Index Introduction Database Detailed Entries Updates Concise List HJT Forums Rogues Message Board

Windows startup programs - Browse database

If you're frustrated with the time it takes your Windows 8/7/Vista/XP PC to boot and then it seems to be running slowly you may have too many programs running at start-up - and you have come to the right place to identify them. This is the original start-up programs (as opposed to processes/tasks) list - one of the most accurate and comprehensive. Services are not included - see below. For further information on this and how to identify and disable start-up programs please visit the Introduction page.

See here for further information on random entries - which are typically added by viruses and other malware or unwanted programs.

Last database update :- 29th August, 2014
41816 items listed

Entries are sorted by the Command/Data field. Alternatively, you can search the full database or use the alphabetical index on that page.

FIRST PREV ( Page 507 of 837 ) NEXT LAST

You can also manually change the page number in the address bar.

Startup Item or Name Status Command or Data Description Tested
StartNow Search ProtectUsearch_protect.exeStartNow toolbar by Conduit Ltd. Detected by Malwarebytes Anti-Malware as PUP.Optinal.StartNow. The file is located in %ProgramFiles%\StartNow Toolbar. If bundled with another installer or not installed by choice then remove itNo
O7E4KBFZJOXSEBuPMd.exe.lnkDetected by McAfee as Generic BackDoor and by Malwarebytes Anti-Malware as Backdoor.Agent.DCENo
ShellXSEBuQMe.exe,explorer.exeDetected by McAfee as RDN/Generic.bfr!fc. Note - this entry adds an illegal HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon "Shell" entry. The value data points to "explorer.exe" (which is a legitimate file located in %Windir% and shouldn't be deleted) and "SEBuQMe.exe" (which is located in %AppData%\E6e9nrI8)No
SecureExpertCleanerXsec.exeSecure Expert Cleaner rogue privacy program - not recommended, removal instructions here. Detected by Malwarebytes Anti-Malware as Rogue.SecureExpertCleanerNo
Windows applicatonXsec.exeDetected by McAfee as RDN/Generic.dx!d2h and by Malwarebytes Anti-Malware as Trojan.AgentNo
run=Xsec5dec.exeAdded by the ATAK.G WORM!No
Second CopyUSecCopy.exeSecond Copy® by Centered Systems - "is the perfect automatic backup software designed for Windows XP and above. It makes a backup of your data files to another directory, internal or external hard disk or to a computer across the network"No
Second Copy 2000USecCopy.exeSecond Copy® by Centered Systems - "is the perfect automatic backup software designed for Windows XP and above. It makes a backup of your data files to another directory, internal or external hard disk or to a computer across the network"No
*Security CenterXsecctr.exeDetected by Trend Micro as WORM_SDBOT.BRONo
secdrive.exeXsecdrive.exeAdded by a variant of the SPYBOT WORM! See hereNo
loadXSecret.batDetected by Dr.Web as Trojan.MulDrop4.9061 and by Malwarebytes Anti-Malware as Trojan.Ransom. Note - this entry modifies the legitimate HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows "load" value data to include the file "Secret.bat" (which is located in %Temp%)No
secirXsecret.exeDetected by Dr.Web as Trojan.DownLoader10.8716 and by Malwarebytes Anti-Malware as Trojan.Downloader.XNNo
SecretXSecret.exeDetected by Sophos as Troj/Delf-LWNo
SECRETMAKERUsecretmaker.exeSecretmaker is a combination of eight privacy-defending programs, including Spam Fighter Pro, Worm Hunter, Pop-Up Killer, Banner Blocker, Cookie Eraser, Privacy Protector, History Cleaner, and Garbage CleanerNo
Windows UpdateXSecretStub.exeDetected by Malwarebytes Anti-Malware as Backdoor.IRCBot. The file is located in %Windir%No
secserv.exeXsecserv.exeDetected by Panda as an EasySearch adware variant. Note - EasySearch modifies the Internet Explorer settings and may download programs onto the infected computerNo
Security Server DBXsecserver.exeAdded by a variant of the IRCBOT BACKDOOR! See hereNo
Security Service DBXsecservice.exeAdded by a variant of the IRCBOT BACKDOOR! See hereNo
Security ShieldXsecshield.exeDetected by McAfee as Generic PWS.y and by Malwarebytes Anti-Malware as Trojan.Agent.GenNo
secsrvrcXsecsrvrc.exeDetected by Kaspersky as Trojan-Spy.Win32.SCKeyLog.auNo
Network SecurityXsecsvc.exeAdded by the RBOT-ALX WORM!No
Security ServiceXsecsvc.exeAdded by the RBOT-GGF WORM!No
System Event ManagerXsecsvc.exeDetected by Trend Micro as WORM_RBOT.BMYNo
secsvc32Xsecsvcnt.exeDetected by Total Defense as Global Patrol 1.31No
SecsysUSecsys.exeUltraSoft Key Interceptor surveillance software - uninstall this unless you put it there yourself!No
SecUpdXSecUpd.exeDetected by McAfee as Ransom and by Malwarebytes Anti-Malware as Trojan.Agent.RNSNo
Security AgentXsecurag.exeDetected by Sophos as Troj/Bancban-FNo
SecureXSecure.exeDetected by McAfee as RDN/Generic Dropper!tz and by Malwarebytes Anti-Malware as Backdoor.Agent.DCENo
BatXsecure2.batAdded by the ZCREW.C TROJAN!No
Compaq Computer Security?Secure32.exe??No
Win32 Security ProtocolXsecure32.exeAdded by the RBOT-ETI WORM!No
Winsecure AntivirusXSecureantivirus.exeAdded by a variant of the SPYBOT WORM!No
MicrosoftCorpXsecurebind.exeDetected by Malwarebytes Anti-Malware as Trojan.Agent.MSGen. The file is located in %System% - see hereNo
MicrosoftNAPCXsecurebind.exeDetected by Malwarebytes Anti-Malware as Backdoor.Bot. The file is located in %System% - see hereNo
SecureCleanerXSecureCleaner.exeSecureCleaner rogue spyware remover - not recommended, removal instructions hereNo
SecureFighterXSecureFighter.exeSecureFighter rogue security software - not recommended, removal instructions here. A member of the WiniGuard familyNo
securefile.cplXsecurefile.cplDetected by Malwarebytes Anti-Malware as Trojan.Banker.E. The file is located in %AppData%No
SecureItProUSecureitpro470p.exeSecureIt Pro - lock your computer when you're not there, to stop malicious users from accessing your desktopNo
SecureKeeperXSecureKeeper.exeSecureKeeper rogue security software - not recommended, removal instructions here. Detected by Malwarebytes Anti-Malware as Rogue.SecureKeeper. A member of the AntiAID familyNo
SecureMessengerXSecureMessenger.exeDetected by McAfee as RDN/PWS-Banker and by Malwarebytes Anti-Malware as Trojan.Banker.PRCNo
Security MonitorXsecuremon.exeAdded by the SLENFBOT.ABH WORM!No
Microsoft InformationXsecurenet.exeAdded by the SDBOT.AJM WORM!No
SecurePcAvXSecurePcAv.exeSecurePcAv rogue security software - not recommended, removal instructions here. A member of the AntiAID familyNo
Security Center DistributionXsecuresec.exeAdded by a variant of the IRCBOT BACKDOOR! See hereNo
Security SystemXsecuresys.exeAdded by a variant of the IRCBOT BACKDOOR! See hereNo
2kowmeuswvw3Xsecuretystudio.exeSecurity Inspector 2010 rogue security software - not recommended, removal instructions hereNo
SecureVeteranXSecureVeteran.exeSecureVeteran rogue security software - not recommended, removal instructions here. A member of the WiniGuard familyNo
SecureWarriorXSecureWarrior.exeSecureWarrior rogue security software - not recommended, removal instructions here. A member of the WiniGuard familyNo
[random characters]Xsecurewinload32x.exeAdded by the OPTIXP-N TROJAN!No
Security CentralXSecurity Central.exeSecurity Central rogue security software - not recommended, removal instructions hereNo

