Support Forum Articles File Help Startup DB Tips Service DB Hijack This! Analyzer

 

NEW HijackThis automated log analyzer! Get your logs analyzed INSTANTLY!

If you're not finding what you're looking for please go to this forum and submit a new startup entry.

Key:

  • "Y" - Normally leave to run at start-up
  • "N" - Not required - typically infrequently used tasks that can be started manually if necessary
  • "U" - User's choice - depends whether a user deems it necessary
  • "X" - Definitely not required - typically viruses, spyware, adware and "resource hogs"
  • "?" - Unknown



Startup Name Process Name Details
Xpathex.exe"Added by the MKMOOSE-A WORM! Note - has a blank entry under the Startup Item/Name field"
X(default)"rundll32.exe [path to DLL file]Do98Work"
X*WinLogon[trojan path] ren time:[random number]"Added by the VUNDO TROJAN!"
X180ClientStubInstall[path to trojan]"180Solutions adware related"
X2thousandbuck[path to file]"Added by the RANKY.L TROJAN!"
X360antiarp[path to trojan]"Added by the PASTA.AIB TROJAN!"
X5p4m[path to trojan]"Added by the LITEBOT-C TROJAN!"
Xaaprotect[path to trojan]"Added by the BANCBAN-MJ TROJAN!"
XACCDEFRAGINFO[path to worm]"Added by the DARBY-O WORM!"
XAccess WebControl[path to file]"Added by the PPDOOR-M TROJAN!"
UAcronis Popup Blocker"RunDll32.exe [path] Blocker.dll Run"
XAddClass[Installation_Path]"Added by the STARTPAGE.F hijacker"
XAddClass[path to trojan]"Added by the SECDL-A TROJAN!"
XAddrPlus3[path] stup.exe [path] Adplus.dll Rundll32"TCent adware"
XAdRotator.Application[path to csrss.exe]"Added by the SMALL-AQ TROJAN! Note - this worm replaces the legitimate csrss.exe process which is always located in %System% and should not normally figure in Msconfig/Startup!"
XAdvanced DHTML Enable[path to trojan]"Added by the AGENT.GLQ TROJAN!"
Xadvap32[path to trojan]"Added by the MUTANT.AT TROJAN!"
XAHU[path to worm]"Added by the ANACON-B WORM!"
XAllopassw[path to trojan]"Added by the RANKY.CU TROJAN!"
XALTER DATA[path] repcale.exe [path] beird.exe"Added by the IRCFLOOD.CD TROJAN! Both files are located in %System%\ccdew"
Xansjava[path to worm]"Added by the RANDON-AN WORM!"
XAnti-Virus Update Scheduler[path to trojan]"Added by the SPAMMIT-A TROJAN!"
XAnti-Virus Update Scheduler V1.39.12R[path to trojan]"Added by the HEPLANE or STAPREW.B TROJANS! - different filenames have been spotted; examples: msvc.exe
XAntivirus Installer[path to trojan]"Added by the BADGENT-A TROJAN!"
XApp.EXEName[path to worm]"Added by the BODIRU WORM!"
XAqujyjax[path to file]"Added by the RANCK-CQ TROJAN!"
XArman[path to worm]"Added by the IRCBOT-TG WORM!"
UASKrundll32.exe [path] ASK.dll rdl"Stealth Keylogger keystroke logger/monitoring program - remove unless you installed it yourself! Note that rundll32.exe is a legitimate Microsoft file used to launch DLL file types and shouldn't be deleted"
XATI Video Driver Controls[path to worm]"Added by the SDBOT-DDS WORM!"
YAuthentic-ID Toolbar"rundll32.exe [path] ToolbarATL.dll LoadTrayIcon"
Xautorundemo[path to trojan]"Added by the AGENT-FPX TROJAN!"
XAutoupdate Service[path to trojan]"Added by the AGENT-CB TROJAN!"
Xautoupdatev2[path to file]"Added by the DROPPER-BM TROJAN!"
XAVP[path to trojan]"Added by the MUTBO-A TROJAN!"
Xavptask[path to trojan]"Added by the NOFERE-G TROJAN!"
XBackground Intelligent Transfer Service[path] rundll32.exe"Added by the VB-ZD TROJAN! Note - this is not the legitimate rundll32.exe process
Xbackup[path to worm]"Added by the AGOBOT-H WORM!"
XBand-Aid[path to file]"Added by the RANKY.O TROJAN!"
UBatInfEx"rundll32.exe [path] BatInfEx.dllBMMAutonomicMonitor"
UBatLogEx"rundll32.exe [path] BatLogEx.DLLStartBattLog"
UBelNotify"rundll32.exe [path] NPBelv32.dll RunDll32_BelNotify"
XBeSys[path to file]"BeSys adware"
Xbfxtray[path to trojan]"Added by the AGENT-GEB TROJAN!"
XBIE"Rundll32.exe [path] BDSrHook.dll Rundll32"
?BigDogPathVM_STI.EXE"Bundled with some software for digital cameras that use a USB connection - what does it do and is it required?"
UBLOG"rundll32.exe [path] BatLogEx.DLLStartBattLog"
XBlue Service[path to trojan]"Added by the BANCOS-BCW TROJAN!"
UBMMGAG"RunDll32 [path] pwrmonit.dllStartPwrMonitor"
UBMMMONWND"rundll32.exe [path] BatInfEx.dllBMMAutonomicMonitor"
XBoarddata[path] repcale.exe [path] palsp.exe"Added by a variant of the RANDON.AN WORM! Both files are often located in %System%"
XBootsCfgwscript.exe [path] Date.POP.vbs"Added by the KUULLIO WORM! Note that wscript.exe is a legitimate Microsoft file used to launch script files and shouldn't be deleted"
XBootsCfgwscript.exe [path] All Users.vbs"Added by the SPILTRON WORM! Note that wscript.exe is a legitimate Microsoft file used to launch script files and shouldn't be deleted"
XBootsCfgwscript.exe [path] All Users.vbe"Added by the SPILTRON WORM! Note that wscript.exe is a legitimate Microsoft file used to launch script files and shouldn't be deleted"
Xboot_reg[path to file]"Added by the BANCBAN-CA TROJAN!"
XBridge"rundll32.exe [path] Bridge.dllLoad"
XBron-Spizaetus[path to file]"Added by the BRONTOK-F WORM!"
Xbrwdiag[path to worm]"Added by the STRATIO-BN WORM!"
XBT[path to trojan]"Added by the LITEBOT-B TROJAN!"
XBwddwss[path to trojan]"Added by the RANKY.BD TROJAN!"
XC7[path to worm]"Added by the MEDIAKILL.A WORM!"
XCacheLoader[path to trojan]"Added by the DLOADER-NZ TROJAN!"
Xcalc"rundll32.exe [path] ntuser.dll_IWMPEvents@0"
Xcartao[path to file]"Added by the DLOADER-QD TROJAN!"
XCekirge[path to worm]"Added by the KERGEZ.A WORM!"
Xcesmain.dll"Rundll32.exe [path] cmail.dll Rundll32"
XCisco Systems[path to worm]"Added by the AUTORUN.UHR WORM!"
?CleanRegPathCleanReg.exe"Apparently Annex A ADSL modem related. What does it do and is it required?"
XClient Agent[path to file]"Added by the PPDOOR-J TROJAN!"
XClient Server Control Process[path to trojan]"Added by the AGENT-HR TROJAN!"
XClient Server Runtime[path to worm]"Added by the POEBOT-KR WORM!"
Xclkhost[path to trojan]"Added by the WIXUD-B TROJAN!"
