Support Forum Articles File Help Startup DB Tips Service DB Hijack This! Analyzer

 

HijackThis automated log analyzer! Get your logs analyzed INSTANTLY!

Key:

  • "Y" - Normally leave to run at start-up
  • "N" - Not required - typically infrequently used tasks that can be started manually if necessary
  • "U" - User's choice - depends whether a user deems it necessary
  • "X" - Definitely not required - typically viruses, spyware, adware and "resource hogs"
  • "?" - Unknown
Startup Name Process Name Details
X ools.exe tools.exe"FastFind adware variant"
X system32.exe"Added by the AGOBOT-KU WORM! Note - has a blank entry under the Startup Item/Name field"
X pathex.exe"Added by the MKMOOSE-A WORM! Note - has a blank entry under the Startup Item/Name field"
X svchost.exe"Added by the DELF-UX TROJAN! Note - this is not the legitimate svchost.exe process which is always located in %System% and should not normally figure in Msconfig/Startup! This one is located in %Windir%. Note - has a blank entry under the Startup Item/Name field"
X MSPF.EXE"Added by a variant of the SDBOT WORM! This file is located in the Winnt or Windows folder. Note - has a blank entry under the Startup Item/Name field"
X dllvirtual.exe"Added by the DADOBRA-IW TROJAN! Note - has a blank entry under the Startup Item/Name field"
X dllvirtual.dll"Added by the DADOBRA-IW TROJAN! Note - has a blank entry under the Startup Item/Name field"
X dllvirtual.js"Added by the DADOBRA-IW TROJAN! Note - has a blank entry under the Startup Item/Name field"
X ajsha5.exe"Added by the SPYBOT-NX WORM! Note - has a blank entry under the Startup Item/Name field"
X ne.exe"Added by the IRCBOT-ZL TROJAN! Note - has a blank entry under the Startup Item/Name field"
X iexpl0re.exe"Added by the RBOT-SD WORM! Note - has a blank entry under the Startup Item/Name field"
X gbpm.exe"Added by the DLOADR.ZZD WORM! Note - has a blank entry under the Startup Item/Name field"
X regedit.exe /s appboost.reg"Added by the APPIX.D WORM! Note - this malware actually changes the value data of the ""(Default)"" key in HKLM\Run and HKCU\RunServices in order to force Windows to launch it at boot. The name field in MSConfig may be blank. The Windows registry editor (regedit.exe) is a legitimate Microsoft file located in %Windir% and shouldn't be deleted. The file ""appboost.reg"" is located in %Windir%"
Note the filename has a ""0"" rather than an upper case ""o"""
Y !1_pgaccount pgaccount.exe"DiamondCS ProcessGuard security software - stops malicious worms and trojans from being executed silently in the background
Y !1_ProcessGuard_Startup procguard.exe"DiamondCS ProcessGuard security software - stops malicious worms and trojans from being executed silently in the background
Y !AVG Anti-Spyware avgas.exe"System Tray access to and notifications for AVG Anti-Spyware 7.5. This has now been superseded by AVG Anti-Virus which includes Anti-Spyware"
Y !ewido ewido.exe"System Tray access to and notifications for Ewido Anti-Spyware 4.0. Ewido is now part of AVG Technologies so this has been superseded by AVG Anti-Virus which includes Anti-Spyware"
N !NoLoad winrecon.exe"WinRecon keystroke logger/monitoring program - remove unless you installed it yourself!"
