Index Introduction Database Detailed Entries Updates Concise List HJT Forums Rogues Message Board

Windows startup programs - Database search

If you're frustrated with the time it takes your Windows 10/8/7/Vista/XP PC to boot and then it seems to be running slowly you may have too many programs running at start-up - and you have come to the right place to identify them. This is the original start-up programs (as opposed to processes/tasks) list - one of the most accurate and comprehensive. Services are not included - see below. For further information on this and how to identify and disable start-up programs please visit the Introduction page.

See here for further information on random entries - which are typically added by viruses and other malware or unwanted programs.

Last database update :- 31st March, 2017
51245 listed

You can search for any of the following terms to find and display entries in the start-up programs database but the minimum search is 3 characters and you must click on the "Search" button. Results are sorted by the Startup Item/Name field.

Alternatively, you can browse the full database (without the search facility) over a number of pages or you can use the alphabetical index below to list the entries for that letter by the Command/Data field, but the results may take longer to appear due to the number of them:

A | B | C | D | E | F | G | H | I | J | K | L | B | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

NOTE: Searching for common words (i.e. "the" or "where") will mean the results take longer to appear due to the number of them.

Please click on the Search button

899 results found for V

Startup Item or Name Status Command or Data Description Tested
V0220Mon.exeUV0220Mon.exeCreative Live! Cam Console Auto LauncherNo
V0230Mon.exeUV0230Mon.exeCreative Live! Cam Console Auto LauncherNo
V0250Mon.exeUV0250Mon.exeCreative Live! Cam Console Auto LauncherNo
V0270Mon.exeUV0270Mon.exeCreative Live! Cam Console Auto LauncherNo
V0330Mon.exeUV0330Mon.exeCreative Live! Cam Console Auto LauncherNo
V0350Mon.exeUV0350Mon.exeCreative Live! Cam Console Auto LauncherNo
V0380Mon.exeUV0380Mon.exeCreative Live! Cam Console Auto LauncherNo
V0400Mon.exeUV0400Mon.exeCreative Live! Cam Console Auto LauncherNo
V0410Mon.exeUV0410Mon.exeCreative Live! Cam Console Auto LauncherNo
V0420Mon.exeUV0420Mon.exeCreative Live! Cam Console Auto LauncherNo
V0470Mon.exeUV0470Mon.exeCreative Live! Cam Console Auto LauncherNo
V0490Mon.exeUV0490Mon.exeCreative Live! Cam Console Auto LauncherNo
V0500Mon.exeUV0500Mon.exeCreative Live! Cam Console Auto LauncherNo
V0510Mon.exeUV0510Mon.exeCreative Live! Cam Console Auto LauncherNo
V0530Mon.exeUV0530Mon.exeCreative Live! Cam Console Auto LauncherNo
V0540Mon.exeUV0540Mon.exeCreative Live! Cam Console Auto LauncherNo
kJgY89Y96eXV0YQN9N9LB.exeDetected by Malwarebytes as Trojan.Agent. The file is located in %AppData%No
v1Xv1.exeDetected by Dr.Web as Trojan.DownLoader8.32039 and by Malwarebytes as Trojan.DownloaderNo
ACTX1Xv1201.exeDetected by CA as VB.IS. The file is located in %Windir%No
SvcHostoXv1rg1n.exeDetected by Sophos as W32/Agobot-TK and by Malwarebytes as Backdoor.Bot.ENo
V2011XV2011.exeDetected by Intel Security/McAfee as RDN/Generic BackDoor!be and by Malwarebytes as Trojan.DropperNo
V2accine2010XV2accine2010Launch.exeVaccine2010 rogue security software - not recommended, removal instructions hereNo
ASUSKeyNV38SHELL.EXESystem tray Icon for quickly changing video modesNo
MyOwnSuperhero Browser Plugin LoaderUv3brmon.exeMyOwnSuperhero toolbar (now replaced by GamingWonderland) - powered by the Ask Partner Network toolbars by IAC Applications (was Mindspark). Detected by Malwarebytes as PUP.Optional.MindSpark. The file is located in %ProgramFiles%\MyOwnSuperhero\bar\*.bin - where * represents a number or letter. If bundled with another installer or not installed by choice then remove itNo
CallCenter Main ApplicationUV3calmcp.exe"V3 Inc. CallCenter is a free 32-bit, integrated fax, voicemail and data communications application with a simple to use interface providing fax send and receive functionality, basic (single mailbox) answering machine capability, and sophistcated data communications." Main applicationNo
CallCenter Printer InterfaceUV3faxecp.exe"V3 Inc. CallCenter is a free 32-bit, integrated fax, voicemail and data communications application with a simple to use interface providing fax send and receive functionality, basic (single mailbox) answering machine capability, and sophistcated data communications." Fax printerNo
[EXPL0REEER]Xv3lieyeec.vbeDetected by Intel Security/McAfee as RDN/Generic Downloader.x!kj and by Malwarebytes as Trojan.Downloader.VBSNo
AhnLab V3Lite Update ProcessXV3LiveRun.exeDetected by Trend Micro as TROJ_DLOADER.UQY and by Malwarebytes as Trojan.Onlinegames. Note - this is not a legitimate AhnLab V3 entryNo
V3 Session ProcessYV3SP.exeSystem Tray access to, and notifications for AhnLab V3 Internet Security from Korean company AhnLab IncNo
MyOwnSuperhero Search Scope MonitorUv3srchmn.exeMyOwnSuperhero toolbar (now replaced by GamingWonderland) - powered by the Ask Partner Network toolbars by IAC Applications (was Mindspark). Detected by Malwarebytes as PUP.Optional.MindSpark. The file is located in %ProgramFiles%\MyOwnSuperhero\bar\*.bin - where * represents a number or letter. If bundled with another installer or not installed by choice then remove itNo
Windows UpdateXv41JG.exeDetected by Malwarebytes as Trojan.Zapchast. The file is located in %AppData%No
v41JG.exeXv41JG.exeDetected by Malwarebytes as Trojan.Zapchast. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows startsNo
DictionaryBoss Browser Plugin LoaderUv4brmon.exeDictionaryBoss toolbar - powered by the Ask Partner Network toolbars by IAC Applications (was Mindspark). Detected by Malwarebytes as PUP.Optional.MindSpark. The file is located in %ProgramFiles%\DictionaryBoss\bar\*.bin - where * represents a number or letter. If bundled with another installer or not installed by choice then remove itNo
DictionaryBoss Browser Plugin Loader 64Uv4brmon64.exeDictionaryBoss toolbar - powered by the Ask Partner Network toolbars by IAC Applications (was Mindspark). Detected by Malwarebytes as PUP.Optional.MindSpark. The file is located in %ProgramFiles%\DictionaryBoss\bar\*.bin - where * represents a number or letter. If bundled with another installer or not installed by choice then remove itNo
DictionaryBoss EPM SupportUv4medint.exeDictionaryBoss toolbar - powered by the Ask Partner Network toolbars by IAC Applications (was Mindspark). Detected by Malwarebytes as PUP.Optional.MindSpark. The file is located in %ProgramFiles%\DictionaryBoss\bar\*.bin - where * represents a number or letter. If bundled with another installer or not installed by choice then remove itNo
DictionaryBoss Search Scope MonitorUv4srchmn.exeDictionaryBoss toolbar - powered by the Ask Partner Network toolbars by IAC Applications (was Mindspark). Detected by Malwarebytes as PUP.Optional.MindSpark. The file is located in %ProgramFiles%\DictionaryBoss\bar\*.bin - where * represents a number or letter. If bundled with another installer or not installed by choice then remove itNo
syswinXv6.exeDetected by Sophos as Troj/Agent-ECM and by Malwarebytes as Trojan.Agent.SWNo
V66SHELL?V66SHELL.EXEIt looks to be part of the display driver set for ASUS V3800, V6600 and V6800 display adapters. Probably a system tray quick access control?No
MSN6.1 Auto-UpdaterXv6msn.exeDetected by Sophos as W32/Autorun-MM and by Malwarebytes as Backdoor.BotNo
VaCtrlsXv7Downloader, detected as a variant of the ALPHABET TROJAN!No
Windows DefenderXV7YWUP8SMC.exeDetected by Intel Security/McAfee as Generic.dx!bgbb and by Malwarebytes as Trojan.Agent.GenNo
va10keyUva10key.exeOnly required if you use the 10 kay bay unit with a Sony Vaio laptopNo
vaawaXvaawa.exeDetected by Malwarebytes as Trojan.Downloader. The file is located in %UserProfile%No
vabfidytnubgXvabfidytnubg.exeDetected by Malwarebytes as Trojan.Agent.US. The file is located in %UserProfile%No
wscript.exeXvabian.vbsAdded by the VABI VIRUS!No
vabzechurwyxXvabzechurwyx.exeDetected by Intel Security/McAfee as RDN/Generic BackDoor!h and by Malwarebytes as Backdoor.AgentNo
Vaccine365XVaccine365.exeVaccine-365 rogue security software - not recommended, removal instructions hereNo
VaccineSevenXVaccine7.exeVaccine7 rogue security software - not recommended, removal instructions hereNo
vaccinecenterXvaccinecenterctrl.exeDetected by Malwarebytes as Rogue.VaccineCenter. The file is located in %ProgramFiles%\vaccinecenterNo
vaccinecenterusbXvaccinecenterusb.exeDetected by Malwarebytes as Rogue.VaccineCenter. The file is located in %ProgramFiles%\vaccinecenterNo
vaccinecheckerstart.exeXvaccinecheckerstart.exeVaccineChecker rogue security software - not recommended, removal instructions hereNo
vaccineclassstart.exeXvaccineclassstart.exeDetected by Malwarebytes as Rogue.VaccineClass. The file is located in %ProgramFiles%\vaccineclassNo
VaccineCleanMainXVaccineClean.exeVaccineClean rogue security software - not recommended, removal instructions hereNo
vaccineclearusbXvaccineclearusb.exeVaccineClear rogue security software - not recommended, removal instructions hereNo
vaccinecloudXvaccinecloudctrl.exeDetected by Malwarebytes as Rogue.VaccineCloud. The file is located in %ProgramFiles%\vaccinecloudNo
vaccinecloudusbXvaccinecloudusb.exeDetected by Malwarebytes as Rogue.VaccineCloud. The file is located in %ProgramFiles%\vaccinecloudNo
vaccinecomstart.exeXvaccinecomstart.exeVaccineCom rogue security software - not recommended, removal instructions hereNo
VaccineCom MainXvaccinecomu.exeVaccineCom rogue security software - not recommended, removal instructions hereNo
VaccineCoreMainXVaccineCore.exeVaccineCore rogue security software - not recommended, removal instructions hereNo
VaccineDataMainXVaccineData.exeVaccineData rogue security software - not recommended, removal instructions hereNo
vaccineengineusbXvaccineengineusb.exeVaccine Engine rogue security software - not recommended, removal instructions hereNo
VaccineForceXVaccineForce.exeVaccineForce rogue security software - not recommended, removal instructions hereNo
vaccinehelperstart.exeXvaccinehelperstart.exeDetected by Malwarebytes as Rogue.K.VaccineHelper. The file is located in %ProgramFiles%\vaccinehelperNo
vaccinehomeusbXvaccinehomeusb.exeVaccineHome rogue security software - not recommended, removal instructions hereNo
VaccineLabMainXVaccineLab.exeVaccineLab rogue security software - not recommended, removal instructions hereNo
VaccineLabMainXVaccineLabPlus.exeVaccineLabPlus rogue security software - not recommended, removal instructions hereNo
vaccinelitestart.exeXvaccinelitestart.exeVaccine Lite rogue security software - not recommended, removal instructions hereNo
vaccinepcstart.exeXvaccinepcstart.exeDetected by Malwarebytes as Rogue.VaccinePC - not recommended. The file is located in %ProgramFiles%\vaccinepcNo
vaccinepowerstart.exeXvaccinepowerstart.exeVaccinePower rogue security software - not recommended, removal instructions hereNo
vaccineprogramXvaccineprogramu.exeVaccineProgram rogue security software - not recommended. One of the OneScan family of rogue scanner programsNo
vaccineqXvaccineqctrl.exeVaccineQ rogue security software - not recommended, removal instructions hereNo
vaccinequsbXvaccinequsb.exeVaccineQ rogue security software - not recommended, removal instructions hereNo
VaccineScanMainXVaccineScan.exeVaccineScan rogue security software - not recommended, removal instructions hereNo
VaccineSecureMainXVaccineSecure.exeVaccineSecure rogue security software - not recommended, removal instructions hereNo
vaccinesetusbXvaccinesetusb.exeVaccineSet rogue security software - not recommended, removal instructions hereNo
vaccinesmartstart.exeXvaccinesmartstart.exeVaccine Smart rogue security software - not recommended, removal instructions hereNo
vaccinespeedstart.exeXvaccinespeedstart.exeVaccine Speed rogue security software - not recommended, removal instructions hereNo
VaccineStarMainXVaccineStar.exeVaccineStar rogue security software - not recommended, removal instructions hereNo
VaccineTekXVaccineTek.exeVaccineTek rogue security software - not recommended, removal instructions hereNo
VaccineToolsXVaccineTools.exeVaccineTools rogue security software - not recommended, removal instructions hereNo
VaccineTreeMainXVaccineTree.exeVaccineTree rogue security software - not recommended, removal instructions hereNo
vaccineuXvaccineu.exeVaccineU rogue security software - not recommended, removal instructions hereNo
vaccineupstart.exeXvaccineupstart.exeDetected by Malwarebytes as Rogue.VaccineUP. The file is located in %ProgramFiles%\vaccineupNo
vaccineupstart.exeXvaccineupstart.exeVaccine Up rogue security software - not recommended, removal instructions hereNo
vaccinewarestart.exeXvaccinewarestart.exeDetected by Malwarebytes as Rogue.VaccineWare. The file is located in %ProgramFiles%\vaccinewareNo
vaccinewebstart.exeXvaccinewebstart.exeDetected by Malwarebytes as Rogue.VaccineWeb. The file is located in %ProgramFiles%\vaccinewebNo
vaccinewindowusbXvaccinewindowusb.exeDetected by Malwarebytes as Rogue.K.VaccineWindow. The file is located in *%ProgramFiles%\vaccinewindowNo
vacekpatixjoXvacekpatixjo.exeDetected by Malwarebytes as Backdoor.PPushdo. The file is located in %UserProfile%No
Microsoft Driver Update 3XVAD33.exeDetected by Kaspersky as Trojan.Win32.Swisyn.akvy. The file is located in %UserTemp%No
VagiconlineXvadaSq.exeAdded by the SDBOT-TD WORM!No
MSDatablaXvadasq.exeDetected by Total Defense as Win32.Lioten.IK. The file is located in %System%No
Vade Retro Outlook ExpressYVaderetro_oe.exeVade Retro anti-spam software for Outlook Express from Vade Secure (part of GOTO Software)No
vaeufXvaeuf.exeDetected by Malwarebytes as Worm.SFDC. The file is located in %UserProfile%No
VAGCtrlYVAGCTRL.EXEVexira Antivirus from Central CommandNo
VagexUVagex.exe"Vagex is a view exchange site which will expose your video to thousands of members in order to increase the view count"No
VAGCtrlYVAGNT.EXEVexira Antivirus from Central CommandNo
VAGuardYVAGNT.exeVexira Antivirus from Central CommandNo
xtermXvagqsqs.exeAdded by the SDBOT-TV WORM!No
mtXvaillo.exeDetected by Sophos as Troj/Mdrop-DQY. The file is located in %Root%No
VAIO Update 2UVAIOUpdt.exeRelated to Sony Vaio Update serviceNo
CPAUVALA.exePart of Comodo Group's Cloud Scanner online malware service and their GeekBuddy remote support tool - which is available as a separate product and is installed (but not licensed) with their free and retail security products such as Internet Security, Antivirus and FirewallNo
Virus AlarmXVAlarm.exeVirus Alarm rogue security software - not recommended, removal instructions hereNo
EleFunAnimatedWallpaperUValentines Day.exeValentines Day animated wallpaper fromNo
ValidatorXValidator.exeDetected by Malwarebytes as Trojan.Inject.VD. The file is located in %AppData%\[folder]\{GUID}No
alien5XValien1.exrDetected by Dr.Web as Trojan.DownLoader9.31484 and by Malwarebytes as Backdoor.Agent.ENo
vamsoftXvamsoft.exeDetected by Trend Micro as WORM_AUTORUN.BKK and by Malwarebytes as Spyware.OnlineGamesNo
http://www.lienvandekelder.beXVan de Kelder Lien.exeDetected by Sophos as W32/Mytob-BFNo
vanXvan.exeDetected by Dr.Web as Trojan.DownLoader7.29256No
CCLWNERXvan.exeDetected by Malwarebytes as Backdoor.Agent.DC. The file is located in %System%\MSFRGHTNo
VanToMXVanToM.exeDetected by Intel Security/McAfee as RDN/Generic.bfr and by Malwarebytes as Backdoor.Agent.VTMNo
vantsysXvantsys.exeDetected by Malwarebytes as Trojan.Agent. The file is located in %System% - see hereNo
AppconUvAppCon.exeVital Application Console - part of POS-partner 2000 point-of-sale software that enables merchants in multiple industries to accept and process payments. Originally developed by Vital Processing Services. Taskbar icon enabled at startup by the "Auto-start when OS starts" option. Required for a connection to be establishedNo
SVCHOSTXvar.txt.exeDetected by Symantec as Infostealer.Ldpinch.C and by Malwarebytes as Backdoor.Bot.ENo
Microsoft Visual Studio VSAXvarpc32.exeAdded by a variant of the SPYBOT WORM!No
ChinagnqXvasdd.exeAdded by the SDBOT-SE WORM!No
VAIO Action Setup (Server)UVAServ.exeSony Vaio utility that auto-launches selected applications when you plug in a digital video camera, digital still camera, etc. via iLink (FireWire) or USBNo
audiodgXvaudiodg.exeDetected by Dr.Web as Trojan.DownLoader8.64398 and by Malwarebytes as Trojan.Agent.ADNo
RunOnceXVaultCmd.exeDetected by Intel Security/McAfee as RDN/Generic.dx!cmm and by Malwarebytes as Trojan.FakeMSNo
AntivirusXvav.exeVista Antivirus 2008 rogue security software - not recommended, removal instructions hereNo
vavezagorpidXvavezagorpid.exeDetected by Intel Security/McAfee as RDN/Generic BackDoor!ep and by Malwarebytes as Backdoor.BotNo
vazepotygiccXvazepotygicc.exeDetected by Intel Security/McAfee as BackDoor-FAGP!472F3B00A52A and by Malwarebytes as Trojan.Agent.USNo
vb6Xvb6.exeAdded by the MUGLY.D WORM!No
VersionBackupRunUVBackRun.exeVersionBackup - backup and archiving utilityNo
MALWAREBYTES ANTI-MALWAREXVbbs.exe.exeDetected by Intel Security/McAfee as RDN/Generic BackDoor!uq and by Malwarebytes as Backdoor.Messa.ENo
Windows UpdateXvbc.exeDetected by Malwarebytes as Backdoor.Agent.WU. Note - this is not the legitimate Visual Basic Compiler (vbc.exe) process which is typically located in %Windir%\Microsoft.NET\[various] or %Windir%\winsxs\[various]. This one is located in %AppData%\RestoreNo
SYSTEM RESTOREXvbc.exeDetected by Malwarebytes as Backdoor.Agent.E. Note - this is not the legitimate Visual Basic Compiler (vbc.exe) process which is typically located in %Windir%\Microsoft.NET\[various] or %Windir%\winsxs\[various]. This one is located in %UserTemp%\SYSTEM RESTORENo
Hardware KernelXvbc.exeDetected by Intel Security/McAfee as RDN/Generic.dx!cqv and by Malwarebytes as Backdoor.Agent.E. Note - this entry either replaces or loads the legitimate Visual Basic Compiler (vbc.exe) process which is located in %Windir%\Microsoft.NET\Framework\v2.0.50727. Which is the case is unknown at this timeNo
Windows FirewallXvbc.exeDetected by Intel Security/McAfee as RDN/Generic BackDoor!o and by Malwarebytes as Malware.Packer.VBRA. Note - this is not the legitimate Visual Basic Compiler (vbc.exe) process which is typically located in %Windir%\Microsoft.NET\[various] or %Windir%\winsxs\[various]. This one is located in %AppData%No
SystemXvbc.exeDetected by Malwarebytes as Backdoor.Agent.G. Note - this entry either replaces or loads the legitimate Visual Basic Compiler (vbc.exe) process which is located in %Windir%\Microsoft.NET\Framework\v2.0.50727. Which is the case is unknown at this timeNo
winrarXvbc.exeDetected by Malwarebytes as Trojan.Agent. Note - this is not a valid WinRAR entry and it is not the legitimate Visual Basic Compiler (vbc.exe) process which is typically located in %Windir%\Microsoft.NET\[various] or %Windir%\winsxs\[various]. This one is located in %AppData%No
