Support Forum Articles File Help Startup DB Tips Service DB Hijack This! Analyzer

 

NEW HijackThis automated log analyzer! Get your logs analyzed INSTANTLY!

If you're not finding what you're looking for please go to this forum and submit a new startup entry.

Key:

  • "Y" - Normally leave to run at start-up
  • "N" - Not required - typically infrequently used tasks that can be started manually if necessary
  • "U" - User's choice - depends whether a user deems it necessary
  • "X" - Definitely not required - typically viruses, spyware, adware and "resource hogs"
  • "?" - Unknown



Startup Name Process Name Details
Xasdxxwinrpc32.exe"Added by the AGOBOT.VO WORM!"
XGeneric Host Process for Win32 Servicerpchost.exe"Added by the IRCBOT.DCN WORM!"
NGrpConvgrpconv.exe"Microsoft Windows Program Group Converter - used by installers (ONLY in the RunOnce keys) - provides the translation of groups and group items to folders and links. Also see this MS Knowledge Base article"
YInoRPCInoRpc.exe"Associated with eTrust Antivirus/InoculateIT"
XMicrosft Remote Procedure Daemonmsrpcd.exe"Added by a variant of the IRCBOT BACKDOOR!"
XMicrosoft Visual Studio VSAvarpc32.exe"Added by a variant of the SPYBOT WORM!"
XMicrosoft Windows Secure ServerrpcxWindows.exe"Added by the RBOT-LL WORM!"
XMicrosoft Windows Secure Updaterpcxwinupdt.exeAdded by an unidentified WORM or TROJAN!
XMS Remote Procedure Callmsrpc32.exe"Added by the RBOT-QL WORM!"
XMSN RPC Managermsnrpcmgr.exe"Added by an unidentified WORM or TROJAN! See here"
XMSVsmtrpcxctx.exeAdded by an unidentified WORM or TROJAN!
XmyCleanerPCmyCleanerPC.exe"MyCleanerPC rogue spyware remover - not recommended"
UNaverPCGreenNPCGreenUpgrader.exe"Related to Naver_Anti-virus Realtime Monitor From NHNCorp"
UPRPCMonitorPRPCUI.exe"Intel® SpeedStep™ interface. This automatically detects whether a mobile PC is using battery or AC power. When using battery power
URapid Restorerrpcsb.exe"XPoint ""Rapid Restore PC"" - ""a Managed Recovery solution that enables IT Administrators to protect the corporate image
XRemote Procedure Callwinrpc.exe"Added by the RBOT-KM WORM!"
XRemote Procedure Callwinsysrpc.exe"Added by the SDBOT-PS WORM!"
XRemote Procedure Call For Windows 32bitrpc.exe"Added by the RBOT-MD WORM!"
XRemote Procedure Callsmswinrpc.exe"Added by the RBOT.KJ WORM!"
?roketpiperpclient.exe"??"
XRPCMSschost.exe"Added by a variant of the AGOBOT/GAOBOT WORM!"
XRPC DCOM Vulnerability Patchmsgfix.exe"Added by the RBOT.S WORM!"
XRPC Driversrpcall.exe"Added by the SDBOT.FLY WORM!"
XRPC Patcher[path to worm]"Added by the BOLGI WORM!"
XRPC Service[random filename]"Added by the BDOOR-AAD BACKDOOR!"
Xrpc Win32shost32.exe"Added by the RBOT-ABL WORM!"
Xrpc Win32spoolscv.exe"Added by a variant of the RBOT WORM!"
XRPCall_WIN2KKurawas.exe"Added by the BHARAT.A WORM!"
XRPCall_[ComputerName]smhost.exe"Added by the REDPLUT-B TROJAN!"
Xrpccrpcc.exe"Added by the SPAMMIT-E TROJAN!"
Xrpcda Win32rpcda.exe"Added by the RBOT-AEE WORM!"
XRPCInstall[path to trojan]"Added by the AGENT-DQM TROJAN!"
XRpcLocatorexplorer.exe"Added by the RBOT-GSA WORM! Note - the legitimate Windows Explorer (same filename) is located in %Windir% and would not normally appear in Msconfig/Startup unless you added it manually! This one is located in %System%"
XRPCser32gservices.exe"Added by the RITDOOR-C WORM! Note - this is not the legitimate services.exe process which is always located in %System% and should not normally figure in Msconfig/Startup! This one is located in %Windir%"
XRPCser32g1services.exe"Added by the PREX.D WORM! Note - this is not the legitimate services.exe process which is always located in %System% and should not normally figure in Msconfig/Startup! This one is located in %Windir%"