?Clotusorgreg0prtStart.exe [path] Orgprt.exe"IBM Lotus SmartSuite related. In a LotusOrgReg folder. Unclear what exactly it does?"
XClrSchLoader[path to file]"ClearSearch adware"
Xcmrss[path to trojan]"Added by the DLOADER-QQ TROJAN!"
XCnsMin"Rundll32.exe [path] CNSMIN.DLL Rundll32"
UCognizanceTS"rundll32.exe [path] AsTsVcc.dll RegisterModule"
Xcon[path to trojan]"Added by the BRAVE-A TROJAN!"
XConnectivity Tool[path to trojan]"Added by the LITEBOT-E TROJAN!"
XControladores[path to trojan]"Added by the TELEFO-A TROJAN!"
XControlPanel"[path to executable] internat.dllLoadKeyboardProfile"
Xcppc[path to trojan]"Added by the VB-NV BACKDOOR!"
XCrashDump[path to trojan]"Added by the DROPPER.EAT TROJAN!"
XCS Updatecopy /Y [path] ActivationManager.dll.upd [path] ActivationManager.dllAdded by an unidentified malware
XCTime[path to trojan]"Added by the HTTPDOS TROJAN!"
XCtykd[path to file]"SMALL.SN spyware"
XDATABASE MySql[path] repcale.exe [path] beird.exe"Added by the RANDON-AL WORM! Both files are often located in %System%\qsws"
XDCOM Server[path to trojan]"Added by the AGENT-CCQ BACKDOOR!"
Xdefender[path to trojan]"Added by the VB-BAQ TROJAN!"
XDevicePathProyecto1.exe"Added by the GRUEL WORM!"
XDevicePathRoot.exe"Added by the GRUEL WORM!"
XDevicewin[path to trojan]"Added by the BANKER-AEV TROJAN!"
Xdfgfdgrergd[path to trojan]"Added by the RANKY.CK TROJAN!"
XDI2[path to file]"BroadcastPC adware"
XDirectX shell driver[path to trojan]"Added by the MARKTMAN-B TROJAN!"
XDisk Keeper[path to trojan]"Added by the SMALL-VE TROJAN!"
YDLBTCATS"rundll32 [path] DLBTtime.dll _RunDLLEntry@16"
YDLBUCATS"rundll32 [path] DLBUtime.dll _RunDLLEntry@16"
YDLBXCATS"rundll32 [path] DLBXtime.dll _RunDLLEntry@16"
YDLCCCATS"rundll32 [path] DLCCtime.dll_RunDLLEntry@16"
YDLCDCATS"rundll32 [path] DLCDtime.dll _RunDLLEntry@16"
YDLCFCATS"rundll32 [path] DLCFtime.dll _RunDLLEntry@16"
YDLCGCATS"rundll32 [path] DLCGtime.dll _RunDLLEntry@16"
YDLCICATS"rundll32 [path] DLCItime.dll _RunDLLEntry@16"
YDLCJCATS"rundll32 [path] DLCJtime.dll _RunDLLEntry@16"
YDLCQCATS"rundll32 [path] DLCQtime.dll _RunDLLEntry@16"
YDLCXCATS"rundll32 [path] DLCXtime.dll _RunDLLEntry@16"
XDLL Service Manager[path to worm]"Added by the RPCBOT.F TROJAN!"
XDllExecutable[path to file]"Added by the VB-SP WORM!"
Xdm_service[path to file]"Added by the MITGLIEDER.P TROJAN!"
XDR service[path to worm]"Added by the RBOT-CZT WORM!"
Xdrin[path to trojan]"Added by the SMALL.DPB TROJAN!"
XDriverPathsystem32.exe"Added by the PRORAT-S TROJAN!"
XDSAcass[path to file]"Added by the RANKY.M TROJAN!"
XDSKEY[path to trojan]"Added by the STARTER-G TROJAN!"
XDSS[path to trojan]"Added by the DSSDOOR-C TROJAN!"
UEFI Job Monitor"[path] efjm.dllrun"
Xelement furth[path] repcale.exe [path] palsp.exe"Added by a variant of the RANDON.AN WORM! Both files are often located in %System%\vert"
XeMCryT Sh3ars Panagers[path to worm]"Added by the RBOT-AWI WORM!"
XExFilter"Rundll32.exe [path] cdnspie.dll ExecFilter"
XExplorer[path to worm]"Added by the AUTEX WORM!"
Xexplorer[path to trojan]"Added by the AGENT-EU TROJAN!"
XExplorer 2238[path to trojan]"Added by the AGENT-CPI TROJAN!"
UE_S[numbers][path] E_[various].EXE [path] E_S[numbers].tmp"Temporary entry related to Epson Status Monitor 3 for their range of printer and AIO devices - for monitoring printer status
Xf94mggfhfghodftdf[path to trojan]"Added by the SMALL.JHZ TROJAN!"
Xff[path to worm]"Added by the RBOT-XL WORM!"
XFindHack[path to worm]"Added by the KELVIR-BA WORM!"
XFirewall auto setup[path to trojan]"Added by the AGENT-GLY TROJAN!"
XFlash Driver[path to trojan]"Added by the AGENT.CWVT TROJAN!"
XFlash Media[path to trojan]"Added by the IRCBOT.AUR TROJAN!"
XFlash Player2[path to worm]"Added by the IRCBOT.PD WORM!"
NFlashPath MonitorSDSTAT.EXESystem Tray icon that you can't get rid of - and does not need to run!. Tells you the battery status in the floppy disk adapter for the smartmedia cards. Available via Start -> Programs
NFlashPath MonitorFLSHSTAT.EXESystem Tray icon that you can't get rid of - and does not need to run!. Tells you the battery status in the floppy disk adapter for the smartmedia cards. Available via Start -> Programs
NFlashPath StatusSDSTAT.EXESystem Tray icon that you can't get rid of - and does not need to run!. Tells you the battery status in the floppy disk adapter for the smartmedia cards. Available via Start -> Programs
NFlashPath StatusFLSHSTAT.EXESystem Tray icon that you can't get rid of - and does not need to run!. Tells you the battery status in the floppy disk adapter for the smartmedia cards. Available via Start -> Programs
XFloppy Master[path to trojan]"Added by the ZONIT-F TROJAN!"
XFolderRaper[path to worm]"Added by the VB.GOZ WORM!"
Xfree-save[path to risk]"Freesave security risk that tracks and sends browser information and visited websites on the computer. Uninstall this software unless you put it there yourself"
Xfsdsft[path to backdoor]"Added by the RANKY.S BACKDOOR!"
XGames Acceleration[path to trojan]"Added by the SMUTSRCH-A TROJAN!"
XGames toolbarrundll32.exe [path] tbGame.dll DllShowTB"Topconverting.com/180Search ""Games Toolbar"" adware. Note that rundll32.exe is a legitimate Microsoft file used to launch DLL file types and shouldn't be deleted"
XGDAX[path to backdoor]"Added by the RANKY.K TROJAN!"
Xgenserv pathsdqdqg.exe"Added by the SDBOT-RF WORM!"
Xgimmygames[path to trojan]"Added by the DLOADR-LN TROJAN!"
?GSISETUP[path] GsiInst.exe INSTALL [path] V205Res 13"BT Voyager ADSL modem related - what does it do and is it required?"
XHATAPE[path to trojan]"Added by the BANKER-QF TROJAN!"
Xhelper.dllrundll32.exe [path] helper.dll"CnsMin (Chinese Keywords) hijacker related. Note that rundll32.exe is a legitimate Microsoft file used to launch DLL file types and shouldn't be deleted"
Xhimem.exe[path to worm]"Added by the STRATION-FW WORM!"
XHotKeysCmds[path to worm]"Added by the PAHATIA-A WORM!"
