Windows startup programs - Database search. If you're frustrated with the time it takes your Windows 1. Vista/XP PC to boot and then it seems to be running slowly you may have too. This is the original. Your best two options for cleaning up temporary data are the built-in Disk Cleanup tool and CCleaner. We’ve already discussed how to use these and other tools to. 12/20/2016 05:38:00. 4/26/2016 06:28:00. 4/26/2016 06:21:00. 4/26/2016 06:21:00. 4/26/2016 06:21:00. 11/1/2016 05:47:00. 4/26/2016 06:27:00. 4/27/2016 06:25:00. Services are not included - see below. For further information on this and how to identify and disable. Introduction page. See here for further information on random entries - which are typically added by viruses and other. Last database update : - 3. Built-in scheduler and command-line cleaning. You can schedule Mil Shield to clean at specific time intervals or once a day at specific time of day. Database of over 45K programs that can run on a Windows 10/8/7/Vista/XP system at start-up, including those created by viruses, worms, spyware, and trojans. You have not yet voted on this site! If you have already visited the site, please help us classify the good from the bad by voting on this site. June, 2. 01. 75. 15. You can search for any of the following terms to find and display entries in the start- up programs database but the minimum search is 3. Results are sorted by the Startup Item/Name field. From Windows 1. 0/8 Task Manager (CTRL+SHIFT+ESC . The file is located in %Windir%\system\system. No. HKCUXs. exe. Detected by Malwarebytes as Backdoor. HMCPol. Gen. The file is located in %Windir%\system\system. No. SEXEXS. exe. Detected by Intel Security/Mc. Afee as RDN/Generic. Malwarebytes as Backdoor. Agent. TJNo. Policies. Xs. exe. Detected by Malwarebytes as Backdoor. Agent. PGen. The file is located in %Windir%\system\system. No. Microsoft Intell Management. Xs. exe. Detected by Intel Security/Mc. Afee as W3. 2/Sdbot. Malwarebytes as Backdoor. Messa. Nowinsoft. Xs. exe. Detected by Dr. Web as Trojan. Down. Loader. 10. 2. 62. Malwarebytes as Backdoor. Messa. ENo. Android. Updater. Xs. exe. Detected by Malwarebytes as Malware. Trace. E. Note - this entry loads from the Windows Startup folder and the file is located in %Local. App. Data%\Temptemp. Nos. Xs. exe. Detected by Malwarebytes as Backdoor. Bot. The file is located in %User. Temp%\s. Nos. exe. Xs. exe. Detected by Trend Micro as WORM. Note - the file is located in %All. Users. Startup% and its presence there ensures it runs when Windows starts. Nos. exe. Xs. exe. Detected by Malwarebytes as Backdoor. Bot. Note - the file is located in %User. Startup% and its presence there ensures it runs when Windows starts. Noscain. Xs. 03. 01. Stub. exe. Delfin Media Viewer adware related. Nos. 0l. 4ris. Xs. Detected by Dr. Web as Trojan. Siggen. 5. 3. 36. Malwarebytes as Backdoor. Agent. ENo. Windows. DXs. 1. exe. Detected by Panda as MSNDiablo. ANosy. Xs. 2. exe. Added by a variant of Backdoor: Win. Rbot. The file is located in %System%No. S2. 4Ev. Mon? S2. Ev. Mon. exe. Event Monitor - supports driver extensions to NIC Driver for wireless adapters. Is it required? No. S3apphk. NS3apphk. A tool installed alongside the drivers for your S3 video output device. It is not necessary but should be allowed to run unless it is causing problems. No. S3 Internal Chip. Xs. 3chip. 3. exe. Detected by Sophos as W3. Agobot- FWNo. S3 Internal. Xs. 3chip. 4. exe. Detected by Sophos as W3. Agobot- FQNo. S3. Hotkey. Us. 3hotkey. Hotkey system tray icon to enable switching between monitors. Found on laptops with an S3 Twister integrated graphics card. No. S3 Chip. 3Xs. Detected by Total