![]() Windows startup programs - Database search. If you're frustrated with the time it takes your Windows 1. Il blog di Calabrò Davide, il miglior blog tecnico dell'anno! Fast downloads of the latest free software!***. Internet Explorer is the world's most popular Web browser. Security, ease of use, and improvements in RSS, CSS, and. ![]() Vista/XP PC to boot and then it seems to be running slowly you may have too. This is the original. Services are not included - see below. For further information on this and how to identify and disable. Introduction page. See here for further information on random entries - which are typically added by viruses and other. Last database update : - 3. August, 2. 01. 75. You can search for any of the following terms to find and display entries in the start- up programs database but the minimum search is 3. Search" button. Results are sorted by the Startup Item/Name field. From Windows 1. 0/8 Task Manager (CTRL+SHIFT+ESC → Startup): Name, Command (Note - right- click on any column heading and ensure "Command" is ticked)From MSConfig (Start → Run → msconfig → Startup): Startup Item, Command. From Registry Editor (Start → Run → regedit): Name, Data. From Sys. Internals free Auto. Runs utility: Auto. Run Entry, Filename from "Image Path"From Windows Defender for XP/Vista (Tools → Software Explorer): Display Name, Filename. O4 entries from Hijack. This or similar logging utilities: Text highlighted here - [this text] or here - "Startup: this text. Filename. Any other text. Alternatively, you can browse the full database (without the search facility) over a number of pages or. Command/Data field, but the results may. A | B | C | D | E | F | G | H | I | J | K | L | B | N | O | P | Q | R | S | T | U | V | W | X | Y | ZNOTE: Searching for common words (i. Please click on the Search button. WStartup Item or Name. Status. Command or Data. Description. Tested*wuauclt. Xw****. exe [* = random char]Added by a variant of the RBOT- UG WORM! Note - * in the filename represents a random char; variants spotted: wxmct. No. Shell. Xw**e. Detected by Malwarebytes as Backdoor. Agent. MTAGen. Note - this entry adds an illegal HKCU\Software\Microsoft\Windows NT\Current. Version\Winlogon "Shell" entry. The value data points to "w**e. Temp% - see examples here and here. No. Registry. Key. Xw. in. exe. Detected by Mc. Afee as Generic Back. Door! d. 2f and by Malwarebytes as Backdoor. Agent. Now. 0rm. Xw. Detected by Dr. Web as Trojan. Siggen. 3. 5. 03. Malwarebytes as Trojan. Agent. Now. 0rm. exe. Xw. 0rm. exe. Detected by Mc. Afee as RDN/Generic Dropper! Malwarebytes as Worm. Agent. E. Note - the file is located in %User. Startup% and its presence there ensures it runs when Windows starts. Now. 0rm. exe. Xw. Detected by Malwarebytes as Trojan. Agent. E. The file is located in %User. Temp% - see here. Now. 0rm. vbs. Xw. Detected by Dr. Web as Trojan. Down. Loader. 11. Note - the file is located in %User. Startup% and its presence there ensures it runs when Windows starts. Now. 0rm. 1. vbs. Xw. 0rm. 1. vbs. Detected by Dr. Web as Trojan. Down. Loader. 11. 3. 44. Malwarebytes as Trojan. Agent. VBS. Note - the file is located in %User. Startup% and its presence there ensures it runs when Windows starts. Now. 0rmname. exe. Xw. 0rmname. exe. Detected by Mc. Afee as Downloader. Malwarebytes as Worm. Agent. P2. PNo. W0r. MY. exe. XW0r. MY. Detected by Malwarebytes as Trojan. Agent. WRM. The file is located in %Temp%No. OV0. GGLLLHKLMXw. HD. exe. Detected by Mc. Afee as RDN/Generic. Malwarebytes as Backdoor. Agent. ENo. OV1. 0FXLLLLHKCUXw. HD. exe. Detected by Mc. Afee as RDN/Generic. Malwarebytes as Backdoor. Agent. ENo. Policies. Xw. 10dll. HD. exe. Detected by Mc. Afee as RDN/Generic. Malwarebytes as Backdoor. Agent. PGen. Now. Xw. 11. 2. vbs. Detected by Dr. Web as VBS. Packed. Malwarebytes as Trojan. Agent. VBS. Note - the file is located in %User. Startup% and its presence there ensures it runs when Windows starts. No. W1. 2XW1. 2. exe. Detected by Mc. Afee as RDN/Generic. Malwarebytes as Backdoor. Agent. WSNo. JUSHED. EXEXW1. 8HPRN5. ZF. Detected by Mc. Afee as Generic. Now. 1ndows_[4 characters]Xw. Detected by Malwarebytes as Trojan. Agent. E. The file is located in %App. Data% - see an example here. No. WINRUN z. XW1. NT4. 5K. exe. Added by the MYTOB. BL WORM! No. Windows Updtee Mgnr. XW1. NT4. 