Xhxadsec[path to trojan]"Added by the ADCLICK-AP TROJAN!"
Xibin[path to trojan]"Added by the PERDA-C TROJAN!"
XICQ Center[path to worm]"Added by the RANDIN WORM!"
XICQMsn[path to trojan]"Added by the RANCK-AH TROJAN! The most common example is ""cbfks.exe"" located in %System%"
XIE Menu Extension toolbarrundll32.exe [path] tbextn.dll DllShowTB"Topconverting.com/180Search ""IEMenuExtension"" toolbar. Note that rundll32.exe is a legitimate Microsoft file used to launch DLL file types and shouldn't be deleted"
XIEXPLORE.EXE[path to trojan]"Added by the BANCOS-CJ TROJAN!"
UIKLrundll32.exe [path] IKL.dll"IKL surveillance software. Uninstall this software unless you put it there yourself"
XImage"rundll32 [path] [trojan filename]Install"
XImagePathtaskbarmngr.exe"Added by the SDBOT-XB WORM!"
Ximgit[path to file]"Added by the BANKER-EM TROJAN!"
Ximonitor[path to trojan]"Added by the IMONI-A TROJAN!"
XInit[path to trojan]"Added by the DROPPER.EAT TROJAN!"
XInstallProgram[path to trojan]"Added by the AGENT-HHU TROJAN!"
XInstalls SP2[path] repcale.exe [path] palsp.exe"Added by a variant of the RANDON.AN WORM! Both files are located in %System%\qpalsp"
XInstalls SP4[path] repcale.exe [path] p0rd.exe"Added by the RANDON-AK WORM! Both files are located in %System%\ekrlgc"
XInstance 001[path to worm]"Added by the ALASROU-A WORM!"
XIntec Service Drivers[path to worm]"Added by the RBOT-GLU WORM!"
XInterceptedSystem[path to worm]"Added by the ANACON-B WORM!"
XInternet Connection Wizard[path to trojan]"Added by the SMUTSRCH-A TROJAN!"
XInternet Mail and News[path to trojan]"Added by the SMUTSRCH-A TROJAN!"
XIntSys1[path to trojan]"Added by the BANLOA-ASE TROJAN!"
XIrwftp[path to trojan]"Added by the BANCOS-AP TROJAN!"
Xixproxy[path to trojan]"Added by the XORPIX-A TROJAN!"
Xjon315[path to trojan]"Added by the MAILBOT-BI TROJAN!"
Xjpgdiag[path to worm]"Added by the STRATION-AN WORM!"
Xjusched[path to trojan]"Added by the BANKER-BWR TROJAN!"
NKAZAA[path] kpp.exe [path] kazaalite.kpp"System Tray access to later versions of the Kazaa Lite P2P file sharing utility - namely the K++ and Resurrection variants. Kazaa Lite is the unauthorized modification of the original Kazaa Media Desktop - with the malware removed"
XKernelRuntime[path to worm]"Added by the MYTOB-JO WORM!"
Xkeyboard[path to trojan]"Added by the DLOADR-AOZ TROJAN!"
Xklop[path to file]"Added by the AGENT-WQ TROJAN!"
Xlameshit[path to trojan]"Added by the LOWZONE-H TROJAN!"
XLanGuard[path to trojan]"Added by the DLOADER-VO TROJAN!"
?LanzarL2007[path] setup.exe"??"
XLetsRock[path to trojan]"Added by the RANKY.Y BACKDOOR!"
XLetum[path to worm]"Added by the LETUM.A WORM!"
XLitebot[path to trojan]"Added by the LITEBOT-A TROJAN!"
Xlk3h1[path to file]"Added by the MOSUCK-G TROJAN!"
Xload[path to worm]"Added by the KELVIR.AI WORM!"
Xloaddr[path to trojan]"Added by the AGENT-DIY TROJAN!"
Xlogin[path to trojan]"Added by the HOTWORD-A TROJAN!"
XLogin Service[path to file]"Added by the MIGMAF TROJAN!"
XLogo[path to trojan]"Added by the DLOADER-RH TROJAN!"
Xlsass[path to lsass.exe]"Added by the ALADINZ.F TROJAN! Note - this is not the legitimate lasss.exe process which should NOT appear in Msconfig/Startup!"
YLXBSCATS"rundll32 [path] LXBStime.dll _RunDLLEntry@16"
YLXBTCATS"rundll32 [path] LXBTtime.dll _RunDLLEntry@16"
YLXBUCATS"rundll32 [path] LXBUtime.dll _RunDLLEntry@16"
YLXBXCATS"rundll32 [path] LXBXtime.dll _RunDLLEntry@16"
YLXBYCATS"rundll32 [path] LXBYtime.dll _RunDLLEntry@16"
YLXCCCATS"rundll32 [path] LXCCtime.dll _RunDLLEntry@16"
ULXCDCATS"rundll32 [path] LXCDtime.dll _RunDLLEntry@16"
YLXCECATS"rundll32 [path] LXCEtime.dll _RunDLLEntry@16"
YLXCFCATS"rundll32 [path] LXCFtime.dll _RunDLLEntry@16"
YLXCGCATS"rundll32 [path] LXCGtime.dll _RunDLLEntry@16"
YLXCJCATS"rundll32 [path] LXCJtime.dll _RunDLLEntry@16"
YLXCQCATS"rundll32 [path] LXCQtime.dll _RunDLLEntry@16"
YLXCRCATS"rundll32 [path] LXCRtime.dll _RunDLLEntry@16"
YLXCTCATS"rundll32 [path] LXCTtime.dll _RunDLLEntry@16"
YLXCYCATS"rundll32 [path] LXCYtime.dll _RunDLLEntry@16"
YLXDBCATS"rundll32 [path] LXDBtime.dll _RunDLLEntry@16"
YLXDCCATS"rundll32 [path] LXDCtime.dll _RunDLLEntry@16"
YLXDDCATS"rundll32 [path] LXDDtime.dll _RunDLLEntry@16"
YLXDICATS"rundll32 [path] LXDItime.dll _RunDLLEntry@16"
ULXDJCATS"rundll32 [path] LXDJtime.dll _RunDLLEntry@16"
XMailBlocker[path to trojan]"Added by the AGENT-LRJ TROJAN!"
Xmdetect[path to trojan]"Added by the SPABOT TROJAN!"
XMEDIA32[path to trojan]"Added by the PURSCAN-Z TROJAN!"
XMediaPathProyecto1.exe"Added by the GRUEL WORM!"
XMediaPathRoot.exe"Added by the GRUEL WORM!"
XMicro Office[path to trojan]"Added by the BANCBAN-QC TROJAN!"
XMicrosoft (R) Windows TCP/IP Socket Driver[path to trojan]"Added by the PROXY-DD TROJAN!"
XMicrosoft ActiveX Debugger NT[path to trojan]"Added by the BANCOS-DO TROJAN!"
XMicrosoft Internet Acceleration Utility[path to file]"Added by the AGENT-CX TROJAN!"
XMicrosoft Internet Acceleration Utility[path to trojan]"Added by the SMUTSRCH-A TROJAN!"
XMicrosoft Internet Explorer[path to trojan]"Added by the BANCBAN-AS TROJAN!"
XMicrosoft LV[path to file]"Added by the BDOOR-BDL BACKDOOR!"
XMicrosoft Management Console[path to trojan]"Added by the SMUTSRCH-A TROJAN!"
XMicrosoft PCHealth32[path to file]"Added by the NICE-A TROJAN!"
XMicrosoft Redirect[path to file]"Added by the BANKER-FW TROJAN!"
XMicrosoft standard protector[path to trojan]"Added by the STOX-C TROJAN!"
