|Index||Introduction||Database||Detailed Entries||Updates||Concise List||HJT Forums||Rogues||Message Board|
If you're frustrated with the time it takes your Windows 7/Vista/XP PC to boot and then it seems to be running slowly you may have too many programs running at start-up - and you have come to the right place to identify them. This is the original start-up programs (as opposed to processes/tasks) list - one of the most accurate and comprehensive. Services are not included - see below. For further information on this and how to identify and disable start-up programs please visit the Introduction page.
See here for further information on random entries - which are typically added by viruses and other malware or unwanted programs.
Last database update :- 29th Apr, 2013
31819 items listed
Alternatively, you can search the full database or use the alphabetical index on that page.FIRST PREV ( Page 511 of 637 ) NEXT LAST
You can also manually change the page number in the address bar.
|Startup Item or Name||Status||Command or Data||Description||Tested|
|lDirectX||X||Updater.exe||Detected by Malwarebytes Anti-Malware as Trojan.VBAgent. The file is located in %System%\DirectX||No|
|Microsoft||X||updater.exe||Added by the RBOT-GHP WORM!||No|
|Microsoft Internet Firewall Update||X||updater.exe||Added by the SLENFBOT.JO WORM!||No|
|MicroUpdate||X||Updater.exe||Detected by McAfee as Generic BackDoor!1dz and by Malwarebytes Anti-Malware as Backdoor.Agent.DC. The file is located in %Temp%\local||No|
|MoodLogic Updater||N||Updater.exe||Updater for the MoodLogic music management utility - which "automates the process of fixing and organizing digital music (MP3, WMA, and .wav) files in bulk. Once the tunes are organized, you can sort music by genre, artist, tempo, and mood (aggressive, mellow, upbeat, happy, romantic, sad), and create playlists accordingly". Now discontinued||No|
|Policies||X||updater.exe||Detected by Malwarebytes Anti-Malware as Backdoor.Agent.PGen. The file is located in %System%\winupdates||No|
|Policis||X||Updater.exe||Detected by Malwarebytes Anti-Malware as Trojan.Backdoor. The file is located in %System%\install||No|
|Printer Spool||X||updater.exe||Added by a variant of the RBOT WORM!||No|
|runner1||X||updater.exe||Added by the CRYPT.ULPM.GEN TROJAN!||No|
|system check||X||updater.exe||Unidentified adware downloader||No|
|Updater||X||Updater.exe||Detected by Malwarebytes Anti-Malware as Trojan.Backdoor. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows starts||No|
|Updater||X||Updater.exe||Detected by Malwarebytes Anti-Malware as Trojan.MSIL. The file is located in %AppData%||No|
|updater||X||updater.exe||Detected by Malwarebytes Anti-Malware as Trojan.MSIL. The file is located in %UserTemp%||No|
|WidgetUpdater||X||Updater.exe||Detected by Dr.Web as Trojan.DownLoader7.32941 and by Malwarebytes Anti-Malware as Adware.korAd||No|
|Windowz Update V2.0||X||updater.exe||Added by the YODO-C WORM!||No|
|MS Windows Security Updater||X||updater.pif||Detected by Sophos as W32/Rbot-AKY||No|
|service window||X||updater20.exe||Detected by Malwarebytes Anti-Malware as Trojan.Agent. The file is located in %Root%\NewFolder||No|
|SVCHOST||X||updater32.exe||Added by the RANTS.A WORM!||No|
|update mon sys||X||updaterar.exe||Added by a variant of the RBOT WORM!||No|
|DRam rare proc||X||updaterarwin.exe||Added by the RBOT-GQW WORM!||No|
|Updateregulatorx32||X||updatergulatorx32.exe||Detected by McAfee as Generic Downloader.x and by Malwarebytes Anti-Malware as Backdoor.Agent||No|
|Adobe Updater Startup Utility||N||UpdaterStartupUtility.exe||Update manager for Adobe Application Manager (AAM) - as used in their Creative Suite 5 (CS5) stand-alone products and suites for example||Yes|
|AdobeAAMUpdater-1.0||N||UpdaterStartupUtility.exe||Update manager for Adobe Application Manager (AAM) - as used in their Creative Suite 5 (CS5) stand-alone products and suites for example||Yes|
|UpdaterStartupUtility||N||UpdaterStartupUtility.exe||Update manager for Adobe Application Manager (AAM) - as used in their Creative Suite 5 (CS5) stand-alone products and suites for example||Yes|
|McAfeeUpdaterUI||Y||UpdaterUI.exe||McAfee common updater user interface||No|
|UpdaterUI||X||UpdaterUI.exe||Added by the AGENT-TM TROJAN!||No|
|System||X||Updaterun.exe||Added by the QQHELP-DX TROJAN!||No|
|Updates from HP||N||Updates from HP.exe||Automatically detects an internet connection and downloads any available updates for HP PCs||No|
|Adobe Updates||X||Updates.exe||Detected by Malwarebytes Anti-Malware as Trojan.FakeDoc. Note - this is not a legitimate Adobe entry and the file is located in %AppData%||No|
|AntiVirus Update||X||updates.exe||Added by the RBOT-JF WORM!||No|
|engel||X||updates.exe||Detected by Sophos as Mal/Cossta-Fand by Malwarebytes Anti-Malware as Trojan.Agent||No|
|Install part II||X||updates.exe||Added by the RELFEERWORM!||No|
