Index Introduction Database Detailed Entries Updates Concise List HJT Forums Rogues Message Board

Windows startup programs - Browse database

If you're frustrated with the time it takes your Windows 7/Vista/XP PC to boot and then it seems to be running slowly you may have too many programs running at start-up - and you have come to the right place to identify them. This is the original start-up programs (as opposed to processes/tasks) list - one of the most accurate and comprehensive. Services are not included - see below. For further information on this and how to identify and disable start-up programs please visit the Introduction page.

See here for further information on random entries - which are typically added by viruses and other malware or unwanted programs.

Last database update :- 28th March, 2014
38961 items listed

Alternatively, you can search the full database or use the alphabetical index on that page.

FIRST PREV ( Page 507 of 780 ) NEXT LAST

You can also manually change the page number in the address bar.

Startup Item or Name Status Command or Data Description Tested
Windows Sound EmulatorXsnd32_win.exeAdded by the ATNAS.A WORM!No
snd332Xsnd332.exeAdded by the B1LD0 AIM WORM!No
sounddrvXsndbdrv3104.exeCoolWebSearch parasite variantNo
MS Sound Config 16bitXsndcfg16.exeAdded by the SDBOT.AN WORM!No
WinProfileXsndcfg16.exeDetected by Total Defense as Win32.Sndc.ANo
SndcompatXSndcompat.exeDetected by Symantec as Trojan.GemaNo
Ac97SoundXsnddrv.exeAdded by the VB.AXG TROJAN!No
microsystemXsnddrv.exeAdded by the VB.AXG TROJAN!No
Sound LoaderXsndloader.exeDetected by Trend Micro as WORM_AGOBOT.CCNo
SoundMax Audio DriversXSndMAX.exeAdded by a variant of W32/Sdbot.wormNo
Windows Audio ServiceXsndmic32.exeAdded by the ACKANTTA.C WORM!No
SNDMonYSNDMon.exePart of Symantec's LiveUpate for older versions of Symantec's security products including Norton Internet Security, Norton AntiVirus and the now discontinued Norton SystemWorks suite. Leave alone to ensure virus definitions are updated. Also, if SNDMon is disabled on one of the computers on a small office network then other computers disappear from the network for this computer, including shared devices like printers and scannersNo
Symantec NetDriver MonitorYSNDMon.exePart of Symantec's LiveUpate for older versions of Symantec's security products including Norton Internet Security, Norton AntiVirus and the now discontinued Norton SystemWorks suite. Leave alone to ensure virus definitions are updated. Also, if SNDMon is disabled on one of the computers on a small office network then other computers disappear from the network for this computer, including shared devices like printers and scannersNo
Windows Sound ManagerXSndMon16.exeAdded by a variant of the FORBOT WORM!No
Windows Sound DriverXSndMon32.exeAdded by a variant of the SPYBOT WORM!No
Windows Sound ManagerXSndMon32.exeAdded by the FORBOT-BU WORM!No
SndsaverXSndsaver.exeDetected by Symantec as Trojan.GemaNo
SNDSrvcYSNDSRVC.EXECommon process for older versions of Symantec's security products including Norton Internet Security and the now discontinued Norton AntiSpam and Norton SystemWorks suite. Used for the scanning of incoming POP3 emails for viruses, threats or spam. Runs as a service on an NT based OS (such as Windows 7/Vista/XP)No
Auto StartXsndvol32.exeAdded by the SLINBOT.AX BACKDOOR! Note - the is not the legitimate MS volume control utility which is always located in %System%No
update driverXSNDVOL32.EXEAdded by the SPYBOT-CU BACKDOOR!No
SND VolumesXsndvolumes.exeAdded by a variant of the IRCBOT BACKDOOR! See hereNo
DirectX Microsoft® WindowsXsndvr.exeDetected by McAfee as RDN/Qhost-Gen!y and by Malwarebytes Anti-Malware as Trojan.Agent.QNo
Symantec NetDriver WarningUSNDWarn.exePart of Symantec Live Update - displays the warning when you need to update the firewall databaseNo
SnetXSnet.exeDetected by Dr.Web as Trojan.AVKill.31458 and by Malwarebytes Anti-Malware as Trojan.Agent.ENo
Windows MSN UpdatesXsnic.exeDetected by Kaspersky as Exploit.Win32.IMG-WMF.ef and by Malwarebytes Anti-Malware as Backdoor.IRCBot.ENo
SystemWizard SnifferUSniffer.exeSystemWizard for Win98/ME from SystemSoft - diagnoses and solves hardware and software problems on a PCNo
56YRTHZDFHXSnipEr.exeDetected by Malwarebytes Anti-Malware as Trojan.VBAgent. The file is located in %Windir%\IuTRtEbPNo
HTSE5WSSXSnipEr.exeDetected by Malwarebytes Anti-Malware as Trojan.VBAgent. The file is located in %Windir%\IuTRtEbPNo
SnipitcolorXSnipitcolor.exeDetected by McAfee as RDN/Generic FakeAlert!ej and by Malwarebytes Anti-Malware as Backdoor.Messa.ENo
SnippetUSnippingTool.exeThe Snipping Tool (part of the Experience Pack for Tablet PC) allows you to easily "cut out" anything on screen and share it with other people. The whole screen becomes an "inkable" surface that you can add comments to and mark up however you like. You can then save that annotated image to use later, or send it to someone else in an E-mail messageNo
Microsoft UpdateXsnlogsvc.exeDetected by Trend Micro as BKDR_SDBOT.CN and by Malwarebytes Anti-Malware as Backdoor.BotNo
SNMUSNM.exeSpyNoMore spyware remover - previously not recommended, see hereNo
InomXsnmoo.exeAdded by the RBOT-DPM WORM!No
SysTrayXSnnpapi.exeDetected by SUPERAntiSpyware as Trojan.SNNPAPI.Process. The file is located in %System%No
SnoopUSnoop.exeSnoop surveillance software. Uninstall this software unless you put it there yourselfNo
SystempXsnoop.exeDetected by Dr.Web as Trojan.Siggen4.1076 and by Malwarebytes Anti-Malware as Trojan.AgentNo
SnoopFreeUIUSnoopFreeUI.exeSnoopFree Privacy Shield SnoopFree Software - anti-keylogging softwareNo
Snow.exeXSnow.exeDetected by Malwarebytes Anti-Malware as Backdoor.Agent.Gen. The file is located in %AppData%No
snqpuXsnqpu.exeDetected by Malwarebytes Anti-Malware as Adware.KorAd. The file is located in %ProgramFiles%\plusupNo
SnsiconNSnsicon.exeLaunches a screensaver program from Second NatureNo
SNSS.EXEXSNSS.EXENunci premium rate dialerNo
stryvertionXsnss.exeDetected by Dr.Web as Trojan.DownLoader8.21719 and by Malwarebytes Anti-Malware as Trojan.DownloaderNo
Dot.net NetworkingXSNSS32.EXEDetected by Trend Micro as WORM_RBOT.BOINo
ClassesXsnt.exeQuickPage - Switch dialer and hijacker variant, see here. Also detected as the SWITCH-A TROJAN!No
DiskstartXSnt.exeStartportal - Switch dialer and hijacker variant, see here. Also detected as the DELF-JE TROJAN!No
OpenMstartXSnt.exeMStart2Page - Switch dialer and hijacker variant, see here. Also detected as the SWITCH-E TROJAN!No
Windows Event SectionXsntsvc.exeAdded by a variant of the IRCBOT TROJAN! See hereNo
SysnetXsnuninst.exeUnidentified adwareNo
SearchNXSNUpdate.exeDetected by Malwarebytes Anti-Malware as Adware.Korad. The file is located in %AppData%\SearchNNo
snvcXsnvc.exeAdded by an unidentified WORM or TROJAN!No