XMicrosoft System Saver[path to worm]"Added by the RBOT.BSK WORM!"
XMicrosoft Update 32[path to file]"Added by the RBOT-AJJ WORM!"
XMicrosoft Updater v2[path to worm]"Added by the AUTORUN-BCI WORM!"
XMicrosoft Windows[path to file]"Added by the BDOOR-LI BACKDOOR!"
XMicrosoft WPCEmail[path to trojan]"Added by the SNIFFER-N TROJAN!"
XMicrosoft WWW[path to trojan]"Added by the AGENT-DRI TROJAN!"
XMicrosoftUpdates[path to trojan]"Added by the DELF-LO TROJAN!"
Xminimo[path to file]"Added by the MOSUCK-X TROJAN!"
Xml34[path to trojan]"Added by the MAILBOT-BH TROJAN!"
XMouseDrv[path to worm]"Added by the ZOLOAD-B WORM!"
XMoussaEvil[path to file]"Added by the MUSANUB-A WORM!"
Xmsbsc[path to trojan]"Added by the BANKER-DF TROJAN!"
XMSDNMess[path to trojan]"Added by the RANKY.BA TROJAN!"
XMsgApi[path to file]"Added by the DEDLER-D TROJAN! The most common filenames seen are ""csmss.exe"" and ""csmrs.exe""
XMsgmgr[path to worm]"Added by the BABYBEAR WORM!"
Xmsmsgss[path to trojan]"Added by the RANKY.G BACKDOOR!"
XMSN Message Background loader[path to worm]"Added by the RBOT-AIE WORM!"
Xmsnmsgy[path to file]"Added by the BANKER-EQ TROJAN!"
XMspatch69[path to trojan]"Added by the MPROX TROJAN!"
XMSPRO32[path to worm]"Added by the IBERIO WORM!"
Xmsresear[path to trojan]"Added by the WEASYW-B TROJAN!"
XMSSGisg[path to file]"Added by the RANKY.N TROJAN!"
Xmssvc[path to trojan]"Added by the PSK TROJAN!"
XMSWUpdate[path to worm]"Added by the SILLYFD-V WORM! The most common filename is lsass.exe but it not the legitimate lsass.exe process which is always located in %System% and should not normally figure in Msconfig/Startup!"
XMSxmlHpr"RUNDLL32.EXE [path] msxm192z.dllw"
XMultimedia extensions[path to trojan]"Added by the SMUTSRCH-A TROJAN!"
Xmxb2[path to worm]"Added by the IXBOT-G WORM!"
UMytekSystrayExePathMyTekSystray.exe"MyTek system tray - web site providing computer tech support in Australia"
XMyWebSearch Plugin"rundll32 [path] M3PLUGIN.DLLUPF"
XNAV Live Update[path to worm]"Added by the DEBORMS.C WORM! Note - this is not a valid Norton Anti-Virus (NAV) function from Symantec"
XNBT System alias[path] repcale.exe [path] beird.exe"Added by a variant of the RANDON.AN WORM!"
XNdpldaemon[path to trojan]"Added by the RPCSDBOT-A TROJAN!"
Xnethost.exe[path to file]"Added by the PERDA-J TROJAN!"
XNetwork Host Controller[path to trojan]"Added by the WHISPER TROJAN!"
XNetwork Security Guard[path to trojan]"Added by the COLEM-A TROJAN!"
XNew.net Startup"rundll32 [path] NEWDOT~1.DLL ClientStartup"
XNew.net Startup"rundll32 [path] NEWDOT~1.DLL NewDotNetStartup"
XNew.net Startup"rundll32 [path] NEWDOT~2.DLL ClientStartup"
XNew.net Startup"rundll32 [path] NEWDOT~2.DLL NewDotNetStartup"
Xnewname[path to trojan]"Added by the DRSMARTL-S TROJAN!"
XNI.ERS_9999_N91S3108[path to file]"Installer for the ErrorSafe rogue system error and cleaning utility - see here"
XNI.GA6PU_0001_N108E1308[path to file]"Installer for the VirusSchlacht German rogue security software - see here"
XNI.GA6PU_0001_N120C2910[path to file]"Installer for the VirusSchlacht German rogue security software - see here"
XNI.GA6P_0001_N105E2704[path to file]"Installer for the AVSystemCare rogue security software - see here"
XNI.GA6P_0001_N108E1606[path to file]"Installer for the BestsellerAntivirus rogue security software - see here"
XNI.GA6P_0001_N111C1707[path to file]"Installer for the AVSystemCare rogue security software - see here"
XNI.GA6P_0001_N115C0110[path to file]"Installer for the AVSystemCare rogue security software - see here"
XNI.GA6P_0001_N115E0110[path to file]"Installer for the AVSystemCare rogue security software - see here"
XNI.GA6P_0001_N122C0611[path to file]"Installer for the AVSystemCare rogue security software - see here"
XNI.GA6P_0001_N122C2210[path to file]"Installer for the AVSystemCare rogue security software - see here"
XNI.GA6P_0001_N122C2802[path to file]"Installer for the AVSystemCare rogue security software - see here"
XNI.GA6P_0001_N122E0611[path to file]"Installer for the AVSystemCare rogue security software - see here"
XNI.GA6P_2001_N108E1606[path to file]"Installer for the BestsellerAntivirus rogue security software - see here"
XNI.GDCDE_0001_N122C1912[path to file]"Installer for the FestplattenReiniger German rogue privacy tool - see here"
XNI.GDC_0001_N111C1909[path to file]"Installer for the PCPrivacyTool rogue privacy tool - see here"
XNI.GDC_0001_N122C1912[path to file]"Installer for the PCPrivacyTool rogue privacy tool - see here"
XNI.GES_0001_N122C2610[path to file]"Installer for the ErrClean rogue system error and cleaning utility - see here"
XNI.UAVIFR_0001_N105M2404[path to file]"Installer for the VirusGarde French rogue security software - see here"
XNI.UERSM_0001_N68M1602[path to file]"Installer for the ErrorSafe rogue system error and cleaning utility - see here"
XNI.UGA6P[path to file]"Installer for the BestsellerAntivirus rogue security software - see here"
XNI.UGA6PH_0001_N122M2910[path to file]"Installer for the AntiVirusAskeladd rogue security software - see here"
XNI.UGA6PK_0001_N122M1302[path to file]"Installer for the VirusForsvar Danish rogue security software - see here"
XNI.UGA6PL_0001_N108M2808[path to file]"Installer for the VirusSchlacht Swedish rogue security software - see here"
XNI.UGA6PL_0001_N120M1302[path to file]"Installer for the VirusSchlacht Swedish rogue security software - see here"
XNI.UGA6PM_0001_N108M2108[path to file]"Installer for the AntivirusScherm Dutch rogue security software - see here"
XNI.UGA6PM_0001_N122M1202[path to file]"Installer for the AntivirusScherm Dutch rogue security software - see here"
XNI.UGA6PM_0001_N122M3010[path to file]"Installer for the AntivirusScherm Dutch rogue security software - see here"
XNI.UGA6PT_0001_N108M2208[path to file]"Installer for the VirusDifesa Italian rogue security software - see here"
XNI.UGA6PT_0001_N122M1202[path to file]"Installer for the VirusDifesa Italian rogue security software - see here"
XNI.UGA6PT_0001_N122M2910[path to file]"Installer for the VirusDifesa Italian rogue security software - see here"
XNI.UGA6PU_0001_N108M1308[path to file]"Installer for the VirusSchlacht German rogue security software - see here"
XNI.UGA6PU_0001_N120M1202[path to file]"Installer for the VirusSchlacht German rogue security software - see here"
XNI.UGA6PU_0001_N120M2910[path to file]"Installer for the VirusSchlacht German rogue security software - see here"
XNI.UGA6PV_0001_N108M0207[path to file]"Installer for the VirusGarde French rogue security software - see here"
XNI.UGA6PV_0001_N122M1202[path to file]"Installer for the VirusGarde French rogue security software - see here"