main dri " Xwininfo.exe
U "aimb.exe"" -h" aimb.exe"IMSufSentinel is a spy program which can record IM conversations
Consume "Consumer Input Rewarded with MyPoints U"ConsumerInputRewardedwithMyPoints
Consume "Consumer Input Rewarded with MyPoints U"ConsumerInputRewardedwithMyPoints
Inc." "Machine Works Xaecces.exe
Inc." "Microsoft Associates Xiexplorer.exe
Inc." "Microsoft NetMeeting Associates XNetMeeting.exe
Inc." "Miramar Systems Uatmsg.exe
ME" "MS Java Applets for Windows NT Xjavaapplets.exe
NT "Ms Java for Windows 98 ME & XP"X
NT "Ms Java for Windows 98 XP & ME"X
XP & ME "MS Java for Windows NT Xxpjavams.exe
Version "NVIDIA Compatible Windows Vista Display driver U"RUNDLL32.EXE NvCpl.dll
Version "NVIDIA Compatible Windows7 Display driver U"RUNDLL32.EXE NvCpl.dll
Version "NVIDIA Driver Helper Service U"RUNDLL32.EXE nvsvc.dll
Version "NVIDIA nView Control Panel Nnwiz.exe
Mass" "Telechips Upatch.exe
please "This is a virus Xbigbadvirus.exe
X "Vaganza-XPloit-[User Name]""" [user name].exe"Added by the GAVGENT.A WORM!"
" "[Ephemeral 2.4] by TreeHugger X[path to worm]
" "[Ephemeral 2.5] by TreeHugger X[path to worm]
" "[Ephemeral 2.x] by TreeHugger X[path to worm]
Y #NAME? ZkRunOnceR.exeInternet Security Suite used by ISPs to protect customers against many attacks
U $EnterNet Enternet.exe"Connection manager for the EnterNet ISP. You can also use RASPPOE"
X $sys$cmp $sys$xp.exe"Added by the RYKNOS.B TROJAN! Attempts to utilize the Sony Rootkit A.K.A. SecurityRisk.First4DRM security risk to hide itself on the compromised computer"
X $sys$crash $sys$sonyTimer.exe"Added by the WELOMOCH TROJAN!"
X $sys$crash $sys$sos$sys$.exe"Added by the WELOMOCH TROJAN!"
X $sys$crash $sys$WeLoveMcCOL.exe"Added by the WELOMOCH TROJAN!"
X $sys$drv $sys$drv.exe"Added by the RYKNOS TROJAN! Attempts to utilize the Sony Rootkit A.K.A. SecurityRisk.First4DRM security risk to hide itself on the compromised computer"
X $sys$momomomochin $sys$sonyTimer.exe"Added by the WELOMOCH TROJAN!"
X $sys$momomomochin $sys$sos$sys$.exe"Added by the WELOMOCH TROJAN!"
X $sys$momomomochin $sys$WeLoveMcCOL.exe"Added by the WELOMOCH TROJAN!"
X $sys$umaiyo $sys$sonyTimer.exe"Added by the WELOMOCH TROJAN!"
X $sys$umaiyo $sys$sos$sys$.exe"Added by the WELOMOCH TROJAN!"
X $sys$umaiyo $sys$WeLoveMcCOL.exe"Added by the WELOMOCH TROJAN!"
U $Volumouse$ volumouse.exe"Volumouse from Nirsoft. ""Provides you a quick and easy way to control the sound volume on your system - simply by rolling the wheel of your wheel mouse"""
X $WindowsRegKey%update IEXPLORE.EXE"Added by the RBOT-EZ WORM! Note - this is not the legitimate Internet Explorer (iexplore.exe) which is always located in %ProgramFiles%\Internet Explorer and should not normally figure in Msconfig/Startup! This one is located in %System%"
? %cmpmixtitle% %cmpmixstr%"Possibly related to C-Media Mixer Control panel?"
N %FP%012-L2TP fts.exe fts.exe012.Net.il Israeli ISP software front-end
U %FP%012-L2TP FWPortal.exe FWPortal.exe012.Net.il Israeli ISP dial-up software
N %FP%1776 Internet fts.exe fts.exe1776 Internet US ISP software ISP software front-end
U %FP%1776 Internet FWPortal.exe FWPortal.exe1776 Internet US ISP dial-up software
N %FP%AIRTEL fts.exe fts.exe"Bharti Airtel Broadband - Indian ISP software front-end"
N %FP%Barak013 fts.exe fts.exeBarak013 Israeli ISP software front-end
U %FP%Barak013 FWPortal.exe FWPortal.exeBarak013 Israeli ISP dial-up software
N %FP%Friendly fts.exe fts.exeFriendly ISP software front-end
X %Temp% %Temp%delwdef2008.bat"WinDefender 2008 rogue privacy program - not recommended
X %Windir%winnl.exe winnl.exe"Added by the KIDKITI TROJAN!"
