home *** CD-ROM | disk | FTP | other *** search
/ Mundo do CD-ROM 118 / cdrom118.iso / suporte / startup / StartOpt.exe / {app} / st.dat < prev    next >
Encoding:
Text File  |  2006-04-21  |  2.3 MB  |  42,578 lines

Text Truncated. Only the first 1MB is shown below. Download the file for the complete contents.
  1. [ winsystem.sys]
  2. Number=7
  3. Confirmed=X
  4. Filename=smss.exe
  5. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.sober.k@mm.html" target=_blank>SOBER.K</a> TROJAN! Note - this is not the legitimate <a href="http://www.liutilities.com/products/wintaskspro/processlibrary/smss/" target=_blank>smss.exe</a> process which is always located in the System (9x/Me) or System32 (NT/2K/XP) folder and should not normally figure in Msconfig/Startup! This file is located in a msagent\win32 subfolder of the Winnt or Windows folder
  6. Source=Paul Collins Startup list
  7.  
  8. [!1_pgaccount]
  9. Number=8
  10. Confirmed=Y
  11. Filename=pgaccount.exe
  12. Description=DiamondCS <a href="http://www.diamondcs.com.au/processguard/" target=_blank>ProcessGuard</a> security software - stops malicious worms and trojans from being executed silently in the background, as well as a variety of other attacks. You will see one instant of pgaccount.exe for every active account on your system, and this is essential for PG to work properly
  13. Source=Paul Collins Startup list
  14.  
  15. [!1_ProcessGuard_Startup]
  16. Number=9
  17. Confirmed=Y
  18. Filename=procguard.exe
  19. Description=DiamondCS <a href="http://www.diamondcs.com.au/processguard/" target=_blank>ProcessGuard</a> security software - stops malicious worms and trojans from being executed silently in the background, as well as a variety of other attacks
  20. Source=Paul Collins Startup list
  21.  
  22. [!NoLoad]
  23. Number=10
  24. Confirmed=N
  25. Filename=winrecon.exe
  26. Description=<a href="http://www.winrecon.com/" target="_blank">WinRecon</a> - surveillance software that creates records of everything people do on a computer, ie, spying or monitoring depending upon how you call it
  27. Source=Paul Collins Startup list
  28.  
  29. [$EnterNet]
  30. Number=11
  31. Confirmed=?
  32. Filename=Enternet.exe
  33. Description=Connection manager for the EnterNet ISP. You can also use <a href="http://user.cs.tu-berlin.de/~normanb/" target="_blank">RASPPOE</a>
  34. Source=Paul Collins Startup list
  35.  
  36. [$sys$cmp]
  37. Number=12
  38. Confirmed=X
  39. Filename=$sys$xp.exe
  40. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.ryknos.b.html" target=_blank>RYKNOS.B</a> TROJAN! Attempts to utilize the Sony Rootkit A.K.A. SecurityRisk.First4DRM security risk to hide itself on the compromised computer
  41. Source=Paul Collins Startup list
  42.  
  43.  
  44.  
  45.  
  46. [$sys$drv]
  47. Number=16
  48. Confirmed=X
  49. Filename=$sys$drv.exe
  50. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.ryknos.html" target=_blank>RYKNOS</a> TROJAN! Attempts to utilize the Sony Rootkit A.K.A. SecurityRisk.First4DRM security risk to hide itself on the compromised computer
  51. Source=Paul Collins Startup list
  52.  
  53.  
  54.  
  55.  
  56.  
  57.  
  58.  
  59. [$WindowsRegKey%update]
  60. Number=23
  61. Confirmed=X
  62. Filename=IEXPLORE.EXE
  63. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotez.html" target=_blank>RBOT-EZ</a> WORM! Note - this is not the legitimate Internet Explorer <a href="http://www.liutilities.com/products/wintaskspro/processlibrary/iexplore/" target=_blank>iexplore.exe</a> process which is always located in the Program Files\Internet Explorer folder and should not normally figure in Msconfig/Startup! This file is located in the System (9x/Me) or System32 (NT/2K/XP) folder
  64. Source=Paul Collins Startup list
  65.  
  66. [%cmpmixtitle%]
  67. Number=24
  68. Confirmed=N
  69. Filename=%cmpmixstr%
  70. Description=<font color="#FF0000">Possibly related to C-Media Mixer Control panel?</font>
  71. Source=Paul Collins Startup list
  72.  
  73. [%FP%012-L2TP fts.exe]
  74. Number=25
  75. Confirmed=?
  76. Filename=fts.exe
  77. Description=012.Net ISP software - <font color="#FF0000">what does it do and is it required?</font>
  78. Source=Paul Collins Startup list
  79.  
  80. [%FP%012-L2TP FWPortal.exe]
  81. Number=26
  82. Confirmed=?
  83. Filename=FWPortal.exe
  84. Description=012.Net ISP software - <font color="#FF0000">what does it do and is it required?</font>
  85. Source=Paul Collins Startup list
  86.  
  87. [%FP%1776 Internet fts.exe]
  88. Number=27
  89. Confirmed=?
  90. Filename=fts.exe
  91. Description=1776 Internet ISP software - <font color="#FF0000">what does it do and is it required?</font>
  92. Source=Paul Collins Startup list
  93.  
  94. [%FP%1776 Internet FWPortal.exe]
  95. Number=28
  96. Confirmed=?
  97. Filename=FWPortal.exe
  98. Description=1776 Internet ISP software - <font color="#FF0000">what does it do and is it required?</font>
  99. Source=Paul Collins Startup list
  100.  
  101. [%FP%Barak013 fts.exe]
  102. Number=29
  103. Confirmed=?
  104. Filename=fts.exe
  105. Description=Barak013 ISP software - <font color="#FF0000">what does it do and is it required?</font>
  106. Source=Paul Collins Startup list
  107.  
  108. [%FP%Barak013 FWPortal.exe]
  109. Number=30
  110. Confirmed=?
  111. Filename=FWPortal.exe
  112. Description=Barak013 ISP software - <font color="#FF0000">what does it do and is it required?</font>
  113. Source=Paul Collins Startup list
  114.  
  115. [%FP%Friendly fts.exe]
  116. Number=31
  117. Confirmed=?
  118. Filename=fts.exe
  119. Description=Friendly ISP software - <font color="#FF0000">what does it do and is it required?</font>
  120. Source=Paul Collins Startup list
  121.  
  122. [(default)]
  123. Filename=[random filename].exe
  124. Confirmed=X
  125. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.blackmal@mm.html" target="_blank">BLACKMAL</a> WORM!
  126. [(l4r1$$4) (4nt1) (v1ruz)]
  127. Filename=SP00Lsv32.pif
  128. Confirmed=X
  129. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.assiral.b@mm.html" target=_blank>ASSIRAL.B</a> WORM!
  130. [)start service]
  131. Filename=upssrv.exe
  132. Confirmed=U
  133. Description=Cyber Power <a href="http://www.cyberpowersystems.com/" target=_blank>PowerPanelPlus</a> software. "In the event of a power outage, PowerPanelPlus Software automatically saves and closes all open files, and then shuts down the computer system in an intelligent and orderly manner"
  134. [,main drive loader]
  135. Filename=wininfo.exe
  136. Confirmed=X
  137. Description=Suspected malware as it appears in 3 different registry locations - see <a href="http://forums.techguy.org/t151017/s.html" target="_blank"> here</a>
  138. [.mscdsr]
  139. Filename=lsvchost.exe
  140. Confirmed=X
  141. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojbdoorcr.html" target=_blank>CR</a> TROJAN!
  142. [.mscsbl]
  143. Filename=svhost.exe
  144. Confirmed=X
  145. Description=Added by the <a href="http://vil.mcafeesecurity.com/vil/content/v_130850.htm" target=_blank>CMQ</a> TROJAN!
  146. [.msfupdate]
  147. Filename=msveup.exe
  148. Confirmed=X
  149. Description=Added by the <a href="http://www.symantec.com/avcenter/venc/data/w32.allocup.a.html" target=_blank>ALLOCUP.A</a> WORM!
  150. [.mssecure]
  151. Filename=mssecure.exe
  152. Confirmed=X
  153. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=DDOS_BOXED.X&VSect=P" target=_blank>DDOS_BOXED.X</a> TROJAN!
  154. [.net config]
  155. Filename=sysmon32.exe
  156. Confirmed=?
  157. Description=<font color="#FF0000">??</font>
  158. [.norton]
  159. Filename=rchost.exe
  160. Confirmed=X
  161. Description=Added by a variant of the <a href="http://www.sophos.com/virusinfo/analyses/trojboxeda.html" target=_blank>BOXED-A</a> TROJAN!
  162. [.svchost]
  163. Filename=CSRSS.EXE
  164. Confirmed=X
  165. Description=Added by the <a href="http://www.symantec.com/avcenter/venc/data/trojan.webus.f.html" target=_blank>WEBUS.F</a> TROJAN! Note - this is not the legitimate <a href="http://www.liutilities.com/products/wintaskspro/processlibrary/csrss/" target=_blank>csrss.exe</a> process which is always located in the System (9x/Me) or System32 (NT/2K/XP) folder and should not normally figure in Msconfig/Startup! This file is located in the System folder
  166. [/l:eng]
  167. Filename=N/A
  168. Confirmed=N
  169. Description=Related to the Dell OEM version of the Sound Blaster Audigy 2 sound card. If this item is listed and checked in startup, the System32 Folder will appear on every startup. A patch is available - filename R75304.EXE - that fixes the issue. You can find that file at support.dell.com by typing that name in the 'Search' box available there. It addresses the root of the problem in Creative's software and corrects it. Unfortunately there is no direct link to the file, but it's easily available using the search function
  170. [000]
  171. Filename=pit.exe
  172. Confirmed=U
  173. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/spyware.privateeye.html" target=_blank>PrivateEye</a> surveillance software! Note - If you did not intentionally install this remove it
  174. [000hpdllhos]
  175. Filename=hpdllhost.exe
  176. Confirmed=X
  177. Description=<a href="http://www.spywareguide.com/product_show.php?id=853" target="_blank">LZIO.com</a> adware downloader
  178. [000stthk]
  179. Filename=000StTHK.exe
  180. Confirmed=U
  181. Description=Toshiba Hot key functionality for the function keys (Fn-Esc, Fn-F1 (lock), Fn-F2, Fn-F3, Fn-F4, Fn-F5 (switching between laptop and CRT display output), etc...)
  182. [0050726-007-i32-1]
  183. Filename=0050726-007-i32-1.exe
  184. Confirmed=X
  185. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojbancbanec.html" target=_blank>BANCBAN-EC</a> TROJAN!
  186. [00dsksvr00]
  187. Filename=desksaver.exe
  188. Confirmed=?
  189. Description=Related to <a href="http://www.softstack.com/deskshield.html" target=_blank>Advanced Desktop Shield</a>
  190. [00dsksvr01]
  191. Filename=desksaver.exe
  192. Confirmed=?
  193. Description=Related to <a href="http://www.softstack.com/deskshield.html" target=_blank>Advanced Desktop Shield</a>
  194. [00thotkey]
  195. Filename=00THotKey.exe
  196. Confirmed=U
  197. Description=For Toshiba Satellite notebook series to use the front buttons, play, stop, next, prev.
  198. [0190 warner]
  199. Filename=WARN0190.EXE
  200. Confirmed=U
  201. Description=Anti-dialer <a href="http://www.wt-rate.com/" target=_blank>program</a> (Germany)
  202. [0900 warner]
  203. Filename=WARN0900.EXE
  204. Confirmed=U
  205. Description=Anti-dialer <a href="http://www.wt-rate.com/" target=_blank>program</a> (Germany)
  206. [0utlook express]
  207. Filename=*****.exe [* = random char]
  208. Confirmed=X
  209. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotcc.html" target=_blank>RBOT-CC</a> WORM! Note the first letter is actually the digit "0" and not a capital "o"
  210. [1]
  211. Filename=1.exe
  212. Confirmed=X
  213. Description=Added by the <a href="http://www.symantec.com/avcenter/venc/data/trojan.esteems.html" target=_blank>ESTEEMS</a> TROJAN!
  214. [1111swapmgr.exe]
  215. Filename=1111swapmgr.exe
  216. Confirmed=X
  217. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojbdooric.html" target=_blank>IC</a> TROJAN!
  218. [123456]
  219. Filename=rundll32.exe shell32.dll, Control_RunDLL ...123456.cpl
  220. Confirmed=X
  221. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.kitro.c.worm.html" target="_blank">KITRO.C</a> (or <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_DANDI.A&VSect=T" target="_blank">DANDI.A</a>) WORM! 123456 can be any random 3 to 6 digit number
  222. [12ghosts popup-killer]
  223. Filename=12popup.exe
  224. Confirmed=U
  225. Description=<a href="http://12ghosts.com/ghosts/popup.htm" target="_blank">12Ghosts Popup-Killer</a>
  226. [17779proj2002]
  227. Filename=N/A
  228. Confirmed=?
  229. Description=<font color="#FF0000">??</font>
  230. [180adsolution]
  231. Filename=180adsolution.exe
  232. Confirmed=X
  233. Description=<a href="http://research.sunbelt-software.com/threat_display.cfm?name=NCase&threatid=8869&search=ncase" target=_blank>nCase</a> adware
  234. [180ax]
  235. Filename=180ax.exe
  236. Confirmed=X
  237. Description=<a href="http://research.sunbelt-software.com/threat_display.cfm?name=NCase&threatid=8869&search=ncase" target=_blank>nCase</a> adware
  238. [1:]
  239. Filename=hpdrv.exe
  240. Confirmed=N
  241. Description=HP utility for monitoring when and how many recoveries have been done
  242. [1a:macvisiontraymonitor]
  243. Filename=TrayMonitor.exe
  244. Confirmed=N
  245. Description=Comes with the MacVision program for monitoring tray icons (Note : program is by Stardock)
  246. [1a:stardock mcp]
  247. Filename=mcpserver.exe
  248. Confirmed=Y
  249. Description=Master Control Program for Stardock apps, in development. People should leave it running if they're using any of the Stardock applications
  250. [1a:stardock traymonitor]
  251. Filename=TrayServer.exe
  252. Confirmed=Y
  253. Description=For monitoring tray icons - if disabled icons will not be displayed in ObjectBar or DesktopX
  254. [1cmails]
  255. Filename=NETMAIL.EXE
  256. Confirmed=?
  257. Description=<font color="#FF0000">??</font>
  258. [1on1]
  259. Filename=1on1.exe
  260. Confirmed=X
  261. Description=Adult content dialler
  262. [1srv32]
  263. Filename=SpyAgent4.exe
  264. Confirmed=U
  265. Description=SpyTech <a href="http://www.spytech-web.com/spyagent.shtml" target="_blank">SpyAgent</a> monitoring software. "Spy software that allows you to monitor EVERYTHING users do on your PC."
  266. [1wincfg32]
  267. Filename=WebMailSpy.exe
  268. Confirmed=X
  269. Description=<a href="http://securityresponse.symantec.com/avcenter/venc/data/spyware.webmailspy.html" target=_blank>WebMailSpy</a> spyware
  270. [2020downloader]
  271. Filename=mssvr.exe
  272. Confirmed=X
  273. Description=<a href="http://research.sunbelt-software.com/threat_display.cfm?name=2020Search&threatid=13811" target=_blank>2020Search</a> Toolbar
  274. [252]
  275. Filename=winmgr.exe
  276. Confirmed=X
  277. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojlegmirat.html" target=_blank>LEGMIR-AT</a> TROJAN!
  278. [2thousandbuck]
  279. Filename=[path to file]
  280. Confirmed=X
  281. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.ranky.l.html" target=_blank>RANKY.L</a> TROJAN!
  282. [2wsystray]
  283. Filename=2portalmon.exe
  284. Confirmed=U
  285. Description=<a target="_blank" href="http://www.2wire.com/home/index.html">2Wire Homeportal</a> user interface
  286. [32-bit thunking service]
  287. Filename=thunk32.exe
  288. Confirmed=X
  289. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.derdero.a@mm.html" target=_blank>DERDERO.A</a> WORM!
  290. [357aa41a-b7a8-4632-a27d-5b980b25cf43]
  291. Filename=services.exe
  292. Confirmed=X
  293. Description=Added by <a href="http://www.symantec.com/avcenter/venc/data/adware.fakemessage.html" target=_blank>FakeMessage/AdRotator</a> adware. Note - this is not the legitimate <a href="http://www.liutilities.com/products/wintaskspro/processlibrary/services/" target="_blank">services.exe</a> process which is always located in the System (9x/Me) or System32 (NT/2K/XP) folder and should not normally figure in Msconfig/Startup! This file is located in an "Inetsrv" subfolder
  294. [39eltfh25z8skf]
  295. Filename=Ezg1q5.exe
  296. Confirmed=?
  297. Description=<font color="#FF0000">Seems to be associated with software by <a href="http://www.resplendence.com/docs/" target="_blank">Resplendence SP</a> ?</font>
  298. [3c1807pd]
  299. Filename=3cmlink.exe 3cpipe-3c1807pd
  300. Confirmed=Y
  301. Description=3Com WinModem driver. See <a href="http://808hi.com/56k/winmodems.asp" target="_blank">here</a> for more WinModem information
  302. [3capplnk]
  303. Filename=3capplnk.exe
  304. Confirmed=Y
  305. Description=US Robotics Modem driver
  306. [3cdminic]
  307. Filename=3CDMINIC.EXE
  308. Confirmed=N
  309. Description=3Com DMI (DynamicAccess <u>D</u>esktop <u>M</u>anagement <u>I</u>nterface) Agent associated with 3Com network cards
  310. [3cm link]
  311. Filename=3cmcnkw.exe
  312. Confirmed=Y
  313. Description=Required for a US Robotics WinModem as it provides the link to Windows - won't work without it
  314. [3cmlink]
  315. Filename=3CmlinkW.exe
  316. Confirmed=Y
  317. Description=For a US Robotics WinModem. Provides the link to Windows as the CPU does the processing on WinModems - won't work without it. See <a href="http://808hi.com/56k/winmodems.asp" target="_blank">here</a> for more WinModem information
  318. [3comdmiagent]
  319. Filename=3CDMINIC.EXE
  320. Confirmed=N
  321. Description=3Com DMI (DynamicAccess <u>D</u>esktop <u>M</u>anagement <u>I</u>nterface) Agent associated with 3Com network cards
  322. [3cpipe-usrpda]
  323. Filename=USRmlnkA.exe
  324. Confirmed=Y
  325. Description=Modem driver files from US Robotics
  326. [3d text]
  327. Filename=3D Text.scr
  328. Confirmed=X
  329. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.jermy.a.html" target="_blank"> JERMY.A</a> WORM!
  330. [3deep control panel]
  331. Filename=3DeepCTL.EXE
  332. Confirmed=U
  333. Description=From <a href="http://www.colorific.com/index.htm" target="_blank">LightSurf Technologies</a> (nee E-Color) - <a href="http://www.colorific.com/d1.htm" target="_blank">3Deep</a> corrects lighting, shading and color for all your 2D and 3D games
  334. [3dfx acc]
  335. Filename=GFXACC.EXE
  336. Confirmed=X
  337. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.gibe@mm.html" target="_blank">GIBE</a> WORM!
  338. [3dfx task manager]
  339. Filename=3dfxMan.exe
  340. Confirmed=N
  341. Description=System Tray application for 3dfx Voodoo 3/4/5 functions. Available via Start -> Programs
  342. [3dfx tools]
  343. Filename=3dfxCmn.dll
  344. Confirmed=Y
  345. Description=Updates the registry with information that can't be held for Voodoo 3/4/5 series graphics cards. Important for owners of these cards
  346. [3dfxv2ps.dll]
  347. Filename=3dfxv2ps.dll
  348. Confirmed=Y
  349. Description=Updates the registry with info that can't be held for 3dfx Voodoo 2 video cards. Important for owners of these cards
  350. [3dlabs taskbar display manager]
  351. Filename=3DLman.exe
  352. Confirmed=?
  353. Description=3DLabs graphics driver related. <font color="#FF0000"> System Tray access to display settings?</font>
  354. [3dlabshelperdemon]
  355. Filename=3dldemon.exe
  356. Confirmed=U
  357. Description=Directly from the programs author "It is a tiny program that is installed by the Permedia2/3 and probably other Oxygen-series cards. Normally it sits in the background doing nothing at all (sleeping on a semaphore), so it should take zero CPU time and virtually zero memory, since it will all be paged out to the hard drive." In most cases it can be safely disabled
  358. [3dmouse.exe]
  359. Filename=3DMouse.EXE
  360. Confirmed=Y
  361. Description=Dritek System Inc. 3D Mouse driver
  362. [3d_sound]
  363. Filename=3d_sound.exe
  364. Confirmed=X
  365. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojriadosa.html" target=_blank>RIADOS-A</a> TROJAN!
  366. [3qdctl.exe]
  367. Filename=3qdctl.exe
  368. Confirmed=U
  369. Description=Provided with Terratec 128i PCI and similar sound cards. Loads a sound profile at bootup, restoring volume and other audio settings to a pre-determined default. Similar to Creative Lab's AudioHQ
  370. [3ware 3dm]
  371. Filename=3dm.exe
  372. Confirmed=Y
  373. Description=Monitors status of the disk array on 3ware IDE RAID controllers
  374. [4wd!!!]
  375. Filename=Natal!.pif
  376. Confirmed=X
  377. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_OPASERV.AI" target="_blank">OPASERV.AI</a> WORM!
  378. [5-1-61-96]
  379. Filename=members-area.exe
  380. Confirmed=X
  381. Description=Adult content dialler
  382. [5-2-46-112]
  383. Filename=5-2-46-112.exe
  384. Confirmed=X
  385. Description=Adult content pop-up dialler. Removal instructions <a href="http://groups.google.com/groups?hl=en&lr=&ie=UTF-8&oe=UTF8&safe=off&threadm=1e10cd61.0203201743.78f51cfa%40posting.google.com&rnum=9&prev=/groups%3Fq%3D5-2-46-112.exe%26hl%3Den%26lr%3D%26ie%3DUTF-8%26oe%3DUTF8%26safe%3Doff%26selm%3D1e10cd61.0203201743.78f51cfa%40posting.google.com%26rnum%3D9" target="_blank">here</a>
  386. [55278]
  387. Filename=grepclient1.exe
  388. Confirmed=X
  389. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojlineages.html" target=_blank>LINEAGE-S</a> TROJAN!
  390. [5p4m]
  391. Filename=[path to trojan]
  392. Confirmed=X
  393. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojlitebotc.html" target=_blank>LITEBOT-C</a> TROJAN!
  394. [666]
  395. Filename=Ska.exe
  396. Confirmed=X
  397. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojpipes.html" target=_blank>PIPES</a> TROJAN!
  398. [678]
  399. Filename=lsas32.exe
  400. Confirmed=X
  401. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojslsorveb.html" target=_blank>SLSORVE-B</a> TROJAN!
  402. [98d0ce0c16b1]
  403. Filename=rundll32.exe D0CE0C16B1, D0CE0C16B1
  404. Confirmed=X
  405. Description=<a href="http://research.sunbelt-software.com/threat_display.cfm?name=BrowserAid&threatid=3342&search=browseraid" target=_blank>BrowserAid/BrowserPal</a> foistware
  406. [9xadiras]
  407. Filename=9xadiras.exe
  408. Confirmed=Y
  409. Description=<a href="http://www.alliedtelesyn.co.uk/en-gb/" target=_blank>Allied Telesyn</a> AT series router/modem related - apparently required
  410. [9xhtprotect]
  411. Filename=AVprotect9x.exe
  412. Confirmed=X
  413. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.netsky.m@mm.html" target="_blank">NETSKY.M</a> WORM!
  414. [;rundll]
  415. Filename=[filename]
  416. Confirmed=X
  417. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=TROJ_PWSLEGMIR.E" target="_blank">PWSLEGMIR.E</a> TROJAN!
  418. [@]
  419. Filename=regedit -s ..win.dll
  420. Confirmed=X
  421. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/js.seeker.k.html" target="_blank">SEEKER.K</a> TROJAN!
  422. [@hoc toolbar]
  423. Filename=AtHoc.exe
  424. Confirmed=N
  425. Description=One-click activated browsing toolbar used by various web-sites. See <a href="http://siliconvalley.internet.com/news/article.php/3531_479951" target="_blank">here</a> for more info
  426. [@loha]
  427. Filename=reminder.exe
  428. Confirmed=N
  429. Description=Registration reminder for <a href="http://www.pcworld.com/downloads/file_description/0,fid,6581,00.asp" target="_blank">@loha@home</a> E-mail utility
  430. [@tour_ww]
  431. Filename=@tour_ww[1].exe
  432. Confirmed=X
  433. Description=Adult content dialler
  434. [a new windows updater]
  435. Filename=w32NTupdt.exe
  436. Confirmed=X
  437. Description=Added by <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.mytob.bm@mm.html" target= blank>MYTOB.BM</a> WORM!
  438. [a-squared]
  439. Filename=a2guard.exe
  440. Confirmed=U
  441. Description=<a href="http://www.emsisoft.com/en/" target=_blank>a-Squared</a> antitrojan - can be run on demand but necessary in Startup if you prefer the a?'Background Guard' real time protection feature
  442. [a-winpoet-service]
  443. Filename=winpppoverethernet.exe
  444. Confirmed=Y
  445. Description=WinPoET is the industry's first Windows-based PPP over Ethernet client. Developed by iVasion, WinPoET is attractive to equipment providers, modem suppliers, RBOCs and ISPs. For more info read <a href="http://www.finepoint.com/products/winpoet/index.html" target="_blank">here</a>. It uses dial-up networking for new high-speed internet customers who are more familiar with analogue modems. If unchecked in MSCONFIG it reports Error 360 - Hardware Error in dial-up networking
  446. [a1000 settings utility]
  447. Filename=cpqa1000.exe
  448. Confirmed=U
  449. Description=Compaq A1000 Print Fax All-in-One copy scan printer software. Required in the Startup in order to scan, print, copy and fax. Only required if you use these features
  450. [a4proxy]
  451. Filename=A4Proxy.exe
  452. Confirmed=U
  453. Description=<a href="http://www.findincontext.com/a4proxy/review.htm" target="_blank">Anonymity 4 Proxy</a> - local proxy server that makes you anonymous when visiting web sites
  454. [aaaclean]
  455. Filename=AAACLEAN.INF
  456. Confirmed=?
  457. Description=<font color="#FF0000">??</font>
  458. [aaakeyboard]
  459. Filename=??
  460. Confirmed=?
  461. Description=<font color="#FF0000">??</font>
  462. [aaatraysaver]
  463. Filename=TraySaver.exe
  464. Confirmed=N
  465. Description=System Tray management utility from <a href="http://www.mlin.net/" target="_blank">Mike Lin</a> which allows you to hide, show, restore icons that are lost in an Explorer crash, remove dead tray icons, minimize any window to the System Tray
  466. [aak]
  467. Filename=aak.exe
  468. Confirmed=U
  469. Description=<a href="http://www.anti-keylogger.net/" target="_blank">Advanced Anti-Keylogger</a> - "Anti-spy software to prohibit operation of any keyloggers currently in use or presently being developed anywhere"
  470. [aaou]
  471. Filename=amee.exe
  472. Confirmed=X
  473. Description=<a href="http://research.sunbelt-software.com/threat_display.cfm?name=ClickSpring.PuritySCAN&threatid=10115" target=_blank>PurityScan/Clickspring</a> adware
  474. [aapp]
  475. Filename=adprot.exe
  476. Confirmed=X
  477. Description=<a href="http://www.symantec.com/avcenter/venc/data/adware.adblaster.html" target=_blank>AdBlaster</a> adware
  478. [aauclient]
  479. Filename=ACNUpdater.exe
  480. Confirmed=?
  481. Description=Appears to be related to software from <a href="http://www.accenture.com/xd/xd.asp?it=enweb&xd=index.xml" target=_blank>Accenture.com</a>F1527
  482. [ab eazyscheduler]
  483. Filename=ezsched.exe
  484. Confirmed=?
  485. Description=<font color="#FF0000">??</font>
  486. [abbyy community agent]
  487. Filename=CAGENT.EXE
  488. Confirmed=N
  489. Description=Installed with the Optical Character Recognition (OCR) software that comes bundled with a Compaq A3000 all-in-one printer/scanner. Its function appears to be to link you to the internet in an attempt to buy the 5.0 version of the software
  490. [abc]
  491. Filename=keylogger.exe
  492. Confirmed=U
  493. Description=Keystroke logger/monitoring program. Given a "U" recommendation because it depends if you intentionally installed it. If you didn't treat it as "X" and uninstall or remove
  494. [abcdefgh]
  495. Filename=abcdefgh.exe
  496. Confirmed=X
  497. Description=Malware - detected by <a href="http://www.pandasoftware.com/products/titanium2005/" target=_blank>Panda</a> antivirus as the DOWNLOADER.EPJ TROJAN!
  498. [abit uguru]
  499. Filename=uGuru.exe
  500. Confirmed=U
  501. Description=Provides quick access to several Abit motherboard utilities - such as monitoring cpu temperature, fan speeds, overclocking, flashing of BIOS
  502. [abiteq]
  503. Filename=abiteq.exe
  504. Confirmed=N
  505. Description=Monitoring utility for ABIT Motherboards. Displays system voltages, temperatures and fan speeds
  506. [absolute shield]
  507. Filename=dseraser.exe
  508. Confirmed=U
  509. Description=<a href="http://www.absoluteshielderaserinternet.com/" target="_blank">Absolute Shield/Evidence Eliminator</a> - iternet history eraser
  510. [absolute startup monitor]
  511. Filename=ASMon.exe
  512. Confirmed=U
  513. Description=<a href="http://www.fgroupsoft.com/Absolutestartup/" target="_blank">Absolute Startup</a> - startup monitor from F-Group Software
  514. [abysswebserver]
  515. Filename=abyssws.exe
  516. Confirmed=U
  517. Description=<a href="http://abyss.sourceforge.net/" target="_blank">Abyss</a> web server
  518. [acbtnmgr_xxx]
  519. Filename=AcBtnMgr_Xxx.exe
  520. Confirmed=Y
  521. Description=Associated with the Lexmark Xxx (where "xx" is the model) all-in-one printer/scanner/copier. Required for correct operation
  522. [acc]
  523. Filename=acc.exe
  524. Confirmed=U
  525. Description=<a href="http://www.voicecallcentral.com/#advanced_call_center" target="_blank">Advanced Call Center</a> - "full-featured yet easy-to-use answering machine software for your voice modem"
  526. [accdefraginfo]
  527. Filename=[path to worm]
  528. Confirmed=X
  529. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32darbyo.html" target=_blank>DARBY-O</a> WORM!
  530. [accelerate]
  531. Filename=accelerate.exe
  532. Confirmed=U
  533. Description=Webroot <a href="http://www.webroot.com/wb/products/accelerate/index.php" target="_blank">Accelerate</a> - allows you to optimize Windows network registry settings in order to boost surfing speeds. Leave this enabled if you find it improves your connection
  534. [access ramp monitor]
  535. Filename=armon32.exe
  536. Confirmed=N
  537. Description=Monitors your progress on the internet; hang-ups, connection speeds, internet congestion and traffic flow. It prevents some games from running also. To disable the Access Ramp Monitor (1) Open Windows Explorer (2) Open the Program Files folder (3) Open the MindSpring folder (4) Open the AccessRamp folder (5) Double-click on the ARMCfg32.exe file (6) Uncheck Enable Dialup Monitor and click OK (7) Restart the computer and try again
  538. [access webcontrol]
  539. Filename=[path to file]
  540. Confirmed=X
  541. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojppdoorm.html" target=_blank>PPDOOR-M</a> TROJAN!
  542. [accessmanager]
  543. Filename=AccessMgr.exe
  544. Confirmed=U
  545. Description=Part of SmartPipes <a href="http://www.smartpipes.com/SecureSite.htm" target=_blank>SecureSite</a> software. "SecureSite enables rapid turnup and enhanced administration of VPNs. It automates and simplifies tasks for VPN design and policy management, access control management, and key management"
  546. [accessmedia p2p loader]
  547. Filename=amp2pl.exe
  548. Confirmed=X
  549. Description=My AccessMedia toolbar related, stealth installed!
  550. [accessoriesplus]
  551. Filename=clockplus.exe
  552. Confirmed=U
  553. Description=Clock Plus, part of <a href="http://simplypowerful.com/software/accessoriesplus.html" target=_blank>Accessories Plus</a> allows you to select from dozens of alternatives for the Windows clock
  554. [accessramp monitor01]
  555. Filename=ARMon32a.exe
  556. Confirmed=N
  557. Description=From a visitor "Just wanted to provide you with some info on Access Ramp software installed with Verizon DSL accounts in those areas that use the Winpoet PPPoE software. The Access Ramp TSRs are installed as part of IP Insight software (can't remember the software maker). You can decline to install IP Insight during Winpoet setup, or go into Add/Remove programs uninstall IP Insight by hand if it's already installed. It really doesn't do a darn thing for you. It was intended to help DSL techs monitor QoS, but the backend part was never implemented (at least as of earlier this year). This will not affect the user's ability or inability to access their DSL service."
  558. [accessramplan01]
  559. Filename=ARUpld32.exe
  560. Confirmed=N
  561. Description=Version of the AccessRamp Monitor01 entry for LAN connections - a history uploader. The key in turning it off is a file named ARUCfg32.exe. This file (ARUCfg32.exe) does not show up in the startup process. If you have this file, you can execute it and remove all the monitoring activities it does. Removing all the checks in all the boxes (both tabs) still calls ARUpld32.exe to start when you start the dial up. You can block it from sending info if you have Zone Alarm installed. Renaming the extension of ARUCfg32.exe to ARUCfg32.exe1 works. The ARUpld32.exe is not loaded when launching the dial up client. Written by IP Insight and also included with Earthlink Total Access 2003
  562. [acctmgr]
  563. Filename=AcctMgr.exe
  564. Confirmed=U
  565. Description=Norton?Password Manager - part of <a href="http://www.symantec.com/sabu/sysworks/basic/" target="_blank">Norton SystemWorks 2004</a> - stores passwords and other personal information, and retrieves the data needed for email logins, shopping orders, banking, and other online activitiesùall from the safety of your own PC
  566. [accuweather.com?desktop]
  567. Filename=??
  568. Confirmed=N
  569. Description=Desktop weather from <a href="http://wwwa.accuweather.com/adcbin/public/index.asp?partner=accuweather" target="_blank">AccuWeather.com</a>
  570. [accwizz.exe]
  571. Filename=accwizz.exe
  572. Confirmed=X
  573. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.ruland.a@mm.html" target=_blank>RULAND.A</a> WORM!
  574. [accwizzz.exe]
  575. Filename=accwizzz.exe
  576. Confirmed=X
  577. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.ruland.a@mm.html" target=_blank>RULAND.A</a> WORM!
  578. [ace bows]
  579. Filename=Ace bows.exe
  580. Confirmed=?
  581. Description=<font color="#FF0000">??</font>
  582. [acegain liveupdate]
  583. Filename=LiveUpdate.exe
  584. Confirmed=N
  585. Description=<a href="http://gameone.acegain.com/" target="_blank">AceGain_LiveUpdate</a>. "AceGain LiveUpdate provides a fully managed and customizable LiveUpdate platform that seamlessly integrates with a game. As soon as an update is made available, AceGain manages the alert, download and installation as well as version control and user network preferences."
  586. [acernotebookmanager]
  587. Filename=almxptray.exe
  588. Confirmed=U
  589. Description=System Tray access on some Acer Notebooks to give faster access to system settings
  590. [acerpowerkey]
  591. Filename=Powerkey.exe
  592. Confirmed=U
  593. Description=PowerKey utility for Acer TravelMate notebook PCs. Allows the user to quickly switch between different power schemes by pressing Fn+F3
  594. [aceu]
  595. Filename=[random filename]
  596. Confirmed=X
  597. Description=<a href="http://research.sunbelt-software.com/threat_display.cfm?name=ClickSpring.PuritySCAN&threatid=10115" target=_blank>PurityScan/Clickspring</a> adware
  598. [acme.pchbutton]
  599. Filename=pchbutton.exe
  600. Confirmed=N
  601. Description=Used by HP Instant Support
  602. [acmonitor_xxx]
  603. Filename=ACMonitor_Xxx.exe
  604. Confirmed=Y
  605. Description=Associated with the Lexmark Xxx (where "xx" is the model) all-in-one printer/scanner/copier. Required for correct operation
  606. [acombo3dmouse]
  607. Filename=Acombo3d.exe
  608. Confirmed=U
  609. Description=Mouse driver - required if you use non-standard Windows driver features
  610. [aconti]
  611. Filename=aconti.exe
  612. Confirmed=X
  613. Description=Adult content dialler
  614. [acoustic]
  615. Filename=acoustic.exe
  616. Confirmed=U
  617. Description=Control panel program for Philips <a href="http://www.consumer.philips.com/global/b2c/ce/catalog/product.jhtml;jsessionid=5ZTUCSVZIGCWUCRQNFJRX1YKGBUEWHAW?divId=0&groupId=PCSTUFF&catId=&subCatId=SOUNDCARDS&productId=PSC706_05" target="_blank"> Acoustic Edge</a> soundcard. Not required unless changed settings aren't retained
  618. [acpart]
  619. Filename=agpart11.exe
  620. Confirmed=N
  621. Description=Program for finding trucks on-line
  622. [acronis scheduler2 service]
  623. Filename=schedhlp.exe
  624. Confirmed=U
  625. Description=Part of <a href="http://www.acronis.com/products/trueimage/" target="_blank">Acronis True Image</a> - backup software. Co-operates with the "schedul2.exe" servuce to perform backup/restore tasks correctly. Required if you want to use TrueImage to do some real backup/restore tasks - not if you only want to explore/mount images
  626. [acronis trueimage monitor]
  627. Filename=TrueImageMonitor.exe
  628. Confirmed=N
  629. Description=Part of <a href="http://www.acronis.com/products/trueimage/" target="_blank">Acronis True Image</a> - backup software. Can be disabled without affecting TrueImage
  630. [acronistrueimage monitor]
  631. Filename=TrueImageMonitor.exe
  632. Confirmed=N
  633. Description=Part of <a href="http://www.acronis.com/products/trueimage/" target="_blank">Acronis True Image</a> - backup software. Can be disabled without affecting TrueImage
  634. [acronisáTrueáImage monitor]
  635. Filename=TrueImageMonitor.exe
  636. Confirmed=N
  637. Description=Part of <a href="http://www.acronis.com/products/trueimage/" target="_blank">Acronis True Image</a> - backup software. Can be disabled without affecting TrueImage
  638. [action manager 32]
  639. Filename=am32.exe
  640. Confirmed=N
  641. Description=Associated with a Plustech scanner. Small utility that runs in the background for doing fax/copy/etc. Available via Start -> Programs
  642. [actionagent]
  643. Filename=actionagent.exe
  644. Confirmed=?
  645. Description="A COM server that runs on the client as part of the Dell OpenManage Client Instrumentation 6.x package; provides a simple method for a remote administrator to perform actions on the instrumented client". <font color="#FF0000">Is it required?</font>
  646. [activation]
  647. Filename=Activation.exe
  648. Confirmed=N
  649. Description=Part of Microsoft Money
  650. [activboard]
  651. Filename=MMKeybd.exe
  652. Confirmed=U
  653. Description=Packard Bell ActiveBoard keyboard - multimedia keyboard manager. Required if you use the additional keys and want to see the status of the Num Lock, Caps Lock, Scroll Lock keys
  654. [active bit station]
  655. Filename=abs.exe
  656. Confirmed=X
  657. Description=Added by the <a href="http://www.symantec.com/avcenter/venc/data/w32.mytob.bz@mm.html" target= blank>MYTOB.BZ</a> WORM!
  658. [active shield]
  659. Filename=Activeshield.exe
  660. Confirmed=U
  661. Description=<a href="http://www.securitystronghold.com/" target=_blank>Active Shield</a> is "an heuristic screen that actively protects your computer from trojans, spyware, adware, trackware, dialers, keyloggers, and even some special kinds of viruses"
  662. [activedesktop]
  663. Filename=systray32.exe
  664. Confirmed=X
  665. Description=Added by the <a href="http://www.symantec.com/avcenter/venc/data/w32.hllw.daboom@mm.html" target="_blank">DABOOM</a> WORM!
  666. [activeds]
  667. Filename=ACTIVEDS.EXE
  668. Confirmed=X
  669. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_OPASERV.T" target="_blank">OPASERV.T</a> WORM!
  670. [activeeyes]
  671. Filename=ActiveEyes.exe
  672. Confirmed=N
  673. Description=<a href="http://www.tfi-technology.com/products.htm#ActiveEyes" target="_blank">ActiveEyes</a> from TFI Technology
  674. [activemenu]
  675. Filename=ActiveMenu.exe
  676. Confirmed=U
  677. Description=Wild Tangent demo games that come with some HP computers. Unchecking it can prevent the games from running occasionally. Note that WildTanget's privacy policy used to state that they also collect and share individuals information but this is no longer the case
  678. [activeplus]
  679. Filename=activeplus.exe
  680. Confirmed=U
  681. Description=<a href="http://hot.activebuddy.com/catalog/" target="_blank">Interactive Agents Plugin</a> for <a href="http://www.patchou.com/msgplus/" target="_blank">Messenger Plus!</a> (MSN Messenger add-on)
  682. [activeshield]
  683. Filename=MCVSSHLD.EXE
  684. Confirmed=Y
  685. Description=McAfee VirusScan On-line. See also the McAgentExe entry
  686. [activespeed]
  687. Filename=AS.exe
  688. Confirmed=U
  689. Description=Ascentive <a href="http://www.barelyaverage.com/portfolio/html_emails/ascentive/activespeed_biplane/biplane_anim.html" target=_blank>ActiveSpeed</a> Internet Optimizer
  690. [activexupdate]
  691. Filename=svcss.exe
  692. Confirmed=X
  693. Description=Added by a variant of the <a href="http://www.sophos.com/virusinfo/analyses/trojdedlerc.html" target=_blank>DEDLER.C</a> TROJAN!
  694. [activity]
  695. Filename=actik.exe
  696. Confirmed=U
  697. Description=<a href="http://www.symantec.com/avcenter/venc/data/spyware.activitykey.html" target= blank>ActivityKey</a> Keystroke logger/monitoring program - remove unless you installed it yourself!
  698. [activsurf]
  699. Filename=backweb*****.exe
  700. Confirmed=N
  701. Description=Packard Bell ActivSurf - automatically detects an internet connection and downloads any available updates
  702. [actmaker]
  703. Filename=ActMak25.exe
  704. Confirmed=U
  705. Description=<a href="http://www.789987.com/products.htm" target=_blank>ActMaker</a> mouse and keyboard toolkit can record the daily operation of your computer and reduce your workload. You don't need to do any coding, nor are you required to know a lot about the computer
  706. [acu]
  707. Filename=ACU.exe
  708. Confirmed=U
  709. Description=<a href="http://www.nus.edu.sg/winzone/atheros/" target=_blank>Atheros</a> wireless Client Utility For HP Compaq
  710. [acu_qsb]
  711. Filename=ACU.exe
  712. Confirmed=U
  713. Description=<a href="http://www.nus.edu.sg/winzone/atheros/" target=_blank>Atheros</a> wireless Client Utility For HP Compaq
  714. [ad blocker]
  715. Filename=blocker.exe
  716. Confirmed=U
  717. Description=<a href="http://www.cdkm.com/" target="_blank">Ad Blocker</a> - blocks popups, and also removes banners, image ads and flash ads
  718. [ad blocker pro]
  719. Filename=Ad Blocker Pro.exe
  720. Confirmed=U
  721. Description=Ad Away popup and banner remover
  722. [ad muncher]
  723. Filename=AdMunch.exe
  724. Confirmed=U
  725. Description=<a href="http://www.admuncher.com/" target="_blank">Ad Muncher</a> removes adverts, pop-ups and general annoyances in your browser, file-sharing and messenger programs. Causes conflicts with Outlook, game sites and web-building applications
  726. [ad online guide]
  727. Filename=adonlineguide.exe
  728. Confirmed=?
  729. Description=<font color="#FF0000">??</font>
  730. [ad-eliminator]
  731. Filename=ad-eliminator.exe
  732. Confirmed=X
  733. Description=Spyware remover - not recommended, see <a href="http://www.spywarewarrior.com/rogue_anti-spyware.htm" target=_blank>here</a>
  734. [ad-muncher]
  735. Filename=ADMUNCH.EXE
  736. Confirmed=U
  737. Description=<a href="http://www.admuncher.com/" target="_blank">Ad Muncher</a> removes adverts, pop-ups and general annoyances in your browser, file-sharing and messenger programs. Causes conflicts with Outlook, game sites and web-building applications
  738. [ad-watch]
  739. Filename=Ad-watch.exe
  740. Confirmed=U
  741. Description=Part of Lavasoft <a href="http://www.lavasoft.de/software/adaware/" target="_blank">Ad-aware Plus</a> - realtime spyware-monitor watching your memory and registry for spyware that tries to install or change your system
  742. [ad2kclient]
  743. Filename=AD2KClient.exe
  744. Confirmed=U
  745. Description=Executable for <a href="http://www.iomega-activedisk.com/index.jsp" target="_blank">Active Disk</a> from Iomega disk - allows software applications to be run directly from an Iomega Zip?disk. Required if you wish the applications to launch on insertion of a disk
  746. [adaptec directcd]
  747. Filename=Directcd.exe
  748. Confirmed=N
  749. Description=DirectCD primarily allows you to drag and drop files onto a suitably formatted CD-RW disc. Unless you use this on a frequent basis it isn't required and is available via Start -> Programs. Start the program before inserting a DirectCD formatted CD-RW in the drive. A re-boot is recommended if you close Adaptec DirectCD before re-opening it again later
  750. [adaptecdirectcd]
  751. Filename=Directcd.exe
  752. Confirmed=N
  753. Description=DirectCD primarily allows you to drag and drop files onto a suitably formatted CD-RW disc. Unless you use this on a frequent basis it isn't required and is available via Start -> Programs. Start the program before inserting a DirectCD formatted CD-RW in the drive. A re-boot is recommended if you close Adaptec DirectCD before re-opening it again later
  754. [adaware]
  755. Filename=wini.exe
  756. Confirmed=X
  757. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotxn.html" target= blank>RBOT-XN</a> WORM!
  758. [adaware bootup]
  759. Filename=ad-aware.exe
  760. Confirmed=N
  761. Description=<a href="http://www.lavasoft.de/software/adaware/" target="_blank">Ad-aware</a> from Lavasoft. Checks your PC for "Spyware" which reports back your internet activities to "base". Available via Start -> Programs
  762. [adaware lptt01]
  763. Filename=adaware.exe
  764. Confirmed=X
  765. Description=<a href="http://www.wilderssecurity.net/specialinfo/rapidblaster.html" target="_blank">RapidBlaster</a> variant (in a "Adaware" folder in Program Files). Recommended you use RapidBlaster Killer to uninstall - see <a href="http://www.wilderssecurity.net/specialinfo/rapidblaster.html#removal" target="_blank"> here</a>. Note - this is not the valid Lavasoft Adaware
  766. [adaware ml097e]
  767. Filename=adaware.exe
  768. Confirmed=X
  769. Description=<a href="http://www.wilderssecurity.net/specialinfo/rapidblaster.html" target="_blank">RapidBlaster</a> variant (in a "Adaware" folder in Program Files). Recommended you use RapidBlaster Killer to uninstall - see <a href="http://www.wilderssecurity.net/specialinfo/rapidblaster.html#removal" target="_blank"> here</a>. Note - this is not the valid Lavasoft Adaware
  770. [addelete]
  771. Filename=AdDelete.exe
  772. Confirmed=U
  773. Description=Banner advertisment blocker
  774. [addestroyer]
  775. Filename=AdDestroyer.exe
  776. Confirmed=X
  777. Description=Like VirtualBouncer, malware from Spyware Labs. It is distributed by the same bundling and drive-by download techniques as the malware it claims to remove/prevent, so definitely qualifies as unsolicited commercial software in itself. It also has an update feature that can download and execute arbitrary code
  778. [addproxy]
  779. Filename=addproxy.exe
  780. Confirmed=?
  781. Description=Related to Adobe Photoshop
  782. [adg]
  783. Filename=ADG.exe
  784. Confirmed=?
  785. Description=<font color="#FF0000"> SoundBlaster Audigy related?</font>
  786. [adgjdet]
  787. Filename=ADGJDet.exe
  788. Confirmed=N
  789. Description=Added with SoundBlaster Live! or Audigy soundcards for headphone autodetection
  790. [adiras]
  791. Filename=Adiras.exe
  792. Confirmed=Y
  793. Description=ADSL USB modem related
  794. [adm library loader]
  795. Filename=admlib32.exe
  796. Confirmed=X
  797. Description=Added by a variant of the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.sdbot.html" target="_blank">SDBOT</a> TROJAN!
  798. [admanager controller]
  799. Filename=AdManCtl.exe
  800. Confirmed=X
  801. Description=Adware, probably a Windupdates variant
  802. [admilli service]
  803. Filename=AdmilliServ.exe
  804. Confirmed=X
  805. Description=Windupdates adware variant
  806. [administrator]
  807. Filename=svchost.scr
  808. Confirmed=X
  809. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.novacal.html" target=_blank>NOVACAL</a> TROJAN!
  810. [adminsoft]
  811. Filename=sysfile.vbs
  812. Confirmed=X
  813. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/vbsstargruba.html" target= blank>STARGRUB-A</a> WORM!
  814. [admtray.exe]
  815. Filename=admtray.exe
  816. Confirmed=U
  817. Description=Related to <a href="http://global.acer.com/" target=_blank>Acer</a> Inc. destop tray
  818. [adobe acrobat distiller application]
  819. Filename=acrotray.exe
  820. Confirmed=X
  821. Description=Added by the <a href="http://www.symantec.com/avcenter/venc/data/w32.randex.dfj.html" target=_blank>RANDEX.DFJ</a> WORM!
  822. [adobe acrobat reader cfg]
  823. Filename=[random filename]
  824. Confirmed=X
  825. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  826. [adobe filter platform]
  827. Filename=afilterplatform.exe
  828. Confirmed=X
  829. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotop.html" target=_blank>RBOT-OP</a> WORM!
  830. [adobe gamma loader]
  831. Filename=Adobe Gamma Loader.exe
  832. Confirmed=U
  833. Description=Adjusts monitor colours across all programs, including Photoshop. It is needed by some graphics professionals who want their monitor calibrated. Most home users will not need it. In my case I can verify this as Photoshop loads fine
  834. [adobe photo downloader]
  835. Filename=apdproxy.exe
  836. Confirmed=N
  837. Description=Part of <a href="http://www.adobe.com/" target=_blank>Adobe's</a> Photoshop Album or Photoshop Elements packages - starts each time you connect an external image device to your PC (see <a href="http://www.adobe.com/support/techdocs/332361.html" target=_blank>here</a>)
  838. [adobe reader speed launch]
  839. Filename=reader_sl.exe
  840. Confirmed=N
  841. Description=Speeds up the time it takes to load the <a href="http://www.adobe.com/products/acrobat/readermain.html" target=_blank>Adobe Reader</a> application. Your choice, but not required for Adobe Reader to function properly
  842. [adobe version cue cs2]
  843. Filename=VersionCueCS2Tray.exe
  844. Confirmed=U
  845. Description=File manager that's part of <a href="http://www.adobe.com/products/creativesuite/main.html?c=us" target="_blank">Adobe Creative Suite 2</a> - "find files fast, track versions across applications, link files together, and share them in creative collaboration without fear of overwriting someone else's work"
  846. [adobea]
  847. Filename=adobes.exe
  848. Confirmed=X
  849. Description=Added by the <a href="http://vil.nai.com/vil/content/v_100373.htm" target="_blank">FLOOD.BA</a> TROJAN!
  850. [adobefonts]
  851. Filename=fonts.hta
  852. Confirmed=X
  853. Description=Browser hijacker - redirecting to Hugesearch.net
  854. [adobemgr]
  855. Filename=adobemgr.exe
  856. Confirmed=X
  857. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/trojan.a.d.clicker.html" target=_blank>ADCLICKER</a> TROJAN!
  858. [adobeversioncue]
  859. Filename=VersionCueTray.exe
  860. Confirmed=N
  861. Description=An exclusive feature of the Adobe?Creative Suite, <a href="http://www.adobe.com/products/creativesuite/versioncue.html" target=_blank>Version Cue?/a> helps you find files fast, track multiple versions of your files, and share your files for creative collaboration
  862. [adope file manager]
  863. Filename=lsasv.exe
  864. Confirmed=X
  865. Description=Added by an unidentified WORM or TROJAN!
  866. [adp]
  867. Filename=adp.exe
  868. Confirmed=X
  869. Description=Spyware installed by Net2Phone, Limewire, Cydoor, Grokster, KaZaa, etc
  870. [adpopup]
  871. Filename=dcf5678.exe
  872. Confirmed=X
  873. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojagentfz.html" target=_blank>AGENT-FZ</a> TROJAN!
  874. [adprot]
  875. Filename=adprot.exe
  876. Confirmed=X
  877. Description=<a href="http://www.symantec.com/avcenter/venc/data/adware.adblaster.html" target=_blank>AdBlaster</a> adware variant
  878. [adquickaccess]
  879. Filename=Adtray.exe
  880. Confirmed=N
  881. Description=After Dark for Windows. Screen saver creation program produced before screen savers became integrated into Win95
  882. [adroarupdate]
  883. Filename=ARUpdate.exe
  884. Confirmed=X
  885. Description=<a href="http://securityresponse.symantec.com/avcenter/venc/data/adware.adroar.html" target="_blank">AdRoar</a> adware updater
  886. [adsblocker]
  887. Filename=stopAds.exe
  888. Confirmed=X
  889. Description=Reported as DILAER.DW by <a href="http://www.nod32.com/home/home.htm" target=_blank>NOD32</a>
  890. [adservice]
  891. Filename=ADService.exe
  892. Confirmed=U
  893. Description=Part of Iomega's <a href="http://www.iomega-activedisk.com/index.jsp" target="_blank">Active Disk</a> - allows software applications to be run directly from an Iomega Zip?disk. Required if you wish the applications to launch on insertion of a disk
  894. [adsgone]
  895. Filename=Adsgone.exe
  896. Confirmed=U
  897. Description=<a href="http://www.adsgone.com/" target="_blank">AdsGone</a> - pop-up stopper
  898. [adsl diagnostic tools]
  899. Filename=mapiicon.exe
  900. Confirmed=N
  901. Description=System tray access to ADSL modem diagnostic tools. Available via Start -> Programs
  902. [adslsystemtray]
  903. Filename=SystemtrayV100B.exe
  904. Confirmed=?
  905. Description=Apparently Annex A ADSL modem related. <font color="#FF0000">What does it do and is it required?</font>
  906. [adsltaskbar]
  907. Filename=rundll32.exe stmctrl.dll, TaskBar
  908. Confirmed=Y
  909. Description=ISP software, initializes DSL modem
  910. [adsltaskbars]
  911. Filename=taskmng.exe
  912. Confirmed=X
  913. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotaxz.html" target=_blank>RBOT-AXZ</a> WORM!
  914. [adsl_a2]
  915. Filename=A2Installed
  916. Confirmed=?
  917. Description=Associated with an Integrated Telecom Express (ITeX) ADSL driver installation. <font color="#FF0000">What does it do and is it required?</font>
  918. [adss]
  919. Filename=ADSS.exe
  920. Confirmed=Y
  921. Description=ADSS is part of <a href="http://www.johnru.com/" target="_blank">Access Denied</a> security and privacy software (Access Denied Security Server) that monitors power status and provides some other services for Screen Guard. Important to keep its running while using Access Denied
  922. [adstatus service]
  923. Filename=AdStatServ.exe
  924. Confirmed=X
  925. Description=WindUpdates <a href="http://www3.ca.com/securityadvisor/pest/pest.aspx?id=453094113" target= blank>AdStatus Service</a> adware
  926. [adsubtract]
  927. Filename=adsub.exe
  928. Confirmed=U
  929. Description=<a href="http://www.adsubtract.com/" target="_blank">AdSubtract</a> blocks ads, cookies, pop-up windows, animations, music, and more. Can be disabled from within AdSubtract. Available via Start -> Programs
  930. [adtech2005]
  931. Filename=adtech2005.exe
  932. Confirmed=X
  933. Description=Reported as Trojan.Win32.StartPage.aw by Kaspersky Anti-Virus
  934. [adtech2006]
  935. Filename=adtech2006.exe
  936. Confirmed=X
  937. Description=Detected as Clicker.Win32.VB.kc by Kaspersky Anti-Virus
  938. [adtools service]
  939. Filename=AdTools.exe
  940. Confirmed=X
  941. Description=<a href="http://www3.ca.com/securityadvisor/pest/pest.aspx?id=453082798" target= blank>Windupdates</a> Adware
  942. [adultx]
  943. Filename=AdultX.exe
  944. Confirmed=X
  945. Description=Adult content dialler and hijacker
  946. [adult_chat]
  947. Filename=Adult_Chat.exe
  948. Confirmed=X
  949. Description=Adult content dialler
  950. [adult_chat1]
  951. Filename=Adult_Chat1.exe
  952. Confirmed=X
  953. Description=Adult content dialler
  954. [adupdater]
  955. Filename=sysupudt.exe
  956. Confirmed=X
  957. Description=Unidentified adware downloader/updater
  958. [adusermon]
  959. Filename=ADUserMon.exe
  960. Confirmed=U
  961. Description=Part of Iomega's <a href="http://www.iomega-activedisk.com/index.jsp" target="_blank">Active Disk</a> - allows software applications to be run directly from an Iomega Zip?disk. Required if you wish the applications to launch on insertion of a disk
  962. [advanced internet protocol]
  963. Filename=cerf.exe
  964. Confirmed=X
  965. Description=Added by a variant of the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.spybot.worm.html" target="_blank">SPYBOT</a> WORM!
  966. [advanced protection system]
  967. Filename=advpsys.exe
  968. Confirmed=X
  969. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  970. [advanced tool checks]
  971. Filename=advchks.exe
  972. Confirmed=X
  973. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  974. [advanced tools check]
  975. Filename=ADVCHK.EXE
  976. Confirmed=N
  977. Description=Checks when you install a new version of a Norton product that you have uninstalled all previous versions. Serves as a reminder if you forget
  978. [advanced uninstaller pro installation monitor]
  979. Filename=monitor.exe
  980. Confirmed=U
  981. Description=Innovative Solutions <a href="http://www.innovative-sol.com/products.htm#uninstaller" target=_blank>Advanced Uninstaller PRO</a> - "easy-to-use suite for uninstalling applications and keeping your computer fast, clean, and in its best shape"
  982. [advapi]
  983. Filename=Advapi.exe
  984. Confirmed=X
  985. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=BKDR_NETDEVIL.12" target="_blank">NETDEVIL.12</a> WORM!
  986. [advchk]
  987. Filename=ADVCHK.EXE
  988. Confirmed=N
  989. Description=Checks when you install a new version of a Norton product that you have uninstalled all previous versions. Serves as a reminder if you forget
  990. [advertising killer]
  991. Filename=Akiller.exe
  992. Confirmed=U
  993. Description=<a href="http://www.buypin.com/menu.php?group=1&page=akiller&lang=english" target="_blank">AKiller</a> - pop-up stopper
  994. [advmon32]
  995. Filename=advmon32.exe
  996. Confirmed=X
  997. Description=Added by a variant of the <a href="http://www.sophos.com/virusinfo/analyses/trojcrypterc.html" target="_blank">CRYPTER.C</a> TROJAN!
  998. [adware agent]
  999. Filename=adware agent.exe
  1000. Confirmed=U
  1001. Description=<a href="http://www.topshareware.com/Adware-Agent-download-4866.htm" target="_blank">Adware Agent</a> popup blocker
  1002. [adware spy]
  1003. Filename=AdwareSpy.exe
  1004. Confirmed=N
  1005. Description=Adware remover - not recommended, see <a href="http://www.spywarewarrior.com/rogue_anti-spyware.htm" target="_blank">here</a>
  1006. [adwarealert]
  1007. Filename=AdwareAlert.Exe
  1008. Confirmed=X
  1009. Description=Adware remover - not recommended, see <a href="http://www.spywarewarrior.com/rogue_anti-spyware.htm" target=_blank>here</a>
  1010. [adwaredelete]
  1011. Filename=adwaredelete.exe
  1012. Confirmed=X
  1013. Description=Adware remover - not recommended, see <a href="http://www.spywarewarrior.com/rogue_anti-spyware.htm" target=_blank>here</a>
  1014. [aeiwlsta.exe]
  1015. Filename=Aeiwlsta.exe
  1016. Confirmed=?
  1017. Description=IBM High Rate Wireless LAN Adapter driver.<font color="#FF0000"> Is it required?</font>
  1018. [aelaunch]
  1019. Filename=AELaunch.exe
  1020. Confirmed=N
  1021. Description=Audio Applications Launcher for the Philips <a href="http://www.consumer.philips.com/global/b2c/ce/catalog/product.jhtml;jsessionid=5ZTUCSVZIGCWUCRQNFJRX1YKGBUEWHAW?divId=0&groupId=PCSTUFF&catId=&subCatId=SOUNDCARDS&productId=PSC706_05" target="_blank"> Acoustic Edge</a> soundcard
  1022. [aervicesn]
  1023. Filename=AERVICESN.exe
  1024. Confirmed=X
  1025. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32randonao.html" target=_blank>RANDON-AO</a> WORM!
  1026. [aexagentlogon]
  1027. Filename=AeXAgentActivate.exe
  1028. Confirmed=N
  1029. Description=<a href="http://www.altiris.com" target=_blank>Altiris</a> Agent transmits information about your machine for the purpose of asset management and deployment
  1030. [aexswdusr]
  1031. Filename=AeXSWDUsr.exe
  1032. Confirmed=?
  1033. Description=<a href="http://www.altiris.com/" target="_blank">Altiris</a> Express NS Client Manager software. <font color="#FF0000"> Is it required?</font>
  1034. [aezbproc]
  1035. Filename=aptezbp.exe
  1036. Confirmed=U
  1037. Description=IBM Aptiva keyboard customizer - enables certain special buttons on keyboard for CD operation, volume control, and few quickstart buttons. Keyboard will work without it but you lose the special functions
  1038. [afafilter]
  1039. Filename=windefault.exe
  1040. Confirmed=U
  1041. Description=<a href="http://www.afafilter.com/" target="_blank">AFAFilter</a> - internet filter software
  1042. [agent]
  1043. Filename=Agent.exe
  1044. Confirmed=N
  1045. Description=<a href="http://www.cyberlink.com" target="_blank">Cyberlink Power VCR II 3.0</a> is a TV tuner recording utility. If you want to schedule recordings you'll need this, otherwise can be disabled. Available via Start -> Programs
  1046. [agent browser]
  1047. Filename=[random filename]
  1048. Confirmed=X
  1049. Description=Added by the PPdoor.M-bdr backdoor TROJAN!
  1050. [agent explorer]
  1051. Filename=[random filename]
  1052. Confirmed=X
  1053. Description=Unidentified adware
  1054. [agente]
  1055. Filename=Remupd.exe
  1056. Confirmed=?
  1057. Description=Part of <a href="http://www.pandasoftware.com/products/titanium/" target="_blank">Panda Antivirus Titanium</a>. <font color="#FF0000">Is this an update reminder (guess because of the name), virus definition update reminder or something similar?</font>
  1058. [agfaclnk]
  1059. Filename=AgfaCLnk.exe
  1060. Confirmed=U
  1061. Description=For Agfa digital cameras connected via USB. Enables Windows to access the contents of the memory stick (while the stick's still on the camera) via a virtual drive
  1062. [agp]
  1063. Filename=agp32.exe
  1064. Confirmed=X
  1065. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.gaobot.sy.html" target="_blank">GAOBOT.SY</a> WORM!
  1066. [agrsmmsg]
  1067. Filename=AGRSMMSG.exe
  1068. Confirmed=Y
  1069. Description=IBM AMR modem driver
  1070. [agsatellite]
  1071. Filename=AGSatellite.exe
  1072. Confirmed=N
  1073. Description=Program from AudioGalaxy that lets you download some MP3s from their server. Available via Start -> Programs
  1074. [ahfp]
  1075. Filename=ahfp.exe
  1076. Confirmed=U
  1077. Description=<a href="http://www.softbe.com/" target="_blank">Advanced Hide Folders</a> - "is powerful file security program. It allows to hide folders or hide files. Advanced Hide Folders is very useful to keep your personal data away from others. Others will not know where your personal files exist and they will not be able to accidentally view, delete or modify them either"
  1078. [ahfprog]
  1079. Filename=ahfp.exe
  1080. Confirmed=U
  1081. Description=<a href="http://www.softbe.com/" target="_blank">Advanced Hide Folders</a> - "is powerful file security program. It allows to hide folders or hide files. Advanced Hide Folders is very useful to keep your personal data away from others. Others will not know where your personal files exist and they will not be able to accidentally view, delete or modify them either"
  1082. [ahnsd]
  1083. Filename=AhnSD.exe
  1084. Confirmed=U
  1085. Description=<a href="http://home.ahnlab.com/english/product/01_1.html" target="_blank">AhnLab</a> V3 antivirus updater - leave enabled unless you manually update on a regular basis
  1086. [ahnue]
  1087. Filename=AHNUE.exe
  1088. Confirmed=?
  1089. Description=<font color="#FF0000">??</font>
  1090. [ahqinit]
  1091. Filename=ahqinit.exe
  1092. Confirmed=N
  1093. Description=Part of <a href="#AudioHQ">AudioHQ</a> for the Soundblaster Live!. Appears as though it makes the AudioHW toolbar drop down from the top of the desktop and isn't required
  1094. [ahst]
  1095. Filename=iebs.exe
  1096. Confirmed=X
  1097. Description=<a href="http://research.sunbelt-software.com/threat_display.cfm?name=ClickSpring.PuritySCAN&threatid=10115" target=_blank>PurityScan/Clickspring</a> adware
  1098. [ahu]
  1099. Filename=[path to worm]
  1100. Confirmed=X
  1101. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32anaconb.html" target=_blank>ANACON-B</a> WORM!
  1102. [ahui32.exe]
  1103. Filename=ahui32.exe
  1104. Confirmed=X
  1105. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojcertifm.html" target=_blank>CERTIF-M</a> TROJAN!
  1106. [aica]
  1107. Filename=tuaa.exe
  1108. Confirmed=X
  1109. Description=<a href="http://research.sunbelt-software.com/threat_display.cfm?name=ClickSpring.PuritySCAN&threatid=10115" target=_blank>PurityScan/Clickspring</a> adware
  1110. [aida]
  1111. Filename=ttuh.exe
  1112. Confirmed=X
  1113. Description=<a href="http://research.sunbelt-software.com/threat_display.cfm?name=ClickSpring.PuritySCAN&threatid=10115" target=_blank>PurityScan/Clickspring</a> adware
  1114. [aiepk]
  1115. Filename=aiepk2.exe
  1116. Confirmed=U
  1117. Description=<a href="http://www.fadsoft.com/Another%20IE%20Popup%20Killer.htm" target="_blank">Another IE Popup Killer</a> - pop-up stopper
  1118. [aim instant message cookies]
  1119. Filename=[random filename]
  1120. Confirmed=X
  1121. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotafv.html" target=_blank>RBOT-AFV</a> WORM!
  1122. [aim plugin]
  1123. Filename=aimplugin.exe
  1124. Confirmed=X
  1125. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32guapf.html" target=_blank>GUAP-F</a> WORM!
  1126. [aim reminder]
  1127. Filename=AIM reminder.exe
  1128. Confirmed=X
  1129. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=TROJ_BUDDY.E" target="_blank">BUDDY</a> TROJAN!
  1130. [aim95 startup]
  1131. Filename=aim95.exe
  1132. Confirmed=X
  1133. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_AGOBOT.AEE" target=_blank>AGOBOT.AEE</a> WORM!
  1134. [aimaol lptt01]
  1135. Filename=aimaol.exe
  1136. Confirmed=X
  1137. Description=<a href="http://www.wilderssecurity.net/specialinfo/rapidblaster.html" target="_blank">RapidBlaster</a> variant (in a
  1138. [aimaol ml097e]
  1139. Filename=aimaol.exe
  1140. Confirmed=X
  1141. Description=<a href="http://www.wilderssecurity.net/specialinfo/rapidblaster.html" target="_blank">RapidBlaster</a> variant (in a
  1142. [aimb.exe]
  1143. Filename=aimb.exe
  1144. Confirmed=U
  1145. Description=<a href="http://sarc.com/avcenter/venc/data/spyware.imsurfsentinel.html" target=_blank>IMSufSentinel</a> is a spy program which can record IM conversations, log keystrokes, record URLs visited, and take screenshots. If you didn't install this yourself remove it
  1146. [aimingclick]
  1147. Filename=AimingClick.exe
  1148. Confirmed=N
  1149. Description=<a href="http://www.aimingtech.com/aimingclick/home.htm" target="_blank">AimingClick</a> from AimingTech. Web searching tool. Available via Start -> Programs
  1150. [aimster]
  1151. Filename=??
  1152. Confirmed=N
  1153. Description=Peer to Peer (P2P) file sharing client that runs over the AOL Instant Messenger network. Available via Start -> Programs
  1154. [aimwdinstall]
  1155. Filename=AIMWDInstall.exe
  1156. Confirmed=N
  1157. Description=Version of the <a href="http://www.wildtangent.com/default.asp" target="_blank">WildTangent</a> on-line games installer that came with versions of AOL Instant Messenger. Note that WildTanget's <a href="http://www.wildtangent.com/default.asp?pageID=company_art&artid=art20030925_A" target="_blank">privacy policy</a> used to state that they also collect and share individuals information but this is no longer the case
  1158. [aiptek graphics tablet (usb)]
  1159. Filename=atwtusb.exe
  1160. Confirmed=Y
  1161. Description=USB interface for Aiptek Graphics Tablet (USB)
  1162. [aircity]
  1163. Filename=aircity.exe
  1164. Confirmed=X
  1165. Description=Related to "Prutect" malware from <a href="http://securityresponse.symantec.com/avcenter/venc/data/spyware.e2give.html" target=_blank>e2Give</a>
  1166. [akeyname]
  1167. Filename=WinServ.exe
  1168. Confirmed=X
  1169. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.evilbot.c.html" target="_blank">EVILBOT.C</a> TROJAN!
  1170. [akiller]
  1171. Filename=akiller.exe
  1172. Confirmed=U
  1173. Description=<a href="http://sourceforge.net/projects/akiller/" target="_blank">BuyPin Advertising Killer</a> - popup killer
  1174. [ala.exe]
  1175. Filename=ala.exe
  1176. Confirmed=X
  1177. Description=<a href="http://www.softheap.com/lock.html" target=_blank>Access Lock</a> is a system-tray security utility you can use to secure your desktop when you are away from your computer
  1178. [alarm manager]
  1179. Filename=Alarm.app.exe
  1180. Confirmed=U
  1181. Description=Palm alarm event reminder that coordinates what is on your Palm with settings on your desktop
  1182. [alarmwatcher]
  1183. Filename=AlarmWatcher.exe
  1184. Confirmed=?
  1185. Description=<font color="#FF0000">Associated with SynTPEnh and SynTPLpr which are from Synaptics for touchpads on laptops. What does it do and is it required?</font>
  1186. [album fast start]
  1187. Filename=ABMTSR.EXE
  1188. Confirmed=N
  1189. Description=Scanner software, not required for scanner to work
  1190. [alcfdmonitor]
  1191. Filename=ALCFDRTM.EXE
  1192. Confirmed=?
  1193. Description=RealTek related - Real-Time SPDIF-in Monitor for nVidia chipset - <font color="#FF0000">is it required in startup?</font>
  1194. [alcfdrtm16]
  1195. Filename=ALCFDRTM16.com
  1196. Confirmed=?
  1197. Description=RealTek related - Real-Time SPDIF-in Monitor for nVidia chipset - <font color="#FF0000">is it required in startup?</font>
  1198. [alchem]
  1199. Filename=Alchem.exe
  1200. Confirmed=X
  1201. Description=<a href="http://research.sunbelt-software.com/threat_display.cfm?name=VX2.Transponder&threatid=12517&search=vx2" target=_blank>VX2.Transponder</a> parasite updater/installer related
  1202. [alcmtr]
  1203. Filename=ALCMTR.EXE
  1204. Confirmed=X
  1205. Description=Realtek AC97 Audio - Event Monitor. "Sypware" file used surreptitiously monitor one's actions. It is not a sinister one, like remote control programs, but it is being used by Realtek to gather data about customers
  1206. [alcohol]
  1207. Filename=Alcohol.exe
  1208. Confirmed=U
  1209. Description=<a href="http://www.alcohol-software.com/index.php" target="_blank">Alcohol 120%</a> - CD/DVD emulation/writing/copying software
  1210. [alcohol autorun]
  1211. Filename=Alcohol.exe
  1212. Confirmed=U
  1213. Description=<a href="http://www.alcohol-software.com/index.php" target="_blank">Alcohol 120%</a> - CD/DVD emulation/writing/copying software
  1214. [alcom pcl capture]
  1215. Filename=FMW_PCAP.EXE
  1216. Confirmed=?
  1217. Description=<font color="#FF0000">??</font>
  1218. [alcwzrd]
  1219. Filename=ALCWZRD.EXE
  1220. Confirmed=N
  1221. Description=RealTek High Definition audio driver related - detects new devices when plugged in, then pops up a dialog box. If everything works as expected you should be able to disable this one
  1222. [alcxmonitor]
  1223. Filename=Alcxmntr.exe
  1224. Confirmed=X
  1225. Description=Realtek AC97 Audio - Event Monitor. Sypware file used surreptitiously monitor one's actions. It is not a sinister one, like remote control programs, but is being used by Realtek to gather data about customers
  1226. [aldefr ere service]
  1227. Filename=tay0x.exe
  1228. Confirmed=X
  1229. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotxs.html" target=_blank>RBOT-XS</a> WORM!
  1230. [alevir]
  1231. Filename=Alevir.exe
  1232. Confirmed=X
  1233. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32opaserva.html" target="_blank">OPASERV.A</a> or <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_OPASERV.F" target="_blank">OPASERV.F</a> or <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_OPASERV.G" target="_blank">OPASERV.G</a> WORMS!
  1234. [alevirold]
  1235. Filename=[worm filename]
  1236. Confirmed=X
  1237. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_OPASERV.G" target="_blank">OPASERV.G</a> WORM!
  1238. [alexa]
  1239. Filename=alexa.exe
  1240. Confirmed=N
  1241. Description=Related to Alexa. Note - collects and stores information about the web pages you view, the data you enter in online forms and search programs and, with versions 5.0 and higher, the products you purchase online whilst using the toolbar. Although Alexa state's they do not attempt to analyze the data it may collect about you to determine who you are, some of your information collected by the software is personally identifiable. Please read the <a href="http://pages.alexa.com/help/privacy.html" target=_blank>Privacy Policy</a>. Not Recommended
  1242. [alexatoolbar]
  1243. Filename=alt.exe
  1244. Confirmed=X
  1245. Description=Reported as the DELF.EB hijacker by <a href="http://www.ewido.net/en/" target=_blank>Ewido Security Suite</a>
  1246. [alfacleaner]
  1247. Filename=AlfaCleaner.exe
  1248. Confirmed=X
  1249. Description=<a href="http://research.sunbelt-software.com/threat_display.cfm?name=AlfaCleaner&threatid=43730&search=Alfacleaner" target=_blank>AlphaCleaner</a> is now a stealth install using exploits on unpatched systems. Seen alongside RazeSpyware
  1250. [alfy accellerator]
  1251. Filename=AlfyAC~1.exe
  1252. Confirmed=?
  1253. Description=<font color="#FF0000">??</font>
  1254. [alg.exe]
  1255. Filename=iexplorer .exe
  1256. Confirmed=X
  1257. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32demotryb.html" target=_blank>DEMOTRY-B</a> WORM!
  1258. [alg32]
  1259. Filename=ALG32.EXE
  1260. Confirmed=X
  1261. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/trojan.startpage.k.html" target=_blank>Startpage.K</a> hijacker
  1262. [algu]
  1263. Filename=ALGU.EXE
  1264. Confirmed=X
  1265. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojcwsi.html" target=_blank>CWS-I</a> TROJAN!
  1266. [alias sketchbook snapshot]
  1267. Filename=ALIASS~2.EXE
  1268. Confirmed=N
  1269. Description=Screen-capture utility for Alias Sketchbook
  1270. [alienautopsy]
  1271. Filename=Test_BS.exe
  1272. Confirmed=N
  1273. Description=<a href="http://www.alienware.com/" target="_blank">Alienware</a> computer technical support software
  1274. [alisndmgr]
  1275. Filename=ALiSndMg.exe
  1276. Confirmed=Y
  1277. Description=ALi AC97 Sound driver
  1278. [aliusbfix]
  1279. Filename=GREENMK.exe
  1280. Confirmed=?
  1281. Description=<font color="#FF0000">May be realted to a USB 2.0 PCI card - the IOgear GIC220OU?</font>
  1282. [alkasr]
  1283. Filename=╬Σ╥φ?exe
  1284. Confirmed=X
  1285. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.balkart.html" target="_blank">BALKART</a> TROJAN!
  1286. [all aboard status]
  1287. Filename=stswin.exe
  1288. Confirmed=U
  1289. Description=<a target="_blank" href="http://yippee.i4free.co.nz/html/win/internet/title6724.htm">All Aboard! Internet Connection Sharing</a> status icon
  1290. [all sea screen saver]
  1291. Filename=TaskTray.exe
  1292. Confirmed=X
  1293. Description="Free screensaver", installs lots of foistware. See <a href="http://www.spywareinfo.com/forums/index.php?act=ST&f=10&t=5833&hl=&s=" target="_blank">here</a>. Get rid of it
  1294. [all sea web link]
  1295. Filename=FWLink.exe
  1296. Confirmed=X
  1297. Description="Free screensaver", installs lots of foistware. See <a href="http://www.spywareinfo.com/forums/index.php?act=ST&f=10&t=5833&hl=&s=" target="_blank">here</a>. Get rid of it
  1298. [allercalc]
  1299. Filename=AllerCalc.exe
  1300. Confirmed=N
  1301. Description=<a href="http://www.allersoft.com/allercalc.htm" target=_blank>AllerCalc</a> is an expression calculator which allows you to directly enter an expression to be evaluated. Can be started manually
  1302. [allsnap]
  1303. Filename=allSnap.exe
  1304. Confirmed=U
  1305. Description="<a href="http://members.rogers.com/ivanheckman/index.html" target="_blank">allSnap</a> is a small system tray app that makes all top level windows automatically align like they do in programs such as Winamp or Photoshop"
  1306. [alogrithm link queue]
  1307. Filename=alq.exe
  1308. Confirmed=X
  1309. Description=Added by a variant of the <a href="http://vil.nai.com/vil/content/v_100454.htm" target=_blank>SDBOT</a> WORM!
  1310. [alogserv]
  1311. Filename=Alogserv.exe
  1312. Confirmed=U
  1313. Description=From McAfee VirusScan for logging scanning activities. In some cases, if left running it can cause CPU % usage to go between 5-95% or go to and stay at 100%. Disabling it impacts on the reported last scan date. It is reported to cause jerky graphics response in many games. As of version 6, this is a critical component of McAfee and disabling it can cause a PC to lock up
  1314. [alpass]
  1315. Filename=ALPass.exe
  1316. Confirmed=U
  1317. Description=<a href="http://www.altools.net/Default.aspx?tabid=62" target=_blank>ALPass</a> password manager
  1318. [alps electric usb server]
  1319. Filename=Monserv.exe
  1320. Confirmed=Y
  1321. Description=Alps Electric USB Server - required according to <a href="http://support.microsoft.com/default.aspx?scid=kb;en-us;200692" target="_blank">this</a> article
  1322. [alpspoint]
  1323. Filename=Apoint.exe
  1324. Confirmed=U
  1325. Description=Touchpad software for laptop PC's. For instance it is found on the Panasonic machines and allows part of the touchpad to be used for document or Web-page scrolling. Required for proper functioning of the pointing software but not required for the laptop to work
  1326. [alserv]
  1327. Filename=ALServ.exe
  1328. Confirmed=?
  1329. Description=Altec Lansing AMS speaker related.<font color="#FF0000"> What does it do and is it required?</font>
  1330. [altnet]
  1331. Filename=points manager.exe
  1332. Confirmed=X
  1333. Description=Altnet <a href="http://securityresponse.symantec.com/avcenter/venc/data/adware.topsearch.html" target=_blank>TopSearch</a> adware
  1334. [altnetpointsmanager]
  1335. Filename=points manager.exe
  1336. Confirmed=X
  1337. Description=Altnet <a href="http://securityresponse.symantec.com/avcenter/venc/data/adware.topsearch.html" target=_blank>TopSearch</a> adware
  1338. [altomb_service]
  1339. Filename=AltoMBsrv.exe
  1340. Confirmed=U
  1341. Description=Alto Memory Booster from <a href="http://www.altosoftware.com/" target="_blank">Alto Software</a> - boost the computers performance via more intelligent and efficient memory management. MS MVPs (Most Valued Professional) recommend not using memory managers with Win98/SE/ME. See <a href="http://www.aumha.org/a/memmgmt.htm" target="_blank">this</a> article and make up your own mind
  1342. [altpayments]
  1343. Filename=AltPayments.exe
  1344. Confirmed=X
  1345. Description=<a href="http://securityresponse.symantec.com/avcenter/venc/data/adware.weirdontheweb.html" target=_blank>WeirdOnTheWeb</a> ADWARE!