XNI.UGA6PV_0001_N122M2910[path to file]"Installer for the VirusGarde French rogue security software - see here"
XNI.UGA6P_0001_N105M2704[path to file]"Installer for the AVSystemCare rogue security software - see here"
XNI.UGA6P_0001_N111M1707[path to file]"Installer for the AVSystemCare rogue security software - see here"
XNI.UGA6P_0001_N115M0110[path to file]"Installer for the AVSystemCare rogue security software - see here"
XNI.UGA6P_0001_N119M1510[path to file]"Installer for the AVSystemCare rogue security software - see here"
XNI.UGA6P_0001_N120M1710[path to file]"Installer for the AVSystemCare rogue security software - see here"
XNI.UGA6P_0001_N122M0611[path to file]"Installer for the AVSystemCare rogue security software - see here"
XNI.UGA6P_0001_N122M2210[path to file]"Installer for the AVSystemCare rogue security software - see here"
XNI.UGA6P_0001_N122M2802[path to file]"Installer for the AVSystemCare rogue security software - see here"
XNI.UGA6P_0007_N125M2002[path to file]"Installer for the BestsellerAntivirus rogue security software - see here"
XNI.UGA6P_1001_N122M0402[path to file]"Installer for the AVSystemCare rogue security software - see here"
XNI.UGA6P_1002_N122M1402[path to file]"Installer for the AVSystemCare rogue security software - see here"
XNI.UGA6P_4001_N122M2111[path to file]"Installer for the AVSystemCare rogue security software - see here"
XNI.UGA6P_4444_N122M2811[path to file]"Installer for the AVSystemCare rogue security software - see here"
XNI.UGA6P_5001_N122M1902[path to file]"Installer for the AVSystemCare rogue security software - see here"
XNI.UGA6P_5555_N122M0312[path to file]"Installer for the AVSystemCare rogue security software - see here"
XNI.UGDC1_0001_N119M0911[path to file]"Installer for the FilterProgram rogue privacy tool - see here"
XNI.UGDCCZ_0001_N122M0307[path to file]"Installer for the SuspenzorPC Czech rogue privacy tool - see here"
XNI.UGDCCZ_0001_N122M0511[path to file]"Installer for the SuspenzorPC Czech rogue privacy tool - see here"
XNI.UGDCCZ_0001_N122M1712[path to file]"Installer for the SuspenzorPC Czech rogue privacy tool - see here"
XNI.UGDCDE_0001_N111M3007[path to file]"Installer for the FestplattenReiniger German rogue privacy tool - see here"
XNI.UGDCDE_0001_N122M1912[path to file]"Installer for the FestplattenReiniger German rogue privacy tool - see here"
XNI.UGDCGR_0001_N122M0307[path to file]"Installer for the FestplattenReiniger Greek rogue privacy tool - see here"
XNI.UGDCGR_0001_N122M1812[path to file]"Installer for the FestplattenReiniger Greek rogue privacy tool - see here"
XNI.UGDCNL_0001_N111M3007[path to file]"Installer for the NoCompromaat Dutch rogue privacy tool - see here"
XNI.UGDCNL_0001_N122M1912[path to file]"Installer for the NoCompromaat Dutch rogue privacy tool - see here"
XNI.UGDCNL_0001_N122M3011[path to file]"Installer for the NoCompromaat Dutch rogue privacy tool - see here"
XNI.UGDCPL_0001_N108M0207[path to file]"Installer for the OczyszczaczKomputerza Polish rogue privacy tool - see here"
XNI.UGDCPL_0001_N122M2012[path to file]"Installer for the OczyszczaczKomputerza Polish rogue privacy tool - see here"
XNI.UGDCRU_0001_N111M0208[path to file]"Installer for the SanitarDiska Romanian rogue privacy tool - see here"
XNI.UGDCRU_0001_N122M2012[path to file]"Installer for the SanitarDiska Romanian rogue privacy tool - see here"
XNI.UGDCTH_0001_N122M1712[path to file]"Installer for the PC Drive Tool rogue privacy tool - see here"
XNI.UGDCTR_0001_N108M0407[path to file]"Installer for the PC Drive Tool rogue privacy tool - see here"
XNI.UGDC_0001_N108M0407[path to file]"Installer for the PC Drive Tool rogue privacy tool - see here"
XNI.UGDC_0001_N111M1909[path to file]"Installer for the PCPrivacyTool rogue privacy tool - see here"
XNI.UGDC_0001_N122M0502[path to file]"Installer for the PCPrivacyTool rogue privacy tool - see here"
XNI.UGDC_0001_N122M1912[path to file]"Installer for the PCPrivacyTool rogue privacy tool - see here"
XNI.UGDC_0001_N122M2603[path to file]"Installer for the PCPrivacyTool rogue privacy tool - see here"
XNI.UGDC_0001_N122M2610[path to file]"Installer for the PCPrivacyTool rogue privacy tool - see here"
XNI.UGDC_0001_N122M2802[path to file]"Installer for the PCPrivacyTool rogue privacy tool - see here"
XNI.UGDC_0001_N122M2811[path to file]"Installer for the PCPrivacyTool rogue privacy tool - see here"
XNI.UGDC_0002_N108M1007[path to file]"Installer for the PC Drive Tool rogue privacy tool - see here"
XNI.UGDC_0003_N108M2407[path to file]"Installer for the PCPrivacyTool rogue privacy tool - see here"
XNI.UGESF_0001_N122M0201[path to file]"Installer for the HataDuzelticisi Turkish rogue system error and cleaning utility - see here"
XNI.UGESL_0001_N105M0405[path to file]"Installer for the SystemOrdnare Swedish rogue system error and cleaning utility - see here"
XNI.UGESL_0001_N122M0303[path to file]"Installer for the SystemOrdnare Swedish rogue system error and cleaning utility - see here"
XNI.UGESL_0001_N122M2911[path to file]"Installer for the SystemOrdnare Swedish rogue system error and cleaning utility - see here"
XNI.UGESM_0001_N122M0303[path to file]"Installer for the DokterFix Dutch rogue system error and cleaning utility - see here"
XNI.UGESV_0001_N108M2006[path to file]"Installer for the SysDepannage French rogue system error and cleaning utility - see here"
XNI.UGESV_0001_N122M0303[path to file]"Installer for the SysDepannage French rogue system error and cleaning utility - see here"
XNI.UGESV_0001_N122M2811[path to file]"Installer for the SysDepannage French rogue system error and cleaning utility - see here"
XNI.UGESV_0001_N122M3010[path to file]"Installer for the SysDepannage French rogue system error and cleaning utility - see here"
XNI.UGES_0001_N122M0502[path to file]"Installer for the ErrClean rogue system error and cleaning utility - see here"
XNI.UGES_0001_N122M2111[path to file]"Installer for the ErrClean rogue system error and cleaning utility - see here"
XNI.UGES_0001_N122M2602[path to file]"Installer for the ErrClean rogue system error and cleaning utility - see here"
XNI.UGES_0001_N122M2603[path to file]"Installer for the ErrClean rogue system error and cleaning utility - see here"
XNI.UGES_0001_N122M2610[path to file]"Installer for the ErrClean rogue system error and cleaning utility - see here"
XNI.UGES_0002_N108M1607[path to file]"Installer for the ErrClean rogue system error and cleaning utility - see here"
XNIEUW[path to dialler]"""Switch-F"" premium rate adult content dialler"
XNocana[path to worm]"Added by the ANACON-B WORM!"