X %Windir%winnm.exe winnm.exe"Added by the KIDKITI TROJAN!"
X 'AdwarePro' 'AdwarePro'.exe"AdWarePro rogue security software - not recommended"
Y 'Ashampoo AntiSpyWare 2 Guard' AntiSpyWare2Guard.exe"Part of Ashampoo® AntiSpyWare 2 from Ashampoo GmbH & Co. KG. This part is the realtime monitor that looks for changes on the users system such as BHO
X (*)API Machine winSOCKS.exe"Homepage hijacker
X (*)Run win32API.exe"Homepage hijacker
X (Default) media_driver.exe"Added by the TUPEG VIRUS! Note - this malware actually changes the value data of the ""(Default)"" key in HKLM\Run in order to force Windows to launch it at boot. The name field in MSConfig may be blank"
X (Default) Shania.vbs"Added by the SHANIA BACKDOOR! Note - this malware actually changes the value data of the ""(Default)"" key in HKLM\Run in order to force Windows to launch it at boot. The name field in MSConfig may be blank"
X (Default) NOTEPAD.exe"Added by the RUSTY WORM! Note - not to be confused with the valid Windows ""NOTEPAD"" text editor! Note - this malware actually changes the value data of the ""(Default)"" key in HKLM\Run in order to force Windows to launch it at boot. The name field in MSConfig may be blank"
X (Default) [random filename].exe"Added by the BLACKMAL WORM! Note - this malware actually changes the value data of the ""(Default)"" key in HKLM\Run and HKLM\RunServices in order to force Windows to launch it at boot. The name field in MSConfig may be blank"
X (Default) twunk_32.exe"Added by the BLACKMAL.C WORM! Note - this malware actually changes the value data of the ""(Default)"" key in HKLM\Run in order to force Windows to launch it at boot. The name field in MSConfig may be blank"
X (Default) winhelp.exe"Added by the BLACKMAL.C WORM! Note - this malware actually changes the value data of the ""(Default)"" key in HKLM\Run in order to force Windows to launch it at boot. The name field in MSConfig may be blank"
X (Default) spolsvr2.exe"Added by the EVILSOCK.10 TROJAN! Note - this malware actually changes the value data of the ""(Default)"" key in HKLM\Run in order to force Windows to launch it at boot. The name field in MSConfig may be blank"
X (Default) winbas12.exe"Adware
X (Default) Systrsy.exe"Added by the CDTRAY TROJAN! Note - this malware actually changes the value data of the ""(Default)"" key in HKLM\Run in order to force Windows to launch it at boot. The name field in MSConfig may be blank"
X (Default) llsass.exe"Added by the PROXY-GG TROJAN! Note - this malware actually changes the value data of the ""(Default)"" key in HKLM\Run in order to force Windows to launch it at boot. The name field in MSConfig may be blank"
X (Default) syspol.exe"Added by the DREMN-B TROJAN! Note - this malware actually changes the value data of the ""(Default)"" key in HKCU\Run in order to force Windows to launch it at boot. The name field in MSConfig may be blank"
X (default) winlog.exe"Added by the RBOT-CVY WORM! Note - this malware actually changes the value data of the ""(Default)"" key in HKLM\Run and HKLM\RunServices in order to force Windows to launch it at boot. The name field in MSConfig may be blank"
X (default) "rundll32.exe [path to DLL file]Do98Work"
X (Default) winligom.exe"Added by the RBOT-GAI WORM! Note - this malware actually changes the value data of the ""(Default)"" key in HKCU\Run
X (Default) 5640.exe"Added by the DOWNLD-ABF TROJAN! Note - this malware actually changes the value data of the ""(Default)"" key in HKCU\Run