  1346. [alualert]
  1347. Filename=ALUNotify.exe
  1348. Confirmed=U
  1349. Description=Notification reminder for Symantec's LiveUpdate. Leave enabled unless you manually run LiveUpdate on a regular basis
  1350. [aluria security center]
  1351. Filename=SecurityCenter.exe
  1352. Confirmed=N
  1353. Description=Aluria Software's spyware removal tool - we can't really recommend this product as Aluria have recently partnered with WhenU, the well known adware company, see <a href="http://www.boston.com/business/technology/articles/2004/11/06/spyware killer displays its own ads/" target= blank>here</a> and <a href="http://netrn.net/spywareblog/archives/2004/11/06/aluria-confused/" target= blank>here</a>
  1354. [aluria's pop-up stopper]
  1355. Filename=eps.exe
  1356. Confirmed=U
  1357. Description=Aluria <a href="http://www.aluriasoftware.com/homeproducts/popstopper/" target= blank>Pop-Stopper</a>
  1358. [aluria's spyware eliminator]
  1359. Filename=ASE.exe
  1360. Confirmed=N
  1361. Description=Aluria Software's spyware removal tool - we can't really recommend this product as Aluria have recently partnered with WhenU, the well known adware company, see <a href="http://www.boston.com/business/technology/articles/2004/11/06/spyware killer displays its own ads/" target= blank>here</a> and <a href="http://netrn.net/spywareblog/archives/2004/11/06/aluria-confused/" target= blank>here</a>
  1362. [alwaysontopmaker]
  1363. Filename=AlwaysOnTopMaker.exe
  1364. Confirmed=U
  1365. Description=<a href="http://www.fadsoft.com/AlwaysOnTopMaker.htm" target="_blank">Always On Top Maker</a> - utilty to enable an application to always be displayed "on top" of others on the desktop
  1366. [amazingtens]
  1367. Filename=AmazingTens.exe
  1368. Confirmed=X
  1369. Description=Premium rate adult content dialler
  1370. [ame_csa]
  1371. Filename=rundll32 amecsa.cpl, RUN_DLL
  1372. Confirmed=N
  1373. Description=Loads ADSL modem Control Panel applet
  1374. [amodemlockdown]
  1375. Filename=ModemLockDown.exe
  1376. Confirmed=U
  1377. Description=<a href="http://modemlockdown.techconz.com/index.html" target=_blank>ModemLockDown</a> - allows you to supervise internet access by disabling the modem, protects againt dialers accessing dial-up connections, etc
  1378. [amon]
  1379. Filename=AMON.EXE
  1380. Confirmed=Y
  1381. Description=Monitoring part of Eset's <a href="http://www.nod32.com/home/home.htm" target="_blank">NOD32</a> virus-scanner
  1382. [amonitor]
  1383. Filename=amon.exe
  1384. Confirmed=Y
  1385. Description=<a href="http://www.tinysoftware.com/home/tiny2?la=EN" target="_blank">Tiny Personal Firewall</a>
  1386. [amp winoff]
  1387. Filename=winoff.exe
  1388. Confirmed=U
  1389. Description=<a href="http://www.ampsoft.net/utilities/WinOFF.php" target=_blank>WinOFF</a> is " a utility designed to shut down Windows computers automatically, in a fully configurable way"
  1390. [amsn]
  1391. Filename=amsn.exe
  1392. Confirmed=U
  1393. Description=<a href="http://amsn.sourceforge.net/modules.php?name=About_Amsn" target=_blank>aMSN</a> P2P client - can be started manually
  1394. [anbv32]
  1395. Filename=nabv32.exe
  1396. Confirmed=X
  1397. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.titog.c.worm.html" target="_blank">TITOG.C</a> WORM!
  1398. [aniwzcs2service]
  1399. Filename=WZCSLDR2.exe
  1400. Confirmed=Y
  1401. Description=<a href="http://www.alphanetworks.com/" target=_blank>ALPHA Networks</a> wireless driver
  1402. [aniwzcsservice]
  1403. Filename=WZCSLDR.exe
  1404. Confirmed=?
  1405. Description=D-Link wireless PCI adapter related. In some cases reported to cause excessive CPU activity
  1406. [annotatecheck]
  1407. Filename=AnnCheck.exe
  1408. Confirmed=?
  1409. Description=Genius Wizard Pen Tablet driver related. <font color="#FF0000">Is it required?</font>
  1410. [announcements]
  1411. Filename=Annclist.exe
  1412. Confirmed=N
  1413. Description=MS WebTV for Windows. Used to display TV on your PC via a compatible video card with in-built tuner (such as ATI All-In-Wonder). If you don't use it - uninstall it
  1414. [anntext]
  1415. Filename=Anntext.exe
  1416. Confirmed=N
  1417. Description=Caere Pagekeeper text annotation server
  1418. [anonymizer total net shield]
  1419. Filename=AnonTns.exe
  1420. Confirmed=U
  1421. Description=Anonymizer <a href="http://www.anonymizer.com/totalnetshield/1.5/?&utm_source=site_home_20050511&utm_medium=site&utm_content=TNS_moreinfo" target=_blank>Total Net Shield</a>
  1422. [anonymizer_spywarekiller]
  1423. Filename=SpyWareKiller.exe
  1424. Confirmed=U
  1425. Description=<a href="http://www.anonymizer.com/spywarekiller/" target="_blank">Anonymizer Spyware Killer</a>
  1426. [another internet explorer popup killer]
  1427. Filename=aiepk.exe
  1428. Confirmed=U
  1429. Description=<a href="http://www.fadsoft.com/Another%20IE%20Popup%20Killer.htm" target="_blank">Another IE Popup Killer</a> - pop-up stopper
  1430. [ansjava]
  1431. Filename=[path to worm]
  1432. Confirmed=X
  1433. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32randonan.html" target=_blank>RANDON-AN</a> WORM!
  1434. [anskya]
  1435. Filename=PYSKY.NET.exe
  1436. Confirmed=X
  1437. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojdloadermw.html" target= blank>DLOADER-MW</a> TROJAN!
  1438. [answer problem]
  1439. Filename=dSAFsqs.exe
  1440. Confirmed=X
  1441. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32sdbotsc.html" target= blank>SDBOT-SC</a> WORM!
  1442. [anti spam service]
  1443. Filename=spamsvc.exe
  1444. Confirmed=X
  1445. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32mytobbk.html" target=_blank>MYTOB-BK</a> WORM!
  1446. [anti-keylogger check]
  1447. Filename=antikey.exe
  1448. Confirmed=U
  1449. Description=<a href="http://www.anti-keyloggers.com/" target="_blank">Anti-keylogger</a> - protects against keylogger programs monitoring your keystrokes
  1450. [anti-trojan-watch]
  1451. Filename=ATWatch.exe
  1452. Confirmed=U
  1453. Description=Anti-Trojan Watch - trojan detector
  1454. [anti-virus product sync]
  1455. Filename=[unprintable character][3 characters]log.exe
  1456. Confirmed=X
  1457. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.kedebe.d@mm.html" target=_blank>KEDEBE.D</a> WORM!
  1458. [anti-virus update scheduler v1.39.12r]
  1459. Filename=[various filenames]
  1460. Confirmed=X
  1461. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.heplane.html" target= blank>HEPLANE</a> or <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.staprew.b.html" target= blank>STAPREW.B</a> TROJANS! - different filenames have been spotted; examples: msvc.exe, kaspersky.exe, nrton.exe, wins.exe, gah32.exe, 1.tmp, syste.exe, alg.exe, socks.exe, winxpsp2.exe, tek9.exe, sks.exe, hihi.exe, s.exe, xps2.exe, dns2.exe, ikav32.exe and more...
  1462. [antidialer.co.uk]
  1463. Filename=Dialer_Watcher.exe
  1464. Confirmed=U
  1465. Description=<a href="http://antidialer.co.uk/" target=_blank>Dialer_Watcher</a> is an application that allows you to detect <a href="http://www.mcgill.ca/ncs/products/security/dialers/" target=_blank>Dialers</a> on your computer
  1466. [antipopup]
  1467. Filename=AntiPopUp.exe
  1468. Confirmed=U
  1469. Description=<a href="http://www.webknacks.com/antipopup.htm" target="_blank">AntiPopUp for IE</a> - pop-up stopper
  1470. [antivir xp]
  1471. Filename=AVwin.exe
  1472. Confirmed=Y
  1473. Description=<a href="http://www.free-av.com/" target=_blank>AntiVir</a> antivirus
  1474. [antivirus installer]
  1475. Filename=[path to trojan]
  1476. Confirmed=X
  1477. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojbadgenta.html" target=_blank>BADGENT-A</a> TROJAN!
  1478. [antivirus32]
  1479. Filename=antivirus.exe
  1480. Confirmed=X
  1481. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.spybot.kai.html" target=_blank>SPYBOT.KAI</a> WORM!
  1482. [antivirusgold]
  1483. Filename=AntivirusGold.exe
  1484. Confirmed=X
  1485. Description=Malware masquerading as an antivirus - also installs the <a href="http://castlecops.com/s9193-Intel_system_tool.html" target=_blank>Winnook</a> TROJAN!
  1486. [antivirusprotection]
  1487. Filename=qumk.exe
  1488. Confirmed=?
  1489. Description=<font color="#FF0000">??</font>
  1490. [antiware]
  1491. Filename=elite***32.exe [*** = random char]
  1492. Confirmed=X
  1493. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojdloaderhw.html" target=_blank>DLOADER-HW</a> TROJAN!
  1494. [antiwindowsmessenger]
  1495. Filename=AntiMsMsg.exe
  1496. Confirmed=U
  1497. Description=<a href="http://fileforum.betanews.com/detail/1069500643/1" target="_blank">Anti-Windows_Messenger</a> is a small application that prevents Windows Messenger from remaining resident in memory
  1498. [anti_troj]
  1499. Filename=anti_troj.exe
  1500. Confirmed=X
  1501. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/trojan.lodear.d.html" target=_blank>LODEAR.D</a> TROJAN!
  1502. [anvir]
  1503. Filename=AnVir.exe
  1504. Confirmed=Y
  1505. Description=<a href="http://anvir.com/taskmanager/" target="_blank">AnVir Task Manager</a> - protects computer against viruses and manages running processes and startup files
  1506. [anvir task manager]
  1507. Filename=AnVir.exe
  1508. Confirmed=Y
  1509. Description=<a href="http://anvir.com/taskmanager/" target="_blank">AnVir Task Manager</a> - protects computer against viruses and manages running processes and startup files
  1510. [anvshell]
  1511. Filename=anvshell.exe
  1512. Confirmed=U
  1513. Description=System Tray tool for ASUS video cards. If disabled you lose all the ASUS specific video card options in Control Panel -> Display Properties -> Advanced as well as the System Tray shortcuts toolbar
  1514. [anycom bluetooth]
  1515. Filename=ftflauncher.exe
  1516. Confirmed=?
  1517. Description=Associated with an Anycom bluetooth wireless card. <font color="#FF0000">What does it do and is it required?</font>
  1518. [anydvd]
  1519. Filename=AnyDVD.exe
  1520. Confirmed=U
  1521. Description=<a href="http://www.slysoft.com/en/anydvd.html" target="_blank">AnyDVD</a> - descrambles DVD-Movies automatically in the background and the DVD appears unprotected and region code free. Also removes prohibited operations from the DVD such as skipping adverts - hence the "U" recommendation
  1522. [ao tray]
  1523. Filename=AOTray.Exe
  1524. Confirmed=N
  1525. Description=System Tray application for AOpen soundcards. Can be run manually via Start -> Settings -> Control Panel
  1526. [aol 9.0 optimized]
  1527. Filename=AOLClient.exe
  1528. Confirmed=X
  1529. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.spyboter.a.html" target=_blank>SPYBOTER.A</a> TROJAN!
  1530. [aol broadband check-up]
  1531. Filename=matcli.exe
  1532. Confirmed=U
  1533. Description="matcli.exe is a motive Assistant Command line interface that gathers information about your system's identity like your name email address, city, county, etc and gets written to a log file". The AOL Self Support Tool is required to run with the Help and Support program. If you uncheck AOL and and then run Help and Support it will add another AOL entry in the startup menu. If you remove this software in "add/remove programs" some help menus in help and support will not be available. You decide
  1534. [aol companion]
  1535. Filename=companion.exe
  1536. Confirmed=N
  1537. Description=Part of the AOL Connection Suite and installs an icon on the system tray offering easy access to AOL's additional utilities and functions. This program is a non-essential process, and is installed for ease of use
  1538. [aol configuration loader]
  1539. Filename=aimsng.exe
  1540. Confirmed=X
  1541. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32sdbotxe.html" target=_blank>SDBOT-XE</a> WORM!
  1542. [aol fast start]
  1543. Filename=AOL.exe
  1544. Confirmed=?
  1545. Description=AOL ISP software related. <font color="#FF0000">What does it do and is it required?</font>
  1546. [aol instant messanger]
  1547. Filename=aim.exe
  1548. Confirmed=X
  1549. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32sdbotyt.html" target=_blank>SDBOT-YT</a> WORM!
  1550. [aol instant messengar]
  1551. Filename=aol.exe
  1552. Confirmed=X
  1553. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32agobotfn.html" target= blank>AGOBOT-FN</a> WORM!
  1554. [aol instant messenger 7.213]
  1555. Filename=aim9283.exe
  1556. Confirmed=X
  1557. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32sdbotzf.html" target=_blank>SDBOT-ZF</a> WORM!
  1558. [aol instant messenger fix]
  1559. Filename=aolfix.exe
  1560. Confirmed=X
  1561. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32sdbotabj.html" target=_blank>SDBOT-ABJ</a> WORM!
  1562. [aol services hosts]
  1563. Filename=aolserviceshosts.exe
  1564. Confirmed=X
  1565. Description=Added by an unidentified WORM or TROJAN!
  1566. [aol spyware protection]
  1567. Filename=AOLSP Scheduler.exe
  1568. Confirmed=U
  1569. Description=AOL's spyware protection program
  1570. [aol topspeedmonitor]
  1571. Filename=aoltsmon.exe
  1572. Confirmed=U
  1573. Description=AOL's <a href="http://site.aol.com/price_plans/bfsdialup.adp" target=_blank>TopSpeed</a> web acceleration technology supposedly helps to make web browsing faster. Most important for those users who still access AOL via dial-up
  1574. [aolcc]
  1575. Filename=ACCAgnt.exe
  1576. Confirmed=?
  1577. Description=AOL ISP software related, file located in a "AOL Computer Check-Up" folder. <font color="#FF0000">What does it do and is it required?</font>
  1578. [aolcon]
  1579. Filename=config.com
  1580. Confirmed=X
  1581. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.hllw.taplak.html" target="_blank">TAPLAK</a> WORM!
  1582. [aoldialer]
  1583. Filename=AOLDial.exe
  1584. Confirmed=N
  1585. Description=AOL ISP software dialer - can be activated through a desktop shortcut
  1586. [aolfix]
  1587. Filename=AolFix.exe
  1588. Confirmed=N
  1589. Description=Run on Gateway Astra computers, and maybe a few others. Designed to repair a bad registry key in Gateway computers that would not allow AOL  to run correctly. Not seen much any more and should only run once
  1590. [aornum]
  1591. Filename=aornum.exe
  1592. Confirmed=X
  1593. Description=Installed along with <a href="http://www.iwon.com/home/prizes/pm3_overview/0,21311,,00.html?PG=home?SEC=fnstf">iWon Prize Machine</a>. Based upon their <a href="http://www.iwon.com/home/companyinfo/privacy/privacy_overview/0,11882,,00.html#1">privacy</a> statement this can be regarded as spyware
  1594. [aotray]
  1595. Filename=AOTray.Exe
  1596. Confirmed=N
  1597. Description=System Tray application for AOpen soundcards. Can be run manually via Start -> Settings -> Control Panel
  1598. [apc ups status]
  1599. Filename=Display.exe
  1600. Confirmed=Y
  1601. Description=<a href="http://www.apcc.com/products/family/index.cfm?id=129&web_displayed=" target="_blank">APC PowerChute Personal Edition</a> status icon
  1602. [apc_service]
  1603. Filename=mainserv.exe
  1604. Confirmed=U
  1605. Description=<a href="http://www.apcc.com/tools/download/software_comp.cfm?sw_sku=SDW75" target="_blank">PowerChute?Personal Edition</a> - "safe system shutdown software with sophisticated power management functions"
  1606. [apc_tray]
  1607. Filename=apc_tray.exe
  1608. Confirmed=Y
  1609. Description=Part of the APC UPS software loaded with the BACK-UPS CS 350 unit. Required to monitor the APC unit in case of power failure
  1610. [apd123]
  1611. Filename=APD123.exe
  1612. Confirmed=X
  1613. Description=<a href="http://www.benedelman.org/spyware/installations/pacerd/" target=_blank>PacerD Media/Pacimedia.com</a> adware
  1614. [api32]
  1615. Filename=api32.exe
  1616. Confirmed=X
  1617. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojircbotb.html" target=_blank>IRCBOT-B</a> TROJAN!
  1618. [apiclass]
  1619. Filename=lexplore_.exe
  1620. Confirmed=X
  1621. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojmsnopta.html" target=_blank>MSNOPT-A</a> TROJAN!
  1622. [apisvc.exe]
  1623. Filename=apisvc.exe
  1624. Confirmed=X
  1625. Description=Added by a variant of the <a href="http://vil.nai.com/vil/content/v_116121.htm" target=_blank>LAMEBOT</a> TROJAN!
  1626. [apl]
  1627. Filename=APL.exe
  1628. Confirmed=U
  1629. Description=Sage Software's <a href="http://itdomino.act.com/act.nsf/docid/2004129101128" target=_blank>ACT!</a> The application pre-loader (apl.exe) is a self contained executable that pre-loads the necessary .NET framework and ACT! 2005 assemblies. This pre-loading of assemblies enhances ACT! startup, view load and dialog load times in some areas of the application
  1630. [apmsrv9x]
  1631. Filename=APMSRV9X.EXE
  1632. Confirmed=?
  1633. Description=Intel AnyPoint Wireless II Home Network related. <font color="#FF0000"> What does it do and is it required?</font>
  1634. [apoint]
  1635. Filename=Apoint.exe
  1636. Confirmed=U
  1637. Description=Touchpad software for laptop PC's. For instance it is found on the Panasonic machines and allows part of the touchpad to be used for document or Web-page scrolling. Required for proper functioning of the pointing software but not required for the laptop to work
  1638. [app.exename]
  1639. Filename=[path to worm]\.exe
  1640. Confirmed=X
  1641. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.hllw.bodiru.html" target="_blank">BODIRU</a> WORM!
  1642. [appcon]
  1643. Filename=vAppCon.exe
  1644. Confirmed=U
  1645. Description=Vital Application Console - part of <a href="http://www.pos-partner.com/Product.htm" target="_blank">POS-partner 2000</a> point-of-sale software from Vital. This is the taskbar icon and is enabled at startup by the "Auto-start when OS starts" option. Required for a connection to be established
  1646. [appconn]
  1647. Filename=appconn.exe
  1648. Confirmed=X
  1649. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/trojan.cargao.html" target="_blank">CARGAO</a> WORM!
  1650. [appextender]
  1651. Filename=AppExtCB.exe
  1652. Confirmed=U
  1653. Description=Loads the <a href="http://www.confimax.com/?PHPSESSID=aefc68296846f048b5b7ae96e48d854f" target="_blank">Confimax</a> add-in for popular E-mail programs to confirm E-mails have been sent and received
  1654. [appis.exe]
  1655. Filename=appis.exe
  1656. Confirmed=X
  1657. Description=Added by the <a href="http://pestpatrol.com/PestInfo/t/trojandownloader_win32_agent_bc.asp" target=_blank>AGENT-BC</a> TROJAN!
  1658. [application]
  1659. Filename=mdmsetsp.exe
  1660. Confirmed=Y
  1661. Description=Aztech Labs modem driver
  1662. [application explorer]
  1663. Filename=Naldesk.exe
  1664. Confirmed=U
  1665. Description=Novell Zenworks Application Explorer Executable. "For almost all users the Novell ZENworks agent (either Application Launcher or Application Explorer) will be run via the user's login script on each successful login. ZENworks is used to periodically deliver software updates and is also used to install the remote management components."
  1666. [application layer gateway service]
  1667. Filename=algs.exe
  1668. Confirmed=X
  1669. Description=Added by the <a href="http://www.symantec.com/avcenter/venc/data/w32.linkbot.m.html" target=_blank>LINKBOT.M</a> WORM!
  1670. [appplus]
  1671. Filename=AppPlus.exe
  1672. Confirmed=U
  1673. Description=<a href="http://www.appplusonline.com/" target="_blank">AppPlus</a> - "menu bar or tray launcher that docks to your desktop, floats or sits in your System Tray. Create graphic/text-based buttons that launch any number of programs, Websites, e-mail addresses or folders (which open in the AppPlus Menu System)"
  1674. [apvxd]
  1675. Filename=APVXDWIN.EXE
  1676. Confirmed=Y
  1677. Description=Part of <a href="http://www.pandasoftware.com/" target="_blank">Panda Anti-Virus</a>. Required to enable permanent virus protection
  1678. [apvxdwin]
  1679. Filename=APVXDWIN.EXE
  1680. Confirmed=Y
  1681. Description=Part of <a href="http://www.pandasoftware.com/" target="_blank">Panda Anti-Virus</a>. Required to enable permanent virus protection
  1682. [apwheel]
  1683. Filename=Apwheel.exe
  1684. Confirmed=Y
  1685. Description=Wheel support for an Alps mouse 
  1686. [apyginapygin]
  1687. Filename=simenu.exe
  1688. Confirmed=X
  1689. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_SDBOT.BTR&VSect=P" target=_blank>SDBOT.BTR</a> WORM!
  1690. [aqadcup.exe]
  1691. Filename=aqadcup.exe
  1692. Confirmed=X
  1693. Description=Added by the <a href="http://www.liutilities.com/products/wintaskspro/processlibrary/aqadcup/" target="_blank">AGENT.BG</a> WORM!
  1694. [ara-key]
  1695. Filename=[random filename]
  1696. Confirmed=X
  1697. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.hllw.antinny.html" target="_blank">ANTINNY</a> WORM!
  1698. [archive]
  1699. Filename=archive.exe
  1700. Confirmed=X
  1701. Description=Adware, recognized by <a href="http://www.kaspersky.com/personalpro" target=_blank>Kaspersky</a> antivirus as Trojan-Downloader.Centim.a
  1702. [archive control]
  1703. Filename=fixupdattr.exe
  1704. Confirmed=X
  1705. Description=Added by the <a href="http://www.symantec.com/avcenter/venc/data/w32.mytob.gu@mm.html" target=_blank>MYTOB.GU</a> WORM!
  1706. [arcsolo recovery]
  1707. Filename=N/A
  1708. Confirmed=N
  1709. Description=Backup software by Computer Associates - no longer supported
  1710. [ares]
  1711. Filename=ares.exe
  1712. Confirmed=N
  1713. Description=<a href="http://www.aresgalaxy.org/download.html" target="_blank">Ares</a> is "a Windows program that enables peer-to-peer file-sharing on the Ares P2P network. As a member of the P2P community you can search and download any file shared by other users. You can meet new friends in Ares chatrooms while you download"
  1714. [areslite]
  1715. Filename=AresLite.exe
  1716. Confirmed=N
  1717. Description=<a href="http://www.aresgalaxy.org/download.html" target="_blank">Ares</a> Lite Edition is "a Windows program that enables peer-to-peer file-sharing on the Ares P2P network. As a member of the P2P community you can search and download any file shared by other users. You can meet new friends in Ares chatrooms while you download"
  1718. [aritima]
  1719. Filename=aritima.exe
  1720. Confirmed=X
  1721. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.hllw.aritim.html" target="_blank">ARITIM</a> WORM!
  1722. [armor2net]
  1723. Filename=Armor2net.exe
  1724. Confirmed=N
  1725. Description=Related to Armor2net personal firewall (possibly contains or is related to an anti-spyware product known as ArmorWall, which is a spyware remover - not recommended, see <a href="http://www.spywarewarrior.com/rogue_anti-spyware.htm" target=_blank>here</a>
  1726. [artera]
  1727. Filename=arteraui.exe
  1728. Confirmed=U
  1729. Description=<a href="http://www.arteraturbo.com/" target="_blank">Artera Turbo Internet Accelerator</a> - "surf faster, boost download speed". Only required if you find it helps improve your performance
  1730. [as00 gear511]
  1731. Filename=Gear511.exe
  1732. Confirmed=?
  1733. Description=Software for Netgear wireless network cards. Unknown whether it is required for the wireless card to run but does not seem to be a resource hog. Not required for laptop to run if the wireless network card will not be used. <font color="#FF0000">Is it at all required?</font>
  1734. [as00_wpn511]
  1735. Filename=WPN511.exe
  1736. Confirmed=?
  1737. Description=NetgearRev MFC Application - software for Netgear wireless network cards - <font color="#FF0000">what does it do and is it required in startup?</font>
  1738. [asdx]
  1739. Filename=xwinrpc32.exe
  1740. Confirmed=X
  1741. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_AGOBOT.VO" target="_blank">AGOBOT.VO</a> WORM!
  1742. [ase scheduler]
  1743. Filename=ASE Scheduler.exe
  1744. Confirmed=N
  1745. Description=Aluria Software's spyware removal tool - we can't really recommend this product as Aluria have recently partnered with WhenU, the well known adware company, see <a href="http://www.boston.com/business/technology/articles/2004/11/06/spyware_killer_displays_its_own_ads/" target=_blank>here</a> and <a href="http://netrn.net/spywareblog/archives/2004/11/06/aluria-confused/" target=_blank>here</a>
  1746. [ashampoo popupblocker]
  1747. Filename=PopUpKiller.exe
  1748. Confirmed=U
  1749. Description=Ashampoo popup blocker, part of Privacy Protector Plus -  see <a href="http://www.ashampoo.com/frontend/products/php/product.php?idstring=0204&session_langid=2ñcy_id=-1" target=_blank>here</a>
  1750. [ashavast]
  1751. Filename=ashAvast.exe
  1752. Confirmed=Y
  1753. Description=Part of <a href="http://www.avast.com/" target= blank>Avast</a> antivirus
  1754. [ashlt]
  1755. Filename=Ashlt.exe
  1756. Confirmed=X
  1757. Description=<a href="http://www.symantec.com/avcenter/venc/data/spyware.ashlt.html" target= blank>Ashlt</a> adware
  1758. [ashmaisv]
  1759. Filename=ashmaisv.exe
  1760. Confirmed=Y
  1761. Description=Part of <a href="http://www.alwil.com/en/default.asp" target=_blank>Avast!</a> anti-virus software - E-mail scanner
  1762. [asioreg]
  1763. Filename=regsvr32.exe ctasio.dll
  1764. Confirmed=U
  1765. Description=<a href="http://www.soundblaster.com/resources/read.asp?articleid=60&cat=2" target="_blank">ASIO</a> (Audio Stream In/Out) drivers for the SoundBlaster Audigy 2 series soundcards - for recording and home project studios. Required if you use this functionality
  1766. [asl]
  1767. Filename=Aslru.exe
  1768. Confirmed=X
  1769. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojbancoscu.html" target=_blank>BANCOS-CU</a> TROJAN!
  1770. [asmw soft popups burner]
  1771. Filename=popups burner.exe
  1772. Confirmed=U
  1773. Description=Popup blocker, part of Asmw Soft <a href="http://www.asmwsoft.com/products/002.htm" target= blank>PC Optimizer</a>
  1774. [asp4tray]
  1775. Filename=asp4tray.exe
  1776. Confirmed=N
  1777. Description=System Tray application for Aureal Vortex based soundcards. Can be run manually via Start -> Settings -> Control Panel
  1778. [aspiretimemachine]
  1779. Filename=acertmb.exe
  1780. Confirmed=Y
  1781. Description=System recovery software supplied with some Acer notebook PCs. Similar to GoBack and the restore program in WinXP, allowing you to restore a PC back to a working state with minimal re-entry
  1782. [assistse]
  1783. Filename=ASSISTSE.EXE
  1784. Confirmed=X
  1785. Description=CnsMin (<a href="http://www.pestpatrol.com/PestInfo/C/CnsMin.asp" target="_blank">Chinese_Keywords</a>) related
  1786. [astray]
  1787. Filename=Astray.exe
  1788. Confirmed=N
  1789. Description=Voyetra Audio Station - part of Voyetra's <a href="http://www.voyetra.com/site/products/ump3/" target="_blank"> Ultimate MP3 & CD Manager</a>. MP3 and digital music jukebox/organizer
  1790. [astro]
  1791. Filename=Astro.exe
  1792. Confirmed=N
  1793. Description=Checks for updates to Quicken on a system reboot
  1794. [asus live update]
  1795. Filename=ALU.exe
  1796. Confirmed=N
  1797. Description=ASUS Live Update utility for their motherboards
  1798. [asus probe]
  1799. Filename=AsusProb.exe
  1800. Confirmed=N
  1801. Description=ASUS video card fan/thermal monitor - only required if you overclock your card or live in a hot area
  1802. [asus smartdoctor]
  1803. Filename=VGAProbe.exe
  1804. Confirmed=U
  1805. Description=ASUS video card fan/thermal monitor
  1806. [asus tweakenable]
  1807. Filename=astart.exe
  1808. Confirmed=U
  1809. Description=Restores manually changed settings for ASUS based video cards such as overclocking. Only required if you use non-standard settings
  1810. [asuskey]
  1811. Filename=V38SHELL.EXE
  1812. Confirmed=N
  1813. Description=System tray Icon for quickly changing video modes
  1814. [asustweakenable]
  1815. Filename=ATweak.exe
  1816. Confirmed=U
  1817. Description=Asus tweaking utility - for fine tuning the settings of your ASUS display card
  1818. [aswdp]
  1819. Filename=ASWDP.exe
  1820. Confirmed=N
  1821. Description=<a href="http://www.stevejacksonre.com/mls_pulse_sign_up.htm" target="_blank">MLS Pulse</a> - real estate software. Keeps the home buyer/seller continually informed on the status of his/her local/regional real estate market
  1822. [aswnk]
  1823. Filename=aswnk.exe
  1824. Confirmed=X
  1825. Description=Adult content dialler
  1826. [at-watch]
  1827. Filename=ATWatch.exe
  1828. Confirmed=U
  1829. Description=Anti-Trojan Watch - trojan detector
  1830. [atapidrv]
  1831. Filename=atapidrv.exe
  1832. Confirmed=X
  1833. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32agobotsl.html" target=_blank>AGOBOT-SL</a> WORM!
  1834. [athan]
  1835. Filename=Athan.exe
  1836. Confirmed=U
  1837. Description=<a href="http://www.islamasoft.co.uk/products/athan/athansoftware.html" target=_blank>Athan</a> - an application that calculates and reminds the five daily Islamic prayer times for anywhere in the world
  1838. [ati catalyst system tray]
  1839. Filename=CLI.exe SystemTray
  1840. Confirmed=N
  1841. Description=System Tray access to ATI's CATALYST?CONTROL CENTER. Note that this has "SystemTray" appended to CLI.exe in the "Command" column of MSCONFIG. Not required to run the control center - which is available via a right-click on the desktop
  1842. [ati devicedetect]
  1843. Filename=ATIDtct.EXE
  1844. Confirmed=N
  1845. Description=Utility meant for future use of the ATI TV WONDER?USB 2.0 video driver and can be disabled
  1846. [ati gart set-up utility]
  1847. Filename=Atigart.exe
  1848. Confirmed=N
  1849. Description=Program that checks the motherboard chipset and determines which GART driver bundle to install on ATI video cards. If you have one, once installed it shouldn't be needed
  1850. [ati launchpad]
  1851. Filename=launchpd.exe
  1852. Confirmed=U
  1853. Description=Convenient way to start all your Multimedia Center applications (DVD, Video CD, CD Audio, File Player). You can right-click LaunchPad, and uncheck Load on Startup in the menu
  1854. [ati rage3d pro]
  1855. Filename=AtiRage4dPro.exe
  1856. Confirmed=X
  1857. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32agobotog.html" target=_blank>AGOBOT-OG</a> WORM!
  1858. [ati scheduler]
  1859. Filename=Atisched.exe
  1860. Confirmed=N
  1861. Description=Component that remains resident in memory and automatically launches the ATI VIDEO PLAYER at a user selected time and date. Delete the shortcut in the Start -> Programs -> Startup folder as well. Functions could re-enable the program to load at start-up and re-introduce the shortcut. Try it and see
  1862. [ati task application]
  1863. Filename=Atitkad.exe
  1864. Confirmed=N
  1865. Description=System Tray access and key-combo shortcuts to common display functions on ATI video cards. Can be run from Start -> Settings -> Control Panel -> Display
  1866. [ati task application (atikey)]
  1867. Filename=Atitask.exe
  1868. Confirmed=N
  1869. Description=System Tray access and key-combo shortcuts to common display functions on ATI video cards. Can be run from Start -> Settings -> Control Panel -> Display
  1870. [ati technology startup]
  1871. Filename=techstart.exe
  1872. Confirmed=X
  1873. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotaeu.html" target=_blank>RBOT-AEU</a> WORM!
  1874. [ati video regkey]
  1875. Filename=ati2vid.exe
  1876. Confirmed=X
  1877. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_SDBOT.UR" target="_blank">SDBOT.UR</a> WORM!
  1878. [ati2cwxx]
  1879. Filename=Ati2cwxx.exe
  1880. Confirmed=?
  1881. Description=<font color="#FF0000">For some ATI video cards. Probably used to access features and may not be required - for example the ATI Radeon works fine without it </font>
  1882. [ati2mdxx]
  1883. Filename=Ati2mdxx.exe
  1884. Confirmed=N
  1885. Description=For ATI video cards. System Tray access to display mode changing
  1886. [aticcc]
  1887. Filename=cli.exe runtime
  1888. Confirmed=N
  1889. Description=ATI's CATALYST?CONTROL CENTER. Required if you want to change graphics settings on a regular basis but you must have internet access and Microsoft's .NET framework installed. Note that this has "runtime" appended to cli.exe in the "Command" column of MSCONFIG. Recommend that start the program manually via Start -> Programs -> ATI Catalyst Control Center -> Advanced -> Restart Runtime as it can casue problems when starting Windows
  1890. [aticpaxx.exe]
  1891. Filename=aticpaxx.exe
  1892. Confirmed=X
  1893. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotxp.html" target= blank>RBOT-XP</a> WORM!
  1894. [atidisplaydrv]
  1895. Filename=atidrvxx.exe
  1896. Confirmed=X
  1897. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotvz.html" target= blank>RBOT-VZ</a> WORM!
  1898. [atidriver]
  1899. Filename=reaIplayer.exe
  1900. Confirmed=X
  1901. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32warpigse.html" target=_blank>WARPIGS-E</a> WORM! Note the uppercase "I" in the filename, rather than a lower case "L"
  1902. [atimodechange]
  1903. Filename=Ati2mdxx.exe
  1904. Confirmed=U
  1905. Description=System Tray icon to access ATI graphics card settings and the Hydravision Desktop Manager
  1906. [atipatxx]
  1907. Filename=atipatxx.exe
  1908. Confirmed=X
  1909. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojsmalled.html" target=_blank>SMALL-ED</a> TROJAN!
  1910. [atipoll]
  1911. Filename=ati2evxx.exe
  1912. Confirmed=U
  1913. Description=ATI External Event Utility EXE Module. This task can comsume lots of CPU resournces  on some computers, but it can help with graphics card problems. Leave enabled unless it consumes too many CPU resources
  1914. [atiptext]
  1915. Filename=atiptext.exe
  1916. Confirmed=X
  1917. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojcosiama.html" target= blank>COSIAM-A</a> TROJAN!
  1918. [atiqipcl]
  1919. Filename=AtiQiPcl.exe
  1920. Confirmed=U
  1921. Description=Used for hardware DVD decoding on ATI video cards supporting this feature. Not required unless you regularly play DVD's
  1922. [atismart]
  1923. Filename=ati2s9ag.exe
  1924. Confirmed=U
  1925. Description=ATI's "SMARTGART", which is included with the "<a href="http://mirror.ati.com/products/pc/catalyst/index.html" target="_blank">Catalyst</a>" drivers. When the system boots, it runs a couple of bus tests & tries to apply the most stable settings
  1926. [atisound]
  1927. Filename=csrss.exe
  1928. Confirmed=U
  1929. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/spyware.winspy.html" target=_blank>WinSpy</a> surveillance software. Uninstall this software unless you put it there yourself. Note - this is not the legitimate <a href="http://www.liutilities.com/products/wintaskspro/processlibrary/csrss/" target=_blank>csrss.exe</a> process which is always located in the System (9x/Me) or System32 (NT/2K/XP) folder and should not normally figure in Msconfig/Startup! This file is located in the "ComRoot" subfolder
  1930. [atisrc2]
  1931. Filename=windfind.exe
  1932. Confirmed=X
  1933. Description=Adult content dialler - see <a href="http://www.spywareinfo.com/forums/index.php?act=ST&f=11&t=7756&hl=&s=" target="_blank">here</a>. This has to be cleared at the same time as MSStartOptimizer (WINUPD.EXE), mmxrun (msosa.exe) and RegCompres (REGCPM32.EXE), otherwise they return
  1934. [atitech]
  1935. Filename=Active.exe
  1936. Confirmed=X
  1937. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojroamera.html" target=_blank>ROAMER-A</a> TROJAN!
  1938. [atitray]
  1939. Filename=atitray.exe
  1940. Confirmed=U
  1941. Description=ATI Tray Tools - allows quick access to ATI graphics card settings
  1942. [atitraytools]
  1943. Filename=atitray.exe
  1944. Confirmed=U
  1945. Description=ATI Tray Tools - allows quick access to ATI graphics card settings
  1946. [atiupdater]
  1947. Filename=atiupdxx.exe
  1948. Confirmed=X
  1949. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotabx.html" target= blank>RBOT-ABX</a> WORM!
  1950. [atiupdpl]
  1951. Filename=atiupdpl.exe
  1952. Confirmed=X
  1953. Description=Added by the <a href="http://ae.trendmicro-europe.com/consumer/vinfo/encyclopedia.php?LYstr=VMAINDATA&vNav=1&VName=TROJ SMALL.AOS" target= blank>SMALL.AOS</a> TROJAN!
  1954. [ativopen]
  1955. Filename=ativopen.exe
  1956. Confirmed=X
  1957. Description=Premium rate adult content dialler
  1958. [atix10]
  1959. Filename=atix10.exe
  1960. Confirmed=Y
  1961. Description=ATI <a href="http://www.ati.com/products/pc/remotewonder/" target="_blank">Remote Wonder?/a> - PC wireless remote control driver. Required if you use it
  1962. [atm control]
  1963. Filename=adpn.exe
  1964. Confirmed=X
  1965. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_MMS.A&VSect=T" target="_blank">MMS.A</a> WORM!
  1966. [atnotes]
  1967. Filename=atnotes.exe
  1968. Confirmed=N
  1969. Description=Loads the ATnotes program for virtual sticky notes for your desktop. Available via Start -> Programs
  1970. [atomic-x27]
  1971. Filename=Atomic-x27.exe
  1972. Confirmed=X
  1973. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32katomika.html" target=_blank>KATOMIK-A</a> WORM!
  1974. [atomic-x27c]
  1975. Filename=AtomicpartC.exe
  1976. Confirmed=X
  1977. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32katomika.html" target=_blank>KATOMIK-A</a> WORM!
  1978. [atomic.exe]
  1979. Filename=Atomic.exe
  1980. Confirmed=U
  1981. Description=<a href="http://www.worldtimeserver.com/atomic-clock/" target=_blank>Atomic Clock Sync</a> - synchronizes your computer's time with the NIST time server
  1982. [atomica]
  1983. Filename=atomica.exe
  1984. Confirmed=N
  1985. Description=<a href="http://www.atomica.com/" target="_blank">Atomica</a> runs from the System Tray and allows the user to find out more about a word or phrase on any screen by pointing at it with the mouse and clicking button one while holding down the Alt key
  1986. [atomictime]
  1987. Filename=ATOMICTIME.EXE
  1988. Confirmed=U
  1989. Description=<a href="http://schmail.com/atomictime/" target="_blank">AtomicTime</a> - utility that synchronizes your PC clock to an atomic clock
  1990. [atrack]
  1991. Filename=atrack.exe
  1992. Confirmed=U
  1993. Description=New feature of Norton Internet Security (NIS) and Norton Personal Firewall (NPF) 3.0 is the Alert Tracker, an instant notification feature. The Alert Tracker displays information about events as they happen. This way, when a rule has been triggered or an access to the Internet made, you know about it immediately rather than finding out about it when you check your logs or notice that the NIS icon indicates a security alert
  1994. [atray]
  1995. Filename=Atray.exe
  1996. Confirmed=U
  1997. Description=<a href="http://www.divcomsoft.com/atray/" target="_blank">Active Tray</a> is a utility which lets you configure the system tray. You can also create your own tray icons
  1998. [atspooler]
  1999. Filename=AppsTraka.exe
  2000. Confirmed=U
  2001. Description=<a href="http://www.symantec.com/avcenter/venc/data/spyware.desktopscout.html" target= blank>AppsTraka</a> keystroke logger/monitoring program - remove unless you installed it yourself!
  2002. [attbroadbandupdate]
  2003. Filename=SAUpdate.exe
  2004. Confirmed=U
  2005. Description=<a href="http://bb4.com/" target="_blank">Big Brother</a> from Quest Software. System and network monitor
  2006. [attredupdate]
  2007. Filename=AutoUpdate.exe
  2008. Confirmed=U
  2009. Description=Additional item added to start-ups after AT&T took over the now bankrupt Excite@home high-speed internet service. Included for automatically downloading and installing updates. Leave it unless you plan to regularly run it to check for updates
  2010. [attuneclientengine]
  2011. Filename=attune_ce.exe
  2012. Confirmed=X
  2013. Description=Spyware - part of an automated helpdesk software called Aveo Attune
  2014. [attunecontentupdater]
  2015. Filename=attune_cu.exe
  2016. Confirmed=X
  2017. Description=Spyware - part of an automated helpdesk software called Aveo Attune
  2018. [attunediscovery]
  2019. Filename=attune_di.exe
  2020. Confirmed=X
  2021. Description=Spyware - part of an automated helpdesk software called Aveo Attune
  2022. [attunel]
  2023. Filename=Attunel.exe
  2024. Confirmed=X
  2025. Description=Spyware - part of an automated helpdesk software called Aveo Attune
  2026. [attunesystray]
  2027. Filename=attune_st.exe
  2028. Confirmed=X
  2029. Description=Spyware - part of an automated helpdesk software called Aveo Attune
  2030. [atuner]
  2031. Filename=atuner.exe
  2032. Confirmed=N
  2033. Description=<a href="http://www.3dcenter.de/atuner/index_e.php" target="_blank">aTuner</a> - tweak tool for GeForce based graphics cards
  2034. [atwtusb]
  2035. Filename=atwtusb.exe
  2036. Confirmed=Y
  2037. Description=USB interface for Aiptek Graphics Tablet (USB)
  2038. [atxbrw]
  2039. Filename=Iexplor.exe
  2040. Confirmed=X
  2041. Description="Pop Marketing" adware
  2042. [au agent]
  2043. Filename=AUagent.exe
  2044. Confirmed=U
  2045. Description=<a href="http://www.zilab.com/Products/Au/index_2.shtml" target="_blank">Au Agent</a> from Zilab Software. Win2K/NT enhancement tool. Allows you to run applications under any security context without closing the whole logon session to process a new logon
  2046. [au.exe]
  2047. Filename=au.exe
  2048. Confirmed=X
  2049. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.beagle.b@mm.html" target="_blank">BEAGLE.B</a> WORM!
  2050. [aucbpnp]
  2051. Filename=aucbnpn.exe
  2052. Confirmed=Y
  2053. Description=Adaptec USB CardBus Safe-Eject - driver for the <a href="http://www.adaptec.com/worldwide/product/proddetail.html?sess=no&language=English+US&prodkey=AUA-1420&cat=%2fTechnology%2fUSB%2fUSB+Adapters" target="_blank">Adaptec USB 2.0 CardBus</a> which provides USB 2.0 ports for laptop users via a PCMCIA card slot
  2054. [aucompat]
  2055. Filename=Aucompat.exe
  2056. Confirmed=X
  2057. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/trojan.gema.html" target="_blank">GEMA</a> TROJAN!
  2058. [audcntr]
  2059. Filename=audcntr.exe
  2060. Confirmed=X
  2061. Description=Added by the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?ID=40574" target=_blank>GEMA</a> TROJAN!
  2062. [audctrl]
  2063. Filename=RunDll32 AudCtrl.dll, RCMonitor
  2064. Confirmed=?
  2065. Description=<font color="#FF0000">Audio control panel?</font>
  2066. [audio]
  2067. Filename=SOUND.exe
  2068. Confirmed=X
  2069. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/dialployba.html" target=_blank>PLOYB-A</a> TROJAN!
  2070. [audiocntl]
  2071. Filename=audiocntl.exe
  2072. Confirmed=X
  2073. Description=Added by a variant of the <a href="http://www.sophos.com/virusinfo/analyses/trojcrypterc.html" target="_blank">CRYPTER.C</a> TROJAN!
  2074. [audiodeck]
  2075. Filename=ADeck.exe
  2076. Confirmed=N
  2077. Description=ADeck.exe is a system tray application for VIA's sound cards which offers quick access to a number of sound card related items
  2078. [audiodrv]
  2079. Filename=audiodrv.exe
  2080. Confirmed=X
  2081. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojcrypterc.html" target= blank>CRYPTER-C</a> TROJAN!
  2082. [audiohq]
  2083. Filename=Ahqtb.exe
  2084. Confirmed=N
  2085. Description=For Creative Soundblaster Live! series soundcards. System tray application for SB Live! functions. Available via Start -> Programs
  2086. [audioinf]
  2087. Filename=audioinf.exe
  2088. Confirmed=X
  2089. Description=Added by a variant of the <a href="http://www.sophos.com/virusinfo/analyses/trojcrypterc.html" target="_blank">CRYPTER.C</a> TROJAN!
  2090. [aunps2]
  2091. Filename=RUNDLL32 AUNPS2.DLL, _Run@16
  2092. Confirmed=X
  2093. Description=AlwaysUpdatedNews.com parasite related - see <a href="http://securityresponse.symantec.com/avcenter/venc/data/adware.aunps.html" target=_blank>here</a>
  2094. [aureal a3d interactive audio]
  2095. Filename=sa3dsrv.exe
  2096. Confirmed=Y
  2097. Description=For Aureal based 3D soundcards. A3D sound features won't work with this disabled
  2098. [aureal a3d interactive audio init]
  2099. Filename=A3dInit.exe
  2100. Confirmed=Y
  2101. Description=For Aureal based 3D soundcards. A3D sound features won't work with this disabled
  2102. [ausvc]
  2103. Filename=ausvc.exe
  2104. Confirmed=X
  2105. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.autoupder.html" target="_blank">AUTOUPDER</a> TROJAN!
  2106. [auth starter ident]
  2107. Filename=startauth.exe
  2108. Confirmed=X
  2109. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotwp.html" target= blank>RBOT-WP</a> WORM!
  2110. [authz]
  2111. Filename=authz.exe
  2112. Confirmed=X
  2113. Description=Added by an unidentified VIRUS, WORM or TROJAN!
  2114. [auto cd-rom startup]
  2115. Filename=cdaccess.exe
  2116. Confirmed=X
  2117. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_SPYBOT.BLA&VSect=P" target=_blank>SPYBOT.BLA</a> WORM!
  2118. [auto repair system]
  2119. Filename=qualityx.exe
  2120. Confirmed=X
  2121. Description=Added by an unidentified WORM or TROJAN - probably a <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.spybot.worm.html" target="_blank">SPYBOT</a> variant
  2122. [auto switch]
  2123. Filename=TASKBAR.exe
  2124. Confirmed=U
  2125. Description=Related to 2-port Bitronics AutoSwitch kit from Belkin
  2126. [auto t bar]
  2127. Filename=autotbar.exe
  2128. Confirmed=N
  2129. Description=If you disable the HP VIEW toolbar in IE and rarrange the toolbars on a reboot they will be back as they were before if this is left enabled
  2130. [auto updates]
  2131. Filename=svchost.exe
  2132. Confirmed=X
  2133. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojcheukoa.html" target=_blank>CHEUKO-A</a> TROJAN! Note - this is not the legitimate <a href="http://www.liutilities.com/products/wintaskspro/processlibrary/svchost/" target=_blank>svchost.exe</a> process which is always located in the System (9x/Me) or System32 (NT/2K/XP) folder and should not normally figure in Msconfig/Startup! This file is located in the Winnt or Windows folder
  2134. [auto winupdate]
  2135. Filename=taskmrg.exe
  2136. Confirmed=X
  2137. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotafa.html" target=_blank>RBOT-AFA</a> WORM!
  2138. [autobar]
  2139. Filename=autobar.exe
  2140. Confirmed=U
  2141. Description=Connect buttons on the keyboard for internet direct access, etc. on HP computers
  2142. [autocad startup accelerator]
  2143. Filename=acstart16.exe
  2144. Confirmed=U
  2145. Description=Preloads some libraries that are used by <a href="http://usa.autodesk.com/adsk/servlet/index?siteID=123112&id=5127213" target=_blank>AutoCAD</a> in order to make the software load faster
  2146. [autoclk]
  2147. Filename=autoclk.exe
  2148. Confirmed=U
  2149. Description=<a href="http://autoclik.8m.com/" target=_blank>Autoclik</a> is a Windows utility "that allows you to perform all mouse activity with absolutely no clicking"
  2150. [autoea]
  2151. Filename=Ahqrun.exe
  2152. Confirmed=N
  2153. Description=For Creative Soundblaster Live! series soundcards. Specify for any audio application what audio preset to automatically associate with currently active speaker output. Available via AudioHQ
  2154. [autoexe]
  2155. Filename=AUTOEXE.exe
  2156. Confirmed=X
  2157. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32semapia.html" target= blank>SEMAPI-A</a> WORM!
  2158. [autoloaderenvoloautoupdater]
  2159. Filename=auto_update_loader.exe
  2160. Confirmed=X
  2161. Description=<a href="http://www.securemost.com/articles/trou_3_remove_aproposmedia.htm" target=_blank>Envolo/AproposMedia</a> adware updater
  2162. [automate task service]
  2163. Filename=automate.exe
  2164. Confirmed=N
  2165. Description=Task scheduler for <a href="http://www.unisyn.com/" target="_blank">Unisyn Automate 4</a> task automation/macro running software. Available via a desktop shortcut or Start -> Programs
  2166. [automatic defrag manager]
  2167. Filename=defrag.exe
  2168. Confirmed=X
  2169. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotake.html" target=_blank>RBOT-AKE</a> WORM!
  2170. [automatic microsoft windows updater]
  2171. Filename=suchost.exe
  2172. Confirmed=X
  2173. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rboteq.html" target=_blank>RBOT-EQ</a> WORM!
  2174. [automatic windows updater]
  2175. Filename=Update.exe
  2176. Confirmed=X
  2177. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.hllw.gaobot.ao.html" target="_blank">GAOBOT.AO</a> WORM!
  2178. [automatically launches the united devices agent when you start your computer]
  2179. Filename=UD.EXE
  2180. Confirmed=N
  2181. Description=The <a href="http://members.ud.com/download/gold/" target="_blank">United Devices Agent</a> can recycle your PC's unused resources and use them to perform valuable scientific and medical research without disturbing your usual computer use - similar to SETI@home but for medical research. Available via Start -> Programs
  2182. [autopdate]
  2183. Filename=Autopdate.exe
  2184. Confirmed=X
  2185. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotagl.html" target=_blank>RBOT-AGL</a> WORM!
  2186. [autoprop]
  2187. Filename=REGPROP.EXE WMPADDIN.DLL
  2188. Confirmed=N
  2189. Description=Both the files are in the MS Office/Bots/FP_WMP directory. Apparently, it registers the FrontPage WiMP extension
  2190. [autoprotectu]
  2191. Filename=navapq32.exe
  2192. Confirmed=X
  2193. Description=Added by an unidentified WORM or TROJAN!
  2194. [autorepair]
  2195. Filename=dexs.exe
  2196. Confirmed=X
  2197. Description=Added by a variant of the <a href="http://vil.nai.com/vil/content/v_100454.htm" target=_blank>SDBOT</a> WORM!
  2198. [autoshutdown]
  2199. Filename=pssvc.exe
  2200. Confirmed=?
  2201. Description=<font color="#FF0000">Utility to fix vCard Export in MS Outlook 2000 - although why are these together?</font>
  2202. [autosizer]
  2203. Filename=AUTOSIZER.EXE
  2204. Confirmed=U
  2205. Description=<a href="http://www.southbaypc.com/AutoSizer/" target="_blank">AutoSizer</a> - utility that automatically maximizes windows when they're opened
  2206. [autospell]
  2207. Filename=autospel.exe
  2208. Confirmed=N
  2209. Description=<a href="http://www.spellchecker.com/" target="_blank">AutoSpell</a> - spell checker (version 6.*)
  2210. [autospell 5]
  2211. Filename=ASWATC32.EXE
  2212. Confirmed=N
  2213. Description=<a href="http://www.spellchecker.com/" target="_blank">AutoSpell</a> - spell checker
  2214. [autotbar]
  2215. Filename=autotbar.exe
  2216. Confirmed=N
  2217. Description=If you disable the HP VIEW toolbar in IE and rarrange the toolbars on a reboot they will be back as they were before if this is left enabled
  2218. [autotkit]
  2219. Filename=AUTOTKIT.EXE
  2220. Confirmed=N
  2221. Description=On HP PC's. Unclear what purpose it serves - but there's a known issue with Internet Explorer Toolbar settings not being saved with it enabled
  2222. [autoupdate service]
  2223. Filename=kaka.exe
  2224. Confirmed=X
  2225. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojsympeb.html" target=_blank>SYMPE-B</a> TROJAN!
  2226. [autovirusprotection]
  2227. Filename=ciscv.exe
  2228. Confirmed=X
  2229. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  2230. [auto__hloader__key]
  2231. Filename=hloader_exe.exe
  2232. Confirmed=X
  2233. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=TROJ_BAGLE.AB&VSect=P" target=_blank>BAGLE.AB</a> TROJAN!
  2234. [aux.exe]
  2235. Filename=aux.exe
  2236. Confirmed=X
  2237. Description=Added by the <a href="http://www.symantec.com/avcenter/venc/data/backdoor.zins.html" target=_blank>ZINS</a> TROJAN!
  2238. [auxaudiodevice]
  2239. Filename=aux32.exe
  2240. Confirmed=X
  2241. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.aizu.html" target="_blank">AIZU</a> WORM!
  2242. [auxxtray]
  2243. Filename=au30setp.exe
  2244. Confirmed=N
  2245. Description=System Tray application for Aureal Vortex based soundcards. Can be run manually via Start -> Settings -> Control Panel
  2246. [av]
  2247. Filename=UPDATE-28062004.exe[25 blank spaces].vbs
  2248. Confirmed=X
  2249. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/vbs.midfin@mm.html" target=_blank>MIDFIN</a> WORM!
  2250. [av client]
  2251. Filename=patch31345.exe
  2252. Confirmed=X
  2253. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.mydoom.ad@mm.html" target=_blank>MYDOOM.AD</a> WORM!
  2254. [av industry]
  2255. Filename=patch31345.exe
  2256. Confirmed=X
  2257. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.mydoom.ad@mm.html" target=_blank>MYDOOM.AD</a> WORM!
  2258. [av update]
  2259. Filename=Update.exe
  2260. Confirmed=X
  2261. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojfuroota.html" target= blank>FUROOT-A</a> TROJAN!
  2262. [avast! web scanner]
  2263. Filename=Ashwebsv.exe
  2264. Confirmed=Y
  2265. Description=<a href="http://www.avast.com/eng/avast_4_home.html" target=_blank>Avast!</a> antivirus
  2266. [avast32]
  2267. Filename=Astart32.exe
  2268. Confirmed=Y
  2269. Description=Part of <a href="http://www.alwil.com/en/default.asp" target=_blank>Avast!</a> anti-virus software
  2270. [avc]
  2271. Filename=avmon.exe
  2272. Confirmed=X
  2273. Description=Added by an unidentified TROJAN!
  2274. [avconsoleexe]
  2275. Filename=Avconsol.exe
  2276. Confirmed=U
  2277. Description=From McAfee VirusScan up to version 4.x and Dr Solomon's VirusScan. Used to schedule regular scans. If you don't have scans scheduled you don't need it
  2278. [aveoattune]
  2279. Filename=atmdlusr.exe
  2280. Confirmed=X
  2281. Description=Spyware - part of an automated helpdesk software
  2282. [avg]
  2283. Filename=svchost323.exe
  2284. Confirmed=X
  2285. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotza.html" target= blank>RBOT-ZA</a> WORM!
  2286. [avg grisoft updater]
  2287. Filename=updater.exe
  2288. Confirmed=X
  2289. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32agobotot.html" target=_blank>AGOBOT-OT</a> WORM!
  2290. [avg7_amsvr]
  2291. Filename=Avgamsvr.exe
  2292. Confirmed=Y
  2293. Description=<a href="http://www.grisoft.com/" target=_blank>AVG</a> antivirus related
  2294. [avg7_cc]
  2295. Filename=AVGCC.exe
  2296. Confirmed=Y
  2297. Description=<a href="http://www.grisoft.com/" target=_blank>AVG</a> Anti-Virus 7.0 Control Center. Allows you to manage and control all AVG Anti-Virus components, settings and updates
  2298. [avg7_emc]
  2299. Filename=AVGEMC.exe
  2300. Confirmed=Y
  2301. Description=<a href="http://www.grisoft.com/" target=_blank>AVG</a> Anti-Virus 7.0 Email Cleaner. Scans incoming and outgoing email for viruses
  2302. [avg7_run]
  2303. Filename=avgw.exe
  2304. Confirmed=Y
  2305. Description=<a href="http://www.grisoft.com/" target=_blank>AVG</a> Anti-Virus 7.0 related
  2306. [avgamsvr.exe]
  2307. Filename=Avgamsvr.exe
  2308. Confirmed=Y
  2309. Description=<a href="http://www.grisoft.com/" target=_blank>AVG</a> antivirus related
  2310. [avgcc32]
  2311. Filename=avgcc32.exe
  2312. Confirmed=Y
  2313. Description=<a href="http://www.grisoft.com/" target=_blank>AVG</a> anti-virus control center. Also enables scheduled tests, Outlook E-mail plug-in and automatic updates
  2314. [avgctrl]
  2315. Filename=AVGCTRL.EXE
  2316. Confirmed=Y
  2317. Description=Background task of the <a target="_blank" href="http://www.hbedv.com/">AntiVir</a> antivirus program which scans files transparently in the background
  2318. [avgmsvr.exe]
  2319. Filename=avgmsvr.exe
  2320. Confirmed=Y
  2321. Description=<a href="http://www.grisoft.com/" target=_blank>AVG</a> Anti-Virus 7.0 related
  2322. [avgserv9.exe]
  2323. Filename=Avgserv9.exe
  2324. Confirmed=Y
  2325. Description=<a href="http://www.grisoft.com/" target=_blank>AVG</a> antivirus background monitoring
  2326. [avg_cc]
  2327. Filename=avgcc32.exe
  2328. Confirmed=Y
  2329. Description=<a href="http://www.grisoft.com/" target=_blank>AVG</a> anti-virus control center. Also enables scheduled tests, Outlook E-mail plug-in and automatic updates
  2330. [avg_emc]
  2331. Filename=AVGEMC.exe
  2332. Confirmed=Y
  2333. Description=<a href="http://www.grisoft.com/" target=_blank>AVG</a> Anti-Virus 7.0 Email Cleaner. Scans incoming and outgoing email for viruses
  2334. [avg_regcleaner]
  2335. Filename=AVGREGCL.exe
  2336. Confirmed=Y
  2337. Description=<a href="http://www.grisoft.com/" target=_blank>AVG</a> Anti-Virus 7.0 Registry Cleaner - for checking the registry for virus additions and other security problems
  2338. [avidrv]
  2339. Filename=drvsc.exe
  2340. Confirmed=X
  2341. Description=Detected as the Trojan-Downloader.Win32.Agent.ph TROJAN! by Kaspersky Anti-Virus
  2342. [avimgt]
  2343. Filename=Avimgt.exe
  2344. Confirmed=X
  2345. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/trojan.gema.html" target="_blank">GEMA</a> TROJAN!
  2346. [avimgt32]
  2347. Filename=Avimgt32.exe
  2348. Confirmed=X
  2349. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/trojan.gema.html" target="_blank">GEMA</a> TROJAN!
  2350. [avinit]
  2351. Filename=AVINIT9X.EXE
  2352. Confirmed=Y
  2353. Description=<a href="http://www.authentium.com/products/avmatrix.htm" target= blank>Command</a> antivirus related
  2354. [avk mail checker]
  2355. Filename=AVKPop.exe
  2356. Confirmed=Y
  2357. Description=<a href="http://www.boomerangsoftware.com/Products/AntiVirus/AVKProInfo.htm" target=_blank>eXtendia</a> AVK AntiVirus email checker
  2358. [avkbar]
  2359. Filename=AVKBar.exe
  2360. Confirmed=Y
  2361. Description=GData <a href="http://www.gdata.de/trade/productview/488/16/" target=_blank>AntiVirusKit</a> Anti-virus
  2362. [avmaisrv]
  2363. Filename=Avmaisrv.exe
  2364. Confirmed=Y
  2365. Description=Part of <a href="http://www.alwil.com/en/default.asp" target=_blank>Avast!</a> anti-virus software - E-mail scanner
  2366. [avp]
  2367. Filename=[path to trojan]
  2368. Confirmed=X
  2369. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojmutboa.html" target=_blank>MUTBO-A</a> TROJAN!
  2370. [avpcc]
  2371. Filename=avpcc.exe
  2372. Confirmed=Y
  2373. Description=<a href="http://www.kaspersky.com/" target="_blank">Kaspersky Labs</a> anti-virus
  2374. [avpm]
  2375. Filename=avpm.exe
  2376. Confirmed=Y
  2377. Description=Kaspersky antivirus
  2378. [avpr]
  2379. Filename=avpr.exe
  2380. Confirmed=X
  2381. Description=Added by the <a href="http://www.symantec.com/avcenter/venc/data/w32.mydoom.af@mm.html" target=_blank>MYDOOM.AF</a> WORM!
  2382. [avril lavigne - muse]
  2383. Filename=[random filename]
  2384. Confirmed=X
  2385. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32avrila.html" target="_blank">AVRIL-A</a> WORM!
  2386. [avsched32]
  2387. Filename=AVSched32.exe
  2388. Confirmed=Y
  2389. Description=<a href="http://www.hbedv.com/" target="_blank">AntiVir</a> anti-virus from H+BDEV
  2390. [avschedscan]
  2391. Filename=SCHSC9X.EXE
  2392. Confirmed=Y
  2393. Description=<a href="http://www.authentium.com/products/avmatrix.htm" target= blank>Command</a> antivirus related
  2394. [avserve.exe]
  2395. Filename=avserve.exe
  2396. Confirmed=X
  2397. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.sasser.worm.html" target="_blank">SASSER</a> WORM!
  2398. [avserve2.exe]
  2399. Filename=avserve2.exe
  2400. Confirmed=X
  2401. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.sasser.b.worm.html" target="_blank">SASSER.B</a> or <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.sasser.c.worm.html" target="_blank">SASSER.C</a> WORMS!
  2402. [avserve3.exe]
  2403. Filename=avserve3.exe
  2404. Confirmed=X
  2405. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.sasser.g.html" target="_blank">SASSER.G</a> WORM!
  2406. [avtray]
  2407. Filename=Avtray.exe
  2408. Confirmed=N
  2409. Description=<a href="http://www.command.co.uk/html/products/csav/index.cfm" target="_blank">Command Antivirus</a> tray icon
  2410. [avwlpsta]
  2411. Filename=AVWLPSTA.exe
  2412. Confirmed=?
  2413. Description=PRISM Status Tray Applet - <font color="#FF0000">but what is it for and is it required?</font>
  2414. [avwupd32]
  2415. Filename=AVWUPD32.EXE
  2416. Confirmed=U
  2417. Description=<a href="http://www.hbedv.com/" target="_blank">AntiVir</a> updater. Useful, but can be run manually
  2418. [avx communicator]
  2419. Filename=xcommsur.exe
  2420. Confirmed=Y
  2421. Description=Anti-virus part of <a href="http://www.bitdefender.com/" target="_blank">BitDefender</a> virus scanner/firewall
  2422. [avxlive]
  2423. Filename=avxlive.exe
  2424. Confirmed=Y
  2425. Description=<a href="http://www.bullguard.com/" target="_blank">Bullguard</a> or <a href="http://www.bitdefender.com/" target="_blank">BitDefender</a> antivirus
  2426. [avxlni]
  2427. Filename=avxinit.exe
  2428. Confirmed=Y
  2429. Description=Anti-virus part of <a href="http://www.bitdefender.com/" target="_blank">BitDefender</a> virus scanner/firewall
  2430. [avxnews]
  2431. Filename=??
  2432. Confirmed=?
  2433. Description=<font color="#FF0000">??</font>
  2434. [awatch]
  2435. Filename=Awatch.exe
  2436. Confirmed=U
  2437. Description=Diagnosis tool that monitors DSL connections, installed alongside DSL drivers from AVM Fritz's range of modem products
  2438. [awhost32]
  2439. Filename=awhost32.exe
  2440. Confirmed=N
  2441. Description=Part of Symantec's <a href="http://enterprisesecurity.symantec.com/products/products.cfm?productID=2">pcAnywhere</a> remote PC management software. Provides an automatic startup of the client PC in host mode in conjuction with a host-definition file, so system administrators can access the machine. Can cause a 10% reduction in speed and not recommended
  2442. [awusgsta]
  2443. Filename=AWUSGSTA.exe
  2444. Confirmed=?
  2445. Description=Reportedly related to a USB Wifi Adapter - <font color="#FF0000">is it required at startup?</font>
  2446. [awxdtools]
  2447. Filename=awxDTools.dll, awxRegisterDll
  2448. Confirmed=U
  2449. Description=<a href="http://www.hbreitner.de/awxdtools/" target= blank>AwxDTools</a> related - a Windows Shell-Extension for the Daemon-Tools. It extends the context-menu of ImageFiles supported by Daemon-Tools (i.e.: *.cue, *.iso, *.ccd ...)
  2450. [axfilter]
  2451. Filename=Rundll32 AXFILTER.DLL, Rundll32
  2452. Confirmed=?
  2453. Description=<font color="#FF0000">??</font>
  2454. [azmodem]
  2455. Filename=azexe.exe
  2456. Confirmed=Y
  2457. Description=<a href="http://www.aztech.com/" target=_blank>Aztech Labs</a> modem driver
  2458. [a_vpd]
  2459. Filename=vpd.exe
  2460. Confirmed=?
  2461. Description=Located in the IBMTOOLS\VPD sub-directory. <font color="#FF0000">What does it do and is it required?"
  2462. [a▓]
  2463. Filename=
  2464. [a▓]
  2465. Confirmed=
  2466. [a▓]
  2467. Description=
  2468. [b'sclip]
  2469. Filename=BSCLIP.exe
  2470. Confirmed=N
  2471. Description=CD recording utility that comes with a lot of CDR/CDRW drives and isn't required
  2472. [b.exe]
  2473. Filename=b.exe
  2474. Confirmed=X
  2475. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_SDBOT.BND&VSect=T" target=_blank>SDBOT.BND</a> WORM!
  2476. [b.reader]
  2477. Filename=remin.exe
  2478. Confirmed=N
  2479. Description=<a href="http://www.harshal.da.ru/" target="_blank">Birthday Reminder 5.0</a> - as the name implies
  2480. [b3d]
  2481. Filename=BDEsecureinstall.exe
  2482. Confirmed=X
  2483. Description=<a href="http://www.kazaa.com/en/privacy/bundles.htm" target="_blank">B3d Projector</a> foistware - periodically trys to access the internet. (1) Uninstall it via Start -> Settings -> Control Panel -> Add/Remove Programs. (2) Remove the BDEsecureinstall.exe if still present in C:\\Windows\\System. (3) Disable and ideally delete it from the registry. (4) Remove the "BDE" directory and all its contents
  2484. [b3dupdate]
  2485. Filename=Zupdate.exe
  2486. Confirmed=X
  2487. Description=<a href="http://www.kazaa.com/en/privacy/bundles.htm" target="_blank">B3d Projector</a> foistware - periodically trys to access the internet. (1) Uninstall it via Start -> Settings -> Control Panel -> Add/Remove Programs. (2) Remove the BDEsecureinstall.exe if still present in C:\\Windows\\System. (3) Disable and ideally delete it from the registry. (4) Remove the "BDE" directory and all its contents
  2488. [b9]
  2489. Filename=B9.exe
  2490. Confirmed=U
  2491. Description=<a href="http://www.firetrust.com/products/benign/?PHPSESSID=b60bb4b6eb22115639c465d6f606b788" target="_blank">FireTrust Benign</a> - allows you to receive e-mail which is safe from viruses, worms, scripts, web bugs, privacy threats and other security risks, without affecting your e-mail. "Benign neutralizes or strips out the code that makes viruses, worms, scripts and other potentially harmful things run"
  2492. [b99]
  2493. Filename=msmm.exe
  2494. Confirmed=X
  2495. Description=<a href="http://research.sunbelt-software.com/threat_display.cfm?name=ClientMan&threatid=3754&search=ClientMan" target=_blank>ClientMan</a> parasite variant
  2496. [babeie]
  2497. Filename=rundll32 cnbabe.dll, dllstartup
  2498. Confirmed=X
  2499. Description=<a href="http://www.commonname.com/english/ug/toolbar/default.asp?idx=1" target="_blank">CommonName Toolbar</a> spyware. To uninstall see <a href="http://www.commonname.com/english/ug/toolbar/default.asp?idx=10#4">here</a>
  2500. [babylon client]
  2501. Filename=Babylon.exe
  2502. Confirmed=N
  2503. Description=<a href="http://www.babylon.com/" target="_blank">Babylon-Pro</a> is a powerful information tool that instantly provides relevant information, translations & conversions for any word or value you click on"
  2504. [babylon translator]
  2505. Filename=Babylon.exe
  2506. Confirmed=N
  2507. Description=<a href="http://www.babylon.com/" target="_blank">Babylon-Pro</a> is a powerful information tool that instantly provides relevant information, translations & conversions for any word or value you click on
  2508. [back updates]
  2509. Filename=Uninstall.log.vbs
  2510. Confirmed=X
  2511. Description=Added by the <a href="http://www.symantec.com/avcenter/venc/data/vbs.ypsan.d@mm.html" target=_blank>YPSAN.D</a> WORM!
  2512. [backdoor.nuagent]
  2513. Filename=agent.exe
  2514. Confirmed=X
  2515. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojagentdp.html" target=_blank>AGENT-DP</a> TROJAN!
  2516. [background intelligent transfer service]
  2517. Filename=rundll32.exe
  2518. Confirmed=X
  2519. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojvbzd.html" target=_blank>VB-ZD</a> TROJAN! Note - this file is located in the C:\Windows\help folder, and is not to be confused with the legitimate <a href="http://www.liutilities.com/products/wintaskspro/processlibrary/rundll32/" target=_blank>rundll32.exe</a> file!
  2520. [backgroundswitcher]
  2521. Filename=bgswitch.exe
  2522. Confirmed=U
  2523. Description=Background Switcher Powertoy. Included with the last beta version of the XP Powertoys. Whenever a user right clicked his desktop and chose properties he could see a new tab which allowed him to enable a "Desktop Slide Show." This would automatically change the Windows Desktop at an interval specified by the user. Available <a href="http://shellcity.net/content4.htm" target="_blank">here</a>
  2524. [backpack udf]
  2525. Filename=bpudfmon.exe
  2526. Confirmed=N
  2527. Description=<a href="http://www.nero.com/" target="_blank">Backpack UDF</a> packet writing software for Microssolutions' Back Pack external CD-RW drive. Similar to DirectCD. Run manually before insert an appropriately formatted CD-RW disk
  2528. [backup service]
  2529. Filename=backup.svc
  2530. Confirmed=X
  2531. Description=Unidentified adware
  2532. [backupexecscheduler]
  2533. Filename=besch.exe
  2534. Confirmed=U
  2535. Description=Veritas "Back Up My PC" software
  2536. [backupnotify]
  2537. Filename=backupnotify.exe
  2538. Confirmed=?
  2539. Description=HP Digital Imaging related. <font color="#FF0000">What does it do and is it required?</font>
  2540. [backweb]
  2541. Filename=backweb.exe
  2542. Confirmed=N
  2543. Description=Automatically detects an internet connection and downloads any available updates. Typical on Compaq and HP PC's but not restricted to those OEM's. Resource hog and often causes malfunctions. Available via Start -> Programs
  2544. [backwork]
  2545. Filename=Backwork.exe
  2546. Confirmed=N
  2547. Description=<a href="http://www.framework.nl/backwork/eng/index.html" target="_blank">Backwork</a> trojan detector
  2548. [bacpi10]
  2549. Filename=bacpi10a.exe
  2550. Confirmed=U
  2551. Description=Known as "PowerKey" - a minimalistic keyboard driver that allows power management keys on BTC keyboards to function properly in older OS's (i.e. Win95/98/NT4). Also adds an icon to the system tray
  2552. [bacstray]
  2553. Filename=BacsTray.exe
  2554. Confirmed=N
  2555. Description=Broadcom Advanced Control Suite - for modems and set top boxes based upon Broadcom chipsets. Not required unless you have networking problems
  2556. [baddate]
  2557. Filename=BADDATE.EXE
  2558. Confirmed=X
  2559. Description=Added by an unidentified VIRUS, WORM or TROJAN!
  2560. [bagleav]
  2561. Filename=csrss.exe
  2562. Confirmed=X
  2563. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.netsky.ab@mm.html" target=_blank>NETSKY.AB</a> WORM! Note - this is not the legitimate <a href="http://www.liutilities.com/products/wintaskspro/processlibrary/csrss/" target=_blank>csrss.exe</a> process which is always located in the System (9x/Me) or System32 (NT/2K/XP) folder and should not normally figure in Msconfig/Startup! This file is located in the Windows or Winnt folder
  2564. [bakra]
  2565. Filename=IEHost.EXE
  2566. Confirmed=X
  2567. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojmultidrah.html" target=_blank>MULTIDR-AH</a> TROJAN!
  2568. [band-aid]
  2569. Filename=[path to file]
  2570. Confirmed=X
  2571. Description=Added by the <a href="http://www.symantec.com/avcenter/venc/data/backdoor.ranky.o.html" target=_blank>RANKY.O</a> TROJAN!
  2572. [bandook]
  2573. Filename=ali.exe
  2574. Confirmed=X
  2575. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojexemasb.html" target=_blank>EXEMAS-B</a> TROJAN!
  2576. [banpopup by pratik]
  2577. Filename=Banpopup.exe
  2578. Confirmed=U
  2579. Description=<a href="http://www33.brinkster.com/banpopup/" target="_blank">Banpopup</a> - popup killer
  2580. [bar ding lolt]
  2581. Filename=Analiz.exe
  2582. Confirmed=X
  2583. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotrp.html" target=_blank>RBOT-RP</a> WORM!
  2584. [bartheme]
  2585. Filename=bartent32.exe
  2586. Confirmed=X
  2587. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32agobotug.html" target=_blank>AGOBOT-UG</a> WORM!
  2588. [bascstray]
  2589. Filename=BascsTray.exe
  2590. Confirmed=N
  2591. Description=Broadcom Advanced Control Suite - for modems and set top boxes based upon Broadcom chipsets. Not required unless you have networking problems
  2592. [bat]
  2593. Filename=secure2.bat
  2594. Confirmed=X
  2595. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.irc.zcrew.c.html" target="_blank">ZCREW.C</a> TROJAN!
  2596. [batchreg1]
  2597. Filename=N/A
  2598. Confirmed=N
  2599. Description=Part of the Windows System Recovery process. Added to the registry via Msbatch.inf. The existence of this key or process after the last reboot during installation indicates an unsuccessful installation, as that key should be deleted automatically. See <a href="http://www.vanwijk.com/-=%20Bookz%20=-/Special%20Edition%20Using%20Windows%2098/ch10/ch10.htm#Heading24" target="_blank">here</a>
  2600. [batinfex]
  2601. Filename=rundll32.exe
  2602. Confirmed=U
  2603. Description=Displays battery status information on an IBM Thinkpad
  2604. [batsrv]
  2605. Filename=batserv2.exe
  2606. Confirmed=X
  2607. Description=Detected as Win32.Locksky.m WORM by Kaspersky Anti-Virus!
  2608. [battery scope]
  2609. Filename=batmgr.exe
  2610. Confirmed=U
  2611. Description=Monitors battery levels on a notebook/laptop PC
  2612. [batterybar]
  2613. Filename=batterybar.exe
  2614. Confirmed=U
  2615. Description=<a href="http://www.nistech.com/BatteryBar/Default.htm" target="_blank">BatteryBar</a> - displays battery usage, and the current percentage of battery power left
  2616. [batzback]
  2617. Filename=BatzBack.scr
  2618. Confirmed=X
  2619. Description=Added by the <a href="http://www.symantec.com/avcenter/venc/data/w32.backzat.worm.html" target="_blank">BACKZAT</a> WORM!
  2620. [bausb]
  2621. Filename=BAUSB.exe
  2622. Confirmed=U
  2623. Description=Boston Acoustics Audio, USB driver
  2624. [bawindo]
  2625. Filename=bawindo.exe
  2626. Confirmed=X
  2627. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.beagle.ar@mm.html" target="_blank">BEAGLE.AR</a> or <a href="http://www.symantec.com/avcenter/venc/data/w32.beagle.au@mm.html" target=_blank>BEAGLE.AU</a> WORMS!
  2628. [baymgr]
  2629. Filename=DockApp.exe
  2630. Confirmed=U
  2631. Description=Hot-swappable drive management on laptops allowing you to change drives without closing down Windows. Only required if you frequently swap bay devices 
  2632. [bayswap]
  2633. Filename=bayswap.exe
  2634. Confirmed=U
  2635. Description=Hot-swappable drive management on Compaq Notebooks which allows you to swap drives without closing down Windows. Only required if you frequently swap bay devices
  2636. [bayswap2]
  2637. Filename=TbUpdate.exe
  2638. Confirmed=U
  2639. Description=Hot-swappable drive management on Compaq Notebooks which allows you to swap drives without closing down Windows. Only required if you frequently swap bay devices
  2640. [bbc news alerts]
  2641. Filename=skinkers.exe
  2642. Confirmed=U
  2643. Description=BBC News Desktop Alerts service - see <a href="http://news.bbc.co.uk/2/hi/help/3533099.stm" target= blank>here</a>. Desktop alert and breaking news e-mail services let you find out about all the latest news as it happens
  2644. [bbdial]
  2645. Filename=BT Broadband.exe
  2646. Confirmed=?
  2647. Description=<font color="#FF0000">Part of BT Broandband - is it required?</font>
  2648. [bbsystray]
  2649. Filename=bbSysTray.exe
  2650. Confirmed=N
  2651. Description=Philips CD-RW related - "the 'Blue Button' feature gives users the chance to receive convenient online support for their possible device problems or questions"
  2652. [bbui]
  2653. Filename=bbui.exe
  2654. Confirmed=U
  2655. Description=AOL DSL status monitor displaying a red/green icon indicating if you have a connection
  2656. [bca]
  2657. Filename=bca.exe
  2658. Confirmed=U
  2659. Description=BeClean Agent - registry, history, temp files, etc cleaner
  2660. [bcdetect]
  2661. Filename=bcdetect.exe
  2662. Confirmed=U
  2663. Description=Bcdetect.exe searches the system to make sure Creative drivers are installed for the video card. It loads the BlasterControl when the drivers are detected. Your choice - try it and see
  2664. [bcmdmmsg]
  2665. Filename=bcmdmmsg.exe
  2666. Confirmed=Y
  2667. Description=BCM voicemodem driver. Required for dial-up if you have one of these modems
  2668. [bcmhal]
  2669. Filename=rundll32.exe bcmhal9x.dll, bcinit
  2670. Confirmed=U
  2671. Description=BlasterControl for Creative video cards - controls for desktop settings, monitor configuration, colour adjustments and performance tuning. May be needed to retain settings
  2672. [bcmsmmsg]
  2673. Filename=BCMSMMSG.exe
  2674. Confirmed=Y
  2675. Description=BCM voicemodem driver. Required for dial-up if you have one of these modems
  2676. [bcmwltry]
  2677. Filename=bcmwltry.exe
  2678. Confirmed=?
  2679. Description=Broadcom Corporation Wireless Network Tray Applet.<font color="#FF0000"> </font><font color="#FF0000">Is it required?</font>
  2680. [bcnt]
  2681. Filename=bcnt.exe
  2682. Confirmed=N
  2683. Description=<a href="http://www.weatherbug.com/aws/index.asp" target="_blank">AWS Weatherbug</a> related. <font color="#FF0000">What does it do?</font>
  2684. [bcpc]
  2685. Filename=bcpc.exe
  2686. Confirmed=X
  2687. Description=<a href="http://sarc.com/avcenter/venc/data/adware.broadcastpc.b.html" target="_blank">BroadcastPC</a> adware variant
  2688. [bcpc_c]
  2689. Filename=bcpc_c.exe
  2690. Confirmed=X
  2691. Description=<a href="http://sarc.com/avcenter/venc/data/adware.broadcastpc.b.html" target="_blank">BroadcastPC</a> adware variant
  2692. [bctweak]
  2693. Filename=bctweak.exe
  2694. Confirmed=U
  2695. Description=BlasterControl for Creative video cards - controls for desktop settings, monitor configuration, colour adjustments and performance tuning. May be needed to retain settings
  2696. [bcvsrv32]
  2697. Filename=bcvsrv32.exe
  2698. Confirmed=N
  2699. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.gaobot.bqj.html" target=_blank>GAOBOT.BQJ</a> WORM!
  2700. [bcwipetm]
  2701. Filename=bcwipetm.exe
  2702. Confirmed=N
  2703. Description=<a href="http://www.jetico.com/" target="_blank">BCWipe</a> Task Manager - scheduler for BCWipe so that it runs at convenient times. You can set a time for running the task, as well as special options for the task. Run manually when needed
  2704. [bd]
  2705. Filename=dc.exe
  2706. Confirmed=X
  2707. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojrasdoora.html" target=_blank>RASDOOR-A</a> TROJAN!
  2708. [bdmcon]
  2709. Filename=Bdmcon.exe
  2710. Confirmed=Y
  2711. Description=<a href="http://www.bitdefender.com/press/ref100203.php" target="_blank">BitDefender</a> antivirus
  2712. [bdnewsagent]
  2713. Filename=bdnagent.exe
  2714. Confirmed=Y
  2715. Description=<a href="http://www.bitdefender.com/" target="_blank">BitDefender</a> antivirus - updater
  2716. [bdoesrv]
  2717. Filename=bdoesrv.exe
  2718. Confirmed=Y
  2719. Description=<a href="http://www.bitdefender.com/bd/site/products.php?p_id=25" target="_blank">Bitdefender</a> 8 antivirus and firewall
  2720. [bdswitchagent]
  2721. Filename=bdswitch.exe
  2722. Confirmed=Y
  2723. Description=<a href="http://www.bitdefender.com/bd/site/products.php?p_id=25" target="_blank">Bitdefender</a> 8 antivirus and firewall
  2724. [bearshare]
  2725. Filename=bearshare.exe
  2726. Confirmed=N
  2727. Description=<a href="http://www.bearshare.com/" target="_blank">BearShare</a> file sharing client. Versions known to include spyware - see <a href="http://www.cexx.org/adware.htm" target="_blank">here</a>
  2728. [beatnik internet clock]
  2729. Filename=BeatNik.exe
  2730. Confirmed=U
  2731. Description=<a href="http://www.somedec.com/" target=_blank>BeatNik Internet Clock</a> is a Windows clock add-on that supports 'skins'. It can also synchronize your computer's clock with an atomic clock
  2732. [beegees update]
  2733. Filename=beegees.exe
  2734. Confirmed=X
  2735. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32sdbotadk.html" target=_blank>SDBOT-ADK</a> WORM!