winupdateXvbc.exeDetected by Intel Security/McAfee as RDN/Generic.bfr!ed and by Malwarebytes as Spyware.Passwords. Note - this is not the legitimate Visual Basic Compiler (vbc.exe) process which is typically located in %Windir%\Microsoft.NET\[various] or %Windir%\winsxs\[various]. This one is located in %AppData%\GoogleNo
winXvbc.exeDetected by Malwarebytes as Backdoor.Agent.G. Note - this entry either replaces or loads the legitimate Visual Basic Compiler (vbc.exe) process which is located in %Windir%\Microsoft.NET\Framework\v2.0.50727. Which is the case is unknown at this timeNo
HKLMXvbc.exeDetected by Intel Security/McAfee as Generic Dropper and by Malwarebytes as Backdoor.HMCPol.Gen. Note - this entry either replaces or loads the legitimate Visual Basic Compiler (vbc.exe) process which is located in %Windir%\Microsoft.NET\Framework\v2.0.50727. Which is the case is unknown at this timeNo
HDAudioPanelXvbc.exeDetected by Malwarebytes as Trojan.Agent.IMN. Note - this is not the legitimate Visual Basic Compiler (vbc.exe) process which is typically located in %Windir%\Microsoft.NET\[various] or %Windir%\winsxs\[various]. This one is located in %AppData%\HDAudioPanelNo
vbcXVbc.exeDetected by Malwarebytes as Backdoor.DarkKomet.Gen. Note - this is not the legitimate Visual Basic Compiler (vbc.exe) process which is typically located in %Windir%\Microsoft.NET\[various] or %Windir%\winsxs\[various]. This one is located in %AppData%No
vbcXvbc.exeDetected by Malwarebytes as Backdoor.DarkKomet.Gen. Note - this is not the legitimate Visual Basic Compiler (vbc.exe) process which is typically located in %Windir%\Microsoft.NET\[various] or %Windir%\winsxs\[various]. This one is located in %AppData%\vbcNo
vbcXvbc.exeDetected by Malwarebytes as Backdoor.DarkKomet.Gen. Note - this is not the legitimate Visual Basic Compiler (vbc.exe) process which is typically located in %Windir%\Microsoft.NET\[various] or %Windir%\winsxs\[various]. This one is located in %AppData%No
vbc.exeXvbc.exeDetected by Dr.Web as Trojan.Inject1.7086 and by Malwarebytes as Trojan.MSIL. Note - this is not the legitimate Visual Basic Compiler (vbc.exe) process which is typically located in %Windir%\Microsoft.NET\[various] or %Windir%\winsxs\[various]. This one is located in %UserStartup% and its presence there ensures it runs when Windows startsNo
vbc.exeXvbc.exeDetected by Malwarebytes as Backdoor.Messa.Gen. Note - this entry either replaces or loads the legitimate Visual Basic Compiler (vbc.exe) process which is located in %Windir%\Microsoft.NET\Framework\v2.0.50727. Which is the case is unknown at this timeNo
Microsoft FrameworkXvbc.exeDetected by Intel Security/McAfee as RDN/Autorun.worm!cw and by Malwarebytes as Trojan.Agent.MSGen. Note - this is not the legitimate Visual Basic Compiler (vbc.exe) process which is typically located in %Windir%\Microsoft.NET%\[various] or %Windir%\winsxs%\[various]. This one is located in %AppData%\MicrosoftNo
skypeupdaterXvbc.exeDetected by Malwarebytes as Trojan.Agent. Note - this is not a legitimate entry but it loads the legitimate Visual Basic Compiler (vbc.exe) process from %Windir%\Microsoft.NET\Framework\v4.0.30319 via the HKLM\Run and HKCU\Run keysNo
PoliciesXvbc.exeDetected by Intel Security/McAfee as Generic Dropper and by Malwarebytes as Backdoor.Agent.PGen. Note - this entry either replaces or loads the legitimate Visual Basic Compiler (vbc.exe) process which is located in %Windir%\Microsoft.NET\Framework\v2.0.50727. Which is the case is unknown at this timeNo
UPDAATEXvbc.exeDetected by Intel Security/McAfee as RDN/Generic BackDoor and by Malwarebytes as Trojan.Agent.LMTNo
NetWireXvbc.exeDetected by Intel Security/McAfee as RDN/Generic.bfr!fc and by Malwarebytes as Backdoor.Agent.E. Note - this entry either replaces or loads the legitimate Visual Basic Compiler (vbc.exe) process which is located in %Windir%\Microsoft.NET\Framework\v2.0.50727. Which is the case is unknown at this timeNo
HKCUXvbc.exeDetected by Intel Security/McAfee as Generic Dropper and by Malwarebytes as Backdoor.HMCPol.Gen. Note - this entry either replaces or loads the legitimate Visual Basic Compiler (vbc.exe) process which is located in %Windir%\Microsoft.NET\Framework\v2.0.50727. Which is the case is unknown at this timeNo
WIN_TKRXvbc.exeDetected by Malwarebytes as Backdoor.Messa. Note - this is not the legitimate Visual Basic Compiler (vbc.exe) process which is typically located in %Windir%\Microsoft.NET\[various] or %Windir%\winsxs\[various]. This one is located in %AppData%No
Key NameXVbc.scrDetected by Malwarebytes as Trojan.Agent. The file is located in %AppData%\MyFolderNo
Filename.exeXVbc.scrDetected by Dr.Web as Win32.HLLW.Ressdt.108 and by Malwarebytes as Trojan.Agent.FNGenNo
HDIntelUpdateXvbcc.exeDetected by Dr.Web as Trojan.DownLoader22.28049 and by Malwarebytes as Trojan.Agent.ENo
ShellXvbcc.exeDetected by Intel Security/McAfee as RDN/Generic.bfr and by Malwarebytes as Trojan.Agent.MTA. Note - this entry adds an illegal HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon "Shell" entry. The value data points to "vbcc.exe" (which is located in %AppData%\FolderName)No
VbchostXVbchost.exeDetected by Intel Security/McAfee as Ransom and by Malwarebytes as Backdoor.Agent.ENo
Microsoft UpdaterXvbcjlg.exeAdded by a variant of the SPYBOT WORM! See hereNo
Visual Basic Comand LineXvbcmd.exeDetected by Intel Security/McAfee as RDN/Generic.bfr!fs and by Malwarebytes as Backdoor.Agent.RMTNo
LOGSUPPORTXvbcmd.exeDetected by Intel Security/McAfee as RDN/Generic.bfr!fs and by Malwarebytes as Backdoor.Agent.RMTNo
MicroUpdateXvbconfig01.exeDetected by Intel Security/McAfee as RDN/Generic.dx and by Malwarebytes as Backdoor.Agent.DCNo
ShellXvbcs.exeDetected by Intel Security/McAfee as RDN/Autorun.worm.gen and by Malwarebytes as Trojan.Agent.MTA. Note - this entry adds an illegal HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon "Shell" entry. The value data points to "vbcs.exe" (which is located in %AppData%\FolderName)No
Volume Shadow ManagerXvbcsvc.exeAdded by a variant of the IRCBOT TROJAN! See hereNo
sdchosts32Xvbdd.exeAdded by the RANKY.AG TROJAN!No
Volume Shadow ConfigurationXvbmsvc.exeDetected by Microsoft as Worm:Win32/Slenfbot.DHNo
VbouncerDLXVBouncerInner.exeVirtual Bouncer - malware from Spyware Labs. It is distributed by the same bundling and drive-by download techniques as the parasites it claims to remove, so definitely qualifies as unsolicited commercial software in itself. It also has an update feature that can download and execute arbitrary code. Warning - choose "custom" uninstall as "automatic" may remove other programs - see hereNo
VbouncerDLXVbouncerInner[random digits].exeVirtual Bouncer - malware from Spyware Labs. It is distributed by the same bundling and drive-by download techniques as the parasites it claims to remove, so definitely qualifies as unsolicited commercial software in itself. It also has an update feature that can download and execute arbitrary code. Warning - choose "custom" uninstall as "automatic" may remove other programs - see hereNo
VBoxService.exeXVBoxService.exeDetected by Malwarebytes as Backdoor.Bot. Note - this is not the VirtualBox Guest Additions Service (VBoxService) which has the same filename and is normally located in %System%. This one is located in %AppData%No
VBoxTrayYVBoxTray.exePart of the VirtualBox virtual machine software from Oracle. Required for the guest services to work properlyNo
RestoreIT!YVBPTASK.EXERestoreIT! from FarStone - "automatically backs up all files on your computer to a protected partition on your hard drive"No
winconnXvbrun6nt.exeDetected by Sophos as W32/Agobot-AEINo
wincomXvbrun6win.exeDetected by Sophos as W32/Agobot-AFKNo
imxecsXvbrun70sp4.exeDetected by Trend Micro as WORM_AGOBOT.ALANo
ShellXvbs.exeDetected by Intel Security/McAfee as RDN/Generic BackDoor and by Malwarebytes as Trojan.Agent.MTA. Note - this entry adds an illegal HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon "Shell" entry. The value data points to "vbs.exe" (which is located in %AppData%\FolderName)No
Shop For RewardsUvbsprn.exeDetected by Malwarebytes as PUP.Optional.ShopForRewards. The file is located in %ProgramFiles%\Shop For Rewards. If bundled with another installer or not installed by choice then remove it, removal instructions hereNo
Windows Service AgentXvbsxkhk.exeDetected by Trend Micro as WORM_IRCBOT.AHX and by Malwarebytes as Backdoor.Bot. The file is located in %System%No
winupdate2846Xvbsystem35.exe msvbrun.exeAdded by the MUTIN-C TROJAN!No
winphonics7536Xvbsystem35.exe setups.exe vb.vbAdded by the MUTIN-C TROJAN!No
VBSysTrayYvbsystry.exeSystem Tray access to Vexira Antivirus from Central Command. The file is located in %ProgramFiles%\Vexira Antivirus\Professional\BinNo
VBSysTrayProfYvbsystry.exeSystem Tray access to Vexira Antivirus from Central Command. The file is located in %ProgramFiles%\Vexira Antivirus\Professional\BinNo
VBSysTrayProfYvbsystry.exeSystem Tray access to VirusBuster from VirusBuster Ltd. The file is located in %ProgramFiles%\VirusBuster\Professional\BinNo
VBS_AUTO_UPDATEXVBS_Update-0548656X.vbsDetected by Symantec as VBS.Gormlez@mmNo
idPncRhuZZKXVbZaHmY.exeDetected by Malwarebytes as Trojan.MSIL. The file is located in %AppData%No
Windows UpdateXVbZaHmY.exeDetected by Malwarebytes as Trojan.MSIL. The file is located in %AppData%No
ServiceXVbZaHmY.exeDetected by Malwarebytes as Trojan.MSIL. The file is located in %AppData%No
svchostXVbZaHmY.exeDetected by Malwarebytes as Backdoor.Bot.E. The file is located in %AppData%No
kos_earchupXVbZaHmY.exeDetected by Malwarebytes as Trojan.MSIL. The file is located in %AppData%No
Microsoft System UpdateXVbZaHmY.exeDetected by Malwarebytes as Trojan.MSIL. The file is located in %AppData%No
WinUpdateXVbZaHmY.exeDetected by Malwarebytes as Spyware.Passwords. The file is located in %AppData%No
bcmwls32.exeXVbZaHmY.exeDetected by Malwarebytes as Trojan.MSIL. The file is located in %AppData%No
GoogleUpdateXVbZaHmY.exeDetected by Malwarebytes as Trojan.Agent.IGen. The file is located in %AppData%No
Windows systemXVbZaHmY.exeDetected by Malwarebytes as Trojan.MSIL. The file is located in %AppData%No
IExplorer UtilXVbZaHmY.exeDetected by Malwarebytes as Trojan.MSIL. The file is located in %AppData%No
8e3bc91142bd8d798a10a1667ae4d2beXVbZaHmY.exeDetected by Malwarebytes as Trojan.MSIL. The file is located in %AppData%No
Driver Update ManagerXVbZaHmY.exeDetected by Malwarebytes as Trojan.MSIL. The file is located in %AppData%No
Windows Live FamilyXVbZaHmY.exeDetected by Malwarebytes as Trojan.MSIL. The file is located in %AppData%No
zxcxXvc.exeDetected by Intel Security/McAfee as RDN/Generic.dx and by Malwarebytes as Backdoor.Agent.E
loadXvc.exeDetected by Intel Security/McAfee as RDN/Generic.dx and by Malwarebytes as Backdoor.Agent.Gen. Note - this entry modifies the legitimate HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows "load" value data to include the file "vc.exe" (which is located in %System%\InstallDir) and also adds an illegal HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows "load" entry pointing to the same fileNo
xasXvc.exeDetected by Intel Security/McAfee as RDN/Generic.dx and by Malwarebytes as Backdoor.Agent.ENo
serverXvc.exeDetected by Intel Security/McAfee as RDN/Generic.dx and by Malwarebytes as Backdoor.AgentNo
winreg_32XVc030405.exeDetected by Sophos as Troj/Bancos-CTNo
VC10PlayNVC10Play.exeVirtual CD from H+H Software GmbH (was Microtest) - "creates images of your optical media, so you can use them at any time without having the physical medium on hand. You get maximum availability of your data, while lost, damaged and stolen media become a thing of the past." Version 10No
VC10PlayerNVC10Play.exeVirtual CD from H+H Software GmbH (was Microtest) - "creates images of your optical media, so you can use them at any time without having the physical medium on hand. You get maximum availability of your data, while lost, damaged and stolen media become a thing of the past." Version 10No
VC5PlayNVC5Play.exeVirtual CD from H+H Software GmbH (was Microtest) - "creates images of your optical media, so you can use them at any time without having the physical medium on hand. You get maximum availability of your data, while lost, damaged and stolen media become a thing of the past." Version 5No
VC5PlayerNVC5Play.exeVirtual CD from H+H Software GmbH (was Microtest) - "creates images of your optical media, so you can use them at any time without having the physical medium on hand. You get maximum availability of your data, while lost, damaged and stolen media become a thing of the past." Version 5No
VC6playNVC6Play.exeVirtual CD from H+H Software GmbH (was Microtest) - "creates images of your optical media, so you can use them at any time without having the physical medium on hand. You get maximum availability of your data, while lost, damaged and stolen media become a thing of the past." Version 6No
VC6playerNVC6Play.exeVirtual CD from H+H Software GmbH (was Microtest) - "creates images of your optical media, so you can use them at any time without having the physical medium on hand. You get maximum availability of your data, while lost, damaged and stolen media become a thing of the past." Version 6No
VC7PlayNVC7Play.exeVirtual CD from H+H Software GmbH (was Microtest) - "creates images of your optical media, so you can use them at any time without having the physical medium on hand. You get maximum availability of your data, while lost, damaged and stolen media become a thing of the past." Version 7No
VC7PlayerNVC7Play.exeVirtual CD from H+H Software GmbH (was Microtest) - "creates images of your optical media, so you can use them at any time without having the physical medium on hand. You get maximum availability of your data, while lost, damaged and stolen media become a thing of the past." Version 7No
VC8PlayNVC8Play.exeVirtual CD from H+H Software GmbH (was Microtest) - "creates images of your optical media, so you can use them at any time without having the physical medium on hand. You get maximum availability of your data, while lost, damaged and stolen media become a thing of the past." Version 8No
VC8PlayerNVC8Play.exeVirtual CD from H+H Software GmbH (was Microtest) - "creates images of your optical media, so you can use them at any time without having the physical medium on hand. You get maximum availability of your data, while lost, damaged and stolen media become a thing of the past." Version 8No
VC9PlayNVC9Play.exeVirtual CD from H+H Software GmbH (was Microtest) - "creates images of your optical media, so you can use them at any time without having the physical medium on hand. You get maximum availability of your data, while lost, damaged and stolen media become a thing of the past." Version 9No
VC9PlayerNVC9Play.exeVirtual CD from H+H Software GmbH (was Microtest) - "creates images of your optical media, so you can use them at any time without having the physical medium on hand. You get maximum availability of your data, while lost, damaged and stolen media become a thing of the past." Version 9No
loadXVcach.exeDetected by Malwarebytes as PUM.UserWLoad. Note - this entry modifies the legitimate HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows "load" value data to include the file "Vcach.exe" (which is located in %AppData%\Elements)No
HKLMXVcach.exeDetected by Malwarebytes as Backdoor.HMCPol.Gen. The file is located in %AppData%\ElementsNo
VcssXVcach.exeDetected by Malwarebytes as Backdoor.HMCPol.Gen. The file is located in %AppData%\ElementsNo
HKCUXVcach.exeDetected by Malwarebytes as Backdoor.HMCPol.Gen. The file is located in %AppData%\ElementsNo
vcastXvcast.exeDetected by Malwarebytes as Trojan.Agent.LNK. Note - this entry loads from the Windows Startup folder and the file is located in %AppData%\ZhostNo
VCatchXVcatch.exeDetected by Symantec as Adware.VCatch and by Malwarebytes as Spyware.VCatch. Antivirus product that displays pop-up advertisementsNo
VCatch PremiumXVCatchpre.exeVCatch - antivirus product that displays pop-up advertisementsNo
viruscatchXVCatchUp.exeVirusCatch rogue security software - not recommended, removal instructions hereNo
Zentom System GuardXvcc70dep2r.exeZentom System Guard rogue security software - not recommended, removal instructions hereNo
vcc70dep2r.exeXvcc70dep2r.exeZentom System Guard rogue security software - not recommended, removal instructions hereNo
CcleanerXvCcleaner.exeDetected by Malwarebytes as Trojan.Agent. Note - this is not a valid CCleaner file and it is located in %AppData%\CcleanerNo
CU1XVCClient.exeAssociated with the Surf Sidekick adware and should be removedNo
MonTestXvccxzq.exeDetected by Sophos as W32/Sdbot-EANo
VCDDaemonNVCDDaemon.exeVirtual CloneDrive from Elaborate Bytes AG - "works and behaves just like a physical CD/DVD drive, however it exists only virtually. Image files generated with CloneDVD or CloneCD can be mounted onto a virtual drive from your hard-disk or from a network drive and used in the same manner as inserting them into a normal CD/DVD drive." Loading times are significantly reduced as the virtual drive is much fasterNo
Virtual CloneDriveNVCDDaemon.exeVirtual CloneDrive from Elaborate Bytes AG - "works and behaves just like a physical CD/DVD drive, however it exists only virtually. Image files generated with CloneDVD or CloneCD can be mounted onto a virtual drive from your hard-disk or from a network drive and used in the same manner as inserting them into a normal CD/DVD drive." Loading times are significantly reduced as the virtual drive is much fasterNo
VirtualCloneDriveNVCDDaemon.exeVirtual CloneDrive from Elaborate Bytes AG - "works and behaves just like a physical CD/DVD drive, however it exists only virtually. Image files generated with CloneDVD or CloneCD can be mounted onto a virtual drive from your hard-disk or from a network drive and used in the same manner as inserting them into a normal CD/DVD drive." Loading times are significantly reduced as the virtual drive is much fasterNo
DLF_00000400NVcdlf.exeKnown to cause problems with "Out of memory" errors. Otherwise, it's purpose is unknownNo
DLF_00001000NVcdlf.exeKnown to cause problems with "Out of memory" errors. Otherwise, it's purpose is unknownNo
VCDPlayerNVCDPlay.exeVirtual CD from H+H Software GmbH (was Microtest) - "creates images of your optical media, so you can use them at any time without having the physical medium on hand. You get maximum availability of your data, while lost, damaged and stolen media become a thing of the past." Version 4No
VCDPlayerNVCDPlayer.exeVirtual CD from H+H Software GmbH (was Microtest) - "creates images of your optical media, so you can use them at any time without having the physical medium on hand. You get maximum availability of your data, while lost, damaged and stolen media become a thing of the past"No
vcdplayxNvcdplayx.exeCD emulation part of VirtualDrive from Farstone. Not required as starting VirtualDrive loads this automaticallyNo
