Support Forum Articles File Help Startup DB Tips Service DB Hijack This! Analyzer

 

NEW HijackThis automated log analyzer! Get your logs analyzed INSTANTLY!

If you're not finding what you're looking for please go to this forum and submit a new startup entry.

Key:

  • "Y" - Normally leave to run at start-up
  • "N" - Not required - typically infrequently used tasks that can be started manually if necessary
  • "U" - User's choice - depends whether a user deems it necessary
  • "X" - Definitely not required - typically viruses, spyware, adware and "resource hogs"
  • "?" - Unknown



Startup Name Process Name Details
Xfirewallspoolsv.exe"Added by the DIZAN.F VIRUS!"
Xload=Spoolsv.exe"Added by the CIADOOR.B TROJAN! Note - this is not the legitimate spoolsv.exe which is always located in %System%. This one is located in %Windir%"
XMicrosoft MSUPDATESpoolSvc.exe"Added by the SXTB-A TROJAN!"
XMicrosoft Spool Svcspoolsvc32.exe"Added by a variant of the IRCBOT BACKDOOR!"
XMicrosoft Spooler ServicesSpoolsv.exe"Added by a variant of the SPYBOT WORM! See here"
XPolicyRunspoolsv32.exe"Added by the BACKDOOR-DNV TROJAN!"
XPrint SpoolerSpoolsv.exe"Added by the CIADOOR.B TROJAN! Note - this is not the legitimate spoolsv.exe which is always located in %System%. This one is located in %Windir%"
XPrint Spoolerspoolsvc32.exe"Added by the SDBOT.BB TROJAN!"
XPrint Spoolerspoolsv32.exe"Added by the RBOT.SW WORM!"
XPrintSpoolSvSystem.exe"Added by the BDOOR-S BACKDOOR!"
XRun Services as Applicationspoolsvc.exe"Added by the DLOADER-NY TROJAN!"
XService Host Processspoolsvc.exe"Added by the GAOBOT.GEN!POLY WORM!"
XServices Administratorspoolsvc.exe"Added by the DLOADER-NY TROJAN!"
XSPOOL Configurationspoolsvc.exe"Added by the SDBOT-KD WORM!"
XSpooler SubSystem Appspoolsvc.exe"Added by the POEBOT-J WORM!"
XSpooler SubSystem Applicationspoolsvc.exe"Added by the DLOADER-NY TROJAN!"
XSpooler Subsytem Appspoolsvc.exe"Added by the SDBOT-MM WORM!"
XSpoolsvSpoolsv.exe"Added by the CIADOOR.121 VIRUS! Note - this is not the legitimate spoolsv.exe which is always located in %System%. This one is located in %Windir%"
Xspoolsvscvhosts.exe"Added by the SMALL-AW TROJAN!"
Xspoolsvsvchost.exe"Added by the DLOADER-FI TROJAN! Note - this is not the legitimate svchost.exe process which is always located in %System% and should not normally figure in Msconfig/Startup! This one is located in %Windir%\HELP"
Xspoolsvspoclsv.exe"Added by the FUJACKS-M WORM!"
Xspoolsvspoolsv.exe"Added by the ZAPCHAS-EE TROJAN! Note - this is not the legitimate spoolsv.exe which is always located in %System%. This one is located in %Windir%\Temp\spoolsv"
Xspoolsvspoolvs.exe"Added by the AGENT-HNV TROJAN!"
Xspoolsvspoolsv.exe"Added by the ANTINNY-BH WORM! Note - this is not the legitimate spoolsv.exe which is always located in %System%. This one is located in %ProgramFiles%\Messenger"
Xspoolsvspoolsv.exe"Added by the OURXIN.C TROJAN! Note - this is not the legitimate spoolsv.exe which is always located in %System%. This one is located in a ""spoolsv"" subfolder"
XSpoolsvspoolsv.exe"Added by the ANTINNY.F WORM! Note - this is not the legitimate spoolsv.exe which is always located in %System%. This one is located in %Program Files%\Lotus"