X (Default) QQUpdate.exe"Added by the QUADRULE.A WORM! Note - this malware actually changes the value data of the ""(Default)"" key in HKLM\Run in order to force Windows to launch it at boot. The name field in MSConfig may be blank"
X (Default) Mcafee.exe"Added by the AGENT.AY TROJAN! Note - this is not a valid McAfee program and is located in %System%. This malware actually changes the value data of the ""(Default)"" key in HKCU\Run in order to force Windows to launch it at boot. The name field in MSConfig may be blank"
X (Default) fada.exe"Added by the VB.HEI TROJAN! Note - this malware actually changes the value data of the ""(Default)"" key in HKLM\Run
X (Default) Default.exe"Added by the AUTORUN.BUK WORM! Note - this malware actually changes the value data of the ""(Default)"" key in HKLM\RunOnce & HKCU\RunOnce in order to force Windows to launch it at boot. The name field in MSConfig may be blank"
X (Default) KEYBOARD.exe"Added by the AUTORUN.BUK WORM! Note - this malware actually changes the value data of the ""(Default)"" key in HKLM\Run in order to force Windows to launch it at boot. The name field in MSConfig may be blank"
X (Default) msarti.com"Added by the SILLYFDC.CJ WORM! Note - this malware actually changes the value data of the ""(Default)"" key in HKLM\..\Policies\Explorer\Run in order to force Windows to launch it at boot. The name field in MSConfig may be blank"
X (Default) msnupdate.exe"Added by the RBOT-GWT BACKDOOR! Note - this malware actually changes the value data of the ""(Default)"" key in HKLM\Run & HKLM\RunServices in order to force Windows to launch it at boot. The name field in MSConfig may be blank"
X (Default) xtreme.exe"Added by the DROPR-CZ TROJAN! Note - this malware actually changes the value data of the ""(Default)"" key in HKLMRun in order to force Windows to launch it at boot. The name field in MSConfig may be blank"
X (L4r1$$4) (4nt1) (V1ruz) SP00Lsv32.pif"Added by the ASSIRAL.B WORM!"
X *Bandook msdll.exe"Added by an unidentified TROJAN - see here"
X *Intelli Mouse Pro Version 2.0B* ncsjapi32.exe"Added by the BUZUS-O WORM!"
X *JanisRuckenbrodII janis.com"Added by the POPS WORM!"
X *Microsoft Update ctxma.exe"Added by the STMU TROJAN!"
X *Microsoft Update cxma.exe"Added by the STMU TROJAN!"
X *Microsoft Update wstcl.exe"Added by the STMU TROJAN!"
X *Microsoft Update wucxt.exe"Added by the STMU TROJAN!"
X *Microsoft Update wuytc.exe"Added by the STMU TROJAN!"
X *MS Setup [random filename]"Virtumondo adware
X *MSConfig32 aecache.exe"Detected by F-Secure as the OBFUSCATED.GP TROJAN!"
Y *Restore rstrui.exePart of Windows System Restore and added as a RunOnce registry entry. Leave alone
X *Security Center secctr.exe"Added by the SDBOT.BRO WORM!"
Y *StateMgr statemgr.exeWindows ME default for System Restore. Do NOT disable!
N *WerKernelReporting WerFault.exe"Part of Windows Error Reporting technology (WER) for Vista. WER captures software crash and hang data from end-users who agree to report it - see here"
X *windows update wrauclt.exe"Added by the RBOT-QU WORM!"
X *windows update wuanclt.exe"Added by the RBOT-PG WORM!"
X *windows update wuaucrlt.exe"Added by the SPYBOT.HUR WORM!"
X *windows update wuraclt.exe"Added by the RBOT-PO WORM!"
X *windows update wurauclt.exe"Added by the RBOT-SY WORM!"
X *windows update wsctl.exe"Added by the SPYBOT.PR WORM!"