VCDTowerUVCDTower.exeGoldensoft CD Ghost related - turns a computer into a 200X-speed CD-ROM tower. Working from the hard drive, users can simultaneously access as many as 23 virtual CD-ROM drives at a speed of 200X for true multitaskingNo
Compaq VideoCD WatcherNVCDWATCH.EXEMPEG viewer for Compaq PC's by VoyetraNo
keXIoXVcFf.exeDetected by Malwarebytes as Backdoor.Fynloski. The file is located in %AppData%No
enjoyXVcFf.exeDetected by Malwarebytes as Backdoor.Fynloski. The file is located in %UserTemp%No
CSAV_CheckVirusesYVCHK.EXEPart of Commtouch Command Antivirus (was Authentium, now Cyren)No
DarkComet RATXvchost.exeDetected by Malwarebytes as Backdoor.DarkComet.E. The file is located in %System%\microsoftNo
vclXvcl32.exeDetected by Intel Security/McAfee as BackDoor-DSANo
VClearMainXVClear.exeVClear rogue security software - not recommended, removal instructions hereNo
CU2XVCMain.exeAssociated with the Surf Sidekick adware and should be removedNo
vcmanagerstart.exeXvcmanagerstart.exeDetected by Malwarebytes as Rogue.K.VCmanager. The file is located in %ProgramFiles%\\vcmanagerNo
C:\WINDOWS\VCMnet11.exeXVCMnet11.exeWindows AFA Internet Enhancement - browser hijacker redirecting to adsourcecorp.com. Removal instructions hereNo
VCMnet11.exeXVCMnet11.exeWindows AFA Internet Enhancement - browser hijacker redirecting to adsourcecorp.com. Removal instructions hereNo
yyu45streamXvcomp.exeDetected by Dr.Web as Win32.HLLW.Autoruner2.10914 and by Malwarebytes as Worm.AutoRun.ENo
HKLMXvcosar.exeDetected by Malwarebytes as Backdoor.HMCPol.Gen. The file is located in %Windir%\InstallDirNo
HKCUXvcosar.exeDetected by Malwarebytes as Backdoor.HMCPol.Gen. The file is located in %Windir%\InstallDirNo
VCS HostXvcshost.exeDetected by Sophos as W32/Rbot-FKTNo
VCSPlayerNvcsplay.exeVirtual CD drive emulator. Available via Start → ProgramsNo
vcureXvcureU.exeVaccineCure rogue security software - not recommended. One of the OneScan family of rogue scanner programsNo
VAIOCameraUtilityUVCUServe.exeSony VAIO Camera Utility for the built-in webcam on their VAIO range of laptops. Required if you want to use the utility but not if you use the webcam in other programsNo
Windows UpdateXvcvhost.exeDetected by Sophos as W32/Agobot-PDNo
ffeqOMEXvcvsav.exeAdded by the RANKY.AB TROJAN!No
Microsoft OfficeXPXvcvsdf.exeAdded by the SDBOT-SF WORM!No
FixniceXvcvw.exeDetected by Symantec as Backdoor.SdbotNo
vsadminXvcw[3 letters].exeDetected by Malwarebytes as Trojan.FileCryptor.E. The file is located in %AppData%No
ms-helperXvcw[3 letters].exeDetected by Malwarebytes as Trojan.Agent.E. The file is located in %AppData%No
vssadmXvcw[3 letters].exeDetected by Malwarebytes as Trojan.FileCryptor.E. The file is located in %AppData%No
MSCONFIGXvcw[3 letters].exeDetected by Malwarebytes as Trojan.Agent.Gen. The file is located in %AppData%No
eset_avXvcw[3 letters].exeDetected by Malwarebytes as Ransom.TeslaCrypt. The file is located in %AppData%No
admvss_msXvcw[3 letters].exeDetected by Malwarebytes as Trojan.Agent. The file is located in %AppData% - see examples here and hereNo
helper_xgcvXvcw[3 letters].exeDetected by Malwarebytes as Trojan.FileCryptor.E. The file is located in %AppData%No
hlp_vXvcw[3 letters].exeDetected by Malwarebytes as Ransom.CryptoWall. The file is located in %AppData%No
MfqneqfebXvdddwq.exeAdded by the RANDEX.AP WORM!No
NvtrayXVDeck.exeDetected by Intel Security/McAfee as RDN/Generic.bfr and by Malwarebytes as Backdoor.Agent.NVTGenNo
HDAudDeckUVDeck.exeVia HD Audio Deck - audio control panel for motherboards with supported on-board VIA HD audio chipsetsNo
WinlognXVDeck.exeDetected by Intel Security/McAfee as RDN/Generic.bfr and by Malwarebytes as Backdoor.Agent.WNLNo
Data FileXvdehost.exeDetected by Sophos as Troj/Sdbot-DOSNo
SneakyUvdesk.exeSneaky Virtual Desktop by Bussell Network Development - 'allows users to have up to 32 desktops on their machine at once. Sneaky provides quick "hotkey" access between each, and will perfectly camouflage almost any application.' No longer supportedNo
Download ManagerUvdesk.exeSneaky Virtual Desktop by Bussell Network Development - 'allows users to have up to 32 desktops on their machine at once. Sneaky provides quick "hotkey" access between each, and will perfectly camouflage almost any application.' No longer supportedNo
Video DisplayXVDISP.EXEDetected by Sophos as W32/Agobot-KEYes
printerdrvXvdms.exeDetected by Trend Micro as TROJ_OPTIXKIL.30No
VdoctorXvdoctorp.exeVDoctor rogue security software - not recommended, removal instructions hereNo
Virus DoctorXVdoc[random].exeVirus Doctor rogue security software - not recommended, removal instructions hereNo
VDoctor ProfessionalXvdprop.exeVDoctorPro rogue security software - not recommended, removal instructions hereNo
DriversUpdateXvDriversUpdate.exeDetected by Malwarebytes as Trojan.MSIL. The file is located in %AppData%\DriversUpdateNo
VDTaskNVDTask.exeVirtualDrive from Farstone - virtual CD/DVD drive emulator. Available via Start → ProgramsNo
VirtualDriveNVDTask.exeVirtualDrive from Farstone - virtual CD/DVD drive emulator. Available via Start → ProgramsYes
veamedeqafqyXveamedeqafqy.exeDetected by Malwarebytes as Trojan.Agent.US. The file is located in %UserProfile%No
mxcllXvec.exeEco Antivirus rogue security software - not recommended, removal instructions here. Detected by Malwarebytes as Rogue.EcoAntiVirusNo
vefwanedqokuXvefwanedqoku.exeDetected by Malwarebytes as Trojan.Agent.US. The file is located in %UserProfile%No
veja_fotos.exeXveja_fotos.exeDetected by Sophos as Troj/Mdrop-FNo
MicrosoftXvejrufuv.exeDetected by Malwarebytes as Trojan.Agent.MSGen. The file is located in %AppData%\udbgdubbNo
WinRARXvejrufuv.exeDetected by Malwarebytes as Trojan.Downloader. The file is located in %AppData%\vsbibtcaNo
TrolltechXvejrufuv.exeDetected by Malwarebytes as Trojan.Banker.E. The file is located in %AppData%\swdbeadfNo
TrolltechXvejrufuv.exeDetected by Malwarebytes as Trojan.Inject. The file is located in %AppData%\tcbehvhhNo
eMailEncryptionUVELOZSYS.EXEeAcceleration Stop-Sign security software related - previously not recommended (see here). It has now been delisted, so make sure you have the latest version - hence the "U" recommendationNo
VengineYVEngine.exeSystem Tray access to, and notifications for the now discontinued Comodo Verification Engine from Comodo Group, Inc - which helps separate real web sites from fake to ensure that the site you're accessing is not trying to scam you or infect your PCNo
Venturi ConfiguratorUventcfg.exeVenturi Wireless mobile broadband configuration utilityYes
VeohUVeohClient.exeVeoh lets you share your video with other internet usersNo
VeohPluginNveohwebplayer.exeWeb player plug-in for the Veoh social content sharing siteNo
[random]Xver.exeAdded by the VERTEXBOT BACKDOOR!No
LMXver.exeDetected by Intel Security/McAfee as Generic BackDoor and by Malwarebytes as Backdoor.Agent.CMGenNo
CUXver.exeDetected by Intel Security/McAfee as Generic BackDoor and by Malwarebytes as Backdoor.Agent.CMGenNo
PLORERXver.exeDetected by Intel Security/McAfee as Generic BackDoor and by Malwarebytes as Backdoor.Agent.ENo
VERBATIM STORE 'N' GUverbatim store 'n' go.exeLoads the driver for the Verbatim Store'n'Go PRO USB Flash Drive - reportedly required only on systems running Windows 98 and MillenniumNo
wmplayerXvergon1885.exeAdded by the BRONTOK-DG WORM!No
wuserver.exeXverifgae.exeDetected by Dr.Web as Trojan.DownLoader8.24079 and by Malwarebytes as Trojan.Banker.GenNo
iSgmzey0u3aNnPtiUQ==Xverifier.exeDetected by Malwarebytes as Spyware.Zbot.ED. The file is located in %AppData%\Opera\Opera\pstorageNo
Veritas PatchXveritas.exeAdded by the RBOT-XT WORM!No
Verizon Online?Verizon Online.exeRelated to the Verizon Online ISP serviceNo
VerizonServicepoint.exeYVerizonServicepoint.exeVerizon Internet Security Suite tool installed when you choose to install their internet security suite - sourced by Radialpoint. Apart from downloading the suite installation files, the exact purpose is unknown at this time but it may be used to source critical updates and alerts so should therefore be left enabledNo
A Verizon AppUVERIZO~1.EXEPart of Verizon Online Support ManagerNo
VersatoUVersato.exe"Hot" button (such as volume and browser control) management and a CD player as supplied with QTronix (as possibly Micro Innovations) keyboardsNo
verseXverse.exeDetected by Sophos as W32/Stap-CNo
VersionXVersion.exeDetected by Symantec as Adware.JraunNo
version_startXversion.exeDetected by Dr.Web as Trojan.DownLoader9.29096 and by Malwarebytes as Trojan.Downloader.EYes
VersionBackupUVersionBackup.exeVersionBackup - backup and archiving utilityNo
HawkerUVersionControl.exeDetected by Malwarebytes as PUP.Optional.Hawker. The file is located in %ProgramFiles%\Hawker. If bundled with another installer or not installed by choice then remove itNo
AerojetUVersionControl.exeDetected by Malwarebytes as PUP.Optional.Aerojet. The file is located in %ProgramFiles%\Aerojet. If bundled with another installer or not installed by choice then remove it, removal instructions hereNo
NavigatorUVersionControl.exeDetected by Malwarebytes as PUP.Optional.Navigator. The file is located in %ProgramFiles%\Navigator. If bundled with another installer or not installed by choice then remove itNo
Adobe Version Cue CS2UVersionCueCS2Tray.exeExclusive feature of the Adobe Creative Suite until CS4, Version Cue™ helps you "find files fast, track versions across applications, link files together, and share them in creative collaboration without fear of overwriting someone else's work"No
Adobe_ID0EYTHMUVersionCueCS3Tray.exeExclusive feature of the Adobe Creative Suite until CS4, Version Cue™ helps you "find files fast, track versions across applications, link files together, and share them in creative collaboration without fear of overwriting someone else's work"No
Adobe_ID0ENQBOUVersionCueCS4Tray.exeExclusive feature of the Adobe Creative Suite until CS4, Version Cue™ helps you "find files fast, track versions across applications, link files together, and share them in creative collaboration without fear of overwriting someone else's work"No
AdobeVersionCueUVersionCueTray.exeExclusive feature of the Adobe Creative Suite until CS4, Version Cue™ helps you "find files fast, track versions across applications, link files together, and share them in creative collaboration without fear of overwriting someone else's work"No
Adobe_ID0ENQBOUVERSIO~2.EXEExclusive feature of the Adobe Creative Suite until CS4, Version Cue™ helps you "find files fast, track versions across applications, link files together, and share them in creative collaboration without fear of overwriting someone else's work"No
Adobe_ID0EYTHMUVERSIO~2.EXEExclusive feature of the Adobe Creative Suite until CS4, Version Cue™ helps you "find files fast, track versions across applications, link files together, and share them in creative collaboration without fear of overwriting someone else's work"No
VertragXVertrag.exeDetected by Intel Security/McAfee as RDN/Generic.bfr and by Malwarebytes as Backdoor.Agent.DCENo
ServerXVeryFun.exeDetected by Malwarebytes as Trojan.Agent.E. The file is located in %System%\drivers\fr-FRNo
Windows Version CheckNver_chk.exeVersion checker for CyberAudioLibrary - "a new way to exchange information through the Internet"No
vestingXvesting.exeDetected by Intel Security/McAfee as RDN/Generic.bfr!hp and by Malwarebytes as Trojan.Banker.ENo
Vet Start UpYvet32.exePart of Vet Antivirus and eTrust EZ Antivirus - earlier versions of the CA antivirus products. If set too aggressively this will slow down your system. There is no need to scan every file when accessed - check the scanning optionsNo
Vet Start UpYvet98.exePart of Vet Antivirus, eTrust EZ Antivirus and InoculateIT - earlier versions of the CA antivirus products. If set too aggressively this will slow down your system. There is no need to scan every file when accessed - check the scanning optionsNo
Vet AlertYVETMSG.EXEPart of Vet Antivirus and eTrust EZ Antivirus - earlier versions of the CA antivirus products. Displays on-screen notification messages when ever a virus is found. Runs as the VETMSGNT (VetMsg.exe) service in later product versionsNo
VetAlertYVETMSG.EXEPart of EZ Antivirus - part of the eTrust range of security products formerly available from CA but now discontinued. Available as a stand-alone product or as part of the EZ Armor suite. Displays on-screen notification messages when ever a virus is found. Runs as the VETMSGNT (VetMsg.exe) service in later product versionsNo
VetStartYvetmsg.exePart of earlier versions of CA Anti-Virus and EZ Antivirus from CA. Displays on-screen notification messages when ever a virus is found. Runs as the VETMSGNT (VetMsg.exe) service in later product versionsNo
Vet AlertYvetmsg9x.exePart of Vet Antivirus - an earlier version of the CA antivirus products. Displays on-screen notification messages when ever a virus is foundNo
VetoMailUVetoMail.exe"VetoMail completely protects your Outlook and Outlook Express in-boxes from incoming spam in under three minutes." No longer supported or available from the authorNo
VIRTEARNvetray.exeSensaura "Virtual Ear" software (which was available as an upgrade to users with supported sound cards - such as the Hercules Fortissimo II and Turtle Beach Santa Cruz) took user's through a series of listening tests and generated a custom HRTF library that replaced the standard normal library supplied with the sound card. No longer available once Sensaura were aquired by Creative Technology LtdNo
Windows DefenderXVetri.exeDetected by Dr.Web as Trojan.DownLoader5.3395 and by Malwarebytes as Trojan.Agent.GenNo
VetTrayUvettray.exeSystem Tray access to Vet Antivirus, eTrust EZ Antivirus and InoculateIT - earlier versions of the CA antivirus productsNo
veuixXveuix.exeAdded by the VBNA.AITT WORM!No
VentaDrvUvfdrv32.exeRelated to VentaFax Voice - send and receive black-and-white or color faxes, and turns your PC's fax modem into a versatile answering machineYes
EspTuXVFgt.exeDetected by Intel Security/McAfee as PWS-Banker.dldr!s and by Malwarebytes as Trojan.BankerNo
FlashPlayerPluginXvFlashPlayerPLugin_11_6_602_180.exeDetected by Dr.Web as Trojan.DownLoader8.17638No
MSService_v1.0Xvfp02.exeNewWeb adwareNo
priceXvfwhhydlr.exeDetected by Malwarebytes as Trojan.Agent.NRT. The file is located in %CommonFiles%\price0No
VFXDSys Compatibility SynchronisationXvfxdsys.exeAdded by the JNANABOT TROJAN!No
VirtuaGirlXVg.exeVirtuaGirl is a shareware program featuring scantily dressed girls on your desktop. They say hi in the morning, remind you of your appointments and dance for you on request... Detected by Intel Security/McAfee as Adware-VirtualGirlNo
vc2111ev5t1cXvg1c211vv12.exeDetected by Sophos as Troj/Wonton-RP and by Malwarebytes as Trojan.Agent.EDNo
TaskmanXVGA.exeDetected by Malwarebytes as Trojan.Agent.MWT. Note - this entry adds a HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon "Taskman" entry which loads the file "VGA.exe" (which is located in %AppData%\WindowsUpdate)No
loadXVGA.exeDetected by Malwarebytes as Backdoor.NetWiredRC. Note - this entry modifies the legitimate HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows "load" value data to include the file "VGA.exe" (which is located in %Temp%\NvidiaVGA, see here)No
Windows Update ManagerXVGA.exeDetected by Dr.Web as Trojan.Inject2.10471 and by Malwarebytes as Backdoor.Agent.WUNo
VGA StartupXvgacard.exeAdded by a variant of Backdoor:Win32/Rbot. The file is located in %System%No
VGA6 StartupXvgacard6.exeDetected by Trend Micro as WORM_RBOT.AUSNo
vgadriverXvgadriver.comDetected by Intel Security/McAfee as Generic.dx!b2h4 and by Malwarebytes as Trojan.BankerNo
Windows UpdateXVgaowd7.exeDetected by Malwarebytes as Trojan.Zapchast. The file is located in %AppData%No
!1_ProcessGuard_StartupXVgaowd7.exeDetected by Malwarebytes as Trojan.Zapchast. Note - this is not a legitimate DiamondCS ProcessGuard entry. The file is located in %AppData%No
ctfmon.exeXVgaowd7.exeDetected by Malwarebytes as Trojan.Zapchast. The file is located in %AppData%No
Application Layer Gateway serviceXVgaowd7.exeDetected by Malwarebytes as Backdoor.Agent. The file is located in %AppData%No
ASUS SmartDoctorUVGAProbe.exe"ASUS SmartDoctor is a group of special tools to help users make the most of their ASUS graphics cards. It monitors the Fan RPM, AGP Power Level, GPU and RAM temperature, and has a slide bar for easy manual overclocking"No
VGATuneXVGATune.exeDetected by Sophos as W32/Rbot-AWMNo
VirtuaGirl HDXvghd.exeVirtuaGirl is a shareware program featuring scantily dressed girls on your desktop. They say hi in the morning, remind you of your appointments and dance for you on request... Detected by Intel Security/McAfee as Adware-VirtualGirlNo
ghostXvghost.exeDetected by Intel Security/McAfee as RDN/Generic.dx and by Malwarebytes as Backdoor.Agent.GHGenNo
Ghostv3Xvghostv2.exeDetected by Intel Security/McAfee as RDN/Generic.grp!fg and by Malwarebytes as Backdoor.Agent.GHGenNo
ghostXvghostv3.exeDetected by Intel Security/McAfee as RDN/Generic.dx!ckp and by Malwarebytes as Backdoor.Agent.GHGenNo
userinitXvgkxvn.exeDetected by Intel Security/McAfee as Generic.bfr and by Malwarebytes as Trojan.AgentNo
GoogleUpdater.exeXvGoogleUpdater.exeDetected by Malwarebytes as Trojan.Agent. The file is located in %AppData%\GoogleUpdaterNo
vgtXvgt.exeDetected by Sophos as Dial/QDial20-B and by Malwarebytes as Trojan.DialerYes
vgTR0Y2sRLDW4zXvgTR0Y2sRLDW4z.exeDetected by Sophos as Mal/FakeAV-IKNo
TaskmanXvgwisb.exeDetected by Sophos as Mal/EncPk-AFU and by Malwarebytes as Worm.Palevo. Note - this entry adds a HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon "Taskman" entry which loads the file "vgwisb.exe" (which is located in %UserProfile%)No
Guard ProXVH339.exeGuard Pro rogue security software - not recommended, removal instructions hereNo
Default System ResearchXvhchost.exeAdded by the TARNO.I TROJAN!No
0KHHWERCV0Xvhe6spQ.exe.lnkDetected by Intel Security/McAfee as RDN/Generic BackDoor!ur and by Malwarebytes as Backdoor.Agent.ENo
VHMET549T1AR.exeXVHMET549T1AR.exeDetected by Malwarebytes as Trojan.Banker. The file is located in %LocalAppData%Yes
VHNaldsGWx.exeXVHNaldsGWx.exeDetected by Malwarebytes as Trojan.FakeAlert.3CH. The file is located in %AppData%No
VhostXVhost.exeDetected by Intel Security/McAfee as RDN/Generic Dropper!sj and by Malwarebytes as Backdoor.Agent.ENo
vhost32Xvhost32.exeDetected by Malwarebytes as Spyware.Agent.E. The file is located in %LocalAppData%\Microsoft vhost32No
Vhosts ProtectionXvhosts.exeAdded by an unidentified WORM or TROJAN!No
smsysXvi.exeAdult content dialerNo
VIANHIEKWHNYXVIANHIEKWHNY.exeDetected by Malwarebytes as Trojan.Agent. The file is located in %AppData%\VIANHIEKWHNYNo
vihunterXviAssist.exeVIHunter rogue security software - not recommended, removal instructions hereNo
ViberNViber.exe"Viber for Windows lets you send free messages and make free calls to other Viber users, on any device and network, in any country! Viber syncs your contacts, messages and call history with your mobile device"No