|updates||X||updates.exe||Detected by Malwarebytes Anti-Malware as Trojan.Agent. Note - the file is located in %UserStartup% and its presence here ensures it runs when Windows starts||No|
|xpupdate||X||updates.exe||Added by the BROPIA.L WORM!||No|
|System Updates Service||X||updates.pif||Added by the RBOT-AMA WORM!||No|
|MicrosoftUpdate||X||UpdateService.exe||Detected by McAfee as Generic.bfr and by Malwarebytes Anti-Malware as Trojan.Agent||No|
|sp2update||X||updatesp2.exe||Added by the SDBOT.CAS WORM!||No|
|Updatestats||X||Updatestats.exe||Detected by Trend Micro as ADW_SECTHOUGHT.A||No|
|UpdateTuto4PCHP||X||UpdateTuto4PCHP.exe||Detected by McAfee as Adware-Tuto4PC and by Malwarebytes Anti-Malware as Adware.EoRezo||No|
|Modulo Update||X||UpdateTutorialsHP.exe||Detected by McAfee as Adware-Tuto4PC and by Malwarebytes Anti-Malware as Adware.EoRezo. The file is located in %AppData%\Tuto4pc\Tuto4pc IT||No|
|updatev01||N||updatev01.exe||Ultra-networks.com software updater/downloader||No|
|updatevaccinestart.exe||X||updatevaccinestart.exe||Detected by Malwarebytes Anti-Malware as Rogue.K.SearchVaccine. The file is located in %ProgramFiles%\updatevaccine||No|
|updatevaccine main||X||updatevaccineu.exe||Detected by Malwarebytes Anti-Malware as Rogue.K.SearchVaccine. The file is located in %ProgramFiles%\updatevaccine||No|
|UpdateViewer||X||UpdateViewer.exe||Detected by Malwarebytes Anti-Malware as Trojan.Agent. The file is located in %AppData%||No|
|WINTASK DLL32||X||updatewin||Detected by Trend Micro as WORM_MYTOB.NI||No|
|Task manager||X||UPDATEWIN.exe||Detected by Trend Micro as WORM_RBOT.BBS||No|
|updatewindows.exe||X||updatewindows.exe||Detected by Malwarebytes Anti-Malware as Spyware.Password. The file is located in %UserTemp%\grakaupdate||No|
|winlocatorupdate||X||updatewinlocator.exe||Locator adult content toolbar related||No|
FIRST PREV ( Page 511 of 637 ) NEXT LAST
You can also manually change the page number in the address bar.
If you can help identify new entries and verify/identify those entries with a "?" status (especially hardware specific - such as laptops and motherboards) then please E-mail us (startups_at_pacs-portal_dot_co_dot_uk).
DISCLAIMER: It is assumed that users are familiar with the operating system they are using and comfortable with making the suggested changes. We will not be held responsible if changes you make cause a system failure.
WARNING: This is NOT a database of tasks/processes taken from Task Manager or the Close Program window (CTRL+ALT+DEL) but a database of start-up applications, although you will find some of them listed via this method. Pressing CTRL+ALT+DEL identifies programs that are currently running - not necessarily at start-up. For a list of tasks/processes you should try the Process Library from Uniblue, the list at PC Pitstop or one of the many others now available. Therefore, before ending a task/process via CTRL+ALT+DEL just because it has an "X" recommendation, please check whether it's in MSConfig or the registry first. An example would be "svchost.exe" - which doesn't appear in either under normal conditions but does via CTRL+ALT+DEL. If in doubt, don't do anything.
To avoid the database becoming too large, all malware entries are only shown using the registry version which is common to all Windows versions. Otherwise there would be multiple entries for popular filenames that viruses often use - such as "svchost.exe" above for example. Multiple malware can also use the same start-up entries, in this case only those with significant differences (such as file location) are repeated in this database.
As more than 15K entries in this database related to malware you should use a quality internet security package. Which ever you choose, keep it updated and get the latest version at least every two years.
There are a number of virus and malware entried listed in this database where specific removal instructions haven't been given. If this is the case then you could try ComboFix, a program written by sUBs that can remove many different types of Trojans and Worms. See here for a tutorial on how to use the program
NOTE: A number of entries are repeated due to the way that different operating systems display startup items. For example, WinMe lists "POPROXY.EXE" as "Norton eMail Protect" in both MSCONFIG and the registry whereas WinXP lists it as "Poproxy" in MSCONFIG and "Norton eMail Protect" in the registry.
SERVICES: "Services" from the NT/2K/XP/Vista/7 operating systems are not included. We fully understand that some programs with these OS's use "Services" as an alternative to load their component parts at startup but these are handled in a different way. We recommend you try BlackViper for information on services for the relevant operating systems.
Presentation, format & comments Copyright © 2001 - 2012 Pacman's Portal
Portions Copyright © Peter Forrest, Denny Denham, Sylvain Prevost, Tony Klein, CastleCops & Bleeping Computer
Powered by Malwarebytes
All rights reserved