XRPCser32g3services.exe"Added by the PREXOT.D BACKDOOR! Note - this is not the legitimate services.exe process which is always located in %System% and should not normally figure in Msconfig/Startup! This one is located in %Windir%"
XRPCser32g4services.exe"Added by the PREXOT.E BACKDOOR! Note - this is not the legitimate services.exe process which is always located in %System% and should not normally figure in Msconfig/Startup! This one is located in %Windir%"
XRPCserr32gwinlogon.exe"Added by the RITDOOR-B WORM! Note - this is not the legitimate winlogon.exe process which is always located in %System% and should not normally figure in Msconfig/Startup! This one is located in %Windir%"
XRPCserv32services.exe"Added by the MYDOOM.AL WORM! Note - this is not the legitimate services.exe process which is always located in %System% and should not normally figure in Msconfig/Startup! This one is located in %Windir%"
XRPCserv32gservices.exe"Added by the BOBAX.AA WORM! Note - this is not the legitimate services.exe process which is always located in %System% and should not normally figure in Msconfig/Startup! This one is located in %Windir%"
XRPCserv32gCSRSS.EXE"Added by the BOBAX.AD WORM! Note - this is not the legitimate csrss.exe process which is always located in %System% and should not normally figure in Msconfig/Startup! This one is located in %Windir%"
XRPCserv32gMSDEFR.EXE"Added by the BOBAX.AD WORM!"
XRPCserv32gNB32EXT2.EXE"Added by the BOBAX.AD WORM!"
XRPCserv32gWINLOGON.EXE"Added by the BOBAX.AD WORM! Note - this is not the legitimate winlogon.exe process which is always located in %System% and should not normally figure in Msconfig/Startup! This one is located in %Windir%"
YRPCSS.exerpcss.exe"Remote Procedure Call. Required by windows for programs to communicate with each other on networks/different machines. Originally for NT only but now installed with Win98/98se. Under Win98/98se
XRpcxWindows Extensionsrpcxwinex.exe"Added by the RBOT.ACP WORM!"
XSocial Security Agencyrpcxsocsa.exe"Added by a variant of the RBOT WORM!"
XSrv RPCromNClienti386.exe"Added by the WATSOON.A TROJAN!"
XSuspenzorPCGDC.exe"SuspenzorPC Czech rogue privacy tool - not recommended. A member of the PCPrivacyTool family"
XSysmonrpcmon.exe"Added by the RANDEX.ATX WORM!"
XSystem Setuprpcxcmod.exeAdded by an unidentified WORM or TROJAN!
Xupdatexwinwinxrpc.exe"Added by the AGOBOT-KJ WORM!"
Xuprpcwuprpcw.exe"PrivacyProtector rogue privacy tool - not recommended
XUserInit StartUprpcxuisu.exe"Added by a variant of the SDBOT WORM!"
Xwinxwinxrpc32.exe"Added by the AGOBOT-MV WORM!"
Xwinxwinxrpc.exe"Added by the AGOBOT-MV WORM!"
XWindowsHiverpcc.exe"Added by the DLENA-A TROJAN!"
XwindowsupdateRPC[RANDOM CHARACTERS].exe"Added by the IRCBOT.B TROJAN!"
XWinRPCwinrpcmx.exe"Added by the BANKER-EEI TROJAN!"
XWSAConfigurationrpcxmn32.exe"Added by the AGOBOT.ABG WORM!"


DISCLAIMER: It is assumed that users are familiar with the operating system they are using and comfortable with making the suggested changes. I will not be held responsible if changes you make cause a system failure.

This is NOT a list of tasks/processes taken from Task Manager or the Close Program window (CTRL+ALT+DEL) but a list of startup applications, although you will find some of them listed via this method. Pressing CTRL+ALT+DEL identifies programs that are currently running - not necessarily at startup. For a list of tasks/processes you should try WinTasks 5 Standard/Professional from LIUtilities or the list at AnswersThatWork. Therefore, before ending a task/process via CTRL+ALT+DEL just because it has an "X" recommendation, please check whether it's in MSCONFIG or the registry first. An example would be "svchost.exe" - which doesn't appear in either under normal conditions but does via CTRL+ALT+DEL. If in doubt, don't do anything.