![]() Windows startup programs - Database search. If you're frustrated with the time it takes your Windows 1. Vista/XP PC to boot and then it seems to be running slowly you may have too. This is the original. ![]() ![]() Services are not included - see below. For further information on this and how to identify and disable. Introduction page. See here for further information on random entries - which are typically added by viruses and other. Last database update : - 3. May, 2. 01. 75. 14. You can search for any of the following terms to find and display entries in the start- up programs database but the minimum search is 3. Results are sorted by the Startup Item/Name field. From Windows 1. 0/8 Task Manager (CTRL+SHIFT+ESC . Note - this malware actually changes the value data of the . The name field in MSConfig may be blank and the file is located in %System%No. Windows Defender. XC++. exe. Detected by Malwarebytes as Trojan. Agent. Gen. The file is located in %App. Data%Noautoauto. Xc. Testimonials ยป Fixed my Iomega driver "I got a new Iomega WebCam but it can't works properly, and the manufacturer's website didn't help at all.
Microsoft USB Free Driver Download . World's most popular driver download site. ![]() ![]() Detected by Malwarebytes as PUP. Optional. Multi. Plug. Prxy. Svr. RST. The file is located in %System%. If bundled with another installer or not installed by choice then remove it. No. 0Xc. exe. Detected by Malwarebytes as Trojan. Agent. DGGen. The file is located in %Common. App. Data%\Microsoft\Windows\Start Menu (1. Vista) or %All. Users. Profile%\Start Menu (XP)No. Zeldar. Xc. exe. Detected by Malwarebytes as Trojan. Downloader. The file is located in %User. Temp%No. YNO0. 0BFRKMXc. Detected by Malwarebytes as Trojan. Fake. Alert. The file is located in %Temp%No. Windows. Update. XC. Detected by Malwarebytes as Backdoor. IRCBot. Gen. The file is located in %User. Profile%\NGTMDNoc. Xc. vbs. Detected by Intel Security/Mc. Afee as RDN/Generic. Malwarebytes as Trojan. Script. Note - the file is located in %User. Startup% and its presence there ensures it runs when Windows starts. No. C0. 10. 0Mon. C0. 10. 0Mon. exe. Live! Cam Console Auto Launcher for the Creative Live! Cam range of webcams. Launches the camera console when using video messaging for example? No. C0. NIMEXC0. NIME. Detected by Dr. Web as Trojan. PWS. Qqpass. 8. 52. Malwarebytes as Trojan. Agent. Note the number . Note the number . The file is located in %Temp%No. C2. 9. exe. XC2. 9. Added by the AGENT- UAJ TROJAN! No. C2. CMonitor. NC2. CMonitor. exe. Click to Convert from Inzone Software Limited - a PDF and HTML document converter for Windows documents. No. C2. C. Note - the file is located in %User. Startup% and its presence there ensures it runs when Windows starts. No. C2. CSkype. XC2. C. The file is located in %App. Data%\Microsoft. Noc. Uc. 32cs. 2. exe. Older version of Cyber. Sentinel parental control software. No. CS3. 2Uc. 32cs. Older version of Cyber. Sentinel parental control software. Noc. 7ster. 32. Xc. Detected by Dr. Web as Trojan. Down. Loader. 12. Malwarebytes as Trojan. Agent. CSNo. TV Remote Control. UC7. XRCtl. exe. Remote control support for TV tuner cards from V- Stream Multimedia/Jetway/Mentor/MTEK based upon the Brooktree Bt. Conexant Fusion Bt. A PCI video decoder. No. TV Uzaktan Kumandas. Turkish. No. TV8. Remote Control. UC7. XRCtl. exe. Remote control support for TV tuner cards from V- Stream Multimedia based upon the Brooktree Bt. Conexant Fusion Bt. A PCI video decoder. No. Remote Control. UC7. XRCtl. exe. Remote control support for TV tuner cards from KWorld Multimedia/XTREME Multimedia based upon the Brooktree Bt. Conexant Fusion Bt. A PCI video decoder. No. Roblox. exe. XC8. Ta. W. exe. Detected by Malwarebytes as Backdoor. Bladabindi. The file is located in %App. Data%No. Atheros. Md. Srv. Update. Xc. Detected by Malwarebytes as Trojan. Banker. The file is located in %Local. App. Data%\Atheros. Noc. 9mgr. Xc. 9mgr. Detected by Kaspersky as Trojan- Downloader. Win. 32. Agent. tgzg. Noc. Xc: \archiv~1\win. Added by the CUYDOC TROJAN! No. EZ Firewall. Yca. EZ Firewall - part of the e. Trust range of security products formerly available from CA but now discontinued. Available as a stand- alone product or as part of the EZ Armor suite. No. Zone Labs Client. Yca. exe. Earlier version of EZ Firewall (based upon a rebranded version of Zone. Alarm Pro) - part of the e. Trust range of security products formerly available from CA but now discontinued. Available as a stand- alone product or as part of the EZ Armor suite. No. Ca. PPcl. UCAAnti. Spyware. exe. Part of CA Anti- Spyware (either as a stand- alone product or as part of a suite). Runs a scan for spyware on startup. Nocaaspydelayedscan. YCAAnti. Spyware. Part of CA Anti- Spyware until 2. Runs a delayed scan on the first boot after installation before exiting. Yes. Microsoft Cab Manager. Xcab. exe. Detected by Sophos as Troj/Delf- JJNocababaafcad. Xcababaafcad. exe. Detected by Sophos as Troj/Agent- AAVL and by Malwarebytes as Trojan. Agent. FSENo. Micro. Update. Xcaballito. Detected by Intel Security/Mc. Afee as Generic Downloader. Malwarebytes as Backdoor. Agent. DCNocabcbfdbeffbfcgfdgfdgdfg. Xcabcbfdbeffbfcgfdgfdgdfg. Detected by Intel Security/Mc. Afee as RDN/Generic PWS. Malwarebytes as Trojan. Agent. RNDNo. Cabchk. XCabchk. exe. Detected by Symantec as Trojan. Gema. No. Cabchk. XCabchk. 