JzHJklNNXviber.exeDetected by Malwarebytes as Trojan.Agent.E. Note - this entry loads from the Windows Startup folder and the file is located in %AppData%\JBSrQ1Vb7No
vibzigsakurdXvibzigsakurd.exeDetected by Malwarebytes as Trojan.Agent.US. The file is located in %UserProfile% - see hereNo
vichost.exeXvichost.exeDetected by Dr.Web as Trojan.DownLoader9.38904 and by Malwarebytes as Trojan.Downloader.E. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows startsNo
vidNVid.exe"Logitech Vid™ is the fast, free and easy way to make a video call." Previously available as part of the Logitech Webcam Software or as a separate download but now discontinued with Logitech recommending Skype as a replacement. Run it manually when required unless you use it all the timeNo
Logitech VidNVid.exe"Logitech Vid™ is the fast, free and easy way to make a video call." Previously available as part of the Logitech Webcam Software or as a separate download but now discontinued with Logitech recommending Skype as a replacement. Run it manually when required unless you use it all the timeYes
Vid32cntlXvid32cntl.exeDetected by Trend Micro as TROJ_CRYPTER.ANo
VidaliaNVidalia.exeVidalia is a cross-platform GUI controller for the Tor anonymity package. Using Vidalia, you can start and stop Tor, view the status of Tor at a glance, and monitor Tor's bandwidth usageNo
VidcntlXvidcntl.exeDetected by Trend Micro as TROJ_CRYPTER.ANo
VidcompatXVidcompat.exeDetected by Symantec as Trojan.GemaNo
vidctrlXvidctrl.exeDelfin PromulGate adware variantNo
Vide0DriverXVide0.exeAdded by a variant of the VBKRYPT-AD TROJAN!No
Video DriverXVideo Driver.exeDetected by Malwarebytes as Backdoor.Agent.DC. The file is located in %Temp%\SysWOW64No
WindowsOSXVideo%E2%80%AEmp4.exeDetected by Malwarebytes as Trojan.Agent.WO. The file is located in %AppData%No
BVNSEUHJXvideo.exeDetected by Dr.Web as Trojan.MulDrop5.51011 and by Malwarebytes as Backdoor.Agent.GenNo
Windows ServiceXvideo.exeAdded by unidentified malware. The file is located in %System%No
[UserName]Xvideo.exeDetected by Malwarebytes as Backdoor.Agent.Gen. The file is located in %AppData%No
VideoXvideo.exeDetected by Malwarebytes as Backdoor.NetWiredRC. The file is located in %AppData%\InstallYes
KAYXvideo.exeDetected by Intel Security/McAfee as RDN/Generic.dx!d2g and by Malwarebytes as Trojan.Agent.KYNo
VideoCodecXvideo.exeDetected by Malwarebytes as Trojan.Agent. The file is located in %ProgramFiles%\VideoCodec - see hereNo
boombaXvideo.exeDetected by Dr.Web as Trojan.StartPage.51862 and by Malwarebytes as Trojan.BoombaNo
Hkcmd.exeXvideo.exeDetected by Malwarebytes as Backdoor.Agent.Gen. The file is located in %AppData%No
Windows ServiceXvideo2.exeAdded by the DOWNLOADER.SMALL.MY TROJAN!No
SpeedBitVideoAcceleratorNVideoAccelerator.exe"SpeedBit Video Accelerator makes videos from YouTube and over 150 sites stream faster and play smoother by reducing buffering problems and video interruptions or hiccups"No
VideoCallNVideoCall.exeLogitech VideoCall for Broadband - "a way for friends and family around the world to communicate over the Internet using fully integrated live video and audio. With a webcam, a broadband Internet connection, and the Logitech VideoCall for broadband software and service, people can not only talk to one another, but also see each other and share pictures"No
VideoCardXVideoCard.exeDetected by Dr.Web as Trojan.FakeAV.11616 and by Malwarebytes as Backdoor.Agent.ENo
VideocntlXVideocntl.exeDetected by Sophos as Troj/Crypter-E and by Total Defense as Win32.GemaNo
Video DriverXVideoDriver.exeAdded by a variant of the VBKRYPT-AD TROJAN!No
DriverScanXvideodriverm.exeDetected by Malwarebytes as Backdoor.Agent.E. The file is located in %AppData%\VideoDrivers - see hereNo
videodrivermanagerXvideodrivermanager.exeDetected by Malwarebytes as Backdoor.Messa. The file is located in %AppData%No
VideoDriverXvideodrv.exeDetected by Symantec as W32.Mimail.A@mm and by Malwarebytes as Trojan.MailerNo
videodrvXvideodrv.exeDetected by Symantec as Backdoor.Backtor and by Malwarebytes as Backdoor.Agent.VBTNo
Microsoft Video DriverXvideodrv.exeDetected by Sophos as W32/Sdbot-AGPNo
SECREAZXvideoFD.exeDetected by Intel Security/McAfee as RDN/Generic BackDoor!ss and by Malwarebytes as Backdoor.Agent.DCEGenNo
Videool32XVIDEOL32.EXEDetected by Trend Micro as WORM_AGOBOT.ECNo
Video Lan PlayerXVideoLanPlayer.exeDetected by Sophos as W32/Rbot-MYNo
Video ServicesXvideol_32.exeDetected by Sophos as W32/Agobot-DMYes
Video ManagerXvideomgr.exeAdded by the PANDEM.C WORM!No
Windows Video DriversXVIDEONS3.EXEDetected by Sophos as W32/Agobot-KZNo
Windows Video DriversXvideons32.exeAdded by the GAOBOT.AZT WORM!No
videopciXvideopci.exeDetected by Sophos as Troj/Agent-WNo
videoporno.exeXvideoporno.exePremium rate adult content dialerNo
VideoraNVideora.exeVideora Converter by Red Kawa "is a free video converter that converts video files, YouTube videos, movies and DVD's so you can play them on your video playing device"No
VideoraiPodConverterNVideoraiPodConverter.exeVideora iPod Converter by Red Kawa - "is a free iPod video converter that converts video files, YouTube videos, movies and DVD's so you can play them on your iPod"No
Win32 ConfigurationXvideosd32.exeDetected by Trend Micro as WORM_SDBOT.TT and by Malwarebytes as Backdoor.BotNo
MSVSyncXvideosync.exeAdded by a variant of the SPYBOT WORM!No
VIDEOS_DA_NET.exeXVIDEOS_DA_NET.exeDetected by Dr.Web as Trojan.Siggen6.17289 and by Malwarebytes as Trojan.Agent.VDGen. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows startsNo
videos_de_mais.exeXvideos_de_mais.exeDetected by Dr.Web as Trojan.Siggen6.18563 and by Malwarebytes as Trojan.Agent.VDGen. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows startsNo
VIDEOS_DO_YOUTUBE.exeXVIDEOS_DO_YOUTUBE.exeDetected by Dr.Web as Trojan.Click3.8030 and by Malwarebytes as Trojan.Agent.VDGen. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows startsNo
videos_do_youtube_engracados_005441.exeXvideos_do_youtube_engracados_005441.exeDetected by Dr.Web as Trojan.DownLoader10.50657 and by Malwarebytes as Trojan.Agent.VDGen. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows startsNo
VIDEOS_FACEBOOCK.exeXVIDEOS_FACEBOOCK.exeDetected by Dr.Web as Trojan.Click3.8393 and by Malwarebytes as Trojan.Agent.VDGen. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows startsNo
VIDEOS_FACEBOOCK_GOSTOSAS.exeXVIDEOS_FACEBOOCK_GOSTOSAS.exeDetected by Dr.Web as Trojan.Click3.8949 and by Malwarebytes as Trojan.Agent.VDGen. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows startsNo
VIDEOS_GOSTOSAS.exeXVIDEOS_GOSTOSAS.exeDetected by Dr.Web as Trojan.Click3.10097 and by Malwarebytes as Trojan.Agent.VDGen. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows startsNo
VIDEOS_HD.exeXVIDEOS_HD.exeDetected by Dr.Web as Trojan.Siggen6.7440 and by Malwarebytes as Trojan.Agent.VDGen. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows startsNo
VIDEOS_YOUTUBE.exeXVIDEOS_YOUTUBE.exeDetected by Dr.Web as Trojan.DownLoader10.58424 and by Malwarebytes as Trojan.Agent.VDGen. Note - the file is located in %UserStartup% and its presence here ensures it runs when Windows startsNo
VideotronSA.exeYVideotronSA.exeVidéotron Service Agent tool installed when you choose to install their internet security suite - sourced by Radialpoint. Apart from downloading the suite installation files, the exact purpose is unknown at this time but it may be used to source critical updates and alerts so should therefore be left enabledNo
videotwisterSAXvideotwisterSA.exeDetected by Malwarebytes as Adware.HotBar.CP. The file is located in %AppData%\videotwisterSA\bin\[version]No
videovideodanet93847.exeXvideovideodanet93847.exeDetected by Malwarebytes as Backdoor.Bot. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows startsNo
VideoWebCameraUVideoWebCamera.exeWebcam support for models from either Chicony or Suyin. Possibly used on Acer laptopsNo
NVIDIA Video driversXvideo_32D.exeAdded by the AGOBOT.KV WORM!No
NVIDIA Video driversXvideo_32sD.exeAdded by the RBOT-BB WORM!No
wuaclt.exeXvideo_tarjeta.comDetected by Kaspersky as Trojan.Win32.Buzus.gzhk and by Malwarebytes as Worm.AutoRun.ENo
Windows videoXvide_32.exeDetected by Trend Micro as WORM_AGOBOT.QANo
vidioXvidio.exeDetected by Malwarebytes as Trojan.Agent.DEUX. The file is located in %Temp%No
vidioXvidio.exeDetected by Dr.Web as Trojan.DownLoader13.51415 and by Malwarebytes as Trojan.Banker.VDNo
vidiomaxXvidiomax.exeDetected by Dr.Web as Trojan.DownLoader6.1090 and by Malwarebytes as Trojan.Agent.GenNo
vidmonXvidmon.exePromulGate adwareNo
vidshakeSAXvidshakeSA.exeDetected by Malwarebytes as Adware.HotBar.CP. The file is located in %LocalAppData%\vidshakeSA\bin\[version]No
ViesyqXviesyq.exeDetected by Malwarebytes as Spyware.Password. The file is located in %UserTemp%\BocouNo
vietato.exeXvietato.exeAdult content dialerNo
OrbitViewXview.exeXupiter OrbitExplorer toolbar related. Drive-by foistware. Use Malwarebytes, Spybot S&D, Ad-Aware or similar to detect and remove and to prevent it re-installing in the futureNo
HOT FIXXView.exeDetected by Trend Micro as TROJ_HUPIGON.JTY. The file is located in %System%No
ViewbarUViewbar.exeAgloco Viewbar is a small toolbar that rests on the bottom of your screen or browser window while you surf the Internet. The Viewbar software is what enables AGLOCO to collect the money you are earning while browsing the Internet". Get paid for browsing but you must consent to them collecting your personal informationNo
runreperXviewer.exeAdded by the REPER.A VIRUS!No
ViewMgrNViewMgr.exeViewpoint Manager - automatic updates for ViewPoint products such as ViewPoint Media Player (as bundled with AOL, AOL Instant Messenger, Compuserve, etc). Can be run manually via Start → Settings → Control Panel by enabling auto-updates temporarily, re-booting and then disabling again. Not recommended as Viewpoint Manager is considered as foistware instead of malware since it is installed without users approval but doesn't spy or do anything "bad". This may have changed - read this articleNo
Microsoft Viewer Monitor ManagerXviewmon.exeAdded by the XPAK.A TROJAN!No
HydraVisionViewportUviewport.exePart of HYDRAVISION - ATI's software for managing multiple displays and virtual desktops. This is HYDRAVISION MultiDesk - which "creates, organizes and arranges up to nine active multi-monitor desktop combinations and allows you to cycle between them with a mouse." There is an optional System Tray icon or a hotkey can be configured to cycle through the desktopsNo
ViewSizeWin32XViewSizeWin32.exeDetected by Intel Security/McAfee as PWS-Banker and by Malwarebytes as Trojan.Banker.ENo
Restart_VS?Viewsonic.exeCould be a left-over from the installation of a Viewsonic flat panel displayNo
ViGlanceUViGlance.exeViGlance (Windows 7 SuperBar for XP) adds a Windows 7 style SuperBar for Windows XP users and can be loaded at boot time or started manuallyNo
VIHUNTERMainXVIHunter.exeVIHunter rogue security software - not recommended, removal instructions hereNo
ViivMonitorUViivMonitor.exeRelated to Intel Media Share Software. "Stream or download media files from your Intel® Core®2 Processor with Viiv® technology-based PC"No
VikingsScreenServerUVikingsScreenServer.exeScreensaver for the Minnesota Vikings NFL football team - part of Sports Illustrated's MySI desktop download (by MercurySports Network) for streaming information on NFL football teams. No longer supportedNo
vindictiveme.vbsXvindictiveme.vbsDetected by Malwarebytes as Spyware.Pony. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows startsNo
ViOrbUViOrb.exeViOrb (Vista Start Button for XP) adds a Vista style Start Button for Windows XP users and can be loaded at boot time or started manuallyNo
Vioxovwinktqugkr.exeXVioxovwinktqugkr.exeDetected by Malwarebytes as Trojan.MSIL. The file is located in %AppData%No
VIP Organizer.exeUVIP Organizer.exeVIP Organizer by VIP Quality Software, Ltd - "is a personal time and task management software to organize your home and office. It is a powerful organizer tool which helps you to organize everything in a to-do list and track progress of your personal and business tasks"No
VIP Simple To Do ListUVIP Simple To Do List.exeVIP Simple To Do List by VIP Quality Software, Ltd - "is an easy tool for planning of your daily life. The program lets everyone who wants to stop wasting time and bring life in order quickly manage everyday tasks with help of prioritized to-do list"Yes
VIP Task Manager ProfessionalUVIP Task Manager Professional.exeVIP Task Manager by VIP Quality Software, Ltd - "is a client/server software for workgroup collaboration and task management by multiple users with simultaneous access to the common database through Local Network (LAN) and Low Speed Network. It allows authorized users to plan, schedule, share, track and report tasks, appointments, projects, and any company activities"No
VIP Team To Do List.exeUVIP Team To Do List.exeVIP Team To Do List by VIP Quality Software, Ltd - "is a professional time and task management software for small and midsize business. It enables team leaders to create, manage and send to do lists to team members by e-mail. It is a best tool for planning and tracking progress of team tasks"No
vipantispywareXvipantispyware.exeVipAntiSpyware rogue spyware remover - not recommendedNo
ViPcss.exeXViPcss.exeDetected by Dr.Web as Trojan.Siggen6.35405 and by Malwarebytes as Backdoor.Agent.E. Note - the file is located in %AllUsersStartup% and its presence there ensures it runs when Windows startsNo
TrayPlayXViper7Detected by Intel Security/McAfee as RDN/Generic.tfr!bv and by Malwarebytes as Trojan.BankerNo
viqigwazijulXviqigwazijul.exeDetected by Intel Security/McAfee as RDN/Downloader.a!rj and by Malwarebytes as Trojan.Agent.USNo
viqonvoldybeXviqonvoldybe.exeDetected by Dr.Web as Trojan.DownLoader10.2060 and by Malwarebytes as Trojan.Agent.USNo
Virgin Media HUBYVirginMediaHUB.exeVirgin Media HUB tool installed when you choose to install their Virgin Media internet security suite - sourced by Radialpoint. Apart from downloading the suite installation files, the exact purpose is unknown at this time but it may be used to source critical updates and alerts so should therefore be left enabledNo
VirginMediaHUBYVirginMediaHUB.exeVirgin Media HUB tool installed when you choose to install their Virgin Media internet security suite - sourced by Radialpoint. Apart from downloading the suite installation files, the exact purpose is unknown at this time but it may be used to source critical updates and alerts so should therefore be left enabledNo
VirginMediaHUB.exeYVirginMediaHUB.exeVirgin Media HUB tool installed when you choose to install their Virgin Media internet security suite - sourced by Radialpoint. Apart from downloading the suite installation files, the exact purpose is unknown at this time but it may be used to source critical updates and alerts so should therefore be left enabledNo
AntiVirus ProcessXvirprot.exeAdded by a variant of the SDBOT BACKDOOR!No
VirRL2009XVirRL2009.exeVirusResponse Lab 2009 rogue security software - not recommendedNo
Virus ScanXvirscana.exeAdded by an unidentified VIRUS, WORM or TROJAN!No
ViRsLabXViRsLab.exeVirusResponse Lab 2009 rogue security software - not recommendedNo
Virt.exeXVirt.exeDetected by Sophos as Troj/Remadm-CNo
LenovoAutoScrollUtilityUvirtscrl.exeUtility found on some Lenovo notebooks which pushes partially off-screen windows back on-screen if you push the cursor against the edge where the window is situatedNo
VirtuaGirl2XVirtuaGirl2.exeVirtuaGirl is a shareware program featuring scantily dressed girls on your desktop. They say hi in the morning, remind you of your appointments and dance for you on request... Detected by Intel Security/McAfee as Adware-VirtualGirlNo
VBouncerXVirtualBouncer.exeVirtual Bouncer - malware from Spyware Labs. It is distributed by the same bundling and drive-by download techniques as the parasites it claims to remove, so definitely qualifies as unsolicited commercial software in itself. It also has an update feature that can download and execute arbitrary code. Warning - choose "custom" uninstall as "automatic" may remove other programs - see hereNo
Virtual BouncerXVirtualBouncer.exeVirtual Bouncer - malware from Spyware Labs. It is distributed by the same bundling and drive-by download techniques as the parasites it claims to remove, so definitely qualifies as unsolicited commercial software in itself. It also has an update feature that can download and execute arbitrary code. Warning - choose "custom" uninstall as "automatic" may remove other programs - see hereNo
Virtual DimensionUVirtualDimension.exeVirtual Dimension by Typz - "a free, fast, and feature-full virtual desktop manager for Windows platform"No
VirtualDimension.exeUVirtualDimension.exeVirtual Dimension by Typz - "a free, fast, and feature-full virtual desktop manager for Windows platform"No
CLVirtualDriveNVirtualDrive.exevirtual CD/DVD drive emulator part of CyberLink's Pwoer2GoNo
CLVirtualDrive9NVirtualDrive9.exevirtual CD/DVD drive emulator part of CyberLink's Pwoer2GoNo
VirtualExpanderUVirtualExpander.exeMicro Vault Virtual Expander from Sony for their range of USB memory sticks. This software will compress your data to virtually store about 3 times as much dataYes
MSN UPDATERSXvirtualmemory.exeDetected by Sophos as W32/Rbot-JKNo
VirtualStoreUpdateXVirtualStoreupdt32.exeDetected by Malwarebytes as Trojan.SHarpro.Pgen. The file is located in %LocalAppData%\VirtualStore\VirtualStoreUpdateNo
VirtualVaccineXVirtualVaccine.exeVirtualVaccine rogue security software - not recommended, removal instructions hereNo
VirtuaReminderUVirtuaReminder.exeVirtuaReminder by Nopo Software - "is a small and convenient tool allowing the user to create reminders for such things as important appointments, birthdays, and so on"No
System4224411XVirusDetected by Trend Micro as TROJ_CAGER.ANo
LoadServiceXVirusDetected by Trend Micro as TROJ_CAGER.ANo
DenecaXVirus salvadoAdded by the DELUZ VIRUS!No
Virus-BurstXVirus-Burst.exeVirusBurst rogue security software - not recommended, removal instructions hereNo
Virus-BurstersXvirus-bursters.exeVirusBursters rogue security software - not recommended, removal instructions hereNo
Sistray32Xvirus.exeDetected by Sophos as Troj/Tometa-C and by Malwarebytes as Worm.AutoRunNo
Virus.exeXVirus.exeDetected by Intel Security/McAfee as RDN/Generic PWS.y!ty and by Malwarebytes as Backdoor.Agent.E. The file is located in %UserStartup% and its presence there ensures it runs when Windows startsNo
Virus2ByeXVirus2ByeLaunch.exeVirusBye rogue security software - not recommended, removal instructions hereNo
VirusBlastXVirusBlast.exeVirusBlast rogue security software - not recommended, removal instructions hereNo
VirusBurstXVirusBurst.exeVirusBurst rogue security software - not recommended, removal instructions hereNo