XNorton Antivirus 7.0a[path to file]"Added by the PERDA-B or RANCK-CT TROJANS!"
XNorton Firewall[path to trojan]"Added by the BANKER-ET TROJAN!"
XNT Virtual Machine[path to file]"Added by the SCAERBOT-A WORM!"
XNTCommLib3[path to trojan]"Added by the AGENT-AXB TROJAN!"
Nntlfreedom"rundll32 [path] RyDial.dll QuickStart"
XNTP Server[path to trojan]"Added by the RANKY.F TROJAN!"
XNTupdater[path to trojan]"Added by the DIGARIX-D TROJAN!"
UNUAgentInstallPathNU_Install.exe"Installer associated with Chily Employee Activity Monitoring surveillance software. Uninstall this software unless you put it there yourself"
XNvCp1Do[path to trojan]"Added by the DWNLDR-GWE TROJAN! The most common filename seen is ""smss.exe"" - which is not the legitimate smss.exe process which is always located in %System% and should not normally figure in Msconfig/Startup!"
XNvGraphicsInterface[path to trojan]"Added by the BCKDR-QKI BACKDOOR!"
XNVidia Drivers[path to trojan]"Added by the RANCK-R TROJAN! Note - this is not related to any nVidia based motherboard or graphics card"
XOffice Monitorse[path to worm]"Added by the SDBOT-CZX WORM!"
XOffices Monitors[path to worm]"Added by the RBOT-GKO WORM!"
XOffices Monitorse[path to worm]"Added by the RBOT-GKO WORM!"
Xoffice_update[path to trojan]"Added by the DLOADER-ZB TROJAN!"
XOpenMstart[path to dialler]"""Switch-E"" premium rate adult content dialer"
XOptim[NUMBER][path] egdtopt.exe"Added by the RAMVICRYPE TROJAN!"
XPatah Hati[path to worm]"Added by the PAHATIA-A WORM!"
?Pathlide.exe"??"
Xpathnamepathname.exe"Added by the IRCCONTACT TROJAN!"
?PathNvidiaTVpatchnvidiaTVout.exeRelated to a Gigabyte Nvidia based video card - typical file location is %ProgramFiles%\Gigabyte\Nvidia
XPHIME2OO2ASyst[path to trojan]"Added by the DBDOOR-B TROJAN!"
XPopRock[path to trojan]"Added by the AGENT-LNU TROJAN!"
XPopularScreensaversWallpaper"rundll32 [path] F3SCRCTR.DLLLES"
Xpopuppers65[path to file]"Medload adware"
UPPSVC[path to file]"PC Police surveillance software that logs keystrokes
XPreInstall Windows[path] repcale.exe [path] beird.exe"Added by a variant of the RANDON.AN WORM! Both files are located in %System%\detr"
Xprint sharing[path] hidden32.exe [path] explorer.exe"Added by the ZCREW.B BACKDOOR! Note - the legitimate Windows Explorer (explorer.exe) is located in %Windir% and would not normally appear in Msconfig/Startup unless you added it manually!"
XPrinter[path to file]"Added by the LOWTAPER TROJAN!"
XPrinterSpool[path] RESTORE.EXE [path] SPOOL.EXE"Added by the ALADINZ.K TROJAN!"
Xpro[path to file]"Added by the SPYWAD-F TROJAN!"
XProc992[path to file]"Added by the IXBOT-C WORM!"
XPromoReg[path to worm]"Added by the WALEDAC.C WORM!"
XProtection[path] runtask.exe [path] protection.exeAdded by a variant of the AGENT.3.AU TROJAN!
XPrU Async Service[path to worm]"Added by the IRCBOT-UG WORM!"
Xprunnet[path to trojan]"Added by the AGENT-HVB TROJAN!"
Upwrmonit"RunDll32 [path] pwrmonit.dllStartPwrMonitor"
Xqgqqft[path to Trojan]"Added by the RANKY.T TROJAN!"
Xrawload[path to trojan]"Added by the DARKIRC.QZ TROJAN!"
XRealP1ayer[path to file]"Added by the RPLAY.A TROJAN! Note that the name has a number ""1"" in place of the second lower case ""L"""
XREEGRUN[path to file]"Added by the SECDROP.AI TROJAN"
XReeg_[path to trojan]"Added by the BANCBAN-AW TROJAN!"
Xregcheck[path to file]"Added by the SERVPAM TROJAN!"
XREGMSYS[path to file]"Added by the LOWZONE-AX TROJAN!"
XREGRUN[path to trojan]"Added by the LOWZONE-AH TROJAN!"
Xreseurce[path to trojan]"Added by the LINEAGE-AI TROJAN!"
XRichMedia"rundll32.exe [path] hbcast.dll WaitWindows"
Xrngmf[path to trojan]"Added by the RANKY.C TROJAN!"
XRoot_Machine[path to trojan]"Added by the BANCBAN-DI TROJAN!"
XRPC Patcher[path to worm]"Added by the BOLGI WORM!"
XRPCInstall[path to trojan]"Added by the AGENT-DQM TROJAN!"
XRunDLL"rundll32.exe [path] Bridge.dllLoad"
XRunDll[path to trojan]"Added by the DROPPER.EAT TROJAN!"
Xrundll***die.exe [path] mdll.exe"Added by the SUMTAX TROJAN! where *** is 134
Xrundll***die.exe [path] secure.bat"Added by the SUMTAX TROJAN! where *** is 134
Xrundll***die.exe [path] secure.exe"Added by the SUMTAX TROJAN! where *** is 134
Xrundll***die.exe [path] ttg.exe"Added by the SUMTAX TROJAN! where *** is 134
Xrundll32[path to worm]"Added by the AUTEX WORM!"
Xrundll64[path to worm]"Added by the AUTEX WORM!"
XRunOnce[path to trojan]"Added by the BANCBAN-P TROJAN!"
XRunOnce[path to mstask32.exe]"Added by the DELF-IA TROJAN!"
XRunOnce2Upd[path to trojan]"Added by the MURLO.FI TROJAN!"
XrunSubvalues[path to file]"Added by the DLOADER-QY TROJAN!"
XRunWin[path to file]"Added by the BANKER-ES TROJAN!"
XSafe[path to trojan]"Added by the BANKER-DT TROJAN!"
NSAgent2ExePathSAgent2.exeSeiko Epson printer status agent. Disable if printer is not used often
Xschost[path to trojan]"Added by the TJSERV.D TROJAN!"
Xscrbmk[path to trojan]"Added by the DLOADER-VP TROJAN!"
Xseli[path to file]"Added by the LOWZONE-AS TROJAN!"
Xservice32.exe[path to trojan]"Added by the DLOADR-AYX TROJAN!"
XServices[path to trojan]"Added by the METEORSHELL TROJAN!"
XServices[path to trojan]"Added by the RANCK-DB TROJAN!"
XSetup[path to trojan]"Added by the DROPPER.EAT TROJAN!"
XShareSearcher[path to trojan]"Added by the AGENT-FPE TROJAN!"
XShellExplorer.exe [path] ibm[RANDOM 5 DIGIT NUMBER].exe"Added by the ANSERIN TROJAN! Note - do not delete the legitimate Windows Explorer (explorer.exe) which is located in %Windir% and can be used to launch other files"
XShellCommand[path to file]"Added by the REMCON-A TROJAN!"
XShutdownWithoutLjiasvt.exe[path to trojan]"Added by the BIFROSE.F BACKDOOR!"