  2736. [beei]
  2737. Filename=beei.exe
  2738. Confirmed=?
  2739. Description=<font color="#FF0000">??</font>
  2740. [befaster]
  2741. Filename=befaster3.exe
  2742. Confirmed=U
  2743. Description=<a href="http://www.ekremdeniz.com/" target= blank>BeFaster</a> internet connection optimization tool
  2744. [behl]
  2745. Filename=BEHL.exe
  2746. Confirmed=?
  2747. Description=<font color="#FF0000">??</font>
  2748. [behlo]
  2749. Filename=BEHLO.exe
  2750. Confirmed=?
  2751. Description=<font color="#FF0000">??</font>
  2752. [belkin pcmcia wlan monitor]
  2753. Filename=monitorbk.exe
  2754. Confirmed=N
  2755. Description=Belkin USB Network Adapter Management utility - can be started manually
  2756. [belnotify]
  2757. Filename=[path] NPBelv32.dll, RunDll32_BelNotify
  2758. Confirmed=U
  2759. Description=<a href="http://www.belarc.com/BelTech.html" target=_blank>BelTech</a> enables licensees to offer automated, Web-based problem resolution to their end-users. BelTech allows the end-user to simply go to a web page and automatically resolve their problem or point them to the right solution. BelTech Manager allows non-programmers to rapidly and easily deploy and maintain this service
  2760. [belorvbi]
  2761. Filename=BELORVBI.exe
  2762. Confirmed=?
  2763. Description=<font color="#FF0000">??</font>
  2764. [belsta.exe]
  2765. Filename=Belsta.exe
  2766. Confirmed=?
  2767. Description=Configuration tool for Belkin wireless network cards. Required to change the cardÆs configuration.<font color="#FF0000"> Is it required for correct operation once the confuiguration is changed?</font>
  2768. [belt]
  2769. Filename=Belt.exe
  2770. Confirmed=X
  2771. Description=<a href="http://research.sunbelt-software.com/threat_display.cfm?name=VX2.Transponder&threatid=12517&search=vx2" target=_blank>VX2.Transponder</a> parasite updater/installer related
  2772. [benadril alert tool]
  2773. Filename=benadrilalert.exe
  2774. Confirmed=X
  2775. Description=Plug-in for WeatherBug advising when pollen count in your area is high - prompting you to buy Benadril
  2776. [bestpopupkiller]
  2777. Filename=BestPopupKiller.exe
  2778. Confirmed=N
  2779. Description=Popup killer by Swanksoft - not recommended, see <a href="http://www.spywarewarrior.com/rogue_anti-spyware.htm" target="_blank">here</a>
  2780. [besys]
  2781. Filename=[path to file]
  2782. Confirmed=X
  2783. Description=Added by <a href="http://securityresponse.symantec.com/avcenter/venc/data/adware.besys.html" target=_blank>BeSys</a> ADWARE!
  2784. [bg]
  2785. Filename=bullguard.exe
  2786. Confirmed=Y
  2787. Description=<a href="http://www.bullguard.com/" target="_blank">Bullguard</a> antivirus and firewall. The P2P version is free with KaZaA Media Desktop and Grokster
  2788. [bginfo]
  2789. Filename=Bginfo.exe
  2790. Confirmed=U
  2791. Description=<a href="http://www.sysinternals.com/ntw2k/freeware/bginfo.shtml" target="_blank">BGinfo</a> automatically displays relevant information about a Windows computer on the desktop's background, such as the computer name, IP address, service pack version, and more
  2792. [bgmonitor_{79662e04-7c6c-4d9f-84c7-88d8a56b10aa}]
  2793. Filename=NMBgMonitor.exe
  2794. Confirmed=U
  2795. Description=Related to <a href="http://ww2.nero.com/enu/index.html" target=_blank>Nero Home</a>
  2796. [bgnewsagent]
  2797. Filename=bgnewsag.exe
  2798. Confirmed=Y
  2799. Description=<a href="http://www.bullguard.com/" target=_blank>BullGuard</a> antivirus updater
  2800. [bgsmsnd]
  2801. Filename=bgsmsnd.exe
  2802. Confirmed=N
  2803. Description=Printer driver to generate PDF files from any program
  2804. [bhocop]
  2805. Filename=BHOCop.exe
  2806. Confirmed=N
  2807. Description=ZDNet's <a href="http://www.zdnet.com/products/stories/reviews/0,4161,2760348-9,00.html" target="_blank">BHO Cop</a> that lets you see what browser helper objects are installed. Useful for detecting spyware
  2808. [bhodemon 2.0]
  2809. Filename=BHODemon.exe
  2810. Confirmed=U
  2811. Description=BHODemon "protects you from unknown Browser Helper Objects (BHOs), by letting you enable/disable them individually. When running, it also monitors your Registry and alerts you when a BHO is installed. Best of all, BHODemon knows about the most common BHOs - the good ones, and the not-so-good ones!". If you prefer forgoing resident protection, the application can also be run on demand
  2812. [bi1helperstartup]
  2813. Filename=BI1HEL~1.EXE
  2814. Confirmed=U
  2815. Description=ScreenScenes <a href="http://www.screenscenes.com/product.html?screensaver=BeachIslands" target=_blank>Beach Islands</a> screensaver. The freeware version comes with <a href="http://www.cexx.org/gator.htm" target=_blank>Gator</a> branded ads (pop-ups and others). ScreenScenes do however offer you the option of doing away with the ads by purchasing the screensaver for a whopping $ 30...
  2816. [bie]
  2817. Filename=Rundll32.exe BDSrHook.dll, Rundll32
  2818. Confirmed=X
  2819. Description=<a href="http://www.pestpatrol.com/PestInfo/b/bdplugin.asp" target="_blank">BDplugin</a> parasite
  2820. [bigfix]
  2821. Filename=BIGFIX.EXE
  2822. Confirmed=N
  2823. Description=<a href="http://www.bigfix.com/website/index.html" target="_blank">BigFix</a> can automatically download and read technical support information provided by computer and software manufacturers and other technical support experts (published in the form of Fixlet?Messages) and can automatically check your computer for bugs, configuration conflicts, and security holes. Should only be started manually as it's a resource hog
  2824. [bigpond toolbar]
  2825. Filename=bpumTray.exe
  2826. Confirmed=U
  2827. Description=<a href="http://www.bigpond.com/helpcentre/toolbar/" target="_blank">Telstra BigPond Toolbar</a> - "Introducing the free and easy to use BigPond Toolbar that is designed to make your internet experience and managing your Telstra internet account a whole lot easier"
  2828. [bigpondcable]
  2829. Filename=bpcable.exe
  2830. Confirmed=N
  2831. Description=Telstra Bigpond Cable login software - can be started manually
  2832. [billminder]
  2833. Filename=Billmind.exe
  2834. Confirmed=N
  2835. Description=Can be setup in Quicken to remind user of due payments. Available via Start -> Programs
  2836. [bin32hpu]
  2837. Filename=ppstub.exe
  2838. Confirmed=X
  2839. Description=<a href="http://precisionpop.com/" target="_blank">PrecisionPop</a> adware
  2840. [bingdian]
  2841. Filename=Bingdian.vbs
  2842. Confirmed=X
  2843. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/vbs.bingd@mm.html" target="_blank">BINGD</a> WORM!
  2844. [bios]
  2845. Filename=Bios32.exe
  2846. Confirmed=X
  2847. Description=Added by an unidentified VIRUS, WORM or TROJAN!
  2848. [bios xp loader]
  2849. Filename=[random filename]
  2850. Confirmed=X
  2851. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotic.html" target=_blank>RBOT-IC</a> WORM!
  2852. [bios1]
  2853. Filename=BIOS1.EXE
  2854. Confirmed=X
  2855. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_OPASERV.T" target="_blank">OPASERV.T</a> WORM!
  2856. [biovcip]
  2857. Filename=BIOVCIP.exe
  2858. Confirmed=?
  2859. Description=<font color="#FF0000">??</font>
  2860. [bitcomet]
  2861. Filename=BitComet.exe
  2862. Confirmed=N
  2863. Description=<a href="http://www.bitcomet.com/index.htm" target=_blank>BitComet</a> P2P client - can be launched from Start -> Programs
  2864. [bitdefender antivirus]
  2865. Filename=BITDEFENDERX.EXE
  2866. Confirmed=X
  2867. Description=Added by a variant of the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.spybot.worm.html" target=_blank>SPYBOT</a> WORM!
  2868. [bitdefender communicator]
  2869. Filename=xcommsvr.exe
  2870. Confirmed=Y
  2871. Description=<a href="http://www.bitdefender.com/press/ref100203.php" target="_blank">BitDefender</a> antivirus
  2872. [bitdefender for msn messenger]
  2873. Filename=msnmon.exe
  2874. Confirmed=U
  2875. Description=<a href="http://www.bitdefender.com/html/bd_msn_messenger.php" target="_blank">Bitdefender</a> anti-virus for MSN Messenger. Unless you have MSN Messenger running all the time start it manually
  2876. [bitdefender for yahoo! messenger]
  2877. Filename=yahmon.exe
  2878. Confirmed=U
  2879. Description=<a href="http://www.bitdefender.com/bd/site/products.php?p_id=18" target="_blank">BitDefender Antivirus for Yahoo! Messenger</a> - free AV add-on for Yahoo! Messenger
  2880. [bitdefender live! init]
  2881. Filename=bdinit.exe
  2882. Confirmed=Y
  2883. Description=<a href="http://www.bitdefender.com/press/ref100203.php" target="_blank">BitDefender</a> antivirus
  2884. [bitdefender scan server]
  2885. Filename=bdss.exe
  2886. Confirmed=Y
  2887. Description=<a href="http://www.bitdefender.com/press/ref100203.php" target="_blank">BitDefender</a> antivirus
  2888. [bitdefender virus shield]
  2889. Filename=vsserv.exe
  2890. Confirmed=Y
  2891. Description=<a href="http://www.bitdefender.com/" target="_blank">BitDefender</a> antivirus
  2892. [bitdefenderlive]
  2893. Filename=avxlive.exe
  2894. Confirmed=Y
  2895. Description=Main program of <a href="http://www.bitdefender.com/" target="_blank">BitDefender</a> virus scanner/firewall
  2896. [bitdefender_p2p_startup]
  2897. Filename=BitDefender_P2P_Startup.exe
  2898. Confirmed=U
  2899. Description=<a href="http://www.bitdefender.com/html/bd_msn_messenger.php" target="_blank">Bitdefender</a> anti-virus for file transfers via internet messaging clients such as ICQ and MSN Messenger. Unless you have these running all the time start it manually
  2900. [bitware print monitor]
  2901. Filename=bwprnmon.exe
  2902. Confirmed=N
  2903. Description=<a href="http://www.accpac.com/products/communication/faxserve/" target="_blank">FaxServe</a> network fax software
  2904. [bj printer status monitor]
  2905. Filename=Cjstsr.exe
  2906. Confirmed=N
  2907. Description=Canon BJ printer status monitor
  2908. [bj status monitor 5xx]
  2909. Filename=CJSTRxx.EXE
  2910. Confirmed=N
  2911. Description=Canon printer status monitor - where "xx" is different depending upon the version. Not required as you can check the printer status via My Computer -> Printers
  2912. [bjcfd]
  2913. Filename=cdf.exe
  2914. Confirmed=N
  2915. Description=<a href="http://www.broadjump.com/" target="_blank">BroadJump</a> Client Foundation. Broadband troubleshooting software installed by various companies. Not required and you can remove it via Add/Remove programs
  2916. [blackice pc protection]
  2917. Filename=blackice.exe
  2918. Confirmed=N
  2919. Description=Loads the user interface for the <a href="http://blackice.iss.net/product_pc_protection.php" target="_blank">BlackICE PC Protection</a> (was Defender) firewall program. From the <a href="http://www.networkice.com/" target="_blank">parent site</a> - '(the user interface) starts in the "Startup" menu and adds itself to the taskbar. The user interface is independent from the rest of the system and only displays the output or reconfigures the system. It does not need to be running for the rest of the system to run.' See also LoadBlackD
  2920. [blackice utility]
  2921. Filename=blackice.exe
  2922. Confirmed=N
  2923. Description=Loads the user interface for the <a href="http://blackice.iss.net/product_pc_protection.php" target="_blank">BlackICE PC Protection</a> (was Defender) firewall program. From the <a href="http://www.networkice.com/" target="_blank">parent site</a> - '(the user interface) starts in the "Startup" menu and adds itself to the taskbar. The user interface is independent from the rest of the system and only displays the output or reconfigures the system. It does not need to be running for the rest of the system to run.' See also LoadBlackD
  2924. [blads]
  2925. Filename=blads.exe
  2926. Confirmed=U
  2927. Description=A <a href="http://www.totalidea.com/frameset-tweakxp.htm" target=_blank>Tweak-XP</a> component, blocks advertisement banners in Internet Explorer. Can be enabled/disabled via Tweak-XP / Internet Tweaks
  2928. [blahh service]
  2929. Filename=msengine.exe
  2930. Confirmed=X
  2931. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target= blank>RBOT</a> WORM!
  2932. [blahx service]
  2933. Filename=msnjompa.exe
  2934. Confirmed=X
  2935. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_SDBOT.AML" target=_blank>SDBOT.AML</a> WORM!
  2936. [blazechanger]
  2937. Filename=FBZPaper.exe
  2938. Confirmed=N
  2939. Description=<a href="http://www.firehand.com/Ember/" target="_blank">Ember</a> graphic file viewer, manager, and touch-up system
  2940. [bldbubg]
  2941. Filename=bldbubg.exe
  2942. Confirmed=N
  2943. Description=Part of Dell Alerts which provides customers with an update on latest updates for his/her system
  2944. [blinkx]
  2945. Filename=blinkx.exe
  2946. Confirmed=U
  2947. Description=<a href="http://www.blinkx.com/overview.php" target=_blank>Blinkx Desktop</a> "Smart Folders" software
  2948. [blmessagingintegration]
  2949. Filename=blengine.exe
  2950. Confirmed=X
  2951. Description=<a href="http://us.mcafee.com/virusInfo/default.asp?id=description&virus_k=101007" target="_blank">BuddyLinks</a> adware
  2952. [blockads]
  2953. Filename=blads.exe
  2954. Confirmed=U
  2955. Description=A <a href="http://www.totalidea.com/frameset-tweakxp.htm" target=_blank>Tweak-XP</a> component, blocks advertisement banners in Internet Explorer. Can be enabled/disabled via Tweak-XP / Internet Tweaks
  2956. [blockchecker]
  2957. Filename=Block-checker.exe
  2958. Confirmed=X
  2959. Description=<a href="http://www.symantec.com/avcenter/venc/data/adware.blockchecker.html" target=_blank>BlockChecker</a> adware
  2960. [blocker system611 monitoring]
  2961. Filename=PopUpBlocker611.exe
  2962. Confirmed=X
  2963. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_RBOT.BLJ&VSect=P" target=_blank>RBOT.BLJ</a> WORM!
  2964. [blocktracker]
  2965. Filename=BlockTracker.exe
  2966. Confirmed=N
  2967. Description=If present on a HP machine it tracks all the processes and logs them to a blocklog.txt file
  2968. [blsloader]
  2969. Filename=blsloader.exe
  2970. Confirmed=U
  2971. Description=BellSouth ISP <a href="https://www.fastaccess.com/content/consumer/features.jsp" target=_blank>Internet Tools</a>
  2972. [blss]
  2973. Filename=blss.exe
  2974. Confirmed=X
  2975. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.blarul.html" target=_blank>BLARUL</a> TROJAN!
  2976. [blstapp]
  2977. Filename=blstapp.exe
  2978. Confirmed=N
  2979. Description=Puts access to Creative's BlasterControl in the System Tray
  2980. [blubster]
  2981. Filename=Blubster.exe
  2982. Confirmed=N
  2983. Description=Related to <a href="http://www.blubster.com/" target=_blank>Blubster</a> Music sharing service
  2984. [bluespace ne]
  2985. Filename=BlueSpaceNE.exe
  2986. Confirmed=U
  2987. Description="BlueSpace NE is a utility program used to run the Bluetooth?function on VAIO computers that support the Bluetooth function or on VAIO computers connected to the Bluetooth USB adapter". Shortcut available via Start -> Programs
  2988. [bluetoothauthentication agent]
  2989. Filename=RunDLL32.exe irprops.cpl, BluetoothAuthenticationAgent
  2990. Confirmed=U
  2991. Description=Associated with BlueTooth software, designed to allow bluetooth mobile devices to authenticate to the computer, when connecting a PDA to your computer - necessary for the computer and the PDA to communicate. Should you get the error message, "Rundll irprops.cpl missing entry Bluetooth authentication agent", click <a href="http://www.winbookcorp.com/_technote/WBTA20000912.htm" target=_blank>here</a> for more information. In case you no longer have BlueTooth support installed, and don't need it, simply uncheck the entry in Msconfig > Startup
  2992. [blueyonder instant support tool]
  2993. Filename=matcli.exe
  2994. Confirmed=U
  2995. Description="matcli.exe is a motive Assistant Command line interface that gathers information about your system\'s identity like your name email address, city, state, etc and gets written to a log file". Blueyonder Instant Support is required to run with the Help and Support program. If you uncheck it and and then run Help and Support it will add another Blueyonder Instant Support in the startup menu. If you remove Blueyonder Instant Support in add/remove programs some help menus in help and support will not be available. You decide
  2996. [bmail installation]
  2997. Filename=FTP_back.exe
  2998. Confirmed=N
  2999. Description=Part of <a href="http://www.imesh.com" target="_blank">iMesh</a> - a file sharing system. Reported by Norton AntiVirus as a trojan. Once deleted does not prevent file sharing working. Older versions of iMesh re-instate this but the newer versions do not
  3000. [bman]
  3001. Filename=BMan1.exe
  3002. Confirmed=X
  3003. Description=Abcsearch.com/DealHelper adware variant
  3004. [bmmgag]
  3005. Filename=Rundll32 PWRMONIT.DLL, StartPwrMonitor
  3006. Confirmed=U
  3007. Description=Displays a battery gauge icon in the Taskbar (not the System Tray). Provides shortcuts to IBM's proprietary power saving settings and to a battery information window
  3008. [bmmlref]
  3009. Filename=BMMLREF.EXE
  3010. Confirmed=U
  3011. Description=Battery Manager for IBM ThinkPad laptops
  3012. [bmmmonwnd]
  3013. Filename=rundll32.exe [path] BatInfEx.dll, BMMAutonomicMonitor
  3014. Confirmed=?
  3015. Description=IBM Thinkpad related. <font color="#FF0000">What does it do and is it required?</font>
  3016. [bmo mastercard wallet]
  3017. Filename=EWALLET.EXE
  3018. Confirmed=U
  3019. Description=The wallet conveniently stores billing, shipping and payment information on your PC
  3020. [bmupdate]
  3021. Filename=BMupdate.exe
  3022. Confirmed=N
  3023. Description=Related to the BookmarkCentral entry. Typically added after downloading drivers for Visioneer scanners for example, and you install the driver self-install
  3024. [bmz]
  3025. Filename=bmz.exe
  3026. Confirmed=X
  3027. Description=<a href="http://research.sunbelt-software.com/threat_display.cfm?name=NCase&threatid=8869&search=ncase" target=_blank>nCase</a> adware
  3028. [bndt32]
  3029. Filename=Bndt32.exe
  3030. Confirmed=X
  3031. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.hllw.lacon@mm.html" target="_blank">LACON</a> WORM!
  3032. [bnexe]
  3033. Filename=[random filename]
  3034. Confirmed=X
  3035. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.kitro.d.worm.html" target="_blank"> KITRO.D</a> (or <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_ARGEN.A&VSect=T" target="_blank">ARGEN.A</a>) WORM!
  3036. [bo1helperstartup]
  3037. Filename=BO1HEL~1.EXE
  3038. Confirmed=U
  3039. Description=ScreenScenes <a href="http://www.screenscenes.com/product.html?screensaver=ButterflyOasis" target=_blank>Butterfly Oasis</a> screensaver. The freeware version comes with <a href="http://www.cexx.org/gator.htm" target=_blank>GAIN</a> branded ads (pop-ups and others). ScreenScenes do however offer you the option of doing away with the ads by purchasing the screensaver for a whopping $30...
  3040. [boarddata]
  3041. Filename=[path] repcale.exe [path] palsp.exe
  3042. Confirmed=X
  3043. Description=Added by a variant of the <a href="http://uk.trendmicro-europe.com/enterprise/security_info/ve_detail.php?Vname=WORM_RANDON.AN" target=_blank>RANDON.AN</a> WORM!
  3044. [boc412]
  3045. Filename=BOC412.exe
  3046. Confirmed=Y
  3047. Description=Version 4.12 of NSClean's <a href="http://www.nsclean.com/boclean.html" target=_blank>BOClean</a> anti-trojan software
  3048. [bocleanautostart]
  3049. Filename=Boclean.exe
  3050. Confirmed=Y
  3051. Description=NSClean's <a href="http://www.nsclean.com/boclean.html" target="_blank">BOClean</a> anti-trojan software
  3052. [boingo wireless utility]
  3053. Filename=Icon###XXX#X#.exe
  3054. Confirmed=U
  3055. Description=Starts the Boingo Wireless utility, used to detect and login into <a href="http://www.boingo.com/" target=blank>Boingo</a> wireless hotspots. The filename may be autogenerated when installing, two different variations along the lines listed here, where # is a number and X is a letter. Shortcut available via Start -> Programs
  3056. [boler.exe]
  3057. Filename=syser.exe
  3058. Confirmed=X
  3059. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotays.html" target=_blank>RBOT-AYS</a> WORM!
  3060. [bombshel]
  3061. Filename=BOMB32.EXE
  3062. Confirmed=U
  3063. Description=Part of McAfee Nuts & Bolts. Protects your Windows system from application failure and crashes - similar to Norton Crashguard. Your choice - may cause problems
  3064. [bonzi buddy]
  3065. Filename=??
  3066. Confirmed=X
  3067. Description=Spyware - read <a href="http://www.safersite.com/pestinfo/B/BonziBuddy_Adware.asp" target="_blank">here</a> for information and <a href="http://www.pchell.com/support/bonzibuddy.shtml" target="_blank">here</a> for removal instructions
  3068. [boo]
  3069. Filename=boo.exe
  3070. Confirmed=X
  3071. Description=Adware downloader - detected by <a href="http://www.kaspersky.com/personalpro" target=_blank>Kaspersky</a> antivirus as the FAVADD.O TROJAN!
  3072. [bookedspace]
  3073. Filename=bs2.dll,DllRun
  3074. Confirmed=X
  3075. Description=<a href="http://research.sunbelt-software.com/threat_display.cfm?name=BookedSpace&threatid=3275&search=Remanent" target=_blank>Bookspace/Remanent</a> parasite
  3076. [bookmarkcentral]
  3077. Filename=BMLauncher.exe
  3078. Confirmed=N
  3079. Description=<a href="http://www.bookmarkexpress.com/" target="_blank">Bookmark Express</a> - "offers a more flexible way to manage Web site bookmarks, regardless of which browser you use"
  3080. [bookmarksink]
  3081. Filename=syncit.exe
  3082. Confirmed=N
  3083. Description=Bookmark synchronization utility
  3084. [bookmarksync]
  3085. Filename=syncit.exe
  3086. Confirmed=N
  3087. Description=<a href="http://www.sync2it.com/" target=_blank>Sync2IT BookMarkSync</a> - "real-time automatic synchronization service that allows you to access your bookmarks, favorites and favorite files from any computer or any browser". Only installed with the users explicit permission and generally only remains running if the user decides to subscribe to the service. If it is no longer required it should be uninstalled to prevent a large number of clients æchecking in?to the server that have no chance of synchronizing
  3088. [bookmarksync2it]
  3089. Filename=sync2it.exe
  3090. Confirmed=N
  3091. Description=<a href="http://www.sync2it.com/" target=_blank>Sync2IT BookMarkSync</a> - "real-time automatic synchronization service that allows you to access your bookmarks, favorites and favorite files from any computer or any browser". Only installed with the users explicit permission and generally only remains running if the user decides to subscribe to the service. If it is no longer required it should be uninstalled to prevent a large number of clients æchecking in?to the server that have no chance of synchronizing
  3092. [boost xp service]
  3093. Filename=bxservice.exe
  3094. Confirmed=U
  3095. Description=<a href="http://www.systweak.com/boostxp/boostxp.htm" target="_blank">Boost XP</a> from Systweak - WinXP tweaking utility 
  3096. [boot]
  3097. Filename=boot.exe
  3098. Confirmed=X
  3099. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojpuppeta.html" target=_blank>PUPPET-A</a> TROJAN!
  3100. [bootcfg]
  3101. Filename=Install.log.vbs
  3102. Confirmed=X
  3103. Description=Added by the <a href="http://www.symantec.com/avcenter/venc/data/vbs.ypsan.d@mm.html" target=_blank>YPSAN.D</a> WORM!
  3104. [bootctrl]
  3105. Filename=bootctrl.exe
  3106. Confirmed=X
  3107. Description=Added by an unidentified WORM or TROJAN!
  3108. [bootloader]
  3109. Filename=BootLoader.exe.vbs
  3110. Confirmed=X
  3111. Description=Added by the <a href="http://www.symantec.com/avcenter/venc/data/vbs.waterworks.worm.html" target="_blank">WATERWORKS</a> WORM!
  3112. [bootpd.exe]
  3113. Filename=bootpd.exe
  3114. Confirmed=X
  3115. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojagentdt.html" target=_blank>AGENT-DT</a> TROJAN!
  3116. [bootstatus]
  3117. Filename=BOOTST~1.EXE
  3118. Confirmed=U
  3119. Description=Visual Basic program that pops up a small window on startup telling you how many times the machine has been booted that day.  Once you exit it, it has no more effect on resources
  3120. [bootwarn]
  3121. Filename=BootWarn.exe
  3122. Confirmed=U
  3123. Description=From <a href="http://www.answersthatwork.com/Tasklist_pages/tasklist_b.htm" target=_blank>here</a>: "Norton AntiVirus Boot Warning. This program is installed as a startup item when you install Norton AntiVirus, and also sometimes when you do a LiveUpdate which updates Norton AntiVirus significantly enough that a reboot is needed to complete the installation. We believe its purpose to be to warn the end-user that he must reboot his PC before using Norton AntiVirus in those cases when a reboot did not happen with the result that Norton AntiVirus did not fully complete its installation or software updating. Recommendation : Start Norton AntiVirus from ôStart \ Programs \ Norton AntiVirus? If Norton AntiVirus comes up without problems, then fix this entry from the Msconfig Startup tab ?it was left behind by mistake and is no longer needed now that Norton AntiVirus is fully installed and opens without error messages"
  3124. [boot_reg]
  3125. Filename=[path to file]
  3126. Confirmed=X
  3127. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojbancbanca.html" target=_blank>BANCBAN-CA</a> TROJAN!
  3128. [bose wave/pc monitor]
  3129. Filename=wavepcmonitor.exe
  3130. Confirmed=N
  3131. Description=System Tray access for this system (more info on the system <a href="http://www.bose.com/home_audio/interactive_systems/wave_pc/index.shtml" target="_blank">here</a>). Available via Start -> Programs
  3132. [bossidea]
  3133. Filename=winlogin.exe
  3134. Confirmed=X
  3135. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojlineagei.html" target= blank>LINEAGE-I</a> TROJAN!
  3136. [boston]
  3137. Filename=Boston.exe
  3138. Confirmed=?
  3139. Description=Part of the Boston Acoustics USB speaker systems. <font color="#FF0000">What does it do and is it required?</font>
  3140. [bot loader]
  3141. Filename=svchostt.exe
  3142. Confirmed=X
  3143. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.gaobot.alv.html" target=_blank>GAOBOT.ALV</a> WORM!
  3144. [boy lovers of bsd]
  3145. Filename=ilikeboys.exe
  3146. Confirmed=X
  3147. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_MYTOB.LY&VSect=P" target=_blank>MYTOB.LY</a> WORM!
  3148. [bpcpost.exe]
  3149. Filename=bpcpost.exe
  3150. Confirmed=U
  3151. Description=MS TV Viewer Post Setup Program. Part of MS WebTV for Windows. Used to display TV on your PC via a compatible video card with in-built tuner (such as ATI All-In-Wonder). If you don't use it - uninstall it
  3152. [bpcv2 re]
  3153. Filename=bpc2 re inst.exe
  3154. Confirmed=X
  3155. Description=<a href="http://sarc.com/avcenter/venc/data/adware.broadcastpc.b.html" target= blank>BroadcastPC</a> adware variant
  3156. [bpk]
  3157. Filename=bpk.exe
  3158. Confirmed=U
  3159. Description=Blazing Tools <a href="http://www.blazingtools.com/bpk.html" target="_blank"> Perfect Keylogger</a> (monitoring program). Given a "U" recommendation because it depends if you intentionally installed it. If you didn't treat it as "X" and uninstall or remove
  3160. [bpserver]
  3161. Filename=G6FTPSrv.exe
  3162. Confirmed=N
  3163. Description=<a href="http://www.bpftpserver.com/?page=home&lang=en" target="_blank">BulletProof FTP Server</a>
  3164. [bqtray.exe]
  3165. Filename=BQTray.exe
  3166. Confirmed=U
  3167. Description=System Tray access to <a href="http://www.burnquick.com/" target="_blank"> BurnQuick</a> CD burning software. Only required if you use the queueing facility, hence the U recommendation. Create your own desktop shortcut to start manually
  3168. [brasilold]
  3169. Filename=[worm filename]
  3170. Confirmed=X
  3171. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_OPASERV.P" target="_blank">OPASERV.P</a> WORM!
  3172. [brct]
  3173. Filename=trdb.exe
  3174. Confirmed=X
  3175. Description=Reported as PurityScan.y TROJAN! by Kaspersky Anti-Virus
  3176. [break_reminder]
  3177. Filename=BREAK REMINDER.exe
  3178. Confirmed=U
  3179. Description=Break Reminder - Remind yourself to take breaks to prevent computer related injuries. See <a href="http://www.cheqsoft.com/break.html" target="_blank">here</a>
  3180. [bridge]
  3181. Filename=rundll32.exe ...Bridge.dll
  3182. Confirmed=X
  3183. Description=Flingstone.com browser hijacker
  3184. [brindys britray]
  3185. Filename=BRITRAY.EXE
  3186. Confirmed=Y
  3187. Description=Main process for the following applications: GEDEX, SICARIO, BRINOTES, BRIRESPA, SICURE, TRASGO, UNDOCS, FRESH & BRIFAME (all of them from <a href="http://www.brindys.com/" target="_blank">Brindys Software</a>). Performs the following tasks [un]installation, web software autoupdate, notification windows, interprocess communication, tray bar icons & menus, alarms (brinotes), and common web launching from the mentioned applications. Can be stopped safely once run if so desired
  3188. [brmfrmpa]
  3189. Filename=BrmfRmPA.exe
  3190. Confirmed=U
  3191. Description=Brother resource manager - needed for a Brother MFC printer/copiert/scanner and PC to properly communicate
  3192. [broadband wizard]
  3193. Filename=bbwiz.exe
  3194. Confirmed=N
  3195. Description=Starts <a href="http://www.broadbandwizard.net/" target="_blank">Broadband Wizard</a> so it runs in the System Tray. This application tests and optimizes your Cable or DSL connection. Available via Start -> Programs
  3196. [browseproxy]
  3197. Filename=FindService.exe
  3198. Confirmed=N
  3199. Description=<a href="http://actualnames.com/index.php?cont=products" target="_blank">Actual Names</a> - "It is now possible to enter a particular word or keyword phrase that is associated with your business, and immediately be directed to YOUR WEBSITE! The Actual Names technology can do this for you"
  3200. [browser aid]
  3201. Filename=browseraid.exe
  3202. Confirmed=X
  3203. Description=<a href="http://research.sunbelt-software.com/threat_display.cfm?name=BrowserAid&threatid=3342&search=browseraid" target=_blank>BrowserAid/BrowserPal</a> foistware
  3204. [browser help svc]
  3205. Filename=BHSV.EXE
  3206. Confirmed=X
  3207. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotavq.html" target=_blank>RBOT-AVQ</a> WORM!
  3208. [browser hijack blaster]
  3209. Filename=bhblaster.exe
  3210. Confirmed=Y
  3211. Description=<a href="http://www.wilderssecurity.com/bhblaster.html" target="_blank">Browser Hijack Blaster</a> - protects your system from browser hijackers and spyware that alters your IE settings
  3212. [browser launcher]
  3213. Filename=Commandr.exe
  3214. Confirmed=U
  3215. Description=Logitech internet keyboard "Commander" software - loads the software for the shortcut keys on the keyboard. Not required unless you want to use the short cut keys
  3216. [browser pal]
  3217. Filename=adblck.exe
  3218. Confirmed=X
  3219. Description=<a href="http://research.sunbelt-software.com/threat_display.cfm?name=BrowserAid&threatid=3342&search=browseraid" target=_blank>BrowserAid/BrowserPal</a> foistware
  3220. [browser sentinel]
  3221. Filename=BrowserSentinel.exe
  3222. Confirmed=U
  3223. Description=Browser Sentinel. Notifies you if a program wants to penetrate into Internet explorer, add itself to the Windows auto-run list or change your home page. See <a href="http://www.unhsolutions.net/Browser-Sentinel/index.shtml" target="_blank">here</a>
  3224. [browserwebcheck]
  3225. Filename=loadwc.exe
  3226. Confirmed=N
  3227. Description=Checks to make sure that IE is still your default browser
  3228. [bs player]
  3229. Filename=bsplayer.exe
  3230. Confirmed=N
  3231. Description=<a href="http://www.bsplayer.org/" target= blank>BSplayer</a> - A video player used to play avi, mpg, wmv and other multimedia files
  3232. [bsclip]
  3233. Filename=BSCLIP.exe
  3234. Confirmed=N
  3235. Description=CD recording utility that comes with a lot of CDR/CDRW drives and isn't required
  3236. [bsoft lppt01]
  3237. Filename=Bsoft.exe
  3238. Confirmed=X
  3239. Description=<a href="http://www.wilderssecurity.net/specialinfo/rapidblaster.html" target="_blank">RapidBlaster</a> variant (in a "BelmontSoft" folder in Program Files). Recommended you use RapidBlaster Killer to uninstall - see <a ref="http://www.wilderssecurity.net/specialinfo/rapidblaster.html#removal" target="_blank"> here</a>
  3240. [bsplayer]
  3241. Filename=bsplayer.exe
  3242. Confirmed=N
  3243. Description=<a href="http://www.bsplayer.org/" target=_blank>BSplayer</a> - a video player used to play avi, mpg, wmv and other multimedia files
  3244. [bsx3]
  3245. Filename=Rundll32.exe bs3.dll, DllRun
  3246. Confirmed=X
  3247. Description=<a href="http://research.sunbelt-software.com/threat_display.cfm?name=BookedSpace&threatid=3275&search=bookedspace" target=_blank>BookedSpace</a> parasite
  3248. [bt]
  3249. Filename=[path to trojan]
  3250. Confirmed=X
  3251. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojlitebotb.html" target=_blank>LITEBOT-B</a> TROJAN!
  3252. [bt broadband help]
  3253. Filename=matcli.exe
  3254. Confirmed=U
  3255. Description="matcli.exe is a motive Assistant Command line interface that gathers information about your system's identity like your name email address, city, county, etc and gets written to a log file". BT Broadband Help is required to run with the Help and Support program. If you uncheck BT Broadband Help and and then run Help and Support it will add another BT Broadband Help in the startup menu. If you remove the BT Broadband Help in the add/remove program some help menus in help and support will not be available. You decide
  3256. [btinst]
  3257. Filename=btinst.exe
  3258. Confirmed=?
  3259. Description=Associated with an Anycom bluetooth wireless card. <font color="#FF0000">What does it do and is it required?</font>
  3260. [btmodemprotection]
  3261. Filename=BTModemProtection.exe
  3262. Confirmed=U
  3263. Description=BT Privacy Online modem protection software, see <a href="http://www.btmodemprotection.com/" target=_blank>here</a>
  3264. [btsetbootkey]
  3265. Filename=BTSetBootKey.exe
  3266. Confirmed=?
  3267. Description=Related to a USB Bluetooth adaptor. <font color="#FF0000">What does it do and is it required?</font>
  3268. [btstart]
  3269. Filename=btstart.exe
  3270. Confirmed=U
  3271. Description=<a href="http://www.widcomm.com/Partners/index.asp" target="_blank">Broadcorp</a> (formerly WIDCOMM) Bluetooth Connectivity Software
  3272. [bttray]
  3273. Filename=bttray.exe
  3274. Confirmed=U
  3275. Description=System tray icon which shows the status of a BlueTooth wireless module. Most systems with such a module installed can enable/disable the module. The system tray icon changes from blue/white to blue/red when the module is turned off. Allows access to explore bluetooth places, setup wizard, advanced configuration, quick connect and shutdown device
  3276. [btusrbdg]
  3277. Filename=BtUsrBdg.exe
  3278. Confirmed=Y
  3279. Description=Used with a <a href="http://www.mitsumi.de/index4.html" target="_blank">Mitsumi USB Bluetooth</a> adaptor (and maybe others)
  3280. [btusrbdgf]
  3281. Filename=BtUsrBdg.exe
  3282. Confirmed=Y
  3283. Description=Used with a <a href="http://www.mitsumi.de/index4.html" target="_blank">Mitsumi USB Bluetooth</a> adaptor (and maybe others)
  3284. [btv]
  3285. Filename=btv.exe
  3286. Confirmed=X
  3287. Description=<a href="http://sarc.com/avcenter/venc/data/adware.broadcastpc.b.html" target="_blank">BroadcastPC</a> adware variant
  3288. [buddyizer]
  3289. Filename=Buddyizer.exe
  3290. Confirmed=N
  3291. Description=Part of the <a href="#AIMster">AIMster</a> Peer to Peer (P2P) file sharing application that runs over the AOL Instant Messenger network
  3292. [bugwatcher service]
  3293. Filename=bugwatcher.exe
  3294. Confirmed=U
  3295. Description=<a href="http://www.bugtoaster.com/" target="_blank">Bugtoaster</a> is a service that sends reports on system/program crashes (certain types) back to Bugtoaster. They relay information to program authors and provide, if available, any known solutions to the crashes. It doesn't take up any room in memory, just activates in the event of certain program failures
  3296. [buildbu]
  3297. Filename=bldbubg.exe
  3298. Confirmed=N
  3299. Description=Part of Dell Alerts which provides customers with an update on latest updates for his/her system
  3300. [buildlabs]
  3301. Filename=csrss.exe
  3302. Confirmed=X
  3303. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/trojan.webus.html" target="_blank">WEBUS</a> TROJAN! Note - this is not the legitimate <a href="http://www.liutilities.com/products/wintaskspro/processlibrary/csrss/" target="_blank">csrss.exe</a> process, which should not appear in Msconfig/Startup!
  3304. [bulldog service]
  3305. Filename=upsd.exe
  3306. Confirmed=U
  3307. Description=Belkin's Bulldog Plus control software which runs under Windows 95 or later and monitors the UPS (Uninterrupted Power Supply) via a serial or USB link
  3308. [bullguard]
  3309. Filename=mgui.exe
  3310. Confirmed=Y
  3311. Description=Part of <a href="http://www.bullguard.com/" target="_blank"> Bullguard</a> antivirus
  3312. [bullguard update]
  3313. Filename=avxlive.exe
  3314. Confirmed=U
  3315. Description=Part of <a href="http://www.bullguard.com/" target="_blank"> Bullguard</a> antivirus. Leave enabled unless you manually update virus definitions
  3316. [bullguard xcomm]
  3317. Filename=XCOMMSVR.EXE
  3318. Confirmed=Y
  3319. Description=Part of <a href="http://www.bullguard.com/" target="_blank"> Bullguard</a> antivirus
  3320. [bullguardinit]
  3321. Filename=AVXINIT.EXE
  3322. Confirmed=Y
  3323. Description=Part of <a href="http://www.bullguard.com/" target="_blank"> Bullguard</a> antivirus
  3324. [bullguardoptin]
  3325. Filename=bulldownload.exe
  3326. Confirmed=Y
  3327. Description=Part of <a href="http://www.bullguard.com/" target="_blank"> Bullguard</a> antivirus
  3328. [bullseye network]
  3329. Filename=bargains.exe
  3330. Confirmed=X
  3331. Description=<a href="http://sarc.com/avcenter/venc/data/adware.bargainbuddy.html" target="_blank">BargainBuddy</a> foistware
  3332. [bullseye tracker]
  3333. Filename=BeTrack.exe
  3334. Confirmed=?
  3335. Description=<a href="http://www.intelliseek.com/prod/bullseye/bullseye.htm" target="_blank">Bullseye</a> - intelligent research assistant
  3336. [bunx]
  3337. Filename=beagle.exe
  3338. Confirmed=X
  3339. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32lebreate.html" target=_blank>LEBREAT-E</a> WORM!
  3340. [burnquick queue]
  3341. Filename=BQTray.exe
  3342. Confirmed=N
  3343. Description=System Tray access to <a href="http://www.burnquick.com/" target="_blank">BurnQuick</a> CD burning software. Only required if you use the queueing facility, hence the U recommendation. Create your own desktop shortcut to start manually
  3344. [button server]
  3345. Filename=bttnserv.exe
  3346. Confirmed=U
  3347. Description=Found on a Compaq PC, for the extra buttons on the keyboard for the speaker volume, media player, sleep and internet buttons. If the buttons aren't used on the keyboard or your's doesn't have them, then it isn't required
  3348. [buttonkey]
  3349. Filename=ButtonKey.exe
  3350. Confirmed=N
  3351. Description=CyberView TWAIN driver for the <a href="http://www.scanace.com/en/product/product.php" target="_blank">Pacific Image</a> range of 35mm film scanners. Enables the one touch scanning button and places an icon an the System Tray. Use your scanners software or run it manually by creating a shortcut
  3352. [buzme]
  3353. Filename=Bmui.exe
  3354. Confirmed=N
  3355. Description=<a href="http://www.buzme.com/buzme/default.asp" target="_blank">Buzme</a> by RingCentral, Inc - internet call waiting. Intercepts telephone calls like an answering machine and plays the voice message on your PC. Only required when you're on-line and via dial-up modem
  3356. [buzof.exe]
  3357. Filename=buzof.exe
  3358. Confirmed=U
  3359. Description=<a href="http://www.basta.com/ProdBuzof.htm" target="_blank">Buzof</a> from Basta Computing "enables you to automatically answer, close or minimize virtually any recurring window including messages, prompts, and dialog boxes"
  3360. [bxproxy]
  3361. Filename=bxproxy.exe
  3362. Confirmed=X
  3363. Description=Added by the <a href="http://www.superadblocker.com/definition/bxproxy/" target=_blank>BXPROXY</a> TROJAN!
  3364. [bxsx5]
  3365. Filename=RunDLL32.EXE bsx5.dll
  3366. Confirmed=X
  3367. Description=<a href="http://research.sunbelt-software.com/threat_display.cfm?name=BookedSpace&threatid=3275&search=bookedspace" target=_blank>BookedSpace</a> parasite
  3368. [bxxs5]
  3369. Filename=RunDLL32.EXE bxxs5.dll, dllrun
  3370. Confirmed=X
  3371. Description=<a href="http://research.sunbelt-software.com/threat_display.cfm?name=BookedSpace&threatid=3275&search=bookedspace" target=_blank>BookedSpace</a> parasite
  3372. [c]
  3373. Filename=c:\archiv~1\win.com
  3374. Confirmed=X
  3375. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/trojan.cuydoc.html" target="_blank">CUYDOC</a> TROJAN!
  3376. [c-media echo control]
  3377. Filename=EchoCtrl.exe
  3378. Confirmed=U
  3379. Description=C-Media produce audio chipsets that are often found on popular motherboards with on-board audio. You may need it if you use the echo control feature of C-Media Mixer
  3380. [c-media mixer]
  3381. Filename=Mixer.exe
  3382. Confirmed=N
  3383. Description=C-Media produce audio chipsets that are often found on popular motherboards with on-board audio. Provides System Tray access to change audio settings. Available via Start -> Settings -> Control Panel or Start -> Programs
  3384. [c2k]
  3385. Filename=CYB2K.EXE
  3386. Confirmed=U
  3387. Description=CYBERsitter 2000 or 2001 - anti-adult content filter primarily. Required if you want the sites you visit filtered without having to load the software every time you launch your browser
  3388. [c32cs2]
  3389. Filename=c32cs2.exe
  3390. Confirmed=U
  3391. Description=<a href="http://www.securitysoft.com/new601/cs_home.htm" target=_blank>Cyber Sentinel</a> - internet filtering software
  3392. [c7]
  3393. Filename=[path to worm]
  3394. Confirmed=X
  3395. Description=Added by the <a href="http://www.symantec.com/avcenter/venc/data/w32.mediakill.a@mm.html" target= blank>MEDIAKILL.A</a> WORM!
  3396. [c:\windows\iexplor.exe]
  3397. Filename=IEXPLOR.EXE
  3398. Confirmed=X
  3399. Description="Pop Marketing" adware
  3400. [c:\windows\vcmnet11.exe]
  3401. Filename=VCMnet11.exe
  3402. Confirmed=X
  3403. Description=Windows AFA Internet Enhancement - a browser hijacker, redirecting to adsourcecorp.com. See <a href="http://www.bleepingcomputer.com/forums/How_to_remove_AFA_Internet_Enhancement_or_Vcmnet11exe-t19277.html" target=_blank>here</a>
  3404. [c:\windows\wintask.exe]
  3405. Filename=WinTask.exe
  3406. Confirmed=X
  3407. Description="Pop Marketing" adware
  3408. [ca-amagent]
  3409. Filename=amagent.exe
  3410. Confirmed=U
  3411. Description=<a href="http://www3.ca.com/Solutions/Product.asp?ID=194" target=_blank>Unicenter Asset Management</a> is a solution for proactively managing IT assets in a business environment. It provides full-featured asset tracking capabilities through automated discovery, hardware inventory, network inventory, software inventory, configuration management, software usage monitoring, license management and extensive cross-platform reporting
  3412. [caavtray]
  3413. Filename=CAVTray.exe
  3414. Confirmed=Y
  3415. Description=eTrust?<a href="http://home.ca.com/dr/sat5/ec_Main.Entry17c?SID=35715&SP=10023&PN=1&PID=671589&V1=671589&CID=179788&api1=78&api2=1&api3=&DSP=&CUR=840&PGRP=0&CACHE_ID=179788" target=_blank>EZ Antivirus</a> system tray application from Computer Associates
  3416. [cabchk]
  3417. Filename=Cabchk.exe
  3418. Confirmed=X
  3419. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/trojan.gema.html" target="_blank">GEMA</a> TROJAN!
  3420. [cabchk32]
  3421. Filename=Cabchk32.exe
  3422. Confirmed=X
  3423. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/trojan.gema.html" target="_blank">GEMA</a> TROJAN!
  3424. [cabcinstall]
  3425. Filename=CABCInstall.exe
  3426. Confirmed=X
  3427. Description=<a href="http://www.cabc.com/product/product_main.html" target="_blank">CABC</a> content delivery software
  3428. [cacheboost]
  3429. Filename=trayicon.exe
  3430. Confirmed=U
  3431. Description=<a href="http://www.systweak.com/cacheboost/" target="_blank">CacheBoost</a> "optimizes the System Cache-Management of Windows XP/2000/NT and Windows .Net Servers, resulting in a performance boost"
  3432. [cacheloader]
  3433. Filename=[path to trojan]
  3434. Confirmed=X
  3435. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojdloadernz.html" target=_blank>DLOADER-NZ</a> TROJAN!
  3436. [cacheman]
  3437. Filename=Cacheman.exe
  3438. Confirmed=N
  3439. Description=Freeware disk cache tweaker from <a href="http://www.outertech.com/">Outer Technologies</a>. Should only be run once and not loaded at start-up
  3440. [cachemgr]
  3441. Filename=CacheMgr.exe
  3442. Confirmed=Y
  3443. Description=<a href="http://www.sophos.com/products/sav/" target="_blank">Sophos Antivirus</a> Remote Update
  3444. [cacstarter]
  3445. Filename=cacstart.exe
  3446. Confirmed=N
  3447. Description=Cash A Check - check writing software
  3448. [caddais backupondemand]
  3449. Filename=BODMon.exe
  3450. Confirmed=U
  3451. Description=<a href="http://www.caddais.com/BackupOnDemand.shtml" target="_blank">Caddais BackupOnDemand</a> - "runs in the background and monitors your important files for changes. Within seconds of changing, modified files are automatically backed up to an archive location"
  3452. [cadenza]
  3453. Filename=CdzSvc.exe
  3454. Confirmed=U
  3455. Description=Cadenza <a href="http://www.sofotex.com/Cadenza-mNotes-Pocket-PC-download_L8061.html" target=_blank>mNotes</a> for Palm and Pocket PC enables users to access Lotus Notes on their mobile devices
  3456. [cads]
  3457. Filename=cads.exe
  3458. Confirmed=U
  3459. Description=<a href="http://www.securitysoft.com/new601/cs_home.htm" target="_blank">Cyber Sentinel</a> internet filtering software
  3460. [cagent]
  3461. Filename=CAgent.exe
  3462. Confirmed=N
  3463. Description=<a href="http://www.fine-reader.com/" target="_blank">Abbyy Fine Reader</a> OCR (Optical Character Recognition) software for scanning and converting documents
  3464. [cagou]
  3465. Filename=[filename].hta
  3466. Confirmed=X
  3467. Description=Added by the <a href="http://www.symantec.com/avcenter/venc/data/wscript.kakworm.html" target="_blank">KAKWORM</a> WORM!
  3468. [cahootwebcard]
  3469. Filename=CahootWebcard.exe
  3470. Confirmed=N
  3471. Description="The Cahoot Webcard is a virtual card that allows you to use your Cahoot credit card online without ever having to expose your real card numbers over the web. It works by generating one-off transaction numbers as a substitute for your real cahoot credit card details". Run manually when needed
  3472. [caisafe]
  3473. Filename=isafe.exe
  3474. Confirmed=Y
  3475. Description=Part of Computer Associates <a href="http://www1.my-etrust.com/products/Antivirus.cfm?" target="_blank">eTrus EZ Antivirus</a>
  3476. [cal reminder shortcut]
  3477. Filename=calrem.exe
  3478. Confirmed=N
  3479. Description=Produces a pop-up reminder of events scheduled using the MS Office Calendar
  3480. [calc microsoft windows]
  3481. Filename=wincalc.exe
  3482. Confirmed=X
  3483. Description=Added by an unidentied WORM or TROJAN!
  3484. [calc32]
  3485. Filename=CALC32.EXE
  3486. Confirmed=X
  3487. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32spybotec.html" target=_blank>SPYBOT-EC</a> WORM!
  3488. [calendar 200x reminder]
  3489. Filename=calendar.exe
  3490. Confirmed=N
  3491. Description=<a href="http://www.jgraff.addr.com/cal.htm" target="_blank">Calendar 200X</a> - shows holidays, reminders of various anniversaries,tasks etc
  3492. [calendarscope]
  3493. Filename=cs.exe
  3494. Confirmed=U
  3495. Description=<a href="http://www.calendarscope.com/" target=_blank>Calendarscope</a> calendar software
  3496. [calk]
  3497. Filename=calk.exe
  3498. Confirmed=X
  3499. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojstartpafh.html" target= blank>STARTPA-FH</a> TROJAN!
  3500. [callbumping]
  3501. Filename=cbpopw.exe
  3502. Confirmed=?
  3503. Description=<font color="#FF0000">??</font>
  3504. [callcenter main application]
  3505. Filename=V3calmcp.exe
  3506. Confirmed=U
  3507. Description="V3 Inc. <a href="http://www.v3inc.com/freecc.htm" target=_blank>CallCenter</a> is a free 32-bit, integrated fax, voicemail and data communications application with a simple to use interface providing fax send and receive functionality, basic (single mailbox) answering machine capability, and sophistcated data communications." Main application
  3508. [callcenter printer interface]
  3509. Filename=V3faxecp.exe
  3510. Confirmed=U
  3511. Description="V3 Inc. <a href="http://www.v3inc.com/freecc.htm" target=_blank>CallCenter</a> is a free 32-bit, integrated fax, voicemail and data communications application with a simple to use interface providing fax send and receive functionality, basic (single mailbox) answering machine capability, and sophistcated data communications." Fax printer
  3512. [callcontrol]
  3513. Filename=ftctrl32.exe
  3514. Confirmed=N
  3515. Description=FaxTalk Messenger Pro is a Windows TAPI based 32-bit application. When installed, the software automatically loads FaxTalk CallControl when you start Windows. When FaxTalk CallControl is running, any TAPI compliant application can request to use the modem from Windows
  3516. [camcheck]
  3517. Filename=CamCheck.exe
  3518. Confirmed=N
  3519. Description=<a href="http://www.nucam.com.tw/index1.htm" target="_blank">NuCam</a> camera software related
  3520. [cameno]
  3521. Filename=Cameno.exe
  3522. Confirmed=U
  3523. Description=<a href="http://www.spadeapps.com/cameno/" target=_blank>Cameno</a> is a program which brings tabbed windows to MSN Messenger 6.0 and above
  3524. [camio viewer x]
  3525. Filename=IXApplet.exe
  3526. Confirmed=N
  3527. Description=Image viewing program that comes with digital cameras. Shows pictures that are in the camera before downloading them. "x" in the name is the version
  3528. [cammonitor]
  3529. Filename=hpqcmon.exe
  3530. Confirmed=?
  3531. Description=<font color="#FF0000">From HP and related to digital imaging</font>
  3532. [canada]
  3533. Filename=Canada.exe
  3534. Confirmed=N
  3535. Description=<font color="#FF0000">Known to be a dialler - but is it maliscous or clean?</font>
  3536. [canary]
  3537. Filename=canary-std.exe
  3538. Confirmed=U
  3539. Description=Canary ?keystroke logger/monitoring program. Given a "U" recommendation because it depends if you intentionally installed it. If you didn't treat it as "X" and uninstall or remove
  3540. [candy]
  3541. Filename=command32.exe
  3542. Confirmed=X
  3543. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotlv.html" target="_blank">RBOT-LV</a> WORM!
  3544. [candynet]
  3545. Filename=Taskmsg.exe
  3546. Confirmed=X
  3547. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotna.html" target=_blank>RBOT-NA</a> WORM!
  3548. [canon multipass status monitor]
  3549. Filename=monitr32.exe
  3550. Confirmed=U
  3551. Description=Cannon Multi-Pass status monitor - your choice
  3552. [canon pc1200 ic d600 ir1200g status window]
  3553. Filename=CAPM1LAK.EXE
  3554. Confirmed=?
  3555. Description=Cannon printer related - <font color="#FF0000">is it required in startup?</font>
  3556. [canon printer monitor bjcxxx]
  3557. Filename=Cjstlst.exe
  3558. Confirmed=N
  3559. Description=Trayicon for Canon printer. xxx denotes model. Available via Start -> Programs
  3560. [cap3on]
  3561. Filename=CAP3ONN.EXE
  3562. Confirmed=?
  3563. Description=Canon driver, purpose unknown. <font color="#FF0000">Is it required in startup?</font>
  3564. [capfax]
  3565. Filename=capfax.exe
  3566. Confirmed=N
  3567. Description=<a target="_blank" href="http://shop.bvrp.com/english/asp/default.asp?UserPrefLanguage=1&UserPrefCountry=3&UserPrefCurrency=4&UserPrefCurrentCompany=18&UserPrefUseVicom=1&id_product=86">PhoneTools</a> fax software
  3568. [caping]
  3569. Filename=CAPing.exe
  3570. Confirmed=U
  3571. Description=Citibank Citianywhere software
  3572. [capon]
  3573. Filename=Capon.exe
  3574. Confirmed=Y
  3575. Description=Canon printer driver
  3576. [captionmgr32]
  3577. Filename=crssr.exe
  3578. Confirmed=X
  3579. Description=Added by the <a href="http://www.symantec.com/avcenter/venc/data/w32.zar.a@mm.html" target=_blank>ZAR.A</a> WORM!
  3580. [capture]
  3581. Filename=capture.exe
  3582. Confirmed=X
  3583. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojtheefb.html" target=_blank>THEEF-B</a> TROJAN!
  3584. [capture express 2000]
  3585. Filename=capexp.exe
  3586. Confirmed=N
  3587. Description=<a href="http://www.captureexpress.com/" target="_blank">Capture Express</a> - screen capture utility
  3588. [card monitor]
  3589. Filename=REGCNT09.exe
  3590. Confirmed=N
  3591. Description=For the USB connection on a Panasonic PV-DV701 Digital Camcorder. Available via Start -> Programs
  3592. [care20]
  3593. Filename=Care20.exe
  3594. Confirmed=X
  3595. Description=<a href="http://www.pestpatrol.com/PestInfo/t/topmoxie.asp" target=_blank>TopMoxie</a> adware
  3596. [care2gtu]
  3597. Filename=Care2GTU.exe
  3598. Confirmed=U
  3599. Description=Care2 Green Thumbs-Up (from the Care2 site). Every online purchase helps environmental causes; tells you how eco-friendly a company really is, thanks to over 200 company profiles from Coop America. Saves 1 square foot of rainforest every day you use it. If it works and you like it, keep it
  3600. [carpserver]
  3601. Filename=CARPserver.exe
  3602. Confirmed=X
  3603. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojbankeran.html" target=_blank>BANKER-AN</a> TROJAN!
  3604. [carpservice]
  3605. Filename=carpserv.exe
  3606. Confirmed=U
  3607. Description=Associated with <a href="http://www.zoltrix.com/" target="_blank"> Zoltrix</a> modems - enables the internal modem speaker, allowing you to listen to the dial-up sounds for example
  3608. [cartao]
  3609. Filename=[path to file]
  3610. Confirmed=X
  3611. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojdloaderqd.html" target=_blank>DLOADER-QD</a> TROJAN!
  3612. [cas client]
  3613. Filename=casclient.exe
  3614. Confirmed=X
  3615. Description=<a href="http://securityresponse.symantec.com/avcenter/venc/data/adware.casinoclient.html" target=_blank>CasinoClient</a> adware
  3616. [cas2stub]
  3617. Filename=cas2stub.exe
  3618. Confirmed=X
  3619. Description=<a href="http://sarc.com/avcenter/venc/data/adware.casinoclient.html" target=_blank>CasinoClient</a> ADWARE!
  3620. [casagnt]
  3621. Filename=CasAgnt.exe
  3622. Confirmed=U
  3623. Description=Program by Extended Systems which allows you to sync your Casio PDA with your PC
  3624. [casdvqwa]
  3625. Filename=bmqnzkg.exe
  3626. Confirmed=X
  3627. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.randex.be.html" target="_blank">RANDEX.BE</a> WORM!
  3628. [cashback]
  3629. Filename=cashback.exe
  3630. Confirmed=X
  3631. Description=Part of eXact Advertising Software, consisting of "CashBack by BargainBuddy", BullsEye Network and NaviSearch
  3632. [cashfiesta]
  3633. Filename=Cashfiesta.exe
  3634. Confirmed=X
  3635. Description=<a href="http://www.trendmicro.com/vinfo/grayware/ve_graywareDetails.asp?GNAME=ADW_CASHFIESTA.A" target=_blank>CASHFIESTA.A</a> pay-per-surf adware
  3636. [cashsurfers cashbar navigator]
  3637. Filename=Cashbar.Exe
  3638. Confirmed=N
  3639. Description=Cashsurfers CashBar Navigator - "The CashBar rotates banner advertisements once per minute and provides you with access to up to date special offers and deals"
  3640. [casstub]
  3641. Filename=casstub.exe
  3642. Confirmed=X
  3643. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojcassa.html" target=_blank>CASS-A</a> TROJAN!
  3644. [cavrid]
  3645. Filename=CAVRID.exe
  3646. Confirmed=Y
  3647. Description=eTrust?<a href="http://home.ca.com/dr/sat5/ec_Main.Entry17c?SID=35715&SP=10023&PN=1&PID=671589&V1=671589&CID=179788&api1=78&api2=1&api3=&DSP=&CUR=840&PGRP=0&CACHE_ID=179788" target=_blank>EZ Antivirus</a> Real Time Infection Report from Computer Associates
  3648. [cavs]
  3649. Filename=CAVS.exe
  3650. Confirmed=Y
  3651. Description=Cheyenne (now <a href="http://ca.com/" target=_blank>eTrust</a>) antivirus
  3652. [caznovas]
  3653. Filename=CAZNOVAS.exe
  3654. Confirmed=X
  3655. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.cazno.html" target="_blank">CAZNO</a> TROJAN!
  3656. [cback.exe]
  3657. Filename=CBACK.EXE
  3658. Confirmed=X
  3659. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojpentaa.html" target=_blank>PENTA-A</a> TROJAN!
  3660. [cbwattn]
  3661. Filename=CBWAttn.exe
  3662. Confirmed=U
  3663. Description=Required for <a href="http://www.accpac.com/products/communication/bitware/" target="_blank"> Bitware</a> to answer incoming faxes, can cause sleep mode problems
  3664. [cbwhost]
  3665. Filename=CBWHost.exe
  3666. Confirmed=U
  3667. Description=Required for <a href="http://www.accpac.com/products/communication/bitware/" target="_blank"> Bitware</a> to answer incoming faxes, can cause sleep mode problems
  3668. [cbwuser]
  3669. Filename=CBWDial.exe
  3670. Confirmed=?
  3671. Description=Associated with <a href="http://www.accpac.com/products/communication/bitware/" target="_blank"> Bitware</a> that integrates fax, voice, pager, and data communications on your desktop
  3672. [cc2kui]
  3673. Filename=comet.exe
  3674. Confirmed=X
  3675. Description=<a href="http://research.sunbelt-software.com/threat_display.cfm?name=Comet%20Cursor&threatid=29168&search=Comet%20Cursor" target=_blank>Comet Cursor</a> adware
  3676. [ccd manager]
  3677. Filename=DDS.EXE
  3678. Confirmed=U
  3679. Description=Project Labs <a href="http://www.centurycdna.com/" target="_blank">Century CD</a> manager for their CD/DVD storage device
  3680. [ccdecode]
  3681. Filename=rundll32.exe streamci, StreamingDeviceSetup
  3682. Confirmed=N
  3683. Description=Part of the closed caption decdoder/MS VBI codec. Should only run once
  3684. [ccdoctorlogontesting]
  3685. Filename=ccdoctor.exe
  3686. Confirmed=Y
  3687. Description=Checks your system to make sure it's configured properly for running <a href="http://www.rational.com/products/clearcase/index.jsp" target="_blank">Rational ClearCase</a>, a source code management tool. ClearCase is fairly sophisticated so there are a lot of system-related things that can cause it grief. If you run ClearCase you should not disable this as it provides a valuable service, but technically it isn't required to use the ClearCase product
  3688. [ccenter]
  3689. Filename=CCenter.exe
  3690. Confirmed=Y
  3691. Description=<a href="http://www.ravantivirus.com/" target=_blank>RAV</a> AntiVirus
  3692. [ccevtmgr]
  3693. Filename=ccEvtMgr.exe
  3694. Confirmed=Y
  3695. Description=Part of <a href="http://www.symantec.com/nav/nav_9xnt/" target="_blank"> Norton AntiVirus 2003</a>.<font color="#FF0000"> </font>Event manager for scheduling weekly scans and or automatic virus updates. Used to start automatically via "ccApp" and was not required as a seperate entry but a recent update changed this
  3696. [ccevtmrg.exe]
  3697. Filename=ccEvtMrg.exe
  3698. Confirmed=X
  3699. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_RBOT.GZ&VSect=T" target=_blank>RBOT.GZ</a> WORM!
  3700. [ccexecute]
  3701. Filename=bootcfg1.exe
  3702. Confirmed=X
  3703. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32nemsib.html" target=_blank>NEMSI-B</a> VIRUS!
  3704. [cchelp]
  3705. Filename=ccHelp.hta
  3706. Confirmed=X
  3707. Description=<a href="http://sarc.com/avcenter/venc/data/adware.searchq.html" target= blank>"Searchq"</a> adware
  3708. [ccproxy]
  3709. Filename=CCPROXY.EXE
  3710. Confirmed=U
  3711. Description=Part of Norton Internet Security, proxy server that is used to support the parental controls. If you turn parental controls off at user level the process is not loaded. Reported to cause excessive CPU usage
  3712. [ccpxysvc]
  3713. Filename=CCPXYSVC.exe
  3714. Confirmed=Y
  3715. Description=Part of Norton's <a href="http://www.symantec.com/nav/nav_9xnt/" target="_blank"> AntiVirus 2003</a>, <a href="http://www.symantec.com/sabu/nis/nis_pe/" target="_blank"> Internet Security</a> and <a href="http://www.symantec.com/sabu/nis/npf/" target="_blank"> Firewall</a> products. E-mail proxy service - required for E-mail scanning and the firewall
  3716. [ccreg]
  3717. Filename=explorer.exe
  3718. Confirmed=X
  3719. Description=Added by the <a href="http://www.symantec.com/avcenter/venc/data/backdoor.irc.zcrew.html" target="_blank">ZCREW</a> TROJAN! Note - the legitimate Windows Explorer (explorer.exe) is located in the Windows or Winnt folder and would only be in startups if you added it manually. This one is located in the System subfolder
  3720. [ccsetmgr]
  3721. Filename=ccSetMgr.exe
  3722. Confirmed=Y
  3723. Description=Part of Norton AntiVirus 2004. <font color="#FF0000"> What does it do?</font>
  3724. [ccsvit.exe]
  3725. Filename=ccsvit.exe
  3726. Confirmed=X
  3727. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojstartpahp.html" target=_blank>STARTPA-HP</a> TROJAN!
  3728. [ccupdate]
  3729. Filename=ccUpdate.exe
  3730. Confirmed=X
  3731. Description=Added by the <a href="http://es.trendmicro-europe.com/enterprise/security_info/ve_detail.php?VName=WORM_AGOBOT.YS&VSect=T" target=_blank>AGOBOT.YS</a> WORM!
  3732. [ccwasher]
  3733. Filename=aolwasher.exe
  3734. Confirmed=U
  3735. Description=Webroot Cache & Cookie Washer - cleaning browser tracks, including cache, cookies, history, mail trash, drop-down address bar, auto-complete forms and downloaded program files for IE, Netscape and AOL
  3736. [ccwc7a]
  3737. Filename=ac.exe
  3738. Confirmed=U
  3739. Description=<a href="http://www.moleculesoft.se/index2b.html" target=_blank>Moleculesoft</a> Cache, Cookie & Windows Cleaner Ver. 7 - auto clean
  3740. [ccwc7i]
  3741. Filename=idxl.exe
  3742. Confirmed=U
  3743. Description=<a href="http://www.moleculesoft.se/index2b.html" target=_blank>Moleculesoft</a> Cache, Cookie & Windows Cleaner Ver. 7 - auto clean
  3744. [ccwc7s]
  3745. Filename=stealth.exe
  3746. Confirmed=U
  3747. Description=<a href="http://www.moleculesoft.se/index2b.html" target=_blank>Moleculesoft</a> Cache, Cookie & Windows Cleaner Ver. 7
  3748. [cd storage master]
  3749. Filename=cdstorager.exe
  3750. Confirmed=N
  3751. Description=<a href="http://www.cdstorager.com/" target= blank>CD Storage Master</a> - a program designed to catalog CD information, boasts a number of handy features for organizing your collection
  3752. [cd1]
  3753. Filename=cd1.exe
  3754. Confirmed=X
  3755. Description=Premium rate adult content dialler
  3756. [cdantsrv]
  3757. Filename=CDANTSRV.exe
  3758. Confirmed=N
  3759. Description=C-Dilla License Management software. Used for any program that uses C-dilla Protection, example: 3D Studio Max 4.x. It loads as a service automatically but is not needed unless you run said program. Can be started and stopped manually
  3760. [cdcompat]
  3761. Filename=Cdcompat.exe
  3762. Confirmed=X
  3763. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/trojan.gema.html" target="_blank">GEMA</a> TROJAN!
  3764. [cddrv32]
  3765. Filename=cddrv32.exe
  3766. Confirmed=X
  3767. Description=Added by a variant of the <a href="http://www.sophos.com/virusinfo/analyses/trojcrypterc.html" target="_blank">CRYPTER.C</a> TROJAN!
  3768. [cdinterceptor]
  3769. Filename=cdi.exe
  3770. Confirmed=N
  3771. Description=CD indexer for measuring the speed of CD players
  3772. [cdrom controller]
  3773. Filename=cdromcntrl.exe
  3774. Confirmed=X
  3775. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojbattrya.html" target=_blank>BATTRY-A</a> TROJAN!
  3776. [cds]
  3777. Filename=cds.exe
  3778. Confirmed=X
  3779. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.spymon.html" target=_blank>SPYMON</a> TROJAN!
  3780. [cdtray]
  3781. Filename=CDTray.exe
  3782. Confirmed=N
  3783. Description=On HP PCs, this is the small CD icon next to the time
  3784. [ceekey]
  3785. Filename=CeEKey.exe
  3786. Confirmed=U
  3787. Description=Hot Key utility included on Toshiba Satellite laptops
  3788. [ceepower]
  3789. Filename=cepmtray.exe
  3790. Confirmed=U
  3791. Description=Toshiba's Power Management Utility - allows the user to setup different profiles for both AC power and Battery Power on laptops. Contols CPU speed, Monitor Shut Off, Hard Drive Shut-Off, Monitor Brightness, System Stand-by and System Hibernate times
  3792. [ceic]
  3793. Filename=Ceic.exe
  3794. Confirmed=?
  3795. Description=<font color="#FF0000">??</font>
  3796. [cekirge]
  3797. Filename=[path to worm]
  3798. Confirmed=X
  3799. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.kergez.a@mm.html" target="_blank">KERGEZ.A</a> WORM!
  3800. [center]
  3801. Filename=[random name]32.exe
  3802. Confirmed=X
  3803. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.bofra.a@mm.html" target=_blank>BOFRA.A</a> WORM!
  3804. [centralprocessor]
  3805. Filename=taskimgr.exe
  3806. Confirmed=X
  3807. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/pwsteal.bancos.j.html" target="_blank">BANCOS.J</a> TROJAN!
  3808. [cepa]
  3809. Filename=wsot.exe
  3810. Confirmed=?
  3811. Description=<font color="#FF0000">??</font>
  3812. [cesarftp ftp server]
  3813. Filename=server.exe
  3814. Confirmed=N
  3815. Description=<a href="http://www.aclogic.com/" target="_blank">CesarFTPd</a> - FTP server
  3816. [cesmain.dll]
  3817. Filename=cmail.dll, Rundll32
  3818. Confirmed=X
  3819. Description=CnsMin "<a href="http://217.115.153.73/parasite/CnsMin.html" target="_blank">Chinese Keywords</a>" hijacker related
  3820. [ceventmgr]
  3821. Filename=Cell.exe
  3822. Confirmed=X
  3823. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojbifroseak.html" target=_blank>BIFROSE-AK</a> TROJAN!
  3824. [cfd]
  3825. Filename=CFD.exe
  3826. Confirmed=N
  3827. Description=<a href="http://www.broadjump.com/" target="_blank">BroadJump</a> Client Foundation. Broadband troubleshooting software installed by various companies. Not required and you can remove it via Add/Remove programs
  3828. [cfdstart]
  3829. Filename=WinMuschi.exe
  3830. Confirmed=X
  3831. Description=<a href="http://securityresponse.symantec.com/avcenter/venc/data/dialer.winmuschi.html" target="_blank">WINMUSCHI</a> dialler
  3832. [cfgintpr]
  3833. Filename=cfgintpr.exe
  3834. Confirmed=Y
  3835. Description=Configuration Interpreter - part of <a href="http://www.tinysoftware.com/home/tiny2?la=EN" target="_blank">Tiny Personal Firewall</a> V4
  3836. [cfgmgr51]
  3837. Filename=RunDLL32.EXE [path] cfgmgr51.dll, DllRun
  3838. Confirmed=X
  3839. Description=<a href="http://research.sunbelt-software.com/threat_display.cfm?name=BookedSpace&threatid=3275&search=bookedspace" target=_blank>BookedSpace</a> parasite
  3840. [cfgmgr52]
  3841. Filename=RunDLL32.EXE [path] cfgmgr52.dll,DllRun
  3842. Confirmed=X
  3843. Description=<a href="http://research.sunbelt-software.com/threat_display.cfm?name=BookedSpace&threatid=3275&search=bookedspace" target=_blank>BookedSpace</a> parasite
  3844. [cfgwiz]
  3845. Filename=cfgwiz.exe
  3846. Confirmed=N
  3847. Description=Introduced with Norton Anti-Virus 2002, this is a real resource hog. Many NAV users will find they can live without loading it
  3848. [cfosdnt]
  3849. Filename=cFosDNT.exe
  3850. Confirmed=?
  3851. Description=<a href="http://www.cfos.de/index2_e.htm" target="_blank">cFos</a> DSL Modem driver related. <font color="#FF0000">What does it do and is it required?</font>
  3852. [cfosinst_check]
  3853. Filename=cfosinst.exe
  3854. Confirmed=?
  3855. Description=<a href="http://www.cfos.de/index2_e.htm" target="_blank">cFos</a> DSL Modem driver related. <font color="#FF0000">What does it do and is it required?</font>
  3856. [cfosspeed]
  3857. Filename=cFosSpeed.exe
  3858. Confirmed=U
  3859. Description=<a href="http://www.cfos.de/index2_e.htm" target=_blank>cFos Software</a> Internet acceleration program related. Note - may be necessary for the software to work properly
  3860. [cftmon32]
  3861. Filename=taskmgr*.exe [* = number]
  3862. Confirmed=X
  3863. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.sowsat.c@mm.html" target="_blank">SOWSAT.C</a> and <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.sowsat.j@mm.html" target="_blank">SOWSAT.J</a> WORMS!
  3864. [cfy]
  3865. Filename=cfy.exe
  3866. Confirmed=X
  3867. Description=Surfenhance.com <a href="http://securityresponse.symantec.com/avcenter/venc/data/adware.searchforit.html" target=_blank>SearchForIt</a> adware variant
  3868. [cgserver]
  3869. Filename=cgserver.exe
  3870. Confirmed=U
  3871. Description=Associated with an <a href="http://www.eicon.com/worldwide/default.htm" target="_blank">Eicon Networks</a> ISDN or ADSL modem. Call Guard Server (CGserver) watches your modem and blocks incoming or outgoing calls. You need cgard.exe (from Startmenu) to configure cgserver with rules and telephone numbers. Good against unwanted dialer programs
  3872. [cgtask services]
  3873. Filename=cgtask.exe
  3874. Confirmed=X
  3875. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.lala.b.html" target="_blank">LALA.B</a> TROJAN!
  3876. [cgywin]
  3877. Filename=cgywin32.exe
  3878. Confirmed=X
  3879. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotaei.html" target=_blank>RBOT-AEI</a> WORM!
  3880. [chamclock]
  3881. Filename=ChamClock.exe
  3882. Confirmed=U
  3883. Description=<a href="http://www.softshape.com/cham/" target="_blank">Chameleon Clock</a> - system tray clock replacement
  3884. [change-me-now]
  3885. Filename=msgfix1.exe
  3886. Confirmed=X
  3887. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_SDBOT.ZD" target=_blank>SDBOT.ZD</a> WORM!
  3888. [changeicon]
  3889. Filename=SPMSMON.EXE
  3890. Confirmed=U
  3891. Description=Card reader related program. Note - may cause problems with My Computer loading at startup. Disabling through MsConfig seems to solve the problem
  3892. [changelines]
  3893. Filename=chngline.exe
  3894. Confirmed=?
  3895. Description=<font color="#FF0000">??</font>
  3896. [chatango]
  3897. Filename=Chatango.exe
  3898. Confirmed=N
  3899. Description=<a href="http://www.chatango.com/" target=_blank>Chatango</a> - "allows people to be connected in real time through their Web browsers. Include your Chatango contact link or button when you create eBay auctions, blogs, personal websites, Friendster profiles, and your visitors will be able to contact you instantly, without downloading anything, or registering. Alo use it to send email to your friends, allowing them to respond to you in real time!." The 'MessageCatcher' icon in the System Tray notifies you when you get a message. When you get a message, a little alert pops up, which you can click on and start chatting immediately
  3900. [chcenter]
  3901. Filename=chcenter.exe
  3902. Confirmed=N
  3903. Description=IMSI <a href="http://www.imsisoft.com/prodinfo.asp?t=1&mcid=100" target="_blank">HiJaak</a> - "the easiest way to convert, capture, and manage all your graphic files"
  3904. [che32]
  3905. Filename=che.ocx.vbs
  3906. Confirmed=X
  3907. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/wm97adenub.html" target=_blank>ADENU-B</a> VIRUS!
  3908. [cheatle]
  3909. Filename=GigaByte.exe
  3910. Confirmed=X
  3911. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.hllp.shodi.b.html" target="_blank">SHODI.B</a> VIRUS!
  3912. [check for one touch update]
  3913. Filename=wiseupdt.exe
  3914. Confirmed=N
  3915. Description=Checks for updates for Visioneer OneTouch scanners
  3916. [check for tws updates]
  3917. Filename=WiseUpdt.exe
  3918. Confirmed=N
  3919. Description=Interactive Brokers - check for update to their standalone Java-based trading platform
  3920. [check messenger]
  3921. Filename=cmesseng.exe
  3922. Confirmed=U
  3923. Description=<a href="http://www.qchex.com/messenger.asp" target="_blank">Check Messenger</a> from Qchex.com - program that helps you manage the activity of your Qchex account
  3924. [checkcustomworksupdate]
  3925. Filename=CheckCWupdate.exe
  3926. Confirmed=N
  3927. Description=Update checker, part of <a href="http://www.designersgallerysoftware.com/products/product.asp?Product_ID=EDG-CW" target=_blank>CustomWorks</a> - "customize any embroidery designs to design your own unique creations"
  3928. [checkdisk]
  3929. Filename=mscas.exe
  3930. Confirmed=X
  3931. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojvagona.html" target=_blank>VAGON-A</a> TROJAN!
  3932. [checkit]
  3933. Filename=ToolBox.exe
  3934. Confirmed=U
  3935. Description=CheckIt Toolbox from <a href="http://cssvc.pcworld.compuserve.com/computing/cis/article/0,aid,15497,00.asp" target="_blank">WinCheckIt Diagnostic Software</a>. Toolbox automatically backs up critical system files (such as .ini files and the Windows Registry), and performs a check on various system parameters at intervals you specify
  3936. [checkit 86]
  3937. Filename=CheckIt86.exe
  3938. Confirmed=U
  3939. Description=<a href="http://www.smithmicro.com/default.tpl?group=product_full&sku=C86WINEE" target=_blank>CheckIt 86</a> popup blocker
  3940. [checkmsgplus]
  3941. Filename=MsgPlusH.dll, VerifyInstallation
  3942. Confirmed=Y
  3943. Description=Added by MSN Messenger Plus, a third party extension to MSN Messenger. This is the auto-update feature - see <a href="http://www.patchou.com/msgplus/faq.htm#stopconnect" target="_blank">here</a> for more info.
  3944. [checkscan32]
  3945. Filename=regload16.exe
  3946. Confirmed=X
  3947. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_AEBOT.K&VSect=P" target=_blank>AEBOT.K</a> WORM!
  3948. [checktime]
  3949. Filename=ct.exe
  3950. Confirmed=?
  3951. Description=<font color="#FF0000">Found in the HPSelectFrontend directory on a HP machine. What is it's purpose and is it required?</font>
  3952. [checkvcr]
  3953. Filename=IOMagic.exe
  3954. Confirmed=Y
  3955. Description=Driver for the <a href="http://www.iomagic.com/" target=_blank>I/OMagic</a> Personal Video Recorder (DR-PCTV100)
  3956. [cherrykeyman]
  3957. Filename=KeyMan.exe
  3958. Confirmed=U
  3959. Description=Multimedia keyboard manager for the <a href="http://www.cherrycorp.com/english/" target="_blank">Cherry</a> keyboard series. Only required if you use any of the special keys
  3960. [china11msn]
  3961. Filename=CHINA11MSN.EXE
  3962. Confirmed=X
  3963. Description=Added by the <a href="http://www.symantec.com/avcenter/venc/data/w32.envid.o@mm.html" target=_blank>ENVID.O</a> WORM!
  3964. [chinesestar]
  3965. Filename=cstar.exe
  3966. Confirmed=U
  3967. Description=Chinese language support software
  3968. [chipdrivepinmanager]
  3969. Filename=sokscmpn.exe
  3970. Confirmed=U
  3971. Description=<a href="http://www.chipdrive.de/cgi-bin/edcstore.cgi" target=_blank>ChipDrive</a> Smartcard software
  3972. [chipdrivesmartcardmanager]
  3973. Filename=SCMgr.exe
  3974. Confirmed=U
  3975. Description=<a href="http://www.chipdrive.de/cgi-bin/edcstore.cgi" target=_blank>ChipDrive</a> Smartcard software
  3976. [chkadmin]
  3977. Filename=CHKADMIN.EXE
  3978. Confirmed=N
  3979. Description=Compaq Network Management System. When running, it places an icon in the system tray titled "Intelligent Manageability"
  3980. [chkdsk]
  3981. Filename=c:\autoexec.bat
  3982. Confirmed=X
  3983. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.anpes@mm.html" target=_blank>ANPES</a> WORM!
  3984. [choke]
  3985. Filename=Choke.exe-blahh
  3986. Confirmed=X
  3987. Description=Added by the <a href="http://www.symantec.com/avcenter/venc/data/w32.choke.worm.html" target="_blank">CHOKE</a> WORM!
  3988. [chope]
  3989. Filename=runlli32.exe
  3990. Confirmed=X
  3991. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojqqpassu.html" target=_blank>QQPASS-U</a> TROJAN!
  3992. [chostsv]
  3993. Filename=chostsv.exe
  3994. Confirmed=X
  3995. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/pwsteal.banpaes.c.html" target="_blank">BANPAES.C</a> TROJAN!
  3996. [christmas music player]
  3997. Filename=TTEST6.EXE
  3998. Confirmed=N
  3999. Description=<I>"</I>Christmas Music Player<I> </I>brings the music of the Christmas Holiday to your desktop"
  4000. [chromemark]
  4001. Filename=keysh.exe
  4002. Confirmed=?
  4003. Description=<font color="#FF0000">Related to <a href="http://chromium.com/chromemark.html" target="_blank">this</a>. Don't know what keysh.exe does though and if it's required</font>
  4004. [chronitelinittv]
  4005. Filename=CHTVINIT.EXE
  4006. Confirmed=?
  4007. Description=<font color="#FF0000">??</font>
  4008. [ciabackdoor]
  4009. Filename=msldr.com
  4010. Confirmed=X
  4011. Description=Added by a VIRUS!
  4012. [cihost.exe]
  4013. Filename=cihost.exe
  4014. Confirmed=X
  4015. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/trojan.linst.html" target="_blank">LINST</a> TROJAN!
  4016. [cijxp2pserver]
  4017. Filename=CIJxP2PS.EXE
  4018. Confirmed=N
  4019. Description=Compaq printer utility which is required in order to make the printer work correctly - "x" depends upon the model, ie, for IJ300 x=3, for IJ700 x=7
  4020. [cisrvr program]
  4021. Filename=CISRVR.EXE
  4022. Confirmed=N
  4023. Description=Related to internet setup on Compaq PC's
  4024. [cissi]
  4025. Filename=Cissi.exe
  4026. Confirmed=X
  4027. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.cissi.a@mm.html" target="_blank">CISSI.A</a> WORM!
