Index Introduction Database Detailed Entries Updates Concise List HJT Forums Rogues Message Board

Windows startup programs - Browse database

If you're frustrated with the time it takes your Windows 8/7/Vista/XP PC to boot and then it seems to be running slowly you may have too many programs running at start-up - and you have come to the right place to identify them. This is the original start-up programs (as opposed to processes/tasks) list - one of the most accurate and comprehensive. Services are not included - see below. For further information on this and how to identify and disable start-up programs please visit the Introduction page.

See here for further information on random entries - which are typically added by viruses and other malware or unwanted programs.

Last database update :- 31st July, 2015
45898 items listed

Entries are sorted by the Command/Data field. Alternatively, you can search the full database or use the alphabetical index on that page.

FIRST PREV ( Page 507 of 918 ) NEXT LAST

You can also manually change the page number in the address bar.

Startup Item or Name Status Command or Data Description Tested
dmnXregsvr32 /s [filename].jpgDetected by Malwarebytes Anti-Malware as Trojan.Banker.EME. Note that regsvr32.exe is a legitimate Microsoft file used to register and unregister OLE controls and shouldn't be deleted. The "[filename].jpg" file is located in %AppData% - see an example hereNo
[UserName]Xregsvr32 /s [username].jpgDetected by Malwarebytes Anti-Malware as Trojan.Banker. Note that regsvr32.exe is a legitimate Microsoft file used to register and unregister OLE controls and shouldn't be deleted. The "[username].jpg" file is located in %AppData%No
dw1Xregsvr32 /s [UserName].jpgDetected by Malwarebytes Anti-Malware as Trojan.Banker. Note that regsvr32.exe is a legitimate Microsoft file used to register and unregister OLE controls and shouldn't be deleted. The "[UserName].jpg" file is located in %AppData%No
yghXregsvr32 /s [UserName].jpgDetected by Malwarebytes Anti-Malware as Trojan.Banker. Note that regsvr32.exe is a legitimate Microsoft file used to register and unregister OLE controls and shouldn't be deleted. The "[UserName].jpg" file is located in %AppData%No
uninstalXregsvr32 image.dllCoolWebSearch parasite variant. Note that regsvr32.exe is a legitimate Microsoft file used to register and unregister OLE controls and shouldn't be deleted. The "image.dll" file is located in %System%No
dispraisersXregsvr32 [path] ctfmonm.dllDetected by Symantec as Infostealer.Rodagose. Note that regsvr32.exe is a legitimate Microsoft file used to register and unregister OLE controls and shouldn't be deleted. The "ctfmonm.dll" file is located in %Windir%No
WINUPXregsvr32 [path] [filename].dllDetected by Malwarebytes Anti-Malware as Trojan.Agent.WNUGen. Note that regsvr32.exe is a legitimate Microsoft file used to register and unregister OLE controls and shouldn't be deleted. The "[filename].dll" file is located in %Temp%No
wuaucltXregsvr32 [path] [filename].dllDetected by Malwarebytes Anti-Malware as Trojan.Downloader. Note that regsvr32.exe is a legitimate Microsoft file used to register and unregister OLE controls and shouldn't be deleted. The DLL file is located in %AppData%\Microsoft\wuauclt - see an example hereNo
Generic Service ProcessXregsvr32.exeDetected by Sophos as W32/Agobot-JU and by Malwarebytes Anti-Malware as Backdoor.IRCBot.GenNo
Windows Desktop UpdateXregsvr32.exeDetected by McAfee as RDN/Ransom and by Malwarebytes Anti-Malware as Backdoor.Agent.DC. Note - this is not the legitimate regsvr32.exe process, which is located in %System%. This one is located in %LocalAppData%\GoogleNo
WUx_RegSvr?RegSvr32.exex is any number??No
HREF.OCXUregsvr32.exe ....HREF.OCXHREF.OCX is an ActiveX control developed by xFX JumpStart and used to provide HTML-alike clickable links on Windows-based programs such as PopUpKillerNo
Register SeqChk?regsvr32.exe ..csseqchk.dll??No
SchedulerManagementXRegsvr32.exe /s NPDateControl.dllDetected by Malwarebytes Anti-Malware as Trojan.Agent. Note that regsvr32.exe is a legitimate Microsoft file used to register and unregister OLE controls and shouldn't be deleted. The "NPDateControl.dll" file is located in %CommonAppData%\{7414692D-4FF3-3F37-E9D3-8FB92EA723DD}No