X *windows update wkmst.exe"Added by the SDBOT.AVD WORM!"
X *windows update wscxt.exe"Added by the RBOT.AOS WORM!"
X *windows update waurclt.exe"Added by a variant of the RBOT WORM!"
X *windows update wuaruclt.exe"Added by the RBOT-TF WORM!"
X *Windows [filename] Checker [filename]"Added by the KEDEBE-B WORM!"
X *WindowsAudio systemupd.exe"Added by the AGENT-TH WORM!"
X *WinLogon [trojan path] ren time:[random number]"Added by the VUNDO TROJAN!"
X *winstats winstats.exe"Added by the GARGAFX TROJAN!"
X *wuauclt.exe w****.exe [* = random char]"Added by a variant of the RBOT-UG WORM! Note - * in the filename represents a random char; variants spotted: wxmct.exe
X *zggjmyd zggjmyd.exe"Added by the AFCORE.O BACKDOOR!"
X -=+(L4r1$$4)+=-(4nt1)-=+(V1ru$)=-+ ISASS.exe"Added by the ASSIRAL.B WORM!"
X .. ABC2007.exe"Added by the DLOADR-ASH TROJAN!"
X .mscdr lassa.exe"Added by the WEBUS.C TROJAN!"
X .mscdr lsvchost.exe"Added by the WEBUS.D TROJAN!"
X .mscdsr lsvchost.exe"Added by the BDOOR-CR BACKDOOR!"
X .mscsbl svhost.exe"Added by the CMQ TROJAN!"
X .msfupdate msveup.exe"Added by the ALLOCUP.A WORM!"
X .mssecure mssecure.exe"Added by the DDOS_BOXED.X TROJAN!"
? .NET config sysmon32.exe"??"
X .NET. msnmgnr.exe"Added by the DELF.AYF WORM!"
X .norton rchost.exe"Added by the BOXED-H TROJAN!"
X .nvsvc smss.exe"Added by the IRCBOT-FP TROJAN! Note - this is not the legitimate smss.exe process which should not normally figure in Msconfig/Startup!"
X .nvsvcb smssb.exe"Added by the BOXED.CG TROJAN!"
X .Prog services.exe"Added by the NEVEG.B or NEVEG.C WORMS! Note - this is not the legitimate services.exe process
X .Prog winlogon.exe"Added by the NEVEG.A WORM! Note - this is not the legitimate winlogon.exe process
X .protected N/A"Smitfraud variant"
X .svchost CSRSS.EXE"Added by the WEBUS.F TROJAN! Note - this worm replaces the legitimate csrss.exe process which is always located in %System% and should not normally figure in Msconfig/Startup!"
X .TEXTCONV csrss.exe"Added by the WEBUS TROJAN! Note - this is not the legitimate csrss.exe process which should not normally figure in Msconfig/Startup!"
X .TEXTCONV lsass.exe"Added by the WEBUS.B TROJAN! Note - this is not the legitimate lsass.exe process which should not normally figure in Msconfig/Startup!"
X .WMAudio csrss.exe"Added by the WEBUS TROJAN! Note - this is not the legitimate csrss.exe process which should not normally figure in Msconfig/Startup!"
X .WMAudio lsass.exe"Added by the WEBUS.B TROJAN! Note - this is not the legitimate lsass.exe process which should not normally figure in Msconfig/Startup!"
N /l:eng N/A"Related to the Dell OEM version of the Sound Blaster Audigy 2 sound card. If this item is listed and checked in startup
N /s N/A"Related to the Dell OEM version of the Sound Blaster Audigy 2 sound card. If this item is listed and checked in startup
U 0 pit.exe"PrivateEye surveillance software. Uninstall this software unless you put it there yourself"
X 000hpdllhos hpdllhost.exe"LZIO.com adware downloader"
U 000StTHK 000StTHK.exe"Toshiba Hot key functionality for the function keys (Fn-Esc
X 0050726-007-i32-1 0050726-007-i32-1.exe"Added by the BANCBAN-EC TROJAN!"