VirusBursterXVirusBurster.exeVirusBursters rogue security software - not recommended, removal instructions hereNo
VirusBurstersXvirusbursters.exeVirusBursters rogue security software - not recommended, removal instructions hereNo
virusbyeXvirusbyeUpdater.exeVirusBye rogue security software - not recommendedNo
VirusCureMainXVirusCure.exeVirusCure rogue security software - not recommended, removal instructions hereNo
VirusHeal 3.7XVirusHeal 3.7.exeVirusHeal rogue security software - not recommended, removal instructions hereNo
VirusHeal 3.8XVirusHeal 3.8.exeVirusHeal rogue security software - not recommended, removal instructions hereNo
VirusHeal 3.9XVirusHeal 3.9.exeVirusHeal rogue security software - not recommended, removal instructions hereNo
VirusHeal 4.1XVirusHeal 4.1.exeVirusHeal rogue security software - not recommended, removal instructions hereNo
VirusHeat 3.9XVirusHeat 3.9.exeVirusHeat rogue security software - not recommended, removal instructions hereNo
VirusHeat 4.3XVirusHeat 4.3.exeVirusHeat rogue security software - not recommended, removal instructions hereNo
VirusHeat 4.4XVirusHeat 4.4.exeVirusHeat rogue security software - not recommended, removal instructions hereNo
VirusIsolatorXVirusIsolatorVirusIsolator rogue security software - not recommended, removal instructions hereNo
VirusIsolator.exeXVirusIsolator.exeVirusIsolator rogue security software - not recommended, removal instructions hereNo
VirusKeeperUVirusKeeper.exeVirusKeeper uses a powerful real-time threat detection engineNo
NVirusKoreaXVirusKoreaLaunch.exeVirusKorea rogue security software - not recommended, removal instructions hereNo
VirusLockMainXVirusLock.exeVirusLock rogue security software - not recommended, removal instructions hereNo
VirusLockerXVirusLocker.exeVirusLocker rogue security software - not recommended, removal instructions hereNo
VirusMakerUpdateXVirusMaker.exeDetected by Dr.Web as Trojan.MulDrop5.23117 and by Malwarebytes as Trojan.Agent.ENo
VirusProtect 3.8XVirusProtect 3.8.exeVirusProtect Pro rogue security software - not recommended, removal instructions hereNo
VirusProtect 3.9XVirusProtect 3.9.exeVirusProtect Pro rogue security software - not recommended, removal instructions hereNo
VirusProtectPro 3.3XVirusProtectPro 3.3.exeVirusProtect Pro rogue security software - not recommended, removal instructions here. Detected by Malwarebytes as Rogue.VirusProtectProNo
VirusProtectPro 3.4XVirusProtectPro 3.4.exeVirusProtect Pro rogue security software - not recommended, removal instructions here. Detected by Malwarebytes as Rogue.VirusProtectProNo
VirusProtectPro 3.5XVirusProtectPro 3.5.exeVirusProtect Pro rogue security software - not recommended, removal instructions here. Detected by Malwarebytes as Rogue.VirusProtectProNo
VirusProtectPro 3.6XVirusProtectPro 3.6.exeVirusProtect Pro rogue security software - not recommended, removal instructions here. Detected by Malwarebytes as Rogue.VirusProtectProNo
VirusProtectPro 3.7XVirusProtectPro 3.7.exeVirusProtect Pro rogue security software - not recommended, removal instructions here. Detected by Malwarebytes as Rogue.VirusProtectProNo
VirusRangerXVirusRanger.exeVirusRanger rogue security software - not recommendedNo
VirusRay 3.8XVirusRay 3.8.exeVirusRay rogue security software - not recommended, removal instructions hereNo
VirusRay 3.7XVirusRay.exeVirusRay rogue security software - not recommended, removal instructions hereNo
Virus Remover ProfesionalXvirusremover.exeVirus Remover Profesional rogue security software - not recommended, removal instructions hereNo
VirusRescueXVirusRescue.exeVirusRescue rogue security software - not recommendedNo
VirusResponseLab2009XVirusResponseLab2009.exeVirusResponse Lab 2009 rogue security software - not recommended, removal instructions hereNo
VirusRL2009XVirusRL2009.exeVirusResponse Lab 2009 rogue security software - not recommendedNo
VirusScanXvirusscanp.exeVirusScan rogue security software - not recommended, removal instructions hereNo
VirusSecurityMainXVirusSecurity.exeVirusSecurity rogue security software - not recommended, removal instructions hereNo
VirusTriggerBinXVirusTriggerBin.exeVirus Trigger rogue security software - not recommended, removal instructions hereNo
olmadэXvirusumbenim.exeDetected by Dr.Web as Trojan.PWS.Spy.8778 and by Malwarebytes as Trojan.Agent.ENo
keylogirXvirusumbenim.exeDetected by Kaspersky as Trojan.PWS.Spy.8778No
VirusVaccineXVirusVaccineLaunch.exeDetected by Malwarebytes as Rogue.VirusVaccine. The file is located in %ProgramFiles%\VirusvaccineNo
Virus_ScannerXVirus_Cleaner.exeDetected by Symantec as W32.Panol@mmNo
Anti-phishing Domain AdvisorYvisicom_antiphishing.exeAnti-phishing Domain Advisor by Visicom Media (and powered by Panda Security) - 'ensures you navigate the Web safely by protecting you from "phishing sites" (copycats of legitimate sites that steal your personal info) or "malware sites" designed to harm your computer'No
visinXvisin.exeLmir.1DB8!pws spywareNo
MicrosoftVisionXvision.exeDetected by Intel Security/McAfee as Generic BackDoor!fqq and by Malwarebytes as Backdoor.Agent.DCNo
userinitXvision.exeDetected by Kaspersky as Trojan.Win32.VBKrypt.epc and by Malwarebytes as Trojan.AgentNo
visionGSNvisiongs.exevisionGS webcam software by bluepath GmbHYes
ViSploreUViSplore.exeViSplore (Glass Browser for XP) adds a Vista style file browser for Windows XP usersNo
vistaXvista.exeDetected by Panda as Banetmex.A. The file is located in %Windir%No
vistaXvista.exeDetected by Kaspersky as IM-Worm.Win32.VB.sl and by Malwarebytes as Worm.IM. The file is located in %Windir%\systemYes
VistaUpgradeXvista.exeAdded by the AUTORUN-KQ WORM!No
LoveHebeAXvistaAA.exeAdded by the LOZAVITA TROJAN!No
VistaDriveXVistaDrive.exeVistaDrive malwareYes
VistaIconYVistaDrv.exeVista Drive Icon - 'changes the drive icons shown in Windows "My Computer", to a nearly Vista drive icon, showing the drive's free space with a smooth colored horizontal bar'No
PaintDotNetXVistaDrv.exeDetected by Malwarebytes as Backdoor.Agent. The file is located in %CommonAppData%No
VistaFirewallControlYVistaFirewallControl.exeVista Firewall Control from Sphinx Software (forerunner to Windows 7 Firewall Control) - "Protects your applications from undesirable network incoming and outgoing activity, controls applications internet access. Allows you to control personal information leakage via controlling application network traffic"No
LogoVistaXVistalogo[7.0.jpg].exeAdded by the AUTORUN-IG WORM!No
ViStartUViStart.exeViStart (Vista Start Menu for XP) adds a Vista style Start Menu for Windows XP users and can be loaded at boot time or started manuallyNo
ViStart - The Vista Start MenuUViStart.exeViStart (Vista Start Menu for XP) adds a Vista style Start Menu for Windows XP users and can be loaded at boot time or started manuallyNo
Vista Start menuUVistaStartMenu.exe"Vista Start Menu is the convenient alternative to the plain Start menu you find in Windows XP and Windows Vista". You have the option to either replace standard Start Menu or run it independently and can load at boot time or run it manuallyNo
VistaStartMenuUVistaStartMenu.exe"Vista Start Menu is the convenient alternative to the plain Start menu you find in Windows XP and Windows Vista". You have the option to either replace standard Start Menu or run it independently and can load at boot time or run it manuallyNo
VistaUpgradeXvistaupgrade.exeDetected by Sophos as W32/Stration-AXNo
Windows Explorer ControlerXVistaXPUpgrade.exeDetected by Intel Security/McAfee as Generic Downloader.a and by Malwarebytes as Trojan.AgentNo
Windows Explorer ControlerXVistaXPUpgradeNT5.exeDetected by Kaspersky as Trojan-Downloader.Win32.Dadobra.dxs and by Malwarebytes as Trojan.Agent. The file is located in %Windir%No
(Default)XVisthAux.comDetected by Malwarebytes as Trojan.Banker. Note - this malware actually changes the value data of the "(Default)" key in HKCU\Run in order to force Windows to launch it at boot. The name field in MSConfig may be blank and the file is located in %UserTemp%No
VISTION_###.exeXVISTION_###.exeDetected by Malwarebytes as Backdoor.Agent.E. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows starts - see an example hereNo
Visual Basic Compiler.exeXVisual Basic Compiler.exeDetected by Intel Security/McAfee as Generic.dx and by Malwarebytes as Trojan.MSIL. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows startsNo
MyPlayerXvisual.exeDetected by Malwarebytes as Trojan.Agent. The file is located in %ProgramFiles%\MyPlayerNo
VisualGayAdvance.exeXVisualGayAdvance.exeDetected by Sophos as W32/AutoRun-CT and by Malwarebytes as Worm.AutoRun. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows startsNo
NetDyXVisualGuard.exeAdded by the NETSKY.N or NETSKY.W WORMS!No
HKLMXvisualizador de fotos do windows.exeDetected by Malwarebytes as Backdoor.HMCPol.Gen. The file is located in %System%\microsoftNo
PoliciesXvisualizador de fotos do windows.exeDetected by Malwarebytes as Backdoor.Agent.PGen. The file is located in %System%\microsoftNo
HKCUXvisualizador de fotos do windows.exeDetected by Malwarebytes as Backdoor.HMCPol.Gen. The file is located in %System%\microsoftNo
regXVisualMedia.exeDetected by Dr.Web as Trojan.Inject1.32282 and by Malwarebytes as Trojan.Agent.ENo
editXVisualMedia.exeDetected by Dr.Web as Trojan.Inject1.32282 and by Malwarebytes as Trojan.Agent.ENo
VisualTaskTipsUVisualTaskTips.exe"Visual Task Tips by Sergey - "is a lightweight shell enhancement utility. It provides thumbnail preview image for each task in the Windows Taskbar"No
VisualTooltipUVisualToolTip.exeVisual Tooltip from Chris'n'Soft - "makes it possible to show a thumbnail of a window by putting the mouse cursor over a button of the taskbar"No
MicrosoftXvitalprocess.exeDetected by Malwarebytes as Backdoor.HMCPol.Gen. The file is located in %System%\installNo
VitaVaccineXVitaVaccine.exeVitaVaccine rogue security software - not recommended, removal instructions hereNo
VityXvity.exeDetected by Malwarebytes as Trojan.Ransom.Foreign. The file is located in %AppData%\WoetuNo
viueqXviueq.exeAdded by the VOBFUS.CF WORM!No
VividGalutXVividGalut.exeAdult content related web downloaderYes
ViwkwfXViwkwf.exeDetected by Malwarebytes as Worm.Dorkbot.ai. The file is located in %AppData%Yes
Windows Video InputXviwsvc.exeDetected by Microsoft as Worm:Win32/Slenfbot.GSNo
vixXvix.exeDetected by Sophos as Troj/Limitles-E and by Malwarebytes as Trojan.Agent.SBFGenYes
viY83QaQ.exeXviY83QaQ.exeDetected by Intel Security/McAfee as Generic.dx and by Malwarebytes as Trojan.Agent.RNSYes
loadNvi_grm.exeMonitor drivers for Trio2x/3x based video cards - displays control panel for quick access to display settings. Note - this entry loads from the "load=" section of WIN.INI (in %Windir%) on Win9x/Me and the file is located in %Root%\[folder]No
VJWDriverXVJ WDriver.lnkDetected by Malwarebytes as Trojan.Agent.VJW. The file is located in %UserTemp%\VJWDriverYes
StartupXvjavaw.exeDetected by Dr.Web as Trojan.DownLoader9.1704No
djdsdvqwaXvjdhdg.exeDetected by Sophos as Troj/Sdbot-EFNo
Configuration Telephony Removal ProxyXvjepgudpo.exeDetected by Dr.Web as Trojan.Click2.44562 and by Malwarebytes as Trojan.AgentNo
Security CenterXvk-golosa.exeDetected by Malwarebytes as Trojan.Agent.SCGen. The file is located in %AppData%\SystemNo
MicroUpdateXvk.exeDetected by Malwarebytes as Backdoor.Agent.DCEGen. The file is located in %AppData%\MSDCSC - see hereNo
Mozilla Firefox Check 8.0.1Xvk1hlun.exeDetected by Intel Security/McAfee as Generic Downloader.x!ggs and by Malwarebytes as Backdoor.WPMNo
Virtuele KatjaUVKatja.exeVirtuele Katja - have an attractive moviestar parade on your Desktop and help you search the Dutch "Gouden Gids" business directory too...No
vkhack-daemonXvkhack-daemon.exeDetected by Dr.Web as Trojan.Click2.62867 and by Malwarebytes as HackTool.AgentYes
IseUIYvkise.exeIncluded with COMODO Cloud Antivirus. "You will be protected from man in the middle attacks on websites where you use sensitive information to do banking or online shopping" - see hereYes
VkmusicdownloaderXVkmusicdownloader.exeDetected by Malwarebytes as Trojan.Downloader.VK. The file is located in %LocalAppData%\Microsoft\Windows - see hereYes
VkontakteDJUVkontakteDJ.exeDetected by Malwarebytes as PUP.Optional.VkontakteDJ. The file is located in %CommonAppData%\VkontakteDJ. If bundled with another installer or not installed by choice then remove it, removal instructions hereYes
VKSaverNVKSaver.exeVKSaver is a small application that allows you to download media files (audio and video) from the Russian social network service VKontakteYes
VkwkwfXVkwkwf.exeDetected by Malwarebytes as Backdoor.Bot. The file is located in %AppData%\MicrosoftYes
vl32Xvl32.exeDetected by Dr.Web as Trojan.DownLoader9.10878No
vlayerXvlayer.exeDetected by Malwarebytes as Trojan.Agent.E. The file is located in %AllUsersProfile%No
Hobbyist Software VLC StreamerUVLC Streamer Configuration.exeVLC Streamer helper by Hobbyist Software - streams movies from your computer over your Wi-Fi to your iPhone, iPod, iPad or Android mobile device - based upon the open source VLC media playerNo
Vlc UpdateXVlc Update.exeDetected by Dr.Web as Trojan.DownLoader10.30984 and by Malwarebytes as Trojan.AgentNo
Vlc Update.exeXVlc Update.exeDetected by Dr.Web as Trojan.DownLoader10.30984 and by Malwarebytes as Trojan.Agent. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows startsNo
vlcXvlc.exeDetected by Intel Security/McAfee as Generic MSIL.r and by Malwarebytes as Backdoor.BotNo
MicroUpdateXvlc.exeDetected by Intel Security/McAfee as RDN/Generic.bfr and by Malwarebytes as Backdoor.Agent.DCENo
Internet ExplorerXvlcas.exeDetected by Trend Micro as TROJ_SCAR.QL and by Malwarebytes as Trojan.FakeAlertNo
VLCMediaPlayerV2XVLCMediaPlayer.exeDetected by Malwarebytes as Backdoor.SpyNet. The file is located in %AppData%\installNo
VLC HelperXvlc_32.exeDetected by Malwarebytes as Trojan.MSIL. The file is located in %CommonAppData%No
li-rcash00001Xvldial.exeAdult content dialer. The file is located in %ProgramFiles%\WebdialerNo
TaskhostsXvLmtHfRQ.exeDetected by Intel Security/McAfee as RDN/Ransom!ek and by Malwarebytes as Trojan.Agent.TSKGenNo
Smart Alerts Transaction Key Link ModulesXvlnmubmm.exeDetected by Malwarebytes as Trojan.Agent. The file is located in %AppData%\ulampxkad - see hereNo
ComSpecXVLOBPULQ.exeDetected by Sophos as Troj/Agent-NZONo
WinupdateXvloK.exeDetected by Malwarebytes as Spyware.Passwords. The file is located in %UserProfile%\WinupdateNo
SYSTEMVIDEOUPDATERXvlp.exeDetected by Intel Security/McAfee as Generic BackDoor!fq3 and by Malwarebytes as Backdoor.AgentNo
Protocol Smart Copy DriverXvlpqwsxhvzva.exeDetected by Intel Security/McAfee as Generic.bfr!eg and by Malwarebytes as Trojan.AgentNo
Web OfferXvl_ezstub.exeeZula adwareNo
BigDog303NVM303_STI.EXEVimicro USB webcam utility - allows the webcam to initiate data transfer to a program. Create a shortcut and start it manually when neededNo
BigDog305NVM305_STI.EXEVimicro USB webcam utility - allows the webcam to initiate data transfer to a program. Create a shortcut and start it manually when neededNo
331BigDogNVM331_STI.EXEVimicro USB webcam utility - allows the webcam to initiate data transfer to a program. Create a shortcut and start it manually when neededNo
332BigDogNVM332_STI.EXEVimicro USB webcam utility - allows the webcam to initiate data transfer to a program. Create a shortcut and start it manually when neededNo
vrmssiteXvmapp.exeDetected by Malwarebytes as Trojan.Agent.SBFGen. The file is located in %AppData%\SubFolder\SubFolderNo
ASERUvmaser.exeMailRedirector surveillance software. Uninstall this software unless you put it there yourselfNo
VMConsole.exeUVMConsole.exeSony VAIO Media Console - part of VAIO Media Integrated Server which is a utility that "lets you share AV content with other VAIO notebooks or PCs in your home network. It's Sony's new AV network style for your home entertainment"No
VMDFWYvmdfw.exeVirusMD Personal Firewall. Vendor's Note: "VirusMD Personal Firewall is a micro-firewall and should not be use as your primary virus scanner or as your primary firewall. It does not pan-block incoming or outgoing data. Rather, is a diagnostic and therapeutic utility designed to help professionals save time and effort in eradicating Trojan horses"No
VideoDriverHookXvmdriver.exeDetected by Sophos as Troj/Bckdr-PSSNo
VMIntel386XVMIntel386.exeDetected by Intel Security/McAfee as W32/Xiquitir.ow!p2p and by Malwarebytes as Worm.AutoRunNo
vmlibXvmlib.exeMalware installed by different rogue security software including SpyKillerPro. Also detected as the LOWZONE-AQ TROJAN!No
vmlibXvmlib.exeDetected by Sophos as Troj/LowZone-AQNo
Opera addonXvmm.exeDetected by Sophos as W32/Agent-IBDNo
PrinterXvmmon32.exeDetected by Sophos as W32/Rbot-CSBNo
Vmmon32Xvmmon32.exeBrowser hijackerNo
vmmonitorXvmmonitor.exeDetected by Malwarebytes as Trojan.Agent. The file is located in %CommonAppData%\[folder] - see examples here and hereNo
Epsilon SquaredXvmmreg32.exeDetected by Trend Micro as TROJ_AGENT.MVCNo
hotdlllXvmmreg32.exeDetected by Trend Micro as TSPY_BANKER.DX and by Malwarebytes as Trojan.Banker.ASDNo
Windows Media PlayerXvmmreg32.exeAdded by the AGENT.AQO TROJAN!No
Windows Virtual ManagerXvmnat.exeAdded by the SILLYFDC.BCB WORM!No
vmnetdhcpXvmnetdhcp.exeDetected by Sophos as Troj/DwnLdr-GTC. Note - this is not the legitimate VMware Workstation and Player file which is normally located in %System%. The one is located in %Windir%\helpNo
Microsoft Routing UtilitiesXvmnethcp.exeDetected by Malwarebytes as Trojan.Agent. The file is located in %Templates% - see hereNo
VMount driveXvmount.exeAdded by a variant of Backdoor.Rizo.A. The file is located in %System%\ComNo
{2415-1415-1611-9001}Xvmount2.exeDetected by Dr.Web as Trojan.PWS.Tibia.1244 and by Malwarebytes as Trojan.Agent.TBINo
vmplayerXvmplayer.exeDetected by Malwarebytes as Trojan.Agent.Inject. The file is located in %AppData%No
afnstrjgXvmraadvj.exeDetected by Malwarebytes as Trojan.Dofoil. The file is located in %LocalAppData%No
vmware remotemksXvmremotems.exeDetected by Trend Micro as BKDR_POISON.BMO and by Malwarebytes as Trojan.BackdoorNo
VMSnap3NVMSnap3.EXEVimicro based webcam driver - as used by both internal (laptop) and external webcams from Vimicro themselves, A4tech, Canon and othersYes
vmsnGraberXVMSNGRABER.EXEAdded by the ENVID.B WORM!No
VM SphereNXvmspre4n.exeDetected by Intel Security/McAfee as RDN/Generic.bfr and by Malwarebytes as Backdoor.IRCBot.ENo
vmssXvmss.exeDetected by Intel Security/McAfee as Adware-PromulGateNo
VPCUserServicesUVMUSrvc.exePart of "DOS Virtual Machine Additions" for Microsoft Virtual PC, software virtualization software that allows you to run multiple PC-based operating systems simultaneously on one workstation. This process provides additional functionalities such as Shared FoldersNo
VMware vCenter6Xvmvctr6.exeDetected by Malwarebytes as Trojan.VBCrypt. The file is located in %AppData%\VMware vCenter6No
Vido PesXvmwa32.exeDetected by Sophos as W32/Agobot-GUNo