  4028. [citiucs]
  4029. Filename=CitiUCS.exe
  4030. Confirmed=U
  4031. Description=Citibank <a href="http://www.citibank.com/us/cards/tour/cb/shp_van.htm" target=_blank>Virtual Account Numbers</a> - "With this free service for Citi cardmembers, you never have to give out your real credit card number online"
  4032. [citivan]
  4033. Filename=CitiVAN.exe
  4034. Confirmed=N
  4035. Description=Option from <a href="http://www.citibank.com/" target="_blank">Citibank</a> to change a credit card number in a random fashion for each purchase. The number will only be used once and never again
  4036. [cjet]
  4037. Filename=CJet.exe
  4038. Confirmed=X
  4039. Description=Added by the <a href="http://www.sarc.com/avcenter/venc/data/adware.fftoolbar.html" target=_blank>Adware.FFToolBar</a> adware toolbar
  4040. [cjstcom]
  4041. Filename=Cjstcom.exe
  4042. Confirmed=Y
  4043. Description=Canon printer BJ status language monitor
  4044. [clamwin]
  4045. Filename=ClamTray.exe
  4046. Confirmed=Y
  4047. Description=<a href="http://www.clamwin.com/" target=_blank>ClamWin</a> antivirus
  4048. [clclset]
  4049. Filename=CLCL.exe
  4050. Confirmed=U
  4051. Description=CLCL clipboard caching utility
  4052. [cleaneasyimg]
  4053. Filename=cleanall.exe
  4054. Confirmed=?
  4055. Description=<font color="#FF0000">??</font>
  4056. [cleanregpath]
  4057. Filename=CleanReg.exe
  4058. Confirmed=?
  4059. Description=Apparently Annex A ADSL modem related. <font color="#FF0000">What does it do and is it required?</font>
  4060. [cleansweep smart sweep- internet sweep]
  4061. Filename=Csinsm32.exe
  4062. Confirmed=U
  4063. Description=Automatic logging of installs from Norton CleanSweep - available via Start -> Programs
  4064. [cleansweep useage watch]
  4065. Filename=CSUSEM32.EXE
  4066. Confirmed=N
  4067. Description=Quarterdeck/Norton CleanSweep component - tracks how often you use files and alerts you to files that have not been used for a specified period of time
  4068. [cleanup]
  4069. Filename=ONICTASK.EXE
  4070. Confirmed=N
  4071. Description=<a href="http://www.aladdinsys.com/internetcleanup/" target="_blank">Internet Cleanup</a> from Aladdin Systems (used to be by OnTrack) - cleans up tracks left by browsing the internet
  4072. [cleanupprogram]
  4073. Filename=cleanup.exe
  4074. Confirmed=?
  4075. Description=<font color="#FF0000">In a C:\Sony\sys folder - Sony Vaio related?</font>
  4076. [clean_service]
  4077. Filename=clean_service.cmd
  4078. Confirmed=X
  4079. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.refaz.html" target=_blank>REFAZ</a> WORM!
  4080. [clfmon.exe]
  4081. Filename=clfmon.exe
  4082. Confirmed=X
  4083. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojagentbj.html" target=_blank>AGENT-BJ</a> TROJAN!
  4084. [click radio tuner]
  4085. Filename=clickr~1.exe
  4086. Confirmed=N
  4087. Description=<a href="http://www.clickradio.com/home.html" target="_blank">ClickRadio</a> - subscription service playing radio music via the internet
  4088. [click tray calendar]
  4089. Filename=ClickT~1.EXE
  4090. Confirmed=N
  4091. Description=<a href="http://waseo.de/en/Freeware2/ClickTrayE/clicktraye.html" target="_blank">ClickTray Calendar</a> - shows holidays, reminders of various anniversaries,tasks etc
  4092. [clickme]
  4093. Filename=ClickMe.exe
  4094. Confirmed=N
  4095. Description=<a href="http://www.trendmicro.com/vinfo/jokes/jokesDetails.asp?JNAME=JOKE_CLICKME.A" target=_blank>ClickM</a> "JOKE" program
  4096. [clickoff]
  4097. Filename=Clickoff.exe
  4098. Confirmed=U
  4099. Description=<a href="http://www.johanneshuebner.com/en/clickoff.html" target="_blank">Clickoff</a> automatically dismisses annoying dialog boxes
  4100. [cliconfg]
  4101. Filename=CLICONFG.EXE
  4102. Confirmed=X
  4103. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_OPASERV.T" target="_blank">OPASERV.T</a> WORM!
  4104. [client access api daemon]
  4105. Filename=cwbappcd.exe
  4106. Confirmed=U
  4107. Description=IBM iSeries Client Access, see <a href="http://www-1.ibm.com/servers/eserver/iseries/access/" target=_blank>here</a>
  4108. [client access check version]
  4109. Filename=cwbckver.exe
  4110. Confirmed=N
  4111. Description=Part of IBM's <a href="http://www-1.ibm.com/servers/eserver/iseries/access/" target="_blank">iSeries</a> (nee As/400) Client Access - communications suite that allows desktop, browser and wireless access to iSeries servers. Checks the software version on your PC to that of the iSeries it is connected to. Not required - and can be turned off in the Client Access properties. It's a waste of resources
  4112. [client access express welcome]
  4113. Filename=cwbwlwiz.exe
  4114. Confirmed=?
  4115. Description=Welcome wizard launcher - Part of IBM's <a href="http://www-1.ibm.com/servers/eserver/iseries/access/" target="_blank">iSeries</a> (nee As/400) Client Access - communications suite that allows desktop, browser and wireless access to iSeries servers. <font color="#FF0000">What does it do and is it required?</font>
  4116. [client access help update]
  4117. Filename=cwbinhlp.exe
  4118. Confirmed=N
  4119. Description=Client Access Help Registry Update Function - part of IBM's <a href="http://www-1.ibm.com/servers/eserver/iseries/access/" target="_blank">iSeries</a> (nee As/400) Client Access - communications suite that allows desktop, browser and wireless access to iSeries servers. It only updates the help files on your PC to match the level of the attached iSeries
  4120. [client access service]
  4121. Filename=CwbSvStr.Exe
  4122. Confirmed=N
  4123. Description=Part of IBM's <a href="http://www-1.ibm.com/servers/eserver/iseries/access/" target="_blank">iSeries</a> (nee As/400) Client Access - communications suite that allows desktop, browser and wireless access to iSeries servers. Useful if you are going to access the iSeries through Windows Explorer to move files back and forth between Windows folders and iSeries folders. This is a tool that is only used by Client Access administrators (usually) so it is not required - a waste of resources
  4124. [client access taskbar]
  4125. Filename=cwbuitsk.exe
  4126. Confirmed=U
  4127. Description=IBM iSeries Client Access taskbar, see <a href="http://www-1.ibm.com/servers/eserver/iseries/access/" target=_blank>here</a>
  4128. [client agent for arcserve]
  4129. Filename=W95AGENT.EXE
  4130. Confirmed=?
  4131. Description=Part of <a href="http://www3.ca.com/Solutions/ProductFamily.asp?ID=115" target="_blank">Brightstor ARCserve Backup</a> from Computer Associates. <font color="#FF0000">What does it do and is it required?</font>
  4132. [client for microsoft networks]
  4133. Filename=msclient32.exe
  4134. Confirmed=X
  4135. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32sdbotbxq.html" target=_blank>SDBOT-BXQ</a> WORM!
  4136. [client server control process]
  4137. Filename=[path to trojan]
  4138. Confirmed=X
  4139. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojagenthr.html" target=_blank>AGENT-HR</a> TROJAN!
  4140. [client update]
  4141. Filename=wup.exe
  4142. Confirmed=X
  4143. Description=Added by a variant of the <a href="http://www.sophos.com.au/virusinfo/analyses/w32opankia.html" target=_blank>OPANKI-A</a> WORM!
  4144. [clientman1]
  4145. Filename=mscman.exe
  4146. Confirmed=X
  4147. Description=<a href="http://research.sunbelt-software.com/threat_display.cfm?name=ClientMan&threatid=3754&search=ClientMan" target=_blank>ClientMan</a> parasite variant
  4148. [clik status monitor]
  4149. Filename=toolsclickstat.exe
  4150. Confirmed=N
  4151. Description=Part of Iomega Tools to let you know whether an Iomega PocketZip (nee Clik) removable drive cartridge is installed
  4152. [clipbook service]
  4153. Filename=Clipsrv.exe
  4154. Confirmed=N
  4155. Description=Supports Windows XP ClipBook Viewer, which allows pages to be seen by remote ClipBooks
  4156. [clipmate5x]
  4157. Filename=ClipMt5x.exe
  4158. Confirmed=N
  4159. Description=<a href="http://www.thornsoft.com/ProductOverview.asp" target="_blank">Clip Mate 5.x</a> by Thornsoft. Utility that allows you to store more than one item in the clipboard. Available via Start -> Programs
  4160. [clipmate6]
  4161. Filename=CLIPMT60.EXE
  4162. Confirmed=N
  4163. Description=<a href="http://www.thornsoft.com/new_60.htm" target="_blank">Clip Mate 6</a> by Thornsoft. Utility that allows you to store more than one item in the clipboard. Available via Start -> Programs
  4164. [clipomatic]
  4165. Filename=Clipomatic.exe
  4166. Confirmed=N
  4167. Description=Mike Lin's <a href="http://www.mlin.net/Clipomatic.shtml" target="_blank">Clipomatic</a> is a clipboard cache program - it remembers what was copied to the clipboard even after new data is copied, and allows you to retrieve the old data
  4168. [cliptrak]
  4169. Filename=ClipTrak.exe
  4170. Confirmed=N
  4171. Description=<a href="http://www.pcmag.com/article2/0,4149,114185,00.asp" target="_blank">ClipTrak</a> - clipboard extender
  4172. [cliptrakker]
  4173. Filename=ClipTrakker.exe
  4174. Confirmed=N
  4175. Description=<a href="http://www.cliptrakker.com/" target="_blank">Cliptrakker</a> - clipboard extender
  4176. [clmfrontpanel]
  4177. Filename=clmpanel.exe
  4178. Confirmed=U
  4179. Description=System tray status/display/configuration utility for a number of modems. Can be disabled by right-clicking on the tray icon. If disabled, connection status is lost
  4180. [clnwall]
  4181. Filename=rundll.exe setupx.dll, InstallHinfSection ..delwall.inf
  4182. Confirmed=?
  4183. Description=<font color="#FF0000">??</font>
  4184. [clock]
  4185. Filename=[various filenames]
  4186. Confirmed=X
  4187. Description=<a href="http://securityresponse.symantec.com/avcenter/venc/data/pf/adware.livechat.html" target=_blank>LiveChat</a> Adware - known file names include: mssetup.exe, kstatus.exe, spoolsv.exe, sptsupd.exe, osk.exe, msswchx.exe, netdde.exe, msbkup.exe
  4188. [clock manager]
  4189. Filename=amsngr.exe
  4190. Confirmed=X
  4191. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojsdbotxm.html" target= blank>SDBOT-XM</a> TROJAN!
  4192. [clocksync]
  4193. Filename=Sync.exe
  4194. Confirmed=X
  4195. Description=<a href="http://www.clock-sync.com/" target="_blank">ClockSync</a> - synchronizes your system clock with an internet time server. It's by WhenU, the makers of the Save Now spyware, and they're usually seen in tandem, so it's advised to replace it with one of may spyware free alternatives available
  4196. [clockwise]
  4197. Filename=CLOCKWISE.EXE
  4198. Confirmed=U
  4199. Description=<a href="http://www.rjsoftware.com/ClockWise/" target="_blank">ClockWise</a> - produced by R J Software - a time utility. It is a schedueler not only for dates, but you can choose it to run programs at any time. It also updates the time by connecting to an atomic clock server. This is a spyware-free alternative to ClockSync
  4200. [clonecd]
  4201. Filename=CloneCDTray.exe
  4202. Confirmed=U
  4203. Description=System tray for <a href="http://www.elby.org/CloneCD/english/" target="_blank">CloneCD</a> - the only useful option is "Hide CDR Media" only available via this tray. Has additional unknown functions in later versions
  4204. [clonecdelbycdfl]
  4205. Filename=ElbyCheck.exe
  4206. Confirmed=U
  4207. Description=From <a href="http://www.elby.org/english/corp/index.htm" target="_blank">Elaborate Bytes</a> who make CloneCD - monitors the installed filters of CD-ROMs/DVD-ROMs. Note - under Win2K removing this from startup causes the CD drive in the computer to not be recognized in the OS and after rechecking it prompts that the driver has been corrupted and asks you to restart the computer to fix it
  4208. [clonecdtray]
  4209. Filename=CloneCDTray.exe
  4210. Confirmed=U
  4211. Description=System tray for <a href="http://www.elby.org/CloneCD/english/" target="_blank">CloneCD</a> - the only useful option is "Hide CDR Media" only available via this tray. Has additional unknown functions in later versions
  4212. [clotusorgreg0]
  4213. Filename=prtStart.exe Orgprt.exe
  4214. Confirmed=?
  4215. Description=Lotus <a href="http://www.lotus.com/products/smrtsuite.nsf/wPages/smartsuite?OpenDocument" target="_blank"> SmartSuite</a> related. In a LotusOrgReg folder. <font color="#FF0000"> Unclear what exactly it does?</font>
  4216. [clre]
  4217. Filename=mmdc.exe
  4218. Confirmed=X
  4219. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojpurscanai.html" target=_blank>PURSCAN-AI</a> TROJAN!
  4220. [clrschloader]
  4221. Filename=Loader.exe
  4222. Confirmed=X
  4223. Description=Clearsearch variant of <a href="http://www.igetnet.com/iGetNet_Home.asp" target="_blank"> IGetNet</a>
  4224. [cm-smwizard]
  4225. Filename=SmWizard.exe
  4226. Confirmed=?
  4227. Description=SmartWizard MFC Application - associated with C-Media who produce audio chipsets commonly used for on-board sound on motherboards. <font color="#FF0000">What does it do and is it required?</font>
  4228. [cma]
  4229. Filename=cma.exe
  4230. Confirmed=U
  4231. Description=<a href="http://www.desksitemusic.com/" target="_blank">DeskSite CMA siftware</a> - "retrieves new content from the DeskSite Data Center"
  4232. [cmapp]
  4233. Filename=cmappclient.exe
  4234. Confirmed=X
  4235. Description=CasClient adware - also detected as the <a href="http://securityresponse.symantec.com/avcenter/venc/data/trojan.cmapp.html" target=_blank>CMAPP</a> TROJAN!
  4236. [cmaudio]
  4237. Filename=Rundll32 cmicnfg.cpl, CMICtrlWnd
  4238. Confirmed=N
  4239. Description=System tray control panel for C-Media based soundcards - often included on popular motherboards with in-built audio. Available via Start -> Settings -> Control Panel
  4240. [cmd]
  4241. Filename=cmd32.exe
  4242. Confirmed=X
  4243. Description=Added by the <a href="http://www.viruslibrary.com/virusinfo/Worm.P2P.Tanked.htm" target="_blank">TANKED</a> WORM!
  4244. [cmd32]
  4245. Filename=configs.exe
  4246. Confirmed=X
  4247. Description=Hijacker, also detected as the <a href="http://vil.nai.com/vil/content/v 126408.htm" target= blank>QURL-2</a> TROJAN!
  4248. [cmdcon]
  4249. Filename=cmdcon.exe
  4250. Confirmed=X
  4251. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=TROJ_CRYPTER.A" target="_blank">CRYPTER.A</a> TROJAN!
  4252. [cme]
  4253. Filename=cme.exe
  4254. Confirmed=X
  4255. Description=Part of <a href="http://www.thiefware.com/info/data.gator.shtml" target="_blank"> Gator</a> advertising spyware - see <a href="http://www.pchell.com/support/gator.shtml" target="_blank">here</a> for removal instructions
  4256. [cmesys]
  4257. Filename=CMEsys.exe
  4258. Confirmed=X
  4259. Description=Part of <a href="http://www.thiefware.com/info/data.gator.shtml" target="_blank"> Gator</a> advertising spyware - see <a href="http://www.pchell.com/support/gator.shtml" target="_blank">here</a> for removal instructions
  4260. [cmeupd]
  4261. Filename=CMEupd.exe
  4262. Confirmed=X
  4263. Description=Part of <a href="http://www.thiefware.com/info/data.gator.shtml" target="_blank"> Gator</a> advertising spyware - see <a href="http://www.pchell.com/support/gator.shtml" target="_blank">here</a> for removal instructions
  4264. [cmgrdian]
  4265. Filename=CMGrdian.exe
  4266. Confirmed=?
  4267. Description=One of the McAfee shared components. <font color="#FF0000"> What does it do and is it required?</font>
  4268. [cmman]
  4269. Filename=CMMan.exe
  4270. Confirmed=X
  4271. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/trojan.cmapp.html" target=_blank>CMAPP</a> TROJAN!
  4272. [cmmon32sys]
  4273. Filename=cmmon32.exe
  4274. Confirmed=X
  4275. Description=Added by the SMALL.CL TROJAN!
  4276. [cmpciaudio]
  4277. Filename=RunDll32 CMICNFG3.CPL, CMICtrlWnd
  4278. Confirmed=U
  4279. Description=Registers the Control Panel applet for a C-Media PCI sound card
  4280. [cmpdpsrv]
  4281. Filename=CMPDPSRV.EXE
  4282. Confirmed=U
  4283. Description=<a href="http://www.viewahead.com/PDP.htm" target="_blank">Printer Driver Plus</a> from ViewAhead Technology (formerly DeviceGuys, Inc.). "Printer Driver Plus seamlessly integrates all the necessary components of a printer driver, plus more." Installed with some Compaq and Lexmark printers
  4284. [cms]
  4285. Filename=iserver.exe
  4286. Confirmed=X
  4287. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojdloaderwk.html" target=_blank>DLOADER-WK</a> TROJAN!
  4288. [cmss]
  4289. Filename=system.exe
  4290. Confirmed=X
  4291. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  4292. [cmsystem]
  4293. Filename=CMSystem.exe
  4294. Confirmed=X
  4295. Description=<a href="http://research.sunbelt-software.com/threat_display.cfm?name=Adw.ConsumerAlertSystem.CASClient&threatid=40038" target=_blank>CASClient</a> adware variant
  4296. [cmt101]
  4297. Filename=cmt101.exe
  4298. Confirmed=X
  4299. Description=Added by a variant of the <a href="http://www.sophos.com/virusinfo/analyses/trojcrypterc.html" target="_blank">CRYPTER.C</a> TROJAN!
  4300. [cmx32]
  4301. Filename=cmx32.exe
  4302. Confirmed=X
  4303. Description=Added by the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=40493" target=_blank>GEMA.D</a> TROJAN!
  4304. [cn323]
  4305. Filename=cnfrm33.exe
  4306. Confirmed=X
  4307. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.mimail.g@mm.html" target=_blank>MIMAIL.G</a> WORM!
  4308. [cnbabe]
  4309. Filename=CNBABE.EXE
  4310. Confirmed=X
  4311. Description=Appears to be spyware added by KAZAA (and maybe others) that displays pop-up ads whilst you're browsing
  4312. [cnet]
  4313. Filename=kontiki.exe
  4314. Confirmed=N
  4315. Description=<a href="http://help.kontiki.com/enduser/group.jsp;jsessionid=2C47C896EA1784C5321FD3E6845E8157?node=2846" target="_blank">Kontiki Delivery Manager</a> - Windows-based client software that enables secure delivery of content to users' desktops
  4316. [cnfrm32]
  4317. Filename=cnfrm.exe
  4318. Confirmed=X
  4319. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.mimail.d@mm.html" target=_blank>MIMAIL.D</a> WORM!
  4320. [cnsmax]
  4321. Filename=Internat.exe
  4322. Confirmed=X
  4323. Description=Added by the <a href="http://www.symantec.com/avcenter/venc/data/backdoor.pointex.html" target="_blank">POINTEX</a> TROJAN! Note - the real internat.exe resides in %windir%\system (where %windir% is the Windows directory - C:\Windows or C:\Winnt) whereas this version resides in %windir%
  4324. [cnsmin]
  4325. Filename=Rundll32.exe CNSMIN.DLL, Rundll32
  4326. Confirmed=X
  4327. Description=CnsMin "<a href="http://217.115.153.73/parasite/CnsMin.html" target="_blank">Chinese Keywords</a>" hijacker related
  4328. [cnxadsll]
  4329. Filename=CnxAdslL.exe
  4330. Confirmed=Y
  4331. Description=DLink, Zoom, or Conexant modem driver
  4332. [cnxdsltaskbar]
  4333. Filename=CnxDslTb.exe
  4334. Confirmed=N
  4335. Description=Connexant DSL Taskbar as used on Acess Runner and Samsung AHT-E310 ADSL modems
  4336. [codename dashboard]
  4337. Filename=dashboard.exe
  4338. Confirmed=U
  4339. Description=<a href="http://www.downlinx.com/proghtml/415/41557.htm" target="_blank">Codename: Dashboard</a> - "an application that resides at the side of your screen. Built on the Microsoft .NET Framework, it is a host for interchangeable components through which C.D. allows you to have any information you want, on your desktop, all the time"
  4340. [coldlife -icmp]
  4341. Filename=Systray.exe
  4342. Confirmed=X
  4343. Description=Added by the <a href="http://vil.nai.com/vil/content/Print100363.htm" target="_blank">FLOOD.AV</a> TROJAN! Note - this is not the legitimate <a href="http://www.liutilities.com/products/wintaskspro/processlibrary/systray/" target="_blank">systray.exe</a> process
  4344. [coloreal]
  4345. Filename=coloreal.exe
  4346. Confirmed=U
  4347. Description=Makes colours sharper and brighter, but will only work with coloreal capable monitors
  4348. [colorific control panel]
  4349. Filename=Hgcctl95.exe
  4350. Confirmed=N
  4351. Description=From E_Color. Colorific delivers accurate gamma and color temperature across your entire system - monitor to printer and digital camera to monitor
  4352. [com+ event system]
  4353. Filename=DRWTSN16.EXE
  4354. Confirmed=X
  4355. Description=Added by a variant of the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.hllw.lovgate@mm.html" target="_blank">LOVGATE</a> WORM!
  4356. [com+ eventsystem services]
  4357. Filename=ECSERVER.EXE
  4358. Confirmed=X
  4359. Description=Added by a variant of the <a href="http://vil.nai.com/vil/content/v_100454.htm" target=_blank>SDBOT</a> WORM!
  4360. [com+ sys]
  4361. Filename=csrs.exe
  4362. Confirmed=X
  4363. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32forbotbt.html" target=_blank>FORBOT-BT</a> WORM!
  4364. [com+ system applications]
  4365. Filename=lsas.exe
  4366. Confirmed=X
  4367. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_AGOBOT.SE" target=_blank>AGOBOT.SE</a> WORM!
  4368. [com-ip]
  4369. Filename=COMIP.EXE
  4370. Confirmed=N
  4371. Description=COM-IP Virtual Modem Driver (COM-IP Creates a Fake Serial Port that allows you to use older DOS Based Communications Programs over Telnet. Type atdt host.domain.com instead of atdt 5551212)
  4372. [comagent]
  4373. Filename=ComAgent.exe
  4374. Confirmed=U
  4375. Description=ComAgent - <a href="http://www.altn.com/products/default.asp?product_id=MDaemon" target=_blank>MDaemon's</a> instant messaging client
  4376. [combo.exe]
  4377. Filename=combo.exe
  4378. Confirmed=X
  4379. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojchimoc.html" target=_blank>CHIMO-C</a> TROJAN!
  4380. [combop.exe]
  4381. Filename=combop.exe
  4382. Confirmed=X
  4383. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojbowfeeda.html" target=_blank>BOWFEED-A</a> TROJAN!
  4384. [comcast network]
  4385. Filename=ribiva.exe
  4386. Confirmed=X
  4387. Description=Added by an <a href="http://securityresponse.symantec.com/avcenter/venc/data/irc.trojan.html" target= blank>IRC TROJAN</a> variant!
  4388. [comcastsupport]
  4389. Filename=tgkill.exe
  4390. Confirmed=X
  4391. Description=Comcast (the cable folks who are replacing @home in some parts of the USA) have struck a deal with Tioga to provide an "enhanced" support and self-repairing tool. This is "beta" at present and was made available to download by mistake at present. Remove via Start -> Settings -> Add/Remove Programs
  4392. [comcfg]
  4393. Filename=comcfg.exe
  4394. Confirmed=X
  4395. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=BKDR_TOADCOM.A" target="_blank">TOADCOM.A</a> TROJAN!
  4396. [comctl32]
  4397. Filename=comctl32.exe
  4398. Confirmed=X
  4399. Description=Adware - recognized by <a href="http://www.kaspersky.com/personalpro" target=_blank>Kaspersky</a> antivirus and others as TrojanDownloader.Win32.Agent.am
  4400. [comdrv32]
  4401. Filename=svdhost.exe
  4402. Confirmed=U
  4403. Description=<a href="http://www.protectcom.com/" target="_blank">Orvell Monitoring 2003</a> - surveillance software that creates records of everything people do on a computer, ie, spying or monitoring depending upon how you call it. Note - asks for permission to contact the IP address of http://www.protectcom.com/
  4404. [comm driver]
  4405. Filename=commh32.exe
  4406. Confirmed=U
  4407. Description=G Data "PC Spion". PC monitoring and surveilling software, captures all users activity on the PC, see <a href="http://www.chip.de/artikel/c_artikel_8806643.html" target=_blank>here</a>. Disable/remove if you didn't install it yourself!
  4408. [command prompt32]
  4409. Filename=CmdPrompt32.pif
  4410. Confirmed=X
  4411. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.assiral.b@mm.html" target=_blank>ASSIRAL.B</a> WORM!
  4412. [commctr]
  4413. Filename=commctr.exe
  4414. Confirmed=N
  4415. Description="<a href="http://commcenter.net2phone.com/GLPPublish.asp?idpage=features" target="_blank">Net2Phone CommCenter</a> is the latest in Internet voice technology allowing you to place calls easily all over the world right from your PC!". Available via Start -> Programs
  4416. [compaq alerter]
  4417. Filename=CPQAlert.exe
  4418. Confirmed=U
  4419. Description=Compaq's Insight Manager Agent - a tool that allows for "fault, performance, and configuration management". Recommended for corporate users only. It's best removed if installed but not wanted, rather than disabled at startup. See <a href="http://www.compaq.com/products/servers/management/cim-description.html" target="_blank">here</a> for more information
  4420. [compaq computer corp sccenter module]
  4421. Filename=SCCENTER.EXE
  4422. Confirmed=N
  4423. Description=For Compaq PC's. Part of Backweb
  4424. [compaq computer security]
  4425. Filename=Rundll32.exe SECURE32.CPL, Service
  4426. Confirmed=?
  4427. Description=<font color="#FF0000">??</font>
  4428. [compaq dmi]
  4429. Filename=cpqdmi.exe
  4430. Confirmed=N
  4431. Description=Compaq version of the Desktop Management Interface
  4432. [compaq drivers]
  4433. Filename=F1rewalls.exe
  4434. Confirmed=X
  4435. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32sdbotwd.html" target= blank>SDBOT-WD</a> WORM!
  4436. [compaq internet setup]
  4437. Filename=inetwizard.exe
  4438. Confirmed=N
  4439. Description=For Compaq PC's. Runs Compaq internet setup wizard and offers you to signup from ISP list
  4440. [compaq jes drivers]
  4441. Filename=winjes.exe
  4442. Confirmed=X
  4443. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32sdbotxr.html" target= blank>SDBOT-XR</a> WORM!
  4444. [compaq knowledge center]
  4445. Filename=silent.exe & matcli.exe
  4446. Confirmed=U
  4447. Description="matcli.exe is a motive Assistant Command line interface that gathers information about your system's identity like your name email address, city, state, etc and gets written to a log file while silent.exe executes matcli.exe quietly in the background. Compaq Knowledge Center is required to run with the Help and Support program. If you uncheck Compaq Knowledge Center and and then run help and Support it will add another Compaq Knowledge Center in the startup menu. If you remove the Compaq Knowledge Center in the add/remove program some help menus in help and support will not be available like Fix my Presario, Preference, and Contact Technical Support". You decide
  4448. [compaq message server]
  4449. Filename=COMPAQ-RBA.EXE
  4450. Confirmed=N
  4451. Description=Applies to the CPQBootPerfDB entry as well. These files generate some kind of server or servlet that attempts to connect with Compaq online. They are like Trojans, but fairly harmless. They send information on the "Compaq Advisor/Compaq Message Screener" application that comes with every Compaq computer and provide feedback on how computer users use the Message Advisor. These messages appear occasionally and instruct and advise users on their computer and its use. They generally attempt to get you (these messages) to connect to Compaq's website. They may be safely disabled via (1) MSCONFIG or (2) Start -> Programs -> Compaq Advisor -> Advisor Settings under the "advanced" tab. Not required and can cause problems
  4452. [compaq pk daemon]
  4453. Filename=cpqkl.exe
  4454. Confirmed=U
  4455. Description=For Compaq laptops for programming user configurable keys. Not required unless you use them
  4456. [compaq print fax]
  4457. Filename=cpqa1000.exe
  4458. Confirmed=X
  4459. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_SDBOT.BCV&VSect=T" target=_blank>SDBOT.BCV</a> WORM! Please take note of the difference between the legitimate Compaq Fax Utility Name (A1000 Settings Utility) and the name (Compaq Print Fax) used by this worm
  4460. [compaq service drivers 32]
  4461. Filename=compq32.exe
  4462. Confirmed=X
  4463. Description=Added by a variant of the <a href="http://vil.nai.com/vil/content/v_100454.htm" target=_blank>SDBOT</a> WORM!
  4464. [compaq service drivrs]
  4465. Filename=copq.exe
  4466. Confirmed=X
  4467. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target= blank>RBOT</a> WORM!
  4468. [compaq services drivers]
  4469. Filename=ndt32.exe
  4470. Confirmed=X
  4471. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_RBOT.CQZ&VSect=T" target=_blank>RBOT.CQZ</a> WORM!
  4472. [compaq sound drivers for windows]
  4473. Filename=sounddr.exe
  4474. Confirmed=X
  4475. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32sdbotxg.html" target=_blank>SDBOT-XG</a> WORM!
  4476. [compaq video cd watcher]
  4477. Filename=??
  4478. Confirmed=N
  4479. Description=For Compaq PC's. MPEG viewer
  4480. [compaqhw comp manager]
  4481. Filename=cpqhcm.exe
  4482. Confirmed=?
  4483. Description=<font color="#FF0000">Running on a Compaq laptop - any ideas?</font>
  4484. [compaqprintray]
  4485. Filename=printray.exe
  4486. Confirmed=N
  4487. Description=Puts printer icon in the System Tray. When this option is disabled you will no longer be able to access the Control Program or Printer Driver directly from your desktop
  4488. [compaqs service driver]
  4489. Filename=copypad32.exe
  4490. Confirmed=X
  4491. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_SDBOT.CSO&VSect=T" target=_blank>SDBOT.CSO</a> WORM!
  4492. [compaqs service drivers]
  4493. Filename=compqs.exe
  4494. Confirmed=X
  4495. Description=Added by a variant of the <a href="http://vil.nai.com/vil/content/v_100454.htm" target=_blank>SDBOT</a> WORM!
  4496. [compaqsystray]
  4497. Filename=cpqpscp.exe
  4498. Confirmed=N
  4499. Description=Compaq System Tray icon
  4500. [compatibility service process]
  4501. Filename=regsvs.exe
  4502. Confirmed=X
  4503. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.gaobot.yn.html" target="_blank">GAOBOT.YN</a> WORM!
  4504. [compd service drivrs]
  4505. Filename=codq.exe
  4506. Confirmed=X
  4507. Description=Added by a variant of the <a href="http://vil.nai.com/vil/content/v_100454.htm" target=_blank>SDBOT</a> WORM!
  4508. [computing technologie firewall]
  4509. Filename=lsauth.exe
  4510. Confirmed=X
  4511. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32sdbotwx.html" target= blank>SDBOT-WX</a> WORM!
  4512. [comsmdexe]
  4513. Filename=comsmd.exe
  4514. Confirmed=N
  4515. Description=3Com tray icon
  4516. [comtry web searcher]
  4517. Filename=wstray.exe
  4518. Confirmed=X
  4519. Description=Comtry MP3 Downloader related - spyware
  4520. [comxt]
  4521. Filename=comxt.exe
  4522. Confirmed=X
  4523. Description=Added by the <a href="http://www.symantec.com/avcenter/venc/data/trojan.comxt.html" target="_blank">COMXT</a> TROJAN!
  4524. [config]
  4525. Filename=service.exe
  4526. Confirmed=X
  4527. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.israz.b@mm.html" target="_blank">ISRAZ.B</a> WORM!
  4528. [config loadation]
  4529. Filename=iEEexplore.exe
  4530. Confirmed=X
  4531. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.sdbot.h.html" target="_blank">SDBOT.H</a> TROJAN!
  4532. [config loadatiorin]
  4533. Filename=I3Explorer.exe
  4534. Confirmed=X
  4535. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.sdbot.h.html" target="_blank">SDBOT.H</a> TROJAN!
  4536. [config loader for microsoft windows]
  4537. Filename=mwincfg32.exe
  4538. Confirmed=X
  4539. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_AGOBOT.BD" target="_blank">AGOBOT.BD</a> WORM!
  4540. [config loader2]
  4541. Filename=explores.exe
  4542. Confirmed=X
  4543. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.hllw.gaobot.bt.html" target="_blank">GAOBOT.BT</a> WORM!
  4544. [config loadr]
  4545. Filename=winsys32.exe
  4546. Confirmed=X
  4547. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32agobothn.html" target=_blank>AGOBOT-HN</a> WORM!
  4548. [config33.exe]
  4549. Filename=Config33.exe
  4550. Confirmed=X
  4551. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=BKDR_SDBOT.T" target=_blank>SDBOT.T</a> TROJAN!
  4552. [configgloader]
  4553. Filename=cart322.exe
  4554. Confirmed=X
  4555. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.hllw.gaobot.dj.html" target="_blank">GAOBOT.DJ</a> WORM!
  4556. [configservices]
  4557. Filename=Config.exe
  4558. Confirmed=N
  4559. Description=Part of initial setup on a Compaq PC
  4560. [configsetup]
  4561. Filename=configsetup32.exe
  4562. Confirmed=X
  4563. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32agobotafp.html" target=_blank>AGOBOT-AFP</a> WORM!
  4564. [configuration default]
  4565. Filename=Wuxat.exe
  4566. Confirmed=X
  4567. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32spybotca.html" target=_blank>SPYBOT-CA</a> WORM!
  4568. [configuration file]
  4569. Filename=Winset32.exe
  4570. Confirmed=X
  4571. Description=Added by the FLUX.101 TROJAN!
  4572. [configuration loader]
  4573. Filename=syscfg32.exe
  4574. Confirmed=X
  4575. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.sdbot.b.html" target="_blank">SDBOT.B</a> TROJAN!
  4576. [configuration loader10]
  4577. Filename=ip7.exe
  4578. Confirmed=X
  4579. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32agobotanz.html" target=_blank>AGOBOT-ANZ</a> WORM!
  4580. [configuration loading service]
  4581. Filename=wscel.exe
  4582. Confirmed=X
  4583. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32sdbotwj.html" target= blank>SDBOT-WJ</a> WORM!
  4584. [configuration service]
  4585. Filename=suchost.exe
  4586. Confirmed=X
  4587. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/trojan.treb.html" target="_blank">TREB</a> TROJAN!
  4588. [configuration services]
  4589. Filename=mswords.exe
  4590. Confirmed=X
  4591. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32sdbotym.html" target=_blank>SDBOT-YM</a> WORM!
  4592. [configuration wizard]
  4593. Filename=Cfgwiz32.exe
  4594. Confirmed=X
  4595. Description=Added by a variant of the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=BKDR_HCKTCK.2K.C" target="_blank">HACKTACK</a> TROJAN! Not to be confused with the legitimate MS "ISDN Configuration Wizard" (Cfgwiz32.exe)
  4596. [configuration32 loader32]
  4597. Filename=winamp32.exe
  4598. Confirmed=X
  4599. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32sdbotbic.html" target=_blank>SDBOT-BIC</a> WORM!
  4600. [confloader]
  4601. Filename=sysconf16.exe
  4602. Confirmed=X
  4603. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojsdbotfb.html" target=_blank>SDBOT-FB</a> TROJAN!
  4604. [conmgr]
  4605. Filename=conmgr.exe
  4606. Confirmed=N
  4607. Description=Starts Winfax pro at startup
  4608. [conmgr.exe]
  4609. Filename=conmgr.exe
  4610. Confirmed=U
  4611. Description=Connection Manager as used by Earthlink and others. If you need this to ensure a proper connection but don't want to connect at startup try creating your own shortcut 
  4612. [connect2party]
  4613. Filename=connect2party.exe
  4614. Confirmed=X
  4615. Description=Adult content dialler
  4616. [connection manager]
  4617. Filename=CManager.exe
  4618. Confirmed=N
  4619. Description=SBC Yahoo DSL service connection manager. You can connect from the network connections. Users having problems with this have been advised to uninstall the connection manager via Add/Remove Programs and it won't affect the service
  4620. [connectivity tool]
  4621. Filename=[path to trojan]
  4622. Confirmed=X
  4623. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojlitebote.html" target=_blank>LITEBOT-E</a> TROJAN!
  4624. [cons]
  4625. Filename=consol32.exe
  4626. Confirmed=X
  4627. Description=Hijacker - redirects to a p0rn portal, where foistware like ISTBar gets stealth installed
  4628. [conscorr]
  4629. Filename=conscorr.exe
  4630. Confirmed=X
  4631. Description=<a href="http://research.sunbelt-software.com/threat_display.cfm?name=VX2.Transponder&threatid=12517&search=vx2" target=_blank>VX2.Transponder</a> parasite updater/installer related
  4632. [console de gerenciamento microsoft]
  4633. Filename=csrss.exe
  4634. Confirmed=X
  4635. Description=Unidentified malware! Note - this is not the legitimate <a href="http://www.liutilities.com/products/wintaskspro/processlibrary/csrss/" target=_blank>csrss.exe</a> process which is always located in the System (9x/Me) or System32 (NT/2K/XP) folder and should not normally figure in Msconfig/Startup! This file is located in a System\Level4 subfolder
  4636. [contacte]
  4637. Filename=contacte.exe
  4638. Confirmed=?
  4639. Description=<font color="#FF0000">Some kind of driver?</font>
  4640. [content connector]
  4641. Filename=[random filename].exe
  4642. Confirmed=X
  4643. Description=Added by the <a href="http://sophos.com/virusinfo/analyses/trojdialery.html" target=_blank>DIALER-Y</a> TROJAN! Note - uses a random filename and random folders. Usually the folder containing the file is a Temp folder
  4644. [contentdownload]
  4645. Filename=rundll32.exe MSA64CHK.dll, DllMostrar
  4646. Confirmed=X
  4647. Description=<a href="http://research.sunbelt-software.com/threat_display.cfm?name=MatrixDialer&threatid=14914&search=MatrixDialer" target=_blank>MatrixDialer</a> related
  4648. [contentservice]
  4649. Filename=winservn.exe
  4650. Confirmed=X
  4651. Description=Homepage hijacker
  4652. [continueinstall]
  4653. Filename=bpsinstall.exe
  4654. Confirmed=X
  4655. Description=<a href="http://research.sunbelt-software.com/threat_display.cfm?name=BrowserAid&threatid=3342&search=browseraid" target=_blank>BrowserAid/BrowserPal</a> foistware
  4656. [control]
  4657. Filename=rundll32.exe ctrlpan.dll, Restore ControlPanel
  4658. Confirmed=X
  4659. Description=CoolWebSearch <a href="http://cwshredder.net/cwshredder/cwschronicles.html#msconfd" target=_blank>Msconfd</a> parasite variant
  4660. [control center]
  4661. Filename=Center.exe
  4662. Confirmed=N
  4663. Description=Related to an <a href="http://www.asus.com/" target=_blank>Asus</a> WLAN card
  4664. [controladores]
  4665. Filename=[path to trojan]
  4666. Confirmed=X
  4667. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojtelefoa.html" target=_blank>TELEFO-A</a> TROJAN!
  4668. [controlcenter2.0]
  4669. Filename=brctrcen.exe
  4670. Confirmed=N
  4671. Description=Brother scanner 'Control Center' application - can be started manually
  4672. [controlcentretray]
  4673. Filename=XWCTray.exe
  4674. Confirmed=N
  4675. Description=System Tray access for the Xerox ControlCentre 2.0 software for their range of printers, copiers, faxes, etc
  4676. [controlled resource system service]
  4677. Filename=crss.exe
  4678. Confirmed=X
  4679. Description=Added by the <a href="http://www.liutilities.com/products/wintaskspro/processlibrary/crss/" target=_blank>AGOBOT.GH</a> WORM!
  4680. [controller]
  4681. Filename=WFXCTL32.EXE
  4682. Confirmed=N
  4683. Description=From Symantec's TalkWorks Pro and WinFax. Appears if you chose to have the program appear in the taskbar (System Tray) during installation and displays a yellow fax/telephone icon. Available via Start -> Programs
  4684. [controlservicemgr]
  4685. Filename=csmsv.exe
  4686. Confirmed=X
  4687. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojagentxc.html" target=_blank>AGENT-XC</a> TROJAN!
  4688. [cookie cop 2]
  4689. Filename=CookieCop.exe
  4690. Confirmed=U
  4691. Description=<a href="http://www.pcmag.com/article/0,2997,a=20844,00.asp" target="_blank">Cookie Cop 2</a> from PC Magazine - cookie manager. Allows you to decide which internet sites can add "cookies" related to their sites for the next time you return
  4692. [cookie pal]
  4693. Filename=CPBRWTCH.EXE
  4694. Confirmed=U
  4695. Description=Kookaburra Softwares <a href="http://www.pcmag.com/article/0,2997,s=1626&a=12703,00.asp" target="_blank">Cookie Pal</a> cookie manager. Allows you to decide which internet sites can add "cookies" related to their sites for the next time you return
  4696. [cookiejar]
  4697. Filename=Cookiejar.exe
  4698. Confirmed=U
  4699. Description=<a href="http://www.jasons-toolbox.com/cookiejar.asp" target="_blank">Cookie Jar</a> cookie manager from Jason's Toolbox. Allows you to decide which internet sites can add "cookies" related to their sites for the next time you return
  4700. [cookiepatrol]
  4701. Filename=CookiePatrol.exe
  4702. Confirmed=U
  4703. Description=<a href="http://www.pestpatrol.com/CookiePatrol/" target="_blank">CookiePatrol</a> - <a href="http://www.pestpatrol.com/default.asp" target="_blank">PestPatrol</a>'s cookie interceptor stopping spyware cookies
  4704. [cookiewall]
  4705. Filename=cookie.exe
  4706. Confirmed=U
  4707. Description=<a href="http://www.analogx.com/contents/download/network/cookie.htm" target="_blank">CookieWall</a> from Analog X. Allows you to decide which internet sites can add "cookies" related to their sites for the next time you return
  4708. [cool desk]
  4709. Filename=cdesk.exe
  4710. Confirmed=U
  4711. Description=<a href="http://www.shelltoys.com/" target="_blank">Cool Desk</a> is a virtual desktops manager. "Ever you wished to have several screens on your computer? Cool Desk creates up to 9 virtual desktops and offers you to have different windows on each of them". Not required but may be of use to you
  4712. [cooldownloads]
  4713. Filename=rundll32.exe MSA64CHK.dll, DllMostrar
  4714. Confirmed=X
  4715. Description=<a href="http://research.sunbelt-software.com/threat_display.cfm?name=MatrixDialer&threatid=14914&search=MatrixDialer" target=_blank>MatrixDialer</a> related
  4716. [coolmp3]
  4717. Filename=rundll32.exe MSA64CHK.dll, DllMostrar
  4718. Confirmed=X
  4719. Description=<a href="http://research.sunbelt-software.com/threat_display.cfm?name=MatrixDialer&threatid=14914&search=MatrixDialer" target=_blank>MatrixDialer</a> related
  4720. [coolswitch]
  4721. Filename=taskswitch.exe
  4722. Confirmed=U
  4723. Description=ALT+TAB replacement Powertoy for Windows XP - enhances the graphics displayed when you want to switch between programs running full-screen
  4724. [coolwallpaper]
  4725. Filename=cwm_tray.exe
  4726. Confirmed=N
  4727. Description=<a href="http://coolwallpaper.com/download/index2.html" target=_blank>Cool Wallpaper</a> software allows you to manage high quality photos as desktop wallpaper and screen savers
  4728. [coolwebprogram]
  4729. Filename=clrssn.exe
  4730. Confirmed=X
  4731. Description=CoolWebSearch <a href="http://cwshredder.net/cwshredder/cwschronicles.html#smartsearch" target=_blank>Smartsearch</a> parasite variant
  4732. [copernic desktop search]
  4733. Filename=DesktopSearch.exe
  4734. Confirmed=N
  4735. Description=Copernic <a href="http://www.copernic.com/en/products/desktop-search/index.html" target=_blank>Desktop Search</a> - "Easily search your entire hard drive in less than a second to pinpoint the right file, e-mail, music or pictures"
  4736. [copernicperusertaskmgr]
  4737. Filename=CopernicPerUserTaskMgr.exe
  4738. Confirmed=U
  4739. Description=Automatic tasking feature of Copernic Pro multi-search engine tool
  4740. [copy handler]
  4741. Filename=Copy Handler.exe
  4742. Confirmed=U
  4743. Description=<a href="http://copyhandler.com/" target= blank>Copy Handler</a> lets you copy between hard disks, floppies, local networks, CDs, and many other storage media. Copy Handler gives you the power to pause, resume, restart, and cancel during the copying and moving processes
  4744. [copyright]
  4745. Filename=mwcpyrt.exe
  4746. Confirmed=N
  4747. Description=Displays copyright information on IBM ThinkPads
  4748. [corel colleagues & contacts reminders]
  4749. Filename=cffrem.exe
  4750. Confirmed=N
  4751. Description=<a href="http://www.corel.com/printoffice_v1/ccc.htm" target="_blank">Corel Colleagues & Contracts</a> - all-in-one organizer for scheduling meetings, maintaining addresses, etc. Part of Corel Print Office
  4752. [corel desktop application director]
  4753. Filename=dadx.exe
  4754. Confirmed=N
  4755. Description=The Desktop Application Director (DAD) gives you easy access to all Corel applications - x represents ther version number. Available via Start -> Programs
  4756. [corel family & friends reminders]
  4757. Filename=CFFREM.EXE
  4758. Confirmed=N
  4759. Description=<a href="http://www.corel.com/products/graphicsandpublishing/phmagic/CFF.htm" target="_blank">Corel Family & Friends</a> - all-in-one calender, address book and list manager. Part of Corel Print House Magic
  4760. [corel registration]
  4761. Filename=Remind32.exe
  4762. Confirmed=N
  4763. Description=If you don't want to register Corel products and be reminded about it every 2 weeks disable it
  4764. [corel registration reminder]
  4765. Filename=Remind32.exe
  4766. Confirmed=N
  4767. Description=If you don't want to register Corel products and be reminded about it every 2 weeks disable it
  4768. [corel reminder]
  4769. Filename=NAVBROWSER.EXE
  4770. Confirmed=N
  4771. Description=If you don't want to register Corel products and be reminded about it every 2 weeks disable it
  4772. [corelcentral 10]
  4773. Filename=I_26dadCC.exe
  4774. Confirmed=N
  4775. Description=<a href="http://www3.corel.com/cgi-bin/gx.cgi/AppLogic+FTContentServer?pagename=Corel/Product/Feature&fid=CC1ZX1WPOP4" target="_blank">CorelCENTRAL 10</a> - personal information manager (PIM). Supplied as part of Corel WordPerfect Office 2002. Available via Start -> Programs
  4776. [coreldraw toolbox]
  4777. Filename=CorelDraw.exe
  4778. Confirmed=X
  4779. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32sdbotvz.html" target= blank>SDBOT-VZ</a> WORM!
  4780. [coresrv]
  4781. Filename=coresrv.exe
  4782. Confirmed=X
  4783. Description=Some IRC trojans/worms use this - see <a href="http://lockdowncorp.com/bots/" target="_blank">here</a> for more information
  4784. [coresys]
  4785. Filename=coresys.exe
  4786. Confirmed=?
  4787. Description=<font color="#FF0000">??</font>
  4788. [correctconnect]
  4789. Filename=CConnect.exe
  4790. Confirmed=N
  4791. Description=Broadband ISP diagnostic tool - as used by NTL and Cox Communications. Shortcut available
  4792. [cosine]
  4793. Filename=cosine.exe
  4794. Confirmed=X
  4795. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotsw.html" target=_blank>RBOT-SW</a> WORM!
  4796. [costaware]
  4797. Filename=niIPCApp.exe
  4798. Confirmed=U
  4799. Description=NetInternals <a href="http://www.netinternals.com/default.htm?products" target="_blank">CostAware</a> - download quota measuring tool
  4800. [country select]
  4801. Filename=pctptt.exe
  4802. Confirmed=N
  4803. Description=Country selection for a PCtel HSP56 based modem. Often found in OEM (Dell,Compaq, HP, etc) systems for their modems included on the motherboard or as a separate card. Once you've set the modem up to the chosen country it's not required
  4804. [countryselection]
  4805. Filename=pctptt.exe
  4806. Confirmed=N
  4807. Description=Country selection for a PCtel HSP56 based modem. Often found in OEM (Dell,Compaq, HP, etc) systems for their modems included on the motherboard or as a separate card. Once you've set the modem up to the chosen country it's not required
  4808. [coupon offers]
  4809. Filename=??
  4810. Confirmed=?
  4811. Description=<font color="#FF0000">??</font>
  4812. [couponica]
  4813. Filename=couponica.exe
  4814. Confirmed=X
  4815. Description=Adware - see <a href="http://vil.nai.com/vil/content/v_100077.htm#top" target="_blank">here</a>
  4816. [cp]
  4817. Filename=CopyProtectionNotifier.exe
  4818. Confirmed=?
  4819. Description=Related to <a href="http://www.emuzed.com/application.html" target=_blank>Emuzed</a> Systems and Middleware. Comes included with Windows XP Media Edition
  4820. [cp32not]
  4821. Filename=CP32BTN.EXE
  4822. Confirmed=U
  4823. Description=For the programmable "one-touch" buttons on HP laptops (and others?). Safe to disable if you don't use these buttons
  4824. [cp4hpot]
  4825. Filename=OneTouch.EXE
  4826. Confirmed=U
  4827. Description=One Touch keyboard driver. Required if you use the additional keys
  4828. [cpa9p2pserver]
  4829. Filename=CPA9P2PS.exe
  4830. Confirmed=?
  4831. Description=<font color="#FF0000">Found on a Compaq Presario but what is it?</font>
  4832. [cpatr10]
  4833. Filename=CPATR10.EXE
  4834. Confirmed=U
  4835. Description=Dritek/Compal ATR10 Easy Button driver. Used on certain laptops (e.g. Toshiba, Compaq) to translate special hotkeys such as Play/Pause and Constrast
  4836. [cpbrwtch]
  4837. Filename=CPBrWtch.exe
  4838. Confirmed=U
  4839. Description=Kookaburra Softwares <a href="http://www.pcmag.com/article/0,2997,s=1626&a=12703,00.asp" target="_blank">Cookie Pal</a> cookie manager. Allows you to decide which internet sites can add "cookies" related to their sites for the next time you return
  4840. [cpd_exe]
  4841. Filename=CPD.EXE
  4842. Confirmed=Y
  4843. Description=Firewall bundled with McAfee VirusScan 6.*
  4844. [cplbtq00]
  4845. Filename=CplBTQ00.EXE
  4846. Confirmed=N
  4847. Description=Related to <a href="http://castlecops.com/startuplist-8891.html" target=_blank>EZbutton</a>
  4848. [cpldbl10]
  4849. Filename=CPLDBL10.exe
  4850. Confirmed=N
  4851. Description=Related to the <a href="http://castlecops.com/s8891-EzButton_EXE.html" target=_blank>EZbutton</a> quick launcher
  4852. [cportpatch]
  4853. Filename=cppatch.exe
  4854. Confirmed=?
  4855. Description=<font color="#FF0000">CPortPatch is a utility is required for Dell laptops that are using a docking station. Is it needed though?</font>
  4856. [cpqacdc]
  4857. Filename=CPQAcDc.exe
  4858. Confirmed=Y
  4859. Description=Compaq PowerCon power management software for laptops
  4860. [cpqalert]
  4861. Filename=CPQAlert.exe
  4862. Confirmed=U
  4863. Description=Compaq's Insight Manager Agent - a tool that allows for "fault, performance, and configuration management". Recommended for corporate users only. It's best removed if installed but not wanted, rather than disabled at startup. See <a href="http://www.compaq.com/products/servers/management/cim-description.html" target="_blank">here</a> for more information
  4864. [cpqbootperfdb]
  4865. Filename=CPQBootPerfDB.EXE
  4866. Confirmed=N
  4867. Description=See the entry for Compaq Message Server
  4868. [cpqcalib]
  4869. Filename=CPQCalib.exe
  4870. Confirmed=Y
  4871. Description=Compaq PowerCon power management software for laptops
  4872. [cpqdfwag]
  4873. Filename=CpqDfwAg.exe
  4874. Confirmed=N
  4875. Description=For Compaq PC's. Runs Compaq diagnostics on every boot
  4876. [cpqeasyacc]
  4877. Filename=cpqeadm.exe
  4878. Confirmed=U
  4879. Description=For Compaq PC's. Allows the use of programmable keys on mulimedia keyboards. Required if you use the additional keys
  4880. [cpqeaui]
  4881. Filename=cpqeaui.exe
  4882. Confirmed=U
  4883. Description=For Compaq PC's. Allows the use of programmable keys on mulimedia keyboards. Required if you use the additional keys
  4884. [cpqek]
  4885. Filename=kcpqek.exe
  4886. Confirmed=U
  4887. Description=For Compaq PC's. <a href="http://h18000.www1.hp.com/support/techpubs/whitepapers/13W1-1200a-wwen.html" target="_blank"> Easy Access</a> button support for the keyboard
  4888. [cpqinet runtime service]
  4889. Filename=CpqInet.exe
  4890. Confirmed=U
  4891. Description=For Compaq PC's. Allows AOL and Compuserve to use the <a href="http://h18000.www1.hp.com/support/techpubs/whitepapers/13W1-1200a-wwen.html" target="_blank"> Easy Access</a> buttons for the internet. Is not required if you don't use the ISP providers
  4892. [cpqinkagent]
  4893. Filename=cpqinkag.exe
  4894. Confirmed=N
  4895. Description=That is the Compaq Ink Agent for some inkjet printers, it lets users know when their ink cartridges are getting close to empty (by how many pages they have printed)
  4896. [cpqns]
  4897. Filename=cpqnpcss.exe
  4898. Confirmed=U
  4899. Description=Related to Compaq.Net - not required if you don't use that
  4900. [cpqset]
  4901. Filename=Cpqset.exe
  4902. Confirmed=N
  4903. Description=Default settings software in Hewlett Packard notebook
  4904. [cpqstutfix]
  4905. Filename=stutfix.exe
  4906. Confirmed=Y
  4907. Description=For Compaq PC's. Fixes audio stutter problems for ESS Maestro soundcards. You can download it <a href="files/StutFix.exe">here</a>. This is a Compaq originated file and has been verified as free from viruses by McAfree/Norton
  4908. [cpr]
  4909. Filename=cpr
  4910. Confirmed=X
  4911. Description=Adroar.com adware downloader
  4912. [cpu manager]
  4913. Filename=cpumgr.exe
  4914. Confirmed=X
  4915. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.pandem.b.worm.html" target="_blank">PANDEM.B</a> WORM!
  4916. [cpu temp control]
  4917. Filename=wuitgurd.exe
  4918. Confirmed=X
  4919. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotahv.html" target=_blank>RBOT-AHV</a> WORM!
  4920. [cpu watcher]
  4921. Filename=rundll32.exe [path] cpu.dll,load
  4922. Confirmed=X
  4923. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojdloaderlo.html" target=_blank>DLOADER-LO</a> TROJAN!
  4924. [cpu windows status]
  4925. Filename=cpustats.exe
  4926. Confirmed=X
  4927. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  4928. [cpucool]
  4929. Filename=Cpucool.exe
  4930. Confirmed=U
  4931. Description=Program to keep the processor cool when idle in "overclocked" systems. Also available via Start -> Settings -> Control Panel
  4932. [cpusave]
  4933. Filename=Cpusave.exe
  4934. Confirmed=X
  4935. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/trojan.gema.html" target="_blank">GEMA</a> TROJAN!
  4936. [cpusave32]
  4937. Filename=Cpusave32.exe
  4938. Confirmed=X
  4939. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/trojan.gema.html" target="_blank">GEMA</a> TROJAN!
  4940. [cpyt]
  4941. Filename=hidep.exe
  4942. Confirmed=X
  4943. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojmirjacka.html" target=_blank>MIRJACK-A</a> TROJAN!
  4944. [cqlyg]
  4945. Filename=world_cup_.bat
  4946. Confirmed=X
  4947. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=BAT_WCUP.A" target="_blank">WCUP.A</a> WORM!
  4948. [cqscp2p server]
  4949. Filename=??
  4950. Confirmed=?
  4951. Description=<font color="#FF0000">"Compaq printer utility which is required in the startup menu in order to make the printer work correctly". Personally I doubt whether it is actually needed</font>
  4952. [cqscp2ps]
  4953. Filename=??
  4954. Confirmed=?
  4955. Description=<font color="#FF0000">"Compaq printer utility which is required in the startup menu in order to make the printer work correctly". Personally I doubt whether it is actually needed</font>
  4956. [cracked_windows1]
  4957. Filename=cracked_windows1.exe
  4958. Confirmed=U
  4959. Description=<a href="http://www.angelfire.com/electronic/purplexed/files/crackedwindows.html" target="_blank">Cracked Windows</a> popup killer
  4960. [crazytalk serve]
  4961. Filename=rundll32.exe CrazyTalk.dll, DIIServeMediaFile
  4962. Confirmed=N
  4963. Description=<a href="http://www.reallusion.com/crazytalk/default.asp" target="_blank">CrazyTalk</a> from Reallusion - "the worlds only facial animation tool that gives you the power to create talking animated images from a single photograph, complete with emotions." Can apparently be installed without your knowledge as well as being a legitimate download in it's own right from sites such as TUCOWS
  4964. [crc32stats dependencies]
  4965. Filename=Crc32stats.exe
  4966. Confirmed=X
  4967. Description=Added by the <a href="http://www.symantec.com/avcenter/venc/data/w32.mytob.gt@mm.html" target=_blank>MYTOB.GT</a> WORM!
  4968. [creata mail]
  4969. Filename=JMSrvr.exe
  4970. Confirmed=U
  4971. Description=<a href="http://www.bluemountain.com/mail/index.pd" target=_blank>Creata_Mail</a>. Smileys, stationary and more for you email. Required if you want to access the program from Outlook or Outlook Express
  4972. [create a monster]
  4973. Filename=createAMonster.exe
  4974. Confirmed=X
  4975. Description=Kudd.com CreateAMonster. Reportedly stealth installed and <a href="http://sarc.com/avcenter/venc/data/adware.look2me.html" target=_blank>Look2Me</a> adware related
  4976. [createcd]
  4977. Filename=Createcd.exe
  4978. Confirmed=N
  4979. Description=Adaptec Easy CD Creator system tray application (pre version 5). Available via Start -> Programs
  4980. [createcd50]
  4981. Filename=Createcd50.exe
  4982. Confirmed=N
  4983. Description=Adaptec Easy CD Creator version 5 system tray application. Available via Start -> Programs
  4984. [creative agp wizard]
  4985. Filename=agpwiz.exe
  4986. Confirmed=N
  4987. Description=Part of Creative's BlasterControl
  4988. [creative launcher]
  4989. Filename=CTLauncher.exe
  4990. Confirmed=N
  4991. Description=For Creative Soundblaster Live! series soundcards. Adds a quick-launch bar to the top of the display and a System Tray icon. Available via Start -> Programs
  4992. [creative mediasource go]
  4993. Filename=CTCMSGo.exe
  4994. Confirmed=N
  4995. Description=Creative <a href="http://www.soundblaster.com/mediasource/" target="_blank"> MediaSource</a> playbacks music in DVD-Audio, MP3, WMA, WAV and other media formats
  4996. [creative pci audio configuration utility]
  4997. Filename=starter.exe
  4998. Confirmed=N
  4999. Description=System Tray icon to configure a Creative Soundblaster PCI soundcard. Not required and re-instates itself when un-checked. Try one of the solutions on <a href="http://www.pacs-portal.co.uk/startup_pages/starter_exe.htm" target="_blank">this</a> special page. Similar to EnsoniqMixer
  5000. [creative service for cdrom access]
  5001. Filename=Ctsvccda.exe
  5002. Confirmed=N
  5003. Description=Resident program for Creative's PlayCenter included with Soundblaster Audigy sound cards - speeds up detection of some media CDs if the system doesn't natively support them. Available via Start -> Programs
  5004. [creative webcam tray]
  5005. Filename=Camtray.exe
  5006. Confirmed=N
  5007. Description=Creative WebCam tray control - can be started manually
  5008. [creative.exe]
  5009. Filename=Creative.exe
  5010. Confirmed=X
  5011. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.prolin.worm.html" target="_blank">PROLIN</a> WORM!
  5012. [creativediscnotifier]
  5013. Filename=CTNOTIFY.EXE
  5014. Confirmed=N
  5015. Description=For Creative Soundblaster Live! series soundcards. Detects when you insert a CD-ROM, DVD-ROM, etc. Available via Start -> Settings -> Control Panel
  5016. [creativemixer]
  5017. Filename=CTMIX32.EXE
  5018. Confirmed=U
  5019. Description=Creative soundcard System Tray access to, for example, volume slider controls as normally provided by the "speaker" icon. Not required unless you adjust any settings otherwise available via the standard icon
  5020. [critical update check]
  5021. Filename=battlenet.exe
  5022. Confirmed=X
  5023. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojdelflb.html" target=_blank>DELF-LB</a> TROJAN!
  5024. [crnsava]
  5025. Filename=scrnsave.pif
  5026. Confirmed=X
  5027. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32sdbotzv.html" target=_blank>SDBOT-ZV</a> WORM!
  5028. [cronos]
  5029. Filename=MARCO!.SCR
  5030. Confirmed=X
  5031. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_OPASERV.G" target="_blank">OPASERV.G</a> WORM!
  5032. [crossmenu]
  5033. Filename=CrossMenu
  5034. Confirmed=X
  5035. Description=Toshiba CrossMenu Utility - allows the user to create their own menus
  5036. [crs]
  5037. Filename=crs.exe
  5038. Confirmed=X
  5039. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32agobottj.html" target=_blank>AGOBOT-TJ</a> WORM!
  5040. [crusty]
  5041. Filename=dmcpl.exe
  5042. Confirmed=X
  5043. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.rusty@m.html" target="_blank">RUSTY</a> WORM!
  5044. [cryptdlg]
  5045. Filename=cryptdlg.exe
  5046. Confirmed=X
  5047. Description=Added by an unidentified TROJAN!
  5048. [cryptographic service]
  5049. Filename=******.exe [* = random char]
  5050. Confirmed=X
  5051. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.korgo.w.html" target="_blank">KORGO.W</a> or <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.korgo.x.html" target="_blank">KORGO.X</a> or <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39581" target="_blank">KORGO.AB</a> WORMS!
  5052. [crystal 3d audio control]
  5053. Filename=CWD3DSND.EXE
  5054. Confirmed=?
  5055. Description=Crystal 3D Audio sound driver. <font color="#FF0000">Is it required?</font>
  5056. [csarem]
  5057. Filename=spqmdmui.exe
  5058. Confirmed=N
  5059. Description=Compaq modem country selection
  5060. [csav_checkviruses]
  5061. Filename=vchk.exe
  5062. Confirmed=Y
  5063. Description=Part of <a href="http://www.authentium.com/solutions/products/commandantivirus.cfm" target="_blank">Command AntiVirus</a>
  5064. [csc]
  5065. Filename=csc.exe
  5066. Confirmed=U
  5067. Description=Command line compiler for Microsoft C# it gets installed with the .NET SDK
  5068. [cscrs value]
  5069. Filename=cscrs.exe
  5070. Confirmed=X
  5071. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotaaa.html" target=_blank>RBOT-AAA</a> WORM!
  5072. [cscrs value check]
  5073. Filename=MsPMSPSd.exe
  5074. Confirmed=X
  5075. Description=Added by a variant of the <a href="http://vil.nai.com/vil/content/v_100454.htm" target=_blank>SDBOT</a> WORM!
  5076. [csinject.exe]
  5077. Filename=CSINJECT.EXE
  5078. Confirmed=U
  5079. Description=Part of Quarterdeck/Norton CleanSweep. For a full description see <a href="http://service1.symantec.com/SUPPORT/cleansweep.nsf/docid/1999022413295728" target="_blank">here</a>. An excerpt - "Csinject must be loaded in order for Smart Sweep to automatically monitor installations and properly track registry changes."
  5080. [csm win updates]
  5081. Filename=csm.exe
  5082. Confirmed=X
  5083. Description=Added by the <a href="http://vil.nai.com/vil/content/v_135435.htm" target=_blank>ZOTOB.B</a> WORM!
  5084. [csoftok]
  5085. Filename=softok.exe
  5086. Confirmed=X
  5087. Description=Added by the <a href="http://www.symantec.com/avcenter/venc/data/trojan.pws.qqpass.g.html" target= blank>QQPASS.G</a> TROJAN!
  5088. [csrsc]
  5089. Filename=csrsc.exe
  5090. Confirmed=X
  5091. Description=Added by an unidentified VIRUS, WORM or TROJAN!
  5092. [csrss loader]
  5093. Filename=csrsss.exe
  5094. Confirmed=X
  5095. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_AGOBOT.TX" target=_blank>AGOBOT.TX</a> WORM!
  5096. [csrss.exe]
  5097. Filename=csrss.exe
  5098. Confirmed=X
  5099. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.dalbug.worm.html" target=_blank>DALBUG</a> WORM! Note - this is not the legitimate <a href="http://www.liutilities.com/products/wintaskspro/processlibrary/csrss/" target=_blank>csrss.exe</a> process which is always located in the Winnt\System32 or Windows\System32 folder and should not normally figure in Msconfig/Startup! This file is located in the Winnt or Windows folder
  5100. [csrsslevel4]
  5101. Filename=csrss.exe
  5102. Confirmed=X
  5103. Description=Unidentified malware. Note - this file is placed in a C:\Windows\System\Level4 folder, and should NOT be confused with the legitimate <a href="http://www.liutilities.com/products/wintaskspro/processlibrary/csrss/" target=_blank>csrss.exe</a> process which is always located in the Winnt\System32 or Windows\System32 folder and should NOT figure in Msconfig/Startup!
  5104. [csrssu]
  5105. Filename=CSRSSU.exe
  5106. Confirmed=X
  5107. Description=<a href="http://cwshredder.net/cwshredder/cwschronicles.html" target=_blank>CoolWebSearch</a> parasite variant - hijacking to Slawsearch.com. Also detected as the <a href="http://www.sophos.com/virusinfo/analyses/trojcwse.html" target= blank>CWS-E</a> TROJAN!
  5108. [csrssw]
  5109. Filename=CSRSSW.EXE
  5110. Confirmed=X
  5111. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojcwsf.html" target= blank>CWS-F</a> TROJAN!
  5112. [csrswin]
  5113. Filename=[trojan filename]
  5114. Confirmed=X
  5115. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.winshell.50.html" target="_blank">WINSHELL.50</a> TROJAN!
  5116. [csrsx]
  5117. Filename=[trojan filename]
  5118. Confirmed=X
  5119. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.winshell.50.b.html" target="_blank">WINSHELL.50.B</a> TROJAN!
  5120. [css server]
  5121. Filename=CSSServer.exe
  5122. Confirmed=U
  5123. Description=Added by the <a href="http://www.symantec.com/avcenter/venc/data/spyware.comspysyssvr.html" target=_blank>ComSpySysSvr</a> surveillance software. Uninstall this software unless you put it there yourself
  5124. [csschedulecheck]
  5125. Filename=SCHWIZEX.EXE
  5126. Confirmed=Y
  5127. Description=Part of <a href="http://www.imaginelan.com/configsafe/index.html" target="_blank"> ConfigSafe</a> - lets you identify changes to the registry, INI files, System asset files, system hardware, network connections, and operating system versions - provides a restore function. This part takes a snapshot of your system following a healthy re-boot
  5128. [csss]
  5129. Filename=Csss.exe
  5130. Confirmed=X
  5131. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.balick.trojan.html" target="_blank">BALICK</a> TROJAN!
  5132. [css_central]
  5133. Filename=CSS_1631.EXE
  5134. Confirmed=U
  5135. Description=CSS Communication Agent (95 Host) from <a href="http://www.commandcom.com/enterprise/csscntrl.html" target="_blank">Command Software Systems</a> "CSS Central?provides administrators with a powerfully proactive tool to effectively manage and maintain the anti-virus strategy from a centralized console."
  5136. [csv10p70]
  5137. Filename=CSv10P070.exe
  5138. Confirmed=X
  5139. Description=<a href="http://doxdesk.com/parasite/ClearSearch.html" target=_blank>ClearSearch</a> adware related
  5140. [csv7p26]
  5141. Filename=CSV7P26.exe
  5142. Confirmed=X
  5143. Description=<a href="http://doxdesk.com/parasite/ClearSearch.html" target=_blank>ClearSearch</a> adware related
  5144. [csv7p70]
  5145. Filename=CSV7P070.exe
  5146. Confirmed=X
  5147. Description=<a href="http://doxdesk.com/parasite/ClearSearch.html" target=_blank>ClearSearch</a> adware related
  5148. [csv7p91]
  5149. Filename=CSV7P91.exe
  5150. Confirmed=X
  5151. Description=<a href="http://doxdesk.com/parasite/ClearSearch.html" target=_blank>ClearSearch</a> adware related
  5152. [ct]
  5153. Filename=ct.exe
  5154. Confirmed=Y
  5155. Description=ct.exe is a file is for the HP Learning Adventure software and if you use this software it is required to run it
  5156. [ct control settings]
  5157. Filename=CTSVCCD.EXE
  5158. Confirmed=X
  5159. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotys.html" target=_blank>RBOT-YS</a> WORM!
  5160. [ctavtray]
  5161. Filename=CTAvTray.exe
  5162. Confirmed=N
  5163. Description=For Creative Soundblaster Live! series soundcards. Plays the EAX animation on start-up and adds a System Tray icon for it. Available via AudioHQ
  5164. [ctcmonitor]
  5165. Filename=CTCMonitor.exe
  5166. Confirmed=U
  5167. Description=<a href="http://www.clicktoconvert.com/Features/features.html" target=_blank>Click-to-Convert</a> - document-to-HTML or doc-to-PDF converter. Only required if you are going to use the File -> Print method of using Click-to-Convert. If converting directly from MS Office, it is not required
  5168. [ctflog manager]
  5169. Filename=ctflog.exe
  5170. Confirmed=X
  5171. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=TROJ_DONBOMB.A&VSect=P" target=_blank>DONBOMB.A</a> TROJAN!
  5172. [ctfm0n.exe]
  5173. Filename=CTFM0N.exe
  5174. Confirmed=X
  5175. Description=Added by the <a href="http://www.symantec.com/avcenter/venc/data/trojan.startpage.p.html" target=_blank>STARTPAGE.P</a> TROJAN!
  5176. [ctfmon32]
  5177. Filename=CTFMON32.EXE
  5178. Confirmed=X
  5179. Description=CoolWebSearch <a href="http://cwshredder.net/cwshredder/cwschronicles.html#ctfmon32" target=_blank>Ctfmon32</a> parasite variant - also detected as the <a href="http://www.sophos.com/virusinfo/analyses/trojcwse.html" target= blank>CWS-E</a> TROJAN!
  5180. [ctfmonss]
  5181. Filename=CTFMONSS.EXE
  5182. Confirmed=X
  5183. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojcwsf.html" target= blank>CWS-F</a> TROJAN!
  5184. [ctfnom]
  5185. Filename=rundIl32.exe
  5186. Confirmed=X
  5187. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojlegmiraw.html" target=_blank>LEGMIR-AW</a> TROJAN!
  5188. [ctime]
  5189. Filename=[path to trojan]
  5190. Confirmed=X
  5191. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/trojan.httpdos.html" target="_blank">HTTPDOS</a> TROJAN!
  5192. [ctin10]
  5193. Filename=CTin10.exe
  5194. Confirmed=X
  5195. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/pwsteal.bancos.e.html" target="_blank">BANCOS.E</a> TROJAN!
  5196. [ctnmrun]
  5197. Filename=ctnmrun.exe
  5198. Confirmed=U
  5199. Description=Detects the Creative NOMAD jukebox/MP3 player at the time it is attached to USB and starts the needed application (Creative PlayCentre 2) that you use to copy MP3 files to and from it. This is required if you want PlayCentre 2 to take control of the NOMAD once connected
  5200. [ctpdpsrv]
  5201. Filename=CTPDPSRV.EXE
  5202. Confirmed=?
  5203. Description=Printer driver (in the WINDOWSSystem32spoolDRIVERSW32X86 folder).<font color="#FF0000"> Is it required?</font>
  5204. [ctregrun]
  5205. Filename=CTRegRun.exe
  5206. Confirmed=N
  5207. Description=For Creative Soundblaster Live! series soundcards. Reminds you to register your card with Creative
  5208. [ctrlvol]
  5209. Filename=CtrlVol.exe
  5210. Confirmed=U
  5211. Description=Volume control key on Acer, Fujitsu and other laptops
  5212. [ctstartup]
  5213. Filename=CTEaxSpl.exe
  5214. Confirmed=N
  5215. Description=Splash screen with sound on every boot up. Installed with a Sound Blaster Audigy soundcard
  5216. [ctsysvol]
  5217. Filename=CTSYSVOL.exe
  5218. Confirmed=U
  5219. Description=Creative sound card volume controls
  5220. [cttdpsrv]
  5221. Filename=cttdpsrv.exe
  5222. Confirmed=?
  5223. Description=<font color="#FF0000">??</font>
  5224. [ctupdate]
  5225. Filename=ctupdclt.exe
  5226. Confirmed=X
  5227. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotabg.html" target= blank>RBOT-ABG</a> WORM!
  5228. [ctykd]
  5229. Filename=[path to file]
  5230. Confirmed=X
  5231. Description=<a href="http://www.trendmicro.com/vinfo/grayware/ve_graywareDetails.asp?GNAME=TSPY_SMALL.SN&VSect=Td" target=_blank>SMALL.SN</a> spyware
  5232. [cu1]
  5233. Filename=VCClient.exe
  5234. Confirmed=X
  5235. Description=Associated with the Surf Sidekick adware and should be removed
  5236. [cu2]
  5237. Filename=VCMain.exe
  5238. Confirmed=X
  5239. Description=Associated with the Surf Sidekick adware and should be removed
  5240. [cuagentexe]
  5241. Filename=Cuagent.exe
  5242. Confirmed=Y
  5243. Description=<a href="http://www.command.co.uk/html/products/csav/index.cfm">Command Antivirus</a> related
  5244. [cuo]
  5245. Filename=cuo.exe
  5246. Confirmed=X
  5247. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_BUGBEAR.A" target="_blank">BUGBEAR.A</a> WORM!
  5248. [current security config]
  5249. Filename=csecure.exe
  5250. Confirmed=X
  5251. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotamo.html" target=_blank>RBOT-AMO</a> WORM!
  5252. [cursor]
  5253. Filename=Screendragon_VS_Taskbar.exe
  5254. Confirmed=N
  5255. Description=<a href="http://www.screendragon.com/" target="_blank">ScreenDragon</a> video player
  5256. [cursorxp]
  5257. Filename=CursorXP.exe
  5258. Confirmed=N
  5259. Description=<a href="http://www.stardock.com/products/cursorxp/" target="_blank">CursorXP</a> from Stardock - tool for creating mouse cursors
  5260. [customizer2000]
  5261. Filename=logon.exe
  5262. Confirmed=U
  5263. Description=Automatic logon feature of <a href="http://www.hot-shareware.com/utilities/customizer-2000/" target="_blank">Customizer 2000</a> - "a special utility which is designed to optimize Win9x/ME performance. The program lets you explore the many hidden settings in Windows, and make changes"
  5264. [cutemx]
  5265. Filename=CuteMX.EXE
  5266. Confirmed=N
  5267. Description=File sharing utility
  5268. [cvmonitor.exe]
  5269. Filename=cvmonitor.exe
  5270. Confirmed=X
  5271. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_SDBOT.BV" target="_blank">SDBOT.BV</a> WORM!
  5272. [cvpnd]
  5273. Filename=cvpnd.exe
  5274. Confirmed=Y
  5275. Description=Sub-system used by Cisco VPN client for making a connection to a remote IPSec server
  5276. [cw]
  5277. Filename=cw4.exe
  5278. Confirmed=U
  5279. Description=<a href="http://www.zemericks.com/products/chatwatch/index.asp" target=_blank>Chat Watch</a> "is a monitoring and logging software for online chat and instant messaging programs"
  5280. [cwatch]
  5281. Filename=cw.exe
  5282. Confirmed=U
  5283. Description=<a href="http://www.zemericks.com/products/chatwatch/index.asp" target="_blank">ChatWatch</a> - chat monitoring tool
  5284. [cwbckver]
  5285. Filename=cwbckver.exe
  5286. Confirmed=N
  5287. Description=Part of IBM's <a href="http://www-1.ibm.com/servers/eserver/iseries/access/" target="_blank">iSeries</a> (nee As/400) Client Access - communications suite that allows desktop, browser and wireless access to iSeries servers. Checks the software version on your PC to that of the iSeries it is connected to. Not required - and can be turned off in the Client Access properties. It's a waste of resources
  5288. [cwbinhlp]
  5289. Filename=cwbinhlp.exe
  5290. Confirmed=N
  5291. Description=Client Access Help Registry Update Function - part of IBM's <a href="http://www-1.ibm.com/servers/eserver/iseries/access/" target="_blank">iSeries</a> (nee As/400) Client Access - communications suite that allows desktop, browser and wireless access to iSeries servers. It only updates the help files on your PC to match the level of the attached iSeries
  5292. [cwbsvstr]
  5293. Filename=cwbsvstr.exe
  5294. Confirmed=N
  5295. Description=Part of IBM's <a href="http://www-1.ibm.com/servers/eserver/iseries/access/" target="_blank">iSeries</a> (nee As/400) Client Access - communications suite that allows desktop, browser and wireless access to iSeries servers. Useful if you are going to access the iSeries through Windows Explorer to move files back and forth between Windows folders and iSeries folders. This is a tool that is only used by Client Access administrators (usually) so it is not required - a waste of resources
  5296. [cwbwlwiz]
  5297. Filename=cwbwlwiz.exe
  5298. Confirmed=?
  5299. Description=Welcome wizard launcher - Part of IBM's <a href="http://www-1.ibm.com/servers/eserver/iseries/access/" target="_blank">iSeries</a> (nee As/400) Client Access - communications suite that allows desktop, browser and wireless access to iSeries servers. <font color="#FF0000">What does it do and is it required?</font>
  5300. [cwcdschk.exe]
  5301. Filename=Cwcdschk.exe
  5302. Confirmed=?
  5303. Description=<font color="#FF0000">IBM Thinkpad related?</font>
  5304. [cwupdate]
  5305. Filename=cwupdate.exe
  5306. Confirmed=U
  5307. Description=<a href="http://www.contentwatch.com/products/contentprotect.php" target=_blank>ContentProtect</a> from ContentWatch - internet filter
  5308. [cxmon]
  5309. Filename=Hpi_Monitor.exe
  5310. Confirmed=N
  5311. Description=Autodetects when a HP camera is attached to the computer and launches the "HP Photoimaging Software". Available via Start -> Programs
  5312. [cyber]
  5313. Filename=cyberchk.exe
  5314. Confirmed=N
  5315. Description=Part of Belkins "Multimedia Cleaning Kit" and is
  5316. [cyber trio]
  5317. Filename=showmode.exe
  5318. Confirmed=U
  5319. Description=From G-Tek Technologies. Allows you to set the PC in one of three modes, Standard, Enhanced and Kiddo. Standard is full function, Enhanced prevents accidental damage and Kiddo is a play environment for kids. Pre-installed on some Packard Bell PCs
  5320. [cyber-defender 2003]
  5321. Filename=uwcdsvr.exe
  5322. Confirmed=U
  5323. Description=<a href="http://www.unionway.com/tea/html/0/42178.html" target="_blank">Cyber Defender 2003</a>
  5324. [cyberfree.exe]
  5325. Filename=****.dat [* = random char]
  5326. Confirmed=X
  5327. Description=Unidentified adware
  5328. [cyberlat ram cleaner]
  5329. Filename=CLRamCleaner.exe
  5330. Confirmed=U
  5331. Description=<a href="http://www.cyberlat.com/ramcleaner/" target="_blank">CyberLat RAM Cleaner</a> - memory optimizer. MS MVPs (Most Valued Professional) recommend not using memory managers with Win98/SE/ME. See <a href="http://www.aumha.org/a/memmgmt.htm" target="_blank">this</a> article and make up your own mind
  5332. [cybermedia agent]
  5333. Filename=CMAGENT.EXE
  5334. Confirmed=N
  5335. Description=Part of CyberMedia's Oil Change program. Not normally required. Note - if you have TextBridge, CyberMedia Agent may attach itself to TextBridge and cause TextBridge to crash everything if this is disabled
  5336. [cyberwolf]
  5337. Filename=CyberWolf.exe
  5338. Confirmed=X
  5339. Description=Added by the <a href="http://www.symantec.com/avcenter/venc/data/w32.hllw.kickin.a@mm.html" target="_blank"> KICKIN.A</a> (or <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_CYDOG.C" target="_blank">CYDOG.C</a>) WORM!
  5340. [cydoor]
  5341. Filename=CD_Load.exe
  5342. Confirmed=X
  5343. Description=Adware. Check <a href="http://www.cexx.org/cydoor.htm" target="_blank">here</a> for information about Cy-Door and <a href="http://www.lavasoft.de/software/adaware/" target="_blank">here</a> for a program that can remove it
  5344. [cydoorupdate]
  5345. Filename=CD_Load.exe
  5346. Confirmed=X
  5347. Description=Adware. Check <a href="http://www.cexx.org/cydoor.htm" target="_blank">here</a> for information about Cy-Door and <a href="http://www.lavasoft.de/software/adaware/" target="_blank">here</a> for a program that can remove it
  5348. [cynhkey]
  5349. Filename=CYNHKey.exe
  5350. Confirmed=?
  5351. Description=<font color="#FF0000">??</font>
  5352. [cyphtray]
  5353. Filename=CyphTray.exe
  5354. Confirmed=N
  5355. Description=<a href="http://www.cypherus.com/" target="_blank">Cypherus</a> - encryption software
  5356. [d system]
  5357. Filename=dd.exe
  5358. Confirmed=X
  5359. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32mytobfn.html" target=_blank>MYTOB-FN</a> WORM!
  5360. [d-link air usb utility]
  5361. Filename=AirCFG.exe
  5362. Confirmed=Y
  5363. Description=D-Link wireless PCI adapter related
  5364. [d-link air utility]
  5365. Filename=AirCFG.exe
  5366. Confirmed=Y
  5367. Description=D-Link wireless PCI adapter related
  5368. [d-link airplus dwl-650+ utility]
  5369. Filename=WLANMON.exe
  5370. Confirmed=N
  5371. Description=D-Link Air Plus Wireless PC modem connection monitor
  5372. [d-link airplus g]
  5373. Filename=AirGCFG.exe
  5374. Confirmed=Y
  5375. Description=D-Link Airplus Wireless Router driver
  5376. [d066uutility]
  5377. Filename=D066UUTY.EXE
  5378. Confirmed=N
  5379. Description=TWAIN driver for the CanoScan D660U flatbed scanner. Start scanning via your scanner management software
  5380. [d3dupdate.exe]
  5381. Filename=bbeagle.exe
  5382. Confirmed=X
  5383. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.beagle.a@mm.html" target="_blank">BEAGLE.A</a> WORM!