X 007-Anti-Spyware.exe 007-Anti-Spyware.exe"007 Anti-Spyware rogue security software - not recommended"
? 00DSKSVR00 desksaver.exe saskda"Part of Advanced Desktop Shield
U 00DSKSVR01 desksaver.exe tray"System Tray access to Advanced Desktop Shield
U 00ERSRRRNKY eraser.exe"Part of Evidence Exterminator
? 00notify33 NetBrowser.exe"Part of Best Network Security
Y 00PCTFW FirewallGUI.exe"System Tray access to PC Tools Firewall Plus from PC Tools - which ""is a powerful personal firewall for Windows that protects your computer from intruders and controls the network traffic in and out of your PC"""
? 00saskda newlock.exe saskda"Part of Access Manager
Y 00TCrdMain TCrdMain.exeRelated to the flash card slot on a Toshiba laptop. Ending this process will disable access to the flash cards
U 00THotkey 00THotKey.exe"For Toshiba Satellite notebook series to use the front buttons
U 00THotkey system32THotkey.exe"For Toshiba Satellite notebook series to use the front buttons
U 0190 Warner WARN0190.EXE"Anti-dialer program (Germany)"
U 0900 Warner WARN0900.EXE"Anti-dialer program (Germany)"
X 0mcamcap 0mcamcap.exe"Added by the COSIAM-H TROJAN!"
X 0utlook Express *****.exe [* = random char]"Added by the RBOT-CC WORM! Note the first letter is actually the digit ""0"" and not a capital ""o"""
X 0_AVD32 xzboot.exe"Added by the AGENT-IWI TROJAN!"
X 1 1.exe"Added by the ESTEEMS TROJAN!"
X 1 lsass.scr"Added by the BANCOS.V TROJAN!"
X 1 svchost.scr"Added by the BANCOS.X TROJAN!"
X 1 mrcmgr.exe"Added by the BANKER.RQK TROJAN!"
X 1 KHATRA.exe"Added by the AUTOIT-BP WORM!"
X 1 addit.exe"Added by the SDBOT-RI WORM!"
N 1&1 EasyLogin EasyLogin.exe"1&1 EasyLogin - quick access to webhost 1&1's Control Panel
X 1-sukarno sukarno.exe"Added by the BRONTOK-CR WORM!"
U 101Clips 101Clips.exe"101Clips - ""the simplest of all multi-clipboard programs. Just have it running minimized and it captures everything you cut or copy from other programs. It keeps the last 25"""
X 1029BB4B-16A9-4E77-AA3D-96930BD68EEC sysockeu.exe"Added by the FAKEALERT-AH TROJAN!"
X 10Base-T explore.exe"Added by the AGOBOT-IJ WORM!"
X 1111swapmgr.exe 1111swapmgr.exe"Added by the BDOOR-IC BACKDOOR!"
X 1234klsjdc uiar924c af sxgnsvuxct.exe"Added by the FAKEALERT-AM TROJAN!"
X 1234klsjdc uiar924c af sysvtypkbjx.exe"Added by the FAKEALERT-AM TROJAN!"