DelayHandlersXregsvr32.exe /s NPLoadRegistry.dllDetected by Malwarebytes Anti-Malware as Trojan.Agent. Note that regsvr32.exe is a legitimate Microsoft file used to register and unregister OLE controls and shouldn't be deleted. The "NPLoadRegistry.dll" file is located in %CommonAppData%\{C565A1F1-A0C5-DEB6-76C4-DC251A3C1A98}No
AssociationStartXRegsvr32.exe /s NPShellApp.dllDetected by Malwarebytes Anti-Malware as Trojan.Agent. Note that regsvr32.exe is a legitimate Microsoft file used to register and unregister OLE controls and shouldn't be deleted. The NPShellApp.dll" file is located in %CommonAppData%\{C743D427-453E-A4D6-0A2F-BF565720C267}No
OlqlarvXregsvr32.exe /s Olqlarv.dllDetected by Malwarebytes Anti-Malware as Trojan.Chrome.INJ. Note that regsvr32.exe is a legitimate Microsoft file used to register and unregister OLE controls and shouldn't be deleted. The "Olqlarv.dll" file is located in %LocalAppData%\VirtualStoreNo
supdate2.dllXregsvr32.exe /s supdate2.dllAdded by the ZLOB-VL TROJAN! Note that regsvr32.exe is a legitimate Microsoft file used to register and unregister OLE controls and shouldn't be deleted. The "supdate2.dll" file is located in %System%No
[6 characters]Xregsvr32.exe /s [6 characters].datDetected by Malwarebytes Anti-Malware as Trojan.Agent.RNSGen. Note that regsvr32.exe is a legitimate Microsoft file used to register and unregister OLE controls and shouldn't be deleted. The file is located in %CommonAppData% - see an example hereNo
sukuwdoaXregsvr32.exe /s [path] sukuwdoa.datDetected by Malwarebytes Anti-Malware as Trojan.FakeMS. Note that regsvr32.exe is a legitimate Microsoft file used to register and unregister OLE controls and shouldn't be deleted. The "sukuwdoa.dat" file is located in %CommonAppData%No
apnhzmXregsvr32.exe apnhzm.datDetected by Malwarebytes Anti-Malware as Trojan.Ransom.Gen. Note that regsvr32.exe is a legitimate Microsoft file used to register and unregister OLE controls and shouldn't be deleted. The "apnhzm.dat" file is located in %CommonAppData%No
RegBarUregsvr32.exe bocaitoolbar.dllBocaiToolbar adware. Note that regsvr32.exe is a legitimate Microsoft file used to register and unregister OLE controls and shouldn't be deleted. The "bocaitoolbar.dll" file is located in %ProgramFiles%\blogmarkNo
AsioRegUregsvr32.exe ctasio.dllASIO (Audio Stream In/Out) drivers for the SoundBlaster Audigy 2 series soundcards - for recording and home project studios. Required if you use this functionalityNo
AsioThk32RegUregsvr32.exe ctasio.dllASIO (Audio Stream In/Out) drivers for the SoundBlaster Audigy 2 series soundcards - for recording and home project studios. Required if you use this functionalityNo
mfhsornwnduyXregsvr32.exe gisyflngpshcvuakv.dllPro AntiSpyware 2009 rogue spyware remover - not recommended, removal instructions here. Note that regsvr32.exe is a legitimate Microsoft file used to register and unregister OLE controls and shouldn't be deleted. The "gisyflngpshcvuakv.dll" file is located in %System%No
Ir41_32.axUregsvr32.exe Ir41_32.axIntel® Indeo® video 4.4 Decompression Filter related. The "Ir41_32.ax" file is located in %System%No
kvern16.dllXregsvr32.exe kvern16.dllDailyWinner adware. Note that regsvr32.exe is a legitimate Microsoft file used to register and unregister OLE controls and shouldn't be deleted. The "kvern16.dll" file is located in %System%No
Oppics UpdateUregsvr32.exe PMFileReader.dllDetected by Malwarebytes Anti-Malware as PUP.Optional.Acronet. Note that regsvr32.exe is a legitimate Microsoft file used to register and unregister OLE controls and shouldn't be deleted. The "PMFileReader.dll" file is located in %LocalAppData%\Oppics. If bundled with another installer or not installed by choice then remove itNo
rmoc3260.dll OCXUregsvr32.exe rmoc3260.dllA module that contains COM components for media playback used by both RealPlayer and Windows Media Player - see here. The "rmoc3260.dll" file is located in %System%No
vern16.dllXregsvr32.exe vernn16.dllDailyWinner adware. Note that regsvr32.exe is a legitimate Microsoft file used to register and unregister OLE controls and shouldn't be deleted. The "vernn16.dll" file is located in %System%No
OppicsUregsvr32.exe [filename].dllDetected by Malwarebytes Anti-Malware as PUP.Optional.Acronet. Note that regsvr32.exe is a legitimate Microsoft file used to register and unregister OLE controls and shouldn't be deleted. The "[filename].dll" file is located in %LocalAppData%\Oppics. If bundled with another installer or not installed by choice then remove itNo
