List Information

Started by: Paul Collins

Maintained by: random/random, nasdaq, Vino Rosso
Startup List

The Startup List catalogues startup applications - not running processes.
For information on the difference, please see here.

These are entries for programs that can start automatically with your computer.

Status Key:
Y = Normally leave to run at start-up
N = Not required - often infrequently used tasks that can be started manually, if necessary
U = User's choice - depends whether a user deems it necessary
X = Malware, spyware, adware, or other potentially unwanted items
? = Currently unknown status
Search Results
(displaying 27 results)

Name Filename Description Status
removeiLividdatamngrcmd.exe /c RD /S /Q "C:\Program Files (x86)\Search Results Toolbar"Added by the Searchqu Toolbar iLivid datamngr AdWare - PUP (Potentially Unwanted Program)X
Microsoft IT Updaterandom files namesAdded by a variant of the Win32.Rbot WORM!X
System Files UpdaterSystem Files Updater.exeRelated to System_Files_Updater from Flyakiteosx. It will transform the look of an ordinary Windows XP system to resemble the look of Mac OS X. Note: located in \%WINDIR%\FlyakiteOSX\U
Avira System Speedup User StarterAvira.SystemSpeedup.Core.Common.Sta
rter.exe
Related to Avira Avira System Speedup. Note: Located in \%Program Files%\Avira\System Speedup\U
BeSys[path to the adware program]Added by BeSys ADWARE!X
blah servicemicrosoft.exeAdded by a variant of the WIN32.RBOT WORM!X
Microsoft Officemicrosoft.exeAdded by the BANKER-VF TROJAN!X
Windows UpdateMicrosoft.exeAdded by a variant of Trojan-Spy.Win32.Banbra.gi as reported by Kaspersky password stealing TROJAN! Note: This worm\trojan is located in C:\WINDOWS\X
windows updateMicrosoft.exeAdded by the TROJ_LMIR.A TROJAN!X
Win32KernelStartmicrosoft.exeAdded by the Troj/Delf-EWZ TrojanX
startkeyMicrosoft.exeAdded by the W32/Rbot-FSO WORM! Note: This worm\trojan is located in C:\Windows\System (Win9x/Me), C:\%WINDIR%\System32 (XP/WinNT/2K)X
Microsoft UpdateMicrosoft.exeAdded by the GAOBOT.AFJ WORM!X
Microsoft Information Checkmicrosoft.exeA variant of the IRCBot family of worms and IRC backdoor Trojans. Note: Located in \%WINDIR%\System32\ Note: Use SDFix under supervision.X
Microsoft Executingmicrosoft.exeAdded by the AGOBOT.UV WORM!X
microsoftmicrosoft.htaHTA file which creates an executable on the hard drive which subsequently proceeds to download files from a malware site!X
hptoolsmicrosoft.exeAdded by an unidentified TROJAN! of the Sdbot family. This worm\trojan is located in C:\%WINDIR%\MEDIA\ X
Dcom System PatchMicrosoft.exeAdded by the RANDEX.MS WORM!X
Configuration Loadermicrosoft.exeAdded by the GAOBOT.JB WORM!X
Microsoft WindowsMicrosoft Windows.htaHTA file which creates an executable on the hard drive which subsequently proceeds to download files from a malware site!X
Microsoft Windows ExpressMicrosoft UpdateAdded by a variant of the IRCBOT Note: Located in \%WINDIR%\System32\ Note: Use SDFix under supervision.X
Microsoft OfficeMicrosoft Office.htaHTA file which creates an executable on the hard drive which subsequently proceeds to download files from a malware site!X
Microsoft ExcelMicrosoft Excel.exeAdded by the Excel SA PUP.Optional.BuzzingDhol. Note: Located in \%Windir%\Microsoft Excel\Microsoft Excel\X
Microsoft ExcelMicrosoft Excel.WsFAdded by the Malware VBS_INJECT.D Note: Located in \%AppData%\Roaming\Microsoft Office\\X
MSCRMStartupMicrosoft.Crm.Application.Hoster.ex
e
Related to CRM from Microsoft integrated solutions for Financial, Supply Chain and Customer Relationship Management. Note: Located in \%Program Files%\Microsoft Dynamics CRM\Client\res\Web\bin\U
MicrosoftGesturesSyncMicrosoft.Gestures.Sync.exeRelated to Microsoft Corp. roject Prague is an SDK (software development kit). Note: Located in \%Program Files%\Microsoft Prague\U
WinUpdate:Microsoft Office Update for Windows XP.sysIdentified by Sophos as VBS/AutoRun-UC Note: Located in \%WINDIR%\X
msieckc.exexxx Added by the [url=http://greatis.com/appdata/d/m/msieckc.exe.htm] msieckc.exe [/url] Trojan-PSW.Generic [note]Located in \%AppData%\Roaming\Microsoft\Crypto
\DES64v7\[/note]
Added by the msieckc.exe Trojan-PSW.Generic Note: Located in \%AppData%\Roaming\Microsoft\Crypto\DES64v7\X


Powered by SystemLookup Engine. © 2008-2018 BrightFort. All Rights Reserved. | Privacy Policy | Terms of Use