5K. exe. Added by the MYTOB. DC WORM! No. Windows modez Verifier. Xw. 1nz. 0zz. 0. exe. Added by a variant of W3. Sdbot. worm. Now. Xw. 32. exe. Detected by Symantec as Backdoor. Sokeven. Nowinnt DNS ident. Xw. 32. exe. Detected by Malwarebytes as Trojan. Agent. E. The file is located in %System%No. Winsock. 2 dlls. XW3. DLL. EXEAdded by the SPYBOT- CS BACKDOOR! No. Windows Updates. Xw. 32dns. exe. Detected by Sophos as W3. Sdbot- BFWNo. Windows Services. Xw. 32edus. exe. Detected by Kaspersky as Backdoor. Win. 32. IRCBot. gen and by Malwarebytes as Backdoor. Agent. Gen. No. Systray. Xw. 32explorer. exe. Detected by Sophos as W3. Rbot- AJYNo. Windows. Updatev. 4Xw. 32gins. Added by unidentified malware. The file is located in %Root%No. Java. SE Version Manager. Oracle (C) 2. 01. Xw. 32host. exe. Detected by Malwarebytes as Risk. Ware. Agent. E. The file is located in %App. Data%\Microsoft\WHost. No. Win. INIXw. 32m. Detected by Dr. Web as Trojan. Siggen. 6. 1. 73. Malwarebytes as Backdoor. Agent. ENostgclean? Part of IBM Standard Software Installer (ISSI) - which "is the deployment of a single software delivery process that minimizes the number of software delivery tools and processes required to support standard client platforms across the enterprise including all geographies and business divisions." What does it do and is it required? Now. 32msgr? w. 32maing. Part of IBM Standard Software Installer (ISSI) - which "is the deployment of a single software delivery process that minimizes the number of software delivery tools and processes required to support standard client platforms across the enterprise including all geographies and business divisions." What does it do and is it required? No. A New Windows Updater. Xw. 32. NTupdt. exe. Detected by Symantec as W3. Mytob. BM@mm. No. Windoxs Update Center. XW3. 2Rf. SA. exe. Added by a variant of W3. Sdbot. worm. No. Windows Update Center. XW3. 2RSA. exe. Detected by Malwarebytes as Backdoor. IRCBot. The file is located in %System%No. Windows Services. Xw. 32service. exe. Detected by Sophos as W3. Autorun- FU and by Malwarebytes as Backdoor. Agent. Gen. No. Windows Services. Xw. 32services. exe. Detected by Sophos as W3. Autorun- FT and by Malwarebytes as Backdoor. Agent. Gen. Now. 32sup. Xw. 32sup. exe. Adult content dialer. No. W3. 2SYSXw. 32sys. Detected by Sophos as W3. Jambu- ANo. STRINGSXW3. Tcp. Udp. exe. Detected by Mc. Afee as RDN/Generic Dropper and by Malwarebytes as Backdoor. Agent. DCENo. Secboot. Xw. 32tm. exe. Added by the HAXDOOR. D TROJAN! Now. 32update. Xw. 32. Update. exe. Detected by Dr. Web as Trojan. Siggen. 4. 2. 61. No. Win. 32 USB2. Driver. Xw. 32usb. Detected by Trend Micro as WORM_SPYBOT. DN and by Malwarebytes as Backdoor. Bot. No. Microsoftf DDEs Control. Xw. 33s. exe. Added by a variant of Backdoor: Win. Rbot. The file is located in %System%No. Pervasive. SQL Workgroup Engine. UW3dbsmgr. exe. Database Service Manager for Pervasive SQL 2. Workgroup edition. Required if you use Pervasive SQL but it's recommended you start it manually before using it as it has a tendancy to crash/freeze if loaded with other applications at startup. No. Access Web. Control. Xw. 3ssveds. exe. Added by the PPDOOR- M TROJAN! No. W7. exe Nacional. XW7. exe. Detected by Sophos as Troj/Agent- ODZNo. Microsoft Driver Setup. Xw. 7services. exe. Detected by Sophos as W3. Auto. Run- ARJ and by Malwarebytes as Worm. Palevo. Now. 7zip. Xw. 7zip. exe. Detected by Sophos as Troj/Bancban- QBNo. W8. 15. DMUW8. 15. DM. exe. Enuff Parental Control Software by Akrontech. Noddhelper. UW8. 15. DM. EXEEnuff Parental Control Software by Akrontech. No. Client agent for ARCserve? W9. 5AGENT. EXEClient agent on Win. CA ARCserve Backup from Computer Associates - which "is a comprehensive, distributed storage management solution for distributed and multiplatform environments. The application can back up and restore data from all the machines on your network, (including machines running Windows, UNIX, and Linux) using optional client agents". What does it do and is it required? Nodrmu. XW9. 5Mm. Homepage hijacker installing a toolbar: http: //tdko. Lop. com in disguise. Now. 98. Eject. Uw. Eject. exe. Related to USB support for a Sigmatel (acquired by IDT and now Tempo Semiconductor, Inc.) MP3 audio player (and others such as San. Disk). It's intent is to "put away" the "disk" before you unplug it from the USB port, ostensibly to avoid "losing" data. Nowa. 7pcw. Xwa. 7pcw. Win. Anti. Virus Pro 2. Nowab. exe. Xwab. Added by a variant of W3.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
November 2017
Categories |