 

FIRST PREV ( Page 507 of 780 ) NEXT LAST

You can also manually change the page number in the address bar.

Notes & Warnings

If you can help identify new entries and verify/identify those entries with a "?" status (especially hardware specific - such as laptops and motherboards) then please E-mail us (startups_at_pacs-portal_dot_co_dot_uk).

"Status" key:

Variables:

DISCLAIMER: It is assumed that users are familiar with the operating system they are using and comfortable with making the suggested changes. We will not be held responsible if changes you make cause a system failure.

WARNING: This is NOT a database of tasks/processes taken from Task Manager or the Close Program window (CTRL+ALT+DEL) but a database of start-up applications, although you will find some of them listed via this method. Pressing CTRL+ALT+DEL identifies programs that are currently running - not necessarily at start-up. For a list of tasks/processes you should try the Process Library from Uniblue, the list at PC Pitstop or one of the many others now available. Therefore, before ending a task/process via CTRL+ALT+DEL just because it has an "X" recommendation, please check whether it's in MSConfig or the registry first. An example would be "svchost.exe" - which doesn't appear in either under normal conditions but does via CTRL+ALT+DEL. If in doubt, don't do anything.

To avoid the database becoming too large, all malware entries are only shown using the registry version which is common to all Windows versions. Otherwise there would be multiple entries for popular filenames that viruses often use - such as "svchost.exe" above for example. Multiple malware can also use the same start-up entries, in this case only those with significant differences (such as file location) are repeated in this database.

As more than 15K entries in this database related to malware you should use a quality internet security package. Which ever you choose, keep it updated and get the latest version at least every two years.

There are a number of virus and malware entried listed in this database where specific removal instructions haven't been given. If this is the case then you could try ComboFix, a program written by sUBs that can remove many different types of Trojans and Worms. See here for a tutorial on how to use the program

NOTE: A number of entries are repeated due to the way that different operating systems display startup items. For example, WinMe lists "POPROXY.EXE" as "Norton eMail Protect" in both MSCONFIG and the registry whereas WinXP lists it as "Poproxy" in MSCONFIG and "Norton eMail Protect" in the registry.

SERVICES: "Services" from the NT/2K/XP/Vista/7 operating systems are not included. We fully understand that some programs with these OS's use "Services" as an alternative to load their component parts at startup but these are handled in a different way. We recommend you try BlackViper for information on services for the relevant operating systems.

Copyright

Presentation, format & comments Copyright © 2001 - 2014 Pacman's Portal
Portions Copyright © Peter Forrest, Denny Denham, Sylvain Prevost, Tony Klein, CastleCops & Bleeping Computer
Powered by Malwarebytes
All rights reserved

Valid XHTML 1.0 Transitional

Privacy Policy Site Map Home