VMware, Inc.XVMware, Inc..exeDetected by Malwarebytes as Backdoor.Agent. The file is located in %AppData%\VMware, Inc. Note - this is not a valid VMware entryNo
VMware Tray ProcessUvmware-tray.exeSystem Tray access to virtual machines (VMs) currently in a "powered on" state in VMware Workstation - which "makes it simple to create and run multiple virtual machines on your desktop or laptop computer". Can be helpful if VMs are configured to run "headless" at Windows startup, in which case it can help you interact with the headless VMs. In that case, VMs could be powered on headless without ever starting up Workstation. If VMs aren't configured to run headless it isn't really requiredNo
VMware WorkstationUvmware-tray.exeSystem Tray access to virtual machines (VMs) currently in a "powered on" state in VMware Workstation - which "makes it simple to create and run multiple virtual machines on your desktop or laptop computer". Can be helpful if VMs are configured to run "headless" at Windows startup, in which case it can help you interact with the headless VMs. In that case, VMs could be powered on headless without ever starting up Workstation. If VMs aren't configured to run headless it isn't really requiredNo
vmware-trayUvmware-tray.exeSystem Tray access to virtual machines (VMs) currently in a "powered on" state in VMware Workstation - which "makes it simple to create and run multiple virtual machines on your desktop or laptop computer". Can be helpful if VMs are configured to run "headless" at Windows startup, in which case it can help you interact with the headless VMs. In that case, VMs could be powered on headless without ever starting up Workstation. If VMs aren't configured to run headless it isn't really requiredNo
vmware-tray.exeUvmware-tray.exeSystem Tray access to virtual machines (VMs) currently in a "powered on" state in VMware Workstation - which "makes it simple to create and run multiple virtual machines on your desktop or laptop computer". Can be helpful if VMs are configured to run "headless" at Windows startup, in which case it can help you interact with the headless VMs. In that case, VMs could be powered on headless without ever starting up Workstation. If VMs aren't configured to run headless it isn't really requiredNo
vmware-unityXvmware-unity.exeDetected by Intel Security/McAfee as RDN/Ransom!eb and by Malwarebytes as Trojan.Agent.MNRNo
Workstation Ver 5.0Xvmware.exeDetected by Sophos as W32/Rbot-AHB. Note - this is not the legitimate VMware Player/Workstation file with the same name which is normally located in a %ProgramFiles%\VMware directory. This one is located in %System%No
VMware WorkstationXvmware.exeDetected by Sophos as W32/Kolabc-A. Note - this is not the legitimate VMware Player/Workstation file with the same name which is normally located in a %ProgramFiles%\VMware directory. This one is located in %System%No
BigDogPathNVM_STI.EXEVimicro USB webcam utility - allows the webcam to initiate data transfer to a program. Create a shortcut and start it manually when neededNo
SlipStreamYvnaccelcore.exeVelocity.Net Accelerator customized core module for Slipstream - internet acceleration through compression/decompression techniques, intelligent cacheing on the server side, and real-time conversion of large/high-bandwidth images to less bulky pixNo
Velocity.Net Web AcceleratorYvnaccelgui.exeVelocity.Net Accelerator customized user interface for Slipstream - internet acceleration through compression/decompression techniques, intelligent cacheing on the server side, and real-time conversion of large/high-bandwidth images to less bulky pixNo
vnlgpUvnlgp.exeDetected by Malwarebytes as PUP.Optional.BitCoinMiner. The file is located in %AppData%\vnlgp. If bundled with another installer or not installed by choice then remove itNo
mswsplXvnmispoisn downloader.exeSearchBarCash adware variantNo
searchbarXvnmispoisn downloader.exeSearchBarCash adware variantNo
vnmispoisn downloaderXvnmispoisn downloader.exeSearchBarCash adware variantNo
VnrBlock20XVnrBlock20.exeAdware.ISMonitor/Adware.Adsponsor variant - detected by Malwarebytes as Trojan.Agent. The file is located in %ProgramFiles%\VnrBlock - see hereNo
VnrBlock21XVnrBlock21.exeAdware.ISMonitor/Adware.Adsponsor variant - detected by Malwarebytes as Trojan.Agent. The file is located in %ProgramFiles%\VnrBlock - see hereNo
VnrPack15XVnrPack15.exeAdware.ISMonitor/Adware.Adsponsor variant - detected by Malwarebytes as Trojan.Agent. The file is located in %ProgramFiles%\VnrPack - see hereNo
VnrPack16XVnrPack16.exeAdware.ISMonitor/Adware.Adsponsor variant - detected by Malwarebytes as Trojan.Agent. The file is located in %ProgramFiles%\VnrPack - see hereYes
VnrPack17XVnrPack17.exeAdware.ISMonitor/Adware.Adsponsor variant - detected by Malwarebytes as Trojan.Agent. The file is located in %ProgramFiles%\VnrPack - see hereNo
VnrPack20XVnrPack20.exeAdware.ISMonitor/Adware.Adsponsor variant - detected by Malwarebytes as Trojan.Agent. The file is located in %ProgramFiles%\VnrPack - see hereNo
VnrPack22XVnrPack22.exeAdware.ISMonitor/Adware.Adsponsor variant - detected by Malwarebytes as Trojan.Agent. The file is located in %ProgramFiles%\VnrPackNo
VnrPack23XVnrPack23.exeAdware.ISMonitor/Adware.Adsponsor variant - detected by Malwarebytes as Trojan.Agent. The file is located in %ProgramFiles%\VnrPack - see hereNo
VnrPack24XVnrPack24.exeAdware.ISMonitor/Adware.Adsponsor variant - detected by Malwarebytes as Trojan.Agent. The file is located in %ProgramFiles%\VnrPackNo
VnrPack25XVnrPack25.exeAdware.ISMonitor/Adware.Adsponsor variant - detected by Malwarebytes as Trojan.Agent. The file is located in %ProgramFiles%\VnrPackNo
VnrPack26XVnrPack26.exeAdware.ISMonitor/Adware.Adsponsor variant - detected by Malwarebytes as Trojan.Agent. The file is located in %ProgramFiles%\VnrPack - see hereNo
VnrPack27XVnrPack27.exeAdware.ISMonitor/Adware.Adsponsor variant - detected by Malwarebytes as Trojan.Agent. The file is located in %ProgramFiles%\VnrPack - see hereNo
VnrPack28XVnrPack28.exeAdware.ISMonitor/Adware.Adsponsor variant - detected by Malwarebytes as Trojan.Agent. The file is located in %ProgramFiles%\VnrPack - see hereNo
VnrPack29XVnrPack29.exeAdware.ISMonitor/Adware.Adsponsor variant - detected by Malwarebytes as Trojan.Agent. The file is located in %ProgramFiles%\VnrPackNo
scvhostXvoa.exeDetected by Malwarebytes as Trojan.Agent. The file is located in %AppData%No
VOBRegCheckYVOBRegCheck.exePart of Pinnacle Instant CD/DVD burning and authoring software and InstantCopy burning software from Pinnacle Systems (formerly VOB Computersysteme GmbH, now part of Avid Technology, Inc). Verifies drive settings, once loaded it doesn't use any resources so you can leave it enabledNo
WdefenderXVOCYI7Q9JL.exeDetected by Intel Security/McAfee as RDN/Generic.dx!ctx and by Malwarebytes as Trojan.AgentYes
voeuwXvoeuw.exeDetected by Malwarebytes as Worm.SFDC. The file is located in %UserProfile% - see hereNo
Voice 220NVoice 220.exeMagicbox Voice 220 Skype phoneNo
Voice 320NVoice 320.exeMagicbox Voice 320 Skype phoneNo
voip phoneUvoip phone.exeRelated to Acer Bluetooth VoIP phone - as optionally supplied with some of their notebooks such as the TravelMate 8200No
VoipBusterNVoipBuster.exeVoipBuster - free internet telephony utility using the VoIP (Voice over Internet Protocol). Call online friends for free and regular phones either for free (limited use) or low rates. One of a number provided by Betamax - the others generally have different rate plans. Similar to the more popular SkypeNo
VoipBusterProNVoipBusterPro.exeVoipBusterPro - internet telephony utility using the VoIP (Voice over Internet Protocol). Call online friends for free and regular phones either for free (limited use) or low rates. One of a number provided by Betamax - the others generally have different rate plans. Similar to the more popular SkypeNo
VoipCheapNVoipCheap.exeVoipCheap - free internet telephony utility using the VoIP (Voice over Internet Protocol). Call online friends for free and regular phones either for free (limited use) or low rates. One of a number provided by Betamax - the others generally have different rate plans. Similar to the more popular SkypeNo
VoipCheapComNVoipCheapCom.exeVoipCheapCom - free internet telephony utility using the VoIP (Voice over Internet Protocol). Call online friends for free and regular phones either for free (limited use) or low rates. One of a number provided by Betamax - the others generally have different rate plans. Similar to the more popular SkypeNo
VoipDiscountNVoipDiscount.exeVoipDiscount - free internet telephony utility using the VoIP (Voice over Internet Protocol). Call online friends for free and regular phones either for free (limited use) or low rates. One of a number provided by Betamax - the others generally have different rate plans. Similar to the more popular SkypeNo
VoipHitNVoipHit.exeVoipHit - free internet telephony utility using the VoIP (Voice over Internet Protocol). Call online friends for free and regular phones either for free (limited use) or low rates. One of a number provided by Betamax - the others generally have different rate plans. Similar to the more popular SkypeNo
VoipRaiderNVoipRaider.exeVoipRaider - free internet telephony utility using the VoIP (Voice over Internet Protocol). Call online friends for free and regular phones either for free (limited use) or low rates. One of a number provided by Betamax - the others generally have different rate plans. Similar to the more popular SkypeNo
VoipStuntNVoipStunt.exeVoipStunt - free internet telephony utility using the VoIP (Voice over Internet Protocol). Call online friends for free and regular phones either for free (limited use) or low rates. One of a number provided by Betamax - the others generally have different rate plans. Similar to the more popular SkypeNo
VoipwiseNVoipwise.exeVoipwise - free internet telephony utility using the VoIP (Voice over Internet Protocol). Call online friends for free and regular phones either for free (limited use) or low rates. One of a number provided by Betamax - the others generally have different rate plans. Similar to the more popular SkypeNo
VoipZoomNVoipZoom.exeVoipZoom - internet telephony utility using the VoIP (Voice over Internet Protocol). Call online friends for free and regular phones either for free (limited use) or low rates. One of a number provided by Betamax - the others generally have different rate plans. Similar to the more popular SkypeNo
VolVicXvolbi.exeDetected by Dr.Web as Trojan.Siggen5.19138 and by Malwarebytes as Backdoor.Agent.DCNo
TOSHIBA Volume IndicatorUVolControl.exeOn-screen volume indicator for Toshiba notebooksNo
volmgrXvolmgr.exeDetected by Sophos as Troj/Agent-TPO and by Malwarebytes as Trojan.AgentNo
VolPanelUVolPanel.exeCreative Volume Panel application for the Sound Blaster range of internal and external soundcardsNo
VolPanelUVolPanlu.exeCreative Volume Panel application for the Sound Blaster range of internal and external soundcardsNo
System StartupXVoltio.exeDetected by Trend Micro as WORM_RBOT.NJNo
Sygate Personal Port BlockerXvolume.exeAdded by a variant of Backdoor:Win32/Rbot. The file is located in %System%No
Volume ControllerXVolumeControl.exeAdded by a variant of W32/Sdbot.worm. The file is located in %System%No
$Volumouse$Uvolumouse.exeVolumouse from Nirsoft. "Provides you a quick and easy way to control the sound volume on your system - simply by rolling the wheel of your wheel mouse"No
VombaXvomba.exeVomba adwareNo
vonmynoxenozXvonmynoxenoz.exeDetected by Intel Security/McAfee as RDN/Generic.tfr!a and by Malwarebytes as Trojan.Agent.USNo
UpdateUVOPackage.exeDetected by Malwarebytes as PUP.Optional.Package. The file is located in %AppData%\VOPackage. If bundled with another installer or not installed by choice then remove itNo
VORNVOR.exeSony Vaio Online Registration reminderNo
vovokiwitrejXvovokiwitrej.exeDetected by Malwarebytes as Trojan.Agent.US. The file is located in %UserProfile% - see hereNo
Microsoft UpdateXvpc32.exeDetected by Trend Micro as WORM_AGOBOT.XM and by Malwarebytes as Backdoor.BotNo
Microsoft Visual ApplicationXvpcrtf.exeDetected by Sophos as Troj/IRCBot-XJNo
a_vpd?vpd.exeLocated in an IBMTOOLS\VPD sub-directory. What does it do and is it required?No
VP-EYEUvpeyev4.exeVP-EYE Web Cam control panel softwareNo
phc700Uvphc700.exeRelated to the Philips SPC700NC web cameraNo
ICQ PlusNvplus.exeICQ Plus is a freeware utility makes your ICQ skinnable (change the look)No
Anti-VirusXvpms.exeAdded by a variant of the SLAPER TROJAN!No
VPN2ClientUVPN2Client.exeSystem Tray access to, and notifications for the 2012 version of Steganos Internet Anonym VPN from Steganos Software GmbH - which, as a VPN client, provides Wi-Fi hotspot protection, anonymous web surfing, security from hackers and snoops and access to region blocked websites when travellingNo
SIAVPN2UVPN2Client.exeSystem Tray access to, and notifications for the 2012 version of Steganos Internet Anonym VPN from Steganos Software GmbH - which, as a VPN client, provides Wi-Fi hotspot protection, anonymous web surfing, security from hackers and snoops and access to region blocked websites when travellingYes
Steganos Internet Anonym 2012UVPN2Client.exeSystem Tray access to, and notifications for the 2012 version of Steganos Internet Anonym VPN from Steganos Software GmbH - which, as a VPN client, provides Wi-Fi hotspot protection, anonymous web surfing, security from hackers and snoops and access to region blocked websites when travellingYes
VPN Client UI HelperUvpnclient.exePart of the PacketiX VPN commercial VPN product - sold only on Japan and China by SoftEther Corporation, JapanNo
SoftEther VPN Client UI HelperUvpnclient.exePart of SoftEther VPN by the SoftEther VPN Project - an open-source free cross-platform multi-protocol VPN, an academic project from University of TsukubaNo
VPN Client UI HelperUvpnclient_x64.exePart of the PacketiX VPN commercial VPN product - sold only on Japan and China by SoftEther Corporation, Japan. 64-bit versionNo
SoftEther VPNUvpnclient_x64.exePart of SoftEther VPN by the SoftEther VPN Project - an open-source free cross-platform multi-protocol VPN, an academic project from University of Tsukuba. 64-bit versionYes
SoftEther VPN Client UI HelperUvpnclient_x64.exePart of SoftEther VPN by the SoftEther VPN Project - an open-source free cross-platform multi-protocol VPN, an academic project from University of Tsukuba. 64-bit versionYes
SoftEther VPN Client Manager StartupUvpncmgr.exePart of SoftEther VPN by the SoftEther VPN Project - an open-source free cross-platform multi-protocol VPN, an academic project from University of TsukubaNo
PacketiX VPN Client [Japanese/Chinese characters]Uvpncmgr.exePart of the PacketiX VPN commercial VPN product - sold only on Japan and China by SoftEther Corporation, JapanNo
PacketiX VPN Client Task TrayUvpncmgr.exePart of the PacketiX VPN commercial VPN product - sold only on Japan and China by SoftEther Corporation, JapanNo
SoftEther VPNUvpncmgr_x64.exePart of SoftEther VPN by the SoftEther VPN Project - an open-source free cross-platform multi-protocol VPN, an academic project from University of Tsukuba. 64-bit versionYes
SoftEther VPN Client Manager StartupUvpncmgr_x64.exePart of SoftEther VPN by the SoftEther VPN Project - an open-source free cross-platform multi-protocol VPN, an academic project from University of Tsukuba. 64-bit versionYes
PacketiX VPN Client [Japanese/Chinese characters]Uvpncmgr_x64.exePart of the PacketiX VPN commercial VPN product - sold only on Japan and China by SoftEther Corporation, Japan. 64-bit versionNo
PacketiX VPN Client Task TrayUvpncmgr_x64.exePart of the PacketiX VPN commercial VPN product - sold only on Japan and China by SoftEther Corporation, Japan. 64-bit versionNo
Cisco Systems VPN ClientUvpngui.exeSets up IPSec communications for Cisco's VPN ClientNo
vpnmonXvpnmon.exeAdded by the WOMCODI-A WORM!No
RaptorMobile?vpnservices.exeRaptorMobile VPN client from Axent Technologies (now part of Symantec). Runs as a service on an NT based OS (such as Windows 10/8/7/Vista/XP). No longer availableNo
VpnSvcLineXVpnSvcLine.exeDetected by Intel Security/McAfee as RDN/Spybot.bfr!n and by Malwarebytes as Trojan.Downloader.WFNo
Cisco AnyConnect Secure Mobility Agent for WindowsYvpnui.exePart of the Cisco AnyConnect Secure Mobility Client by Cisco - which "provides the security necessary to help keep your organization's data safe and protected"No
Vpop3 Mail ServerUvpop3.exeMail server from Paul Smith Computer Services. Runs in system tray to collect mail. Can be run from a shortcut and if it isn't running then it won't get your email!No
ToUcamVPropertyUVProperty.exeConfiguration tray icon for the Philips ToUcam USB PC video camera (model number PCVC740K)No
vProtUvprot.exeSupports the AVG Secure Search box feature added on new browser tabs which is powered by Yahoo!. Added with the latest versions of AVG security softwareNo
vprotectstart.exeXvprotectstart.exeVProtect rogue security software - not recommended, removal instructions hereNo
Norton Save and Restore 2.0UVProTray.exeSystem Tray access to, and notifications for Symantec's Norton Save and Restore 2.0 backup software (either as a standalone product or as part of Norton SystemWorks 2009 Premier) - which is a renamed version of Norton GhostYes
VProTrayUVProTray.exeSystem Tray access to, and notifications for versions 12.0 to 15.0 of Symantec's Norton Ghost backup software and Norton Save and Restore 2.0 backup software (either as a standalone product or as part of Norton SystemWorks 2009 Premier) - which is a renamed version of Norton GhostNo
Norton GhostUVProTray.exeSystem Tray access to, and notifications for versions 12.0 to 15.0 of Symantec's Norton Ghost backup softwareYes
Norton Ghost 12.0UVProTray.exeSystem Tray access to, and notifications for version 12.0 of Symantec's Norton Ghost backup softwareYes
Norton Ghost 14.0UVProTray.exeSystem Tray access to, and notifications for version 14.0 of Symantec's Norton Ghost backup softwareYes
Norton Ghost 15.0UVProTray.exeSystem Tray access to, and notifications for version 15.0 of Symantec's Norton Ghost backup softwareYes
Norton Save & RestoreUVProTray.exeSystem Tray access to, and notifications for Symantec's Norton Save and Restore 2.0 backup software (either as a standalone product or as part of Norton SystemWorks 2009 Premier) - which is a renamed version of Norton GhostYes
vptrayUvptray.exeSystem Tray icon for Norton Anti-Virus Corporate Edition. Gives access to the options available and may not be required. Some users may have problems - refer hereNo
vptray analyzingXvptray.exeAdded by a variant of Backdoor.Rizo.A. The file is located in %System%\ComNo
SymantecLiveUpdateXVPTray.exeDetected by Symantec as Backdoor.Moudoor. Note - this is not a legitimate Symantec entryNo
SymantecUpdateXvptray.exeDetected by Dr.Web as Trojan.DownLoader6.25682 and by Malwarebytes as Trojan.Backdoor. Note - this is not a legitimate Symantec entryNo