  5384. [d4]
  5385. Filename=D4.exe
  5386. Confirmed=U
  5387. Description=<a href="http://www.thinkman.com/dimension4/index.html" target="_blank">Dimension 4</a> - network time synchronization freeware - starts-up, adjusts the system clock, then shuts down
  5388. [daconfigexe]
  5389. Filename=daconfig.exe
  5390. Confirmed=N
  5391. Description=3Com NIC Diagnostics. Available via Start -> Programs
  5392. [dadapp]
  5393. Filename=dadapp.exe
  5394. Confirmed=Y
  5395. Description="DadApp is the SW utility that controls the programmable buttons on Dell Laptops. Not required, but should be left in because it can create a hassle and doesn't always restore functionality to those buttons once unchecked and rechecked" - direct from Dell
  5396. [daemon tools-1033]
  5397. Filename=Daemon.exe
  5398. Confirmed=U
  5399. Description=<a href="http://www.daemon-tools.net/main.htm" target="_blank">Daemon Tools</a> - used to map an image-file (.iso, .bin etc) to a virtual CD/DVD-drive
  5400. [daily planner]
  5401. Filename=dayplan.exe
  5402. Confirmed=N
  5403. Description=Daily Planner - discontinued, and now part of <a href="http://www.kmcsonline.com/index.html" target="_blank">KMCS Deluxe System Suite</a>. Tool to plan your days, and check activities off as you complete them
  5404. [daily weather forecast]
  5405. Filename=weather.exe
  5406. Confirmed=X
  5407. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojdloaderip.html" target= blank>DLOADER-IP</a> TROJAN!
  5408. [damedware services]
  5409. Filename=dwdrce.exe
  5410. Confirmed=X
  5411. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotaoj.html" target=_blank>RBOT-AOJ</a> WORM!
  5412. [dancer]
  5413. Filename=DncLE.exe
  5414. Confirmed=U
  5415. Description=Part of Microsoft Plus! Digital Media Edition - see <a href="http://www.microsoft.com/windows/plus/dme_more/moreupdates.asp" target=_blank>here</a>
  5416. [dap]
  5417. Filename=DAP.exe
  5418. Confirmed=N
  5419. Description=<a href="http://www.speedbit.com/" target="_blank">Download Accelerator Plus</a> from Speedbit. Download manager for resuming downloads, amongst other features. Available via Start -> Programs. Note that the free version is adware based
  5420. [darkdevil.grasiele.br]
  5421. Filename=Grasiele.VBS
  5422. Confirmed=X
  5423. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/vbs.lembra@mm.html" target="_blank">LEMBRA</a> WORM!
  5424. [darkness lsass]
  5425. Filename=LsasS23.exe
  5426. Confirmed=X
  5427. Description=Added by an unidentified WORM or TROJAN!
  5428. [dashie]
  5429. Filename=N/A
  5430. Confirmed=?
  5431. Description=<font color="#FF0000">Could be related to "Dash Power Shopping" tool bar in IE?</font>
  5432. [dasxdads]
  5433. Filename=fsdqd.exe
  5434. Confirmed=X
  5435. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.gaobot.biq.html" target="_blank">GAOBOT.BIQ</a> WORM!
  5436. [data lifeguard]
  5437. Filename=BACKWE~1.EXE
  5438. Confirmed=N
  5439. Description=Data LifeGuard diagnostic tools for Western Digital's series of hard drives
  5440. [data lifeguard lifeline lite installer]
  5441. Filename=DLGLI.EXE
  5442. Confirmed=N
  5443. Description=Backweb installer - see <a href="http://www.cexx.org/dlgli.htm" target="_blank"> here</a>
  5444. [data restore service]
  5445. Filename=prq8.exe
  5446. Confirmed=X
  5447. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.kelvir.ai.html" target= blank>KELVIR.AI</a> WORM!
  5448. [data789]
  5449. Filename=Regedit.exe ....data789.tmp
  5450. Confirmed=X
  5451. Description=Homepage hijacker
  5452. [database mysql]
  5453. Filename=[path] repcale.exe [path] beird.exe
  5454. Confirmed=X
  5455. Description=Added by a variant of the <a href="http://uk.trendmicro-europe.com/enterprise/security_info/ve_detail.php?Vname=WORM_RANDON.AN" target=_blank>RANDON.AN</a> WORM!
  5456. [datacaching]
  5457. Filename=FlashKsk.exe
  5458. Confirmed=N
  5459. Description=<a href="http://www.smartdisk.com" target="_blank">SmartMedia Card</a> management from the installation of a SanDisk reader for a camera's SmartMedia card and also adds the "Unplug and Eject Hardware" System Tray icon
  5460. [datalayer]
  5461. Filename=DataLayer.exe
  5462. Confirmed=U
  5463. Description=Nokia PC Suite 5 - "A collection of powerful tools that you can use to manage your phone features and data." Synchronize the phone with, for example Outlook. You can also use it to browse your phone, edit the phone list and so on
  5464. [dataviz inc messenger]
  5465. Filename=DvzIncMsgr.exe
  5466. Confirmed=X
  5467. Description=Installed with <a href="http://www.dataviz.com/products/documentstogo/" target= blank>DataViz</a> "Documents to Go" software
  5468. [dataviz messenger]
  5469. Filename=DvzMsgr.exe
  5470. Confirmed=N
  5471. Description=<a href="http://www.dataviz.com/products/documentstogo/" target="_blank">DataViz Documents to Go</a> - "allows you to use your Word, Excel and PowerPoint files on your handheld anywhere, anytime. In addition, it now synchronizes e-mail with attachments, PDF files, pictures and Excel-like charts"
  5472. [datcheck]
  5473. Filename=datcheck.exe
  5474. Confirmed=X
  5475. Description=Added by the <a href="http://www.symantec.com/avcenter/venc/data/keypanic.trojan.html" target="_blank">KEYPANIC</a> TROJAN!
  5476. [date manager]
  5477. Filename=datemanager.exe
  5478. Confirmed=X
  5479. Description=<a href="http://www.date-manager.com/" target="_blank">Date Manager</a> - calender program. Spyware/adware based provided by The Gator Corporation
  5480. [datechecker]
  5481. Filename=N/A
  5482. Confirmed=?
  5483. Description=<font color="#FF0000">Could be related to <a href="http://www.simtel.net/pub/pd/9379.html" target="_blank">this</a>?</font>
  5484. [datemakerintl]
  5485. Filename=DateMakerIntl.exe
  5486. Confirmed=X
  5487. Description=Premium rate adult content dialler
  5488. [daupdate]
  5489. Filename=DAupdate.exe
  5490. Confirmed=X
  5491. Description=NavEnhance adware
  5492. [daw9532.exe]
  5493. Filename=DAW9532.EXE
  5494. Confirmed=?
  5495. Description=Loaded during installation of some 3Com network cards. Enables their DynamicAccess desktop management software. <font color="#FF0000">Is it required?</font>
  5496. [daytoday]
  5497. Filename=DAYTODAY.EXE
  5498. Confirmed=U
  5499. Description=<a href="http://www.locutuscodeware.com/daytoday.htm" target="_blank">DayToday</a> from RoboMagic Software Corp. Displays the date on the taskbar
  5500. [dazel delivery agent]
  5501. Filename=DcDaemon.exe
  5502. Confirmed=U
  5503. Description=Control and send documents, etc, to any destination - see <a href="http://www.clickly.com/ISSVDO4Z/EN/user/proddet.html?P=888" target="_blank">here</a>
  5504. [dbserv]
  5505. Filename=dbserv.exe
  5506. Confirmed=N
  5507. Description=Database Server for Norton Ghost on Win2k Pro. Ghost works fine when it is disabled
  5508. [dce manager]
  5509. Filename=dcemgr.exe
  5510. Confirmed=X
  5511. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.tumag.html" target="_blank">TUMAG</a> TROJAN!
  5512. [dcfssvc]
  5513. Filename=dcfssvc.exe
  5514. Confirmed=U
  5515. Description=Associated with digital cameras and can cause problems which disappear if disabled. If this program is unchecked in startup, your camera will not cause your computer to open a pop-up window when you connect it. Leave enabled if you can't load pictures from your camera/dock - Kodak's dock is an example
  5516. [dcfssve]
  5517. Filename=dcfssvc.exe
  5518. Confirmed=U
  5519. Description=Associated with digital cameras and can cause problems which disappear if disabled. If this program is unchecked in startup, your camera will not cause your computer to open a pop-up window when you connect it. Leave enabled if you can't load pictures from your camera/dock - Kodak's dock is an example
  5520. [dcom system patch]
  5521. Filename=Microsoft.exe
  5522. Confirmed=X
  5523. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_RANDEX.MS&VSect=P" target=_blank>RANDEX.MS</a> WORM!
  5524. [ddcactivemenu]
  5525. Filename=DDCActiveMenu.exe
  5526. Confirmed=N
  5527. Description=Digital Distribution Channel - formally part of the WildTangent on-line games delivery service. Note that WildTanget's privacy policy used to state that they also collect and share individuals information but this is no longer the case
  5528. [ddcm]
  5529. Filename=DDCMan.exe
  5530. Confirmed=N
  5531. Description=Digital Distribution Channel - formally part of the WildTangent on-line games delivery service. Note that WildTanget's privacy policy used to state that they also collect and share individuals information but this is no longer the case
  5532. [ddcman]
  5533. Filename=DDCMan.exe
  5534. Confirmed=N
  5535. Description=Digital Distribution Channel - formally part of the WildTangent on-line games delivery service. Note that WildTanget's privacy policy used to state that they also collect and share individuals information but this is no longer the case
  5536. [ddeproc]
  5537. Filename=ddeproc.exe
  5538. Confirmed=X
  5539. Description=Associated with Webcelerator - spyware. Read eAcceleration's privacy statement <a href="http://www.eacceleration.com/privacy/" target="_blank">here</a>
  5540. [ddhelper]
  5541. Filename=W815DM.EXE
  5542. Confirmed=U
  5543. Description=Enuff Parental Control Software by <a href="http://www.akrontech.com/" target=_blank>Akrontech</a>
  5544. [ddialler]
  5545. Filename=DDialler.exe
  5546. Confirmed=X
  5547. Description=Adult content dialler
  5548. [ddt]
  5549. Filename=N/A
  5550. Confirmed=?
  5551. Description=<font color="#FF0000">??</font>
  5552. [de32gen]
  5553. Filename=de32gen.exe
  5554. Confirmed=X
  5555. Description=Added by a variant of the <a href="http://www.sophos.com/virusinfo/analyses/trojcrypterc.html" target="_blank">CRYPTER.C</a> TROJAN!
  5556. [deadaim]
  5557. Filename=rundll32.exe DeadAIM.ocm, ExportedCheckODLs
  5558. Confirmed=N
  5559. Description=<a href="http://www.jdennis.net/DeadAIM/about.php" target="_blank">DeadAIM</a> - feature enhancing product for AOL's Instant Messenger program
  5560. [dealhelperbrwsr]
  5561. Filename=dhbrwsr.exe
  5562. Confirmed=X
  5563. Description=<a href="http://sarc.com/avcenter/venc/data/pf/adware.dealhelper.html" target="_blank">DealHelper</a> adware
  5564. [dealhelperdown]
  5565. Filename=download.exe
  5566. Confirmed=X
  5567. Description=<a href="http://sarc.com/avcenter/venc/data/pf/adware.dealhelper.html" target="_blank">DealHelper</a> adware
  5568. [dealhelperupdate]
  5569. Filename=DHUpdt.exe
  5570. Confirmed=X
  5571. Description=<a href="http://sarc.com/avcenter/venc/data/pf/adware.dealhelper.html" target="_blank">DealHelper</a> adware
  5572. [debug]
  5573. Filename=DebugW32.exe
  5574. Confirmed=X
  5575. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/trojan.gutta.html" target=_blank>GUBED</a> TROJAN!
  5576. [debugger]
  5577. Filename=dbg32.exe
  5578. Confirmed=X
  5579. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32mytobfw.html" target=_blank>MYTOB-FW</a> WORM!
  5580. [debugmonitor]
  5581. Filename=debugmonitor.exe
  5582. Confirmed=X
  5583. Description=Added by the <a href="http://www.symantec.com/avcenter/venc/data/w32.mydoom.bg@mm.html" target=_blank>MYDOOM.BG</a> WORM!
  5584. [deeenes]
  5585. Filename=DeeEnEs.exe
  5586. Confirmed=U
  5587. Description=<a href="http://www.palacio-cristal.com/products/DeeEnEs/" target=_blank>DeeEnEs</a> - automatically updates a dynamic IP address when it changes
  5588. [deejay]
  5589. Filename=forboo.exe
  5590. Confirmed=X
  5591. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32forbotay.html" target="_blank">FORBOT-AY</a> WORM!
  5592. [default system research]
  5593. Filename=vhchost.exe
  5594. Confirmed=X
  5595. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/pwsteal.tarno.i.html" target="_blank">TARNO.I</a> TROJAN!
  5596. [default web browser]
  5597. Filename=IexpIore.exe
  5598. Confirmed=X
  5599. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojoblivionb.html" target="_blank">OBLIVION.B</a> TROJAN! Note - do not confuse "IexpIore.exe" with "iexplore.exe" (Internet Explorer), the first has a captial "i" in place of lower case "L"
  5600. [default_page_url]
  5601. Filename=http://find.naupoint.com
  5602. Confirmed=X
  5603. Description=<a href="http://www.spynet.com/spyware/spyware-NauPoint-Installer.aspx" target=_blank>Naupoint</a> browser hijacker
  5604. [default_search_url]
  5605. Filename=http://find.naupoint.com
  5606. Confirmed=X
  5607. Description=<a href="http://www.spynet.com/spyware/spyware-NauPoint-Installer.aspx" target=_blank>Naupoint</a> browser hijacker
  5608. [defragm_check]
  5609. Filename=defragment.exe
  5610. Confirmed=X
  5611. Description=<a href="http://cwshredder.net/cwshredder/cwschronicles.html" target=_blank>CoolWebSearch</a> parasite variant
  5612. [defwatch]
  5613. Filename=defwatch.exe
  5614. Confirmed=U
  5615. Description=Detects out-of-date virus definitions for Norton Anti-Virus Corporate Edition and runs the Defwatch Wizard. Only required if you don't update the virus definitions manually on a regular basis
  5616. [delay]
  5617. Filename=delayrun.exe
  5618. Confirmed=U
  5619. Description=On HP PCs this program is used to help prevent conflicts or timing issues on fast computers
  5620. [delayrun]
  5621. Filename=delayrun.exe
  5622. Confirmed=U
  5623. Description=On HP PCs this program is used to help prevent conflicts or timing issues on fast computers
  5624. [delcab]
  5625. Filename=deltreew.exe C:\cabs
  5626. Confirmed=?
  5627. Description=<font color="#FF0000">??<font>
  5628. [delete me]
  5629. Filename=worm.exe
  5630. Confirmed=X
  5631. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.doomhunter.html" target="_blank">DOOMHUNTER</a> WORM!
  5632. [dell alert]
  5633. Filename=DAMon.exe
  5634. Confirmed=N
  5635. Description="Dell Alert" utility, that's supposed to make interaction with Support easier
  5636. [dell photo aio printer 962]
  5637. Filename=dlbxmon.exe
  5638. Confirmed=?
  5639. Description=DellPhoto AIO Printer 962 Device Monitor - <font color="#FF0000">is it required?</font>
  5640. [dell quickset]
  5641. Filename=quickset.exe
  5642. Confirmed=N
  5643. Description=Dell taskbar icon allowing you to quickly change settings
  5644. [dell wireless manager ui]
  5645. Filename=WLTRAY
  5646. Confirmed=U
  5647. Description=Installed alongside Dell Wireless WLAN Card and provides additional configuration options for these devices
  5648. [delldmi]
  5649. Filename=delldmi.exe
  5650. Confirmed=?
  5651. Description=<font color="#FF0000">Possibly part of <a href="http://docs.us.dell.com/docs/software/smcliins/cli60/en/ug/intro.htm" target="_blank">Dell OpenManage Client Instrumentation</a> - software that allows remote management application programs to access information about, monitor the status of or change the state of the client computer, such as shutting it down remotely. Uses the DMI and/or common information model (CIM) protocols, which are systems management protocols defined by industry standards?</font>
  5652. [dellmmkb]
  5653. Filename=DELLMMKB.EXE
  5654. Confirmed=U
  5655. Description=Multimedia keyboard control for Dell based PCs - only required if you use the multimedia keys
  5656. [dellsc]
  5657. Filename=dellsc.exe
  5658. Confirmed=N
  5659. Description=Dell Solution Center - web-based troubleshooting tools and educational offerings
  5660. [delmsbb]
  5661. Filename=delmsbb.exe
  5662. Confirmed=X
  5663. Description=<a href="http://research.sunbelt-software.com/threat_display.cfm?name=NCase&threatid=8869&search=ncase" target=_blank>nCase</a> adware
  5664. [delsaap]
  5665. Filename=delsaap.exe
  5666. Confirmed=X
  5667. Description=<a href="http://research.sunbelt-software.com/threat_display.cfm?name=NCase&threatid=8869&search=ncase" target=_blank>nCase</a> adware
  5668. [delstart]
  5669. Filename=delstart.exe
  5670. Confirmed=?
  5671. Description=Reportedly part of BT ISP software - <font color="#FF0000">what does it do and is it required in startup?</font>
  5672. [delsubmit]
  5673. Filename=rundll32.exe advpack.dll, DelNodeRunDLL32 submit.exe
  5674. Confirmed=X
  5675. Description=<a href="http://cwshredder.net/cwshredder/cwschronicles.html" target=_blank>CoolWebSearch</a> parasite variant
  5676. [deltmp]
  5677. Filename=DelTemp.exe
  5678. Confirmed=?
  5679. Description=Added to the startup list after installing a Creative SoundBlaster Audigy soundcard. <font color="#FF0000">Deletes temporary files once an installation is complete?</font>
  5680. [delttray]
  5681. Filename=deltray.exe
  5682. Confirmed=N
  5683. Description=System Tray access to the control panel for the M-Audio <a href="http://www.midiman.net/products/m-audio/delta44.php" target="_blank">Delta 44</a> PCI Analog Recording Interface. Available via a desktop shortcut, Start -> Programs or Start -> Settings -> Control Panel
  5684. [demon]
  5685. Filename=demon.exe
  5686. Confirmed=?
  5687. Description=Part of the French Wanadoo ADSL extense pack. <font color="#FF0000"> What does it do and is it required?</font>
  5688. [deneca]
  5689. Filename=Virus salvado
  5690. Confirmed=X
  5691. Description=Added by the <a href="http://www.symantec.com/avcenter/venc/data/w97m.deluz.html" target= blank>DELUZ</a> VIRUS!
  5692. [depfrez]
  5693. Filename=frzstate.exe
  5694. Confirmed=U
  5695. Description=<a href="http://www.winselect.com/pages/deepfreeze/dpfrz_info.htm?B13=More+Info" target="_blank">Deep Freeze</a> from Hyper Technologies. "Freezes" the current software configuration so that an a re-boot all changes made refer back to their original settings. Not required for most users - more likely to be used by system administrators, for example
  5696. [description of shortcuts]
  5697. Filename=*.exe
  5698. Confirmed=?
  5699. Description=<font color="#FF0000">* seems to be a sequence of alphanumerics that can be different, i.e., 1960F8A9, 4EBD23F5, etc. Each of these files would appear to be a shortcut, i.e., 4EBD23F5 is actually Works Calender Reminder (found via a registry search)</font>
  5700. [desire]
  5701. Filename=desires.exe
  5702. Confirmed=X
  5703. Description=Adult content dialler
  5704. [desk-top-service]
  5705. Filename=desk-top-service.exe
  5706. Confirmed=?
  5707. Description=<font color="#FF0000">??</font>
  5708. [deskad service]
  5709. Filename=DeskAdServ.exe
  5710. Confirmed=X
  5711. Description=<a href="http://www3.ca.com/securityadvisor/pest/pest.aspx?id=453090749" target= blank>DeskAd.Service</a> adware
  5712. [deskcolor]
  5713. Filename=DESKCOLOR.EXE
  5714. Confirmed=N
  5715. Description=Provides transparent icon text backgrounds and coloured icon text
  5716. [deskflag]
  5717. Filename=Deskflag.exe
  5718. Confirmed=N
  5719. Description=<a href="http://www.deskflag.com/" target="_blank">DeskFlag</a> - animated USA flag on the desktop
  5720. [deskmateautoupdate]
  5721. Filename=DeskMateAutoUpdate.exe
  5722. Confirmed=X
  5723. Description=DeskMates: Virtual scantily clad girls enhance your desktop. <a href="http://www.pestpatrol.com/PestInfo/b/bargainbuddy.asp" target=_blank>BargainBuddy</a> adware related
  5724. [desksite cma]
  5725. Filename=cma.exe
  5726. Confirmed=U
  5727. Description=<a href="http://www.desksitemusic.com/" target="_blank">DeskSite CMA siftware</a> - "retrieves new content from the DeskSite Data Center"
  5728. [desktop architect]
  5729. Filename=DATRAY.EXE
  5730. Confirmed=N
  5731. Description=Desktop theme manager available <a href="http://download.com.com/3000-2326-5630015.html?tag=list" target="_blank">here</a> - for managing the desktop appearance, fonts, sounds, etc
  5732. [desktop plant]
  5733. Filename=AZARE10S.PLT
  5734. Confirmed=N
  5735. Description=Vritual plant from <a href="http://www.desksoft.com/DesktopPlant.htm" target="_blank">here</a> - this version is an Azalea, there are others so the filename may be different
  5736. [desktop search]
  5737. Filename=desktop.exe
  5738. Confirmed=X
  5739. Description=iSearch "Desktop Search" hijacker
  5740. [desktop service centre]
  5741. Filename=DSC.exe
  5742. Confirmed=?
  5743. Description=OptusNet DSL or Dial-Up connection software - <font color="#FF0000">is it required?</font>
  5744. [desktop weather]
  5745. Filename=THE WEATHER CHANNEL.exe
  5746. Confirmed=N
  5747. Description=<a href="http://www.weather.com/services/desktop.html?from=tutorial" target="_blank">Desktop Weather</a> by The Weather Channel - provides current temperature, conditions, alerts, etc
  5748. [desktopmgr]
  5749. Filename=desktopmgr.exe
  5750. Confirmed=N
  5751. Description=Synchronisation manager for the cradles for the <a href="http://www.rim.net/products/index.shtml" target="_blank">Research In Motion</a> range of wireless handhelds, including the "Blackberry"
  5752. [desktopupdate]
  5753. Filename=rundll32.exe MSA64CHK.dll, DllMostrar
  5754. Confirmed=X
  5755. Description=<a href="http://research.sunbelt-software.com/threat_display.cfm?name=MatrixDialer&threatid=14914&search=MatrixDialer" target=_blank>MatrixDialer</a> related
  5756. [desktopx]
  5757. Filename=DESKTOPX.EXE
  5758. Confirmed=U
  5759. Description=A program that replaces the regular Desktop and Taskbar, and can be changed to the user's liking
  5760. [deskup]
  5761. Filename=deskup.exe
  5762. Confirmed=N
  5763. Description=Adds Iomega Zip drive icons to the desktop
  5764. [destroyb11]
  5765. Filename=destroyb11.exe
  5766. Confirmed=X
  5767. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojdelfko.html" target=_blank>DELF-KO</a> TROJAN!
  5768. [detector]
  5769. Filename=detector.exe
  5770. Confirmed=N
  5771. Description=USB port detector for LG scanners. Sits in the System Tray, and when it detects the scanner through the USB port, you can run the scanner software from the tray. It is not required at all, since you can use the scan software from almost any photo editing software
  5772. [deventagent]
  5773. Filename=eventagt.exe
  5774. Confirmed=U
  5775. Description=DEvent Agent Module client - part of Dell OpenManage and used for server management. Only required if you use this
  5776. [device configuration loader]
  5777. Filename=msdvc32.exe
  5778. Confirmed=X
  5779. Description=Added by a variant of the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_AGOBOT.GEN" target=_blank>AGOBOT/GAOBOT</a> WORM!
  5780. [device detector]
  5781. Filename=DevDetect.exe
  5782. Confirmed=U
  5783. Description=Watches for external digital imaging products being connected from <a href="http://www.acdsystems.com/English/index.htm" target="_blank">ACD Systems</a>
  5784. [device detector 2]
  5785. Filename=DevDtct2.exe
  5786. Confirmed=N
  5787. Description=Installed by various Olympus products, this program detects the active connection of a speech device (voice recorder, etc) to a USB port then runs specific client software used to access that device. The DevDtct2 process has a "high" priority level which can negatively impact system resources
  5788. [devicediscovery]
  5789. Filename=hpotdd01.exe
  5790. Confirmed=U
  5791. Description=Detection of new imaging, printing and other peripherals on HP machines such as USB printers, cameras and Bluetooth products. "This program is a non-essential process, but should not be terminated unless suspected to be causing problems"
  5792. [devices]
  5793. Filename=olesvr.exe
  5794. Confirmed=U
  5795. Description=Salfeld <a href="http://www.salfeld.com/parental_control_overwiew.htm" target="_blank">Child Control 2003</a> - parental control software
  5796. [devicewin]
  5797. Filename=[path to trojan]
  5798. Confirmed=X
  5799. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojbankeraev.html" target=_blank>BANKER-AEV</a> TROJAN!
  5800. [devldr16]
  5801. Filename=devldr16.exe
  5802. Confirmed=U
  5803. Description=Associated with some Creative Labs sound cards.  Provides audio support for DOS applications.  Not needed if you don't have those. Required if you use "Sound Play Control" and "Sound Recorder". To disable: (1) Disable via MSCONFIG (2) Start -> Settings -> Control Panel -> System -> Device Manager then disable "Creative SB16 Emulation" under Creative Miscellaneous Devices
  5804. [devldr16.exe]
  5805. Filename=devldr16.exe
  5806. Confirmed=U
  5807. Description=Associated with some Creative Labs sound cards. Provides audio support for DOS applications. Not needed if you don't have those. Required if you use "Sound Play Control" and "Sound Recorder". To disable: (1) Disable via MSCONFIG (2) Start -> Settings -> Control Panel -> System -> Device Manager then disable "Creative SB16 Emulation" under Creative Miscellaneous Devices
  5808. [dgjm]
  5809. Filename=DGJM.exe
  5810. Confirmed=?
  5811. Description=<font color="#FF0000">??</font>
  5812. [dgtstart]
  5813. Filename=dgtstart.exe
  5814. Confirmed=X
  5815. Description=<a href="http://www.viruslist.com/en/viruses/encyclopedia?virusid=80885" target=_blank>DigitalNames.g</a> adware
  5816. [dguard]
  5817. Filename=dguard.exe
  5818. Confirmed=N
  5819. Description=eAcceleration Stop-Sign related - not recommended, see <a href="http://www.spywarewarrior.com/rogue_anti-spyware.htm#ss_note" target="_blank">note</a>
  5820. [dhcp server]
  5821. Filename=regsvr.exe
  5822. Confirmed=X
  5823. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotpr.html" target=_blank>RBOT-PR</a> WORM!
  5824. [dhcpagnt]
  5825. Filename=dhcpagnt.exe
  5826. Confirmed=Y
  5827. Description=Intel DSL modem driver - leave enabled or you'll have to re-install the drivers
  5828. [dhnuxb]
  5829. Filename=DHNUXB.exe
  5830. Confirmed=?
  5831. Description=<font color="#FF0000">??</font>
  5832. [diagent]
  5833. Filename=diagent.exe
  5834. Confirmed=N
  5835. Description=System Tray access for Creative Diagnostics for the Creative SoundBlaster series soundcards. Available via Start -> Programs
  5836. [dial22]
  5837. Filename=dlm.exe
  5838. Confirmed=X
  5839. Description=Adult content dialler
  5840. [dial33]
  5841. Filename=dlm.exe
  5842. Confirmed=X
  5843. Description=Adult content dialler
  5844. [dialer]
  5845. Filename=rundll32.exe msa32chk.dll
  5846. Confirmed=X
  5847. Description=Unidentfied malware
  5848. [dialer control]
  5849. Filename=dc.exe
  5850. Confirmed=U
  5851. Description=<a href="http://www.dialer-control.de/" target="_blank">Dialer-Control</a>. Detects and protects from premium rate p0rn diallers
  5852. [dialer detect]
  5853. Filename=dd.exe
  5854. Confirmed=U
  5855. Description=<a href="http://www.dialerdetect.nl/english/main.htm" target=_blank>DialerDetect</a> detects stealth installed premium rate diallers, and sounds the alarm when such a connection is being installed without you knowing it
  5856. [dialgo sdk]
  5857. Filename=PhoneAnswer.exe
  5858. Confirmed=U
  5859. Description=Dialgo Wave Modem ActiveX - "Telephone Answering Machine for scripting your own professional call center business scripts using a voice modem. Features Caller-ID, Wave Playback, Wave Recording, Digit Monitoring, POP3 e-mail Manipulation, Speech Recognition and Synthesis"
  5860. [dialnet]
  5861. Filename=mxt32.exe
  5862. Confirmed=X
  5863. Description=Adult content dialler
  5864. [dialog box assistant]
  5865. Filename=OSDEx.exe
  5866. Confirmed=N
  5867. Description=<a href="http://www.dualitysoft.com/osdex/" target="_blank">Dialog Box Assistant</a> from Duality Software. Helps with the standard Open and Save As dialog boxes by showing recently used files and folders
  5868. [dialog helper]
  5869. Filename=PDDLGHLP.EXE
  5870. Confirmed=N
  5871. Description=Dialog Helper from <a href="http://www.ontrack.com/powerdesk/">PowerDesk Pro</a> by Ontrack. Helps with the standard Open and Save As dialog boxes by showing recently used files and folders. Available via Start -> Programs
  5872. [dialup network application]
  5873. Filename=Rnaap.exe
  5874. Confirmed=X
  5875. Description=Added by a variant of the <a href="http://vil.nai.com/vil/content/v_100454.htm" target=_blank>SDBOT</a> WORM!
  5876. [diamondview]
  5877. Filename=Diamondview.exe
  5878. Confirmed=?
  5879. Description=Manulife Financial Insurance program. <font color="#FF0000">Is it required at startup?<font>
  5880. [diecox]
  5881. Filename=csrss.exe
  5882. Confirmed=X
  5883. Description=Added by a variant of the <a href="http://vil.nai.com/vil/content/v_100826.htm" target="_blank">ATM.GEN</a> TROJAN! Note - this is not the legitimate <a href="http://www.liutilities.com/products/wintaskspro/processlibrary/csrss/" target="_blank">csrss.exe</a> process, which should not appear in Msconfig/Startup!
  5884. [diesel]
  5885. Filename=Recalculate.exe
  5886. Confirmed=X
  5887. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/trojan.lazar.html" target=_blank>LAZAR</a> TROJAN!
  5888. [dietk]
  5889. Filename=DietK.exe
  5890. Confirmed=U
  5891. Description=<a href="http://www.dietk.com/" target="_blank">DietK</a> - add-on for Kazaa Media Desktop; "removes all adware and popups, built in Download Accelerator, makes searches faster and helps produce more results"
  5892. [digicell]
  5893. Filename=DigiCell.exe
  5894. Confirmed=U
  5895. Description=MSI DigiCell - "the most useful and powerful utility that MSI has spent much research and efforts to develop, helps users to monitor and configure all the integrated peripherals of the system, such as audio program, power management, MP3 files management and communication / 802.11g WLAN settings. Moreover, with this unique utility, you will be able to activate the MSI well-known features, Live Update and Core Center"
  5896. [digid]
  5897. Filename=DigitalSound.exe
  5898. Confirmed=X
  5899. Description=Adware downloader
  5900. [digital dashboard]
  5901. Filename=devgulp.exe
  5902. Confirmed=N
  5903. Description=For Compaq PC's. Loads Digital Dashboard options
  5904. [digital line detect]
  5905. Filename=DLG.exe
  5906. Confirmed=N
  5907. Description=Detects whether your are plugged into a digital telephone line and displays the information graphically. Installed by Dell (and maybe others) and is included with all Connexant V.92 and Broadcom modems
  5908. [digital river ebot]
  5909. Filename=downlo~1.exe
  5910. Confirmed=N
  5911. Description=Digital River Systems EBOT for downloading software from their site. In some cases, if you purchase software online for a download from a software manufacturer, you will be sent to this online company's site for the download after the purchase is complete. Read more <a href="http://groups.google.com/groups?hl=en&threadm=39727D1B.3754C1D1%40concentric.net&rnum=3&prev=/groups%3Fq%3DDigital%2BRiver%2BeBot%26btnG%3DGoogle%2BSearch%26hl%3Den" target="_blank">here</a>
  5912. [digitalnames]
  5913. Filename=DigitalNamesStart.exe
  5914. Confirmed=X
  5915. Description=<a href="http://securityresponse.symantec.com/avcenter/venc/data/spyware.digitalnames.html" target=_blank>DigitalNames</a> spyware variant
  5916. [digitalwizard]
  5917. Filename=ISWizard.exe
  5918. Confirmed=N
  5919. Description=InstallShield's DigitalWizard - free, complete Digital Content Management Solution that makes it easy to experience digital content
  5920. [digitalwizard monitor]
  5921. Filename=dwMon.exe
  5922. Confirmed=N
  5923. Description=InstallShield's DigitalWizard - free, complete Digital Content Management Solution that makes it easy to experience digital content
  5924. [digservices]
  5925. Filename=DIGServices
  5926. Confirmed=U
  5927. Description=Created by Disney but licensed to ESPN for watching videos
  5928. [digstream]
  5929. Filename=digstream.exe
  5930. Confirmed=N
  5931. Description=DIGStream Cache Manager - part of <a href="http://espn.go.com/motion/download.html" target="_blank">ESPN Motion</a> and <a href="http://disney.go.com/guestservices/disneymotion/about.html" target="_blank"> Disney Motion</a> that periodically check for new videos and indication they're available in the System Tray. Starting ESPN Motion/Disney Motion starts digstream automatically
  5932. [dimension]
  5933. Filename=Dimension.exe
  5934. Confirmed=U
  5935. Description=Dimension - a program which lets you customize MSN messenger such as adding animated and coloured nicknames, personal toast creator, war tools (login flooder), and allows viewing and interacting with the raw MSN protocol
  5936. [dimension4]
  5937. Filename=d4.exe
  5938. Confirmed=U
  5939. Description=<a href="http://www.thinkman.com/dimension4/index.html" target="_blank">Dimension 4</a> - network time synchronization freeware - starts-up, adjusts the system clock, then shuts down
  5940. [dino3]
  5941. Filename=dino3.exe
  5942. Confirmed=X
  5943. Description=Related to Jurassic Park III and enables a dinosaur to walk across the screen. Also generates adverts and classified as adware as a result
  5944. [dinst]
  5945. Filename=dinst.exe
  5946. Confirmed=X
  5947. Description=<a href="http://securityresponse.symantec.com/avcenter/venc/data/adware.ieplugin.html" target=_blank>IMIServer/IEPlugin</a> adware
  5948. [dir1]
  5949. Filename=caKe
  5950. Confirmed=X
  5951. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.hllw.cake.html" target="_blank">CAKE</a> WORM!
  5952. [direct settings]
  5953. Filename=sdchost.exe
  5954. Confirmed=X
  5955. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojdaemonii.html" target=_blank>DAEMONI-I</a> TROJAN!
  5956. [direct update]
  5957. Filename=DUControl.exe
  5958. Confirmed=U
  5959. Description=<a href="http://www.directupdate.net/" target="_blank">DirectUpdate</a> dynamic DNS updater
  5960. [direct x direct3d]
  5961. Filename=dxd3d.exe
  5962. Confirmed=X
  5963. Description=Added by a variant of the <a href="http://vil.nai.com/vil/content/v_100454.htm" target=_blank>SDBOT</a> WORM!
  5964. [direct x opengl]
  5965. Filename=dxopengl.exe
  5966. Confirmed=X
  5967. Description=Added by a variant of the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotcj.html" target=_blank>RBOT-CJ</a> WORM!
  5968. [direct3d.exe]
  5969. Filename=direct3d.exe
  5970. Confirmed=X
  5971. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojcertiff.html" target=_blank>CERTIF-F</a> TROJAN!
  5972. [directcd]
  5973. Filename=DirectCD.exe
  5974. Confirmed=N
  5975. Description=DirectCD primarily allows you to drag and drop files onto a suitably formatted CD-RW disc. Unless you use this on a frequent basis it isn't required and is available via Start -> Programs. Start the program before inserting a DirectCD formatted CD-RW in the drive. A re-boot is recommended if you close Adaptec DirectCD before re-opening it again later
  5976. [directs.exe]
  5977. Filename=directs.exe
  5978. Confirmed=X
  5979. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.beagle.o@mm.html" target="_blank">BEAGLE.O</a> or <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.beagle.r@mm.html" target="_blank">BEAGLE.R</a> or <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.beagle.s@mm.html" target="_blank">BEAGLE.S</a> or <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.beagle.t@mm.html" target="_blank">BEAGLE.T</a> WORMS!
  5980. [directvdsl]
  5981. Filename=Directvdsl.exe
  5982. Confirmed=U
  5983. Description=Starts DirectTV DSL modem at boot up. Can also be started manually
  5984. [directx 32]
  5985. Filename=directx32.exe
  5986. Confirmed=X
  5987. Description=Added by a variant of the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_AGOBOT.GEN" target=_blank>AGOBOT/GAOBOT</a> WORM!
  5988. [directx for microsoft?windows]
  5989. Filename=fservice.exe
  5990. Confirmed=X
  5991. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojproratp.html" target=_blank>PRORAT-P</a> TROJAN!
  5992. [directx shell driver]
  5993. Filename=[path to trojan]
  5994. Confirmed=X
  5995. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojmarktmanb.html" target=_blank>MARKTMAN-B</a> TROJAN!
  5996. [directx video driver]
  5997. Filename=dxterm5.exe
  5998. Confirmed=X
  5999. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32wilaba.html" target=_blank>WILAB-A</a> TROJAN!
  6000. [directx64]
  6001. Filename=DirectXset.exe
  6002. Confirmed=X
  6003. Description=Added by the <a href="http://vil.nai.com/vil/content/v_100098.htm" target="_blank">BROWNEY.A</a> WORM!
  6004. [directx9 diag]
  6005. Filename=dx9diag.exe
  6006. Confirmed=X
  6007. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotalt.html" target=_blank>RBOT-ALT</a> WORM!
  6008. [dirkey]
  6009. Filename=Dirkey.exe
  6010. Confirmed=U
  6011. Description=<a href="http://www.protonfx.com/dirkey/" target="_blank">Dirkey</a> - small utility that allows you to bookmark up to 9 folders by using the Ctrl+Alt+1..9 shortcut keys in an Open/Save File dialog or in Windows Explorer. After this the Ctrl+1..9 shortcut keys can be used in the same or another window to go to any of the 9 bookmarked folders 
  6012. [disable ehci]
  6013. Filename=nousb20.exe
  6014. Confirmed=?
  6015. Description=<font color="#FF0000">??</font>
  6016. [discoveg]
  6017. Filename=discoveg.exe
  6018. Confirmed=?
  6019. Description=<font color="#FF0000">??</font>
  6020. [discoverdeskshop]
  6021. Filename=Deskshop.exe
  6022. Confirmed=N
  6023. Description=<a href="http://www.dealchecker.com/doc.cfm?OID=1091" target="_blank">Discover Deskshop</a> - single use "virtual" credit card
  6024. [disk manager]
  6025. Filename=diskver.exe
  6026. Confirmed=X
  6027. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_RBOT.AQT" target=_blank>RBOT.AQT</a> WORM!
  6028. [disk master]
  6029. Filename=[trojan name]
  6030. Confirmed=X
  6031. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.dister.html" target="_blank">DISTER</a> TROJAN! - a spam relayer
  6032. [diskcheck]
  6033. Filename=msdarkend.exe
  6034. Confirmed=X
  6035. Description=Added by an unidentified WORM or TROJAN!
  6036. [diskeepersystray]
  6037. Filename=DkIcon.exe
  6038. Confirmed=N
  6039. Description=<a href="http://www.executive.com/defrag/defrag.asp" target=_blank>DisKeeper</a> defragmentation software - can be started manually
  6040. [diskinf]
  6041. Filename=diskinf.exe
  6042. Confirmed=X
  6043. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=TROJ_CRYPTER.A" target="_blank">CRYPTER.A</a> TROJAN!
  6044. [diskmon.exe]
  6045. Filename=DISKMON.EXE
  6046. Confirmed=?
  6047. Description=<font color="#FF0000">??</font>
  6048. [disknag]
  6049. Filename=disknag.exe
  6050. Confirmed=N
  6051. Description=Dell program that reminds you to make your  backup diskettes
  6052. [disk_monitor]
  6053. Filename=Disk_Monitor.exe
  6054. Confirmed=U
  6055. Description=Multi-media, Smartmedia, Compact Flash card reader for reading digital camera cards. Device is recognised as internal USB disk drive. Necessary if camera cards are to be recognised as soon as they are inserted into the reader
  6056. [display]
  6057. Filename=The_Eye.exe
  6058. Confirmed=U
  6059. Description=Added by the <a href="http://www.symantec.com/avcenter/venc/data/spyware.comspysyssvr.html" target=_blank>ComSpySysSvr</a> surveillance software. Uninstall this software unless you put it there yourself
  6060. [display drivers]
  6061. Filename=cssrs.exe
  6062. Confirmed=X
  6063. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_AGOBOT.FX" target="_blank">AGOBOT.FX</a> WORM!
  6064. [display settings]
  6065. Filename=hptasks.exe
  6066. Confirmed=N
  6067. Description=Allows for the adjustment of the display for LCD screen, CRT Monitor and TV output on HP computers
  6068. [displaytrayicon]
  6069. Filename=TrayIcon.exe
  6070. Confirmed=N
  6071. Description=System Tray access to display properties for ABIT graphics cards. Unless you change your desktop resolution, etc regularily use Control Panel -> Display
  6072. [disspy]
  6073. Filename=disspy.exe
  6074. Confirmed=U
  6075. Description=<a href="http://www.h-desk.com/new/Features.13.0.html" target= blank>Disspy</a> spyware detection and removal software
  6076. [distiller assistant 3.01]
  6077. Filename=DISTASST.EXE
  6078. Confirmed=N
  6079. Description=From Adobe. Creates PDF universal files for Acrobat Reader. Available via Start -> Programs
  6080. [distributed.net client]
  6081. Filename=DNETC.EXE
  6082. Confirmed=U
  6083. Description=Dsitributed computing projects client from <a href="http://distributed.net/" target="_blank">Distributed.net</a> where numerous computers are used to share a projects workload - similar to SETI@Home and Folding@Home. Also prone to being distributed by <a href="http://distributed.net/trojans.html.en" target="_blank">viruses</a>
  6084. [ditask.exe]
  6085. Filename=DiTask.exe
  6086. Confirmed=N
  6087. Description=Associated with an <a href="http://www.eicon.com/worldwide/default.htm" target="_blank">Eicon Networks</a> ISDN or ADSL modem. System Tray icon which shows you the status of your lines (free, occupied with incoming or outgoing call). Available via Start -> Programs
  6088. [divamon.exe]
  6089. Filename=Divamon.exe
  6090. Confirmed=?
  6091. Description=Associated with an <a href="http://www.eicon.com/worldwide/default.htm" target=_blank>Eicon Networks</a> Diva ISDN or ADSL modem - <font color="#FF0000">what does it do and is it required?</font>
  6092. [divx mediaplayer 7.0]
  6093. Filename=Dr.DivX.exe
  6094. Confirmed=X
  6095. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.irc.aladinz.g.html" target="_blank">ALADINZ.G</a> TROJAN!
  6096. [divx player]
  6097. Filename=DivXPlayer.exe
  6098. Confirmed=X
  6099. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  6100. [divx updater]
  6101. Filename=DivX.Exe
  6102. Confirmed=X
  6103. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/trojan.naldem.html" target="_blank">NALDEM</a> TROJAN or MASTAK VIRUS!
  6104. [divx4 codec]
  6105. Filename=devldr32.exe
  6106. Confirmed=X
  6107. Description=Added by an unidentfied VIRUS! Note - this is not the legitimate Creative Labs <a href="http://www.liutilities.com/products/wintaskspro/processlibrary/devldr32/F412" target=_blank>devldr32.exe</a> file
  6108. [djregfix]
  6109. Filename=regedit /s c:\hpdjregfix.reg
  6110. Confirmed=N
  6111. Description=DJRegFix showed up first in WinME as a "clever" way to ensure that all Hewlett-Packard DeskJet printers actually worked with WinME - since most were having major problems. This "utility" adds the functionality and compatibility HP forgot to add in its WinME drivers
  6112. [dkservice]
  6113. Filename=DkService.exe
  6114. Confirmed=Y
  6115. Description=From Executive Software's Diskeeper defragmenting utility - a replacement for Windows Disk Defragmenter. It's recommended to leave this enabled, otherwise you could have problems starting it manually.
  6116. [dktime]
  6117. Filename=dktime.exe
  6118. Confirmed=X
  6119. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/downloader.lunii.html" target="_blank">LUNII</a> TROJAN!
  6120. [dkware lptt01]
  6121. Filename=dkware.exe
  6122. Confirmed=X
  6123. Description=<a href="http://www.wilderssecurity.net/specialinfo/rapidblaster.html" target="_blank">RapidBlaster</a> variant (in a "DonkeySoft" folder in Program Files). Recommended you use RapidBlaster Killer to uninstall - see <a ref="http://www.wilderssecurity.net/specialinfo/rapidblaster.html#removal" target="_blank"> here</a>
  6124. [dkware ml097e]
  6125. Filename=dkware.exe
  6126. Confirmed=X
  6127. Description=<a href="http://www.wilderssecurity.net/specialinfo/rapidblaster.html" target="_blank">RapidBlaster</a> variant (in a "DonkeySoft" folder in Program Files). Recommended you use RapidBlaster Killer to uninstall - see <a ref="http://www.wilderssecurity.net/specialinfo/rapidblaster.html#removal" target="_blank"> here</a>
  6128. [dkzzixm]
  6129. Filename=dkzzixm.exe
  6130. Confirmed=?
  6131. Description=<font color="#FF0000">??</font>
  6132. [dla]
  6133. Filename=tfswctrl.exe
  6134. Confirmed=Y
  6135. Description=Drive letter access to a UDF packet writer for CD-RW - from HP, Veritas an others. Similar to Roxio's DirectCD and does the same thing. From HP - "This is a needed file as it controles the readability of the Combo drives. Without this file loading the end user will be able to burn CD's but wont be able to read them. The drive itself will be able to read store bought master Cd's without the file but not burnt ones"
  6136. [dlatray]
  6137. Filename=Dlatray.exe
  6138. Confirmed=N
  6139. Description=System Tray access to DLA - Drive letter access to HP's and Veritas' version of DirectCD. Does the same thing as DirectCD. From HP - "This is a needed file as it controles the readability of the Combo drives. Without this file loading the end user will be able to burn CD's but wont be able to read them. The drive itself will be able to read store bought master Cd's without the file but not burnt ones"
  6140. [dlbcserv]
  6141. Filename=dlbcserv.exe
  6142. Confirmed=?
  6143. Description=Related to a Dell Photo Printer - <font color="#FF0000">what does it do and is it required?</font>
  6144. [dlder]
  6145. Filename=dlder.exe
  6146. Confirmed=X
  6147. Description=Advertising spyware. Considered to be one oft the worst - even creating a fake "explorer.exe" file. Can be installed via versions of "Grokster", "Lime Wire" and "KaZaA" amongst other file-sharing utilities (see <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.dlder.html" target="_blank">here</a>). Reported in the past as a virus
  6148. [dldir1]
  6149. Filename=caKe
  6150. Confirmed=X
  6151. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.hllw.cake.html" target="_blank">CAKE</a> WORM!
  6152. [dlforcerexe]
  6153. Filename=DLForcerEXE.exe
  6154. Confirmed=?
  6155. Description=<font color="#FF0000">??</font>
  6156. [dlf_00000b00]
  6157. Filename=Vcdlf.exe
  6158. Confirmed=N
  6159. Description=Known to cause problems with "Out of memory" errors (see <a href="http://support.microsoft.com/default.aspx?scid=kb;EN-US;q303045" target="_blank">here</a>).<font color="#FF0000"> Otherwise, it's purpose is unknown</font>
  6160. [dlg]
  6161. Filename=DLGCHBW.exe
  6162. Confirmed=N
  6163. Description=Backweb part of Data LifeGuard - diagnostic tools for Western Digital's series of hard drives. Automatically detects an internet connection and downloads any available updates
  6164. [dlhelperexe]
  6165. Filename=WATCH.exe
  6166. Confirmed=N
  6167. Description=Download helper distributed with some software that allows the software installation to redirect download locations. Not required once the installation is finished
  6168. [dlhelperexe.exe]
  6169. Filename=N/A
  6170. Confirmed=X
  6171. Description=Downloader for Microgaming/Casino software - stealth installed
  6172. [dlhost]
  6173. Filename=dlhost.exe
  6174. Confirmed=X
  6175. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojexphooka.html" target=_blank>EXPHOOK-A</a> TROJAN!
  6176. [dlink system tray]
  6177. Filename=dlnetst.exe
  6178. Confirmed=U
  6179. Description=Related to <a href="http://www.dlink.com/products/?pid=284" target=_blank>D-Link</a> DGE-530T PCI card for servers and workstations
  6180. [dlite]
  6181. Filename=dllmanager.exe
  6182. Confirmed=X
  6183. Description=Added by the <a href="http://es.trendmicro-europe.com/consumer/security_info/ve_detail.php?Vname=WORM_WOOTBOT.DN" target=_blank>WOOTBOT.DN</a> WORM!
  6184. [dll boot loader on startup (do not remove this)]
  6185. Filename=[various filenames]
  6186. Confirmed=X
  6187. Description=Added by an unidentified TROJAN!
  6188. [dll manager]
  6189. Filename=dllmngr32.exe
  6190. Confirmed=X
  6191. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  6192. [dll service manager]
  6193. Filename=[path to worm]
  6194. Confirmed=X
  6195. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.irc.rpcbot.f.html" target="_blank">RPCBOT.F</a> TROJAN!
  6196. [dllcacherv2]
  6197. Filename=dllcachev2.exe
  6198. Confirmed=X
  6199. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.lateda.html" target=_blank>LATEDA</a> TROJAN!
  6200. [dlldmt]
  6201. Filename=dlldmt.exe
  6202. Confirmed=X
  6203. Description=Added by a variant of the <a href="http://www.sophos.com/virusinfo/analyses/trojcrypterc.html" target="_blank">CRYPTER.C</a> TROJAN!
  6204. [dllexecutable]
  6205. Filename=[path to file]
  6206. Confirmed=X
  6207. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32vbsp.html" target= blank>VB-SP</a> WORM!
  6208. [dllhostxp.exe]
  6209. Filename=dllhostxp.exe
  6210. Confirmed=X
  6211. Description=Browser hijacker and adware downloader
  6212. [dllloader]
  6213. Filename=lssas.exe
  6214. Confirmed=X
  6215. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojbdoorje.html" target=_blank>JE</a> WORM!
  6216. [dlload]
  6217. Filename=killer.exe
  6218. Confirmed=X
  6219. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojkillavfk.html" target=_blank>KILLAV-FK</a> TROJAN!
  6220. [dllreg]
  6221. Filename=dllreg.exe
  6222. Confirmed=X
  6223. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=TROJ_CRYPTER.A" target="_blank">CRYPTER.A</a> TROJAN!
  6224. [dllservice32]
  6225. Filename=dllsvc32.exe
  6226. Confirmed=X
  6227. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_AGOBOT.VX" target=_blank>AGOBOT.VX</a> WORM!
  6228. [dlsp2mx]
  6229. Filename=dlsp2mx.exe
  6230. Confirmed=X
  6231. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/dialmpbb.html" target=_blank>MPB-B</a> DIALER! An uninstall option can be accessed via the Add or Remove Programs dialog in the Windows Control Panel. The software is listed as "dlsp2mx"
  6232. [dlt]
  6233. Filename=dlt.exe
  6234. Confirmed=?
  6235. Description=<font color="#FF0000">??</font>
  6236. [dluxde]
  6237. Filename=dluxde.exe
  6238. Confirmed=X
  6239. Description=All-In-One-Telcom (adult content dialler) variant
  6240. [dluxjp]
  6241. Filename=cnfrm.exe
  6242. Confirmed=X
  6243. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/downloader.dluca.d.html" target="_blank">DLUCA.D</a> TROJAN!
  6244. [dm mgr]
  6245. Filename=dm_mgr.exe
  6246. Confirmed=X
  6247. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.jittar.html" target="_blank">JITTAR</a> TROJAN!
  6248. [dmc]
  6249. Filename=dmc.exe
  6250. Confirmed=X
  6251. Description=Added by Trojan-Downloader.Win32.Dluca.bv TROJAN!
  6252. [dmildr]
  6253. Filename=dmildr.exe
  6254. Confirmed=N
  6255. Description=Part of <a href="http://docs.us.dell.com/docs/software/smcliins/cli60/en/ug/intro.htm" target="_blank">Dell OpenManage Client Instrumentation</a> - software that allows remote management application programs to access information about, monitor the status of or change the state of the client computer, such as shutting it down remotely. Uses the DMI and/or common information model (CIM) protocols, which are systems management protocols defined by industry standards. Available via Start -> Programs 
  6256. [dmisl]
  6257. Filename=DMISL.EXE
  6258. Confirmed=N
  6259. Description=DMI (Desktop Management Interface) Service Layer for Intel TokenExpress network card software. DMI support for the Intel network card managed through the Desktop Management Interface. See <a href="http://support.intel.com/support/tokenexpress/pro/11601.htm" target="_blank">here</a> for more information
  6260. [dmislapp]
  6261. Filename=DMISLAPP.exe
  6262. Confirmed=N
  6263. Description=DMI (Desktop Management Interface) Service Layer for Intel TokenExpress network card software. DMI support for the Intel network card managed through the Desktop Management Interface. See <a href="http://support.intel.com/support/tokenexpress/pro/11601.htm" target=_blank>here</a> for more information
  6264. [dmsvc32]
  6265. Filename=Dmsvc32.exe
  6266. Confirmed=X
  6267. Description=Added by the <a href="http://es.trendmicro-europe.com/enterprise/security_info/ve_detail.php?VName=WORM_AGOBOT.ABU&VSect=T" target=_blank>AGOBOT.ABU</a> WORM!
  6268. [dmtdll]
  6269. Filename=dmtdll.exe
  6270. Confirmed=X
  6271. Description=Added by a variant of the <a href="http://www.sophos.com/virusinfo/analyses/trojcrypterc.html" target="_blank">CRYPTER.C</a> TROJAN!
  6272. [dmxlauncher]
  6273. Filename=DMXLauncher.exe
  6274. Confirmed=U
  6275. Description=Part of Dell's Media Experience, a multimedia suite which offers the user functionality to organise and play music and digital video files
  6276. [dm_server]
  6277. Filename=dmserver.exe
  6278. Confirmed=X
  6279. Description=<a href="http://research.sunbelt-software.com/threat_display.cfm?name=Comet%20Cursor&threatid=29168&search=Comet%20Cursor" target=_blank>Comet Cursor</a> adware
  6280. [dm_service]
  6281. Filename=[path to file]
  6282. Confirmed=X
  6283. Description=Added by the <a href="http://www.symantec.com/avcenter/venc/data/trojan.mitglieder.p.html" target=_blank>MITGLIEDER.P</a> TROJAN!
  6284. [dnar]
  6285. Filename=Dnar.exe
  6286. Confirmed=X
  6287. Description=Unknown, except that it is not necessary. Tends to phone home a lot. DMI related - see <a href="http://www.spywareinfo.com/yabbse/index.php?board=10;action=display;threadid=1137;start=0" target="_blank">here</a>
  6288. [dne binding watchdog]
  6289. Filename=rundll dnes.dll, DnDneCheckBindings
  6290. Confirmed=Y
  6291. Description=Deterministic NDIS Extender (DNE). DNE is an NDIS-compliant module which appears to be a network device driver to all protocol stacks and a protocol driver to all network device drivers. Part of Gilat Communications internet satellite systems. Required if you have this system. Also installed by Winproxy - a proxy program for sharing internet connections through one computer. Required if you want it to work
  6292. [dne dun watchdog]
  6293. Filename=rundll dnes.dll, DnDneCheckDUN13
  6294. Confirmed=Y
  6295. Description=Deterministic NDIS Extender (DNE). DNE is an NDIS-compliant module which appears to be a network device driver to all protocol stacks and a protocol driver to all network device drivers. Part of Gilat Communications internet satellite systems. Required if you have this system. Also installed by Winproxy - a proxy program for sharing internet connections through one computer. Required if you want it to work
  6296. [dns resolver]
  6297. Filename=dnsrslve.exe
  6298. Confirmed=X
  6299. Description=Added by the <a href="http://sophos.com/virusinfo/analyses/w32rbotws.html" target=_blank>RBOT-WS</a> WORM!
  6300. [dns service]
  6301. Filename=dnsresolver.exe
  6302. Confirmed=X
  6303. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotpq.html" target=_blank>RBOT-PQ</a> WORM!
  6304. [dns2goclient]
  6305. Filename=dns2goclient.exe
  6306. Confirmed=?
  6307. Description=<a href="http://dns2go.deerfield.com/" target="_blank">DNS2Go</a> is a Domain Name System that will make your computer accessible anytime, anywhere by associating a domain name of your choice to your currently assigned IP address. <font color="#FF0000">Is it required?</font>
  6308. [dnscacheboost]
  6309. Filename=dnsping.exe
  6310. Confirmed=X
  6311. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojdnsbusta.html" target= blank>DNSBUST-A</a> TROJAN!
  6312. [dnscleaner]
  6313. Filename=dnscleaner.exe
  6314. Confirmed=X
  6315. Description=<a href="http://cwshredder.net/cwshredder/cwschronicles.html" target=_blank>CoolWebSearch</a> parasite variant
  6316. [dnxvc]
  6317. Filename=dnxvc.exe
  6318. Confirmed=?
  6319. Description=<font color="#FF0000">??</font>
  6320. [doctor]
  6321. Filename=Doctor.exe
  6322. Confirmed=X
  6323. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_DOTOR.A" target="_blank">DOTOR.A</a> WORM!
  6324. [documagix init]
  6325. Filename=PWATCH.EXE
  6326. Confirmed=N
  6327. Description=<a href="http://www.documagix.com/" target="_blank">PaperMaster</a> is an application for the PC designed to automate the process of organizing, archiving, and retrieving digital versions of files. Start manually if needed
  6328. [doggy style]
  6329. Filename=MsPMSPSd.exe
  6330. Confirmed=X
  6331. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32sdbotaap.html" target=_blank>SDBOT-AAP</a> WORM!
  6332. [dogstart]
  6333. Filename=GSDOGST.EXE
  6334. Confirmed=X
  6335. Description=Added by an unidentified VIRUS, WORM or TROJAN! A possibility is a trojan known as PENIS
  6336. [doing]
  6337. Filename=doing.exe
  6338. Confirmed=?
  6339. Description=<font color="#FF0000">??</font>
  6340. [doit.exe]
  6341. Filename=doit.exe
  6342. Confirmed=X
  6343. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32forbotek.html" target= blank>FORBOT-EK</a> WORM!
  6344. [don't panic]
  6345. Filename=dontpanicdemodp.exe
  6346. Confirmed=U
  6347. Description=30-day trial version of <a href="http://www.panicware.com/product_dp.html" target="_blank">Don't Panic</a> privacy software from Panicware. "Clean up Internet tracks and quickly hide personal documents with this privacy suite."
  6348. [don't panic pop-up stopper]
  6349. Filename=dpps2.exe
  6350. Confirmed=U
  6351. Description=<a href="http://www.panicware.com/product_companion.html" target="_blank">Pop-Up Stopper Companion</a> from Panicware. Pop-up blocker integrated into the IE toolbar. Note that the Pro version doesn't load in startup as it is installed as an Internet Explorer toolbar. Can cause problems with IE if you use WinXP and uninstall Service Pack 1. Uninstalling the software leaves it in the startup group
  6352. [dopus]
  6353. Filename=dopus.exe
  6354. Confirmed=U
  6355. Description=<a href="http://gpsoft.com.au/Intro.html" target="_blank">Directory Opus</a> - a file manager from GPSoft
  6356. [dos]
  6357. Filename=dos64.exe
  6358. Confirmed=X
  6359. Description=Adware downloader trojan
  6360. [dos prompt loader]
  6361. Filename=cygwin.exe
  6362. Confirmed=X
  6363. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32sdbotvv.html" target= blank>SDBOT-VV</a> WORM!
  6364. [dosbat]
  6365. Filename=??
  6366. Confirmed=?
  6367. Description=<font color="#FF0000">??</font>
  6368. [douwantit]
  6369. Filename=duwi.exe
  6370. Confirmed=N
  6371. Description=DoUWantIt - online shopping assistant. Start it manually
  6372. [download accelerator plus 5.0]
  6373. Filename=DAP.exe
  6374. Confirmed=N
  6375. Description=<a href="http://www.speedbit.com/" target="_blank">Download Accelerator Plus</a> from Speedbit. Download manager for resuming downloads, amongst other features. Available via Start -> Programs. Note that the free version is adware based
  6376. [download plus]
  6377. Filename=DownloadPlus.exe
  6378. Confirmed=X
  6379. Description=<a href="http://research.sunbelt-software.com/threat_display.cfm?name=DownloadPlus&threatid=4618&search=DownloadPlus" target=_blank>DownloadPlus</a> adware
  6380. [download wonder]
  6381. Filename=DownloadWonder.exe
  6382. Confirmed=N
  6383. Description=<a href="http://www.forty.com/" target="_blank">Download Wonder</a> from Forty Software. Download manager for resuming downloads, amongst other features
  6384. [downloadaccelerator]
  6385. Filename=DAP.EXE
  6386. Confirmed=N
  6387. Description=<a href="http://www.speedbit.com/" target="_blank">Download Accelerator Plus</a> from Speedbit. Download manager for resuming downloads, amongst other features. Available via Start -> Programs. Note that the free version is adware based
  6388. [downloadlegalmusic]
  6389. Filename=rundll32.exe MSA64CHK.dll, DllMostrar
  6390. Confirmed=X
  6391. Description=<a href="http://research.sunbelt-software.com/threat_display.cfm?name=MatrixDialer&threatid=14914&search=MatrixDialer" target=_blank>MatrixDialer</a> related
  6392. [downloadware]
  6393. Filename=dw.exe
  6394. Confirmed=X
  6395. Description=<a href="http://research.sunbelt-software.com/threat_display.cfm?name=DownloadWare&threatid=4620&search=Downloadware" target=_blank>DownloadWare</a> adware
  6396. [downloadware engine]
  6397. Filename=Dwe.exe
  6398. Confirmed=X
  6399. Description=<a href="http://research.sunbelt-software.com/threat_display.cfm?name=DownloadWare&threatid=4620&search=Downloadware" target=_blank>DownloadWare</a> adware
  6400. [downxz]
  6401. Filename=Downxz.bat
  6402. Confirmed=X
  6403. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.mydoom.w@mm.html" target="_blank">MYDOOM.W</a> WORM
  6404. [dpagnt]
  6405. Filename=DPAgnt.exe
  6406. Confirmed=N
  6407. Description=<a href="http://www.digitalpersona.com/" target="_blank">digitalPersona</a> fingerprint scanner
  6408. [dpcnav]
  6409. Filename=dpcnav.exe
  6410. Confirmed=Y
  6411. Description=<a href="http://www.professionalsatellite.com/html/direcway_dw4000_features.html" target="_blank">DirecWay</a> from DirectTV satellite based high-speed internet access
  6412. [dpconfig]
  6413. Filename=DPConfig.exe
  6414. Confirmed=N
  6415. Description=Compuware DevPartner Studio Configuration Utility, a tool for software developers - System Tray access to configure the utility's analysis. Not required at startup, can be launched from the Start Menu programs group when needed
  6416. [dpcproxy]
  6417. Filename=dpcproxy.exe
  6418. Confirmed=X
  6419. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojgoldenpa.html" target="_blank">GOLDENP-A</a> TROJAN!
  6420. [dpcproxyloadonstartup]
  6421. Filename=dpcstart.exe
  6422. Confirmed=Y
  6423. Description=<a href="http://www.professionalsatellite.com/html/direcway_dw4000_features.html" target="_blank">DirecWay</a> from DirectTV satellite based high-speed internet access
  6424. [dpi]
  6425. Filename=dpi.exe
  6426. Confirmed=X
  6427. Description=<a href="http://www.spywareguide.com/product_show.php?id=727" target=_blank>Delfin Media Viewer</a> or "Promulgate" adware
  6428. [dpnsvr32]
  6429. Filename=dpnsvr32.exe
  6430. Confirmed=X
  6431. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojaolpassb.html" target=_blank>AOLPASS-B</a> TROJAN!
  6432. [dpps2]
  6433. Filename=dpps2.exe
  6434. Confirmed=U
  6435. Description=<a href="http://www.panicware.com/product_companion.html" target="_blank">Pop-Up Stopper Companion</a> from Panicware. Pop-up blocker integrated into the IE toolbar. Note that the Pro version doesn't load in startup as it is installed as an Internet Explorer toolbar. Can cause problems with IE if you use WinXP and uninstall Service Pack 1. Uninstalling the software leaves it in the startup group
  6436. [dps]
  6437. Filename=dps.exe
  6438. Confirmed=X
  6439. Description=<a href="http://doxdesk.com/parasite/SmartestSearch.html" target= blank>SmartestSearch</a> parasite - poses as a foistware, bogus adware/spyware remover called "scumware-remover"
  6440. [drag'n'drop_autolaunch]
  6441. Filename=Autolaunch.exe
  6442. Confirmed=N
  6443. Description=<a href="http://www.iomega.com/hotburn/hotburn_main.html" target="_blank">Iomega HotBurn</a> - CD-RW burning software
  6444. [dragdrop]
  6445. Filename=DragDrop.exe
  6446. Confirmed=?
  6447. Description=<font color="#FF0000">??</font>
  6448. [dragndrop_autolaunch]
  6449. Filename=Autolaunch.exe
  6450. Confirmed=N
  6451. Description=<a href="http://www.iomega.com/hotburn/hotburn_main.html" target="_blank">Iomega HotBurn</a> - CD-RW burning software
  6452. [drcache]
  6453. Filename=MSTDC.EXE
  6454. Confirmed=X
  6455. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojbdoorjm.html" target=_blank>JM</a> TROJAN!
  6456. [dregfix]
  6457. Filename=ph_finder.exe
  6458. Confirmed=?
  6459. Description=<font color="#FF0000">??</font>
  6460. [drgtodsc]
  6461. Filename=DrgToDsc.exe
  6462. Confirmed=N
  6463. Description=Part of Roxio EasyCD Creator 6.0 - places the Roxio Drag-to-Disc icon in you system tray. "Easily drag and drop files for burning to CD or DVD. Disc formatting and burning will happen automatically". Not required for Roxio to work properly
  6464. [dried.exe]
  6465. Filename=dried.exe
  6466. Confirmed=?
  6467. Description=<font color="#FF0000">??</font>
  6468. [driveled]
  6469. Filename=OODLed.exe
  6470. Confirmed=N
  6471. Description=<a href="http://www.oosoft.de/english/products/oodl/" target="_blank">O&O DriveLED</a> - displays your HDD LED on your monitor. Start manually
  6472. [driver]
  6473. Filename=gbot.exe
  6474. Confirmed=X
  6475. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=TROJ_JUNTADOR.K" target="_blank">JUNTADOR.K</a> TROJAN!
  6476. [driver32]
  6477. Filename=Scam32.exe
  6478. Confirmed=X
  6479. Description=Added by the <a href="http://www.symantec.com/avcenter/venc/data/w32.sircam.worm@mm.html" target="_blank"> SIRCAM</a> WORM!
  6480. [drivercheck]
  6481. Filename=svchost.exe
  6482. Confirmed=X
  6483. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojdelfkr.html" target=_blank>DELF-KR</a> TROJAN! Note - this is not the legitimate <a href="http://www.liutilities.com/products/wintaskspro/processlibrary/svchost/" target=_blank>svchost.exe</a> process which is always located in the System (9x/Me) or System32 (NT/2K/XP) folder and should not normally figure in Msconfig/Startup! This file is located in a C:\DriverLoad folder
  6484. [driverdb]
  6485. Filename=svcmdx32.exe
  6486. Confirmed=X
  6487. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.berpi.html" target=_blank>BERPI</a> TROJAN!
  6488. [driverload]
  6489. Filename=svchost.exe
  6490. Confirmed=X
  6491. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojdelfkr.html" target=_blank>DELF-KR</a> TROJAN! Note - this is not the legitimate <a href="http://www.liutilities.com/products/wintaskspro/processlibrary/svchost/" target=_blank>svchost.exe</a> process which is always located in the System (9x/Me) or System32 (NT/2K/XP) folder and should not normally figure in Msconfig/Startup! This file is located in a C:\DriverLoad folder
  6492. [driverpath]
  6493. Filename=system32.exe
  6494. Confirmed=X
  6495. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojprorats.html" target=_blank>PRORAT-S</a> TROJAN!
  6496. [driveselect]
  6497. Filename=driveselect.exe
  6498. Confirmed=N
  6499. Description=DVD X Copy XPress by 321 Studios. Creates a pop-up at Windows startup that asks for the DVD drive to be selected. Available via Start -> Programs
  6500. [drkly16j]
  6501. Filename=rundll32.exe drkly16j.dll, ServiceCheck
  6502. Confirmed=U
  6503. Description=<a href="http://www.kidswatch.com/" target=_blank>KidsWatch Time Control</a> parental control software
  6504. [drmon smartagent]
  6505. Filename=SmartAgt.exe
  6506. Confirmed=U
  6507. Description=Part of the network monitoring program group for 3Com NIC cards. See <a href="http://support.3com.com/infodeli/tools/netmgt/rmonprob/product/drmon/chap1.htm" target="_blank">here</a> for more info
  6508. [drmu]
  6509. Filename=W95Mm.exe
  6510. Confirmed=X
  6511. Description=Homepage hijacker installing a toolbar: http://tdko.com/. Lop.com in disguise. See this <a href="http://www.lavasoft.nu/cgi-bin/forums/ikonboard.cgi?s=3d69d34f399dffff;act=ST;f=14;t=304;st=0" target="_blank">thread</a>
  6512. [drocher]
  6513. Filename=d.exe
  6514. Confirmed=X
  6515. Description=Adult content dialler
  6516. [drvddll.exe]
  6517. Filename=drvddll.exe
  6518. Confirmed=X
  6519. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.beagle.ap@mm.html" target="_blank">BEAGLE.AP</a> WORM!
  6520. [drvddll_exe]
  6521. Filename=drvddll.exe
  6522. Confirmed=X
  6523. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.beagle.x@mm.html" target="_blank">BEAGLE.X</a> WORM!
  6524. [drvlistnr]
  6525. Filename=DrvListnr.exe
  6526. Confirmed=?
  6527. Description=Analog Devices SoundMAX soundcard related.<font color="#FF0000"> What does it do and is it required?</font>
  6528. [drvlsnr]
  6529. Filename=drvlsnr.exe
  6530. Confirmed=U
  6531. Description=Compaq/ADI SoundMAX integrated digital audio controller related. May solve a problem if your sound cuts out unexpectedly
  6532. [drvnetw]
  6533. Filename=drvnetw.exe
  6534. Confirmed=X
  6535. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojbroggerb.html" target=_blank>BROGGER-B</a> TROJAN!
  6536. [drvr32h]
  6537. Filename=drvr32h.exe
  6538. Confirmed=X
  6539. Description=Added by an unidentified VIRUS, WORM or TROJAN!
  6540. [drvrmanager]
  6541. Filename=drvrquery32.exe
  6542. Confirmed=X
  6543. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/bat.boohoo.worm.html" target="_blank">BOOHOO</a> WORM!
  6544. [drvsys.exe]
  6545. Filename=drvsys.exe
  6546. Confirmed=X
  6547. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.beagle.w@mm.html" target="_blank">BEAGLE.W</a> WORM!
  6548. [drvupd]
  6549. Filename=rundll32 ..drvupd.inf
  6550. Confirmed=X
  6551. Description=Hijacker - drvupd.inf file installs a "searchforge.com" hijack
  6552. [drweb antivirus]
  6553. Filename=DRWEBAV.EXE
  6554. Confirmed=X
  6555. Description=Added by an unidentified WORM or TROJAN!
  6556. [drwebscheduler]
  6557. Filename=Drwebscd.exe
  6558. Confirmed=Y
  6559. Description=<a href="http://www.sald.com/" target="_blank">Dr. Web</a> antivirus related - scheduler that allows you to manage an automatic launch of applications, in particular the antivirus scanner or the update subsystem
  6560. [dr_s]
  6561. Filename=DR_S.exe
  6562. Confirmed=X
  6563. Description=<a href="http://sarc.com/avcenter/venc/data/adware.adshooter.html" target="_blank">AdShooter</a> adware
  6564. [ds]
  6565. Filename=ds.exe
  6566. Confirmed=X
  6567. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.spymon.html" target=_blank>SPYMON</a> TROJAN!
  6568. [ds clock]
  6569. Filename=dsclock.exe
  6570. Confirmed=U
  6571. Description=Digital desktop clock including synchronization with atomic servers - see <a href="http://www.dualitysoft.com/dsclock/" target="_blank">here</a>
  6572. [dsa]
  6573. Filename=dsa.exe
  6574. Confirmed=X
  6575. Description=Homepage hijacker - redirecting to downseek.com
  6576. [dsacass]
  6577. Filename=[path to file]
  6578. Confirmed=X
  6579. Description=Added by the <a href="http://www.symantec.com/avcenter/venc/data/backdoor.ranky.m.html" target=_blank>RANKY.M</a> TROJAN!
  6580. [dsb]
  6581. Filename=DSB.exe
  6582. Confirmed=X
  6583. Description=<a href="http://sarc.com/avcenter/venc/data/pf/adware.energyplugin.html" target="_blank">EnergyPlugin</a> adware
  6584. [dsentry]
  6585. Filename=DSentry.exe
  6586. Confirmed=N
  6587. Description=Anti-spyware from Dell. Seems that after Dell found out certain applications being installed from DVD's would report back information about what customers were watching, they decided to implement an anti-spyware service. Run manually before installation starts
  6588. [dskcompat]
  6589. Filename=Dskcompat.exe
  6590. Confirmed=X
  6591. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/trojan.gema.html" target="_blank">GEMA</a> TROJAN!
  6592. [dsl monitor]
  6593. Filename=spdstrm.exe
  6594. Confirmed=N
  6595. Description=Comes with Efficient Networks DSL Modems. Little red/green/yellow flashing icon in system tray
  6596. [dslagentexe]
  6597. Filename=DSLagent.exe
  6598. Confirmed=Y
  6599. Description=Used in conjunction with USB connected ADSL modems from <a href="http://www.eicon.com/worldwide/default.htm" target="_blank">Eicon Networks</a> (as used by BT for its Broadband internet service for example). Required for a permanent ADSL connection
  6600. [dslmon]
  6601. Filename=dslmon.exe
  6602. Confirmed=Y
  6603. Description=Sagem DSL modem related. Apparently needed to detect the modem
  6604. [dslstatexe]
  6605. Filename=dslstat.exe
  6606. Confirmed=U
  6607. Description=System tray connection status for ADSL modems from Eicon Networks (as used by BT Broadband for example)
  6608. [dsservice]
  6609. Filename=dmrss.exe
  6610. Confirmed=X
  6611. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32agobotxx.html" target=_blank>AGOBOT-XX</a> WORM!
  6612. [dsssgens]
  6613. Filename=dssagens.exe
  6614. Confirmed=?
  6615. Description=<font color="#FF0000">??</font>
  6616. [du meter]
  6617. Filename=DUMETER.EXE
  6618. Confirmed=N
  6619. Description=<a href="http://www.dumeter.com/main.php" target="_blank">Hagel Technologies</a> internet bandwidth monitor
  6620. [duck]
  6621. Filename=duck.exe
  6622. Confirmed=X
  6623. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32agobotavg.html" target=_blank>AGOBOT-AVG</a> WORM!
  6624. [dumeter services]
  6625. Filename=dumeter.exe
  6626. Confirmed=X
  6627. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32sdbotaeq.html" target=_blank>SDBOT-AEQ</a> WORM!
  6628. [dumprep 0 -k]
  6629. Filename=dumprep 0 -k
  6630. Confirmed=N
  6631. Description=Used in connection with memory dumps - you can disable these by - right clicking on My Computer, selecting Properties and then the Advanced tab. Click on the Settings button in 'Startup and Recovery'. In the bottom pane - under 'Write debugging information' - click on the down arrow and then select 'None' - OK your way out
  6632. [dumprep 0 -u]
  6633. Filename=dumprep 0 -u
  6634. Confirmed=N
  6635. Description=Used in connection with memory dumps - you can disable these by - right clicking on My Computer, selecting Properties and then the Advanced tab. Click on the Settings button in 'Startup and Recovery'. In the bottom pane - under 'Write debugging information' - click on the down arrow and then select 'None' - OK your way out
  6636. [dun_services3]
  6637. Filename=dun3.exe
  6638. Confirmed=X
  6639. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/trojan.sokiron.html" target=_blank>SOKIRON</a> TROJAN!
  6640. [duweculey]
  6641. Filename=yujixit.exe
  6642. Confirmed=X
  6643. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_SDBOT.BRP&VSect=P" target=_blank>SDBOT.BRP</a> WORM!
  6644. [dvd43]
  6645. Filename=DVD43_Tray.exe
  6646. Confirmed=N
  6647. Description=<a href="http://www.dvdidle.com/dvd43.htm" target="_blank">DVD43</a> is "a small tool that integrates into Windows and overrides CSS copy-protection found on DVD movies"
  6648. [dvd98]
  6649. Filename=windvd98.exe
  6650. Confirmed=X
  6651. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.hllw.cult.p@mm.html" target="_blank">CULT.P</a> WORM!
  6652. [dvdbitset]
  6653. Filename=DVDBitSet.exe
  6654. Confirmed=U
  6655. Description=DVD+RW Drive/Disc Compatibility Setting. Installed with HP DVD+RW drives to enhance compatibility with existing readers. You can also set a DVD+RW default drive write mode which is always used
  6656. [dvdcheck]
  6657. Filename=DVDCheck.exe
  6658. Confirmed=?
  6659. Description=Related to an <a href="http://www.intervideo.com/jsp/Home.jsp" target=_blank>Intervideo</a> program. <font color="#FF0000">What does it do and is it required in startup?</font>
  6660. [dvdcompat]
  6661. Filename=Dvdcompat.exe
  6662. Confirmed=X
  6663. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/trojan.gema.html" target="_blank">GEMA</a> TROJAN!
  6664. [dvdlauncher]
  6665. Filename=DVDLauncher.exe
  6666. Confirmed=N
  6667. Description=A process belonging to the Cyberlink PowerCinema video viewing software which allows you to play DVDs upon insertion. Non-essential process - and is installed for ease of use
  6668. [dvdsentry]
  6669. Filename=DSentry.exe
  6670. Confirmed=N
  6671. Description=Anti-spyware from Dell. Seems that after Dell found out certain applications being installed from DVD's would report back information about what customers were watching, they decided to implement an anti-spyware service. Run manually before installation starts
  6672. [dvdtray]
  6673. Filename=DVDTray.exe
  6674. Confirmed=N
  6675. Description=HP CD/DVD Tray icon installed with the DVD writer software. Periodically checks for new drive firmware
  6676. [dvdupgrade]
  6677. Filename=DVDUpgrd.exe
  6678. Confirmed=N
  6679. Description=Microsoft program to upgrade your DVD decoder program - see <a href="http://support.microsoft.com/default.aspx?scid=kb;en;306331" target=_blank>Q306331</a>. Available via Start -> Programs
  6680. [dvp95]
  6681. Filename=Dvp95.exe
  6682. Confirmed=Y
  6683. Description=Scan engine for <a href="http://www.f-secure.com/index.shtml" target="_blank">F-Secure</a> and Command antivirus software based on the <a href="http://www.f-prot.com" target="_blank">F-Prot AntiVirus</a> engine
  6684. [dvpapi9x]
  6685. Filename=DVPAPI9X.exe
  6686. Confirmed=Y
  6687. Description=Command AntiVirus for Windows 95/98/Me
  6688. [dvpinitexe]
  6689. Filename=Dvpinit.exe
  6690. Confirmed=Y
  6691. Description=<a href="http://www.command.co.uk/html/products/csav/index.cfm">Command Antivirus</a> related
  6692. [dvprpt]
  6693. Filename=Dvprpt.exe
  6694. Confirmed=Y
  6695. Description=<a href="http://www.command.co.uk/html/products/csav/index.cfm">Command Antivirus</a> real time protection
  6696. [dvraudio]
  6697. Filename=dvraudio.exe
  6698. Confirmed=X
  6699. Description=Added by a variant of the <a href="http://www.sophos.com/virusinfo/analyses/trojcrypterc.html" target="_blank">CRYPTER.C</a> TROJAN!
  6700. [dvsfss]
  6701. Filename=fbsfsdrs.exe
  6702. Confirmed=X
  6703. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32sdbotqa.html" target="_blank">SDBOT-QA</a> WORM!
  6704. [dvsync]
  6705. Filename=dvsync.exe
  6706. Confirmed=U
  6707. Description=DVSync is the program that allows you to synchronize your daVinciÆs PDA's data with your Personal Information Manager on the PC
  6708. [dvx]
  6709. Filename=wsxsvc.exe
  6710. Confirmed=X
  6711. Description=<a href="http://www.spywareguide.com/product_show.php?id=727" target=_blank>Delfin Media Viewer</a> or "Promulgate" adware variant
  6712. [dw]
  6713. Filename=dw.exe
  6714. Confirmed=X
  6715. Description=<a href="http://research.sunbelt-software.com/threat_display.cfm?name=DownloadWare&threatid=4620&search=Downloadware" target=_blank>DownloadWare</a> adware
  6716. [dw4]
  6717. Filename=Weather.exe
  6718. Confirmed=N
  6719. Description=<a href="http://www.weather.com/services/desktop.html?from=dt_hugheader&refer=dt_hugheader" target=_blank>Desktop Weather</a>
  6720. [dwheartbeatmonitor]
  6721. Filename=DWHeartbeatMonitor.exe
  6722. Confirmed=U
  6723. Description=DWHeartbeatMonitor.exe is installed alongside the Weather.com instant messaging utility. This is a non-essential process. Disabling or enabling this is down to user preference
  6724. [dwlclient]
  6725. Filename=support.exe
  6726. Confirmed=N
  6727. Description=Download manager for Dell support alerts
  6728. [dwstart]
  6729. Filename=FireWall.exe
  6730. Confirmed=Y
  6731. Description=<a href="http://www.pcsecurityshield.com/webApp/208.asp" target=_blank>The Shield</a> firewall
  6732. [dx]
  6733. Filename=sys*.exe [* = random number]
  6734. Confirmed=X
  6735. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_DEXTER.A" target="_blank">DEXTER.A</a> WORM!