Defense as Win. Agobot. LM. The file is located in %System%No. S3. Mon? S3. Mon. S3. Duo. Vue multi- monitor taskbar helper by S3 Graphics. What does it do and is it required? No. S3 Internal Chip. Xs. 3serv. exe. Detected by Sophos as W3. Agobot- DDNo. S3. TRAYUS3. Tray. exe. S3 display configuration taskbar utility for S3 chipset based graphics cards. Can be run from Start. What does it do and is it required? No. S3. Trayp. US3trayp. S3 display configuration taskbar utility for S3 chipset based graphics cards. Can be run from Start. The file is located in %User. Profile%\s. 4t. 4n. Nos. 5markrun. US5mark. Detected by Malwarebytes as PUP. Optional. S5. Mark. The file is located in %Program. Files%\S5. If bundled with another installer or not installed by choice then remove it. Nos. 8kxmrxc. 7d. Xs. 8kxmrxc. 7d. exe. Detected by Malwarebytes as Trojan. Agent. The file is located in %User. Profile%No. T8. 1Z6. Xsa- 2. 00. 62. 2. Detected by Symantec as W3. Rontokbro@mm. The file is located in %Windir%No. T8. 1Z6. 27. Xsa- 3. Detected by Kaspersky as Virus. Win. 32. Sality. bh. The file is located in %Windir%No. T8. 1Z6. 27. Xsa- 3. Detected by Kaspersky as Virus. Win. 32. Virut. q and by Malwarebytes as Worm. Auto. Run. The file is located in %Windir%No. T1. 4Z8. 40. Xsa- 5. Detected by Intel Security/Mc. Afee as W3. 2/Moon. Light. worm and by Malwarebytes as Worm. VB. UI. The file is located in %Windir%No. Stay. Alive. Usa. Stay. Alive from TFI Technology. Is it required? Nosdae. Xsa. 34. 34. exe. Detected by Malwarebytes as Worm. Auto. Run. Gen. The file is located in %Recycled%\. A3. D sound features won't work with this disabled. No. Aureal A3. D Interactive Audio. Ysa. 3dsrv. exe. For Aureal based 3. D soundcards. A3. D sound features won't work with this disabled. Nos. Aa. AVc. Avv. OACSXs. Aa. AVc. Avv. OACS. exe. Windows. Fix. Disk rogue security software - not recommended, removal instructions here. Nosaap. Xsaap. exe. No. Sabre Server. Usabserv. exe. Part of the Sabre computer reservations system/global distribution system (GDS) - used by airlines, railways, hotels, travel agents and other travel companies for reservations and ticketing. No. Sabreserver. USABSERV. EXEPart of the Sabre computer reservations system/global distribution system (GDS) - used by airlines, railways, hotels, travel agents and other travel companies for reservations and ticketing. No. Sabre Printing Start. USabstart. exe. Part of the Sabre computer reservations system/global distribution system (GDS) - used by airlines, railways, hotels, travel agents and other travel companies for reservations and ticketing. No. Sabre Task Tray Icon. USabstart. exe. Part of the Sabre computer reservations system/global distribution system (GDS) - used by airlines, railways, hotels, travel agents and other travel companies for reservations and ticketing. Nosac. Xsac. exe. Detected by Symantec as Adware. Search. No. SACCXsacc. Detected by Symantec as Adware. Surf. Accuracy and by Malwarebytes as Adware. Surf. Accuracy. No. Surf. Accuracy. Xsacc. Detected by Symantec as Adware. Surf. Accuracy and by Malwarebytes as Adware. Surf. Accuracy. Nosacfilter. Xsacfilter. 34. exe. Detected by Sophos as Troj/Agent- WVZNo. Onluna Sarvice. Xsachost. Detected by Sophos as Troj/Tofger- AANo. Onlune Sarvice. Xsachost. Detected by Sophos as Troj/Daemoni- JNo. Host. Srv. Xsachostx. Added by the LOOKSKY. H WORM! Drops multiple files in %System%No. Host. Srv. Xsachostx. Added by the LOOKSKY. E WORM! Nosacnacfofgas. Xsacnacfofgas. exe. Detected by Intel Security/Mc. Afee as RDN/Generic. Malwarebytes as Trojan. Agent. USNosacrosanct. Usacrosanct. exe. Detected by Malwarebytes as PUP. Optional. Dot. Do. The file is located in %Program. Files%\micra. If bundled with another installer or not installed by choice then remove it, removal instructions here. Nosaczorqequis. Xsaczorqequis. Detected by Dr. Web as Trojan. Inject. 