vptraya analyzingXvptraya.exeAdded by a variant of Backdoor.Rizo.A. The file is located in %System%\ComNo
vqrqrppflacXvqrqrppflac.exeDetected by Sophos as W32/Agent-GOHNo
vqxuudXvqxuud.exeAdded by the VB-FQS TROJAN!No
Virtual ProtocolXvr32.exeAdded by a variant of W32/Sdbot.worm. The file is located in %System%No
VrBootScanYVRBScan.exeBoot scan feature of the HAURI ViRobot series of internet security products. HAURI's ViRobot engine is included in those used by VirusTotal, but it can also be licensed by other products such as versions of The Shield from PCSecurityShield (see here) - who's reputation is poorNo
VResLabXVResLab.exeVirusResponse Lab 2009 rogue security software - not recommendedNo
SysinternalsXvrfauto.exeDetected by Intel Security/McAfee as RDN/Generic.dx!czp and by Malwarebytes as Backdoor.Agent.MSCNo
Windows Application Verifier AutomationXvrfauto.exeDetected by Intel Security/McAfee as Generic.dx and by Malwarebytes as Backdoor.Agent.MSCNo
VRKillXVrkillDmn.exeVirus-Kill rogue antivirus software - not recommendedNo
vrl32Xvrl32.exeVirusResponse Lab 2009 rogue security software - not recommended, removal instructions hereNo
VirusRemover2008XVRM2008.exeVirusRemover2008 rogue security software - not recommended, removal instructions hereNo
VirusRemover2009XVRM2009.exeVirusRemover2009 rogue security software - not recommended, removal instructions hereNo
VrmonYvrmonnt.exePart of the HAURI ViRobot series of internet security products. HAURI's ViRobot engine is included in those used by VirusTotal, but it can also be licensed by other products such as versions of The Shield from PCSecurityShield (see here) - who's reputation is poorNo
VrProxycYvrproxyc.exePart of the HAURI ViRobot series of internet security products. HAURI's ViRobot engine is included in those used by VirusTotal, but it can also be licensed by other products such as versions of The Shield from PCSecurityShield (see here) - who's reputation is poorNo
VrProxydYvrproxyd.exePart of the HAURI ViRobot series of internet security products. HAURI's ViRobot engine is included in those used by VirusTotal, but it can also be licensed by other products such as versions of The Shield from PCSecurityShield (see here) - who's reputation is poorNo
VrScheduleYVrres.exePart of the HAURI ViRobot series of internet security products. HAURI's ViRobot engine is included in those used by VirusTotal, but it can also be licensed by other products such as versions of The Shield from PCSecurityShield (see here) - who's reputation is poorNo
Virus ProtectXvrsprtc.exeDetected by Sophos as W32/Rbot-APRNo
VRT1XVRT1.EXEDetected by Kaspersky as Virus.Win32.Virut.ce. The file is located in %WinTemp%No
SonicA3DControlNvrtxctrl.exeDiamond Multimedia Sonic Impact A3D soundcard control panelNo
UMAX VistaAccessNvsaccess.exeVistaAccess gives you quick and easy access to scanning functions right from your desktopNo
Microsoft Service DriversXVSADNIM.exeAdded by a variant of Backdoor:Win32/RbotNo
12CFG214-K641-12SF-N85PXvsbntlo.exeDetected by Microsoft as Trojan:Win32/Lethic.C and by Malwarebytes as Worm.AutoRun.GenNo
svchostXvscan.exeDetected by Intel Security/McAfee as Generic.bfr and by Malwarebytes as Backdoor.Bot.ENo
crssXvscan.exeDetected by Intel Security/McAfee as Generic.bfr and by Malwarebytes as Backdoor.AgentNo
MSDCHCpXvschosnt.exeDetected by Dr.Web as Trojan.KillProc.22773 and by Malwarebytes as Trojan.Agent.APLGenNo
vschostXvschost.exeAdded by the AGENT.QK BACKDOOR!No
vschostXvschosts.exeDetected by Sophos as Troj/Vipsy-ANo
Microsoft® Windows® Operating SystemXVScover.exeDetected by Malwarebytes as Trojan.Agent. The file is located in %Templates%No
VSDesignerXVSDesigner.exeDetected by Intel Security/McAfee as RDN/Generic FakeAlert!ec and by Malwarebytes as Backdoor.Messa.ENo
VistadrvXvsdrv.exeDetected by Intel Security/McAfee as FakeAV-N.bfr!cThe file is located in %ProgramFiles%\ArabLionZ XP Tools\Vista DriveNo
VistadrvXvsdrv.exeDetected by Intel Security/McAfee as Downloader.gen.a. The file is located in %ProgramFiles%\VIPHDNo
Vistadrv?vsdrv.exeVistaDrive by EgOrus. The file is located in %ProgramFiles%\Vistadrive. What does it do and is it required?No
VistadrvXvsdrv.exeDetected by Reason Core Security as Malware.Sality. The file is located in %ProgramFiles%\VistaDrivesNo
VistaDRVXvsdrv.exeDetected by Intel Security/McAfee as Generic.dx!bb3i. The file is located in %ProgramFiles%\VistaDrvNo
Vistadrv?vsdrv.exeThe file is located in %ProgramFiles%\VistaPack\vdriveNo
Vistadrv?vsdrv.exeThe file is located in %System%\VistadriveNo
Vistadrv?vsdrv.exeThe file is located in %Windir%\ABioDESK\VistadriveNo
Vistadrv?vsdrv.exeThe file is located in %Windir%\HDbarNo
Vistadrv?vsdrv.exeThe file is located in %Windir%\VistadriveNo
12CFG914-K641-26SF-N32PXvse432.exeDetected by Microsoft as Trojan:Win32/Lethic.C and by Malwarebytes as Worm.AutoRun.GenNo
VsEcomrEXENvsecomr.exeFrom McAfee VirusScan up to version 4.x. This executable is responsible for the periodic "update" promptsNo
SystemFTPXVSENMB.exeMalware (ie, malicious software). Also changes the system.ini Shell line to read Shell=Explorer.exe VSENMB.exe, and it hacks the Winstart.bat as wellNo
Microsoft Virtual Service ManagerXvservice32.exeDetected by Microsoft as Worm:Win32/Slenfbot.IZNo
12CFG914-K641-26SF-N31PXvsexy1.exeDetected by Malwarebytes as Worm.AutoRun.Gen. The file is located in %Recycled%\{SID}No
Virus Shield 2009XVShield.exeVirus Shield 2009 rogue security software - not recommended, removal instructions here. Detected by Malwarebytes as Rogue.VirusShieldNo
vshost.exeXvshost.exeDetected by Intel Security/McAfee as RDN/Sdbot.bfr and by Malwarebytes as Backdoor.Bot.VS. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows startsNo
VSHost.vbsXVSHost.vbsDetected by Malwarebytes as Trojan.Script. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows startsNo
BackupXVshosts.exeDetected by Dr.Web as Trojan.DownLoader10.44709No
hotdlllXvshots32.exeDetected by Malwarebytes as Trojan.Banker.ASD. The file is located in %System%No
Vshwin32EXEYVSHWIN32.EXEFrom McAfee VirusScan up to version 4.x and Dr Solomon's VirusScan. Communicates between VSSTAT.EXE and the VShield System Scan module. Can be started automatically or available via Start → ProgramsNo
12CFG515-K641-55SF-N55PXvslmq.exeDetected by Intel Security/McAfee as W32/Spybot.worm.gen and by Malwarebytes as Worm.AutoRun.GenNo
Zone AlarmXvsmon.exeAdded by the RBOT.BO WORM! If this was the ZoneAlarm firewall the name column would be TrueVector
TrueVectorYVSMON.EXEPart of ZoneAlarm security products when running on Windows Me/98 which monitors internet traffic and generates alerts for disallowed access. Runs as a service on Windows XP and laterNo
System Security UpdatersXvsmons.exeAdded by the RBOT-OW WORM!No
VSNNvsn.exeSoftware to share photographs across the internetNo
SNCT511?vsnct511.exeUnidentified "Snapshot Viewer". What does it do and is it required?No
sndmi13Uvsndmi13.exeDriver for DualCam cameras - that combine the best features of a digital still camera and a webcamNo
Voice Sticky NotesNvsnotes.exeVoice Sticky Notes by Vioio Software Inc - is an "easy to use little program for any version of Windows, it lets you create colorful notes on your desktop, record a voice memo, set an alarm that play audio and video files as the alarm sound, and send them to others"No
snp2stdNvsnp2std.exeUSB webcam monitor application by SonixNo
snp2uvcNvsnp2uvc.exeUSB webcam monitor application by SonixNo
snpstdNvsnpstd.exeUSB webcam monitor application by SonixNo
SNPSTD2Nvsnpstd2.exeUSB webcam monitor application by SonixNo
snpstd3Nvsnpstd3.exeUSB webcam monitor application by SonixNo
vsnpstd3Nvsnpstd3.exeUSB webcam monitor application by SonixNo
12CFG214-K641-24SF-N85PXvsofat.exeDetected by Microsoft as Trojan:Win32/Lethic.F and by Malwarebytes as Worm.AutoRun.Gen. The file is located in %Recycled%\S-1-5-21-0243936033-3052116371-381863308-1859No
VSP32 ControlsXvsp32.exeAdded by the RBOT-VA WORM!No
vspdfprsrv.exeNvspdfprsrv.exeVisage Expert PDF - "the complete PDF creator and PDF writer tool. It lets you create PDF files from any document that you are working on so that you can save and send your work securely"No
vspellXvspell.exeAdded by a variant of the SMALL.PI TROJAN!No
vspmemXvspmem.exeDetected by Intel Security/McAfee as RDN/Generic Dropper!fd and by Malwarebytes as Trojan.AgentNo
TIBBO VSP MonitorUvspmon.exeVirtual Serial Port monitor - part of the Tibbo Device Server Toolkit - "logs the activity of Virtual Serial Ports and remains an indispensable tool in troubleshooting communications problems in systems involving Virtual Serial Ports"No
VSProtectorUVSProtector.exeDetected by Malwarebytes as PUP.Optional.Winsock.HijackBoot. The file is located in %ProgramFiles%\Visual Protect Service. If bundled with another installer or not installed by choice then remove itNo
vsrv32Xvsrv32.exeDetected by Trend Micro as WORM_AGOBOT.AIFNo
12CFG914-K641-26SF-N32PXvss132.exeDetected by Microsoft as Trojan:Win32/Lethic.F and by Malwarebytes as Worm.AutoRun.GenNo
vssadminXvssadmin.exeDetected by Malwarebytes as Trojan.Ransom. Note - this entry loads from HKCU\Run & HKCU\RunOnce and the file is located in %AppData%\Microsoft\Windows\dllcacheNo
vssadminXvssadmin.exeDetected by Malwarebytes as Trojan.Ransom. Note - this entry loads from the Windows Startup folder and the file is located in %AppData%\Microsoft\Windows\dllcacheNo
vssadminXvssadmin.exeDetected by Malwarebytes as Trojan.Ransom. Note - this entry loads from the Windows Startup folder and the file is located in %AppData%\Microsoft\Windows\IEUpdateNo
12CFG914-K641-26SF-N31PXvsse32.exeDetected by Trend Micro as WORM_SILLY.LC and by Malwarebytes as Worm.AutoRun.GenNo
13CFG914-K641-26SF-N31PXvsse33.exeDetected by Microsoft as Trojan:Win32/Lethic.C and by Malwarebytes as Worm.AutoRun.GenNo
BitDefender Virus ShieldYvsserv.exeReal-time monitor for older versions of BitDefender anti-malware products which scans media for viruses and other security threatsNo
Java ApplicationXvssmf32.exeDetected by Symantec as Backdoor.Spigot. The file is located in %System%No
WindowsfwXvssmf32.exeDetected by Symantec as Backdoor.Spigot. The file is located in %System%No
SYSTEMXVSSMON.exeDetected by Sophos as W32/Rbot-AWWNo
vssms32Xvssms32.exeDetected by Sophos as Troj/Bckdr-LBFNo
VirusScanMSC?VSSTAT.EXEPart of McAfee VirusScan. System Tray application as with previous versions (were also VsStat.exe), McAfee SecurityCenter integration or something else? Is it required?No
VsStatEXEYVSSTAT.EXEFrom McAfee VirusScan up to version 4.x and Dr Solomon's VirusScan. Communicates between VSSTAT.EXE and the VShield System Scan module. Can be started automatically or available via Start → ProgramsNo
Mcafee Antivirus Monitoring System32mnXVSStatmn32.exeDetected by Trend Micro as WORM_RBOT.AEHNo
Mcafee Antivirus Monitoring System326XVSStatmn326.exeAdded by a variant of W32/Sdbot.worm. The file is located in %System%No
HKLMXVSSVC.exeDetected by Malwarebytes as Backdoor.HMCPol.Gen. The file is located in %System%\installNo
PoliciesXVSSVC.exeDetected by Malwarebytes as Backdoor.Agent.PGen. The file is located in %System%\installNo
HKCUXVSSVC.exeDetected by Malwarebytes as Backdoor.HMCPol.Gen. The file is located in %System%\installNo
UpdateruiXVsTckMgr.exeAdded by the MDROP-DJX TROJAN!No
vstXvstkmgr.exeDetected by Trend Micro as WORM_AGOBOT.SKNo
WinWorksXvstmgr.exeDetected by Trend Micro as WORM_AGOBOT.ACJNo
VStu64Xvstu64.exeDetected by Intel Security/McAfee as Generic BackDoor and by Malwarebytes as Backdoor.Agent.DCENo
VStudio ManagerXvstudio.exeAdded by a variant of Backdoor.Rizo.A. The file is located in %System%\ComNo
Visual SubstUVSubst.exeVisual Subst by NTWind Software - is a "small tool that allows you to associate the most accessed directories with virtual drives. It uses the same API similar to the console 'subst' utility, but makes it easier to create and remove virtual drives in a GUI way"No
Skype UpdateXvsvchost.exeDetected by Malwarebytes as Trojan.FakeSkype. Note - this is not a legitimate entry for the popular Skype VOIP software and the file is located in %AppData%\svchostNo
Virus SweeperXVSweep.exeVirus Sweeper rogue security software - not recommended, removal instructions hereNo
Volcano Security SuiteXVS[random].exeVolcano Security Suite rogue security software - not recommended, removal instructions here. Detected by Malwarebytes as Rogue.VolcanoSecuritySuiteNo
ShellXvs_ultimate.exeDetected by Malwarebytes as Trojan.Agent.MTA. Note - this entry adds an illegal HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon "Shell" entry. The value data points to "vs_ultimate.exe" (which is located in %AppData%\FolderName)No
ElectrumXvtahtbgc.exeDetected by Malwarebytes as Trojan.Agent.E. The file is located in a sub-folder of %AppData%No
NoteBurnerNVTBurnerGUI.exeNoteBurner from NoteBurner Inc. - "a versatile music converter that can be used as MP3 music converter, AAC audio converter, WAV to MP3 converter, M4A to MP3 converter, and RM to MP3 converter"No
[name]Xvtd_16.exeDetected by Sophos as Troj/Haxdoor-AENo
MyVitalAgentUVtlAgent.exeMyVitalAgent from Lucent Technologies. Replacement for Net.Medic, monitoring all popular internet transactions and alerting the user of the location of connection problems. Available via Start → ProgramsNo
PaintXvtoIo.exeDetected by Malwarebytes as Backdoor.Agent.PNT. The file is located in %UserProfile%\PaintNo
VTPresetUVTPreset.exeSavage Pro S3 graphics softwareNo
VoyetraTrayNvtray.exeAbbreviated Control Group associated with the Turtle Beach Montego II sound card and Voyetra AudioStation 2 digital music jukebox/organizerNo
VTTimerUVTTimer.exeDriver file for the on-board VIA/S3G KM400/KN400 graphics which enables TV in/out communicationNo
VTTraypNVTtrayp.exeSystem Tray access to S3 Screen Toys - installed with some S3 graphics controllersNo
vTunerStartUpNvTuner.exevTuner - "an easy way to find and listen to radio and TV broadcasts over the Internet"No
reg1.regXvuamgard.exeAdded by a variant of W32.IRCBot. The file is located in %System%No
vuktusutsacyXvuktusutsacy.exeDetected by Intel Security/McAfee as RDN/Downloader.gen.a and by Malwarebytes as Trojan.Agent.USNo
vuliwycsareaXvuliwycsarea.exeDetected by Dr.Web as Trojan.DownLoader9.57386 and by Malwarebytes as Trojan.Agent.USNo
VundoFixToolXVundoFixTool.exeVundoFixTool rogue security software - not recommended. Note - do not confuse with the free VundoFix removal tool by AtribuneNo
vunesXvunes.exeDetected by Malwarebytes as Trojan.Agent.VT. The file is located in %UserProfile% - see hereNo
WindowsStartup®XvuYLkubHSt.exeDetected by Dr.Web as Trojan.DownLoader7.17089 and by Malwarebytes as Trojan.Agent.GenNo
nviawzXvv.jsDetected by Malwarebytes as Backdoor.Gh0st. The file is located in %Root%\Microsoft\lib\keNo
VVCapNVVCap.exeVVCap screen-capture utility 'designed to do a single-click screen capture to web. It is that easy. You can use VVCap for: instant messaging, email, twitter, any other social networking site, when you need to do a "quick-post" of what you see on your screen'No
VirtualVisitXVVisit.exeDetected by Sophos as Troj/Mdrop-CNCNo
JUpdate 1.1.0Xvvjowfl.exeDetected by Dr.Web as Trojan.DownLoader5.48310No
vhostrouteXvvrhost.exeDetected by Dr.Web as Trojan.DownLoader9.38277 and by Malwarebytes as Trojan.Downloader.EYes
VVSNXVVSN.exePurityScan.C adwareNo
StartnameXvvv.exeDetected by Intel Security/McAfee as RDN/Generic.bfr and by Malwarebytes as Backdoor.Agent.SNGenNo
VX1000?vVX1000.exeAssociated with Microsoft's VX-1000 LifeCam webcams. What does it do and is it required?No
VX3000?vVX3000.exeAssociated with Microsoft's VX-3000 LifeCam webcams. What does it do and is it required?No
VX6000?vVX6000.exeAssociated with Microsoft's VX-6000 LifeCam webcams. What does it do and is it required?No
QffecdasXvvzxx.exeAdded by the MULTIDRP.AA TROJAN!No
vvzzwrXvvzzwr.datDetected by Malwarebytes as Trojan.Ransom.Gend. The file is located in %CommonAppData%No
fologlcoXvwbdckqg.exeDetected by Malwarebytes as Backdoor.Bot. The file is located in %LocalAppData%No
VWGlVrmNBXVWGlVrmNB.exeDetected by Dr.Web as Trojan.DownLoader8.27592 and by Malwarebytes as Trojan.Banker.ENo
StartupXvwin-proz.exeDetected by Malwarebytes as Trojan.Agent. The file is located in %AppData%\win-prozNo
FiRevWallcerticateXvwindows.exeDetected by Dr.Web as Trojan.KillFiles.14725 and by Malwarebytes as Trojan.Agent.FWNo
StartupXvwinint.exeDetected by Malwarebytes as Trojan.Agent.STU. The file is located in %AppData%\winintNo
WinUpdateXVX-BioKernel32.exeDetected by Sophos as W32/Ptweak and by Malwarebytes as Spyware.PasswordsNo
Microsoft vx supportXvxagent.exeDetected by Malwarebytes as Trojan.Agent. The file is located in %UserTemp%\vxNo
VX AudioXvxaudio.exeDetected by Sophos as W32/Vanebot-AINo
[various names]Xvxdman.exeFake startup entry created by the Wareout rogue spyware and dialer remover - not recommended, removal instructions here. Archived version of Andrew Clover's original pageNo
sVideo2Xvxdrun6.exeMake125 - Switch dialer and hijacker variant, see here. Also detected by Sophos as Dial/Switch-ENo
DRIVEINITXvxdscan16.exeDetected by Malwarebytes as Backdoor.IRCBotNo
vxgame.exeXvxgame.exeDetected by Microsoft as Trojan:Win32/VB. The file is located in %UserStartup% and its presence there ensures it runs when Windows startsNo
Framework Files Acquisition Store ModulesXvxnygveet.exeDetected by Intel Security/McAfee as Downloader.a!dch and by Malwarebytes as Trojan.AgentNo
VerifXvxst.exeDetected by Trend Micro as WORM_NOPIR.BNo
Wind River SystemsXvxworks.exeAdded by the ACKANTTA WORM! Note that this is not related to the VxWorks platform from Wind RiverNo
vybigqiqewahXvybigqiqewah.exeDetected by Sophos as Troj~Pushd-Fam and by Malwarebytes as Trojan.Agent.USNo
Vypress Chat StartUpNVyChat.exeVypress Chat by VyPRESS Research, LLC - "is a user-friendly application for real-time chatting in small office or home office (SOHO) local networks. This unique chat software features an easy-to-understand format for text-based conferences and discussions"No
vyfalperyfirXvyfalperyfir.exeDetected by Intel Security/McAfee as Cutwail.gen.s and by Malwarebytes as Trojan.AgentNo
vyphuldoxopsXvyphuldoxops.exeDetected by Sophos as Troj/Agent-ZOF and by Malwarebytes as Trojan.Agent.USNo
VZAccess ManagerUVZAccess Manager.exeVerizon Wireless VZAccess Manager from Smith Micro - "lets mobile employees using RIM devices stay on top of their business when they're on the road by bringing more of the office directly to their laptops"No
Vzgcspugxskeqzgq.exeXVzgcspugxskeqzgq.exeDetected by Malwarebytes as Trojan.PWS.IRCBot. The file is located in %AppData%No
SFPNvzSFPWin.EXEVerizon Online Support Center utility which prompts for online updatesNo
SGxBArXVzWJrY.exeDetected by Intel Security/McAfee as RDN/Generic PWS.y!lt and by Malwarebytes as Trojan.KeyloggerNo
xv_ctrlUv_ctrl.exe3dfx Underground Tools - "Gives direct hardware control to your video graphics adapter"No
V Stuff BackupUv_stuff_backup.exeV Stuff Backup online storage and backup for Virgin Media broadband usersNo