  6736. [dx8compat]
  6737. Filename=Dx8compat.exe
  6738. Confirmed=X
  6739. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/trojan.gema.html" target="_blank">GEMA</a> TROJAN!
  6740. [dxdiags.exe]
  6741. Filename=dxdiags.exe
  6742. Confirmed=X
  6743. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojcertifg.html" target=_blank>CERTIF-G</a> TROJAN!
  6744. [dxdll32]
  6745. Filename=ntxdll.exe
  6746. Confirmed=X
  6747. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.gaobot.cpx.html" target=_blank>GAOBOT.CPX</a> WORM!
  6748. [dxdllregexe]
  6749. Filename=dxdllreg.exe
  6750. Confirmed=N
  6751. Description=Created when you select "Yes" to check the "WHQL Digital signatures" in the DirectX9 files at the first time you open it
  6752. [dxload]
  6753. Filename=DX3DRndr.exe
  6754. Confirmed=X
  6755. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.gibe.b@mm.html" target="_blank">GIBE.B</a> WORM!
  6756. [dxm6patch_981116]
  6757. Filename=p_981116.exe
  6758. Confirmed=N
  6759. Description=Win32 cabinet self extractor. More info <a href="http://groups.google.com/groups?hl=en&threadm=OpHhSjpd%24GA.249%40cppssbbsa04&rnum=18&prev=/groups%3Fq%3DP_981116.exe%26hl%3Den%26start%3D10%26sa%3DN" target="_blank">here</a>
  6760. [dxmsrv]
  6761. Filename=dxmsrv.exe
  6762. Confirmed=X
  6763. Description=Added by an unidentified WORM or TROJAN!
  6764. [dxsty]
  6765. Filename=Dxsty.exe
  6766. Confirmed=X
  6767. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/trojan.gema.html" target="_blank">GEMA</a> TROJAN!
  6768. [dxupdate.exe]
  6769. Filename=Dxupdate.exe
  6770. Confirmed=X
  6771. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.mafeg.html" target="_blank">MAFEG</a> WORM!
  6772. [dxvid]
  6773. Filename=dxvid.exe
  6774. Confirmed=X
  6775. Description=Added by Trojan-Downloader.Win32.Dluca.by TROJAN!
  6776. [dyfuca]
  6777. Filename=optimize.exe
  6778. Confirmed=X
  6779. Description=Adult content dialler - see <a href="http://www.sophos.com/virusinfo/analyses/dialdyfucaa.html" target="_blank">here</a>
  6780. [dyfuca active alert]
  6781. Filename=actalert.exe
  6782. Confirmed=X
  6783. Description=Adult content dialler - see <a href="http://www.sophos.com/virusinfo/analyses/dialdyfucaa.html" target="_blank">here</a>
  6784. [dynamic link library loader]
  6785. Filename=Loader32.exe
  6786. Confirmed=X
  6787. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.kol.html" target=_blank>KOL</a> TROJAN!
  6788. [dyndns updater]
  6789. Filename=DynDNS.exe
  6790. Confirmed=U
  6791. Description=Dynamic DNS IP address updater tool, used as a client for Dynamic DNS service providers such as http://www.DynDNS.org
  6792. [dyndns-updater traytool]
  6793. Filename=ddutray.exe
  6794. Confirmed=N
  6795. Description=<a href="http://www.dyndns.org/services/dyndns/" target="_blank">DynDNS</a> updater tray icon - allows easy configuration of the Dynamic DNSSM service. Can be run manually
  6796. [dynhttp dns binary]
  6797. Filename=dynizari.exe
  6798. Confirmed=X
  6799. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target= blank>RBOT</a> WORM!
  6800. [dynsite]
  6801. Filename=DynSite.exe
  6802. Confirmed=U
  6803. Description=<a href="http://noeld.com/download.htm" target=_blank>DynSite</a> - dynamic DNS client, also called an automatic IP updater
  6804. [dynu basic client]
  6805. Filename=dynubas.exe
  6806. Confirmed=U
  6807. Description=<a href="http://www.dynu.com/" target=_blank>Dynu</a> online dynamic IP update client. Useful when using a dial up modem
  6808. [dzkillme]
  6809. Filename=DZSAVEME.EXE
  6810. Confirmed=?
  6811. Description=<font color="#FF0000">??</font>
  6812. [e-card]
  6813. Filename=ecard.exe
  6814. Confirmed=X
  6815. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.hllw.yodi.html" target="_blank">YODI</a> WORM!
  6816. [e-color]
  6817. Filename=IconMgr.Exe
  6818. Confirmed=U
  6819. Description=Sets the colour of your monitor when running games that recognise E-Color so that you get 'what the game designer intended' when you see the game. Also allows monitor callibration through a program called 3-Deep. If you play a lot of games it can be useful. Can be disabled from starting up from within the program
  6820. [e6taskpanel]
  6821. Filename=TaskPanl.exe
  6822. Confirmed=N
  6823. Description=Earthlink Task Panel - part of <a href="http://www.earthlink.net/home/software/" target="_blank">Earthlink TotalAccess 2003</a> internet access software. Quick access to internet, E-mail and web-space
  6824. [eabconfg.cpl]
  6825. Filename=EabServr.exe
  6826. Confirmed=U
  6827. Description=Easy Access Buttons control panel on Compaq laptops. Only required if you use the extra keys
  6828. [eac download]
  6829. Filename=download.exe
  6830. Confirmed=X
  6831. Description=Associated with <a href="#Webcelerator">Webcelerator</a> - spyware. Read eAcceleration's privacy statement <a href="http://www.eacceleration.com/privacy/" target="_blank">here</a>
  6832. [eaclean]
  6833. Filename=eaclean.exe
  6834. Confirmed=U
  6835. Description=For Compaq PC's. <a href="http://h18000.www1.hp.com/support/techpubs/whitepapers/13W1-1200a-wwen.html" target="_blank"> Easy Access</a> button support for the keyboard
  6836. [eac_cnry]
  6837. Filename=canary.exe
  6838. Confirmed=X
  6839. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojcanary.html" target="_blank"> CANARY</a> TROJAN!
  6840. [eac_rnvdl]
  6841. Filename=ANTIVIRUS_INSTALL.EXE
  6842. Confirmed=?
  6843. Description=<font color="#FF0000">??</font>
  6844. [eanthology_install.exe]
  6845. Filename=eanthology_install.exe
  6846. Confirmed=N
  6847. Description=eAcceleration Stop-Sign related - not recommended, see <a href="http://www.spywarewarrior.com/rogue_anti-spyware.htm#ss_note" target="_blank">note</a>
  6848. [eanth_critical_update_alert]
  6849. Filename=sys_alert.exe
  6850. Confirmed=N
  6851. Description=eAcceleration Stop-Sign related - not recommended, see <a href="http://www.spywarewarrior.com/rogue_anti-spyware.htm#ss_note" target=_blank>note</a>
  6852. [eanth_system_patcher]
  6853. Filename=sys_alert.exe
  6854. Confirmed=N
  6855. Description=eAcceleration Stop-Sign related - not recommended, see <a href="http://www.spywarewarrior.com/rogue_anti-spyware.htm#ss_note" target="_blank">note</a>
  6856. [earthlink toolbar 5.0]
  6857. Filename=etoolbar.exe
  6858. Confirmed=N
  6859. Description=EarthLink Toolbar is a tool to help you get to all of the resources of the internet. EarthLink 5.0 Setup adds a few basic buttons to the Toolbar, but you can delete these or add more buttons any time
  6860. [easy key]
  6861. Filename=easykey.exe
  6862. Confirmed=U
  6863. Description=For programming of the built-in functions keys on some laptops (and maybe desktops). Required if these are used
  6864. [easy start button]
  6865. Filename=esb.exe
  6866. Confirmed=N
  6867. Description=Provides functionality on certain laptops that have additional keys. Not required unless you use the extra keys
  6868. [easy-printtoolbox]
  6869. Filename=BJPSMAIN.EXE
  6870. Confirmed=U
  6871. Description=A utility to launch the applications that are bundled with a Canon bubblejet printer
  6872. [easyav]
  6873. Filename=EasyAV.exe
  6874. Confirmed=X
  6875. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.netsky.s@mm.html" target="_blank">NETSKY.S</a> or <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.netsky.t@mm.html" target="_blank">NETSKY.T</a> WORMS!
  6876. [easydates]
  6877. Filename=EasyDates.exe
  6878. Confirmed=X
  6879. Description=Premium rate adult content dialler
  6880. [easydates_nl]
  6881. Filename=EasyDates_nl.exe
  6882. Confirmed=X
  6883. Description=Adult content dialler
  6884. [easykey]
  6885. Filename=easykey.exe
  6886. Confirmed=U
  6887. Description=For programming of the built-in functions keys on some laptops (and maybe desktops). Required if these are used
  6888. [easykeyboardlogger]
  6889. Filename=EasyKeyboardLogger
  6890. Confirmed=U
  6891. Description=<a href="http://www.symantec.com/avcenter/venc/data/spyware.easykeylogger.html" target=blank>EasyKeyLogger</a> ?keystroke logger/monitoring program. Given a "U" recommendation because it depends if you intentionally installed it. If you didn't treat it as "X" and uninstall or remove
  6892. [easymessage]
  6893. Filename=em2.exe
  6894. Confirmed=U
  6895. Description=Easy Messenger, instant messenger for MSN, AOL, ICQ, and Yahoo. See <a href="http://www.easymessage.net/" target="_blank">here</a>
  6896. [easysearchbar]
  6897. Filename=ESBUpdate.exe
  6898. Confirmed=X
  6899. Description=EasySearchBar adware downloader
  6900. [easyserv]
  6901. Filename=Server.exe
  6902. Confirmed=X
  6903. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.easyserv.html" target="_blank">EASYSERV</a> TROJAN!
  6904. [easysync pro]
  6905. Filename=XCPCMenu.exe
  6906. Confirmed=U
  6907. Description=<a href="http://www.lotus.com/products/easysyncpro.nsf" target="_blank">EasySync Pro</a> is a Lotus program for synchronizing a PDA with Lotus Notes
  6908. [easytuneiii]
  6909. Filename=EasyTune.exe
  6910. Confirmed=U
  6911. Description=Tuning (overclocking) utility for Gigabyte motherboards. Shortcut available
  6912. [easytuneiv]
  6913. Filename=ET4Tray.exe
  6914. Confirmed=U
  6915. Description=Tuning (overclocking) utility for Gigabyte motherboards. Shortcut available
  6916. [easywww]
  6917. Filename=easywww2.exe
  6918. Confirmed=X
  6919. Description=Added by an unidentified VIRUS, WORM or TROJAN!
  6920. [ebatesmoemoneymaker]
  6921. Filename=wjview ...Code
  6922. Confirmed=N
  6923. Description=<a href="http://www.kephyr.com/spywarescanner/library/ebatesmoemoneymaker/index.phtml" target="_blank">Ebates</a> adware
  6924. [ebatesmoemoneymaker0]
  6925. Filename=EbatesMoeMoneyMaker0.exe
  6926. Confirmed=X
  6927. Description=<a href="http://www.kephyr.com/spywarescanner/library/ebatesmoemoneymaker/index.phtml" target="_blank">Ebates</a> adware
  6928. [ebay toolbar]
  6929. Filename=EBAYTBAR.EXE
  6930. Confirmed=X
  6931. Description=<a href="http://pages.ebay.com/ebay_toolbar/" target="_blank">eBay Toolbar</a> - reportes as spyware as it "phones home"
  6932. [ebaytoolbar]
  6933. Filename=eBayTBDaemon.exe
  6934. Confirmed=U
  6935. Description=<a href="http://pages.ebay.com/ebay_toolbar/" target=_blank>eBay</a> toolabar related - also contains eBay account Guard which monitors for fraudulent eBay sites
  6936. [eboard]
  6937. Filename=Eboard.exe
  6938. Confirmed=U
  6939. Description=eMachines multimedia keyboard manager. Required if you use the extra keys
  6940. [ebot]
  6941. Filename=DownloadWizard.exe
  6942. Confirmed=N
  6943. Description=<a href="http://www.ebot.com/index.html" target="_blank">eBot</a> from Digital River - "helps ensure your computer always has the latest technology, fixes, add-ons, upgrades and 'cool stuff'." Can optionally be installed with software such as Net Nanny internet filtering software. Available via Start -> Programs
  6944. [ecpe]
  6945. Filename=ECPE.EXE
  6946. Confirmed=?
  6947. Description=<font color="#FF0000">??</font>
  6948. [edexter]
  6949. Filename=edexter.exe
  6950. Confirmed=N
  6951. Description=<a href="http://www.pyrenean.com/edexter.php" target=_blank>eDexter</a> supplements internet filtering by substituting local images for filtered images in order to prevent browser stalls and other annoyances. Can be activated manually when starting the browser
  6952. [editpad]
  6953. Filename=editpad.exe
  6954. Confirmed=X
  6955. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojconsperb.html" target="_blank">CONSPER-B</a> TROJAN!
  6956. [edloader]
  6957. Filename=DTLoader.exe
  6958. Confirmed=N
  6959. Description=Effective Desktop from MiniStars Software - desktop management software no longer being supported
  6960. [edonkey2000]
  6961. Filename=edonkey2000.exe
  6962. Confirmed=U
  6963. Description=File sharing network - not recommended as the free version of this application should be avoided as it installs, without permission, New.Net, Webhancer, WebSearch Toolbar and WinTools
  6964. [edrestore]
  6965. Filename=??
  6966. Confirmed=U
  6967. Description=<a href="http://www.easydesksoftware.com/spoint.htm" target="_blank">Set Point</a> from Easy Desk Software - "small utility that automatically sets System Restore points for WinME/XP"
  6968. [educational writer]
  6969. Filename=[random filename]
  6970. Confirmed=X
  6971. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotlz.html" target="_blank">RBOT-LZ</a> WORM!
  6972. [edwizard]
  6973. Filename=Edwizard.exe
  6974. Confirmed=U
  6975. Description=<a href="http://www.ediport.hu/_sgeasy.html" target="_blank">SafeGuard Easy</a> - "provides total company-wide protection for sensitive information on laptops and workstations. Boot protection, pre-boot user authentication and hard disk encryption using powerful algorithms guarantee against unauthorized access and hacker attacks"
  6976. [efax tray menu]
  6977. Filename=HotTray.exe
  6978. Confirmed=N
  6979. Description=eFax Messenger Tray Menu system tray icon for eFax Messenger Plus. Available via Start -> Programs. Disabling instructions available <a href="http://www.efax.com/help/index.asp" target="_blank">here</a>
  6980. [efax.com tray menu]
  6981. Filename=HotTray.exe
  6982. Confirmed=N
  6983. Description=eFax Messenger Tray Menu system tray icon for eFax Messenger Plus. Available via Start -> Programs. Disabling instructions available <a href="http://www.efax.com/help/index.asp" target="_blank">here</a>
  6984. [efaxs lptt01]
  6985. Filename=efaxs.exe
  6986. Confirmed=X
  6987. Description=<a href="http://www.wilderssecurity.net/specialinfo/rapidblaster.html" target="_blank">RapidBlaster</a> variant (in a "efaxs" folder in Program Files). Recommended you use RapidBlaster Killer to uninstall - see <a ref="http://www.wilderssecurity.net/specialinfo/rapidblaster.html#removal" target="_blank"> here</a>
  6988. [efaxs ml097e]
  6989. Filename=efaxs.exe
  6990. Confirmed=X
  6991. Description=<a href="http://www.wilderssecurity.net/specialinfo/rapidblaster.html" target="_blank">RapidBlaster</a> variant (in a "efaxs" folder in Program Files). Recommended you use RapidBlaster Killer to uninstall - see <a ref="http://www.wilderssecurity.net/specialinfo/rapidblaster.html#removal" target="_blank"> here</a>
  6992. [efpap.exe]
  6993. Filename=Efpap.exe
  6994. Confirmed=U
  6995. Description=<a href="http://www.softstack.com/fileprotpro.html" target="_blank">Easy File & Folder Protector</a>. Deny access to certain files and folders, or to hide them securely from viewing and searching
  6996. [ehtray]
  6997. Filename=ehtray.exe
  6998. Confirmed=U
  6999. Description=Windows XP <a href="http://msdn.microsoft.com/library/en-us/MedctrSDK/htm/formoreinformation.asp" target=_blank>Media Center Edition</a> 2005. Enables the user to access Windows Messenger from within Media Center
  7000. [ei10.exe]
  7001. Filename=ei10.exe
  7002. Confirmed=X
  7003. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32agobotnk.html" target=_blank>AGOBOT-NK</a> WORM!
  7004. [eicon networkslan_daemon]
  7005. Filename=watch.exe
  7006. Confirmed=U
  7007. Description=Associated with an <a href="http://www.eicon.com/worldwide/default.htm" target="_blank">Eicon Networks</a> ISDN or ADSL modem. Watch protocols your connection with numbers and duration. You need callvu.exe (from Start Menu) to see your connection statistics. You can manually start watch.exe before you go online. Needs diinfo.exe (started by DiTask) to work correctly which can be started manually
  7008. [eicon technologylan_daemon]
  7009. Filename=watch.exe
  7010. Confirmed=U
  7011. Description=Associated with an <a href="http://www.eicon.com/worldwide/default.htm" target="_blank">Eicon Networks</a> ISDN or ADSL modem. Watch protocols your connection with numbers and duration. You need callvu.exe (from Start Menu) to see your connection statistics. You can manually start watch.exe before you go online. Needs diinfo.exe (started by DiTask) to work correctly which can be started manually
  7012. [eixfi]
  7013. Filename=china.bat
  7014. Confirmed=X
  7015. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=BAT_WCUP.A" target="_blank">WCUP.A</a> WORM!
  7016. [elbycheck]
  7017. Filename=ElbyCheck.exe
  7018. Confirmed=U
  7019. Description=From <a href="http://www.elby.org/english/corp/index.htm" target="_blank">Elaborate Bytes</a> who make CloneCD - monitors the installed filters of CD-ROMs/DVD-ROMs. Note - under Win2K removing this from startup causes the CD drive in the computer to not be recognized in the OS and after rechecking it prompts that the driver has been corrupted and asks you to restart the computer to fix it
  7020. [electron microscope]
  7021. Filename=EMIII.exe
  7022. Confirmed=U
  7023. Description=Electron Microscope or <a href="http://www.em-dc.com/" target=_blank>EM</a> - is a program used to track Stanford's distributed computing program client called Folding at Home, <a href="http://folding.stanford.edu/" target=_blank>FAH</a>. It will monitor up to 50 clients and give you the details about each client's progress as the FAH client runs. EM will also show you what each change in the protein looks like as the process continues
  7024. [element]
  7025. Filename=Element.txt
  7026. Confirmed=X
  7027. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.elem.trojan.html" target="_blank">ELEM</a> TROJAN!
  7028. [element furth]
  7029. Filename=[path] repcale.exe [path] palsp.exe
  7030. Confirmed=X
  7031. Description=Added by a variant of the <a href="http://uk.trendmicro-europe.com/enterprise/security_info/ve_detail.php?Vname=WORM_RANDON.AN" target=_blank>RANDON.AN</a> WORM!
  7032. [elm]
  7033. Filename=Elmenv.exe
  7034. Confirmed=N
  7035. Description=ViaTech eLicense for securing, distributing and selling music online
  7036. [elnkproxy]
  7037. Filename=smproxy.exe
  7038. Confirmed=X
  7039. Description=<a href="http://www.spyany.com/program/article_spw_rm_Surfmonkey.html" target=_blank>Surfmonkey</a> adware
  7040. [elsa winman suite]
  7041. Filename=Winmsuit.exe
  7042. Confirmed=U
  7043. Description=Allows you to totally customize your ELSA graphics card settings, including overclocking the GPU
  7044. [elsacapictl]
  7045. Filename=Rcapi.exe
  7046. Confirmed=Y
  7047. Description=Assumed to stand for Remote Common Application Programming Interface (RCAPI), this was installed with an Elsa Microlink ISDN modem. If it is not there you can not bring up the dialog box which is sometimes needed to reset the modem
  7048. [elsachipguard]
  7049. Filename=elsavect.exe
  7050. Confirmed=U
  7051. Description=ChipGuard for ELSA graphics cards - monitoring solution which monitors both the GPU temperature and fan speed, and will halt the system if either are at dangerous levels and restore the default clock speeds upon reboot. Leave enabled if overclocking
  7052. [ema.exe]
  7053. Filename=EMA.EXE
  7054. Confirmed=N
  7055. Description=Time management system which helps you to manage your time and appointments
  7056. [emachines eboard]
  7057. Filename=Eboard.exe
  7058. Confirmed=U
  7059. Description=eMachines multimedia keyboard manager. Required if you use the extra keys
  7060. [emcryt sh3ars panagers]
  7061. Filename=[path to worm]
  7062. Confirmed=X
  7063. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotawi.html" target=_blank>RBOT-AWI</a> WORM!
  7064. [emoc0re]
  7065. Filename=emo.exe
  7066. Confirmed=X
  7067. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32agobotage.html" target= blank>AGOBOT-AGE</a> WORM!
  7068. [emsw.exe]
  7069. Filename=emsw.exe
  7070. Confirmed=X
  7071. Description=Attune HelpExpress - spyware. Disable and uninstall - see <a href="http://www.c-squad.org/hxdl.html" target="_blank">here</a>
  7072. [emule]
  7073. Filename=emule.exe
  7074. Confirmed=X
  7075. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotalz.html" target=_blank>RBOT-ALZ</a> WORM!
  7076. [emusicclient systray]
  7077. Filename=eMusicClient.exe
  7078. Confirmed=N
  7079. Description=<a href="http://www.emusic.com/about/index.html" target=_blank>eMusic</a> MP3 download software
  7080. [em_exec]
  7081. Filename=EM_EXEC.EXE
  7082. Confirmed=U
  7083. Description=Logitech Mouseware driver. Needed to support some additional functionality of Logitech mice/trackballs such as "SmartMove". If you disable it and find you don't need it leave it disabled
  7084. [en4060c taskbar]
  7085. Filename=en4060ct.exe
  7086. Confirmed=N
  7087. Description=Comes with Efficient Networks DSL Modems. Little red/green/yellow flashing icon in system tray
  7088. [encapsulated command tool]
  7089. Filename=wintr.com
  7090. Confirmed=?
  7091. Description=<font color="#FF0000">??</font>
  7092. [encarta dictionary quickshelf]
  7093. Filename=QSHLFED.EXE
  7094. Confirmed=N
  7095. Description=<font color="#FF0000">Provides quick access to Encarta's Dictionary features?</font>
  7096. [encmonitor]
  7097. Filename=monitor.exe
  7098. Confirmed=N
  7099. Description=The Encompass Monitor. This program is the Connect Direct Program.  It is more trouble than it is worth and few use it
  7100. [encoder agent]
  7101. Filename=WMENCAGT.EXE
  7102. Confirmed=N
  7103. Description=MS Windows Media Encoder, which already has a shortcut in the Start Menu if installed
  7104. [encompass_encmontr]
  7105. Filename=ENCMONTR.EXE
  7106. Confirmed=U
  7107. Description=Optional simple browser from Yahoo (Encompass)
  7108. [encsurf]
  7109. Filename=surfboard.exe
  7110. Confirmed=?
  7111. Description=<font color="#FF0000">??</font>
  7112. [energizer filesaver]
  7113. Filename=Energizer FileSaver.exe
  7114. Confirmed=U
  7115. Description=<a href="http://www.energizerups.com/productline.asp" target="_blank">Energizer FileSaver</a> - UPS back-up utility for Energizer UPS products
  7116. [energyplugin]
  7117. Filename=EnergyPlugin.exe
  7118. Confirmed=X
  7119. Description=<a href="http://securityresponse.symantec.com/avcenter/venc/data/pf/adware.energyplugin.html" target=_blank>EnergyPlugin</a> adware variant
  7120. [enginecs2]
  7121. Filename=enginecs2.exe
  7122. Confirmed=U
  7123. Description=<a href="http://www.securitysoft.com/new601/cs_home.htm" target=_blank>Cyber Sentinel</a> - internet filtering software
  7124. [engutil]
  7125. Filename=EngUtil.exe
  7126. Confirmed=Y
  7127. Description=Part of Roxio EasyCD Creator 6.0 - corrects any modification made to the Roxio Engine, it exits after checking
  7128. [enh win updt]
  7129. Filename=enhupdt.exe
  7130. Confirmed=X
  7131. Description=Adware downloader - recognized by <a href="http://www.kaspersky.com/personalpro" target=_blank>Kaspersky</a> antivirus as Trojan-Downloader.Win32.OneClickNetSearch.h
  7132. [enhance32]
  7133. Filename=enhance32.exe
  7134. Confirmed=X
  7135. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=TROJ_CRYPTER.A" target="_blank">CRYPTER.A</a> TROJAN!
  7136. [enigmapopupstop]
  7137. Filename=EnigmaPopupStop.exe
  7138. Confirmed=N
  7139. Description=Part of Enigma SpyHunter - not recommended, see <a href="http://www.spywarewarrior.com/rogue_anti-spyware.htm#sh_note" target="_blank">note</a>
  7140. [ensapserver2_0]
  7141. Filename=APSERVER.EXE
  7142. Confirmed=?
  7143. Description=Intel AnyPoint Wireless II Home Network related. <font color="#FF0000"> What does it do and is it required?</font>
  7144. [ensmix32.exe]
  7145. Filename=ENSMIX32.EXE
  7146. Confirmed=?
  7147. Description=Sound card driver. <font color="#FF0000"> Is it required?</font>
  7148. [ensoniqmixer]
  7149. Filename=starter.exe
  7150. Confirmed=U
  7151. Description=Puts the Ensoniq mixer in system tray. From Ensoniq Technologies "Our mixer is a critical part of the soundcard as it fixes sound problems and replaces the MS mixer which can no longer be used". If you find you don't need it - try one of the solutions on <a href="all/starter_exe.htm" target="_blank">this</a> special page. Similar to Creative PCI Audio Configuration Utility
  7152. [enumerate service]
  7153. Filename=wsys.exe
  7154. Confirmed=X
  7155. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.manifest.trojan.html" target="_blank">MANIFEST</a> TROJAN!
  7156. [envyhfcpl]
  7157. Filename=EnMixCPL.exe
  7158. Confirmed=Y
  7159. Description=VIA <a href="http://www.via.com.tw/en/products/audio/controllers/envy24/" target= blank>Envy24</a> PCI Audio Controller driver
  7160. [eonemng]
  7161. Filename=eOneMng.exe
  7162. Confirmed=U
  7163. Description=eOne Manager, provides access to the buttons on the keyboard and on the front of the console for the eMachines eOne PC
  7164. [epoxusdm]
  7165. Filename=USDM.EXE
  7166. Confirmed=U
  7167. Description=<a href="http://www.epox.com.tw/eng/index.php" target=_blank>EPoX</a> Universal Serial Data Monitor - a diagnostics tool that shows Temps, Fan Speeds, Voltages...etc
  7168. [eprint 4.0 service]
  7169. Filename=EPRINT4.EXE
  7170. Confirmed=N
  7171. Description=A component of the "LEADTOOLS <a href="http://www.eprintdriver.com/" target=_blank>ePrint</a> File Conversion Software - Convert ANY file to and from over 150 document and image formats including searchable PDF, DOC, HTML, TXT , Multi-page TIFF, JPG, GIF, PNG and many more!" Can be started manually
  7172. [eprompter]
  7173. Filename=ePrompter.exe
  7174. Confirmed=U
  7175. Description=<a href="http://www.eprompter.com/" target="_blank">ePrompter</a> - E-mail notification software
  7176. [epson background monitor]
  7177. Filename=STMS.EXE
  7178. Confirmed=N
  7179. Description=Supposed to keep an Epson printer ready for quick printing.  Users report little difference whether it is on or not
  7180. [epson cardmonitor]
  7181. Filename=EPSON CardMonitor1.0.exe
  7182. Confirmed=U
  7183. Description=Monitors the PCMCIA memory card slot on EPSON cameras and printers and launches PhotoStarter or PhotoPrint
  7184. [epson stylus c44 series]
  7185. Filename=E_S10IC2.EXE
  7186. Confirmed=U
  7187. Description=Epson Stylus C44 Series printer monitor - for checking ink levels, etc
  7188. [epson stylus c46 series]
  7189. Filename=E_S4I0T1.EXE
  7190. Confirmed=U
  7191. Description=Epson Stylus C46 Series printer monitor - for checking ink levels, etc
  7192. [epson stylus c62 series]
  7193. Filename=E-S0BIC1.EXE
  7194. Confirmed=U
  7195. Description=Required for an interface to some versions of MS Word to ensure that some fonts are printed correctly. Start it manually if required
  7196. [epson stylus c82 series]
  7197. Filename=e_s0hic1.EXE
  7198. Confirmed=U
  7199. Description=Required for an interface to some versions of MS Word to ensure that some fonts are printed correctly. Start it manually if required
  7200. [epson stylus photo rx420 series]
  7201. Filename=E_FATI9CE.EXE
  7202. Confirmed=U
  7203. Description=Related to the EPSON Stylus Photo RX420 Series printer/scanner/copier
  7204. [epsonphotostarter]
  7205. Filename=EPSON_PhotoStarter.exe
  7206. Confirmed=U
  7207. Description=Only needed if you want to make full use of the capabilities of an Epson printer that included this 
  7208. [equipmen]
  7209. Filename=Equipmen.exe
  7210. Confirmed=?
  7211. Description=<font color="#FF0000">??</font>
  7212. [eraser]
  7213. Filename=eraser.exe
  7214. Confirmed=U
  7215. Description=<a href="http://www.heidi.ie/eraser/" target=_blank>Eraser</a> allows for complete removal of data from your hard drive
  7216. [erecoveryservice]
  7217. Filename=check.exe
  7218. Confirmed=U
  7219. Description=Acer Notebook related. Acer eRecovery allows the user to restore the operating system or backup the current system profile, thus ensuring system integrity
  7220. [ereg]
  7221. Filename=reg32.exe
  7222. Confirmed=N
  7223. Description=EReg is a software registration tool incorporated on products such as those by Br°derbund, Connectix, Hewlett-Packard, The Learning Company, and Sierra. Needless to say you don't need it
  7224. [erfgddfk]
  7225. Filename=wind2ll2.exe
  7226. Confirmed=X
  7227. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.beagle.cq@mm.html" target=_blank>BEAGLE.CQ</a> WORM!
  7228. [erghgjhgdr]
  7229. Filename=windlhhl.exe
  7230. Confirmed=X
  7231. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.beagle.bg@mm.html" target=_blank>BEAGLE.BG</a> WORM!
  7232. [erghgjhjgdr]
  7233. Filename=windlhhl.exe
  7234. Confirmed=X
  7235. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.beagle.bg@mm.html" target=_blank>BEAGLE.BG</a> or <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.beagle.bh@mm.html" target=_blank>BEAGLE.BH</a> or <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.beagle.bi@mm.html" target=_blank>BEAGLE.BI</a> or <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.beagle.bj@mm.html" target=_blank>BEAGLE.BJ</a> WORMS!
  7236. [erm]
  7237. Filename=erm.exe
  7238. Confirmed=?
  7239. Description=<font color="#FF0000">??</font>
  7240. [eros.exe]
  7241. Filename=eros.exe
  7242. Confirmed=X
  7243. Description=Adult content dailler
  7244. [error nuker]
  7245. Filename=ErrorNuker.exe
  7246. Confirmed=N
  7247. Description=<a href="http://www.errornuker.com/" target= blank>ErrorNuker</a> registry cleaner - only required if you want the application to run a scan at startup. The program can be launched manually if required
  7248. [errorguard]
  7249. Filename=ErrorGuard.exe
  7250. Confirmed=X
  7251. Description=Spyware remover of dubious repute
  7252. [erthegdr]
  7253. Filename=windll2.exe
  7254. Confirmed=X
  7255. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.beagle.cg@mm.html" target=_blank>BEAGLE.CG</a> WORM!
  7256. [erthgdr2]
  7257. Filename=svc23.exe
  7258. Confirmed=X
  7259. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_BAGLE.CG&VSect=P" target=_blank>BAGLE.CG</a> WORM!
  7260. [erts0749]
  7261. Filename=ERTS0749.exe
  7262. Confirmed=?
  7263. Description=IBM Warranty Notification - <font color="#FF0000">presumably it's a reminder to either register or that warranty is about to expire?</font>
  7264. [esafe protect]
  7265. Filename=ESPWatch.exe
  7266. Confirmed=Y
  7267. Description=<a href="http://www.esafe.com/esafe/default.asp?cf=tl" target="_blank">eSafe</a> from Aladdin - internet security for gateway and E-mail servers
  7268. [esb]
  7269. Filename=esb.exe
  7270. Confirmed=U
  7271. Description=Easy Start Button - provides functionality on certain laptops that have additional keys. Not required unless you use the extra keys
  7272. [escan monitor]
  7273. Filename=AVKWCTL9X.EXE
  7274. Confirmed=Y
  7275. Description=<a href="http://www.mspl.net/antivirus/escan/escan.asp" target="_blank">eScan</a> antivirus
  7276. [escan scheduler]
  7277. Filename=avkserv.exe
  7278. Confirmed=U
  7279. Description=<a href="http://www.mspl.net/antivirus/escan/escan.asp" target="_blank">eScan</a> antivirus scheduler
  7280. [escan updater]
  7281. Filename=Trayicos.exe
  7282. Confirmed=U
  7283. Description=<a href="http://www.mspl.net/antivirus/escan/escan.asp" target="_blank">eScan</a> antivirus updater - allows users to automatically download updates and set the auto time interval for downloads
  7284. [escorcher]
  7285. Filename=escorcher.exe
  7286. Confirmed=X
  7287. Description=Part of <a href="http://www.escorcher.com/" target="_blank">eScorcher</a> anti-virus software - responsible for performing virus checks and deletions. Used to collect information about the user and therefore treated as spyware - now the web-site is dead
  7288. [esftp]
  7289. Filename=esftp.exe
  7290. Confirmed=N
  7291. Description=<a href="http://esftp.com/features.html" target="_blank">ESftp</a> - FTP client for transfering files between a local PC and another remote computer
  7292. [esoh]
  7293. Filename=Esoh123.exe
  7294. Confirmed=X
  7295. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_AGOBOT.FF" target=_blank>AGOBOT.FF</a> WORM!
  7296. [especial]
  7297. Filename=Deneca.bat
  7298. Confirmed=X
  7299. Description=Added by the <a href="http://www.symantec.com/avcenter/venc/data/w97m.deluz.html" target= blank>DELUZ</a> VIRUS!
  7300. [espn bottomline]
  7301. Filename=bline.exe
  7302. Confirmed=N
  7303. Description=ESPN BottomLine. "You can dock the BottomLine to the top or bottom of your screen or drag it around on your desktop, without even worrying about a browser. As long you keep the BottomLine running, you will continue to receive live scores and breaking news, and by clicking on any score or news item, you will be taken directly to the corresponding page on ESPN.com for a full break down."
  7304. [ess daemon]
  7305. Filename=Essd.exe
  7306. Confirmed=?
  7307. Description=Related to an ESS based soundacard. <font color="#FF0000">Is it required?</font>
  7308. [essapm]
  7309. Filename=essapm.exe
  7310. Confirmed=?
  7311. Description=ESS Solo soundcard driver. <font color="#FF0000">Is it required?</font>
  7312. [essdc]
  7313. Filename=essdc.exe
  7314. Confirmed=Y
  7315. Description=Related to an ESS Solo soundcard. Seems as though it's required
  7316. [essndsys]
  7317. Filename=ESSNDSYS.EXE
  7318. Confirmed=?
  7319. Description=Related to an ESS based soundacard. <font color="#FF0000">Is it required?</font>
  7320. [essolo]
  7321. Filename=ESSOLO.exe
  7322. Confirmed=Y
  7323. Description=Sound card driver that re-instates itself every time it's removed
  7324. [esspk]
  7325. Filename=esspk.exe
  7326. Confirmed=Y
  7327. Description=ESS Technology modem speaker driver file. Required to get on-line with this modem
  7328. [essspkphone]
  7329. Filename=essspk.exe
  7330. Confirmed=U
  7331. Description=ESS Technologies Call waiting, which gets installed by the drivers for V92 modems based on ESS Technologies chipsets
  7332. [esupinit]
  7333. Filename=eSupCmd.exe
  7334. Confirmed=?
  7335. Description=Related to <a href="http://support.com/solutions/overview/solutions_overview.shtml" target=_blank>SupportSoft</a> "Real-Time Service Management software". <font color="#FF0000">What does it do and is it required?</font>
  7336. [etb tester]
  7337. Filename=etbtest.exe
  7338. Confirmed=X
  7339. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotabr.html" target= blank>RBOT-ABR</a> WORM!
  7340. [etbrun]
  7341. Filename=elite***32.exe [* = random char]
  7342. Confirmed=X
  7343. Description=<a href="http://securityresponse.symantec.com/avcenter/venc/data/adware.elitebar.html" target=_blank>EliteBar</a> adware variant
  7344. [etraffic]
  7345. Filename=JavaRun.exe
  7346. Confirmed=X
  7347. Description=Marketing software from <a href="http://www.etraffic.com/" target="_blank">TopMoxie</a>
  7348. [etrust ez firewall]
  7349. Filename=efpeadm.exe
  7350. Confirmed=Y
  7351. Description=<a href="http://www1.my-etrust.com/products/Firewall.cfm" target="_blank">eTrust EZ Firewall</a>
  7352. [etrust pestpatrol active protection]
  7353. Filename=PPActiveDetection.exe
  7354. Confirmed=U
  7355. Description=<a href="http://www.pestpatrol.com/" target=_blank>PestPatrol</a> real-time protection feature. "Stops spyware before it infects your system"
  7356. [etrustcipe]
  7357. Filename=ezdsmain.exe
  7358. Confirmed=Y
  7359. Description=<a href="http://www1.my-etrust.com/products/info/Deskshield/4?CFID=6909348&CFTOKEN=43ce20d%2D0001f1aa%2Df6e5%2D1d77%2Dbe1e%2D2f0eac14303f" target="_blank">eTrust EZ Deskshield</a> from Computer Associates. Protects against malicious email attachments and unauthorized use of email by detecting and blocking unusual behavior
  7360. [etunnel]
  7361. Filename=winfw.exe
  7362. Confirmed=X
  7363. Description=Added by an unidentified TROJAN!
  7364. [euroglot]
  7365. Filename=EuroGlot.exe
  7366. Confirmed=U
  7367. Description=<a href="http://www.euroglotonline.nl/en/default.html" target="_blank">Euroglot</a> - "multilanguage translating system, available in the languages Dutch, English, French, German, Spanish and Italian"
  7368. [event log]
  7369. Filename=eventlog.exe
  7370. Confirmed=?
  7371. Description=<font color="#FF0000">??</font>
  7372. [event planner reminders]
  7373. Filename=PLNRnote.exe
  7374. Confirmed=N
  7375. Description=Sierra Event Planner tray icon
  7376. [event reminder]
  7377. Filename=pmremind.exe
  7378. Confirmed=N
  7379. Description=A calendar/alarm program that installs with Br°derbund Printmaster
  7380. [eventapplicationcmd]
  7381. Filename=smschk.exe
  7382. Confirmed=X
  7383. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojircbotao.html" target=_blank>IRCBOT-AO</a> TROJAN!
  7384. [eventlistener]
  7385. Filename=EvLstnr.exe
  7386. Confirmed=U
  7387. Description=Used with a Nikon digital camera to recognize when the camera is plugged in
  7388. [eventmgr]
  7389. Filename=eventmgr.exe
  7390. Confirmed=N
  7391. Description=Used with a Microtek scanner. Manages the scanner's button events. Available via Start -> Programs
  7392. [evidence cleaner]
  7393. Filename=ecleaner.exe
  7394. Confirmed=U
  7395. Description=<a href="http://www.evidence-cleaner.net/" target= blank>Evidence Cleaner</a> cleans up tracks left by your PC and Internet activities
  7396. [evidence eliminator]
  7397. Filename=ee.exe
  7398. Confirmed=N
  7399. Description=<a href="http://www.evidence-eliminator.com/product.shtml" target="_blank">Evidence Eliminator</a> - cover the tracks of your browsing habits and E-mails if you think you need to. Run manually on a regular basis
  7400. [evil]
  7401. Filename=Evil.exe
  7402. Confirmed=X
  7403. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.mytob.jm@mm.html" target=_blank>MYTOB.JM</a> WORM!
  7404. [evntsvc]
  7405. Filename=evntsc.exe
  7406. Confirmed=N
  7407. Description=Application Scheduler installed along with <a href="http://www.real.com/" target="_blank">RealOne Player</a>. Once installed, it runs independently of RealOne Player. See <a href="http://www.mikescomputerinfo.com/TkBellExe.htm" target="_blank">here</a> for more information, including how to disable it. Also see evntsvc and Realsched. Note that eventsvc.exe no longer appears to be in a newer version. To disable "tkbell.exe" in the new version (1) Start RealOne Player (2) Tools -> Preferences (3) Automatic services in the Categories pane (4) Uncheck all options and then OK
  7408. [evolosta]
  7409. Filename=EVOLOSTA.EXE
  7410. Confirmed=U
  7411. Description=Evolo Status Monitor for wireless network cards. Allows a user to enter a specific access-point mode SSID, peer-to-peer mode channel, link speed, WEP encryption options, and has enable/disable and rescan buttons. It is not needed if using Windows XP or higher, as they have this built-in to the control panel. Also, if the user is very sure that there is ONLY ONE network available to connect to, then they can remove this. If it is not in startup, and the user needs to run it, they can simply type EVOLOSTA in the Start -> Run dialog to run it
  7412. [evthtm]
  7413. Filename=evthtm.exe
  7414. Confirmed=X
  7415. Description=Premium rate adult content dialler
  7416. [ew message server]
  7417. Filename=msg32.exe
  7418. Confirmed=U
  7419. Description=Conexant (older versions are Brooktree) Wavestream Message Server - associated with Conexant based audio devices
  7420. [eware startup]
  7421. Filename=iWareStart.exe
  7422. Confirmed=N
  7423. Description=<a href="http://www.eware.com/about/index.asp" target="_blank">eWare</a> iWare task bar. Not required
  7424. [ewupdater]
  7425. Filename=ewupdater.exe
  7426. Confirmed=X
  7427. Description=<a href="http://www.kephyr.xaviermedia.us/spywarescanner/library/easywebsearch/index.phtml" target=_blank>EasyWebSearch</a> adware updater
  7428. [example]
  7429. Filename=[random filename].exe
  7430. Confirmed=X
  7431. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.nuclear.html" target=_blank>NUCLEAR</a> TROJAN! Note - this trojan file is found in the Windows\NR or Winnt\NR folder
  7432. [excite platform]
  7433. Filename=Exlaunch.exe
  7434. Confirmed=N
  7435. Description=Loads an Icon in the startup tray that allows you to receive service update notices for Excite@Home if you desire (note that since Excite@Home appears to be winding down this becomes irrelevant). May also allow you to kill the Excite Toolbar that automatically loads in Internet Explorer
  7436. [excite private messenger pipe]
  7437. Filename=x8impipe.exe
  7438. Confirmed=?
  7439. Description=<font color="#FF0000">??</font>
  7440. [exciteassistantexe]
  7441. Filename=ASSISTANT.EXE
  7442. Confirmed=N
  7443. Description=With Excite Assistant, you can access a wide variety of online information, including email, news, and stock quotes without having to have a browser window open
  7444. [exdl.exe]
  7445. Filename=exdl.exe
  7446. Confirmed=X
  7447. Description=<a href="http://sarc.com/avcenter/venc/data/adware.bargainbuddy.html" target="_blank">BargainBuddy</a> foistware
  7448. [exe lptt01]
  7449. Filename=exe.exe
  7450. Confirmed=X
  7451. Description=<a href="http://www.wilderssecurity.net/specialinfo/rapidblaster.html" target="_blank">RapidBlaster</a> variant (in a "Exe" folder in Program Files). Recommended you use RapidBlaster Killer to uninstall - see <a ref="http://www.wilderssecurity.net/specialinfo/rapidblaster.html#removal" target="_blank"> here</a>
  7452. [exe ml097e]
  7453. Filename=exe.exe
  7454. Confirmed=X
  7455. Description=<a href="http://www.wilderssecurity.net/specialinfo/rapidblaster.html" target="_blank">RapidBlaster</a> variant (in a "Exe" folder in Program Files). Recommended you use RapidBlaster Killer to uninstall - see <a ref="http://www.wilderssecurity.net/specialinfo/rapidblaster.html#removal" target="_blank"> here</a>
  7456. [execfg4]
  7457. Filename=execfg4.exe
  7458. Confirmed=X
  7459. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.hllw.electron.html" target="_blank">ELECTRON</a> WORM!
  7460. [execute]
  7461. Filename=delfolders.exe
  7462. Confirmed=?
  7463. Description=<font color="#FF0000">??</font>
  7464. [exename32]
  7465. Filename=Warm.scr
  7466. Confirmed=X
  7467. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.scold@mm.html" target="_blank">SCOLD</a> WORM!
  7468. [exgiwsl]
  7469. Filename=exgiwsl.exe
  7470. Confirmed=?
  7471. Description=<font color="#FF0000">??</font>
  7472. [exitkiller]
  7473. Filename=Ekiller.exe
  7474. Confirmed=U
  7475. Description=<a href="http://www.exitkiller.net/" target="_blank">Exit Killer</a> - automatically closes pop-up windows in your browser
  7476. [exmon]
  7477. Filename=hpimoniter.exe
  7478. Confirmed=?
  7479. Description=<font color="#FF0000">Some kind of hp digital camera maybe or a photo smart connection probe?</font>
  7480. [expl0re.exe]
  7481. Filename=EXPL0RE.EXE
  7482. Confirmed=X
  7483. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojpopnoa.html" target=_blank>POPNO-A</a> TROJAN! Note that the filename is spelled using the digit "0" instead of the uppercase letter "o"
  7484. [expl0rer soft]
  7485. Filename=expl0rer.pif
  7486. Confirmed=X
  7487. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotaqr.html" target=_blank>RBOT-AQR</a> WORM!
  7488. [expler]
  7489. Filename=Updadv.exe
  7490. Confirmed=X
  7491. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojqqpassn.html" target=_blank>QQPASS-N</a> TROJAN!
  7492. [explkw]
  7493. Filename=expup.exe
  7494. Confirmed=X
  7495. Description=Keywords hijacker
  7496. [explore manager]
  7497. Filename=explore.exe
  7498. Confirmed=X
  7499. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=TROJ_DONBOMB.A&VSect=P" target=_blank>DONBOMB.A</a> TROJAN!
  7500. [explore.exe]
  7501. Filename=Explore.exe
  7502. Confirmed=X
  7503. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.graybird.g.html" target="_blank">GRAYBIRD.G</a> TROJAN!
  7504. [exploreff.exe]
  7505. Filename=exploreff.exe
  7506. Confirmed=X
  7507. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/trojan.finfanse.html" target=_blank>FINFANSE</a> TROJAN!
  7508. [explorer lptt01]
  7509. Filename=explorer.exe
  7510. Confirmed=X
  7511. Description=<a href="http://www.wilderssecurity.net/specialinfo/rapidblaster.html" target="_blank">RapidBlaster</a> variant (in a "explorer" folder in Program Files). Recommended you use RapidBlaster Killer to uninstall - see <a ref="http://www.wilderssecurity.net/specialinfo/rapidblaster.html#removal" target="_blank"> here</a>. Note - this is not the legitimate Windows Explorer (explorer.exe) which would only be in startups if you added it manually!
  7512. [explorer microsoft system]
  7513. Filename=explore.exe
  7514. Confirmed=X
  7515. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  7516. [explorer ml097e]
  7517. Filename=explorer.exe
  7518. Confirmed=X
  7519. Description=<a href="http://www.wilderssecurity.net/specialinfo/rapidblaster.html" target="_blank">RapidBlaster</a> variant (in a "explorer" folder in Program Files). Recommended you use RapidBlaster Killer to uninstall - see <a ref="http://www.wilderssecurity.net/specialinfo/rapidblaster.html#removal" target="_blank"> here</a>. Note - this is not the legitimate Windows Explorer (explorer.exe) which would only be in startups if you added it manually!
  7520. [explorer updater]
  7521. Filename=IEXPLORE.exe
  7522. Confirmed=X
  7523. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32sdbotwo.html" target=_blank>SDBOT-WO</a> WORM! Note - this is not the legitimate Internet Explorer <a href="http://www.liutilities.com/products/wintaskspro/processlibrary/iexplore/" target=_blank>iexplore.exe</a> process which is always located in the Program Files\Internet Explorer folder and should not normally figure in Msconfig/Startup! This file is located in the System (9x/Me) or System32 (NT/2K/XP) folder
  7524. [explorer.exe]
  7525. Filename=explorer.exe
  7526. Confirmed=X
  7527. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojagentew.html" target=_blank>AGENT-EW</a> or <a href="http://www.sophos.com/virusinfo/analyses/trojpwscy.html" target=_blank>PWS-CY</a> TROJANS! Note - the legitimate Windows Explorer (explorer.exe) is located in the Windows or Winnt folder and would only be in startups if you added it manually. This one is located in the System (9x/Me) or System32 (NT/2K/XP) folder
  7528. [exporet]
  7529. Filename=winset.exe
  7530. Confirmed=X
  7531. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojqqpassi.html" target=_blank>QQPASS-I</a> TROJAN!
  7532. [exshow95]
  7533. Filename=EXSHOW95.exe
  7534. Confirmed=U
  7535. Description=Support software for some of the Kensington mice. Provides access to extra features like those available with enhanced Logitech and MS devices
  7536. [external dependencies]
  7537. Filename=External.exe
  7538. Confirmed=X
  7539. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.mytob.ec@mm.html" target=_blank>MYTOB.EC</a> WORM!
  7540. [extradns]
  7541. Filename=ExtraDNS.exe
  7542. Confirmed=U
  7543. Description=<a href="http://www.extratools.com/" target="_blank">ExtraDNS</a> - DNS configuration tool
  7544. [extranet autodial]
  7545. Filename=AutoExt.exe
  7546. Confirmed=?
  7547. Description=Nortel Networks Contivity Extranet Switching Software
  7548. [exxtremehelperdemon]
  7549. Filename=exxdemon.exe
  7550. Confirmed=?
  7551. Description=<font color="#FF0000">Creative Exxtreme graphics card related?</font>
  7552. [eye tide launcher]
  7553. Filename=oneeyetideone.exe
  7554. Confirmed=N
  7555. Description=Nascar wallpaper
  7556. [ez firewall]
  7557. Filename=ca.exe
  7558. Confirmed=Y
  7559. Description=eTrust <a href="http://www3.ca.com/Solutions/Product.asp?ID=3243" target=_blank>EZ Armor</a> Internet Security
  7560. [ezagent]
  7561. Filename=ezagent.exe
  7562. Confirmed=N
  7563. Description=<a href="http://www.asus.com/products/vga/tvfm/overview.htm" target="_blank">EzVCR</a> recording software for the ASUS TV FM card. Available via Start -> Programs
  7564. [ezbutton]
  7565. Filename=EzButton.EXE
  7566. Confirmed=N
  7567. Description=EZbutton is a quick launcher for the Media player app that comes with certain laptops. Typically installed in a C:\Program Files\EzButton folder
  7568. [ezdesk]
  7569. Filename=EZDESK.EXE
  7570. Confirmed=N
  7571. Description=Utility that remembers icon locations for each user and resolution. Available <a href="http://members.aol.com/EzDesk95/" target="_blank">here</a>
  7572. [ezejmnap]
  7573. Filename=EzEjMnAp.exe
  7574. Confirmed=N
  7575. Description=For IBM Thinkpad Notebooks. Quote: "The IBM ThinkPad EasyEject Utility makes removing multiple devices from your computer faster and easier by enabling you to stop more than one device at once, rather than stopping each device individually". Available via Start -> Programs
  7576. [ezmmod]
  7577. Filename=mmod.exe
  7578. Confirmed=X
  7579. Description=eZula <a href="http://research.sunbelt-software.com/threat_display.cfm?name=eZula.TopText&threatid=5117&search=TopText" target=_blank>TopText</a> adware
  7580. [eznorun]
  7581. Filename=EZNORUN.EXE
  7582. Confirmed=?
  7583. Description=<font color="#FF0000">Easy Internet related?</font>
  7584. [ezsmart app]
  7585. Filename=ezsmart.exe
  7586. Confirmed=U
  7587. Description=EZ-S.M.A.R.T. hard drive monitoring software from StorageSoft - appears to be no longer supported
  7588. [ezula]
  7589. Filename=eZmmod.exe
  7590. Confirmed=X
  7591. Description=eZula <a href="http://research.sunbelt-software.com/threat_display.cfm?name=eZula.TopText&threatid=5117&search=TopText" target=_blank>TopText</a> adware
  7592. [ezulamain]
  7593. Filename=eZulaMain.exe
  7594. Confirmed=X
  7595. Description=eZula <a href="http://research.sunbelt-software.com/threat_display.cfm?name=eZula.TopText&threatid=5117&search=TopText" target=_blank>TopText</a> adware
  7596. [ezulumain]
  7597. Filename=eZuluMain.exe
  7598. Confirmed=X
  7599. Description=Comes with "KaZaA" installation. Advertising Spyware. Not required but KaZaA won't work
  7600. [ezwo]
  7601. Filename=wo.exe
  7602. Confirmed=X
  7603. Description=eZula <a href="http://research.sunbelt-software.com/threat_display.cfm?name=eZula.TopText&threatid=5117&search=TopText" target=_blank>TopText</a> adware
  7604. [e_s10ic2]
  7605. Filename=E_S10IC2.exe
  7606. Confirmed=U
  7607. Description=Epson Stylus C44 Series printer monitor - for checking ink levels, etc
  7608. [e_s23]
  7609. Filename=E_SICN03.exe
  7610. Confirmed=U
  7611. Description=Epson printer status monitor - for checking ink levels, etc.
  7612. [e_s4i2f1]
  7613. Filename=E_S4I2F1.exe
  7614. Confirmed=N
  7615. Description=Epson Status Monitor 3 for the Epson Stylus Photo R300 (and probably others) printers - monitors the status of a print job spooled to that printer
  7616. [e_s4i2g1]
  7617. Filename=E_S4I2G1.EXE
  7618. Confirmed=N
  7619. Description=Related to the Epson Stylus CX5400 printer/scanner/copier - not required
  7620. [e_soeic1]
  7621. Filename=E_SOEIC1.exe
  7622. Confirmed=U
  7623. Description=Epson Stylus printer monitor - for checking ink levels, etc.
  7624. [f-secure 2006]
  7625. Filename=fspex.exe
  7626. Confirmed=Y
  7627. Description=<a href="http://www.f-secure.com/products/anti-virus/fsav2006/" target=_blank>F-Secure</a> Anti-Virus automatic updater
  7628. [f-secure management agent]
  7629. Filename=FSMA32.EXE
  7630. Confirmed=U
  7631. Description=<a href="http://www.f-secure.com/products/anti-virus/" target="_blank">F-Secure Antivirus</a> - F-Secure Policy Manager provides tools for administering F-Secure software products
  7632. [f-secure manager]
  7633. Filename=FSM32.EXE
  7634. Confirmed=Y
  7635. Description=<a href="http://www.f-secure.com/products/anti-virus/" target="_blank">F-Secure Antivirus</a> - carry out scheduled virus scans automatically
  7636. [f-secure startup wizard]
  7637. Filename=FSSW.EXE
  7638. Confirmed=Y
  7639. Description=<a href="http://www.f-secure.com/solutions/home.shtml" target="_blank">F-Secure</a> antivirus
  7640. [f-secure tnb]
  7641. Filename=TNBUtil.exe
  7642. Confirmed=Y
  7643. Description=<a href="http://www.f-secure.com/solutions/home.shtml" target="_blank">F-Secure</a> antivirus
  7644. [f-stopw]
  7645. Filename=F-StopW.exe
  7646. Confirmed=Y
  7647. Description=<a href="http://www.f-prot.com">F-Prot</a> anti-virus background scanner by F-Risk Software
  7648. [f1tray.exe]
  7649. Filename=F1TRAY.EXE
  7650. Confirmed=U
  7651. Description=System Tray icon for FusionOneÆs <a href="http://www.mightyphone.com/" target=_blank>MightyPhone</a> software. "MightyPhone is a concept for wirelessly synchronizing the data on your mobile phone with your web-based or PC based organizer"
  7652. [f607]
  7653. Filename=f607.exe
  7654. Confirmed=X
  7655. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.urat.b.html" target="_blank">URAT.B</a> TROJAN!
  7656. [f73cdc8ee94e]
  7657. Filename=btsendto.exe
  7658. Confirmed=X
  7659. Description=Associated with mysearchnow.com/searchbar.html
  7660. [familykeylogger]
  7661. Filename=cisvc.exe
  7662. Confirmed=U
  7663. Description=<a href="http://www.spyarsenal.com/familykeylogger/" target="_blank">Family Keylogger</a> - is your best choice, if you want to know what other users on your machine are typing". Given a "U" recommendation because it depends if you intentionally installed it. If you didn't treat it as "X" and uninstall or remove
  7664. [fantasia injector]
  7665. Filename=wincfg.exe
  7666. Confirmed=X
  7667. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_AGOBOT.US&VSect=P" target=_blank>AGOBOT.US</a> WORM!
  7668. [fapmon]
  7669. Filename=fapmon.exe
  7670. Confirmed=?
  7671. Description=<a href="http://www.copperhead.cc/fap.html" target="_blank">Fair Access Policy</a> monitor for DirecPC/DirecWay internet access
  7672. [farmmext]
  7673. Filename=farmmext.exe
  7674. Confirmed=X
  7675. Description=<a href="http://research.sunbelt-software.com/threat_display.cfm?name=VX2.Transponder&threatid=12517&search=vx2" target=_blank>VX2.Transponder</a> parasite updater/installer related
  7676. [fash]
  7677. Filename=Fash.exe
  7678. Confirmed=X
  7679. Description=Unidentified adware
  7680. [fast]
  7681. Filename=fast.exe
  7682. Confirmed=N
  7683. Description=Installs as part of Windows XP PowerToys as an option for very-fast user switching (allowing a keystoke to switch users instead of using the login screen). It is only used for the hot-key switch and yet it hogs 1.5 megs of memory in two separate processes (one run by the user & one by the system). Optional install in PowerToys
  7684. [fast defrag]
  7685. Filename=FAST2.EXE
  7686. Confirmed=N
  7687. Description=<a href="http://www.ams.as.ro/" target="_blank">FastDefrag</a> defragmenting software
  7688. [fast home]
  7689. Filename=svcnvt.exe
  7690. Confirmed=X
  7691. Description=Reported by Kaspersky Anti-Virus as Trojan-Downloader.Win32.Delf.ks This file may be found in the System folder on 9x machines, however as of this writing it has only been seen in the System32 folder
  7692. [fast search]
  7693. Filename=svcnv.exe
  7694. Confirmed=X
  7695. Description=Homepage, Startpage hijacker. Possible variant of Trojan-Downloader.Win32.Delf
  7696. [fastcache]
  7697. Filename=fc.exe
  7698. Confirmed=U
  7699. Description=<a href="http://www.analogx.com/contents/download/network/fc.htm" target="_blank">FastCache</a> from AnalogX - speeds up browsing by resolving DNS requests locally
  7700. [fasttrack accelerator]
  7701. Filename=SPEED UP.EXE
  7702. Confirmed=N
  7703. Description=<a href="http://www.sharemonkey.com/fta/index.php" target="_blank">FastTrack Accelerator</a> - "speedup" utility for programs that use the FastTrack network such as KaZaA Media Desktop, Grokster and Morpheus
  7704. [fastuser]
  7705. Filename=fast.exe
  7706. Confirmed=N
  7707. Description=Installs as part of Windows XP PowerToys as an option for very-fast user switching (allowing a keystoke to switch users instead of using the login screen). It is only used for the hot-key switch and yet it hogs 1.5 megs of memory in two separate processes (one run by the user & one by the system). Optional install in PowerToys
  7708. [fastusr]
  7709. Filename=fast.exe
  7710. Confirmed=N
  7711. Description=Installs as part of Windows XP PowerToys as an option for very-fast user switching (allowing a keystoke to switch users instead of using the login screen). It is only used for the hot-key switch and yet it hogs 1.5 megs of memory in two separate processes (one run by the user & one by the system). Optional install in PowerToys
  7712. [fatpipe]
  7713. Filename=DHCP
  7714. Confirmed=U
  7715. Description=Software enabling high speed internet browsing (2-4 times faster) and internet connection sharing for up to 5 users
  7716. [fatpipe dialer]
  7717. Filename=fpdialer.exe
  7718. Confirmed=U
  7719. Description=Dailler for Fatpipe - software enabling high speed internet browsing (2-4 times faster) and internet connection sharing for up to 5 users
  7720. [fatrecov]
  7721. Filename=fatrecov.exe
  7722. Confirmed=U
  7723. Description=SCKeyLog.j ?keystroke logger/monitoring program. Given a "U" recommendation because it depends if you intentionally installed it. If you didn't treat it as "X" and uninstall or remove
  7724. [faxcenterserver]
  7725. Filename=fm3032.exe
  7726. Confirmed=U
  7727. Description=<a href="http://www.data-tech.com/content/fax.aspx" target=_blank>FaxMan</a> integrates complete fax send and receive support into Windows applications without requiring additional fax software. Incorporated into software by Lexmark, MCI, Lotus, My Software, Broderbund, Traffic Software and many others
  7728. [faxtalk callcontrol 6.0]
  7729. Filename=FTClCtrl.EXE
  7730. Confirmed=N
  7731. Description=This allows the software to handle incoming and outgoing communications without requiring the FaxTalk Communicator application to be loaded into memory. Can be started manually
  7732. [fbdirect]
  7733. Filename=FBDirect.exe
  7734. Confirmed=U
  7735. Description=Software that monitors the status of a Visioneer OneTouch scanner button and allows you to scan, fax, copy, print, and easily communicate by simply dragging and dropping scans on your PaperPort Desktop!. The **** represents the model, 5300, 7600, etc. Available via Start -> Programs
  7736. [fbi]
  7737. Filename=FBISM.exe
  7738. Confirmed=?
  7739. Description=<font color="#FF0000">Compaq related but what does it do?</font>
  7740. [fc]
  7741. Filename=runfc.exe
  7742. Confirmed=X
  7743. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.campurf@mm.html" target="_blank">CAMPURF</a> WORM!
  7744. [fcengine]
  7745. Filename=FCEngine.exe
  7746. Confirmed=X
  7747. Description=<a href="http://research.sunbelt-software.com/threat_display.cfm?name=Adw.ConsumerAlertSystem.CASClient&threatid=40038" target=_blank>CASClient</a> adware variant
  7748. [fchelp]
  7749. Filename=FCHelp.exe
  7750. Confirmed=X
  7751. Description=Added by either <a href="http://securityresponse.symantec.com/avcenter/venc/data/adware.fchelp.html" target=_blank>FCHelp</a> adware or a variant of it
  7752. [fdd system]
  7753. Filename=Fdd.exe
  7754. Confirmed=X
  7755. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32mytobfo.html" target=_blank>MYTOB-FO</a> WORM!
  7756. [fdr command module]
  7757. Filename=sp2.exe
  7758. Confirmed=X
  7759. Description=Added by the <a href="http://www.virus-buster.com/en/viruslab/descriptions/sdbot.wp?VBSESSION=aa76c5b7d679e7a1eb5abe8b697fb08e" target=_blank>SDBOT.WP</a> WORM!
  7760. [fd_sap]
  7761. Filename=FD.exe
  7762. Confirmed=U
  7763. Description=Reported to be the autopassword program from the Sony Microvault thumb drive
  7764. [feelalright]
  7765. Filename=mirc.exe
  7766. Confirmed=X
  7767. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32ircfloodm.html" target=_blank>IRCFLOOD-M</a> WORM!
  7768. [feelitdevicemanager]
  7769. Filename=feelitdm.exe
  7770. Confirmed=U
  7771. Description=Associated with Immersion TouchSense devices (Logitech Wingman Force Feedback Mouse and possibly other peripherals)
  7772. [fegoze]
  7773. Filename=SVCH0ST.EXE
  7774. Confirmed=X
  7775. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.graybird.d.html" target=_blank>GRAYBIRD.D</a> VIRUS! Note - the filename has the digit 0 rather then the uppercase "o"
  7776. [fekio startups]
  7777. Filename=fnksvc32.exe
  7778. Confirmed=X
  7779. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32agobotov.html" target= blank>AGOBOT-OV</a> WORM!
  7780. [fellowes proxy]
  7781. Filename=R3proxy.exe
  7782. Confirmed=U
  7783. Description=Installed with Fellowes EasyPoint mouse software. Not necessary for normal functioning of Fellowes mice but it is necessary to use the extended features of all Fellowes mice
  7784. [fen startups]
  7785. Filename=fensvc32.exe
  7786. Confirmed=X
  7787. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.randex.ccf.html" target=_blank>RANDEX.CCF</a> WORM!
  7788. [ferrariwallpaper]
  7789. Filename=FerrariWP.exe
  7790. Confirmed=U
  7791. Description=Calendar that replaces the default desktop background image. It comes with every Acer Ferrari 3000 laptop. Also downloadable for members of www.ferrari.com
  7792. [ffis]
  7793. Filename=ffisearch.exe
  7794. Confirmed=X
  7795. Description=iSearch "Desktop Search" hijacker
  7796. [fg1_00]
  7797. Filename=frntgate.exe
  7798. Confirmed=U
  7799. Description=<a href="http://www.presorium.com/en_au/products/fg/index.shtml" target="_blank">FrontGate MX</a> - e-mail spam blocker
  7800. [fgqegqhome]
  7801. Filename=gwwgtp.exe
  7802. Confirmed=X
  7803. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.ranky.j.html" target=_blank>RANKY.J</a> TROJAN!
  7804. [fhpage]
  7805. Filename=shdochp.exe
  7806. Confirmed=X
  7807. Description=Added by the <a href="http://www.pctools.com/mrc/infections/id/Trojan.Downloader.Delf.KS/" target=_blank>DELF-Ks</a> TROJAN!
  7808. [fhstart]
  7809. Filename=shdocsvc.exe
  7810. Confirmed=X
  7811. Description=Added by the <a href="http://www.pctools.com/mrc/infections/id/Trojan.Downloader.Delf.KS/" target=_blank>DELF-Ks</a> TROJAN!
  7812. [fhtisxk]
  7813. Filename=fhtisxk.exe
  7814. Confirmed=U
  7815. Description=XtraKeys - keylogger (monitoring program). Given a "U" recommendation because it depends if you intentionally installed it. If you didn't treat it as "X" and uninstall or remove via Spybot S&D (for example)
  7816. [fieldforms sync]
  7817. Filename=SyncService.exe
  7818. Confirmed=U
  7819. Description=Resco <a href="http://www.resco-net.com/enterprise/fieldforms/" target="_blank">FieldForms</a>. A solution for building of mobile forms that can be viewed or filled in on the run, on a wide range of mobile devices. Supports Microsoft Access databases, and provides for synchronization of other data as well
  7820. [fiendlytype]
  7821. Filename=csrss.exe
  7822. Confirmed=X
  7823. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/trojan.webus.html" target="_blank">WEBUS</a> TROJAN! Note - this is not the legitimate <a href="http://www.liutilities.com/products/wintaskspro/processlibrary/csrss/" target="_blank">csrss.exe</a> process, which should not appear in Msconfig/Startup!
  7824. [file]
  7825. Filename=abcdefg.exe
  7826. Confirmed=X
  7827. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.kelvir.dd.html" target=_blank>KELVIR.DD</a> WORM!
  7828. [file indexing service]
  7829. Filename=msfindfile.exe
  7830. Confirmed=?
  7831. Description=<font color="#FF0000">New version of MS FindFast and still a resource hog?</font>
  7832. [file laoder configuration]
  7833. Filename=rnd32.exe
  7834. Confirmed=X
  7835. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_RBOT.BQJ&VSect=T" target=_blank>RBOT.BQJ</a> WORM!
  7836. [file system]
  7837. Filename=taskmqrs.exe
  7838. Confirmed=X
  7839. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=41911" target=_blank>TOXBOT/CODBOT</a> WORM!
  7840. [file system service]
  7841. Filename=wmiprvsc.exe
  7842. Confirmed=X
  7843. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojagobothz.html" target="_blank">AGOBOT-HZ</a> TROJAN!
  7844. [file0_0]
  7845. Filename=MD1.exe
  7846. Confirmed=X
  7847. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojdloaderor.html" target=_blank>DLOADER-OR</a> TROJAN!
  7848. [file1]
  7849. Filename=Dia Claro.htm
  7850. Confirmed=X
  7851. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojdloaderor.html" target=_blank>DLOADER-OR</a> TROJAN!
  7852. [filefreedom_plugin]
  7853. Filename=wtm.exe
  7854. Confirmed=N
  7855. Description=<a href="http://www.filefreedom.com/" target="_blank">FileFreedom</a> peer-to-peer sharing program
  7856. [filemanager32]
  7857. Filename=Wscript.exe ..ChkMgr32.vbs
  7858. Confirmed=X
  7859. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/vbs.notup.a@mm.html" target="_blank">NOTUP.A</a> WORM!
  7860. [filesoft]
  7861. Filename=Wscript.exe UpdataFiles.vbs
  7862. Confirmed=X
  7863. Description=Added by the <a href="http://www.symantec.com/avcenter/venc/data/vbs.sst.b@mm.html" target="_blank">SST.B</a> WORM!
  7864. [filtergate]
  7865. Filename=filtergate.exe
  7866. Confirmed=U
  7867. Description=<a href="http://www.filtergate.com/" target="_blank">Filtergate</a> internet filtering software - filters sounds, popup ads, background sound and other unnecessary website items
  7868. [filterguard]
  7869. Filename=Filtrgrd.exe
  7870. Confirmed=U
  7871. Description=An icon located in the lower left of the screen and looks like a lifesaver. This icon is a ôshort-cut?to access the basic features of SOS-Guardian, SOS-KidProof Lite, SOS Best Defense and SOS Pro such as Internet filtering utility. You can access this menu by ôright-clicking?on the icon
  7872. [find]
  7873. Filename=find.exe
  7874. Confirmed=X
  7875. Description=Added by the <a href="http://www.symantec.com/avcenter/venc/data/w32.opanki.html" target=_blank>OPANKI</a> WORM!
  7876. [find fast]
  7877. Filename=Findfast.exe
  7878. Confirmed=X
  7879. Description=Complete utter waste of space! Part of MS Office - searches disk drives for Office file types to make opening them easier
  7880. [find virus launch program]
  7881. Filename=fvlaunch.exe
  7882. Confirmed=Y
  7883. Description=Part of <a target="_blank" href="http://www.drsolomon.com/">Dr. Solomon's Antivirus</a>
  7884. [findhack]
  7885. Filename=[path to trojan]
  7886. Confirmed=X
  7887. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32kelvirba.html" target=_blank>KELVIR-BA</a> TROJAN!
  7888. [fineprint dispatcher vx]
  7889. Filename=FPDISPxA.EXE
  7890. Confirmed=N
  7891. Description=<a href="http://www.softwarelabs.com/fp/fineprint.htm" target="_blank">FinePrint</a> - virtual printer for use with any printer. Search for "dispatcher" <a href="http://www.softwarelabs.com/fp/fp-faq.htm" target="_blank"> here</a> for more information. If removed, it will re-install when program is run - hence the Y recommendation
  7892. [finereader7newsreaderpro]
  7893. Filename=AbbyyNewsReader.exe
  7894. Confirmed=N
  7895. Description=ABBYY <a href="http://www.abbyy.com/finereader7/?param=28603" target=_blank>FineReader</a> OCR software
  7896. [firefox]
  7897. Filename=firefox.exe
  7898. Confirmed=X
  7899. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotatp.html" target=_blank>RBOT-ATP</a> WORM! Note - this is not the popular <a href="http://www.mozilla.com/firefox/" target=_blank>FireFox</a> web browser and is located in the System (9x/Me) or System32 (NT/2K/XP) folder
  7900. [firefox service drivers]
  7901. Filename=ssmss.exe
  7902. Confirmed=X
  7903. Description=Added by a variant of the <a href="http://vil.nai.com/vil/content/v_100454.htm" target=_blank>SDBOT</a> WORM!
  7904. [firefox startup drivers]
  7905. Filename=wuaclt.exe
  7906. Confirmed=X
  7907. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_RBOT.BYX&VSect=T" target=_blank>RBOT.BYX</a> WORM!
  7908. [firewall policy]
  7909. Filename=MidiDef32.exe
  7910. Confirmed=X
  7911. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojpiebota.html" target=_blank>PIEBOT-A</a> TROJAN!
  7912. [firewall sp2 system]
  7913. Filename=sys32Conf.exe
  7914. Confirmed=X
  7915. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotabt.html" target= blank>Rbot-ABT</a> WORM!
  7916. [firewall update system1]
  7917. Filename=WinedowsUpdater1.exe
  7918. Confirmed=X
  7919. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotaru.html" target=_blank>RBOT-ARU</a> WORM!
  7920. [firewall updater]
  7921. Filename=msnupdateit.exe
  7922. Confirmed=X
  7923. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotaaq.html" target=_blank>RBOT-AAQ</a> WORM!
  7924. [firewallstartup]
  7925. Filename=Firewallstartup.exe
  7926. Confirmed=U
  7927. Description=<a href="http://www.innovative-sol.com/products.htm#firewall" target=_blank>Innovative Startup Firewall</a> - "designed to protect your computer from programs that install themselves in the StartUp area of your Windows without asking for your approval. Innovative StartUp Firewall will help you keep your computer clean, fast and in itÆs best shape"
  7928. [firewallsvr]
  7929. Filename=FirewallSvr.exe
  7930. Confirmed=X
  7931. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.netsky.x@mm.html" target="_blank">NETSKY.X</a> or <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.netsky.y@mm.html" target="_blank">NETSKY.Y</a> WORMS!
  7932. [firewall_anti]
  7933. Filename=firewall_anti.exe
  7934. Confirmed=X
  7935. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojnetdenyb.html" target=_blank>NETDENY-B</a> TROJAN!
  7936. [firewire driver]
  7937. Filename=samx.exe
  7938. Confirmed=X
  7939. Description=Added by the <a href="http://www.symantec.com/avcenter/venc/data/backdoor.sdbot.ae.html" target=_blank>SDBOT.AE</a> WORM!
  7940. [firewire service]
  7941. Filename=nvscv32.exe
  7942. Confirmed=X
  7943. Description=Added by a variant of the <a href="http://vil.nai.com/vil/content/v_100454.htm" target=_blank>SDBOT</a> WORM!
  7944. [firewire services]
  7945. Filename=nvcsv32.exe
  7946. Confirmed=X
  7947. Description=Added by a variant of the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.spybot.worm.html" target= blank>SPYBOT</a> WORM!
  7948. [first home page]
  7949. Filename=http://find.naupoint.com
  7950. Confirmed=X
  7951. Description=<a href="http://www.spynet.com/spyware/spyware-NauPoint-Installer.aspx" target=_blank>Naupoint</a> browser hijacker
  7952. [fix]
  7953. Filename=WinFIX1.0.vbs
  7954. Confirmed=X
  7955. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/vbsgormleza.html" target=_blank>GORMLEZ-A</a> WORM!
  7956. [fix-it]
  7957. Filename=mxtask.exe
  7958. Confirmed=Y
  7959. Description=Part of Ontrack's Fix-it Utilities Suite. Loads a System Tray icon that lets you access the full program. Needed if you run the crash guard, intellicluster, anti-virus, or autoupdater. Otherwise not required
  7960. [fix-it av]
  7961. Filename=memcheck.exe
  7962. Confirmed=Y
  7963. Description=Part of Ontrack's Fix-it Utilities Suite anti-virus. Performs a quick check of memory for signs of any virus. Exits afterward and returns all resources used in one user's experience. Not required but could be left without a drain on resources
  7964. [fjmenu]
  7965. Filename=FjMenu.exe
  7966. Confirmed=U
  7967. Description=From the "Fujitsu Menu" tray icon you have instant access to the Control Panel, Tablet pc keyboard, Tablet and pen settings, Fujitsu display controls, brightness control, sounds and audio devices, capture screen, capture window, organize favorites, power options, printers and faxes, LCD brightness MIN, LCD brightness MAX, Enable/disable Button Panel and the Fujitsu menu settings, which are customizable
  7968. [fksysmon]
  7969. Filename=fksysmon.exe
  7970. Confirmed=N
  7971. Description=<a href="http://www.fkware.com/sysmon/index.html" target="_blank">fkWrae SysMon</a> - system monitor - "displays the current memory consumption, CPU and resource usage, date, time, Windows uptime, IP address and a lot more"
  7972. [flacpy]
  7973. Filename=flacpy.exe
  7974. Confirmed=X
  7975. Description=<a href="http://sarc.com/avcenter/venc/data/adware.flashenhancer.html" target=_blank>FlashEnhancer</a> adware variant
  7976. [flash32]
  7977. Filename=-flash32.exe
  7978. Confirmed=?
  7979. Description=<font color="#FF0000">??</font>
  7980. [flashenc]
  7981. Filename=FlashEnc.exe
  7982. Confirmed=U
  7983. Description=Supplied with EasyDisk USB pen devices. The utility manages the encryption and compressed folders options. It will create these folders if running on the USB key without permission, which is a pain. No need for it if you do not want these features
  7984. [flashget download manager]
  7985. Filename=Flashget.exe
  7986. Confirmed=X
  7987. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotagz.html" target=_blank>RBOT-AGZ</a> WORM!
  7988. [flencpy]
  7989. Filename=flencpy.exe
  7990. Confirmed=X
  7991. Description=<a href="http://sarc.com/avcenter/venc/data/adware.flashenhancer.html" target=_blank>FlashEnhancer</a> adware variant
  7992. [flexicd]
  7993. Filename=Flexicd.exe
  7994. Confirmed=U
  7995. Description=CD player - part of the <a href="http://www.microsoft.com/windows95/downloads/contents/WUToys/W95PwrToysSet/Default.asp" target="_blank">Win95 Power Toys</a>
  7996. [flmk08kb]
  7997. Filename=MMKEYBD.EXE
  7998. Confirmed=U
  7999. Description=Multimedia keyboard manager. Required if you use the additional keys
  8000. [flmoffice4dmouse]
  8001. Filename=moffice.exe
  8002. Confirmed=U
  8003. Description=Mouse properties for Logytech Typhoon Office Mouse
  8004. [flmtrustkb]
  8005. Filename=KbdAp32A.exe
  8006. Confirmed=?
  8007. Description=Keyboard utility for a Trust brand keyboard.<font color="#FF0000"> What does it do and is it required?</font>
  8008. [flmtrustmouse]
  8009. Filename=mouse32a.exe
  8010. Confirmed=U
  8011. Description=Mouse utility for a Trust brand mouse
  8012. [flncpy]
  8013. Filename=flncpy.exe
  8014. Confirmed=X
  8015. Description=<a href="http://sarc.com/avcenter/venc/data/adware.flashenhancer.html" target= blank>FlashEnhancer</a> adware variant
  8016. [floodnet]
  8017. Filename=FLooDeR.exe
  8018. Confirmed=X
  8019. Description=Added by of the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.endool.html" target="_blank">ENDOOL</a> TROJAN!
  8020. [floppy master]
  8021. Filename=[path to trojan]
  8022. Confirmed=X
  8023. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojzonitf.html" target=_blank>ZONIT-F</a> TROJAN!
  8024. [flow go tv]
  8025. Filename=flogotv.exe
  8026. Confirmed=?
  8027. Description=<font color="#FF0000">??</font>
  8028. [flps]
  8029. Filename=flps.vbs
  8030. Confirmed=X
  8031. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/vbs.bryon@mm.html" target="_blank">BYRON</a> WORM!
  8032. [flpycntl]
  8033. Filename=flpycntl.exe
  8034. Confirmed=X
  8035. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojcrypterc.html" target="_blank">CRYPTER.C</a> TROJAN!
  8036. [flsvci]
  8037. Filename=FLSVCI.exe
  8038. Confirmed=?
  8039. Description=<font color="#FF0000">??</font>
  8040. [fltprocess]
  8041. Filename=msinet.exe
  8042. Confirmed=Y
  8043. Description=Part of <a href="http://www.cyberpatrol.com/">Cyber Patrol</a> internet filtering software to restrict access to certain types of material on the internet. It can be disabled but do not ask how it's done
  8044. [flyswatdesktop]
  8045. Filename=flydesk.exe
  8046. Confirmed=X
  8047. Description=Advertising spyware
  8048. [fmctrltray]
  8049. Filename=Fmctrl.EXE
  8050. Confirmed=U
  8051. Description=Genius SM-Live Control Panel. Enhances audio output through Genius sound cards (makes a big difference and worth the 3MB Ram used)
  8052. [fmnwebassist]
  8053. Filename=fmnwebassist.exe
  8054. Confirmed=X
  8055. Description=Adware popup generator
  8056. [fmstart]
  8057. Filename=Fmstart.exe
  8058. Confirmed=U
  8059. Description=<a href="http://www.gfi.com/faxmaker/" target="_blank">GFI FAXmaker</a> - native fax connector for Microsoft Exchange Server or for networks, allows all users to send and receive faxes right from their desktop
  8060. [fmsz]
  8061. Filename=fmsz.exe
  8062. Confirmed=X
  8063. Description=Added by the <a href="http://www.pestpatrol.com/pestinfo/f/fmsz.asp" target="_blank">FMSZ</a> TROJAN!
  8064. [fnmwebassist]
  8065. Filename=fnmwebassist.exe
  8066. Confirmed=X
  8067. Description=<a href="http://doxdesk.com/parasite/WinPL.html" target=_blank>WinPL</a> adware
  8068. [focus]
  8069. Filename=Focus.exe
  8070. Confirmed=?
  8071. Description=<font color="#FF0000">ISDN configuration wizard?</font>
  8072. [folder service]
  8073. Filename=wssdtu.exe
  8074. Confirmed=X
  8075. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.manifest.trojan.html" target="_blank">MANIFEST</a> TROJAN!
  8076. [folder view]
  8077. Filename=folderview.exe
  8078. Confirmed=U
  8079. Description=<a href="http://www.folderview.com/folderview/" target=_blank>Folder View</a> enhances the Windows file Explorer by making all folders you need available in a single click
  8080. [folding@home]
  8081. Filename=WINFAH.EXE
  8082. Confirmed=N
  8083. Description=Folding@Home is a distributed computing project which studies protein folding, misfolding, aggregation, and related diseases - must be running in order to access the internet to upload to the servers. Available via Start -> Programs
  8084. [fonesyncsystemtray]
  8085. Filename=FoneSyncSystemTray.exe
  8086. Confirmed=N
  8087. Description=System Tray icon for Nokia FoneSync utility for the 7160/7190 mobiles. Useful to send data from/to the cell phone and the computer. You can use it to backup data or even to input data through the computer keyboard (which naturally is much more comfortable). Run manually when required
  8088. [fontfix]
  8089. Filename=fontfix.exe
  8090. Confirmed=X
  8091. Description=Added by an unidentified VIRUS, WORM or TROJAN!
  8092. [fontsloader]
  8093. Filename=ldfnt32.hta
  8094. Confirmed=X
  8095. Description=Unidentified malware
  8096. [fontview]
  8097. Filename=FONTVIEW.EXE
  8098. Confirmed=X
  8099. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_OPASERV.T" target="_blank">OPASERV.T</a> WORM!
