List Information

Started by: Paul Collins

Maintained by: random/random, nasdaq, Vino Rosso
Startup List

The Startup List catalogues startup applications - not running processes.
For information on the difference, please see here.

These are entries for programs that can start automatically with your computer.

Status Key:
Y = Normally leave to run at start-up
N = Not required - often infrequently used tasks that can be started manually, if necessary
U = User's choice - depends whether a user deems it necessary
X = Malware, spyware, adware, or other potentially unwanted items
? = Currently unknown status
Search Results
(displaying 69 results)

Name Filename Description Status
hack1x2C:\WINDOWS\system32:hlpnod32.exeA variant of the Backdoor.Bifrose Note: Located in \%WINDIR%\system32:hlpnod32.exe Note: Please note that this infection is an Alternate Data Stream file attached to the legitimate C:\Windows\System32 folder. Do not delete the C:\Windows\System32 folder as Windows will not operate correctly without it. To delete the Alternate Data Stream you should read this tutorial. Note: Use SDFix under supervision.X
CTFMONwscript.exe /E:vbs C:\WINDOWS\system32\winjpg.jpgAdded by the W32/Autorun-ALB ADWARE! Note: Located in \%WINDIR%\%System%\ Note: Spreads via removable media.X
WinShowUpdatecopy C:\WINDOWS\winshow.new C:\WINDOWS\winshow.dllWinshow parasiate related - from the "RunOnce" keys it replaces "winshow.dll" with a new versionX
System32System32.exeAdded by the MARI, SYSXXX and other VIRUSES!X
DriverPathsystem32.exeAdded by the Troj/Prorat-S TROJAN! Note: This trojan file is found in the Windows or Winnt folder.X
System32system32,1.exeworm or trojan, as yet unidentifiedX
system32system32.exeAdded by the Troj/Bancban-JD TROJAN! Note: The executable is system32.exe located in the C:\Windows (95/95/ME/XP) or C:\WINNT (NT/2000) directory-- this is not the system32 folder!X
system32.exesystem32.exeAdded by the Backdoor.Graybird.P TROJAN! Note: This worm/trojan file is found in the Windows or Winnt folder.X
SystemSASSystem32.exeAdded by the KWBOT.C VIRUS!X
Win32system32.vbsAdded by the VBS.SWERUN VIRUS!X
Windows Explorersystem32.exeAdded by the W32/Rbot-AJH WORM!X
Windows System32 Kernelsystem32.exeAdded by the W32/SDBOT-AAT WORM!X
Windows-SystemSystem32.exeAdded by the LOGPOLE.C VIRUS!X
Winsock2 driverSYSTEM32.EXEAdded by the W32/Spybot-EG WORM!X
Winsock32 driversystem32.exeTroj/IRCBot-VT Note: Read the link, allows remote accessX
Torrent Management Servicesystem32.exeAdded by a variant of the IRCBOT TROJAN! See hereX
screwsystem32.exeIdentified by Sophos as Worm W32/VB-DWN Note: Located in \%WINDIR%\X
Sygate Personal Firewallsystem32.exeAdded by the RBOT.VI WORM!X
msnsystem32.exeAdded by the KITRO.A VIRUS!X
System Supportsystem32.exeAdded by the W32/RBOT-AHA WORM!X
Microsoft Updatesystem32.exeAdded by an unidentified TROJAN! of the Sdbot family. Note: This worm\trojan is located in C:\Windows\System (Win9x/Me), C:\%WINDIR%\System32 (XP/WinNT/2K)X
Microsofot x386 System Monitorsystem32.exeWORM_WOOTBOT.MX
ioroxxo microsoft suxsystem32.exeAdded by a variant of the Rbot family of worms and IRC backdoor Trojans. Note: Located in \%WINDIR%\System32\X
ruinsystem32.exeAdded by the TROJ/DELF-JM TROJAN!X