AproQaytuXregsvr32.exe [path] AproQaytu.datDetected by Malwarebytes Anti-Malware as Trojan.Agent.PP. Note that regsvr32.exe is a legitimate Microsoft file used to register and unregister OLE controls and shouldn't be deleted. The "AproQaytu.dat" file is located in %CommonAppData%\AproQaytuNo
MSSecurityXregsvr32.exe [path] dump21cb.dllDetected by Symantec as Trojan.Denpur and by Malwarebytes Anti-Malware as Trojan.InfoStealer.DLL. Note that regsvr32.exe is a legitimate Microsoft file used to register and unregister OLE controls and shouldn't be deleted. The "dump21cb.dll" file is located in %CommonAppData%No
EmdaNzagiXregsvr32.exe [path] EmdaNzagi.datDetected by Malwarebytes Anti-Malware as Trojan.Ransom.ED. Note that regsvr32.exe is a legitimate Microsoft file used to register and unregister OLE controls and shouldn't be deleted. The "EmdaNzagi.dat" file is located in %CommonAppData%No
ErziZsomXregsvr32.exe [path] ErziZsom.datDetected by Malwarebytes Anti-Malware as Trojan.Tepfer.FA. Note that regsvr32.exe is a legitimate Microsoft file used to register and unregister OLE controls and shouldn't be deleted. The "ErziZsom.dat" file is located in %CommonAppData%\ErziZsomNo
IvyiFyeyXregsvr32.exe [path] IvyiFyey.datDetected by Malwarebytes Anti-Malware as Trojan.Tepfer.FA. Note that regsvr32.exe is a legitimate Microsoft file used to register and unregister OLE controls and shouldn't be deleted. The "IvyiFyey.dat" file is located in %CommonAppData%\IvyiFyeyNo
GosiJuwvXregsvr32.exe [path] NoneLmalu.srqDetected by Malwarebytes Anti-Malware as Trojan.FakeMS. Note that regsvr32.exe is a legitimate Microsoft file used to register and unregister OLE controls and shouldn't be deleted. The "NoneLmalu.srq" file is located in %CommonAppData%\GosiJuwvNo
OmcadEyuraXregsvr32.exe [path] OmcadEyura.datDetected by Malwarebytes Anti-Malware as Trojan.Ransom.Gen. Note that regsvr32.exe is a legitimate Microsoft file used to register and unregister OLE controls and shouldn't be deleted. The "OmcadEyura.dat" file is located in %CommonAppData%No
owphelkgXregsvr32.exe [path] owphelkg.datDetected by Malwarebytes Anti-Malware as Trojan.Ransom.Gend. Note that regsvr32.exe is a legitimate Microsoft file used to register and unregister OLE controls and shouldn't be deleted. The "owphelkg.dat" file is located in %CommonAppData%No
ttbuoyikXregsvr32.exe [path] ttbuoyik.datDetected by Malwarebytes Anti-Malware as Trojan.Ransom.Gend. Note that regsvr32.exe is a legitimate Microsoft file used to register and unregister OLE controls and shouldn't be deleted. The "ttbuoyik.dat" file is located in %CommonAppData%No
UjorIpujiXregsvr32.exe [path] UjorIpuji.datDetected by Malwarebytes Anti-Malware as Trojan.Ransom.Gen. Note that regsvr32.exe is a legitimate Microsoft file used to register and unregister OLE controls and shouldn't be deleted. The "UjorIpuji.dat" file is located in %CommonAppData%No
ypkalqXregsvr32.exe [path] ypkalq.datDetected by Malwarebytes Anti-Malware as Trojan.Ransom.Gend. Note that regsvr32.exe is a legitimate Microsoft file used to register and unregister OLE controls and shouldn't be deleted. The "ypkalq.dat" file is located in %CommonAppData%No
[UserName]#XREGSVR32.EXE [path] [UserName]#.jpgDetected by Malwarebytes Anti-Malware as Trojan.Banker - where # represents a digit. Note that regsvr32.exe is a legitimate Microsoft file used to register and unregister OLE controls and shouldn't be deleted. The "[UserName]#.jpg" file is located in %AppData%No
xhehjnnlqercberXregsvr32.exe [random name].dllMxliveMedia adware. Note that regsvr32.exe is a legitimate Microsoft file used to register and unregister OLE controls and shouldn't be deleted. The random DLL file is located in %System%No
Compatibility Service ProcessXregsvs.exeAdded by the GAOBOT.YN WORM!No
regsyncXregsync.exeDetected by Symantec as Spyware.SafeSurfingNo
Registry SystemXRegsys.exeAdded by a variant of the IRCBOT BACKDOOR! See hereNo
Reg_WFTXRegsysw.comAdded by the WILSEF VIRUS!No
Reg_WFTXRegsysw.exeDetected by Trend Micro as WORM_WILSEF.ANo
Registration-INSDVDNRegTool.exeRegistration reminder for Pinnacle Instant CD/DVD burning and authoring software from Pinnacle SystemsNo

