Startup Applications List

Unfortunately, due to a change in my circumstances, the startup programs database here at Sysinfo.org will no longer be updated and the off-line downloads are no longer available. The version at Pacman's Portal will, however, continue to be updated and it's recommended that you refer to that site for more up to date information. The reason for this change in policy cannot be disclosed at this time but I hope you have enjoyed using the database here and thank you for your support and kind comments over the years.

Paul Collins

If you're frustrated with the time it takes your Windows 7/Vista/XP PC to boot and then it seems to be running slowly you may have too many programs running at start-up - and you have come to the right place to identify them. This is the original startup programs (as opposed to processes/tasks) list - one of the most accurate and comprehensive. Services are not included - see below. The database is mirrored in a slightly different format at Pacman's Portal.

"Name or Startup Item" in the table below refers to how an entry is displayed in MSConfig, Windows Defender or the registry "Run" keys. "Command or Data" refers to the program the entry runs. For further information on this and how to identify and disable startup programs you may want to also visit this page.

For further information on random startup entries please visit the Startups Info page.

Last update :- 29th July, 2011
24133 items listed

"Status" key:

- show all
all  others  A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  
Page No.: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54
Name or Startup ItemStatusCommand or DataDescriptionTested?
!AVG Anti-SpywareYavgas.exeSystem Tray access to and notifications for AVG Anti-Spyware 7.5. This has now been superseded by AVG Anti-Virus which includes Anti-SpywareYes
!ewidoYewido.exeSystem Tray access to and notifications for Ewido Anti-Spyware 4.0. Ewido is now part of AVG Technologies so this has been superseded by AVG Anti-Virus which includes Anti-SpywareYes
$sys$cmpX$sys$xp.exeAdded by the RYKNOS.B TROJAN! Attempts to utilize the Sony Rootkit A.K.A. SecurityRisk.First4DRM security risk to hide itself on the compromised computerNo
$sys$crashX$sys$sonyTimer.exeAdded by the WELOMOCH TROJAN!No
$sys$crashX$sys$sos$sys$.exeAdded by the WELOMOCH TROJAN!No
$sys$crashX$sys$WeLoveMcCOL.exeAdded by the WELOMOCH TROJAN!No
$sys$drvX$sys$drv.exeAdded by the RYKNOS TROJAN! Attempts to utilize the Sony Rootkit A.K.A. SecurityRisk.First4DRM security risk to hide itself on the compromised computerNo
$sys$momomomochinX$sys$sonyTimer.exeAdded by the WELOMOCH TROJAN!No
$sys$momomomochinX$sys$sos$sys$.exeAdded by the WELOMOCH TROJAN!No
$sys$momomomochinX$sys$WeLoveMcCOL.exeAdded by the WELOMOCH TROJAN!No
$sys$umaiyoX$sys$sonyTimer.exeAdded by the WELOMOCH TROJAN!No
$sys$umaiyoX$sys$sos$sys$.exeAdded by the WELOMOCH TROJAN!No
$sys$umaiyoX$sys$WeLoveMcCOL.exeAdded by the WELOMOCH TROJAN!No
%cmpmixtitle%?%cmpmixstr%Possibly related to C-Media Mixer Control panel?No
%Temp%X%Temp%\delwdef2008.batWinDefender 2008 rogue privacy program - not recommended, removal instructions hereNo
µTorrentNuTorrent.exeµTorrent - file sharing client for Windows sporting a very small footprint from BitTorrent, Inc. Designed to use as little cpu, memory and space as possible while offering all the functionality expected from advanced clients. For more information about the protocol see here. As µTorrent is a peer-to-peer (P2P) file-sharing client used to distribute large amounts of data between multiple users make sure you have good, up-to-date virus protection and check any downloadsYes
'AdwarePro'X'AdwarePro'.exeAdWarePro rogue security software - not recommendedNo
(Default)X[random filename].exeAdded by the BLACKMAL WORM! Note - this malware actually changes the value data of the "(Default)" key in HKLM\Run and HKLM\RunServices in order to force Windows to launch it at boot. The name field in MSConfig may be blankNo
(Default)X5640.exeAdded by the DOWNLD-ABF TROJAN! Note - this malware actually changes the value data of the "(Default)" key in HKCU\Run, HKLM\Run and HKLM\RunServices in order to force Windows to launch it at boot. The name field in MSConfig may be blankNo
*MS SetupX[random filename]Virtumondo adware, also known as the VUNDO TROJAN!No
*Windows [filename] CheckerX[filename]Added by the KEDEBE-B WORM!No
*WinLogonX[trojan path] ren time:[random number]Added by the VUNDO TROJAN!No
0X0.exeAdded by the AGENT-IO MALWARE!No
000StTHKU000StTHK.exeToshiba Hot key functionality for the function keys (Fn-Esc, Fn-F1 (lock), Fn-F2, Fn-F3, Fn-F4, Fn-F5 (switching between laptop and CRT display output), etc...)No
0050726-007-i32-1X0050726-007-i32-1.exeAdded by the BANCBAN-EC TROJAN!No