svchostssystem32:svchosts.exeIdentified as a variant of the Trojan.Win32.VB.dqk Note: Located in \%WINDIR%\System32\ Note: ADS infection [note]Use SDFix under supervision.X
svehostsystem32:svehost.exeIdentified as a Backdoor:Win32/Poison.M by Microsoft. Note: This is an alternate data streams. Note: Located in \%WINDIR%\%System%\X
Poison.Ivysystem32:Poison Ivy.exeA variant of the Backdoor.Win32.Poison.cpb Backdoor:W32/PoisonIvy is a family of backdoors that give a remote user extensive access to an infected computer. Note: Please note that this infection is an Alternate Data Stream file attached to the legitimate C:\Windows\system32 folder. Do not delete the C:\Windows\system32 folder as Windows will not operate correctly without it. Note: Use SDFix under supervision.X
xp v7.exesystem32:winxp7.exeAdded by the Backdoor:Win32/Poisonivy.H Note: Located in \%WINDIR%\%System%\ Note: This is an ADS - Alternate Data Streams DO NOT REMOVE the %System%\ folder.X
svchostsystem32:svchost.exeIdentified as a variant of the Backdoor.Win32.Poison malware. This infection is a Alternate Data Stream file which requires certain tools to remove. Get help from a malware removal forum. Note: Use SDFix under supervision.X
Windows Serviceswindows.exeAdded by a variant of the IRCBOT Note: Located in \%WINDIR%\ Note: Use SDFix under supervision.X
InternetExplorer2windows.exeAdded by the W32/Sdbot-CZP WORM! Note: Located in \%WINDIR%\System32\ Note: Use SDFix under supervision.X
Microsoft IT Updatewindows.exeAdded by the W32/Rbot-JM WORM! Note: Located in \%WINDIR%\System32\X
WINDOWS SYSTEMwindows.exeAdded by the Worm:Win32/Gaobot] Note: Located in \%WINDIR%\%System%\ Note: The Hosts file may have been modified.X
Microsoft Windows Updatawindows.exeAdded by an unidentified TROJAN! of the Sdbot family. Note: Located in \%WINDIR%\System32 Note: Use SDFix under supervision.X
Windows Updatewindows.exeAdded by the W32/RBOT-RB WORM! Note: Located in \%WINDIR%\System32\X
windowspiswindows.exeAdded by the Trojan-Downloader.Win32.Genome.akll Note: Located in \%WINDIR%\%System%\X
Windows Security Servicewindows.pifAdded by the W32/Rbot-AMG WORM! Note: Located in \%WINDIR%\System32 Note: Use SDFix under supervision.X
Windows modez VerifierWindows-.exeAdded by the W32/Rbot-DIO WORM! Note: Located in \%WINDIR%\System32 Note: Use SDFix under supervision.X
Windows mod VerifierWindows-mod.exeAdded by a variant of the IRCBOT Note: Located in \%WINDIR%\System32\ Note: Use SDFix under supervision.X
Windows Loadwindows.com Note: ???
NDIS Adapterwindows.exeAdded by the W32/FORBOT-BR WORM! Note: Located in \%WINDIR%\System32\X
WRMVanWindows.exeAdded by the W32/AutoRun-BGD WORM! Note: Located in \%Program Files%\ Note: Spreads via removable media.X
Applicationwindows.exeAdded by the Trojan/Python.a Note: Located in \%Root%\Users\Public\Documents\X
WINDOWS\windows.exeAdded by the Troj/Monbot-A TROJAN! Note: Located in \%WINDIR%\System32\X
WindowsWindows.exeAdded by the KAZMOR, BOBBINS& ALADINZ.D VIRUSES!X
WINwindows.exeAdded by the W32.Reatle.C@mm WORM! Note: Located in \%WINDIR%\System32\X
Rundll32Windows.exeAdded by the Trojan.PWS.QQPass.E VIRUS! Note: Located in \%Program Files%\X
Startwindows.vbsHomepage hijackerX