 

FIRST PREV ( Page 507 of 918 ) NEXT LAST

You can also manually change the page number in the address bar.

Notes & Warnings

If you can help identify new entries and verify/identify those entries with a "?" status (especially hardware specific - such as laptops and motherboards) then please E-mail us (startups_at_pacs-portal_dot_co_dot_uk).

"Status" key:

Variables:

DISCLAIMER: It is assumed that users are familiar with the operating system they are using and comfortable with making the suggested changes. We will not be held responsible if changes you make cause a system failure.

WARNING: This is NOT a list of tasks/processes taken from the Task Manager (CTRL+SHIFT+ESC) "Processes" tab. This displays some startup programs AND other background tasks and "Services". These pages are concerned with startup programs from the common startup locations shown above ONLY. Please do not submit entries collected from this method as they will not be used. For a list of tasks/processes you should try the list at PC Pitstop, the Process Library from Uniblue or one of the many others now available.

Therefore, before ending a task/process via CTRL+SHIFT+ESC just because it has an "X" recommendation, please check whether it's in the registry or common startup locations first. An example would be "svchost.exe" - which doesn't appear in either under normal conditions but does via CTRL+SHIFT+ESC. If in doubt, don't do anything.

To avoid the database becoming too large, all malware entries are only shown using the registry version which is common to all Windows versions. Otherwise there would be multiple entries for popular filenames that viruses often use - such as "svchost.exe" above for example. Multiple malware can also use the same start-up entries, in this case only those with significant differences (such as file location) are repeated in this database.

As more than 25K entries in this database related to malware you should use a quality internet security package. Which ever you choose, keep it updated and get the latest version at least every two years.

There are a number of virus and malware entries listed in this database where specific removal instructions haven't been given. If this is the case then you could try ComboFix, a program written by sUBs that can remove many different types of Trojans and Worms. See here for a tutorial on how to use the program.

NOTE: A number of entries are repeated due to the way that different operating systems display startup items. For example, WinMe lists "POPROXY.EXE" as "Norton eMail Protect" in both MSCONFIG and the registry whereas WinXP lists it as "Poproxy" in MSCONFIG and "Norton eMail Protect" in the registry.

SERVICES: "Services" from the Windows 8/7/Vista/XP/2K/NT operating systems are not included. We fully understand that some programs with these OS's use "Services" as an alternative to load their component parts at startup but these are handled in a different way. We recommend you try BlackViper for information on services for the relevant operating systems.

Copyright

Presentation, format & comments Copyright © 2001 - 2015 Pacman's Portal
Portions Copyright © Peter Forrest, Denny Denham, Sylvain Prevost, Tony Klein, CastleCops & Bleeping Computer
Powered by Malwarebytes
All rights reserved

Valid XHTML 1.0 Transitional

Privacy Policy Site Map Home