X 123Monitor SpywareFreeMonitor.exe"1-2-3 Spyware Free rogue spyware remover - not recommended
U 12Ghosts Backup 12backup.exe"12Ghosts Backup - ""Automatic Backups
U 12Ghosts Clip 12clip.exe"12Ghosts Clip - ""Screen shots made easy"""
U 12Ghosts JustAWindow 12window.exe"12Ghosts JustAWindow - ""Cover annoying ads
U 12Ghosts Popup-Killer 12popup.exe"12Ghosts Popup-Killer"
U 12Ghosts SaveLayout 12autosl.exe"12Ghosts SaveLayout - ""Always (always!) keep the layout of your desktop icons"""
U 12Ghosts SetColor 12color.exe"12Ghosts SetColor - ""Change your desktop icon text colors
U 12Ghosts ShowTime 12showtime.exe"12Ghosts Showtime - ""Enhance the clock in your tray with font formatting
U 12Ghosts Synchronize 12sync.exe"12Ghosts Synchronize - ""Sync PC clock with an atomic clock over the Internet"""
U 12Ghosts Tower 12tower.exe"12Ghosts Tower - ""Quickly access and manage all Ghosts (included in all packages)"""
U 12Ghosts TrayProtect 12srvc.exe"12Ghosts TrayProtect - ""Hide tray icons
U 12Ghosts Wash 12wash.exe"12Ghosts Wash - ""Protect your privacy
N 12Voip 12Voip.exe"12Voip - free internet telephony utility using the VoIP (Voice over Internet Protocol). Call online friends for free and regular phones either for free (limited use) or low rates. One of a number provided by Betamax - the others generally have different rate plans. Similar to the more popular Skype"
U 1455 Scan2PC Scan2pc.exeScan to PC application for the scanning function of the Samsung SCX1455 multifunction printer
? 17779Proj2002 N/A"??"
X 180adsolution 180adsolution.exe"180solutions adware"
X 180ax 180ax.exe"180Search adware"
X 180ClientStubInstall stubinstaller****.exe [* = digit]"180Solutions adware related"
X 180ClientStubInstall [path to trojan]"180Solutions adware related"
X 180ClientStubInstall ******.tmp [* = random digit/char]"180Solutions adware related"
X 180sa 180sa.exe"180Search adware"
X 1916435341.exe 1916435341.exe"Added by the DLOADR-AXU TROJAN!"
X 196_150_ni 196_150_ni.exe"WinFixer web installer - ""foistware""
X 197_150_ni_3 197_150_ni_3.exe"WinFixer web installer - ""foistware""
X 197_150_ni_7 197_150_ni_7.exe"WinFixer web installer - ""foistware""
N 1:00 hpdrv.exeHP utility for monitoring when and how many recoveries have been done
U 1A:MacVisionTrayMonitor TrayMonitor.exe"Part of MacVision by Jeff Bargmann - an discontinued program that makes your PC's desktop look and feel incredibly like that of a Macintosh OS8 computer. Handler that puts the icons that are in your system tray into the MacVision taskbar
Y 1A:Stardock MCP mcpserver.exe"Master Control Program for Stardock apps
Y 1A:Stardock TrayMonitor TrayServer.exeFor monitoring tray icons - if disabled icons will not be displayed in ObjectBar or DesktopX
U 1cla 1cla.exe"1 Click & Lock from Softstack.com - ""a system tray security utility you can use to secure your desktop when you step away from your PC. It's secure and very easy-to-use. Just define a password
U 1cla.exe 1cla.exe"1 Click & Lock from Softstack.com - ""a system tray security utility you can use to secure your desktop when you step away from your PC. It's secure and very easy-to-use. Just define a password
? 1CmailS NETMAIL.EXE"??"
X 1on1 1on1.exeAdult content dialler
U 1Srv32 SpyAgent4.exe"SpyTech SpyAgent monitoring software. "Spy software that allows you to monitor EVERYTHING users do on your PC.""

DISCLAIMER: It is assumed that users are familiar with the operating system they are using and comfortable with making the suggested changes. I will not be held responsible if changes you make cause a system failure.

This is NOT a list of tasks/processes taken from Task Manager or the Close Program window (CTRL+ALT+DEL) but a list of startup applications, although you will find some of them listed via this method. Pressing CTRL+ALT+DEL identifies programs that are currently running - not necessarily at startup. For a list of tasks/processes you should try WinTasks 5 Standard/Professional from LIUtilities or the list at AnswersThatWork. Therefore, before ending a task/process via CTRL+ALT+DEL just because it has an "X" recommendation, please check whether it's in MSCONFIG or the registry first. An example would be "svchost.exe" - which doesn't appear in either under normal conditions but does via CTRL+ALT+DEL. If in doubt, don't do anything.

Powered By Pac's Startup list