 

FIRST PREV ( Page 507 of 837 ) NEXT LAST

You can also manually change the page number in the address bar.

Notes & Warnings

If you can help identify new entries and verify/identify those entries with a "?" status (especially hardware specific - such as laptops and motherboards) then please E-mail us (startups_at_pacs-portal_dot_co_dot_uk).

"Status" key:

Variables:

DISCLAIMER: It is assumed that users are familiar with the operating system they are using and comfortable with making the suggested changes. We will not be held responsible if changes you make cause a system failure.

WARNING: This is NOT a list of tasks/processes taken from the Task Manager (CTRL+SHIFT+ESC) "Processes" tab. This displays some startup programs AND other background tasks and "Services". These pages are concerned with startup programs from the common startup locations shown above ONLY. Please do not submit entries collected from this method as they will not be used. For a list of tasks/processes you should try the list at PC Pitstop, the Process Library from Uniblue or one of the many others now available.

Therefore, before ending a task/process via CTRL+SHIFT+ESC just because it has an "X" recommendation, please check whether it's in the registry or common startup locations first. An example would be "svchost.exe" - which doesn't appear in either under normal conditions but does via CTRL+SHIFT+ESC. If in doubt, don't do anything.

To avoid the database becoming too large, all malware entries are only shown using the registry version which is common to all Windows versions. Otherwise there would be multiple entries for popular filenames that viruses often use - such as "svchost.exe" above for example. Multiple malware can also use the same start-up entries, in this case only those with significant differences (such as file location) are repeated in this database.

As more than 25K entries in this database related to malware you should use a quality internet security package. Which ever you choose, keep it updated and get the latest version at least every two years.

There are a number of virus and malware entries listed in this database where specific removal instructions haven't been given. If this is the case then you could try ComboFix, a program written by sUBs that can remove many different types of Trojans and Worms. See here for a tutorial on how to use the program.

NOTE: A number of entries are repeated due to the way that different operating systems display startup items. For example, WinMe lists "POPROXY.EXE" as "Norton eMail Protect" in both MSCONFIG and the registry whereas WinXP lists it as "Poproxy" in MSCONFIG and "Norton eMail Protect" in the registry.

SERVICES: "Services" from the Windows 8/7/Vista/XP/2K/NT operating systems are not included. We fully understand that some programs with these OS's use "Services" as an alternative to load their component parts at startup but these are handled in a different way. We recommend you try BlackViper for information on services for the relevant operating systems.

Copyright

Presentation, format & comments Copyright © 2001 - 2014 Pacman's Portal
Portions Copyright © Peter Forrest, Denny Denham, Sylvain Prevost, Tony Klein, CastleCops & Bleeping Computer
Powered by Malwarebytes
All rights reserved

Valid XHTML 1.0 Transitional

Privacy Policy Site Map Home