32. exe. Detected by Symantec as Trojan. Gema. No. CABCInstall. XCABCInstall. exe. Ignite Technologies (was CABC) content delivery software. No. Internet. The file is located in %System%No. HKCUXcache. 1. exe. Detected by Malwarebytes as Backdoor. HMCPol. Gen. The file is located in %App. Data%\navigate - see here. Nodnscache. Xcache. Detected by Malwarebytes as Backdoor. Agent. HKP. The file is located in %App. Data%\navigate - see here. No. HKLMXcache. 1. Detected by Malwarebytes as Backdoor. HMCPol. Gen. The file is located in %App. Data%\navigate - see here. Noload. Xcache. 1. Detected by Malwarebytes as Backdoor. Agent. HKP. Note - this entry modifies the legitimate HKCU\Software\Microsoft\Windows NT\Current. Version\Windows . Note - this entry adds an illegal HKCU\Software\Microsoft\Windows NT\Current. Version\Winlogon . The value data points to . Should only be run once and not loaded at start- up. No. Stub. Path. Xcachemgr. Detected by Microsoft as Backdoor: Win. Bifrose. IQNo. Cache. Mgr. YCache. Mgr. Part of the Remote Update utility for older versions of Sophos antivirus products which provided an easy way for remote workers to keep up to date with their virus protection via a website or network connection provided by their employer. Runs as a service on an NT based OS (such as Windows 1. Vista/XP)No. Systeme. Xcachereg. exe. Detected by Dr. Web as Trojan. Siggen. Malwarebytes as Backdoor. Agent. STMGen. No. Cache. Sentry Pro. UCache. Sentry Pro. Cache. Sentry Pro by Enigmatic. Software - . The file is located in %Local. App. Data%\. The file is located in %Local. App. Data%\. The file is located in %Common. App. Data%Nocaeaadbdabfedeagfdgfdgdfg. Xcaeaadbdabfedeagfdgfdgdfg. Detected by Malwarebytes as Backdoor. Bot. The file is located in %Common. App. Data%Noca. 40. Xcafef. 9. exe. Detected by Dr. Web as Trojan. Down. Loader. 9. 2. 08. Malwarebytes as Trojan. Spy. Eyes. No. Cafe. Station. UCafe. Station. Our software provides you with ameans to control the workstations, manage customer database, sell products and generate detailed reports and statistics. The file opens the main firewall configuration Window but does not appear to run on startup - hence the . The file opens the main firewall configuration Window but does not appear to run on startup - hence the . The file opens the main firewall configuration Window but does not appear to run on startup - hence the . It works by generating one- off transaction numbers as a substitute for your real cahoot credit card details. Run manually when needed. No. Cai. XCai. exe. Detected by Malwarebytes as Spyware. Password. The file is located in %Local. App. Data%No. Ca. ISSDTUcaissdt. exe. Installed with older versions of both stand- alone security tools and suites from CA. Provides System Tray access to the dashboard - which indicates the current tool status and can be used to launch scans, updates or access product information. Yes. Computer Associates Dashboard Tray. Ucaissdt. exe. Installed with older versions of both stand- alone security tools and suites from CA. Provides System Tray access to the dashboard - which indicates the current tool status and can be used to launch scans, updates or access product information. Yes. CAIXA. exe. XCAIXA. Detected by Malwarebytes as Trojan. Banker. E. The file is located in %Common. Files%No. Dl. Dir. Xca. Ke. Detected by Symantec as W3. HLLW. Cake. No. Dir. Xca. Ke. Detected by Symantec as W3. HLLW. Cake. No. Policies. Xcalc. exe. Detected by Intel Security/Mc. Afee as Generic Dropper and by Malwarebytes as Backdoor. Agent. PGen. Note - this is not the legitimate Windows calculator file of the same name which is located in %System%. This one is located in %Windir%\addins. No. Policies. Xcalc. Detected by Malwarebytes as Backdoor. Agent. PGen. Note - this is not the legitimate Windows calculator file of the same name which is located in %System%. This one is located in %Windir%\Calculadora. No. Microsoft Calculator. Xcalc. exe. Added by a variant of W3. IRCBot. Note - this is not the legitimate Windows calculator file of the same name which is located in %System%No. HKCUXcalc. exe. Detected by Malwarebytes as Backdoor. HMCPol. Gen. Note - this is not the legitimate Windows calculator file of the same name which is located in %System%. This one is located in %Windir%\System. No. Microsoft. Xcalc. Detected by Malwarebytes as Backdoor. HMCPol. Gen. Note - this is not the legitimate Windows calculator file of the same name which is located in %System%. This one is located in %Windir%\System. Nogpresult. exe. Xcalc. Detected by Malwarebytes as Trojan. Agent. GPGen. Note - this is not the legitimate Windows calculator file of the same name which is located in %System%. This one is located in %App. Data%\Emwe. Nointernet. Xcalc. exe. Detected by Intel Security/Mc. Afee as RDN/Generic. Malwarebytes as Trojan. Agent. Gen. Note - this is not the legitimate Windows calculator file of the same name which is located in %System%. This one is located in %App.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
August 2017
Categories |