Notes & Warnings

If you can help identify new entries and verify/identify those entries with a "?" status (especially hardware specific - such as laptops and motherboards) then please E-mail us (startups_at_pacs-portal_dot_co_dot_uk).

"Status" key:

Variables:

DISCLAIMER: It is assumed that users are familiar with the operating system they are using and comfortable with making the suggested changes. We will not be held responsible if changes you make cause a system failure.

WARNING: This is NOT a list of tasks/processes taken from the Task Manager (CTRL+SHIFT+ESC) "Processes" tab. This displays some startup programs AND other background tasks and "Services". These pages are concerned with startup programs from the common startup locations shown above ONLY. Please do not submit entries collected from this method as they will not be used. For a list of tasks/processes you should try the list at PC Pitstop, the Process Library from Uniblue or one of the many others now available.

Therefore, before ending a task/process via CTRL+SHIFT+ESC just because it has an "X" recommendation, please check whether it's in the registry or common startup locations first. An example would be "svchost.exe" - which doesn't appear in either under normal conditions but does via CTRL+SHIFT+ESC. If in doubt, don't do anything.

To avoid the database becoming too large, all malware entries are only shown using the registry version which is common to all Windows versions. Otherwise there would be multiple entries for popular filenames that viruses often use - such as "svchost.exe" above for example. Multiple malware can also use the same start-up entries, in this case only those with significant differences (such as file location) are repeated in this database.

As more than 25K entries in this database related to malware you should use a quality internet security package. Which ever you choose, keep it updated and get the latest version at least every two years.

There are a number of virus and malware entries listed in this database where specific removal instructions haven't been given. If this is the case then you could try ComboFix, a program written by sUBs that can remove many different types of Trojans and Worms. See here for a tutorial on how to use the program.

NOTE: A number of entries are repeated due to the way that different operating systems display startup items. For example, WinMe lists "POPROXY.EXE" as "Norton eMail Protect" in both MSCONFIG and the registry whereas WinXP lists it as "Poproxy" in MSCONFIG and "Norton eMail Protect" in the registry.

SERVICES: "Services" from the Windows 8/7/Vista/XP/2K/NT operating systems are not included. We fully understand that some programs with these OS's use "Services" as an alternative to load their component parts at startup but these are handled in a different way. We recommend you try BlackViper for information on services for the relevant operating systems.

Copyright

Presentation, format & comments Copyright © 2001 - 2017 Pacman's Portal
Portions Copyright © Peter Forrest, Denny Denham, Sylvain Prevost, Tony Klein, CastleCops & Bleeping Computer
Powered by Malwarebytes
All rights reserved

Valid XHTML 1.0 Transitional

Privacy Policy Site Map Home