007-Anti-Spyware.exeX007-Anti-Spyware.exe007 Anti-Spyware rogue security software - not recommendedNo
00DSKSVR00?desksaver.exe saskdaPart of Advanced Desktop Shield, Easy Desktop Keeper, 1st Desktop Guard and Desktop Layout Keeper (and maybe others) - which give you the ability to save, restore, manage and lock your desktop layout that includes files and folders located on your desktop, placement of desktop icons, desired wallpaper and screen saver. The exact purpose of this startup entry is unknown at presentYes
00DSKSVR01Udesksaver.exe traySystem Tray access to Advanced Desktop Shield, Easy Desktop Keeper, 1st Desktop Guard and Desktop Layout Keeper (and maybe others) - which give you the ability to save, restore, manage and lock your desktop layout that includes files and folders located on your desktop, placement of desktop icons, desired wallpaper and screen saver. Disabling via the program's own options will leave this startup entry but it will not run - "desksaver.exe" does however run as it's also used as a serviceYes
00ERSRRRNKYUeraser.exePart of Evidence Exterminator, 1st Evidence Remover and Evidence Destructor (and maybe others) - the same file for the same version being used by all programs. Security tools that ensure your security and privacy by destroying all hidden activity information on demand, according to a schedule or on each boot/shutdown. This entry provides System Tray access to the main program for on demand cleaning and is required if any automatic cleaning has been scheduled. Located in %ProgramFiles%\Evidence Exterminator, %ProgramFiles%\1st Evidence Remover, %ProgramFiles%\Evidence Destructor or maybe othersYes
00notify33?NetBrowser.exePart of Best Network Security, 1st Network Admin and Corporate Network Security (and maybe others) - network-based password-protected security software that lets you impose access restrictions to all your PC workstations you have in your corporate network to stop users from tampering with them. The exact purpose of this startup entry is unknown at presentYes
00PCTFWYFirewallGUI.exeSystem Tray access to PC Tools Firewall Plus from PC Tools - which "is a powerful personal firewall for Windows that protects your computer from intruders and controls the network traffic in and out of your PC"Yes
00saskda?newlock.exe saskdaPart of Access Manager, 1st Security Agent, Security Administrator and PC Security Tweaker (and maybe others) - which let you control which users are allowed to access your PC and the level of access each user may have. You can choose to tweak access to lots of Control Panel applet functions, including Display, Network, Passwords, Printers, System, Add/Remove Programs, etc. The exact purpose of this startup entry is unknown at present but it appears to be related to the "Screen Lock" featureYes
00THotkeyU00THotKey.exeFor Toshiba Satellite notebook series to use the front buttons, play, stop, next, prev.No
0CF48.exeX0CF48.exeSecureDefense rogue security software - not recommended, removal instructions hereNo
0mcamcapX0mcamcap.exeAdded by the COSIAM-H TROJAN! No
0utlook ExpressX*****.exe [* = random char]Added by a variant of the RBOT WORM! Note the first letter is actually the digit "0" and not a capital "o"No
1X1.exeAdded by the ESTEEMS TROJAN!No
101ClipsU101Clips.exe101Clips - "the simplest of all multi-clipboard programs. Just have it running minimized and it captures everything you cut or copy from other programs. It keeps the last 25"No
1111swapmgr.exeX1111swapmgr.exeAdded by the BDOOR-IC BACKDOOR!No
12Ghosts BackupU12backup.exe12Ghosts Backup - "Automatic Backups, HyperBackup for Multiple Versions, Registry Backup"No
12Ghosts ClipU12clip.exe12Ghosts Clip - "Screen shots made easy"No
12Ghosts JustAWindowU12window.exe12Ghosts JustAWindow - "Cover annoying ads, animated gifs, things you don't want to see"No
12Ghosts Popup-KillerU12popup.exe12Ghosts Popup-KillerNo
12Ghosts SaveLayoutU12autosl.exe12Ghosts SaveLayout - "Always (always!) keep the layout of your desktop icons"No
12Ghosts SetColorU12color.exe12Ghosts SetColor - "Change your desktop icon text colors, also to transparent"No
12Ghosts ShowTimeU12showtime.exe12Ghosts Showtime - "Enhance the clock in your tray with font formatting, colors, date, time zones"No
12Ghosts SynchronizeU12sync.exe12Ghosts Synchronize - "Sync PC clock with an atomic clock over the Internet"No
12Ghosts TowerU12tower.exe12Ghosts Tower - "Quickly access and manage all Ghosts (included in all packages)"No
12Ghosts TrayProtectU12srvc.exe12Ghosts TrayProtect - "Hide tray icons, restore after a crash"No
12Ghosts WashU12wash.exe12Ghosts Wash - "Protect your privacy, clear browser history, delete and overwrite cache files"No
all  others  A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  
Page No.: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54