Xspoolsv managerSpoolMgr.exe"Added by the ASSIRAL WORM!"
Xspoolsv servicespoolsv32.exe"Added by the RBOT-AHP WORM!"
Xspoolsv.exe[random filename]"Added by the RBOT-JB WORM!"
XSPOOLSV32SPOOLSV32.EXE"Added by the CWS-I or HAZIF-B TROJANS!"
XSPOOLSV32.exeSPOOLSV32.exe"Added by the STARTPAGE.O TROJAN!"
Xspoolsvcspoolsvc.exe"Added by the DROPPER-AT TROJAN!"
XspoolsvrSPOOLSVR.EXE"Added by the RAYROB.A TROJAN!"
Xspoolsvr32csmss.exe"Added by the AGENT-AU TROJAN!"
Xspoolsvr32csmss32.exe"Added by a variant of the AGENT-AU TROJAN!"
Xspoolsvswintre.exe"Added by the SDBOT.EGQ WORM!"
Xspoolsvswincfy.exe"Added by a variant of the IRCBOT BACKDOOR!"
Xspoolsvs.exespoolsvs.exe"Added by the DLOADER-RK TROJAN!"
XSPOOLSVUSPOOLSVU.EXE"Added by the STARTPAGE.K hijacker"
Xspoolsvvspoolsvv.exe"Searchcentrix hijacker"
XSunJavaUpdatSchedspoolsv.exe"Added by the BANCBAN-NP TROJAN! Note - this is not the legitimate spoolsv.exe which is always located in %System%. This one is located in %ProgramFiles%\MSN Messenger"
XSVCHOSTSPOOLSV.EXE"Added by the BAITAP-A WORM! Note - this is not the legitimate spoolsv.exe which is always located in %System%. This one is located in %Windir%"
XSystemsspoolsvc.exe"Added by the DLOADR-SW TROJAN!"
XTcp Application Managerspoolsvc.exe"Added by the DLOADER-NY TROJAN!"
XVital Load ProcessSpoolsvr.exe"Added by the RBOT.AIF WORM!"
XWin32 System Spoolspoolsvc.exe"Added by the SDBOT.UK WORM!"
XWindows .Net Managerspoolsvc.exe"Added by the DLOADER-NY TROJAN!"
XWindows Local Servicesspoolsvc.exe"Added by the DLOADER-NY TROJAN!"
XWindows Service Managerspoolsvc.exe"Added by the DLOADER-NY TROJAN!"
XWindows Servicesspoolsvc.exe"Added by the SDBOT.CPZ WORM!"
XWindows Spoolerspoolsv32.exeAdded by an unidentified WORM or TROJAN!
XWINDOWS SYSTEM MANAGERspoolsvc.exe"Added by the MYTOB-LY WORM!"
XWindows SYStryspoolsvr.exe"Added by the SDBOT.GN BACKDOOR!"
XWindows Web Servicesspoolsvc.exe"Added by the DLOADER-NY TROJAN!"
XWinspoolspoolsvr.exe"Added by a variant of the SDBOT WORM!"
X[random name]spoolsv.exe"PurityScan adware. Note - this is not the legitimate spoolsv.exe which is always located in %System%"


DISCLAIMER: It is assumed that users are familiar with the operating system they are using and comfortable with making the suggested changes. I will not be held responsible if changes you make cause a system failure.

This is NOT a list of tasks/processes taken from Task Manager or the Close Program window (CTRL+ALT+DEL) but a list of startup applications, although you will find some of them listed via this method. Pressing CTRL+ALT+DEL identifies programs that are currently running - not necessarily at startup. For a list of tasks/processes you should try WinTasks 5 Standard/Professional from LIUtilities or the list at AnswersThatWork. Therefore, before ending a task/process via CTRL+ALT+DEL just because it has an "X" recommendation, please check whether it's in MSCONFIG or the registry first. An example would be "svchost.exe" - which doesn't appear in either under normal conditions but does via CTRL+ALT+DEL. If in doubt, don't do anything.