Docker for WindowsDocker for Windows.exeRelated to Docker Inc aN integrated container security for legacy and cloud-native applications. Note: Located in \%Program Files%\Docker\Docker\U
WINDOWS HOSTWindows Host.exeAdded by the Windows Host.exe Malware. Note: Located in \%ProgramData%\Windows Host\X
Internet ExplorerWINDOWS.crypted.exeAdded by the Backdoor.Win32.Poison.pg Note: Located in \%ROOT%\X
ExplorerWindows Explorer.exeAdded by the W32/SillyFDC-I WORM! Note: This trojan is located in C:\%WINDIR%\ Note: copies itself to: (User)\Documents\Top Pictures.exe and (User)\My Documents\New Folder.exe. May also copy itself to drives A: and B:.X
iseeu.exeWINDOWS:iseeu.exeA variant of the Backdoor:W32/PoisonIvy Backdoor:W32/PoisonIvy is a family of backdoors that give a remote user extensive access to an infected computer. Note: Please note that this infection is an Alternate Data Stream file attached to the legitimate C:\Windows folder. Do not delete the C:\Windows\ folder as Windows will not operate correctly without it. Note: Use SDFix under supervision.X
LiveUpdate[Windows username]05.exeAdded by the LINEAGE TROJAN!X
Windows XP SP2 KeyGenWindows XP SP2 KeyGen.exeAdded by the W32/Tibick-C WORM! Note: Located in \%WINDIR%\MSVIEW\X
Windows spyware removerWindows-spyware.exeAdded by a variant of the IRCBOT Note: Located in \%WINDIR%\System32\ Note: Use SDFix under supervision.X
Windows Clean-Up ProWINDOWS CLEAN-UP PRO.ExeWINDOWS CLEAN-UP PRO Rogue anti-spyware program.X
Windows Anti VerifierWindows-Anti.exeAdded by the Win32/Rbot.ETT WORM! Note: Located in \%WINDIR%\System32\X
Windows 32 UpdateWindows-Update.exeAdded by a variant of the Win32/Rbot Note: Located in \%WINDIR%\System32\X
Microsoft WindowsMicrosoft Windows.htaHTA file which creates an executable on the hard drive which subsequently proceeds to download files from a malware site!X
Windows Genuine CheckWindows Genuine Check.exeAdded by a variant of the RBot Note: Located in \%WINDIR%\System32\ Note: Use SDFix under supervision.X
Windows Updates ServiceWindows Updates Service.vbeAdded by the Windows Updates Service Virus.vbs.qexvmc.1. Note: Located in \%AppData%\Roaming\Windows Updates Files\X
Windows Service AgentWindows Service AgentAdded by the Net-Worm.Win32.Kolab.fqg TROJAN! Note: Located in \%WINDIR%\%System%\X
DocFetcher-Daemondocfetcher-daemon-windows.exeRelated to DocFetcher, an Open sourve program. It allows you to search the contents of files on your computer.. Note: Located in \%Program Files%\DocFetcher\U
Windows host serviceWindows host service.exeAdded by the Windows host service Tojan Miner or BitCoin Miner. Note: Located in \%AppData%\Roaming\scwcknzrjf\X
WinUpdate:Microsoft Office Update for Windows XP.sysIdentified by Sophos as VBS/AutoRun-UC Note: Located in \%WINDIR%\X
system34Windows External Security Update.exeDetected as IM-Worm.Win32.VB.ev. WORM! Note: Located in \%WINDIR%\SoftwareProtection\X
BootRacerBootRacer measures your Windows boot timebootrace.exeRelated to Greatis Software BootRacer measures your Windows boot time. Note: Located in \%Program Files%\BootRacer measures your Windows boot time.N
MMSystem"%\Windows%\rundll32.exe "%System%\mmsystem.dll"", RunDll32"Added by a FUNNER.A worm infectionX


Powered by SystemLookup Engine. © 2008-2018 BrightFort. All Rights Reserved. | Privacy Policy | Terms of Use