Notes & Warnings

Variables:

DISCLAIMER: It is assumed that users are familiar with the operating system they are using and comfortable with making the suggested changes. We will not be held responsible if changes you make cause a system failure.

WARNING: This is NOT a database of tasks/processes taken from Task Manager or the Close Program window (CTRL+ALT+DEL) but a database of startup applications, although you will find some of them listed via this method. Pressing CTRL+ALT+DEL identifies programs that are currently running - not necessarily at startup. For a list of tasks/processes you should try the Process Library from Uniblue, the list at PC Pitstop or one of the many others now available. Therefore, before ending a task/process via CTRL+ALT+DEL just because it has an "X" recommendation, please check whether it's in MSConfig or the registry first. An example would be "svchost.exe" - which doesn't appear in either under normal conditions but does via CTRL+ALT+DEL. If in doubt, don't do anything.

To avoid the database becoming too large, all virus entries are only shown using the registry version which is common to all Windows versions. Otherwise there would be multiple entries for popular filenames that viruses often use - such as "svchost" above for example. Multiple viruses can also use the same startup entries, in this case only those with significant differences (such as file location) are repeated in this database.

NOTE: There are a number of virus and malware entries listed in this database where specific removal instructions haven't been given. If this is the case then you could try ComboFix, a program written by sUBs that can remove many different types of Trojans and Worms. See here for a tutorial on how to use the program

IMPORTANT: A number of entries are repeated due to the way that different operating systems display startup items. For example, WinMe lists "POPROXY.EXE" as "Norton eMail Protect" in both MSCONFIG and the registry whereas WinXP lists it as "Poproxy" in MSCONFIG and "Norton eMail Protect" in the registry.

SERVICES: "Services" from the NT/2K/XP/Vista/7 operating systems are not included. I fully understand that some programs with these OS's use "Services" as an alternative to load their component parts at startup but these are handled in a different way. We recommend you try BlackViper for information on services for the relevant operating systems.

RECOMMENDATIONS:

If you're looking for a startup manager then why not try Spybot - Search & Destroy (by Safer Networking Ltd) as the startup programs section (select the Advanced mode) includes descriptions from this database. You might also want to try their RunAlyzer and FileAlyzer tools.

As there are more than 10,000 entries in this database related to viruses, trojans, worms and other malware we recommend you use a quality internet security package. Which ever you choose, keep it updated.

Fight spyware with SpybotSD

Copyright

Presentation, format & comments Copyright 2001 - 2011 Pacman's Portal
Portions Copyright Peter Forrest, Denny Denham, Sylvain Prevost, Tony Klein, CastleCops & Bleeping Computer
Database creation and support by Patrick Kolla
Software support by John Mayer
All rights reserved