  8100. [foobin lptt01]
  8101. Filename=adaware.exe
  8102. Confirmed=X
  8103. Description=<a href="http://www.wilderssecurity.net/specialinfo/rapidblaster.html" target="_blank">RapidBlaster</a> variant (in a "foo1" folder in Program Files). Recommended you use RapidBlaster Killer to uninstall - see <a ref="http://www.wilderssecurity.net/specialinfo/rapidblaster.html#removal" target="_blank"> here</a>
  8104. [foobin ml097e]
  8105. Filename=adaware.exe
  8106. Confirmed=X
  8107. Description=<a href="http://www.wilderssecurity.net/specialinfo/rapidblaster.html" target="_blank">RapidBlaster</a> variant (in a "foo1" folder in Program Files). Recommended you use RapidBlaster Killer to uninstall - see <a ref="http://www.wilderssecurity.net/specialinfo/rapidblaster.html#removal" target="_blank"> here</a>
  8108. [foolproof]
  8109. Filename=fpwinldr.exe
  8110. Confirmed=Y
  8111. Description=<a href="http://www.smartstuff.com/fps/fpsinfo.html" target="_blank">FoolProof Security</a> PC security software from SmartStuff
  8112. [foolproofsweep]
  8113. Filename=??
  8114. Confirmed=Y
  8115. Description=Part of <a href="http://www.smartstuff.com/fps/fpsinfo.html" target="_blank">FoolProof Security</a> PC security software from SmartStuff
  8116. [forbes]
  8117. Filename=ForbesAlerts.exe
  8118. Confirmed=N
  8119. Description=Forbes Business News Alerts - displays business news headlines in a little window on the screen
  8120. [forceshow]
  8121. Filename=rundll32.exe QaBar.dll, ForceShowBar
  8122. Confirmed=X
  8123. Description=<a href="http://research.sunbelt-software.com/threat_display.cfm?name=AdultLinks.QBar&threatid=10158&search=QAbar" target=_blank>AdultLinks.QBar</a> parasite related
  8124. [forget me not]
  8125. Filename=AGRemind.exe
  8126. Confirmed=N
  8127. Description=Calendar reminder part of <font color="#FF0000"><a href="http://www.broderbund.com/SubCategory.asp?CID=107" target="_blank">American Greetings?CreataCard?/a></font>
  8128. [fortis secure layer config]
  8129. Filename=cseinst.exe
  8130. Confirmed=U
  8131. Description=Fortis Bank Home Banking part. Installed during the installation of the software necessary to run the Home Banking. According to Fortis Bank this will not in any way be harmful to the system or relay system information
  8132. [fotostation easy autolaunch]
  8133. Filename=FotoStation Easy AutoLaunch.exe
  8134. Confirmed=N
  8135. Description=Installed with a Nikon digital camera. Used to collect photos uploaded from camera program NkVwMon.exe. If your camera is not connected (via USB port) you do not need this program loaded either
  8136. [foul px]
  8137. Filename=FoulPX.exe
  8138. Confirmed=U
  8139. Description=Foul PX, Optusnet usage stat checker
  8140. [fourthday]
  8141. Filename=FourthDay.exe
  8142. Confirmed=U
  8143. Description=<a href="http://www.starstonesoftware.com/fourthday.htm" target="_blank">The Fourth Day</a> - "astronomical clock and almanac for your system tray"
  8144. [foxrxjh]
  8145. Filename=foxrxjh.exe
  8146. Confirmed=X
  8147. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojgwghostt.html" target=_blank>GWGHOST-T</a> TROJAN!
  8148. [foxwudy9912]
  8149. Filename=service.exe
  8150. Confirmed=X
  8151. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojbancosbt.html" target= blank>BANCOS-BT</a> TROJAN!
  8152. [fp loader]
  8153. Filename=loadfp.exe
  8154. Confirmed=Y
  8155. Description=<a href="http://www.smartstuff.com/fps/fpsinfo.html" target="_blank">FoolProof Security</a> - PC security software from SmartStuff
  8156. [fpwgmwzd]
  8157. Filename=FPWGMWZD.exe
  8158. Confirmed=?
  8159. Description=<font color="#FF0000">??</font>
  8160. [fpx]
  8161. Filename=mnmsrvc.exe
  8162. Confirmed=N
  8163. Description=Remote Desktop Sharing service part of Microsoft's Netmeeting allowing users to share items on their screens across remote locations
  8164. [france]
  8165. Filename=svchost.exe
  8166. Confirmed=X
  8167. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.mimail.l@mm.html" target=_blank>MIMAIL.L</a> WORM! Note - this is not the legitimate <a href="http://www.liutilities.com/products/wintaskspro/processlibrary/svchost/" target=_blank>svchost.exe</a> process which is always located in the System (9x/Me) or System32 (NT/2K/XP) folder and should not normally figure in Msconfig/Startup! This file is located in the Winnt or Windows folder
  8168. [fraps]
  8169. Filename=fraps.exe
  8170. Confirmed=U
  8171. Description=Fraps Real-Time Video Capture software
  8172. [free download manager]
  8173. Filename=fdm.exe
  8174. Confirmed=N
  8175. Description="Free Download Manager" - see <a href="http://www.freedownloadmanager.org/" target="_blank">here</a>
  8176. [free downloads monitor]
  8177. Filename=fdcmon.exe
  8178. Confirmed=?
  8179. Description=<font color="#FF0000">??</font>
  8180. [free ram optimizer]
  8181. Filename=fro.exe
  8182. Confirmed=U
  8183. Description=<a href="http://www.acelogix.com/freeware.html" target=_blank>Free Ram Optimizer</a> monitors your memory, and frees up ram if it falls below a certain minimum. MS MVPs (Most Valued Professional) recommend not using memory managers with Win98/ME. See <a href="http://www.aumha.org/a/memmgmt.htm" target="_blank">this</a> article and make up your own mind
  8184. [freedom]
  8185. Filename=Freedom.exe
  8186. Confirmed=Y
  8187. Description=Zero Knowledge <a href="http://www.freedom.net/" target="_blank">Freedom</a> - Anti-Virus, Personal Firewall and Parental Control, it also blocks ads, safeguards your personal information, encrypts your passwords, and much more
  8188. [freemem pro]
  8189. Filename=FMEMPRO.EXE
  8190. Confirmed=U
  8191. Description=FreeMem Pro - memory optimizer. MS MVPs (Most Valued Professional) recommend not using memory managers with Win98/SE/ME. See <a href="http://www.aumha.org/a/memmgmt.htm" target="_blank">this</a> article and make up your own mind
  8192. [freememvn2]
  8193. Filename=FreeMem.exe
  8194. Confirmed=U
  8195. Description=FreeMem - memory optimizer. MS MVPs (Most Valued Professional) recommend not using memory managers with Win98/SE/ME. See <a href="http://www.aumha.org/a/memmgmt.htm" target="_blank">this</a> article and make up your own mind
  8196. [freemp3download]
  8197. Filename=rundll32.exe MSA64CHK.dll, DllMostrar
  8198. Confirmed=X
  8199. Description=<a href="http://research.sunbelt-software.com/threat_display.cfm?name=MatrixDialer&threatid=14914&search=MatrixDialer" target=_blank>MatrixDialer</a> related
  8200. [freeram xp]
  8201. Filename=FreeRAM XP Pro *.exe
  8202. Confirmed=U
  8203. Description=<a href="http://www.yourwaresolutions.com/software.html#framxpro" target="_blank">FreeRAM XP Pro</a> - memory optimizer where * represents the version. MS MVPs (Most Valued Professional) recommend not using memory managers with Win98/SE/ME. See <a href="http://www.aumha.org/a/memmgmt.htm" target="_blank">this</a> article and make up your own mind
  8204. [freestyle]
  8205. Filename=lockx.exe
  8206. Confirmed=X
  8207. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotath.html" target=_blank>RBOT-ATH</a> WORM!
  8208. [freesurfer]
  8209. Filename=fs20.exe
  8210. Confirmed=U
  8211. Description=<a href="http://www.kolumbus.fi/eero.muhonen/FS/" target="_blank">EMS Free Surfer mk II</a> - pop-up stopper
  8212. [fresh desktop]
  8213. Filename=freshdesktop.exe
  8214. Confirmed=U
  8215. Description=<a href="http://www.softcows.com/fresh_desktop.htm" target=_blank>Fresh Desktop</a> is a utility that lets you manage vast collections of wallpapers for your desktop with ease. When run on bootup it changes the desktop wallpaper at startup or at specified intervals
  8216. [freshclam]
  8217. Filename=freshclam.exe
  8218. Confirmed=N
  8219. Description=Auto update agent of the open source <a href="http://www.clamwin.com/" target=_blank>Clamwin</a> virus scanner
  8220. [frguk]
  8221. Filename=shdrkmck.exe
  8222. Confirmed=?
  8223. Description=<font color="#FF0000">??</font>
  8224. [fridaysinhellinstaller]
  8225. Filename=FridaysInHellInstaller.exe
  8226. Confirmed=?
  8227. Description=<font color="#FF0000">??</font>
  8228. [friendlytype]
  8229. Filename=lsass.exe
  8230. Confirmed=X
  8231. Description=Added by the <a href="http://www.symantec.com/avcenter/venc/data/trojan.webus.b.html" target=_blank>WEBUS.B</a> TROJAN! Note - this is not the legitimate <a href="http://www.liutilities.com/products/wintaskspro/processlibrary/lsass/" target=_blank>lsass.exe</a> process which is always located in the System (9x/Me) or System32 (NT/2K/XP) folder and should not normally figure in Msconfig/Startup! This file is located in the System folder
  8232. [friendlywebquick-launch]
  8233. Filename=SELFCERT.EXE
  8234. Confirmed=N
  8235. Description=selfcert.exe is a stand alone program for creating your own digital certificates for macros - the .exe is installed as an extra basically by clicking on MS Office in add/remove programs and selecting remove - also I would do away with the FriendlyWebQuickLaunchBar as well
  8236. [frisk fp-scheduler]
  8237. Filename=F-Sched.exe
  8238. Confirmed=U
  8239. Description=Scheduler for <a href="http://www.f-prot.com/" target="_blank"> F-Prot</a> anitvirus software. Leave enabled unless you scan manually on a regular basis
  8240. [fritz!dsl startcenter]
  8241. Filename=StCenter.exe
  8242. Confirmed=?
  8243. Description=FRITZ! ISP software "StartCenter" User interface that allows you to manage, tweak and diagnose many aspects of your internet connection - <font color="#FF0000">is it required?</font>
  8244. [fritz!webprotect]
  8245. Filename=FwebProt.exe
  8246. Confirmed=U
  8247. Description=Firewall included in FRITZ! ISP DSL software
  8248. [fromine winpopup]
  8249. Filename=winpopup.exe
  8250. Confirmed=N
  8251. Description=Instant Messenger program
  8252. [frsk]
  8253. Filename=frsk.exe
  8254. Confirmed=X
  8255. Description=Unidentified adware downloader trojan
  8256. [frw_exe]
  8257. Filename=FRW.EXE
  8258. Confirmed=Y
  8259. Description=<a href="http://www.claymania.com/rate-conseal.html" target="_blank">ConSeal Signal9</a> firewall - now McAfee Personal firewall
  8260. [frxmxins]
  8261. Filename=frxmxins.exe
  8262. Confirmed=Y
  8263. Description=ATI 3D Studio MAX/VIZ driver
  8264. [fs agent]
  8265. Filename=fagent.exe
  8266. Confirmed=X
  8267. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojvolverb.html" target=_blank>VOLVER-B</a> TROJAN!
  8268. [fsaa]
  8269. Filename=fsaa.exe
  8270. Confirmed=Y
  8271. Description=<a href="http://www.f-secure.com/products/anti-virus/fsav2005/" target=_blank>F-Secure</a> antivirus Authentication Agent - creates and stores private keys used by a client to access servers
  8272. [fscboss]
  8273. Filename=FSCBoss.exe
  8274. Confirmed=N
  8275. Description=<a href="http://freestorenow.com/dollardriven/makingmoney.html" target=_blank>Free Store Club</a> shop online software
  8276. [fsdpsrv]
  8277. Filename=FSDPSRV.exe
  8278. Confirmed=?
  8279. Description=<font color="#FF0000">??</font>
  8280. [fsh]
  8281. Filename=svcnva.exe
  8282. Confirmed=X
  8283. Description=Malware, detected by <a href="http://www.ewido.net/en/" target=_blank>Ewido Security Suite</a> as TrojanDownloader.Delf.ks
  8284. [fsp]
  8285. Filename=fsp.exe
  8286. Confirmed=U
  8287. Description=<a href="http://www.baxbex.com/foldershield.html" target="_blank">Folder Shield</a> - hide entire directories and thus prevent access by anyone else to your personal files and documents
  8288. [fspr]
  8289. Filename=FolderShield.exe
  8290. Confirmed=Y
  8291. Description=<a href="http://www.baxbex.de/foldershield.html" target="_blank">Folder Shield</a> - hide personal files and folders
  8292. [fsscrctl]
  8293. Filename=FSScrCtl.exe
  8294. Confirmed=N
  8295. Description=Screen saver control applet used by the "Stardust Screen Saver Toolkit" and "SolidWorks Screen Saver"
  8296. [fsserv]
  8297. Filename=fserv.exe
  8298. Confirmed=U
  8299. Description=<a target="_blank" href="http://www.bysoft.se/sureshot/farsighter/manual.html">Farsighter Server</a> - monitors a remote computer invisibly by streaming video to a viewer on your computer. You will know exactly what is happening on the remote computer as you see it in real-time
  8300. [fsw]
  8301. Filename=FSW.exe
  8302. Confirmed=X
  8303. Description=<a href="http://research.sunbelt-software.com/threat_display.cfm?name=FreeScratchAndWin&threatid=5475&search=FreeScratchAndWin" target=_blank>FreeScratchAndWin</a> parasite
  8304. [fswebserver]
  8305. Filename=fsws.exe
  8306. Confirmed=U
  8307. Description=<a href="http://www.sharing-file.com/" target=_blank>Easy File Sharing Web Server</a> is a Windows program that allows you to host a secure peer-to-peer and web-based file sharing system without any additional software or services
  8308. [ftmsflt(usb)]
  8309. Filename=FTMSFLTU.EXE
  8310. Confirmed=U
  8311. Description=Fujitsu's Touch Panel Message Notifier
  8312. [ftp for windows]
  8313. Filename=ftpwin32.exe
  8314. Confirmed=X
  8315. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  8316. [ftpgraber]
  8317. Filename=FTPGraber.exe
  8318. Confirmed=X
  8319. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojdloaderdt.html" target=_blank>DLOADER-DT</a> TROJAN!
  8320. [ftpmanager]
  8321. Filename=FTPDM.exe
  8322. Confirmed=N
  8323. Description="<a href="http://www.robust.ws/ftpdm.html" target=_blank>Robust FTP</a> is a Windows-based file transfer client application that transfers files between a userÆs local PC and another, remote computer system connected via a modem and telephone lines or by a local-area network (with upload transfer resume and download transfer resume)". Can be started manually
  8324. [ftpqueue]
  8325. Filename=Ftpsched.exe
  8326. Confirmed=U
  8327. Description=Part of <a href="http://www.ipswitch.com/Products/WS_FTP/" target="_blank">WS_FTP Pro</a> from Ipswitch. Queueing facility for scheduling FTP transfers
  8328. [fujitsu menu]
  8329. Filename=FjMnuIco.exe
  8330. Confirmed=U
  8331. Description=From the "Fujitsu Menu" tray icon you have instant access to the Control Panel, Tablet pc keyboard, Tablet and pen settings, Fujitsu display controls, brightness control, sounds and audio devices, capture screen, capture window, organize favorites, power options, printers and faxes, LCD brightness MIN, LCD brightness MAX, Enable/disable Button Panel and the Fujitsu menu settings, which are customizable
  8332. [fukerservice]
  8333. Filename=fukerz.exe
  8334. Confirmed=X
  8335. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target="_blank">RBOT</a> WORM!
  8336. [fuklbar]
  8337. Filename=bar.exe
  8338. Confirmed=X
  8339. Description=<a href="http://research.sunbelt-software.com/threat_display.cfm?name=ClickSpring.PuritySCAN&threatid=10115" target=_blank>PurityScan/Clickspring</a> adware
  8340. [fvek]
  8341. Filename=fvek.exe
  8342. Confirmed=X
  8343. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojdrivola.html" target=_blank>DRIVOL-A</a> TROJAN!
  8344. [fwdmon.exe]
  8345. Filename=fwdmon.exe
  8346. Confirmed=X
  8347. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojproxys.html" target=_blank>PROXY-S</a> TROJAN!
  8348. [fwenc.exe]
  8349. Filename=fwenc.exe
  8350. Confirmed=Y
  8351. Description=<a target="_blank" href="http://www.checkpoint.com/products/protect/vpn-1_srsc.html">Check Point SecuRemote VPN client</a> - "dynamic and fixed IP addressing for all ISP services - dial-up, cable modem, or DSL - the ideal solution for telecommuters and mobile workers"
  8352. [fwr command module]
  8353. Filename=fwr.exe
  8354. Confirmed=X
  8355. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32sdbotpp.html" target="_blank">SDBOT-PP</a> WORM!
  8356. [fwrastrc]
  8357. Filename=fwrastrc.exe
  8358. Confirmed=N
  8359. Description=Dial-up software for Friendly Technologies/1NationOnLine free ISP
  8360. [fwservice]
  8361. Filename=fwservice
  8362. Confirmed=N
  8363. Description=eAcceleration Stop-Sign related - not recommended, see <a href="http://www.spywarewarrior.com/rogue_anti-spyware.htm#ss_note" target="_blank">note</a>
  8364. [fx]
  8365. Filename=ieloader.exe
  8366. Confirmed=X
  8367. Description=Added by the SMALL.RR TROJAN!
  8368. [fxredir]
  8369. Filename=fxredir.exe
  8370. Confirmed=U
  8371. Description=Canon MultiPASS fax redirector
  8372. [f~a]
  8373. Filename=ra32.exe
  8374. Confirmed=X
  8375. Description=Added by the <a href="http://us.mcafee.com/virusInfo/default.asp?id=description&virus_k=101037&affid=125" target=_blank>CAY</a> TROJAN!
  8376. [g.exe]
  8377. Filename=g.exe
  8378. Confirmed=X
  8379. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.graybird.q.html" target=_blank>GRAYBIRD.Q</a> TROJAN!
  8380. [g00123]
  8381. Filename=[worm filename]
  8382. Confirmed=X
  8383. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.bugbros@mm.html" target="_blank">BUGBROS</a> WORM!
  8384. [g0mez]
  8385. Filename=G0mez.vbs
  8386. Confirmed=X
  8387. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/vbsgormleza.html" target=_blank>GORMLEZ-A</a> WORM!
  8388. [g3]
  8389. Filename=GSMedia3.exe
  8390. Confirmed=X
  8391. Description=Malware downloader - detected by <a href="http://www.kaspersky.com/personalpro" target=_blank>Kaspersky</a> antivirus as Trojan.Win32.VB.ux
  8392. [g3dctl]
  8393. Filename=g3dctl.exe
  8394. Confirmed=?
  8395. Description=<font color="#FF0000">??</font>
  8396. [gadu-gadu]
  8397. Filename=gg.exe
  8398. Confirmed=N
  8399. Description=Polish language Instant Messaging client
  8400. [gadwin printscreen]
  8401. Filename=PrintScreen.exe
  8402. Confirmed=N
  8403. Description=Gadwin <a href="http://www.gadwin.com/printscreen/" target="_blank">PrintScreen</a> - utility to capture, print or save the current window
  8404. [gaelicum.exe]
  8405. Filename=GAELICUM.EXE
  8406. Confirmed=X
  8407. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojpentaa.html" target=_blank>PENTA-A</a> TROJAN!
  8408. [gah95on6]
  8409. Filename=gah95on6.exe
  8410. Confirmed=X
  8411. Description=<a href="http://www3.ca.com/securityadvisor/pest/pest.aspx?id=453076082" target=_blank>ShopAtHome/SAHagent</a> adware
  8412. [gaim]
  8413. Filename=gaim.exe
  8414. Confirmed=U
  8415. Description=<a href="http://gaim.sourceforge.net/" target=_blank>Gaim</a> is an instant messenger client with capability to connect to AIM, ICQ, MSN Messenger, Yahoo, IRC, Jabber, Gadu-Gadu and Zephyr networks
  8416. [gainward]
  8417. Filename=TBPanel.exe
  8418. Confirmed=U
  8419. Description=Configuration utility for Gainward graphics cards. Not required unless you use non-default settings. Available via Start -> Settings -> Control Panel
  8420. [game]
  8421. Filename=shit.exe
  8422. Confirmed=X
  8423. Description=Added by the Netclap Gold backdoor TROJAN!
  8424. [game device]
  8425. Filename=JOYUPDRV.EXE
  8426. Confirmed=N
  8427. Description=Genius game controller profile activator
  8428. [games toolbar]
  8429. Filename=rundll32.exe [path] tbGame.dll, DllShowTB
  8430. Confirmed=X
  8431. Description=Topconverting.com\180Search "Games Toolbar" adware
  8432. [gamespot]
  8433. Filename=kontiki.exe
  8434. Confirmed=N
  8435. Description=<a href="http://help.kontiki.com/enduser/group.jsp;jsessionid=2C47C896EA1784C5321FD3E6845E8157?node=2846" target="_blank">Kontiki Delivery Manager</a> - Windows-based client software that enables secure delivery of content to users' desktops
  8436. [gameutil.exe]
  8437. Filename=gameutil.exe
  8438. Confirmed=U
  8439. Description=Part of Redline RegTweak as supplied with Sapphire ATI graphics cards. You can configure different overlclocking settings on a per game basis and this sets those conditions following a re-boot
  8440. [gammahotkeys]
  8441. Filename=setgamma.exe
  8442. Confirmed=U
  8443. Description=Part of the <a href="http://radeontweaker.sourceforge.net/" target="_blank">RadeonTweaker</a> program for adjusting ATI Radeon graphics cards. Allows you to adjust the gamma (or brightness) when playing a full-screen game without switching back to the desktop
  8444. [gasrv]
  8445. Filename=gaSrv.exe
  8446. Confirmed=X
  8447. Description=Adware downloader, identified by <a href="http://www.pandasoftware.com/home/default.asp" target=_blank>Panda</a> antivirus as Trojan.Downloader.ALQ
  8448. [gasrve]
  8449. Filename=gaSrve.exe
  8450. Confirmed=X
  8451. Description=Adware downloader, identified by <a href="http://www.pandasoftware.com/home/default.asp" target= blank>Panda</a> antivirus as Trj/Downloader.ALQ
  8452. [gate personal firewall]
  8453. Filename=Systpl.exe
  8454. Confirmed=X
  8455. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_RBOT.ADC&VSect=P" target=_blank>RBOT.ADC</a> WORM
  8456. [gator]
  8457. Filename=gator.exe
  8458. Confirmed=X
  8459. Description=<a href="http://www.doxdesk.com/parasite/Gator.html" target=_blank>Gator</a> eWallet - also see <a href="http://www.symantec.com/avcenter/venc/data/adware.gatorewallet.html" target=_blank>here</a>
  8460. [gator ewallet]
  8461. Filename=gator.exe
  8462. Confirmed=X
  8463. Description=<a href="http://www.gator.com/about/" target="_blank">Gator eWallet</a> from The Gator Corporation. Spyware - see <a href="http://www.pchell.com/support/gator.shtml" target="_blank">here</a> for removal instructions
  8464. [gazeldisplay]
  8465. Filename=gsyno.exe
  8466. Confirmed=U
  8467. Description=<a href="http://www.bt.com/homehighway/more_info.htm">BT Digital Access USB</a> - Gazel ISDN installation System Tray icon
  8468. [gbtray]
  8469. Filename=GBTray.exe
  8470. Confirmed=U
  8471. Description=System Tray icon access to Roxio's (nee Adaptec) <a href="http://www.roxio.com/en/products/goback/index.jhtml"> GoBack</a> software which allows you to revert back to a previously working state on you hard drive if you install a new program and your system goes faulty - performing the same functions with extra features as System Restore on WinMe/XP systems. Disable before running Scandisk or Defrag. Not required for WinMe/XP users, recommended for Win9x/NT/2K users
  8472. [gcasdtserv]
  8473. Filename=gcasDtServ.exe
  8474. Confirmed=X
  8475. Description=Added by an unidentified WORM or TROJAN. Note - this is not related to Microsoft Antispyware which has a process bearing the same name which doesnÆt appear as a startup
  8476. [gcc reminder]
  8477. Filename=gccrem.exe
  8478. Confirmed=?
  8479. Description=Associated with <a href="http://www.arcamax.com/products/oem/ogccreator.htm" target="_blank">AcraMax Greeting Card Creator</a>. <font color="#FF0000">Is it a registration reminder?</font>
  8480. [gcs]
  8481. Filename=GrabClipSave.exe
  8482. Confirmed=N
  8483. Description=<a href="http://www.boumchalak.net/Tools/GCS/gcs.html" target="_blank">GrabClipSave</a> screen capture tool
  8484. [gdax]
  8485. Filename=[path to backdoor]
  8486. Confirmed=X
  8487. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.ranky.k.html" target=_blank>RANKY.K</a> TROJAN!
  8488. [gdien32]
  8489. Filename=gdien32.exe
  8490. Confirmed=X
  8491. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojsingup.html" target=_blank>SINGU-P</a> TROJAN!
  8492. [gdmgr.exe]
  8493. Filename=gdmgr.exe
  8494. Confirmed=U
  8495. Description=<a href="http://securityresponse.symantec.com/avcenter/venc/data/spyware.guardmon.html" target=_blank>GuardMon</a> is a commercial surveillance software program designed to monitor all forms of user activity on a computer
  8496. [gdrive]
  8497. Filename=GDriver.exe
  8498. Confirmed=N
  8499. Description=Found on IBM systems. All it does is set the CDROM drive letter to G:. Set your drive letter manually via Start -> Settings -> Control Panel -> System -> Device Manager
  8500. [gearbox]
  8501. Filename=confsvr.exe
  8502. Confirmed=N
  8503. Description=NTL's Gearbox software for configuring internet connections with their NTLWorld software - does a similar job to the Internet Connection Wizard which can be used instead using the dial-up details available <a href="http://www.ntlworld.com/help/settings.htm" target="_blank">here</a>
  8504. [gearsec]
  8505. Filename=gearsec.exe
  8506. Confirmed=N
  8507. Description=Installed by Apple Quicktime package - iPod/iTunes CDRW support. Can be disabled if you only require Quicktime player
  8508. [gedzac]
  8509. Filename=GEDZAC.exe
  8510. Confirmed=X
  8511. Description=Added by the <a href="http://www.symantec.com/avcenter/venc/data/w32.hllw.gemel.html" target="_blank">GEMEL</a> WORM!
  8512. [gemstrmw]
  8513. Filename=GemStRmW.exe
  8514. Confirmed=N
  8515. Description=For a GemPlus smart card reader. If it doesn't start automatically when you insert the smart card, start it manually
  8516. [gene usb monitor]
  8517. Filename=USBMonit.exe
  8518. Confirmed=U
  8519. Description=Monitors USB ports for insertion of Sandisk USB flashdrives
  8520. [general lptt01]
  8521. Filename=general.exe
  8522. Confirmed=X
  8523. Description=<a href="http://www.wilderssecurity.net/specialinfo/rapidblaster.html" target="_blank">RapidBlaster</a> variant (in a "General" folder in Program Files). Recommended you use RapidBlaster Killer to uninstall - see <a ref="http://www.wilderssecurity.net/specialinfo/rapidblaster.html#removal" target="_blank"> here</a>
  8524. [general ml097e]
  8525. Filename=general.exe
  8526. Confirmed=X
  8527. Description=<a href="http://www.wilderssecurity.net/specialinfo/rapidblaster.html" target="_blank">RapidBlaster</a> variant (in a "General" folder in Program Files). Recommended you use RapidBlaster Killer to uninstall - see <a ref="http://www.wilderssecurity.net/specialinfo/rapidblaster.html#removal" target="_blank"> here</a>
  8528. [generic host proccess for windows]
  8529. Filename=SVCHOSTS.EXE
  8530. Confirmed=X
  8531. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32spybotgq.html" target= blank>SPYBOT-GQ</a> WORM!
  8532. [generic host process2 system backup]
  8533. Filename=scvhost2.exe
  8534. Confirmed=X
  8535. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotbah.html" target=_blank>RBOT-BAH</a> WORM!
  8536. [generic host process326a system backup]
  8537. Filename=scvhost326a.exe
  8538. Confirmed=X
  8539. Description=Added by a variant of the <a href="http://vil.nai.com/vil/content/v_100454.htm" target=_blank>SDBOT</a> WORM!
  8540. [generic host service]
  8541. Filename=lshost.exe
  8542. Confirmed=X
  8543. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_RBOT.LU&VSect=T" target="_blank">RBOT.LU</a> WORM!
  8544. [generic services process]
  8545. Filename=regsvc32.exe
  8546. Confirmed=X
  8547. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.gaobot.sy.html" target="_blank">GAOBOT.SY</a> WORM!
  8548. [genie usb monitor]
  8549. Filename=USBmonitor.exe
  8550. Confirmed=Y
  8551. Description=Port monitor for an external USB hard drive. Required to enable access to the drive
  8552. [geography tx 1.0 nt]
  8553. Filename=CompuSpeed.vbs
  8554. Confirmed=X
  8555. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/vbsnewleya.html" target= blank>NEWLEY-A</a> WORM!
  8556. [gerenciamento de arquivos do windows]
  8557. Filename=Winmod32.exe
  8558. Confirmed=X
  8559. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojdloaderwg.html" target=_blank>DLOADER-WG</a> TROJAN!
  8560. [gestionnaire de disques universel]
  8561. Filename=sysoobe.exe
  8562. Confirmed=X
  8563. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojtoadera.html" target=_blank>TOADER-A</a> TROJAN!
  8564. [get smile]
  8565. Filename=getsmile.exe
  8566. Confirmed=N
  8567. Description=Puts smilie faces in your E-mail. Run manually when required
  8568. [getright tray icon]
  8569. Filename=GETRIGHT.EXE
  8570. Confirmed=N
  8571. Description=GetRight from Headlight Software - download manager for resuming downloads and choosing multiple download locations. The freeware version is/was spyware. The registered version isn't if you don't install the Aureate/Radiate software. Available via Start -> Programs
  8572. [getthemusic]
  8573. Filename=rundll32.exe MSA64CHK.dll, DllMostrar
  8574. Confirmed=X
  8575. Description=<a href="http://research.sunbelt-software.com/threat_display.cfm?name=MatrixDialer&threatid=14914&search=MatrixDialer" target=_blank>MatrixDialer</a> related
  8576. [getwin]
  8577. Filename=winB_.exe
  8578. Confirmed=X
  8579. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojbankerhs.html" target=_blank>BANKER-HS</a> TROJAN!
  8580. [ghoststartservice]
  8581. Filename=GhostStartService.exe
  8582. Confirmed=N
  8583. Description=Required to run the Windows based wizard in <a href="http://www.symantec.com/sabu/ghost/ghost_personal/" target="_blank">Norton Ghost</a> - added from the 2003 version. Will start automatically when you run the wizard
  8584. [ghoststarttrayapp]
  8585. Filename=GhostStartTrayApp.exe
  8586. Confirmed=N
  8587. Description=System Tray access to <a href="http://www.symantec.com/sabu/ghost/ghost_personal/" target="_blank">Norton Ghost</a> - added from the 2003 version
  8588. [ghostsurfdelsatellite]
  8589. Filename=DeleteSatellite.exe
  8590. Confirmed=?
  8591. Description=<a href="http://www.tenebril.com/products/ghostsurf/spycatcher.html" target=_blank>SpyCatcher</a> spyware remover related. <font color="#FF0000">What does it do and is it required?</font>
  8592. [gigabit.exe]
  8593. Filename=gigabit.exe
  8594. Confirmed=X
  8595. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.beagle.u@mm.html" target="_blank">BEAGLE.U</a> WORM!
  8596. [gigabyte]
  8597. Filename=Cheatle.exe
  8598. Confirmed=X
  8599. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.hllp.shodi.b.html" target="_blank">SHODI.B</a> VIRUS!
  8600. [gilat som enumerator]
  8601. Filename=dllhost.exe
  8602. Confirmed=Y
  8603. Description=For Gilat Communications internet satellite systems - associated with SkyBlaster modem. Required if you have this system
  8604. [gilatftc]
  8605. Filename=ftc.exe
  8606. Confirmed=Y
  8607. Description=For Gilat Communications internet satellite systems - associated with SkyBlaster modem. Required if you have this system
  8608. [ginadll]
  8609. Filename=ntgina.dll
  8610. Confirmed=X
  8611. Description=Added by the <a href="http://uk.trendmicro-europe.com/enterprise/security_info/ve_detail.php?VName=WORM_ANIG.A" target="_blank">ANIG.A</a> WORM!
  8612. [gisdnlog]
  8613. Filename=gisdnlog.exe
  8614. Confirmed=?
  8615. Description=<a href="http://www.bt.com/homehighway/more_info.htm">BT Digital Access USB</a>
  8616. [glass2k]
  8617. Filename=Glass2k.exe
  8618. Confirmed=U
  8619. Description="<a href="http://www.chime.tv/products/glass2k.shtml" target="_blank">Glass2k</a> is a small little program that allows Win2K/XP users to make any window transparent"
  8620. [glf network lan monitor]
  8621. Filename=NPFMNTOR.exe
  8622. Confirmed=X
  8623. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotagy.html" target=_blank>RBOT-AGY</a> WORM!
  8624. [glide]
  8625. Filename=Glidew32.exe
  8626. Confirmed=Y
  8627. Description=<a href="http://www.cirque.com/products/touchpads.html" target="_blank">Cirque</a> touchpad driver
  8628. [global startup]
  8629. Filename=WinDash.EXE
  8630. Confirmed=X
  8631. Description=Reported by Kaspersky Anti-Virus as IM-Worm.Win32.VB.q, may be related to the <a href="http://www.sophos.co.uk/virusinfo/analyses/w32attechc.html" target=_blank>ATTECH-C</a> WORM!
  8632. [globalscape]
  8633. Filename=[random filename]
  8634. Confirmed=X
  8635. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotaym.html" target=_blank>RBOT-AYM</a> WORM!
  8636. [glsett32]
  8637. Filename=smsiexec.exe
  8638. Confirmed=X
  8639. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojoptixd.html" target=_blank>OPTIX-D</a> TROJAN!
  8640. [gluon]
  8641. Filename=gluon.exe
  8642. Confirmed=?
  8643. Description=<font color="#FF0000">In a gluon/bin sub-directory</font>
  8644. [glv]
  8645. Filename=glv.exe
  8646. Confirmed=X
  8647. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojdloaderng.html" target= blank>DLOADER-NG</a> TROJAN!
  8648. [gmouse]
  8649. Filename=Gmouse.exe
  8650. Confirmed=Y
  8651. Description=Amouse mouse driver - required if you use non-standard Windows driver features
  8652. [gnetmous]
  8653. Filename=gnetmous.exe
  8654. Confirmed=U
  8655. Description=<a href="http://www.geniusnet.com.tw/product/mouse/netscroll+.htm" target="_blank">Genius NetScroll+</a> mouse driver - required if you use non-standard Windows driver features
  8656. [gnub]
  8657. Filename=gnub.exe
  8658. Confirmed=?
  8659. Description=<font color="#FF0000">??</font>
  8660. [go!zilla]
  8661. Filename=gozilla.exe
  8662. Confirmed=X
  8663. Description=Download manager for resuming downloads and choosing multiple download locations. Advertising spyware
  8664. [go!zilla monster downloads]
  8665. Filename=Go.exe
  8666. Confirmed=X
  8667. Description=Download manager for resuming downloads and choosing multiple download locations. Advertising spyware
  8668. [goback polling service]
  8669. Filename=GBPoll.exe
  8670. Confirmed=U
  8671. Description=Roxio's (nee Adaptec) <a href="http://www.roxio.com/en/products/goback/index.jhtml"> GoBack</a> software which allows you to revert back to a previously working state on you hard drive if you install a new program and your system goes faulty - performing the same functions with extra features as System Restore on WinMe/XP systems. Disable before running Scandisk or Defrag. Not required for WinMe/XP users, recommended for Win9x/NT/2K users
  8672. [goback tray icon]
  8673. Filename=GBTray.exe
  8674. Confirmed=U
  8675. Description=System Tray icon access to Roxio's (nee Adaptec) <a href="http://www.roxio.com/en/products/goback/index.jhtml"> GoBack</a> software which allows you to revert back to a previously working state on you hard drive if you install a new program and your system goes faulty - performing the same functions with extra features as System Restore on WinMe/XP systems. Disable before running Scandisk or Defrag. Not required for WinMe/XP users, recommended for Win9x/NT/2K users
  8676. [gog]
  8677. Filename=GOG.exe
  8678. Confirmed=X
  8679. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.hllp.philis.b.html" target="_blank">PHILIS.B</a> VIRUS!
  8680. [goidr]
  8681. Filename=goidr.exe
  8682. Confirmed=X
  8683. Description=<a href="http://www.symantec.com/avcenter/venc/data/spyware.goidr.html" target= blank>Goidr</a> adware
  8684. [goldensoft_mndlsvr]
  8685. Filename=MndlSvr.exe
  8686. Confirmed=U
  8687. Description=Goldensoft CD Ghost related - turns a computer into a 200X-speed CD-ROM tower. Working from the hard drive, users can simultaneously access as many as 23 virtual CD-ROM drives at a speed of 200X for true multitasking
  8688. [golum]
  8689. Filename=services.exe
  8690. Confirmed=X
  8691. Description=Added by the GOLUM.A TROJAN! Note - this is not the legitimate <a href="http://www.liutilities.com/products/wintaskspro/processlibrary/services/" target="_blank">services.exe</a> process, which should not appear in Msconfig/Startup!
  8692. [golumm]
  8693. Filename=services.exe
  8694. Confirmed=X
  8695. Description=<a href="http://cwshredder.net/cwshredder/cwschronicles.html" target=_blank>CoolWebSearch</a> parasite variant - also detected as the <a href="http://www.sophos.com/virusinfo/analyses/trojdloaderet.html" target= blank>DLOADER-ET</a> TROJAN! Note - this is not the legitimate <a href="http://www.liutilities.com/products/wintaskspro/processlibrary/services/" target=_blank>services.exe</a> process, which should not appear in Msconfig/Startup!
  8696. [google]
  8697. Filename=google.exe
  8698. Confirmed=X
  8699. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotamw.html" target=_blank>RBOT-AMW</a> WORM!
  8700. [google desktop search]
  8701. Filename=GoogleDesktop.exe
  8702. Confirmed=N
  8703. Description=<a href="http://desktop.google.com/about.html" target=_blank>Google Desktop Search</a> - "a desktop search application that provides full text search over your email, computer files, chats, and the web pages you've viewed. By making your computer searchable, Google Desktop Search puts your information easily within your reach and frees you from having to manually organize your files, emails, and bookmarks"
  8704. [google earth]
  8705. Filename=[random filename]
  8706. Confirmed=X
  8707. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotaxk.html" target=_blank>RBOT-AXK</a> TROJAN!
  8708. [google earth viewer]
  8709. Filename=GOOGLEMAPS.EXE
  8710. Confirmed=N
  8711. Description=<a href="http://earth.google.com/" target=_blank>Google Earth</a> "combines satellite imagery, maps and the power of Google Search to put the world's geographic information at your fingertips"
  8712. [google intrenet explorer]
  8713. Filename=google.pif
  8714. Confirmed=X
  8715. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotara.html" target=_blank>RBOT-ARA</a> WORM!
  8716. [google toolbar]
  8717. Filename=ggtb32.exe
  8718. Confirmed=X
  8719. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32agobotrr.html" target= blank>AGOBOT-RR</a> WORM!
  8720. [googledcclient]
  8721. Filename=GoogleDCC.exe
  8722. Confirmed=N
  8723. Description=<a target="_blank" href="http://toolbar.google.com/dc/faq_dc.html#about1">Google Compute Client</a> - only present if you installed the Google Toolbar with "Google Compute" client active. Does complex calculations in the background when idle. If you want to turn it off go to your browser, click on the little double-helix on the Google Toolbar, and click "Stop Computing"
  8724. [googletalk]
  8725. Filename=googletalk.exe
  8726. Confirmed=U
  8727. Description=<a href="http://www.google.com/talk/" target=_blank>Google Talk</a> "enables you to call or send instant messages to your friends for free-anytime, anywhere in the world". Can be launched manually
  8728. [gotomypc]
  8729. Filename=g2svc.exe
  8730. Confirmed=U
  8731. Description=<a href="https://www.gotomypc.com/ad/corp/home" target="_blank">ExpertCity GoToMyPc</a> logon - web-based remote-access solution that allows individuals and companies to register their computers online and then securely access those computers from any web browser
  8732. [gotsmiley]
  8733. Filename=GotSmiley.exe
  8734. Confirmed=X
  8735. Description=<a href="http://www.doxdesk.com/parasite/Gator.html" target=_blank>Gator</a> GotSmiley - adware based, also see <a href="http://www.symantec.com/avcenter/venc/data/adware.gotsmiley.html" target=_blank>here</a>
  8736. [gouday.exe]
  8737. Filename=readme.exe
  8738. Confirmed=X
  8739. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.beagle.c@mm.html" target="_blank">BEAGLE.C</a> WORM!
  8740. [gra]
  8741. Filename=gra.exe
  8742. Confirmed=N
  8743. Description=Looks at system resources at startup and warns you if they have dropped. Contains links to the Disk Clean Up, Defrag and Start Up Menu. It does have a link to a startup configuration utility. Similar to msconfig but can keep a list of disabled apps. Not really necessary. Only appears if you load the Gateway Startup Utility
  8744. [gramdate]
  8745. Filename=2Stop.exe
  8746. Confirmed=?
  8747. Description=<font color="#FF0000">??</font>
  8748. [graphic driver]
  8749. Filename=smss32.exe
  8750. Confirmed=X
  8751. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  8752. [graphic loader]
  8753. Filename=ntvdm32.exe
  8754. Confirmed=X
  8755. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  8756. [gravis appawareloader]
  8757. Filename=dbserver.exe
  8758. Confirmed=U
  8759. Description=Looks like it's associated with <a href="http://www.gravis.com/" target="_blank"> Gravis</a> game controllers and the Keyset Manager, allowing the user to program the buttons for games that don't support them
  8760. [gravis xperience driver support]
  8761. Filename=Grxp4exe.exe
  8762. Confirmed=U
  8763. Description=Driver for <a href="http://www.gravis.com/" target="_blank">Gravis</a> game controllers such as the Eliminator Aftershock. Must be loaded if you run the supplied application software for the controller to be recognized. Start it manually via a shortcut if not used
  8764. [grdsys32]
  8765. Filename=GrdSys32.exe
  8766. Confirmed=?
  8767. Description=X-Stream ISP software. Offers free Net access funded by on-screen ads. <font color="#FF0000">Is it required or can you create your own dial-up networking connection to use on demand?</font>
  8768. [greetings workshop]
  8769. Filename=GWREMIND.EXE
  8770. Confirmed=N
  8771. Description=You really want to be reminded about somebody's birthday at the expense of resources?
  8772. [gremier]
  8773. Filename=wscript.exe gpremier.vbs
  8774. Confirmed=X
  8775. Description=Added by the <a href="http://www.symantec.com/avcenter/venc/data/vbs.gpremier@mm.html" target="_blank">GPREMIER</a> WORM!
  8776. [gremlin]
  8777. Filename=intrenat.exe
  8778. Confirmed=X
  8779. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.hllw.doomjuice.html" target="_blank">DOOMJUICE</a> WORM!
  8780. [grokster]
  8781. Filename=Grokster.exe
  8782. Confirmed=N
  8783. Description=<a href="http://www.pestpatrol.com/PestInfo/G/Grokster.asp" target=_blank>Grokster</a> Peer-To-Peer File Sharing program
  8784. [grpconv]
  8785. Filename=grpconv.exe
  8786. Confirmed=N
  8787. Description=Microsoft Windows Program Group Converter - used by installers (ONLY in the RunOnce keys) - provides the translation of groups and group items to folders and links. Also see <a href="http://support.microsoft.com/?kbid=119941" target= blank>this</a> MS Knowledge Base article
  8788. [gsads]
  8789. Filename=gms2.exe
  8790. Confirmed=X
  8791. Description=<a href="http://www.benedelman.org/spyware/installations/pacerd/" target=_blank>PacerD_Media/Pacimedia.com</a> adware
  8792. [gscbc]
  8793. Filename=Gscbc.exe
  8794. Confirmed=?
  8795. Description=<font color="#FF0000">??</font>
  8796. [gshp]
  8797. Filename=zzgshp.vbs
  8798. Confirmed=X
  8799. Description=Homepage hi-jacker
  8800. [gsiconexe]
  8801. Filename=Gsicon.exe
  8802. Confirmed=N
  8803. Description=ADSL modem monitor from <a href="http://www.eicon.com/worldwide/default.htm" target="_blank">Eicon Networks</a> (as used by BT for its Broadband internet service for example). Can safely be disabled without affecting the connection - all this does is give an indication of connectivity and access to the diagnostic facilities
  8804. [gsifinal]
  8805. Filename=rundll32 gspndll.dll, postInstall final
  8806. Confirmed=?
  8807. Description=USB DSL modem related - [what does it do and is it required in startup?</font>
  8808. [gsorganizer]
  8809. Filename=GSOrganizer.exe
  8810. Confirmed=N
  8811. Description=<a href="http://www.tgslabs.com/index.php3" target="_blank">GoldenSection Organizer</a> - personal information manager
  8812. [gssomatic]
  8813. Filename=gssomatic.exe
  8814. Confirmed=X
  8815. Description=<a href="http://www.pestpatrol.com/pestinfo/s/searchcentrix.asp" target="_blank">Searchcentrix</a> hijacker
  8816. [gstartup]
  8817. Filename=GMT.exe
  8818. Confirmed=X
  8819. Description=Gator spyware component - see <a href="http://www.cexx.org/gator.htm" target=_blank>here</a>
  8820. [gsv]
  8821. Filename=gsv.exe
  8822. Confirmed=X
  8823. Description=Added by the ROBAL 1.0 backdoor TROJAN!
  8824. [gtwatch]
  8825. Filename=gtwatch.exe
  8826. Confirmed=N
  8827. Description=Associated with a Mustec scanner and not required
  8828. [guard]
  8829. Filename=Guard.exe
  8830. Confirmed=U
  8831. Description=Related to <a href="http://www.phoenix.com/" target=_blank>Phoenix Technologies</a> Core Managed Environment (cME) Integration and Certification program
  8832. [guardian]
  8833. Filename=CMGrdian.exe
  8834. Confirmed=N
  8835. Description=McAfee's QuickClean, an offline version of the one in their online Clinic. Normally run offline and not needed. Incidentally, incorporates more cleanup programs than the likes of WinOptimizer and System Mechanic
  8836. [gurunet]
  8837. Filename=GuruNet.exe
  8838. Confirmed=U
  8839. Description=<a href="http://www.gurunet.com/what_tools.jsp" target=_blank>GuruNet</a> lets you click on any word on your screen to get the relevant information you want
  8840. [gustavved]
  8841. Filename=[filename].exe
  8842. Confirmed=X
  8843. Description=Added by the <a href="http://www.symantec.com/avcenter/venc/data/w32.opaserv.h.worm.html" target="_blank">OPASERV.H</a> WORM!
  8844. [gvagfxj]
  8845. Filename=rundll32 ...gvagfxj.dll
  8846. Confirmed=X
  8847. Description=Unidentified adware, spyware or virus
  8848. [gw port controller]
  8849. Filename=PORTCT95.EXE
  8850. Confirmed=Y
  8851. Description=From a visitor - "I must keep it active in start up or my Lexmark printer and RCA Cam program cannot discover a working port to work". From the file properties, the file is known as "Smart Thru Fax Drive Spy" and is supplied by Samsung
  8852. [gwinkmonitor]
  8853. Filename=GWInkMonitor.exe
  8854. Confirmed=N
  8855. Description=Gateway ink monitor - makes an annoying popup that says your printer may be running out of ink, do you want to buy some!
  8856. [gwmdmmsg]
  8857. Filename=GWMDMMSG.exe
  8858. Confirmed=N
  8859. Description=Used with internal modems on Gateway and vprMatrix PCs. This is the "GTW modem messaging applet" and is not required for the modem to work correctly
  8860. [gwmdmpi]
  8861. Filename=GWMDMpi.exe
  8862. Confirmed=U
  8863. Description=Used with internal modems on Gateway PCs such as the 450SX Notebook. Required for audio settings to be maintained and does not remain in memory once run. See <a href="http://support.gateway.com/support/drivers/moreinfo.asp?readmeURL=ftp%3A//ftp.gateway.com/pub/hardware_support/drivers/win_xp/portable/450sx4/7512994.txt" target="_blank">here</a> for more information
  8864. [gwum]
  8865. Filename=gwum.exe
  8866. Confirmed=U
  8867. Description=Gigabyte utility manager. Loads if you have a Gigabyte motherboard and got a full bundle of utilities installed. Monitors CPU, fans, BIOS etc. Only used by system "tweakers"
  8868. [gyy]
  8869. Filename=gyy.exe
  8870. Confirmed=?
  8871. Description=<font color="#FF0000">Possibly <a href="#Gator">Gator</a> (and therefore spyware) related?</font>
  8872. [g_server.exe]
  8873. Filename=G_Server.exe
  8874. Confirmed=X
  8875. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojfeutelc.html" target=_blank>FEUTEL-C</a> TROJAN!
  8876. [g_server1.2.exe]
  8877. Filename=G_Server1.2.exe
  8878. Confirmed=X
  8879. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojgraybirdz.html" target=_blank>GRAYBIRD-Z</a> TROJAN!
  8880. [h/pc connection agent]
  8881. Filename=WCESCOMM.EXE
  8882. Confirmed=U
  8883. Description=Active sync for use with Windows CE based palm PC
  8884. [h4te service drivers]
  8885. Filename=h4te.exe
  8886. Confirmed=X
  8887. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  8888. [hachimitsu-lemon]
  8889. Filename=hachimitsu-lemon.exe
  8890. Confirmed=X
  8891. Description=Added by the <a href="http://www.symantec.com/avcenter/venc/data/trojan.hachilem.html" target=_blank>HACHILEM</a> TROJAN!
  8892. [hagent]
  8893. Filename=avp.exe
  8894. Confirmed=X
  8895. Description=Added by the "Herman Agent" remote access TROJAN!
  8896. [halifaxhowardcluster]
  8897. Filename=skinkers.exe
  8898. Confirmed=U
  8899. Description=<a href="http://www.skinkers.com/clients.html" target="_blank">Howard the Weatherman</a> desktop client from Halifax by Skinkers - marketing/messaging tool. Leave enabled if you want to receive messages
  8900. [hamfrontpanel]
  8901. Filename=hampanel.exe
  8902. Confirmed=U
  8903. Description=Displays a panel simulating modem lights for the Intel HaM internal modem. The lights are useful as a reminder to disconnect from the net if you are likely to forget, but otherwise pointless
  8904. [handy backup 3.9]
  8905. Filename=hbagent.exe
  8906. Confirmed=U
  8907. Description=<a href="http://www.handybackup.com/" target="_blank">Handy Backup</a> - automatic backup of your critical data to virtually any type of storage media including CD-RW devices and remote FTP servers
  8908. [hardware doctor]
  8909. Filename=Hwdoctor.exe
  8910. Confirmed=U
  8911. Description=Winbond Hardware Doctor - as included on some motherboard using Winbond's hardware monitoring chips. Displays fan speeds, voltages, temperatures. Only required if you're concerned about your system temperature - typically for "overclocked" systems
  8912. [hardware monitor service]
  8913. Filename=mshms.exe
  8914. Confirmed=X
  8915. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojwollfa.html" target=_blank>WOLLF-A</a> TROJAN!
  8916. [hardware sensors monitor]
  8917. Filename=hmonitor.exe
  8918. Confirmed=U
  8919. Description=Utility to monitor fan speed and temperatures - similar to Motherboard Monitor. Only required if you're concerned about your system temperature - typically for "overclocked" systems
  8920. [hare]
  8921. Filename=hare.exe
  8922. Confirmed=U
  8923. Description=<a href="http://www.foxpop.ndirect.co.uk/pc/dachshund_03.htm" target="_blank">Hare</a> - improve and optimize performance of desktop/laptop PCs
  8924. [hatape]
  8925. Filename=[path to trojan]
  8926. Confirmed=X
  8927. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojbankerqf.html" target=_blank>BANKER-QF</a> TROJAN!
  8928. [hawkeye]
  8929. Filename=HAWK_95.EXE
  8930. Confirmed=U
  8931. Description=Control Panel application for the old Number Nine graphics cards to change resolution, colour depth, etc. Available via Start -> Programs
  8932. [hawkeye iv control panel]
  8933. Filename=HAWK_32.EXE
  8934. Confirmed=U
  8935. Description=Control Panel application for the old Number Nine graphics cards to change resolution, colour depth, etc. Available via Start -> Programs
  8936. [hbinst]
  8937. Filename=Hbinst.exe
  8938. Confirmed=X
  8939. Description=<a href="http://www.hotbar.com/" target="_blank">Hotbar</a> enhances the surfing experience offering a variety of innovative and fresh skins to the browser while providing users worldwide with access to various services of added value and fun. Also regarded as adware/spyware due to it's adds and browsing habits information gathering - see <a href="http://www.safersite.com/pestinfo/H/HotBar_Adware.asp" target="_blank">here</a>
  8940. [hc reminder]
  8941. Filename=hc.exe
  8942. Confirmed=N
  8943. Description=For Compaq PC's. Help Compiler, crunches help database, will run without being in startup when needed
  8944. [hcdetect]
  8945. Filename=HCDetect.exe
  8946. Confirmed=N
  8947. Description=MS HomeClick Network - simple home network setup and configuration program included with 3Com HomeConnect home networking products. Runs in the background for network printer notification, detection, and Internet Connection Sharing (ICS) taskbar icon. Not required - network can be set-up manually, also has a known memory leak problem
  8948. [hcenter]
  8949. Filename=tgcmd.exe
  8950. Confirmed=U
  8951. Description=See also TgAddServer. This part ensures the software is installed correctly (similar to an installation wizard) as reported by Cox. Regarded as spyware by some as it has the ability to retrieve user information. Whether it does so depends upon the provider. One Toshiba user reports problems with hibernate on his laptop if disabled - hence the "U" recommendation
  8952. [hclean32.exe]
  8953. Filename=hclean32.exe
  8954. Confirmed=X
  8955. Description=<a href="http://research.sunbelt-software.com/threat_display.cfm?name=Misc.WareOut&threatid=40280&search=wareout" target=_blank>Wareout</a> - malware masquerading as a spyware and dialer remover
  8956. [hcontrol]
  8957. Filename=hcontrol.exe
  8958. Confirmed=U
  8959. Description=Hotkeys on an ASUS Notebook. Only required if you use the additional keys
  8960. [hdashcut]
  8961. Filename=HDAShCut.exe
  8962. Confirmed=N
  8963. Description=High definition audio page shortcut - not required
  8964. [hdaudio driver 1.0]
  8965. Filename=[random filename].exe
  8966. Confirmed=X
  8967. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojteadoord.html" target=_blank>TEADOOR-D</a> TROJAN!
  8968. [hdaudio driver 2.0]
  8969. Filename=[random filename].exe
  8970. Confirmed=X
  8971. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojteadoore.html" target=_blank>TEADOOR-E</a> TROJAN!
  8972. [hddhealth]
  8973. Filename=hddhealth.exe
  8974. Confirmed=U
  8975. Description=<a href="http://www.panterasoft.com/" target=_blank>HDD Health</a> is a "full-featured failure-prediction agent for machines using Windows 95, 98, NT, Me, 2000 and XP. Sitting in the system tray, it monitors hard disks and alerts you to impending failure"
  8976. [hddlife]
  8977. Filename=HDDlife.exe
  8978. Confirmed=U
  8979. Description=<a href="http://www.hddlife.com/" target=_blank>HDDlife</a> checks the health of your hard drives at regular intervals and informs you about the results of these checks
  8980. [hdhelp]
  8981. Filename=tbhdhelp.exe
  8982. Confirmed=?
  8983. Description=Associated with Philips <a href="http://www.consumer.philips.com/global/b2c/ce/catalog/subcategory.jhtml;jsessionid=4ORTA0KYTJOWWCRQNFJRX1YKGBUEWHAW?subCatId=SOUNDCARDS&groupId=PCSTUFF&divId=0" target="_blank">Edge</a> series soundcards. <font color="#FF0000">Is it required?</font>
  8984. [hdtray]
  8985. Filename=HDtray.exe
  8986. Confirmed=N
  8987. Description=Philips Edge Series Control Panel Tray Utility - system tray icon for a Philips <a href="http://www.consumer.philips.com/global/b2c/ce/catalog/subcategory.jhtml;jsessionid=4ORTA0KYTJOWWCRQNFJRX1YKGBUEWHAW?subCatId=SOUNDCARDS&groupId=PCSTUFF&divId=0" target="_blank">Edge</a> series soundcards. Available via Start -> Settings -> Control Panel
  8988. [he3bbcff]
  8989. Filename=rundll32.exe [path] he3bbcff.dll, EnableRunDLL32
  8990. Confirmed=X
  8991. Description=<a href="http://www.spywareguide.com/product_show.php?id=853" target=_blank>LZIO.com</a> adware downloader
  8992. [he3e3fc4]
  8993. Filename=rundll32.exe [path] he3e3fc4.dll, EnableRunDLL32
  8994. Confirmed=X
  8995. Description=<a href="http://www.spywareguide.com/product_show.php?id=853" target="_blank">LZIO.com</a> adware downloader
  8996. [hellbot test]
  8997. Filename=1hellbot.exe
  8998. Confirmed=X
  8999. Description=Added by the <a href="http://www.symantec.com/avcenter/venc/data/w32.mydoom.bo@mm.html" target= blank>MYDOOM.BO</a> WORM!
  9000. [hellbot3]
  9001. Filename=coolbot.exe
  9002. Confirmed=X
  9003. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_MYTOB.AB&VSect=T" target=_blank>MYTOB.AB</a> WORM!
  9004. [hellodolly]
  9005. Filename=shost.exe
  9006. Confirmed=X
  9007. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.yodo@mm.html" target="_blank">YODO</a> WORM!
  9008. [help]
  9009. Filename=helpext.exe
  9010. Confirmed=?
  9011. Description=<font color="#FF0000">??</font>
  9012. [help temp files]
  9013. Filename=netreg.exe
  9014. Confirmed=X
  9015. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32forbotem.html" target= blank>FORBOT-EM</a> WORM!
  9016. [helpctl.exe]
  9017. Filename=helpctl.exe
  9018. Confirmed=X
  9019. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/trojan.gaslide.html" target="_blank">GASLIDE</a> TROJAN!
  9020. [helper.dll]
  9021. Filename=[path] rundll32.exe [path] helper.dll
  9022. Confirmed=X
  9023. Description=CnsMin "<a href="http://217.115.153.73/parasite/CnsMin.html" target="_blank">Chinese Keywords</a>" hijacker related
  9024. [helpexp.exe]
  9025. Filename=HelpExp.exe
  9026. Confirmed=X
  9027. Description=Attune HelpExpress - spyware. Disable and uninstall - see <a href="http://www.c-squad.org/hxdl.html" target="_blank">here</a>
  9028. [helpmanager]
  9029. Filename=spoler.exe
  9030. Confirmed=X
  9031. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.randex.j.html" target="_blank">RANDEX.J</a> WORM!
  9032. [helpw]
  9033. Filename=helpw.exe
  9034. Confirmed=X
  9035. Description=Adware downloader
  9036. [hen]
  9037. Filename=[filename].exe
  9038. Confirmed=X
  9039. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/pwsteal.tarno.g.html" target="_blank">TARNO.G</a> TROJAN!
  9040. [heomstool]
  9041. Filename=heomstool.exe
  9042. Confirmed=X
  9043. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/trojan.heoms.html" target=_blank>HEOMS</a> TROJAN!
  9044. [hercunes]
  9045. Filename=softhost.exe
  9046. Confirmed=X
  9047. Description=Added by the <a href="http://www.symantec.com/avcenter/venc/data/w32.garroch@mm.html" target=_blank>GARROCH</a> WORM!
  9048. [hermes messenger]
  9049. Filename=DGDRHE~1.EXE
  9050. Confirmed=U
  9051. Description=A LAN messenger alternative to WinPopUp - <a href="http://www.dgdr.com/hermes/" target="_blank">Digital Dreams Software</a>
  9052. [hewlett packard manager]
  9053. Filename=hpmanager.exe
  9054. Confirmed=X
  9055. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.mytob.ke@mm.html" target=_blank>MYTOB.KE</a> WORM! Note - this is not a valid Hewlett-Packard program
  9056. [hewlett packard recorder]
  9057. Filename=Remind32.exe
  9058. Confirmed=N
  9059. Description=HP multifunction registration
  9060. [hf]
  9061. Filename=Hf.exe
  9062. Confirmed=U
  9063. Description=<a href="http://www.fspro.net/hf/" target="_blank">Hide Folders</a> - hide your folders so only you can view them
  9064. [hf security]
  9065. Filename=hfsecure.exe
  9066. Confirmed=X
  9067. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32agobotti.html" target=_blank>AGOBOT-TI</a> WORM!
  9068. [hffsrv]
  9069. Filename=hffsrv.exe
  9070. Confirmed=U
  9071. Description=<a href="http://www.softstack.com/hff.html" target=_blank>Hide Files & Folders</a> is a "password-protected security utility working at the Windows kernel level allowing you to password-protect files and folders, or to hide them securely from viewing and searching"
  9072. [hfxp]
  9073. Filename=hfxp.exe
  9074. Confirmed=U
  9075. Description=<a href="http://www.fspro.net/hfxp/" target=_blank>Hide Folders XP</a> - hide your folders so only you can view them
  9076. [hgqhp.exe]
  9077. Filename=hgqhp.exe
  9078. Confirmed=X
  9079. Description=Added by the <a href="http://www.symantec.com/avcenter/venc/data/trojan.flush.f.html" target=_blank>FLUSH.F</a> TROJAN!
  9080. [hgtxpei]
  9081. Filename=FirstReboot.exe
  9082. Confirmed=N
  9083. Description=Herucles Audio tool for the Hercules Game Theater XP soundcard. Available via Start -> Settings -> Control Panel
  9084. [hibermonitor]
  9085. Filename=HCount.exe
  9086. Confirmed=?
  9087. Description=<font color="#FF0000">??</font>
  9088. [hibernation]
  9089. Filename=hib32.exe
  9090. Confirmed=U
  9091. Description=Reduces the power consumption when the laptop isn't being used to preserve battery power. Similar programs on other laptops reduce the processor clock rate, etc. Required if you run of battery regularly
  9092. [hid.exe]
  9093. Filename=hid.exe
  9094. Confirmed=X
  9095. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.irc.ratsou.b.html" target="_blank">RATSOU.B</a> TROJAN!
  9096. [hideoe]
  9097. Filename=HideOE.exe
  9098. Confirmed=U
  9099. Description=<a href="http://www.r2.com.au/software.php?page=2&show=hideoe&PHPSESSID=2256bb0c52a103fac2bd9a885f0ca787" target=_blank>HideOE</a> - allows you to 'hide' Outlook Express or minimize it to the System Tray
  9100. [hiderun.exe]
  9101. Filename=Hiderun.exe and svhost.exe and pro.gif
  9102. Confirmed=X
  9103. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/bat.boohoo.worm.html" target="_blank">BOOHOO</a> WORM!
  9104. [hidestyle]
  9105. Filename=Ante Browse Trust.exe
  9106. Confirmed=X
  9107. Description=IE toolbar taking you to Lop.com. If the exe is running, end it and remove the "Stupidmore" directory from C:\Program Files
  9108. [hidserv]
  9109. Filename=hidserv.exe
  9110. Confirmed=U
  9111. Description=This is the <a href="http://www.microsoft.com/hwdev/tech/input/audctrl.asp" target="_blank">Human Interface Device Server</a> for Win98SE/2000/Me/XP, it is required only if you are using USB Audio Devices you can disable via Msconfig. See <a href="http://www.microsoft.com/hwdev/hid/audctrl.htm" target="_blank">here</a>. Typical examples are USB multimedia keyboards with volume control and web-ready keyboards. For example - loaded by default with MS DSS80 Speakers because they have Volume, Mute and Bass controls on the speaker. Some users may experience problems disabling this - if this is the case then re-enable it. Equivalent to MMHid in Win98. On HP Computers, HIDSERV is the controller for the keyboard sound controls on the USB and PS/2 keyboards
  9112. [high definition audio property page shortcut]
  9113. Filename=HDAudPropShortcut.exe
  9114. Confirmed=N
  9115. Description=Realtek audio card related - probably adds the odd feature to one of the "Sounds" Control Panel applet tabs - doesn't appear to be required
  9116. [hijackthis startup scan]
  9117. Filename=HijackThis.exe
  9118. Confirmed=U
  9119. Description=<a href="http://www.spywareinfo.com/~merijn/downloads.html" target= blank>HijackThis</a> lists the contents of key areas of the Registry and hard drive areas that are used by both legitimate programmers and hijackers. The program is continually updated to detect and remove new hijacks. It does not target specific programs and URLs, only the methods used by hijackers to force you onto their sites. As a result, false positives are imminent, and unless you're sure about what you're doing, you always should consult with knowledgable folks before deleting anything. Required if you'd like HijackThis to run a scan at startup, and show the results when new items are found (if so, check the appropriate box in the "Config" section")
  9120. [hijsrv32]
  9121. Filename=hijsrv.exe
  9122. Confirmed=X
  9123. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojbankgermd.html" target=_blank>BANKGERM-D</a> TROJAN!
  9124. [historykill]
  9125. Filename=histkill.exe
  9126. Confirmed=N
  9127. Description=HistoryKill removes your web surfing path by removing the URL drop-list history, detailed history file, cache, and cookies in both IE and Netscape Navigator browsers. Available via Start -> Programs
  9128. [hitq]
  9129. Filename=HitQ.exe
  9130. Confirmed=X
  9131. Description=Hijacker, for more information see <a href="http://www.talkaboutshareware.com/group/alt.comp.freeware/messages/289755.html" target=_blank>here</a>
  9132. [hitwarepklite]
  9133. Filename=HITWAR~1.EXE
  9134. Confirmed=U
  9135. Description=<a href="http://www.rightutilities.com/products/hitware_lite.htm" target="_blank">Hitware Popup Killer Lite</a>
  9136. [hiv]
  9137. Filename=HIV.exe
  9138. Confirmed=X
  9139. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/trojan.hiva.html" target="_blank">HIVA</a> TROJAN!
  9140. [hk]
  9141. Filename=hk.exe
  9142. Confirmed=U
  9143. Description=<a href="http://www.symantec.com/avcenter/venc/data/spyware.keyloggerexp.html" target=blank>KeyLoggerExp</a> ?keystroke logger/monitoring program. Given a "U" recommendation because it depends if you intentionally installed it. If you didn't treat it as "X" and uninstall or remove
  9144. [hkcmd]
  9145. Filename=hkcmd.exe
  9146. Confirmed=N
  9147. Description=Installed by the Intel 810 and 815 chipset graphic drivers. If the user wishes to have "HotKey" access to Intel's customised graphics properties, it is required, otherwise not. It can be disabled via the Display Properties in the Control Panel
  9148. [hkeyok]
  9149. Filename=runlli32.exe
  9150. Confirmed=X
  9151. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojqqpassu.html" target=_blank>QQPASS-U</a> TROJAN!
  9152. [hklm\run]
  9153. Filename=windowsupdate.exe
  9154. Confirmed=X
  9155. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32forbotbj.html" target=_blank>FORBOT-BJ</a> WORM! (where HKLM\Run represents HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run)
  9156. [hkserv]
  9157. Filename=HKserv.exe
  9158. Confirmed=U
  9159. Description=Keyboard manager program required to use programmable power and function keys on some laptops such as the Sony PCG R505TS
  9160. [hkss]
  9161. Filename=hkss.exe
  9162. Confirmed=U
  9163. Description=Compaq HotKey Support - multimedia keyboard support
  9164. [hlcleanup]
  9165. Filename=hlsetup2.exe
  9166. Confirmed=X
  9167. Description=<a href="http://vil.mcafeesecurity.com/vil/content/v_134892.htm" target=_blank>LinkReplacer/FFinder</a> adware
  9168. [hlhtxo.exe]
  9169. Filename=hlhtxo.exe
  9170. Confirmed=X
  9171. Description=Added by the <a href="http://vil.nai.com/vil/content/v_135291.htm" target=_blank>QLOWZONES-27</a> TROJAN!
  9172. [hll data parameter]
  9173. Filename=hllcxpa.exe
  9174. Confirmed=X
  9175. Description=Added by the <a href="http://es.trendmicro-europe.com/smb/security_info/virus_encyclopedia.php?s=1&VName=WORM_RBOT.AFG" target=_blank>RBOT.AFG</a> WORM!
  9176. [hmi powersystem]
  9177. Filename=hmisvc32.exe
  9178. Confirmed=X
  9179. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.randex.czz.html" target=_blank>RANDEX.CZZ</a> WORM!
  9180. [hml powersource]
  9181. Filename=hmlsvc32.exe
  9182. Confirmed=X
  9183. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32sdbotxl.html" target= blank>SDBOT-XL</a> WORM!
  9184. [hmonitor]
  9185. Filename=Hmonitor.exe
  9186. Confirmed=U
  9187. Description=Hardware sensor monitoring program. Only required if you overclock your system and want to check on the status
  9188. [hmv powersource]
  9189. Filename=hmusvc32.exe
  9190. Confirmed=X
  9191. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32sdbotyw.html" target=_blank>SDBOT-YW</a> WORM!
  9192. [ho2stdll.exe]
  9193. Filename=ho2stdll.exe
  9194. Confirmed=X
  9195. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojbankerho.html" target=_blank>BANKER-HO</a> TROJAN!
  9196. [hoi services]
  9197. Filename=holsvc32.exe
  9198. Confirmed=X
  9199. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32agobotsf.html" target= blank>AGOBOT-SF</a> WORM!
  9200. [holiday lights]
  9201. Filename=Holiday Lights.exe
  9202. Confirmed=N
  9203. Description=<a href="http://www.tigertech.com/hlights.html" target="_blank">Holiday Lights</a> from Tiger Technologies. Festive desktop enhancement that adds lights. Available via Start -> Programs
  9204. [hollaback]
  9205. Filename=slvhosts.exe
  9206. Confirmed=X
  9207. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_SDBOT.BMO&VSect=P" target=_blank>SDBOT.BMO</a> WORM!
  9208. [home theater schsvr]
  9209. Filename=SchSvr.exe
  9210. Confirmed=N
  9211. Description=<a href="http://www.intervideo.com" target="_blank">WinScheduler</a> is installed with Home Theater Remote Control for WinDVD from Intervideo. If you want to schedule recordings from your TV tuner card, you will need it. Available via Start -> Programs
  9212. [homealarm]
  9213. Filename=HomeAlarm.exe
  9214. Confirmed=U
  9215. Description=<a href="http://www.softshape.com/cham/" target="_blank">Chameleon Clock</a> - system tray clock replacement
  9216. [homecentre wakeup]
  9217. Filename=LGWAKEUP.EXE
  9218. Confirmed=?
  9219. Description=<font color="#FF0000">Associated with the no longer supported Xerox HomeCentre printer/scanner</font>
  9220. [homeland network]
  9221. Filename=HomelandNetwork.exe
  9222. Confirmed=X
  9223. Description=<a href="http://www.homelandnetwork.com/index.html" target=_blank>Homeland Network</a> Notifier - pops ads, see their <a href="http://homelandnetwork.com/privacy.html" target=_blank>privacy policy</a>
  9224. [honor]
  9225. Filename=honor.exe
  9226. Confirmed=?
  9227. Description=<font color="#FF0000">??</font>
  9228. [hook99startup]
  9229. Filename=hk2re.exe
  9230. Confirmed=U
  9231. Description="<a href="http://thunder.prohosting.com/~ladi/e_hook.html" target="_blank">Hook99</a> enables the user to customize the start button. You can change or remove the text and replace the Windows flag on button with icon of your choice. Supports Windows icons, bitmaps and can extract icons from executables and libraries. Hook99 can also make the background of desktop icons captions transparent"
  9232. [hooksys]
  9233. Filename=HookSys.exe
  9234. Confirmed=U
  9235. Description=<a href="http://www.rocketdownload.com/details/secu/6889.htm" target="_blank">SurfinGuard Pro</a> - protects against all malicious code delivered through executables, scripting files, ActiveX and Java
  9236. [horngtech4d]
  9237. Filename=bally4d.exe
  9238. Confirmed=Y
  9239. Description=HorngTech 4D mouse driver
  9240. [host process]
  9241. Filename=mame.exe
  9242. Confirmed=X
  9243. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotapo.html" target=_blank>RBOT-APO</a> WORM!
  9244. [hostdll.exe]
  9245. Filename=hostdll.exe
  9246. Confirmed=X
  9247. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojbankerbo.html" target=_blank>BANKER-BO</a> TROJAN!
  9248. [hostren.exe]
  9249. Filename=Hostren.exe
  9250. Confirmed=X
  9251. Description=Added by PWS.BANKER.F, a variant of the <a href="http://www.sophos.com/virusinfo/analyses/trojbankerbo.html" target=_blank>BANKER-BO</a> TROJAN!
  9252. [hostsvc syse]
  9253. Filename=HostSVC.exe
  9254. Confirmed=X
  9255. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotanz.html" target=_blank>RBOT-ANZ</a> WORM!
  9256. [hot corners]
  9257. Filename=Hotc.exe
  9258. Confirmed=U
  9259. Description=<a href="http://www.southbaypc.com/HotCorners/" target="_blank">Hot Corners</a> - "lets you quickly activate or disable your screen saver by moving the mouse into a given corner of the screen"
  9260. [hot key kbd 2690 daemon]
  9261. Filename=SK9910DM.exe
  9262. Confirmed=U
  9263. Description=Multimedia keyboard manager - required if you use any special keys
  9264. [hot key keybd 9910 daemon]
  9265. Filename=SK9910DM.exe
  9266. Confirmed=U
  9267. Description=Multimedia keyboard manager - required if you use any special keys
  9268. [hot party 22]
  9269. Filename=hotpart22.exe
  9270. Confirmed=?
  9271. Description=<font color="#FF0000">??</font>
  9272. [hotaction_hr]
  9273. Filename=hotaction_hr.exe
  9274. Confirmed=X
  9275. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/dialsiteiconb.html" target=_blank>SITEICON-B</a> DIALER! An uninstall option can be accessed via the Add or Remove Programs dialog in the Windows Control Panel. The software is listed as "HotAction_hr"
  9276. [hotfix updat]
  9277. Filename=svdhost32.exe
  9278. Confirmed=X
  9279. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.gaobot.zw.html" target="_blank">GAOBOT.ZW</a> WORM!
  9280. [hotide]
  9281. Filename=hotide.exe
  9282. Confirmed=U
  9283. Description=HotIDE allows Acer TravelMate owners to hot-swap external drives without switching of their notebooks
  9284. [hotkeyapp]
  9285. Filename=HotkeyApp.exe
  9286. Confirmed=U
  9287. Description=Programmable keys on Acer, Fujitsu and other laptops
  9288. [hotkeyscmds]
  9289. Filename=hkcmd.exe
  9290. Confirmed=N
  9291. Description=Installed by the Intel 810 and 815 chipset graphic drivers. If the user wishes to have "HotKey" access to Intel's customised graphics properties, it is required, otherwise not. It can be disabled via the Display Properties in the Control Panel
  9292. [hotpix]
  9293. Filename=hotpix.exe
  9294. Confirmed=X
  9295. Description=Adult content dialler
  9296. [hotplug]
  9297. Filename=hotplug.exe
  9298. Confirmed=X
  9299. Description=Added by the <a href="http://vic.zonelabs.com/tmpl/body/CA/virusDetails.jsp?VId=39574" target="_blank">SILLYDL</a> TROJAN!
  9300. [hotsync manager]
  9301. Filename=hotsync.exe
  9302. Confirmed=N
  9303. Description=Installed when connecting a Palm HotSync cradle up to a USB port. The Blue and Red Arrow Icon that enables Palm / Handspring Synchronizing.  Available via Start -> Programs
  9304. [hotwetlove]
  9305. Filename=hotwetlove.exe
  9306. Confirmed=X
  9307. Description=Adult content dialler. Will not uninstall - components have to be manually deleted
  9308. [hot_kiss]
  9309. Filename=Hot_Kiss.exe
  9310. Confirmed=X
  9311. Description=Adult content dialler
  9312. [hot_tarts]
  9313. Filename=Hot_Tarts.exe
  9314. Confirmed=X
  9315. Description=Adult content dialler
  9316. [hot_tarts_au]
  9317. Filename=Hot_Tarts_Au.exe
  9318. Confirmed=X
  9319. Description=Premium rate adult content dialler
  9320. [hot_tarts_mc]
  9321. Filename=Hot_Tarts_mc.exe
  9322. Confirmed=X
  9323. Description=<a href="http://www.doxdesk.com/parasite/Wink.html" target=_blank>Wink/HotTarts</a> adult content dialer
  9324. [hoverdesk]
  9325. Filename=HoverDesk.exe
  9326. Confirmed=U
  9327. Description=<a href="http://www.hoverdesk.net/" target="_blank">HoverDesk</a> - desktop replacement software
  9328. [hp 1000 firmware]
  9329. Filename=fwdl.exe
  9330. Confirmed=?
  9331. Description=HP LaserJet 1000 related. <font color="#FF0000">Is it a driver or automatic firmware update (based upon the filename)?</font>
  9332. [hp autoindexer]
  9333. Filename=hppautoindexer.exe
  9334. Confirmed=U
  9335. Description=Installed by HP multi-function printer driver software, related to PC faxing. If you are not using the PC faxing feature you can go ahead and disable these services from the startup
  9336. [hp cd writer]
  9337. Filename=hpcdtray.exe
  9338. Confirmed=N
  9339. Description=System Tray access to a HP CD-Writer's functions. Available via Start -> Programs
  9340. [hp cd-dvd]
  9341. Filename=hpcdtray.exe
  9342. Confirmed=N
  9343. Description=System Tray access to a HP CD-Writer's functions. Available via Start -> Programs
  9344. [hp cd-writer]
  9345. Filename=hpcdtray.exe
  9346. Confirmed=N
  9347. Description=System Tray access to a HP CD-Writer's functions. Available via Start -> Programs
  9348. [hp center]
  9349. Filename=BACKWEB-*****.exe
  9350. Confirmed=X
  9351. Description=See <a href="http://h10025.www1.hp.com/ewfrf/wc/genericDocument?cc=us&docname=bph05170&lc=en&jumpid=reg_R1002_USEN#bph05170_G5" target="_blank">here</a> - "messaging service that automatically sends you support information, tips, ideas, and special offers from HP and our partners, especially designed for HP and Compaq desktop computer owners". Applies to certain HP Pavilion desktop computers between Fall 2001 and Spring 2003. * can be any digit
  9352. [hp center ui]
  9353. Filename=ShadowBar.exe
  9354. Confirmed=N
  9355. Description=User Interface for HP Center - see <a href="http://www.sysinfo.org/startuplist.php?filter=BACKWEB-******.exe" target="_blank">here</a>
  9356. [hp component manager]
  9357. Filename=hpcmpmgr.exe
  9358. Confirmed=N
  9359. Description=Checks the internet for updated drivers/utilities for your HP product - update manually. Disabling will remove the error "Windows can't shutdown the computer because hpcmpmgr.exe can't be ended"
  9360. [hp deskjet]
  9361. Filename=HP_DeskJet_500.exe
  9362. Confirmed=X
  9363. Description=Added by the <a href="http://www.sophos.com.au/virusinfo/analyses/w32forbotda.html" target=_blank>FORBOT-DA</a> WORM!
  9364. [hp display settings]
  9365. Filename=hpdisply.exe
  9366. Confirmed=U
  9367. Description=Sets default display settings. Unchecking this item has been reported to cure a "Problem sending command to keyboard" error message
  9368. [hp idscheduler]
  9369. Filename=HPIDSCHD.exe
  9370. Confirmed=?
  9371. Description=<font color="#FF0000">HP Instant Delivery Scheduler</font>
  9372. [hp image zone fast start]
  9373. Filename=hpqthb08.exe
  9374. Confirmed=N
  9375. Description=Improves the startup time of HP Image Zone. If you disable it, HP Image Zone takes a long time to start up only the first time you run it. Subsequent startups are much faster than the first time
  9376. [hp info express]
  9377. Filename=??
  9378. Confirmed=N
  9379. Description=On HP PCs, allows the computer to automatically receive notifications from HP over the Internet. Associated with BackWeb
  9380. [hp instant support]
  9381. Filename=matcli.exe
  9382. Confirmed=U
  9383. Description="matcli.exe is a motive Assistant Command line interface that gathers information about your system's identity like your name email address, city, state, etc and gets written to a log file". HP Instant Support is required to run with the Help and Support program. If you uncheck HP Instant Support and and then run Help and Support it will add another HP Instant Support in the startup menu. If you remove the HP Instant Support in the add/remove program some help menus in help and support will not be available. You decide
  9384. [hp internet center]
  9385. Filename=SURFBRD.EXE
  9386. Confirmed=N
  9387. Description=Loads the HP Internet center surfboard on startup. HP Internet Center allows you to customize the multimedia keys on the fly without having to go the Control Panel --> Keyboards to change them
  9388. [hp jetdiscovery]
  9389. Filename=HPJETDSC.EXE
  9390. Confirmed=N
  9391. Description=HP JetAdmin software which monitors printing jobs on a network environment
  9392. [hp jetspeed autostart]
  9393. Filename=AUTOSTART.EXE
  9394. Confirmed=N
  9395. Description=Autostart executable for the old multiplayer game HP Jetspeed
  9396. [hp laser jet director]
  9397. Filename=hppdirector.exe
  9398. Confirmed=U
  9399. Description=System Tray icon that opens various functions such as copy, fax, email, scan, copy plus, etc. Right-click on it and you see a few options such as the preceding bar plus About, Help, ToolBox, Exit, etc
  9400. [hp network registry agent]
  9401. Filename=hpnra.exe
  9402. Confirmed=?
  9403. Description=<font color="#FF0000">??</font>
  9404. [hp parallel port test]
  9405. Filename=hppt.exe
  9406. Confirmed=N
  9407. Description=Associated with a HP ScanJet scanner
  9408. [hp photo manager]
  9409. Filename=HPPhotoManager.exe
  9410. Confirmed=X
  9411. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_SDBOT.AXU&VSect=T" target=_blank>SDBOT.AXU</a> WORM!
