/Agobot-TO and by Malwarebytes Anti-Malware as Backdoor.PoisonIvy. Note - the valid version of this entry has the command line as "rundll32.exe NvCpl.dll,NvStartup"No
run32Xrundl32.exeDetected by Dr.Web as Trojan.Click2.53699 and by Malwarebytes Anti-Malware as Worm.AutoITNo
RUNDLL32Xrundl32.exeDetected by Sophos as W32/Demotry-ANo
Windows LiveXrundl32.exeDetected by McAfee as RDN/Generic.bfr!he and by Malwarebytes Anti-Malware as Backdoor.Agent.WLNo
startwindowskeyuserXrundle2.exeDetected by Symantec as W32.JavaKiller.TrojanNo
LTM2XRundlI.exeDetected by Trend Micro as TROJ_MULTIDRP.BG and by Malwarebytes Anti-Malware as Backdoor.LitmusNo
rundli32Xrundli32.exeAdded by the LADE WORM!No
Windows Network ControllerXrundlI32.exeDetected by Trend Micro as WORM_SPYBOT.AIX and by Malwarebytes Anti-Malware as Backdoor.Bot. Note the upper case "i" after the lower case "L" in the filenameNo
Windows TMXrundlI32.exeDetected by Microsoft as Backdoor:Win32/Rbot.ELNo
rundll 32Xrundll 32.exeDetected by Malwarebytes Anti-Malware as Trojan.Agent.E. The file is located in %AppData%No

 

FIRST PREV ( Page 507 of 899 ) NEXT LAST

You can also manually change the page number in the address bar.

Notes & Warnings

If you can help identify new entries and verify/identify those entries with a "?" status (especially hardware specific - such as laptops and motherboards) then please E-mail us (startups_at_pacs-portal_dot_co_dot_uk).

"Status" key:

Variables:

DISCLAIMER: It is assumed that users are familiar with the operating system they are using and comfortable with making the suggested changes. We will not be held responsible if changes you make cause a system failure.

WARNING: This is NOT a list of tasks/processes taken from the Task Manager (CTRL+SHIFT+ESC) "Processes" tab. This displays some startup programs AND other background tasks and "Services". These pages are concerned with startup programs from the common startup locations shown above ONLY. Please do not submit entries collected from this method as they will not be used. For a list of tasks/processes you should try the list at PC Pitstop, the Process Library from Uniblue or one of the many others now available.

Therefore, before ending a task/process via CTRL+SHIFT+ESC just because it has an "X" recommendation, please check whether it's in the registry or common startup locations first. An example would be "svchost.exe" - which doesn't appear in either under normal conditions but does via CTRL+SHIFT+ESC. If in doubt, don't do anything.

To avoid the database becoming too large, all malware entries are only shown using the registry version which is common to all Windows versions. Otherwise there would be multiple entries for popular filenames that viruses often use - such as "svchost.exe" above for example. Multiple malware can also use the same start-up entries, in this case only those with significant differences (such as file location) are repeated in this database.

As more than 25K entries in this database related to malware you should use a quality internet security package. Which ever you choose, keep it updated and get the latest version at least every two years.

There are a number of virus and malware entries listed in this database where specific removal instructions haven't been given. If this is the case then you could try ComboFix, a program written by sUBs that can remove many different types of Trojans and Worms. See here for a tutorial on how to use the program.

NOTE: A number of entries are repeated due to the way that different operating systems display startup items. For example, WinMe lists "POPROXY.EXE" as "Norton eMail Protect" in both MSCONFIG and the registry whereas WinXP lists it as "Poproxy" in MSCONFIG and "Norton eMail Protect" in the registry.

SERVICES: "Services" from the Windows 8/7/Vista/XP/2K/NT operating systems are not included. We fully understand that some programs with these OS's use "Services" as an alternative to load their component parts at startup but these are handled in a different way. We recommend you try BlackViper for information on services for the relevant operating systems.

Copyright

Presentation, format & comments Copyright © 2001 - 2015 Pacman's Portal
Portions Copyright © Peter Forrest, Denny Denham, Sylvain Prevost, Tony Klein, CastleCops & Bleeping Computer
Powered by Malwarebytes
All rights reserved

Valid XHTML 1.0 Transitional

Privacy Policy Site Map Home