2. 5. 58. Malwarebytes as Trojan. Agent. Nosad. exe. Xsad. exe. Detected by Malwarebytes as Backdoor. Agent. E. Note - the file is located in %User. Startup% and its presence there ensures it runs when Windows starts. No(Default)Xsad. exe. Detected by Malwarebytes as Backdoor. Agent. E. Note - this malware actually changes the value data of the . The name field in MSConfig may be blank and the file is located in %User. Startup%No. Micro. Soft ssas. 3s. 1XSADASDA. Added by a variant of Backdoor: Win. Rbot. The file is located in %System%No. Super. Ad. Blocker. USAd. Block. exe. The file is located in %System%No. Shell. Xsafe- hvdy. Detected by Dr. Web as Trojan. Fake. AV. 1. 63. 86 and by Malwarebytes as Rogue. Agent. WPS. Note - this entry adds an illegal HKCU\Software\Microsoft\Windows NT\Current. Version\Winlogon . The value data points to . Note - this rogue adds an illegal HKCU\Software\Microsoft\Windows NT\Current. Version\Winlogon . The value data points to . Note - the file is located in %User. Startup% and its presence there ensures it runs when Windows starts. No. Safe. USafe. exe. Loads version 1. 4 of the Steganos Safe encryption utility in windowed mode at startup (which is configured via Extras ? This entry is for the version included with Steganos Privacy Suite. Yes. Sys. Desktop. XSafe. exe. Detected by Dr. Web as Trojan. Down. Loader. 3. 2. 70. No. Steganos Privacy Suite 1. USafe. exe. Loads version 1. Steganos Safe encryption utility in windowed mode at startup (which is configured via Extras ? This entry is for the version included with Steganos Privacy Suite. Yes. Steganos Safe 1. USafe. exe. Loads version 1. Steganos Safe encryption utility in windowed mode at startup (which is configured via Extras ? Net. Screen- Remote client is certified by the International Computer Security Association (ICSA) as an IPsec- compliant VPN solution. The file is located in %Common. Files%No. Safe. Fighter. XSafe. Fighter. exe. Safe. Fighter rogue security software - not recommended, removal instructions here. A member of the Wini. Guard family. No. Browser Infrastructure Helper. USafe. Finder. exe. Safe. Finder ad- supported browser enhancement by Linkury. Detected by Malwarebytes as PUP. Optional. Smart. Bar. The file is located in %Local. App. Data%\Smartbar\Application. If bundled with another installer or not installed by choice then remove it. No. Safe. Guard. USafe. Guard. exe. Detected by Malwarebytes as PUP. Optional. Safe. Guard. Note - this entry loads from the Windows Startup folder and the file is located in %Program. Files%\Safe. Guard. If bundled with another installer or not installed by choice then remove it, removal instructions here. No. Safeguard. exe. XSafeguard. exe. Super Spyware Killer rogue spyware remover - not recommended. The file is located in %Program. Files%\Super. Spyware. Killer. No. Safe. Guard. USafe. Guard. App. exe. Detected by Malwarebytes as PUP. Optional. Safe. Guard. The file is located in %Program. Files%\Safe. Guard. If bundled with another installer or not installed by choice then remove it, removal instructions here. Noload. XSafe. Microsoft. Detected by Malwarebytes as Backdoor. Agent. Note - this entry modifies the legitimate HKCU\Software\Microsoft\Windows NT\Current. Version\Windows . The file is located in %User. Profile%\My User. Programs. No. Safe. OFFNSafe. Off. exe.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
August 2017
Categories |