Xsmss[path to smss.exe]"Added by the ALADINZ.F TROJAN! Note - this is not the legitimate smss.exe process which should NOT appear in Msconfig/Startup!"
XSomefox[path to trojan]"Added by the DWNLDR-HHB TROJAN!"
XSound[path to trojan]"Added by the DROPPER.EAT TROJAN!"
XSoundMnEx32[path to worm]"Added by the STRATION-FW WORM!"
NSourcePathgwreg.exeUsed to update Gateway registry settings for System Restoration Kit and Web update programs
Xsp"rundll32 (Path to Trojan DLL) DllInstall"
XSP2 data[path] repcale.exe [path] apc.exe"Added by a variant of the RANDON.AN WORM! Both files are often located in %System%\winstat"
XSpool[path to trojan]"Added by the RANKY.R TROJAN!"
Xspoolax[path to trojan]"Added by the PERDA-D TROJAN!"
YSpybotDeleting*****[cmd or command] /c del [path] [filename]"Generated by Spybot Search & Destroy if it encounters files that cannot be deleted during runtime because they are locked by other processes. For example
Xsr64[path to trojan]"Added by the AGENT.X TROJAN!"
?srePostpone"rundll32.exe [path] srescan.dll DoSpecialAction"
XSrv32 spool service[path to trojan]"Added by the DLOADER-LB TROJAN!"
Xsstata[path to trojan]"Added by the RANCK-DF TROJAN!"
Xstartemdoit[path to trojan]"Added by the DLOADR-AVP TROJAN!"
XStartUpDate[path to trojan]"Added by the BIFROSE.F BACKDOOR!"
Xstrto[path to trojan]"Added by the KILLAV-AP TROJAN!"
XStubPathSservice.exe"Added by the PRORAT TROJAN!"
Xstup[path to trojan]"Added by the AGENT-CIL TROJAN!"
XSuperBar.Component[path to services.exe]"Added by the SMALL-AQ TROJAN! Note - this is not the legitimate services.exe process which is always located in %System% and should not normally figure in Msconfig/Startup! This one is located in %System%\Inetsrv"
XSurfBuddyrundll32 [path] sbuddy.dll"SurfBuddy adware - not to be confused with the legitimate SurfBuddy application by SurfApps!. Note that rundll32.exe is a legitimate Microsoft file used to launch DLL file types and shouldn't be deleted"
Xsvchosd[path to trojan]"Added by the BANCOS-BCX TROJAN!"
Xsvchost[path to trojan]"Added by the HAZZER TROJAN!"
Xsvchost[path] SETUP.EXE"Added by the SETCLO WORM!"
Xsvchost[path to explorer.exe]"Added by the UNREAL-A TROJAN! Note - the legitimate Windows Explorer (same filename) is located in %Windir% and would not normally appear in Msconfig/Startup unless you added it manually!"
Xsvchost.exe[path to executeable]"Added by the BANKER-MO TROJAN!"
XSvcManager[path to trojan]"Added by the ZALON-A BACKDOOR!"
XSvcSys[path to file]"Added by the BANCOS.Z TROJAN!"
Xsvcwinprocess32[path to worm]"Added by the UPERING WORM!"
XsVideo2[path to dialler]"""Switch-D"" premium rate adult content dialler"
USWLrundll32.exe [path] SWL.dll rdl"StealthWeblog surveillance software. Uninstall this software unless you put it there yourself! Note that rundll32.exe is a legitimate Microsoft file used to launch DLL file types and shouldn't be deleted"
XSYDNEY[file path]"Added by the SYNEY WORM!"
XSymantecFilterCheck[path to trojan]"Added by the BANKER-EIN TROJAN!"
XSymlcs[path to file]"Added by the YASPY-A TROJAN!"
USysBkup[path to file]"Keyspy keystroke logger/monitoring program - remove unless you installed it yourself!"
XSysData[path to file]"Added by the RANCK-BA TROJAN!"
Xsysin[path to file]"Added by the DSRC-A TROJAN!"
Xsyspathdrv.exe"Added by the SOBER WORM!"
XSySPower[path to trojan]"Added by the BANCBAN-OC TROJAN!"
Xsysser[path to file]"Added by the RAHACK WORM!"
NSystem Mechanic Professional Update [Incinerator.dll]SysMech4.exe /REREG: [path] Incinerator.dll"Iolo System Mechanic ""Incinerator"" feature securely deletes files and folders from your PC so they can never be recovered again"
XSystem Restore Data[path] repcale.exe [path] beird.exe"Added by the RANDON.AN WORM! Both files are located in %System%\frbyjed"
XSystem service78[path to file]"Added by the ELITEBAR-T and ELITEBAR-U TROJANS!"
XSystem service79[path to file]"Added by the ELITEBAR-V TROJAN!"
XSystem Update[path to trojan]"Added by the AUTOTROJ-D TROJAN!"
USystemKeyrundll32.exe [path] SystemKey.dll rdl"Stealth Keylogger keystroke logger/monitoring program - remove unless you installed it yourself! Note that rundll32.exe is a legitimate Microsoft file used to launch DLL file types and shouldn't be deleted"
XSystemMessengerrundll32.exe [path] SystemMessenger.dll"Stealth Chat Monitor spyware. Note that rundll32.exe is a legitimate Microsoft file used to launch DLL file types and shouldn't be deleted"
USystemWebrundll32.exe [path] SystemWeb.dll rdl"StealthWeblog surveillance software. Uninstall this software unless you put it there yourself! Note that rundll32.exe is a legitimate Microsoft file used to launch DLL file types and shouldn't be deleted"
Xsystrans[path to trojan]"Added by the STARTPA-GZ TROJAN!"
XSystry[path to worm]"Added by the AUTEX WORM!"
XSystryt[path to worm]"Added by the AUTEX WORM!"
XTaskManager[path to trojan]"Added by the LDPINCH-CF TROJAN!"
XTaskmgo[path to file]"Added by the BANCBAN-T TROJAN!"
Xtaskmgr[path to trojan]"Added by the AGENT-ENV TROJAN!"
Xtaskmngr[path] msnve.exe [path] task.exe"Added by the FLOOD-EK TROJAN!"
XTaskMon[path to trojan]"Added by the DROPPER.EAT TROJAN!"
Xtaskmrg.exe[path to trojan]"Added by the BANCBAN-BN TROJAN!"
Xtaskmsgs[path to trojan]"Added by the BANCOS-BBW TROJAN!"
YTelepathtelepath.exe"Drivers for the WinModem versions of the US Robotics ""Telepath"" series - as supplied to Gateway for instance. WinModems use software rather than hardware - hence putting a load on the CPU. Needed if you have it for loading the drivers. See here for more WinModem information"
NTesco.net"rundll32 [path] RyDial.dll QuickStart"
NTextbridge Instant Access OCRtelepath.exe"TextBridge from Nuance (was Scansoft). OCR (optical character recognition) software for scanning documents into popular editing applications. Available via Start -> Programs"
XTheMonitor[path to trojan]"Added by the DLOADR-LO TROJAN!"
Xtjstartup[path to file]"Added by the TJSERV.C TROJAN!"
UTLogonPathtb2logon.exe"Timbuktu Pro - remote desktop access software"
XTok-Cirrhatus[path to file]"Added by the BRONTOK-F WORM!"
XTorjan Program[path to trojan]"Added by the LEGMIR-BO TROJAN!"
Ntourpathregedit /s [path] tour.reg"Edits registry values to keep the Win 2000 ""tour"" in Task Scheduler"
XTrickler[path to file]"GAIN adware. Please note that Claria Corporation no longer support GAIN-Supported software - see here"
XTurboNet[path to trojan]"Added by the RENOS-EA TROJAN!"
XUpdate[original file path]"Added by the LYNDEGG WORM!"
XUPNP[path to trojan]"Added by the DROPPER.EAT TROJAN!"
XUsbD[path to trojan]"Added by the CIDRA-F TROJAN!"
XUSBHWINFO[path to trojan]"Added by the LOWZONE-I TROJAN!"
Xusbn[path to trojan]"Added by the HOGIL-C TROJAN!"
Xuser logon[path to worm]"Added by the PAHATIA-A WORM!"
XValidData[path to trojan]"Added by the RANKY.H TROJAN!"
XVC5MediaPlayer[path to file]"Added by the DEDLER-D TROJAN! The most common filenames seen are ""csmss.exe"" and ""csmrs.exe""
XVidiaDrivers[path to trojan]"Added by the RANKY.U TROJAN!"
XVirus Melt[path to executable]"Virus Melt rogue security software - not recommended
XVirus Removal Tool[path to trojan]"Added by the TOMETA-B TROJAN!"
XvXCXssdss[path to trojan]"Added by the RANCK-BO TROJAN!"
XWeb-cameinst[path to trojan]"Added by the RANCK-BP TROJAN!"
XWebSpecialsrundll32 [path] webspec.dll"WebSpecials spyware. Note that rundll32.exe is a legitimate Microsoft file used to launch DLL file types and shouldn't be deleted"
XWheelsMouse[path to trojan]"Added by the SOCKSPR-D TROJAN!"
XWIN95DEFVIEW[path to file]"Added by the DEDLER-D TROJAN! The most common filenames seen are ""csmss.exe"" and ""csmrs.exe""
Xwincrt.exe[path to worm]"Added by the STRATIO-HA WORM!"
XWindowfdgfds DasdLL Verifiew[path to worm]"Added by the RBOT-GGX WORM!"
Xwindows[path to trojan]"Added by the AIMWIN TROJAN!"
XWindows Console Monitor[path to worm]"Added by the KEDEBE WORM!"
XWindows Insecure[path to worm]"Added by the RBOT-FSM WORM!"
XWindows Management Instrumentation[path to file]"Added by the QEDS-A WORM!"
XWindows NNT[path to trojan]"Added by the RANKY.E TROJAN!"
XWindows Service Host Process[path to file]"Added by the EZIO-A WORM!"
XWindows Taskbar Manager[path to file]"Added by the PROTORIDE.B WORM!"
XWindows Update Automatic Updates[path to backdoor]"Added by the VBBOT.AM BACKDOOR!"
XWindowsFY[path to trojan]"Added by the FAKEALE-E TROJAN!"
XWindowsFZ[path to file]"Added by the DESKTOPHIJACK VIRUS! Also see DESKTOPHIJACK.B TROJAN!"
XWindowsInstaller[path to file]"Added by the DEDLER-D TROJAN! The most common filenames seen are ""csmss.exe"" and ""csmrs.exe""
XWindowsSetup[path to trojan]"Added by the EZBOT TROJAN!"
XWindowsSystem32[path to worm]"Added by the SDBOT-DFG WORM!"
XWindowsUpdate[path to file]"Added by the DUPA-B TROJAN!"
XWindowsUpdatem1[path to file]"Added by the AGENT-AAJ TROJAN!"
XWindUpdates[path to trojan]"Added by the AGENT.BF TROJAN!"
XWinKernel[path to virus]"Added by the PLEA VIRUS!"
Xwinldr[path to file]"Added by the VIDLO-P TROJAN!"
Xwinlogon32_[path to file]"Added by the RULAND.A WORM!"
XWinLsass[path to trojan]"Added by the SCANE WORM!"
XWinMedia[path to trojan]"Added by the ZEROBE-A TROJAN!"
Xwinmngr.exe[path to trojan]"Added by the AGENT-ZB TROJAN!"
Xwinreg_32[path to trojan]"Added by the BANKER-DB TROJAN!"
XWinres32vis[path to worm]"Added by the THRAX.A WORM!"
Xwinshow[path to trojan]"Added by the VB-DXP TROJAN!"
XWinShowUpdatecopy [path] winshow.new [path] winshow.dll"Winshow parasiate related - from the ""RunOnce"" keys it replaces ""winshow.dll"" with a new version"
XWinSP[path] REGEDIT.EXE -s [path] sysreg.reg"Added by the STARTPA-ME TROJAN!"
XWINSYS[path to trojan]"Added by the GOLDPLAY TROJAN!"
Xwinsysban[path to trojan]"Added by the CLICKER-CD TROJAN!"
XWinSysModule[path to trojan]"Added by the AGENT-DIQ TROJAN!"
Xwinsysupd[path to trojan]"Added by the STARTPA-NI TROJAN!"
XWintelUpdate[path to trojan]"Added by the SMALL-EKW TROJAN!"
Xwinupdateconn[path to file]"Added by the COMBRA-A WORM!"
Xwinupdatefiv_[path to file]"Added by the COMBRA.C WORM!"
Xwinupdate_[path to file]"Added by the COMDOR.A WORM!"
XWinUpgrader[path to trojan]"Added by the AGENT-DZ TROJAN!"
XWinXP fix[path to file]"Added by the RANKY.P TROJAN!"
Xwinzip[path to trojan]"Added by the BANCOS.G or BANCOS.K TROJANS! Note - this is not part of the popular WinZip file compression utility"
XWin_BooT[path to file]"Added by the BANKER-GI TROJAN!"
XWkyo86[path to worm]"Added by the PITIN-A WORM!"
Xwlm[path to trojan]"Added by the BANCOS-BCY TROJAN!"
XWXcmeinst[path to file]"Added by the RANCK-CD TROJAN!"
Xx3yy[path to trojan]"Added by the TANNICK TROJAN!"
Xxload[path to trojan]"Added by the VB-AGP TROJAN!"
XXpAspy[path to trojan]"Added by the DELF-WH BACKDOOR!"
Xxserv[path to trojan]"Added by the STUMPY-A TROJAN!"
XYahooStock[path to file]"Adtomi adware"
Xyyyyyyyy[path to trojan]"Added by the MUMUBOY.B TROJAN!"
XZen.A[path to trojan]"Added by the ZOOMEN-A TROJAN!"
X[3-4 random letters]Srv32[path to file]"Added by the BANCSADE-A TROJAN!"
X[decimal number][path to worm]"Added by the OPOSSUM-A WORM! The decimal number can be anything
X[username] config[path to trojan]"Added by the MOSUCK-H TROJAN!"
X_Hazafibb[path to file]"Added by the ZAFI.B WORM!"
X{357AA41A-B7A8-4632-A27D-5B980B25CF43}[path to svchost.exe]"Added by the SMALL-AQ TROJAN!"
X{357AA41A-B7A8-4632-A27D-5B980B25CF43}[path to trojan]"Added by the SMALL-EP TROJAN!"


DISCLAIMER: It is assumed that users are familiar with the operating system they are using and comfortable with making the suggested changes. I will not be held responsible if changes you make cause a system failure.

This is NOT a list of tasks/processes taken from Task Manager or the Close Program window (CTRL+ALT+DEL) but a list of startup applications, although you will find some of them listed via this method. Pressing CTRL+ALT+DEL identifies programs that are currently running - not necessarily at startup. For a list of tasks/processes you should try WinTasks 5 Standard/Professional from LIUtilities or the list at AnswersThatWork. Therefore, before ending a task/process via CTRL+ALT+DEL just because it has an "X" recommendation, please check whether it's in MSCONFIG or the registry first. An example would be "svchost.exe" - which doesn't appear in either under normal conditions but does via CTRL+ALT+DEL. If in doubt, don't do anything.