  9412. [hp port resolver]
  9413. Filename=hpbpro.exe
  9414. Confirmed=?
  9415. Description=<font color="#FF0000">??</font>
  9416. [hp precision scan]
  9417. Filename=hpmdlbwx.exe
  9418. Confirmed=N
  9419. Description=HP multifunction scanner software. Available from HP Office Jet R Toolbox so not required
  9420. [hp presentation ready]
  9421. Filename=PresRdy.exe
  9422. Confirmed=N
  9423. Description=HP Omnibook related:  "Press a dedicated button above the keyboard and the system will instantly load your presentation software and change the screen resolution to match your display device"
  9424. [hp psc 2000 series]
  9425. Filename=hpobnz08.exe
  9426. Confirmed=U
  9427. Description=System Tray icon indicating when the printer is ready. Can be started manually with HP Director but takes time to start
  9428. [hp recordnow]
  9429. Filename=??
  9430. Confirmed=U
  9431. Description=From HP "Software for the CD writer. Do not prevent from starting unless the CD writer is never going to be used."
  9432. [hp scanpatch]
  9433. Filename=HPScanFix.exe
  9434. Confirmed=U
  9435. Description=Program that starts up and automatically fixes earlier versions of the Scanjet 5100c software. If a Scanjet 5100C scanner is not going to be used, then it is safe to remove or prevent from starting
  9436. [hp scanpicture]
  9437. Filename=hpsplmwa.exe
  9438. Confirmed=N
  9439. Description=HP multifunction scanner software. Available from HP Office Jet R Toolbox so not required
  9440. [hp schedindexer]
  9441. Filename=hppschedindexer.exe
  9442. Confirmed=U
  9443. Description=Installed by HP multi-function printer driver software, related to PC faxing. If you are not using the PC faxing feature you can go ahead and disable these services from the startup
  9444. [hp service drivers]
  9445. Filename=hdsys.exe
  9446. Confirmed=X
  9447. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32sdbotze.html" target=_blank>SDBOT-ZE</a> WORM!
  9448. [hp silent service]
  9449. Filename=HpSrvUI.exe
  9450. Confirmed=?
  9451. Description=<font color="#FF0000">HP related</font>
  9452. [hp simple trax]
  9453. Filename=Hpcron.exe
  9454. Confirmed=N
  9455. Description=Supplied with HP CD-RW drives - stores information about CD contents on your hard drive. Available via Start -> Programs or Desktop Icon
  9456. [hp status]
  9457. Filename=hpstatus.exe
  9458. Confirmed=N
  9459. Description=HP Printer Status and Alerts
  9460. [hp status server]
  9461. Filename=hpboid.exe
  9462. Confirmed=?
  9463. Description=Copied during installation of HP Inkjet Printer Drivers in Win2K/XP. <font color="#FF0000">What does it do and is it required?</font>
  9464. [hp tv now]
  9465. Filename=HpTvNow.exe
  9466. Confirmed=U
  9467. Description=Application supplied with HP notebooks. It activates the S-Video port and is said to improve the quality of the output signal (resolution/timeouts)
  9468. [hp updates]
  9469. Filename=??
  9470. Confirmed=N
  9471. Description=On HP PCs, allows the computer to automatically receive notifications from HP over the Internet. Associated with BackWeb
  9472. [hp visualize init]
  9473. Filename=HpVisIni.exe
  9474. Confirmed=?
  9475. Description=HP Visualize software related. <font color="#FF0000">What does it do and is it required?</font>
  9476. [hp-aio flight]
  9477. Filename=Remind32.exe
  9478. Confirmed=N
  9479. Description=HP multifunction registration
  9480. [hpaiodevice]
  9481. Filename=hpodev07.exe
  9482. Confirmed=N
  9483. Description=Direct from HP - "Device Objects Server - detects all device events and handles all ongoing communication on the device. Loads in the Startup group (except when "portable" is chosen during installation)". Related to various HP all-in-one printer/scanner/copier devices. They print and copy fine with those files disabled, and the icon installed on the desktop that points to "hpodir07.exe" works just fine if you need to use the scanner
  9484. [hpaiodevice(hp officejet g series)]
  9485. Filename=hpoavn07.exe
  9486. Confirmed=?
  9487. Description=HP Printer related, reportedly lets file transfers from an HP device pass files through Windows firewall. <font color="#FF0000">Is it required?</font>
  9488. [hpaiodevice(hp psc 900 series) -1]
  9489. Filename=hpobrt07.exe
  9490. Confirmed=N
  9491. Description=Installed with a Hewlett Packard 900 series colour printer, scanner, fax, photo card slot printer, copier. Assumed to perform an identical function to the hpaiodevice entry
  9492. [hpaio_printfoldermgr]
  9493. Filename=hpoopm07.exe
  9494. Confirmed=N
  9495. Description=Directly from HP: "This process has one purpose - detects if the device moves to a different port, and notifies other processes to look on the new port." For various HP all-in-one printer/scanner/copier devices. They print and copy fine with those files disabled, and the HP icon installed on the desktop that points to "hpodir07.exe" works just fine if you need to use the scanner
  9496. [hpcmpmgr]
  9497. Filename=hpcmpmgr.exe
  9498. Confirmed=N
  9499. Description=Checks the internet for updated drivers/utilities for your HP product - update manually. Disabling will remove the error "Windows can't shutdown the computer because hpcmpmgr.exe can't be ended"
  9500. [hpfsched]
  9501. Filename=hpfsched.exe
  9502. Confirmed=N
  9503. Description=HPFSCHED is a small TSR that will remind you to clean the cartridges in your DeskJet from time to time in order to keep print quality high. It can be removed from the run line in win.ini if you do not want that feature
  9504. [hpgamesactivemenu]
  9505. Filename=ActiveMenu.exe
  9506. Confirmed=U
  9507. Description=Wild Tangent demo games that come with some HP computers. Unchecking it can prevent the games from running occasionally. Note that WildTanget's privacy policy used to state that they also collect and share individuals information but this is no longer the case
  9508. [hpgs2wnd]
  9509. Filename=hpgs2wnd.exe
  9510. Confirmed=N
  9511. Description="HP's exclusive <a href="http://www.hp.com/peripherals2/scanjet_info/share-to-web/index.htm" target="_blank">Share-to-Web</a> software makes it easy to share content with others through our affiliate Internet websites."<font color="#FF0000"> </font>Available via Start -> Programs
  9512. [hpha1mon]
  9513. Filename=Hpha1mon.exe
  9514. Confirmed=U
  9515. Description=Media card reader for some HP series printers allowing them to read digital camera memory cards directly. Only needed if you use this feature
  9516. [hphaxmon]
  9517. Filename=HPHAxMON.EXE
  9518. Confirmed=U
  9519. Description=Media card reader for some HP series printers allowing them to read digital camera memory cards directly. Only needed if you use this feature and known to cause system crashes in some cases. "x" can be 1, 2 or 3 and depends upon driver version. Replaced by HPHmon** (where ** is the version number) from version 4 onwards
  9520. [hphmon03]
  9521. Filename=hphmon03.exe
  9522. Confirmed=U
  9523. Description=Related to the Hewlett-Packard Photosmart's configuration and diagnostics module
  9524. [hphmon04]
  9525. Filename=hphmon04.exe
  9526. Confirmed=U
  9527. Description=Media card reader for some HP series printers allowing them to read digital camera memory cards directly. Only needed if you use this feature
  9528. [hphmon05]
  9529. Filename=hphmon05.exe
  9530. Confirmed=?
  9531. Description=<font color="#FF0000">??</font>
  9532. [hphmon06]
  9533. Filename=hphmon06.exe
  9534. Confirmed=U
  9535. Description=Related to the Hewlett Packard software HP Photosmart printer, it provides easy access to flash card reading functions. This program is not essential to the running of the system. Your choice
  9536. [hphome]
  9537. Filename=hphome.js
  9538. Confirmed=X
  9539. Description=Homepage hijacker
  9540. [hphupd04]
  9541. Filename=hphupd04.exe
  9542. Confirmed=N
  9543. Description=HP Photosmart software update checker and wizard launcher. Available via Start -> Programs
  9544. [hphupd05]
  9545. Filename=hphupd05.exe
  9546. Confirmed=?
  9547. Description=<font color="#FF0000">??</font>
  9548. [hphupd06]
  9549. Filename=hphupd06.exe
  9550. Confirmed=N
  9551. Description=Belongs to the HP Photosmart application and is responsible for keeping this software upto date. This program is not essential to the running of the system
  9552. [hpjsiroute]
  9553. Filename=hpjsira.exe
  9554. Confirmed=?
  9555. Description=<font color="#FF0000">Related to HP laserjet printers and IP addresses. An IP address is appended to the name field - ie "hpjsiroute192.168.1.2"</font>
  9556. [hpl services]
  9557. Filename=hmlsvc32.exe
  9558. Confirmed=X
  9559. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32agobotsi.html" target=_blank>AGOBOT-SI</a> WORM and variants!
  9560. [hplamp]
  9561. Filename=HPLAMP.EXE
  9562. Confirmed=Y
  9563. Description=HP Scanner Utility that controls your scannerÆs light bulb. Needed if it's switched on. Also refer <a href="http://www.hp.com/cgi-bin/cposupport/get_doc.pl?SNI=hpscanjet320506&LC=scanners&Tfile=nps05042" target="_blank">here</a> for troubleshooting
  9564. [hplampc]
  9565. Filename=hplampc.exe
  9566. Confirmed=U
  9567. Description=HP Scanner Lamp Utility - fixes an issue with the scanner lamp not going off
  9568. [hplaptopgamesactivemenu]
  9569. Filename=ActiveMenu.exe
  9570. Confirmed=U
  9571. Description=Wild Tangent demo games that come with some HP computers. Unchecking it can prevent the games from running occasionally. Note that WildTanget's privacy policy used to state that they also collect and share individuals information but this is no longer the case
  9572. [hplj config]
  9573. Filename=SetConfig.exe
  9574. Confirmed=Y
  9575. Description=Connects system to networked HP printer.
  9576. [hplogifinder]
  9577. Filename=hp_finder.exe
  9578. Confirmed=U
  9579. Description=HP LogiFinder helps detect and allows the use of the centre button for the Logitech mouse. Can be disabled if not used
  9580. [hpmmkbd]
  9581. Filename=HpMmKbd.exe
  9582. Confirmed=U
  9583. Description=HPÆs multimedia keyboard driver which enables the end-user to use the automation features of the HP multimedia keyboard
  9584. [hpnt]
  9585. Filename=hpdll.exe
  9586. Confirmed=X
  9587. Description=Malware - detected by <a href="http://www.kaspersky.com/personalpro" target=_blank>Kaspersky</a> antivirus as Trojan-Downloader.Win32.VB.ku
  9588. [hpodblia]
  9589. Filename=hpodblia.exe
  9590. Confirmed=N
  9591. Description=HP OfficeJet Scan Button Monitor on a multi-function printer/copier/scanner. Start your scanning software manually
  9592. [hpoddt01.exe]
  9593. Filename=N/A
  9594. Confirmed=N
  9595. Description=Installed by the "HP Photo and Imaging Director" software. If you ask for the imaging software, this program will be started
  9596. [hpodlb08]
  9597. Filename=hpodlb08.exe
  9598. Confirmed=N
  9599. Description=HP OfficeJet Scan Button Monitor on a multi-function printer/copier/scanner. Start your scanning software manually
  9600. [hpotdd01.exe]
  9601. Filename=hpotdd01.exe
  9602. Confirmed=Y
  9603. Description=Detection of new imaging, printing and other peripherals on HP machines such as USB printers, cameras and Bluetooth products. "This program is a non-essential process, but should not be terminated unless suspected to be causing problems"
  9604. [hpppta]
  9605. Filename=HPPPTA.exe
  9606. Confirmed=Y
  9607. Description=HP parallel port driver for certain hardware
  9608. [hpprinter]
  9609. Filename=hpserver.exe
  9610. Confirmed=X
  9611. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojcmjspyw.html" target=_blank>CMJSPY-W</a> TROJAN!
  9612. [hppropty]
  9613. Filename=HPPROPTY.EXE
  9614. Confirmed=N
  9615. Description=<a href="http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=bpl05860&locale=en_US&docId=35185" target="_blank">HP LaserJet Toolbox</a>
  9616. [hppwrsav]
  9617. Filename=HPPWRSAV.EXE
  9618. Confirmed=U
  9619. Description=Power save related for HP Scanners. Many users have complained of system freezes with it running but it stops the light from remaining on all the time. Try <a href="http://www.hp.com">www.hp.com</a>, pick your OS option under the SUPPORT tab, follow the instructions and you will find an updated lamp control patch
  9620. [hpqcmon]
  9621. Filename=hpqcmon.exe
  9622. Confirmed=?
  9623. Description=<font color="#FF0000">From HP and related to digital imaging</font>
  9624. [hpscanmonitor]
  9625. Filename=hpsjvxd.exe
  9626. Confirmed=U
  9627. Description=HP scanning software that enables you to scan images from your scanner. Needed if you're using the scanner
  9628. [hpscannerfirstboot]
  9629. Filename=scannerfb.exe
  9630. Confirmed=?
  9631. Description=<font color="#FF0000">HP scanner related</font>
  9632. [hpsjbmgr]
  9633. Filename=hpsjbmgr.exe
  9634. Confirmed=N
  9635. Description=HP ScanJet Button Manager. It allows users of the HPScanJet scanners to indicate what the buttons on the scanner will do automatically if pushed. Not required at startup, unless the scanner is used every day, such as in a business environment
  9636. [hpstart]
  9637. Filename=hpstart.wsf
  9638. Confirmed=N
  9639. Description=This a script used by HP that runs the first time one of their computers is started. Can't imagine why it would be starting up after the first boot
  9640. [hpsysconf1]
  9641. Filename=[random filename]
  9642. Confirmed=X
  9643. Description=Added by a variant of the <a href="http://de.trendmicro-europe.com/enterprise/security_info/ve_detail.php?id=59209&VName=TROJ_VIVIA.A&VSect=T" target="_blank">VIVIA.A</a> TROJAN!
  9644. [hpsysdrv]
  9645. Filename=hpsysdrv.exe
  9646. Confirmed=U
  9647. Description=This item keeps track of how many times the system has been recovered and the times of the first and last recoveries done on the system. Leaving unchecked will sometimes prevent the Keyboard Manager program from detecting that the computer is an HP. Since this program/driver was only made to run on HP, if it can't tell that it is an HP it will not run. If unchecked, it can prevent the running of the Application Recovery CDs, the use of the multimedia keys, and the HP Instant Support. Also seen that without it running, the Riptide Sound card that was installed on some older HP computers stops working
  9648. [hpu]
  9649. Filename=ProvenTactics.exe
  9650. Confirmed=N
  9651. Description=<a href="http://www.proventactics.com/" target="_blank">Proven Internet Marketing</a> software
  9652. [hpwirelessassistant]
  9653. Filename=HP Wireless Assistant.exe
  9654. Confirmed=U
  9655. Description=The HP Wireless Assistant is a user application that provides a way to control the enablement of individual wireless devices (such as Bluetooth or WLAN devices) and that shows the state of the radios for these wireless devices
  9656. [hpzts04]
  9657. Filename=hpzts04.exe
  9658. Confirmed=N
  9659. Description=Hewlett Packard printer toolbox shortcut that resides in the system tray
  9660. [hp_dla]
  9661. Filename=dlatray.exe
  9662. Confirmed=N
  9663. Description=On HP PCs, tray icon for dla - which provides drive letter access to HP's and Veritas' version of DirectCD
  9664. [hr]
  9665. Filename=Hr.exe
  9666. Confirmed=U
  9667. Description=<a href="http://sarc.com/avcenter/venc/data/spyware.hiddenrecorder.html" target=_blank>HiddenRecorder</a> periodically takes screenshots of the computer. If you didn't install this yourself remove it
  9668. [href.ocx]
  9669. Filename=regsvr32.exe ....HREF.OCX
  9670. Confirmed=U
  9671. Description=HREF.OCX is an ActiveX control developed by xFX JumpStart and used to provide HTML-alike clickable links on Windows-based programs such as <a href="http://software.xfx.net/utilities/popupkiller/index.php" target="_blank">PopUpKiller</a>
  9672. [hrn_qtv]
  9673. Filename=hrnsvc32.exe
  9674. Confirmed=X
  9675. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32sdbotaet.html" target=_blank>SDBOT-AET</a> WORM!
  9676. [hslab logger]
  9677. Filename=logger.exe
  9678. Confirmed=U
  9679. Description=<a href="http://sarc.com/avcenter/venc/data/spyware.hslablogger.html" target=_blank>HSLABLogger</a> logs user activity and Internet activity. The gathered information can be sent to a predetermined email address. If you didn't install this yourself uninstall it
  9680. [hstrans]
  9681. Filename=hstrans.exe
  9682. Confirmed=U
  9683. Description=Homescan Internet Transporter - part of <a href="http://www2.acnielsen.com/products/cps_homescan.shtml" target=_blank>ACNielson Homescan</a>. Recognizes when the ACNielsen Homescan Scanner is attached to the computer and allows it to transmit scanner information to ACNielsen
  9684. [hti]
  9685. Filename=npdor.exe
  9686. Confirmed=U
  9687. Description=Appears in startup if you have chosen to participate in on survey by <a href="http://www.npdor.com/" target="_blank"> NPD Online Research</a>. Required for the survey to work correctly. Otherwise not required
  9688. [html help system]
  9689. Filename=hhs.pif
  9690. Confirmed=X
  9691. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotatb.html" target=_blank>RBOT-ATB</a> WORM!
  9692. [html32 help system]
  9693. Filename=hhs32.pif
  9694. Confirmed=X
  9695. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotate.html" target=_blank>RBOT-ATE</a> WORM!
  9696. [htpatch]
  9697. Filename=htpatch.exe
  9698. Confirmed=U
  9699. Description=HTpatch.exe is part of the SiS AGP patch - BUT unless your processor (and motherboard) supports HyperThreading (HT) and this feature is enabled it will actually SLOW your graphics card by around 6%
  9700. [htprotect]
  9701. Filename=AVprotect.exe
  9702. Confirmed=X
  9703. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.netsky.l@mm.html" target="_blank">NETSKY.L</a> WORM!
  9704. [http://www.lienvandekelder.com]
  9705. Filename=Lien Van de Kelder.exe
  9706. Confirmed=X
  9707. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32mytobeq.html" target=_blank>MYTOB-EQ</a> WORM!
  9708. [http://www.lienvandekelder.com/]
  9709. Filename=LienVandeKelder.exe
  9710. Confirmed=X
  9711. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32mytobeo.html" target=_blank>MYTOB-EO</a> WORM!
  9712. [https-ssl]
  9713. Filename=https.exe
  9714. Confirmed=X
  9715. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.hllw.moega.d.html" target="_blank">MOEGA.D</a> WORM!
  9716. [huhdir]
  9717. Filename=huhdir.exe
  9718. Confirmed=?
  9719. Description=<font color="#FF0000">??</font>
  9720. [huigezi]
  9721. Filename=HgzServer.exe
  9722. Confirmed=X
  9723. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.graybird.c.html" target="_blank">GRAYBIRD.C</a> TROJAN!
  9724. [hvid]
  9725. Filename=Hvid.exe
  9726. Confirmed=X
  9727. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/trojan.gema.html" target="_blank">GEMA</a> TROJAN!
  9728. [hwinst]
  9729. Filename=N/A
  9730. Confirmed=Y
  9731. Description=For Gilat Communications internet satellite systems. Gilat rescue (Satellite system restore). Required if you have this system. Can cause a BSOD (blue screen of death) if left out
  9732. [hwp]
  9733. Filename=system_wc.exe
  9734. Confirmed=X
  9735. Description=Added by <a href="http://www.symantec.com/avcenter/venc/data/adware.eziin.html" target=_blank>Eziin</a> adware
  9736. [hxadsec]
  9737. Filename=[path to trojan]
  9738. Confirmed=X
  9739. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojadclickap.html" target=_blank>ADCLICK-AP</a> TROJAN!
  9740. [hxdl.exe]
  9741. Filename=HXDL.EXE
  9742. Confirmed=X
  9743. Description=Attune HelpExpress - spyware. Disable and uninstall - see <a href="http://www.c-squad.org/hxdl.html" target="_blank">here</a>
  9744. [hxiul.exe]
  9745. Filename=HXIUL.EXE
  9746. Confirmed=X
  9747. Description=Attune HelpExpress - spyware. Disable and uninstall - see <a href="http://www.c-squad.org/hxdl.html" target="_blank">here</a>
  9748. [hydarvisiondesktopmanager]
  9749. Filename=desk95.exe
  9750. Confirmed=U
  9751. Description=ATI's HydraVision desktop management software, allowing for multi-monitor support, as included in ATI HydraVision versions 2.5 and earlier. Has been reported to cause problems, such as <a href="http://support.microsoft.com/?id=810937" target=_blank>this one</a>. HydraVision can be uninstalled through Add/Remove Programs
  9752. [hydravisiondesktopmanager]
  9753. Filename=desk98.exe
  9754. Confirmed=U
  9755. Description=ATI/Appian HydraVision Desktop Manager software - monitors and regulates window and dialog box placement according to user preferences when using a multi monitor setup
  9756. [hydravisionviewport]
  9757. Filename=viewport.exe
  9758. Confirmed=U
  9759. Description=ATI/Appian HydraVision Desktop Manager software - monitors and regulates window and dialog box placement according to user preferences when using a multi monitor setup
  9760. [hyper start]
  9761. Filename=instantmsgrs.exe
  9762. Confirmed=X
  9763. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotnh.html" target=_blank>RBOT-NH</a> WORM!
  9764. [i-worm.gigu]
  9765. Filename=uGiG.eXe
  9766. Confirmed=X
  9767. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.gink.worm.html" target="_blank">GINK</a> WORM!
  9768. [i/o controllers]
  9769. Filename=svcnet.exe
  9770. Confirmed=X
  9771. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojtibikb.html" target=_blank>TIBIK-B</a> TROJAN!
  9772. [i386]
  9773. Filename=I386.exe
  9774. Confirmed=X
  9775. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.mypower.b@mm.html" target="_blank"> MYPOWER</a> WORM!
  9776. [i81shell]
  9777. Filename=I81SHELL.exe
  9778. Confirmed=?
  9779. Description=<font color="#FF0000">Appears to be related to drivers for an Intel 810 graphics chipset on an ASUS motherboard</font>
  9780. [i8kfangui]
  9781. Filename=i8kfangui.exe
  9782. Confirmed=U
  9783. Description=Graphical interface for fan speed control
  9784. [iaanotif]
  9785. Filename=iaanotif.exe
  9786. Confirmed=U
  9787. Description=IAA Event Monitor User Notification Tool - part of <a href="http://www.intel.com/support/chipsets/iaa/" target="_blank"> Intel?Application Accelerator</a> - "a performance software package for desktop PCs using select Intel?chipsets" that "replaces the ATA drivers that come with Windows with drivers optimized for desktop and mobile PCs." If you use the RAID version it's required to notify you if a RAID 1 disk has failed
  9788. [iamapp]
  9789. Filename=iamapp.exe
  9790. Confirmed=Y
  9791. Description=AtGuard personal firewall engine. As Atguard was bought by Symantec some time ago, it's now the Norton Personal Firewall executable as well
  9792. [iamnacho on irc.musirc.com is a homosexual!]
  9793. Filename=XBox64.exe
  9794. Confirmed=X
  9795. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.randex.y.html" target="_blank">RANDEX.Y</a> WORM!
  9796. [iap]
  9797. Filename=iap.exe
  9798. Confirmed=?
  9799. Description=<font color="#FF0000">Possibly part of <a href="http://docs.us.dell.com/docs/software/smcliins/cli60/en/ug/intro.htm" target="_blank">Dell OpenManage Client Instrumentation</a> - software that allows remote management application programs to access information about, monitor the status of or change the state of the client computer, such as shutting it down remotely?</font>
  9800. [ias]
  9801. Filename=ias.exe
  9802. Confirmed=U
  9803. Description=<a href="http://www.symantec.com/avcenter/venc/data/spyware.invisibleaspy.html" target= blank>InvisibleASpy</a> keystroke logger/monitoring program - remove unless you installed it yourself!
  9804. [iashlpr]
  9805. Filename=IASHLPR.EXE
  9806. Confirmed=X
  9807. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_OPASERV.T" target="_blank">OPASERV.T</a> WORM!
  9808. [ibin]
  9809. Filename=[path to trojan]
  9810. Confirmed=X
  9811. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojperdac.html" target=_blank>PERDA-C</a> TROJAN!
  9812. [ibm]
  9813. Filename=ibm.exe
  9814. Confirmed=X
  9815. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojlegmirah.html" target=_blank>LEGMIR-AH</a> TROJAN!
  9816. [ibm warranty notification]
  9817. Filename=ERTS0749.exe
  9818. Confirmed=?
  9819. Description=IBM Warranty Notification - <font color="#FF0000">presumably it's a reminder to either register or that warranty is about to expire?</font>
  9820. [ibmmessages]
  9821. Filename=ibmmessages.exe
  9822. Confirmed=N
  9823. Description=Allows IBM to push messages onto users' computers. Quote: "The Access IBM Message Center can display messages to inform you about software and solutions available from IBM as well as messages from IBM eSupport"
  9824. [ibmmon.exe]
  9825. Filename=Ibmmon.exe
  9826. Confirmed=?
  9827. Description=<font color="#FF0000">??</font>
  9828. [ibmpmsvc]
  9829. Filename=ibmpmsvc.exe
  9830. Confirmed=U
  9831. Description=Power management driver for IBM laptops. Provides support for the use of four keys on the thinkpad keyboard with blue key tops - Fn, F3, F4 & F12 - which have specific functions to control the standby and hibernate buttons. Not required if you don't plan to go into standy or hibernate modes
  9832. [ibmultrabayhotswapcplloader]
  9833. Filename=IBMBAY2N.EXE
  9834. Confirmed=U
  9835. Description=Supports hot swapping in Thinkpad UltraBay Option on IBM ThinkPad laptops
  9836. [ibmultrabayhotswapsound]
  9837. Filename=IBMBAYSN.EXE
  9838. Confirmed=?
  9839. Description=<font color="#FF0000">Supports hot swapping in Thinkpad UltraBay Option on IBM ThinkPad laptops. Is it needed though - does it just play a sound?</font>
  9840. [ibwin background process]
  9841. Filename=IBackground.exe
  9842. Confirmed=U
  9843. Description=<a href="http://www.ibackup.com/ibwin_new.htm" target=_blank>IBackup</a> for Windows
  9844. [ibwin monitor]
  9845. Filename=IBMonitor.exe
  9846. Confirmed=U
  9847. Description=<a href="http://www.ibackup.com/ibwin_new.htm" target=_blank>IBackup</a> for Windows
  9848. [icabar]
  9849. Filename=icabar.exe
  9850. Confirmed=Y
  9851. Description=Related to Citrix MetaFrame
  9852. [icasserv]
  9853. Filename=icasServ.exe
  9854. Confirmed=X
  9855. Description=Browser hijacker, redirecting to Searchforfree.info. Also detected as the <a href="http://www.sophos.com/virusinfo/analyses/trojicaserva.html" target= blank>ICASERV-A</a> TROJAN!
  9856. [iccontrol]
  9857. Filename=iccontrol.exe
  9858. Confirmed=X
  9859. Description=Added by the <a href="http://www.symantec.com/avcenter/venc/data/dialer.iccontrol.html" target=_blank>ICcontrol</a> premium rate adult content dialer
  9860. [icdd7ee6]
  9861. Filename=rundll32.exe [path] icdd7ee6.dll, EnableRunDLL32
  9862. Confirmed=X
  9863. Description=<a href="http://www.spywareguide.com/product_show.php?id=853" target="_blank">LZIO.com</a> adware downloader
  9864. [icddefff]
  9865. Filename=rundll32.exe [path] icddefff.dll, EnableRunDLL32
  9866. Confirmed=X
  9867. Description=<a href="http://www.spywareguide.com/product_show.php?id=853" target=_blank>LZIO.com</a> adware downloader
  9868. [ich synth]
  9869. Filename=eusexe.exe
  9870. Confirmed=N
  9871. Description=Sound related and can be disabled without affecting performance although advanced sound features may be sacrificed. <font color="#FF0000">May be related to Compaq PC's with "SoundMAX integrated Digital Audio" (Analog Devices Inc.) devices</font>
  9872. [icifati]
  9873. Filename=yujixit.exe
  9874. Confirmed=X
  9875. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_SDBOT.ZZH&VSect=P" target=_blank>SDBOT.ZZH</a> WORM!
  9876. [iclean]
  9877. Filename=iClean.exe
  9878. Confirmed=U
  9879. Description=<a href="http://www.nsclean.com/ieclean.html" target="_blank">IEClean</a> - "advanced, comprehensive package of tools which perform a number of functions to allow you to control your online privacy"
  9880. [icm]
  9881. Filename=ICM.EXE
  9882. Confirmed=Y
  9883. Description=Starts Internet Call Manager dialog box and/or taskbar icons at bootup. This is a subscription program from internetcallmanager.com that monitors a dialup phone line for incoming calls and handles voicemail
  9884. [icn]
  9885. Filename=NAG.EXE
  9886. Confirmed=N
  9887. Description=<a href="http://www.rocketdownload.com/Details/Inte/4948.htm" target="_blank">iChoose</a> - shopping browser enhancement that alerts you to cheaper deals for goods you want to buy, if they exist
  9888. [ico]
  9889. Filename=ICO.EXE
  9890. Confirmed=N
  9891. Description=Found on a Sony Vaio laptop and seems to be related to Mouse Suite 98 Daemon according to the properties. Appears to cause a behaviour where the desktop suddenly flips back up when playing DirectX associated games
  9892. [icon animation]
  9893. Filename=HDE.EXE
  9894. Confirmed=N
  9895. Description=Part of McAfee Nuts & Bolts. Provides entertaining animation of your desktop icons
  9896. [icon hearit 95]
  9897. Filename=hearit95.exe
  9898. Confirmed=N
  9899. Description=Audio desktop customization utility from Moon Valley Software. Resource hog
  9900. [icon hearit 98]
  9901. Filename=hearit98.exe
  9902. Confirmed=N
  9903. Description=Audio desktop customization utility from Moon Valley Software. Resource hog
  9904. [icon lptt01]
  9905. Filename=icon.exe
  9906. Confirmed=X
  9907. Description=<a href="http://www.wilderssecurity.net/specialinfo/rapidblaster.html" target="_blank">RapidBlaster</a> variant (in a "Icon" folder in Program Files). Recommended you use RapidBlaster Killer to uninstall - see <a ref="http://www.wilderssecurity.net/specialinfo/rapidblaster.html#removal" target="_blank"> here</a>
  9908. [icon ml097e]
  9909. Filename=icon.exe
  9910. Confirmed=X
  9911. Description=<a href="http://www.wilderssecurity.net/specialinfo/rapidblaster.html" target="_blank">RapidBlaster</a> variant (in a "Icon" folder in Program Files). Recommended you use RapidBlaster Killer to uninstall - see <a ref="http://www.wilderssecurity.net/specialinfo/rapidblaster.html#removal" target="_blank"> here</a>
  9912. [iconclnt]
  9913. Filename=iconclnt.exe
  9914. Confirmed=Y
  9915. Description=APC PowerChute Tray Icon. Associated with the <a href="#UPS"> UPS</a> listing
  9916. [icondesk]
  9917. Filename=ICONDESK.EXE
  9918. Confirmed=U
  9919. Description=Small utility which will allow you the option of hiding or showing your desktop icons
  9920. [iconfig.exe]
  9921. Filename=Iconfig.exe
  9922. Confirmed=N
  9923. Description=Icon for LS-120 "Superdisk"
  9924. [iconfigloader]
  9925. Filename=DIIhost.exe
  9926. Confirmed=X
  9927. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.hllw.gaobot.ao.html" target="_blank">GAOBOT.AO</a> WORM!
  9928. [iconoid]
  9929. Filename=Iconoid.exe
  9930. Confirmed=N
  9931. Description=<a href="http://www.sillysot.com/index.html" target="_blank">Iconoid</a> is a desktop icon manager
  9932. [iconsaver]
  9933. Filename=Iconsaver.exe
  9934. Confirmed=N
  9935. Description=<a href="http://www.iconsaver.com/index.html" target="_blank">IconSaver</a> is a desktop icon manager
  9936. [icq]
  9937. Filename=ICQNET.vbs
  9938. Confirmed=X
  9939. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/vbsgormleza.html" target=_blank>GORMLEZ-A</a> WORM!
  9940. [icq center]
  9941. Filename=[path to worm]
  9942. Confirmed=X
  9943. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.randin.html" target="_blank">RANDIN</a> WORM!
  9944. [icq chat service]
  9945. Filename=icqjdhs.exe
  9946. Confirmed=X
  9947. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target= blank>RBOT</a> WORM!
  9948. [icq hacking pro]
  9949. Filename=ICQpro.exe
  9950. Confirmed=X
  9951. Description=Added by a variant of the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=TROJ_NETSPY" target="_blank">NETSPY</a> TROJAN!
  9952. [icq lite]
  9953. Filename=ICQLite.exe
  9954. Confirmed=N
  9955. Description=<a target="_blank" href="http://www.icq.com/download/">ICQ Lite</a> - compact version of the popular messaging program
  9956. [icq lite messenger]
  9957. Filename=[random filename]
  9958. Confirmed=X
  9959. Description=Added by an unidentified VIRUS, WORM or TROJAN! Unlike the legitimate ICQ Lite executable, which will be located in the ICQLITE folder in Program Files, this particular impostor is located in the Windows or Winnt\System32 directory
  9960. [icq messenger 2002]
  9961. Filename=ICQ2002.exe
  9962. Confirmed=X
  9963. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32sdbotabl.html" target=_blank>SDBOT-ABL</a> WORM!
  9964. [icq net]
  9965. Filename=winlogon.exe
  9966. Confirmed=X
  9967. Description=Added by variants of the NETSKY WORMS! Note - this is not the legitimate <a href="http://www.liutilities.com/products/wintaskspro/processlibrary/winlogon/" target="_blank">winlogon.exe</a> process which should not appear in Msconfig/Startup!
  9968. [icq plus]
  9969. Filename=vplus.exe
  9970. Confirmed=N
  9971. Description=<a href="http://www.icqplus.org" target="_blank">ICQ Plus</a> is a freeware utility makes your ICQ skinnable (change the look). Available via Start -> Programs
  9972. [icqnet]
  9973. Filename=winlogon.exe
  9974. Confirmed=X
  9975. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32netskyc.html" target=_blank>NETSKY-C</a> WORM! Note - this is not the legitimate <a href="http://www.liutilities.com/products/wintaskspro/processlibrary/winlogon/" target=_blank>winlogon.exe</a> process, which should not appear in Msconfig/Startup and is always located in the System32 folder. This file is placed in the Windows or Winnt folder
  9976. [icrosof avps32 control]
  9977. Filename=av32.pif
  9978. Confirmed=X
  9979. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotavc.html" target=_blank>RBOT-AVC</a> WORM!
  9980. [icrosoft visual]
  9981. Filename=plscx.exe
  9982. Confirmed=X
  9983. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotayo.html" target=_blank>RBOT-AYO</a> WORM!
  9984. [icrosoft visual interdevc]
  9985. Filename=zvslmqb.exe
  9986. Confirmed=X
  9987. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotayp.html" target=_blank>RBOT-AYP</a> WORM!
  9988. [icrosoft windows dll services configuration]
  9989. Filename=poker3.exe
  9990. Confirmed=X
  9991. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32sdbotaer.html" target=_blank>SDBOT-AER</a> WORM!
  9992. [icrosoftf avpx control]
  9993. Filename=avpx.exe
  9994. Confirmed=X
  9995. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotayn.html" target=_blank>RBOT-AYN</a> WORM!
  9996. [icsdclt]
  9997. Filename=rundll32.exe Icsdclt.dll, ICSClient
  9998. Confirmed=U
  9999. Description=Internet Connection Sharing allows more than one computer to simultaneously access the internet with a single connection. Also required when networking two machines
  10000. [icserver]
  10001. Filename=Icserver.exe
  10002. Confirmed=N
  10003. Description=Intel Intercast viewer software. Gives access to selected internet pages which are broadcasted by several TV stations
  10004. [icsmgr]
  10005. Filename=ICSMGR.EXE
  10006. Confirmed=Y
  10007. Description=Monitors DNS and DHCP requests for ICS (Internet Connection Sharing). Needed if youÆre sharing the internet on various computers
  10008. [ic_key_3]
  10009. Filename=spvic.exe
  10010. Confirmed=N
  10011. Description=<a href="http://www.instantchess.com/?SN=Z4dMzyutgpE9Pspv&ABT=3" target="_blank">Instant Chess</a> related
  10012. [id commander]
  10013. Filename=IDCom.exe
  10014. Confirmed=N
  10015. Description=Caller ID utility for identifying incoming telephone numbers
  10016. [ida]
  10017. Filename=IDA.EXE
  10018. Confirmed=?
  10019. Description=<font color="#FF0000">HP related - in a Program FilesHewlett-PackardPC COE folder</font>
  10020. [ide]
  10021. Filename=ide.exe
  10022. Confirmed=X
  10023. Description=Added by the <a href="http://www.symantec.com/avcenter/venc/data/backdoor.assasin.f.html" target="_blank">ASSASIN.F</a> TROJAN!
  10024. [ide loader]
  10025. Filename=IDElibr32.exe
  10026. Confirmed=X
  10027. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.xilon.trojan.html" target="_blank">XILON</a> TROJAN! Related to the game "Diablo II"
  10028. [idecntl]
  10029. Filename=idecntl.exe
  10030. Confirmed=X
  10031. Description=Added by a variant of the <a href="http://www.sophos.com/virusinfo/analyses/trojcrypterc.html" target="_blank">CRYPTER.C</a> TROJAN!
  10032. [idesktop]
  10033. Filename=idesktop.exe
  10034. Confirmed=U
  10035. Description=<a href="http://www.immersion.com/products/ce/generaldownloads.shtml" target="_blank">Immersion TouchWare Desktop</a> software for devices such as the Logitech iFeel Mouse
  10036. [idman]
  10037. Filename=IDMan.exe
  10038. Confirmed=N
  10039. Description=<a href="http://www.internetdownloadmanager.com/" target="_blank">Internet Download Manager</a> - download files faster, schedule and resume
  10040. [idw logging tool]
  10041. Filename=idwlog.exe
  10042. Confirmed=N
  10043. Description=Added with WinXP SP1. Usually only found in internal builds only to indicate the current build being used. Can cause slow network logon problems
  10044. [ie configure]
  10045. Filename=explorer.exe
  10046. Confirmed=X
  10047. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojlineagec.html" target=_blank>Lineage-C</a> TROJAN! Note - the legitimate Windows Explorer (explorer.exe) is located in the Windows or Winnt folder and would only be in startups if you added it manually
  10048. [ie doctor]
  10049. Filename=IEDoctor.exe
  10050. Confirmed=U
  10051. Description=IE Doctor Toolbar - "IE Doctor can help you to Repair IE easily, protect IE and OE from all malicious changes. It can Repair the HomePage, context menu, IE toolbar button, startup items, Favorites, typed URLs and the entire Internet Options"
  10052. [ie java update]
  10053. Filename=iejava.exe
  10054. Confirmed=X
  10055. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojagenthd.html" target=_blank>AGENT-HD</a> TROJAN!
  10056. [ie menu extension toolbar]
  10057. Filename=rundll32.exe [path] tbextn.dll DllShowTB
  10058. Confirmed=X
  10059. Description=Topconverting.com/180Search "IEMenuExtension" toolbar
  10060. [ie new window maximizer]
  10061. Filename=iemaximizer.exe
  10062. Confirmed=U
  10063. Description=<a href="http://www.jiisoft.com/iemaximizer/" target=_blank>IE New Window Maximizer</a> - automatically maximize new Internet Explorer and Outlook Express windows
  10064. [ie runtime]
  10065. Filename=wini.exe
  10066. Confirmed=X
  10067. Description=Added by the <a href="http://www.symantec.com/avcenter/venc/data/w32.picrate.b@mm.html" target=_blank>PICRATE.B</a> WORM!
  10068. [ie runtimes]
  10069. Filename=winis.exe
  10070. Confirmed=X
  10071. Description=Added by the a href="http://www.sophos.com/virusinfo/analyses/w32rbotadz.html" target=_blank>RBOT-ADZ</a> TROJAN!
  10072. [ieagent update check]
  10073. Filename=iewatch.exe
  10074. Confirmed=X
  10075. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/trojan.bomka.html" target=_blank>BOMKA</a> TROJAN!
  10076. [iecleanaux]
  10077. Filename=Ieboot6.exe
  10078. Confirmed=U
  10079. Description=<a href="http://www.nsclean.com/ieclean.html" target="_blank">IEClean</a> by Kevin McAleavy - cookie manager, cache cleaner, history cleaner, etc. Performs cleaning tasks at startup
  10080. [iedll]
  10081. Filename=iedll.exe
  10082. Confirmed=X
  10083. Description=Homepage hijacker, redirecting to coolwwwsearch.com
  10084. [ieengine]
  10085. Filename=IEeng.exe
  10086. Confirmed=X
  10087. Description=<a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=TROJ_STARTPAG.AI" target="_blank">STARTPAG.AI</a> hijacker
  10088. [ieexec.exe]
  10089. Filename=ieexec.exe
  10090. Confirmed=X
  10091. Description=Added by an unidentified WORM or TROJAN!
  10092. [iefxtray]
  10093. Filename=IefxTray.exe
  10094. Confirmed=X
  10095. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojrilerh.html" target=_blank>RILER-H</a> TROJAN!
  10096. [ieharv.exe]
  10097. Filename=ieharv.exe
  10098. Confirmed=X
  10099. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojbankerhh.html" target=_blank>BANKER-HH</a> TROJAN!
  10100. [iehelper]
  10101. Filename=syslaunch.exe
  10102. Confirmed=X
  10103. Description=Outwar adware downloader
  10104. [iel2cde8]
  10105. Filename=rundll32.exe [path] iel2cde8.dll, EnableRunDLL32
  10106. Confirmed=X
  10107. Description=<a href="http://www.spywareguide.com/product_show.php?id=853" target="_blank">LZIO.com</a> adware downloader
  10108. [ielcaabe]
  10109. Filename=rundll32.exe [path] ielcaabe.dll, EnableRunDLL32
  10110. Confirmed=X
  10111. Description=<a href="http://www.spywareguide.com/product_show.php?id=853" target=_blank>LZIO.com</a> adware downloader
  10112. [ieloader32]
  10113. Filename=iexplore32.exe
  10114. Confirmed=X
  10115. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.spex.worm.html" target="_blank"> SPEX</a> or <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.spex.b.worm.html" target="_blank"> SPEX.B</a> WORMS!
  10116. [iesar]
  10117. Filename=Iesar.exe
  10118. Confirmed=X
  10119. Description=Browser hijacker - redirecting to an adult web page
  10120. [iesearch.exe]
  10121. Filename=Iesearch.exe
  10122. Confirmed=X
  10123. Description=<a href="http://sarc.com/avcenter/venc/data/pf/adware.looknsearch.html" target="_blank">LookNSearch</a> adware
  10124. [iestart]
  10125. Filename=iexp1orer.exe
  10126. Confirmed=X
  10127. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.nemog.c.html" target="_blank">NEMOG.C</a> TROJAN!
  10128. [ietsr]
  10129. Filename=ietsr.exe
  10130. Confirmed=N
  10131. Description=<a href="http://www.nsclean.com/ieclean.html" target="_blank">IEClean</a> by Kevin McAleavy - cookie manager, cache cleaner, history cleaner, etc
  10132. [iexpl0rer]
  10133. Filename=IEXPL0RER.EXE
  10134. Confirmed=X
  10135. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32agobotql.html" target= blank>AGOBOT-QL</a> WORM!
  10136. [iexpl0res]
  10137. Filename=iexpl0res.exe
  10138. Confirmed=X
  10139. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_RBOT.AEX&VSect=T" target=_blank>RBOT.AEX</a> WORM! Note - this malware actually changes the default value data of the Registry "Run" key in order to force Windows to launch it at boot
  10140. [iexploit]
  10141. Filename=Iexploit.html
  10142. Confirmed=X
  10143. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/vbs.inker.b@mm.html" target=_blank>INKER.B</a> WORM!
  10144. [iexplore services]
  10145. Filename=iexplore.exe
  10146. Confirmed=X
  10147. Description=Added by an unidentified VIRUS, WORM or TROJAN! Note - this is not the legitimate Internet Explorer <a href="http://www.liutilities.com/products/wintaskspro/processlibrary/iexplore/" target=_blank>iexplore.exe</a> process which is always located in the Program Files\Internet Explorer folder and should not normally figure in Msconfig/Startup!
  10148. [iexplorer lptt01]
  10149. Filename=iexplorer.exe
  10150. Confirmed=X
  10151. Description=<a href="http://www.wilderssecurity.net/specialinfo/rapidblaster.html" target="_blank">RapidBlaster</a> variant (in a "iexplorer" folder in Program Files). Recommended you use RapidBlaster Killer to uninstall - see <a ref="http://www.wilderssecurity.net/specialinfo/rapidblaster.html#removal" target="_blank"> here</a>
  10152. [iexplorer ml097e]
  10153. Filename=iexplorer.exe
  10154. Confirmed=X
  10155. Description=<a href="http://www.wilderssecurity.net/specialinfo/rapidblaster.html" target="_blank">RapidBlaster</a> variant (in a "iexplorer" folder in Program Files). Recommended you use RapidBlaster Killer to uninstall - see <a ref="http://www.wilderssecurity.net/specialinfo/rapidblaster.html#removal" target="_blank"> here</a>
  10156. [iexplorer.exe]
  10157. Filename=Iexplorer.exe
  10158. Confirmed=X
  10159. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojbancbanen.html" target=_blank>BANCBAN-EN</a> TROJAN!
  10160. [iexplorer32 java scripting]
  10161. Filename=IExplore32b.exe
  10162. Confirmed=X
  10163. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_RBOT.ABO&VSect=P" target=_blank>RBOT.ABO</a> WORM!
  10164. [iexplorer32c java scripting]
  10165. Filename=IExplore32cb.exe
  10166. Confirmed=X
  10167. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM RBOT.ABN&VSect=P" target= blank>RBOT.ABN</a> WORM!
  10168. [iexplorer6 java scripting]
  10169. Filename=IExplore326.exe
  10170. Confirmed=X
  10171. Description=Added by a variant of the <a href="http://vil.nai.com/vil/content/v_100454.htm" target=_blank>SDBOT</a> WORM!
  10172. [iexplorer7 java scripting]
  10173. Filename=IExplore327.exe
  10174. Confirmed=X
  10175. Description=Added by a variant of the <a href="http://vil.nai.com/vil/content/v_100454.htm" target=_blank>SDBOT</a> WORM!
  10176. [ifsplash.exe]
  10177. Filename=IFSplash.exe
  10178. Confirmed=U
  10179. Description=I-FORCE driver for force feedback steering wheel
  10180. [igfxtray]
  10181. Filename=igfxtray.exe
  10182. Confirmed=N
  10183. Description=Quick access to the control panel via a System Tray icon for graphics based upon the Intel chipsets (ie, i810). These chipsets are often included on motherboards. Available via Start -> Settings -> Control Panel
  10184. [iglpbv]
  10185. Filename=Iglpbv.exe
  10186. Confirmed=?
  10187. Description=<font color="#FF0000">??</font>
  10188. [igsex2x]
  10189. Filename=igsex2x.exe
  10190. Confirmed=X
  10191. Description=<a href="http://securityresponse.symantec.com/avcenter/venc/data/dialer.newdial.html" target=_blank>NewDial</a> premium rate adult content dialler
  10192. [ihp-100]
  10193. Filename=iHPDetect.exe
  10194. Confirmed=?
  10195. Description=Drive Letter Searcher, <a href="http://www.redchairsoftware.com/irivium/" target=_blank>iRiver</a> iHP-100 iHP and H Series player related - <font color="#FF0000">does it need to start with Windows every time?</font>
  10196. [iilc]
  10197. Filename=IILC.EXE
  10198. Confirmed=X
  10199. Description=Homepage hijacker
  10200. [iinl]
  10201. Filename=iptl.exe
  10202. Confirmed=X
  10203. Description=<a href="http://research.sunbelt-software.com/threat_display.cfm?name=ClickSpring.PuritySCAN&threatid=10115" target=_blank>PurityScan/Clickspring</a> adware
  10204. [iisvers]
  10205. Filename=iisvers.exe
  10206. Confirmed=X
  10207. Description=Added by an unidentified TROJAN or adware
  10208. [iiwiper]
  10209. Filename=Systemwiper.exe
  10210. Confirmed=N
  10211. Description=<a href="http://nn101.virtualave.net/clean.html" target="_blank">System Wiper</a> from iI Software - allows you to clear the history of your activites from you computer. Run manually on a regular basis
  10212. [ij75p2pserver]
  10213. Filename=IJ75P2PS.EXE
  10214. Confirmed=Y
  10215. Description=Printer utility which is required in order to make the printer work correctly
  10216. [ike service 95]
  10217. Filename=IKEService.exe
  10218. Confirmed=Y
  10219. Description=Associated with <a href="http://www.pgpi.org/" target="_blank">PGP</a>. The PGP Tray can be
  10220. [ikeyworks]
  10221. Filename=IKEYMAIN.EXE
  10222. Confirmed=U
  10223. Description=<a href="http://www.a4tech.com/a4techenglish/index.html" target="_blank">A4Tech</a> wireless keyboard driver and utility
  10224. [illegal]
  10225. Filename=Mplayer.exe
  10226. Confirmed=X
  10227. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_HOLAR.C" target="_blank">HOLAR.C</a> (or <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.galil@mm.html" target="_blank">GALIL</a>) WORM! Note - this should not be comfused with Windows Media Player which has the same filename
  10228. [illegal.exe]
  10229. Filename=Mplayer.exe
  10230. Confirmed=X
  10231. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_HOLAR.C" target="_blank">HOLAR.C</a> (or <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.galil@mm.html" target="_blank">GALIL</a>) WORM! Note - this should not be comfused with Windows Media Player which has the same filename
  10232. [ilo_office_manager]
  10233. Filename=IntEdReg.exe /OFFMAN
  10234. Confirmed=?
  10235. Description=<a href="http://www.intense.co.uk/" target="_blank">Intense Educational Ltd</a> - Language Office Software. <font color="#FF0000">Is it required?</font>
  10236. [ilyric]
  10237. Filename=iLyric.exe
  10238. Confirmed=U
  10239. Description=<a href="http://www.ilyric.net/winamp.html" target=_blank>iLyric</a> plugin for Winamp media player. Allows you to retrieve the lyrics for your songs with the press of a button
  10240. [im start center]
  10241. Filename=iM_Tray.exe
  10242. Confirmed=N
  10243. Description=Installed with the Sound Blaster Audigy range of soundcards. A radio tuner installed if the user chooses during installation. Available via Start -> Programs -> iM Networks -> iM Radio Tuner
  10244. [image]
  10245. Filename=rundll32 image.dll, Install
  10246. Confirmed=X
  10247. Description=<a href="http://cwshredder.net/cwshredder/cwschronicles.html" target=_blank>CoolWebSearch</a> parasite variant
  10248. [image & restore]
  10249. Filename=IMAGE32.exe
  10250. Confirmed=Y
  10251. Description=Part of McAfee Nuts & Bolts. Image/Restore can recover from drives that have been accidentally formatted or completely erased, if Image was recently run
  10252. [image transfer]
  10253. Filename=SonyTray.exe
  10254. Confirmed=N
  10255. Description=Sony Image Transfer software provides direct image transfer from your digital camera to a PC - can be started manually
  10256. [imagefox]
  10257. Filename=imagefox.exe
  10258. Confirmed=U
  10259. Description=<a href="http://www.acdsystems.com/English/Products/ImageFox/index.htm?LAN=EnglishX20" target="_blank">ImageFox 2.0</a> is an "add-on" graphics previewer for most Windows Open/Save As dialog boxes
  10260. [imagemgt32]
  10261. Filename=Imagemgt32.exe
  10262. Confirmed=X
  10263. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/trojan.gema.html" target="_blank">GEMA</a> TROJAN!
  10264. [imagepath]
  10265. Filename=taskbarmngr.exe
  10266. Confirmed=X
  10267. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32sdbotxb.html" target=_blank>SDBOT-XB</a> WORM!
  10268. [imapi]
  10269. Filename=load.exe
  10270. Confirmed=X
  10271. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojdowndela.html" target=_blank>DOWNDEL-A</a> TROJAN!
  10272. [imarkup client]
  10273. Filename=iUtil.exe
  10274. Confirmed=N
  10275. Description=Enables the <a href="http://www.imarkup.com/products/imarkup_client.asp" target=blank>iMarkup Client</a> web page annotation utility to run in the background and be available in systray. Shortcut available via Start -> Programs
  10276. [imclass]
  10277. Filename=Svhosl.exe
  10278. Confirmed=X
  10279. Description=Added by an unidentified WORM or TROJAN!
  10280. [imekrig]
  10281. Filename=imekrig.exe
  10282. Confirmed=N
  10283. Description=Part of MS <a href="http://www.microsoft.com/windows/ie/downloads/recommended/ime/default.asp" target="_blank">Input Method Editor</a> which is used to ease the input of Asian characters in MS Office (Chinese, Japanese and this one is Korean)
  10284. [imekrmig6.1]
  10285. Filename=IMEKRMIG.EXE
  10286. Confirmed=N
  10287. Description=Part of MS <a href="http://www.microsoft.com/windows/ie/downloads/recommended/ime/default.asp" target="_blank">Input Method Editor</a> which is used to ease the input of Asian characters in MS Office (Chinese, Japanese and this one is Korean)
  10288. [imesh]
  10289. Filename=??
  10290. Confirmed=N
  10291. Description=<a href="http://www.imesh.com" target="_blank">Imesh</a> is a file sharing system
  10292. [imesh auto update]
  10293. Filename=??
  10294. Confirmed=N
  10295. Description=Update check for the <a href="http://www.imesh.com" target=_blank>Imesh</a> file sharing system. Turn the update off under "options"
  10296. [imevtmgr.exe]
  10297. Filename=IMEvtMgr.exe
  10298. Confirmed=X
  10299. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojkeylogar.html" target=_blank>KEYLOG-AR</a> TROJAN!
  10300. [imgicon]
  10301. Filename=ImgIcon.exe
  10302. Confirmed=U
  10303. Description=Displays Iomega icons in Explorer/My Computer, ejects Zip disks on shutdown and displays a special delete confirmation box when deleting files on an Iomega drive. Available via Start -> Programs. If you disable it remember to eject disks first before powering the drive down - hence the "U" recommendation. Note - FreeCell may not run with ImgIcon running
  10304. [imgit]
  10305. Filename=[path to file]
  10306. Confirmed=X
  10307. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojbankerem.html" target=_blank>BANKER-EM</a> TROJAN!
  10308. [imgstart]
  10309. Filename=ImgStart.exe
  10310. Confirmed=N
  10311. Description=Used by Iomega drives. Details of its purpose can be found <a href="http://pw2.netcom.com/~deepone/zipjaz/ioware.html#startup" target="_blank">here</a>. Available via Start -> Programs
  10312. [immcheck.exe]
  10313. Filename=immcheck.exe
  10314. Confirmed=?
  10315. Description=<font color="#FF0000">Related to I-FORCE driver for force feedback steering wheel?</font>
  10316. [imol]
  10317. Filename=IMOLApp.exe
  10318. Confirmed=U
  10319. Description=IncrediMail for Office <a href="http://www.incredimail.com/english/help/sysadmin.html" target=_blank>Outlook Add-On</a>
  10320. [imonitor]
  10321. Filename=Plguni.exe
  10322. Confirmed=N
  10323. Description=<a href="http://www.mcafee.com/myapps/qc3/default.asp" target="_blank">McAfee QuickClean 3.0</a> - removes internet clutter and unwanted programs
  10324. [imstart]
  10325. Filename=IMStart.exe
  10326. Confirmed=U
  10327. Description=<a href="http://www.intermute.com/products/index.html" target=_blank>InterMute</a> security software related
  10328. [imwire]
  10329. Filename=imwireup.exe
  10330. Confirmed=X
  10331. Description=<a href="http://pestpatrol.com/pestinfo/s/safesurfing.asp" target=_blank>SafeSurfing</a> parasite variant
  10332. [incd]
  10333. Filename=incd.exe
  10334. Confirmed=Y
  10335. Description=Ahead <a href="http://www.nero.com/" target=_blank>InCD</a> packet writing software - similar to DirectCD. For Nero 5.0 or 5.5 (InCD3), it does not need to start with Windows. You can run InCD.exe manually before inserting an appropriately formatted CD-RW (CD-MRW) disk. For Nero 6.0, 6.3 or 6.6 (InCD4), it does need to start with Windows. It does not function correctly when you try to run it manually, and you will not have write access to MRW (Mount Rainier) formatted CD-RW (CD-MRW) or DVD-MRW disks. To regain write access and other features, InCD 4 must start with Windows
  10336. [incmail]
  10337. Filename=IncMail.exe
  10338. Confirmed=N
  10339. Description=<a href="http://www.incredimail.com/english/index.html" target="_blank">IncrediMail</a> is an advanced, feature-rich email program that offers you an unprecedented interactive experience. Unique multimedia features will enable you to tailor your email experience so that it fits your mood and personality
  10340. [incontrol desktop manager]
  10341. Filename=DMHKEY.EXE
  10342. Confirmed=N
  10343. Description=For Diamond Multimedia video cards. Allows System Tray access to desktop utilities such as screen resolution. Available via Start -> Programs
  10344. [index service]
  10345. Filename=dllhost32.exe
  10346. Confirmed=X
  10347. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_AGOBOT.CH&VSect=P" target=_blank>AGOBOT.CH</a> WORM!
  10348. [index washer]
  10349. Filename=WashIdx.exe
  10350. Confirmed=U
  10351. Description=<a href="http://www.webroot.com/products/windowwasher/" target="_blank">Windows Washer</a> from Webroot Software. Useful utility that deletes safe to remove files, cookies, browsing history, etc. Available via from Start -> Programs. Disable within the program options - otherwise it is re-enabled in MSCONFIG
  10352. [indexindicator]
  10353. Filename=Indexindicator.exe
  10354. Confirmed=X
  10355. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/trojan.lazar.html" target=_blank>LAZAR</a> TROJAN!
  10356. [indexsearch]
  10357. Filename=IndexSearch.exe
  10358. Confirmed=N
  10359. Description=Associated with PaperPort scanner software from ScanSoft
  10360. [ine]
  10361. Filename=svchosts.exe
  10362. Confirmed=X
  10363. Description=Added by the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=41546" target= blank>RBOT.BNL</a> WORM!
  10364. [inet database]
  10365. Filename=Inetdbs.exe
  10366. Confirmed=X
  10367. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.qeds@mm.html" target=_blank>QEDS</a> WORM!
  10368. [inetapi]
  10369. Filename=Netapi.exe
  10370. Confirmed=X
  10371. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=BKDR_NETDEVIL.14" target="_blank">NETDEVIL.14</a> TROJAN!
  10372. [inetcntrl]
  10373. Filename=inetcntrl.exe
  10374. Confirmed=U
  10375. Description=Bsafe Online - internet filter
  10376. [inetconf]
  10377. Filename=inetconf.exe
  10378. Confirmed=?
  10379. Description=<font color="#FF0000">??</font>
  10380. [inetd]
  10381. Filename=INETD32.EXE
  10382. Confirmed=U
  10383. Description=<a href="http://www.hummingbird.com/products/nc/inetd/index.html" target="_blank">Windows Inet Daemon</a> from Hummingbird Communications. "Hummingbird Inetd has the advanced ability to conserve PC resources by listening for connection requests and launching server daemons". Provides PCs with the full functionality of a UNIX workstation
  10384. [inetinfo.exe]
  10385. Filename=inetinfo.exe
  10386. Confirmed=U
  10387. Description=Executable used by MS Internet Information Server (IIS). If it's running, then so is IIS. Useful in knowing whether you require the patch for the Code Red worm. Comes with PWS (Personal Web Server) or NT4 and handles ASP-, PHP code (+ more)
  10388. [inetinfomon manager]
  10389. Filename=inetinfomon.exe
  10390. Confirmed=X
  10391. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=TROJ_DONBOMB.A&VSect=P" target=_blank>DONBOMB.A</a> TROJAN!
  10392. [inetmgr]
  10393. Filename=inetmgr.exe
  10394. Confirmed=X
  10395. Description=Actual Names <a href="http://www.pestpatrol.com/pestinfo/a/actualnames.asp" target="_blank">(AdvSearch)</a> Internet Keywords parasite
  10396. [inetmsn]
  10397. Filename=msnet.exe
  10398. Confirmed=X
  10399. Description=Added by a variant of the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.sdbot.html" target="_blank">SDBOT</a> TROJAN!
  10400. [info select]
  10401. Filename=is.exe
  10402. Confirmed=U
  10403. Description=<a href="http://www.miclog.com/isover.htm" target="_blank">Info Select</a> from Micro Logic - personal information manager
  10404. [info32x]
  10405. Filename=Info32x.exe
  10406. Confirmed=X
  10407. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/trojan.gema.html" target="_blank">GEMA</a> TROJAN!
  10408. [infopenmsn]
  10409. Filename=InfoPenIM.exe
  10410. Confirmed=U
  10411. Description=<a href="http://www.infopen.com.tw/english/es/" target=_blank>InfoPenMSN</a> is a MSN Messenger plugin that allows you to send data written/drawn by hand
  10412. [infoplay.exe]
  10413. Filename=Infoplay.exe
  10414. Confirmed=?
  10415. Description=<font color="#FF0000">Written by New Media Properties, LLC and you're asked if you want to download and install it if you visit one of their search engine <a href="http://www.allyoursearch.com/" target="_blank">websites</a> (which I chose not to). What does it do and is it needed?</font>
  10416. [information update]
  10417. Filename=iu.exe
  10418. Confirmed=X
  10419. Description=Reported by Kaspersky Anti-Virus as Downloader.Win32.Centim.ch TROJAN! Note - the file associated with this is located in the Program Files\Information Update folder
  10420. [infra-red monitor]
  10421. Filename=IRMON.EXE
  10422. Confirmed=U
  10423. Description=System Tray access to infra-red devices. Not required unless you use infra-red devices
  10424. [infus]
  10425. Filename=infus.exe
  10426. Confirmed=X
  10427. Description=Adult content dialler
  10428. [infuzer]
  10429. Filename=Infuzer.exe
  10430. Confirmed=U
  10431. Description=<a href="http://www.infuzer.com/IDC/features/" target="_blank">Infuzer</a> - "is a service that copies dates from the web or an email straight to your electronic calendar". Beware of the following adware trait - "Infuzer provides web site owners with a unique opportunity to communicate with their visitors in a way that is useful and relevant to them, as well as increasing return visits and brand awareness, and providing new e-commerce opportunities"
  10432. [infwin]
  10433. Filename=infwin.exe
  10434. Confirmed=X
  10435. Description=<a href="http://research.sunbelt-software.com/threat_display.cfm?name=VX2.Transponder&threatid=12517&search=vx2" target=_blank>VX2.Transponder</a> parasite updater/installer related
  10436. [init32]
  10437. Filename=Init32.exe
  10438. Confirmed=X
  10439. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.winex.a.trojan.html" target=_blank>WINEX.A</a> TROJAN!
  10440. [initial page]
  10441. Filename=install.exe
  10442. Confirmed=X
  10443. Description=EasySearch browser hijack installer
  10444. [initialize8x8]
  10445. Filename=8x8_init.exe
  10446. Confirmed=Y
  10447. Description=Tool that initializes a Pinnacle PCTV card - maybe in capture or in showing overlay
  10448. [injob]
  10449. Filename=injobs.exe
  10450. Confirmed=X
  10451. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/trojan.binjo.html" target=_blank>BINJO</a> TROJAN!
  10452. [ink monitor]
  10453. Filename=InkMonitor.exe
  10454. Confirmed=N
  10455. Description=Associated with Epson (and maybe other) printers. Tells you when the ink's running low and asks if you want to buy another cartridge on-line
  10456. [inkwatch]
  10457. Filename=InkWatch.exe
  10458. Confirmed=N
  10459. Description=Associated with Canon (and maybe other) printers. Tells you when the ink's running low and asks if you want to buy another cartridge on-line
  10460. [inorpc]
  10461. Filename=InoRpc.exe
  10462. Confirmed=Y
  10463. Description=Associated with <a href="http://www1.my-etrust.com/?CFID=6909348&CFTOKEN=43ce20d-0001f1aa-f6e5-1d77-be1e-2f0eac14303f" target="_blank">eTrust Antivirus/InoculateIT</a>
  10464. [inort]
  10465. Filename=InoRT9x.exe
  10466. Confirmed=Y
  10467. Description=Associated with the Realtime Monitor of <a href="http://www1.my-etrust.com/?CFID=6909348&CFTOKEN=43ce20d-0001f1aa-f6e5-1d77-be1e-2f0eac14303f" target="_blank">eTrust Antivirus/InoculateIT</a> version 6 virus scanners from Computer Associates. For NT/2K/XP users you may need a patch if seeing high CPU useage - see <a href="http://support.ca.com/techbases/ilnt/31103.html" target="_blank">here</a>
  10468. [inotask]
  10469. Filename=InoTask.exe
  10470. Confirmed=U
  10471. Description=Scheduled scans and signature updates for <a href="http://www1.my-etrust.com/?CFID=6909348&CFTOKEN=43ce20d-0001f1aa-f6e5-1d77-be1e-2f0eac14303f" target="_blank">eTrust Antivirus/InoculateIT</a> version 6 virus scanners from Computer Associates. Leave enabled unless you manually update signatures or perform routine scans. If enabled it can result in high CPU useage when performing updates - see <a href="http://support.ca.com/techbases/ilnt/31103.html" target="_blank">here</a>
  10472. [inscoa5]
  10473. Filename=insCOA5.exe
  10474. Confirmed=?
  10475. Description=<font color="#FF0000">??</font>
  10476. [instafinderk]
  10477. Filename=InstaFinderK inst.exe
  10478. Confirmed=X
  10479. Description=<a href="http://www.symantec.com/avcenter/venc/data/adware.instafinder.html" target=_blank>InstaFinder</a> adware
  10480. [install]
  10481. Filename=Install.exe
  10482. Confirmed=X
  10483. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojbancbanhg.html" target=_blank>BANCBAN-HG</a> TROJAN!
  10484. [install pending files]
  10485. Filename=sifxinst.exe
  10486. Confirmed=?
  10487. Description=Uninstall program for <a href="http://www.lanovation.com/" target="_blank">Lanovation's</a> Prism Deploy and Prism Pack adminstrators software deployement tools. For specific information see <font color="#FF0000"><a href="http://www.lanovation.com/support/docs/General/rollbackfiles_prism.htm" target="_blank">here</a>. Is it required?</font>
  10488. [installaurealdemos]
  10489. Filename=InstallAurealDemos.js
  10490. Confirmed=N
  10491. Description=Used to initialize the Aureal A3D demos InstallShield wizard
  10492. [installbuddy]
  10493. Filename=Ibtna.exe
  10494. Confirmed=U
  10495. Description=<a href="http://www.bluenomad.com/ib/prod_installbuddy_details.html" target="_blank">InstallBuddy</a> - automatically translates and installs your desktop documents, such as Adobe PDF, HTML, Microsoft Word, Excel and PowerPoint files, to your Palm organizer when you HotSync
  10496. [installed shell32.dll]
  10497. Filename=Office.exe...
  10498. Confirmed=X
  10499. Description=Added by a variant of the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.hllw.lovgate@mm.html" target="_blank">LOVGATE</a> WORM!
  10500. [installer]
  10501. Filename=dial.exe
  10502. Confirmed=X
  10503. Description=Malware - detected by <a href="http://www.kaspersky.com/personalpro" target=_blank>Kaspersky</a> antivirus as the AGENT.MM TROJAN!
  10504. [installnaiproduct]
  10505. Filename=SETUP.EXE
  10506. Confirmed=?
  10507. Description=<font color="#FF0000">Could be related to Network Associates Inc who own the McAfee VirusScan product amongst others. This was found in a directory called "VSC". Could it be an installation that failed and "SETUP.EXE" was left to run at startup as an error?</font>
  10508. [installs sp2]
  10509. Filename=[path] repcale.exe [path] palsp.exe
  10510. Confirmed=X
  10511. Description=Added by a variant of the <a href="http://uk.trendmicro-europe.com/enterprise/security_info/ve_detail.php?Vname=WORM_RANDON.AN" target=_blank>RANDON.AN</a> WORM!
  10512. [installstub]
  10513. Filename=installstub.exe
  10514. Confirmed=U
  10515. Description=Tool for Outlook and Outlook Express from <a href="www.plaxo.com" target="_blank">Plaxo</a> for organising and keeping contacts organised and updated and providing online access to your contacts and access from PDA or mobile phone
  10516. [instance 001]
  10517. Filename=[path to worm]
  10518. Confirmed=X
  10519. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32alasroua.html" target=_blank>Alasrou-A</a> WORM!
  10520. [instant update center]
  10521. Filename=reminder.exe
  10522. Confirmed=N
  10523. Description=From Broderbund's PrintMaster 10. It is an event reminder (for calendar dates, etc). Delete from the startup using Startup Manager program because it keeps re-checking itself when using MSCONFIG.  PrintMaster 11 uses filename PMremind.exe - it has to be unchecked in startup in the same manner
  10524. [instantaccess]
  10525. Filename=INSTAN~1.EXE
  10526. Confirmed=N
  10527. Description=From TextBridge Pro 9.0 OCR scanner software. Available via Start -> Programs
  10528. [instantdrive]
  10529. Filename=InstantDrive.exe
  10530. Confirmed=U
  10531. Description=<a href="http://www.pinnaclesys.com" target="_blank">Pinnacle Systems</a> (ex VOB) InstantDrive - creates a virtual CD-ROM drive on the computerÆs hard drive. Part of InstantCD/DVD burning software
  10532. [instantpleasure]
  10533. Filename=instantpleasure.exe
  10534. Confirmed=X
  10535. Description=Adult content dialler
  10536. [instantpleasurexxx]
  10537. Filename=instantpleasurexxx.exe
  10538. Confirmed=X
  10539. Description=Adult content dialler
  10540. [instanttray]
  10541. Filename=PCLETray.exe
  10542. Confirmed=N
  10543. Description=<a href="http://www.pinnaclesys.com/ProductPage_n.asp?Product_ID=1431&Langue_ID=7" target=_blank>Pinnacle InstantCD/DVD</a> disc creation software. Tray icon enabling a pop-up menu that lets you call up any of Instant CD/DVD's tools with one click. Can be started manually
  10544. [instutlr.exe]
  10545. Filename=InstUtlR.exe
  10546. Confirmed=?
  10547. Description=<font color="#FF0000">??</font>
  10548. [intdctrr]
  10549. Filename=idctup20.exe
  10550. Confirmed=X
  10551. Description=<a href="http://pestpatrol.com/pestinfo/s/safesurfing.asp" target="_blank">SafeSurfing</a> parasite variant
  10552. [intec service drivers]
  10553. Filename=msmsgrs.exe
  10554. Confirmed=X
  10555. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32sdbotadn.html" target=_blank>SDBOT-ADN</a> WORM!
  10556. [intel active monitor]
  10557. Filename=imontray.exe
  10558. Confirmed=U
  10559. Description=System tray monitoring of fans, temperature, voltage, etc for Intel motherboards. Only needed if you "overclock" or live in hot environment. Can also cause problems when running on a laptop if you change PCMCIA cards
  10560. [intel file transfer]
  10561. Filename=xfr.exe
  10562. Confirmed=U
  10563. Description=Part of Intel's LANDesk Management Suite 6 and the Common Base Agent (CBA) - used for communicating between the core server and managed clients
  10564. [intel pds]
  10565. Filename=pds.exe
  10566. Confirmed=U
  10567. Description=Intel Ping Discovery Service (PDS). Part of Intel's LANDesk Management Suite 6 and the Common Base Agent (CBA) - used for communicating between the core server and managed clients. Will start the dial-up if installed and enabled
  10568. [intel proset tray icon]
  10569. Filename=promon.exe
  10570. Confirmed=N
  10571. Description=System Tray icon for Intel PRO series ethernet adapters giving access to the diagnostic features
  10572. [intel service drivers]
  10573. Filename=msconfig16.exe
  10574. Confirmed=X
  10575. Description=Added by the <a href="http://www.superadblocker.com/M/MSCONFIG16.EXE-6417.html" target=_blank>MSCONFIG16</a> TROJAN!
  10576. [intel system works]
  10577. Filename=iis.exe
  10578. Confirmed=X
  10579. Description=Added by the <a href="http://ae.trendmicro-europe.com/enterprise/security_info/ve_detail.php?Vname=WORM_RBOT.QGA" target=_blank>RBOT.QGA</a> WORM!
  10580. [intel32.exe]
  10581. Filename=intel32.exe
  10582. Confirmed=X
  10583. Description=Added by a variant of the SmitFraud alias <a href="http://www.sophos.com/virusinfo/analyses/trojfakealec.html" target=_blank>FAKEALE-C</a> TROJAN!
  10584. [intelapmclient]
  10585. Filename=amclient.exe
  10586. Confirmed=U
  10587. Description=LANDesk <a href="http://www.landesk.com/Products/LDMS/" target=_blank>Management Suite</a> software component
  10588. [intelisys]
  10589. Filename=smss.exe
  10590. Confirmed=X
  10591. Description=Advertisingvision adware! Note - this is not the legitimate <a href="http://www.liutilities.com/products/wintaskspro/processlibrary/smss/" target=_blank>smss.exe</a> process which is always located in the System (9x/Me) or System32 (NT/2K/XP) folder and should not normally figure in Msconfig/Startup! This file is located in the Winnt or Windows folder
  10592. [intelliflag_be.exe]
  10593. Filename=Intelliflag_be.exe
  10594. Confirmed=X
  10595. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/spyware.intelliflag.html" target=_blank>Intelliflag</a> SPYWARE!
  10596. [intellipoint]
  10597. Filename=point32.exe
  10598. Confirmed=U
  10599. Description=<a href="http://www.microsoft.com/intellipoint/" target="_blank">Microsoft Intellipoint</a> software for their Intellimouse series of mice - required if you use non-standard Windows driver features
  10600. [intellitype]
  10601. Filename=type32.exe
  10602. Confirmed=U
  10603. Description=For MS programmable keyboards. If you disable Intellitype in Startup, any "Hot Keys" that are changed by the user to perform functions other than default settings, defer back to their default settings unless you have changed them
  10604. [intelmem]
  10605. Filename=IntelMEM.exe
  10606. Confirmed=U
  10607. Description=Related to connection events on an Intel chipset based modem. It can alert you if the telephone line is being used when you're trying to get online (when you're using dial-up). It can also alert you if your modem line is disconnected. Furthermore, it can alert you if you have made a wrong connection with your modem line
  10608. [intelprocnumutility]
  10609. Filename=cpunumber.exe
  10610. Confirmed=U
  10611. Description=Intel Processor Serial Number Control Utility allows you to enable and disable the processor serial number capability of an Intel PIII processor. You can find more information here. System Tray icon providing the user with a visual state indication. You can find more information <a href="http://www.intel.com/support/processors/pentiumiii/psu.htm" target="_blank">here</a>
  10612. [intelwireless]
  10613. Filename=ifrmewrk.exe
  10614. Confirmed=Y
  10615. Description=Associated with the Intel PRO/Set Wireless software
  10616. [intel?common user interface]
  10617. Filename=igfxtray.exe
  10618. Confirmed=N
  10619. Description=Quick access to the control panel via a System Tray icon for graphics based upon the Intel chipsets (ie, i810). These chipsets are often included on motherboards. Available via Start -> Settings -> Control Panel
  10620. [intense registry service]
  10621. Filename=IntEdReg.exe /CHECK
  10622. Confirmed=?
  10623. Description=<a href="http://www.intense.co.uk/" target="_blank">Intense Educational Ltd</a> - Language Office Software. <font color="#FF0000">Is it required?</font>
  10624. [interceptedsystem]
  10625. Filename=[path to worm]
  10626. Confirmed=X
  10627. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32anaconb.html" target=_blank>ANACON-B</a> WORM!
  10628. [intercheck monitor]
  10629. Filename=Icmon.exe
  10630. Confirmed=Y
  10631. Description=Part of <a href="http://www.sophos.com/products/software/" target="_blank">Sophos</a> ant-virus sofware
  10632. [interdll]
  10633. Filename=Interdll.exe
  10634. Confirmed=X
  10635. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.delf.family.html" target="_blank">DELF</a> family of TROJANS!
  10636. [internalsystray]
  10637. Filename=Kazza.exe
  10638. Confirmed=X
  10639. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?ID=16106" target="_blank">OPTIX</a> TROJAN! Note - unlike the valid KaZaA executable, this is located in C:\Windows\System (Win9x/Me), C:\Winnt\System32 (WinNT/2K), or C:\Windows\System32 (WinXP)
  10640. [internat conf]
  10641. Filename=bootconf.exe
  10642. Confirmed=X
  10643. Description=Homepage hijacker, redirecting to coolwwwsearch.com; see for example <a href="http://boards.cexx.org/viewtopic.php?p=2464#2464" target="_blank"> here</a>
  10644. [internct]
  10645. Filename=WinSocks5.exe
  10646. Confirmed=X
  10647. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.graybird.f.html" target="_blank">GRAYBIRD.F</a> TROJAN!
  10648. [internet config]
  10649. Filename=svchosts.exe
  10650. Confirmed=X
  10651. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.sdbot.html" target="_blank">SDBOT</a> TROJAN!
  10652. [internet content publisher]
  10653. Filename=ICP.EXE
  10654. Confirmed=X
  10655. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotud.html" target=_blank>RBOT-UD</a> WORM!
  10656. [internet download accelerator]
  10657. Filename=ida.exe
  10658. Confirmed=U
  10659. Description=<a href="http://www.westbyte.com/ida/" target=_blank>Internet Download Accelerator</a> download manager
  10660. [internet exploere services]
  10661. Filename=urlmon32.dll.exe
  10662. Confirmed=X
  10663. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.hllw.evianc.html" target="_blank">EVIAN.C</a> WORM!
  10664. [internet explore microsoft]
  10665. Filename=lEXPLORE.EXE
  10666. Confirmed=X
  10667. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotaof.html" target=_blank>RBOT-AOF</a> WORM! Note - the filename is spelled with a lowercase "L" in place of an uppercase "i"
  10668. [internet explorer security]
  10669. Filename=iexplore.pif
  10670. Confirmed=X
  10671. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotalq.html" target=_blank>RBOT-ALQ</a> WORM!
  10672. [internet history eraser]
  10673. Filename=HERASER.exe
  10674. Confirmed=U
  10675. Description=<a href="http://www.internet-history-eraser.com/index.html" target="_blank">Internet History Eraser</a> - deletes your browsing tracks
  10676. [internet loader1]
  10677. Filename=MSInstall61.exe
  10678. Confirmed=X
  10679. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.kwbot.b.worm.html" target="_blank">KWBOT.B</a> WORM!
  10680. [internet send]
  10681. Filename=More log.exe
  10682. Confirmed=X
  10683. Description=Unidentfied adware
  10684. [internet servises]
  10685. Filename=winz32.exe
  10686. Confirmed=X
  10687. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.kwbotz.worm.html" target="_blank">KWBOT.Z</a> WORM!
  10688. [internet sharing server]
  10689. Filename=iss_srvr.exe
  10690. Confirmed=Y
  10691. Description=<a target="_blank" href="http://www.intel.com/products/desk_lap/hm_sm_office/index.htm">Intel AnyPoint</a> internet sharing software
  10692. [internet suspention]
  10693. Filename=story.exe
  10694. Confirmed=X
  10695. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_WOOTBOT.HV&VSect=T" target=_blank>WOOTBOT.HV</a> WORM!
  10696. [internet sweeper]
  10697. Filename=Sweeper.exe
  10698. Confirmed=N
  10699. Description=<a href="http://www.bmesite.com/" target="_blank">Internet Sweeper</a> - removes unnecessart left over files after browsing the internet
  10700. [internet timer]
  10701. Filename=ITIMER.exe
  10702. Confirmed=U
  10703. Description=Shareware dial-up connection call cost calculator from <a href="http://www.ratsoft.freeserve.co.uk/" target="_blank">Ratsoft</a>
  10704. [internet washer pro]
  10705. Filename=iw.exe
  10706. Confirmed=X
  10707. Description=<a href="http://www.internetwasher.com/" target="_blank">Internet Washer</a> manages temporary browser files, cookies, etc - a 'trial' Internet Washer Pro seems to have been widely stealth-installed around March 2003
  10708. [internet2 optimizer]
  10709. Filename=wkfix.exe
  10710. Confirmed=X
  10711. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  10712. [internetwasherpro]
  10713. Filename=iw.exe
  10714. Confirmed=X
  10715. Description=<a href="http://www.internetwasher.com/" target="_blank">Internet Washer</a> manages temporary browser files, cookies, etc - a 'trial' Internet Washer Pro seems to have been widely stealth-installed around March 2003
  10716. [internet_servises]
  10717. Filename=winz32.exe
  10718. Confirmed=X
  10719. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.sdbot.q.html" target="_blank">SDBOT.Q</a> TROJAN!
  10720. [internodeusage]
  10721. Filename=mum.exe
  10722. Confirmed=U
  10723. Description=Australian ISP's free monthly download meter
  10724. [internt]
  10725. Filename=Internt.exe
  10726. Confirmed=X
  10727. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.peeper.html" target="_blank">PEEPER</a> or <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.carufax.a.html" target="_blank">CARUFAX.A</a> TROJANS!
  10728. [intersoft msngr]
  10729. Filename=intersoftmsngr.exe
  10730. Confirmed=X
  10731. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32agobotnw.html" target=_blank>AGOBOT-NW</a> WORM!
  10732. [intertrust quick start]
  10733. Filename=it_cpq~1.exe
  10734. Confirmed=N
  10735. Description=<a href="http://www.intertrust.com/index.html" target="_blank">InterTrust</a> offers something known as Digital Rights Management to control legal software download and other E-commerce related business
  10736. [interu]
  10737. Filename=WINDRV.EXE
  10738. Confirmed=X
  10739. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=BKDR_IRCINTER.A" target="_blank">IRCINTER.A</a> TROJAN!
  10740. [interwarn]
  10741. Filename=interwarn.exe
  10742. Confirmed=U
  10743. Description=<a href="http://www.interwarn.com/interwarn.html" target="_blank">InterWARN</a> by Storm Alert Inc. Provides customized, automated access to critical weather and civil emergency information from the US National Weather Service. Required if audio and screen crawler alerts are desired. Also available via Start -> Programs
  10744. [intespention]
  10745. Filename=IEXPLORE.exe
  10746. Confirmed=X
  10747. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32forbotfl.html" target=_blank>FORBOT-FL</a> WORM! Note - this is not the legitimate Internet Explorer <a href="http://www.liutilities.com/products/wintaskspro/processlibrary/iexplore/" target=_blank>iexplore.exe</a> process which is always located in the Program Files\Internet Explorer folder and should not normally figure in Msconfig/Startup! This file is located in the System (9x/Me) or System32 (NT/2K/XP) folder
  10748. [intmgr]
  10749. Filename=Intmgr.exe
  10750. Confirmed=X
  10751. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/trojan.gema.html" target="_blank">GEMA</a> TROJAN!
  10752. [intranet]
  10753. Filename=SYS32CFG.EXE
  10754. Confirmed=X
  10755. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32spybotdw.html" target=_blank>SPYBOT-DW</a> WORM!
  10756. [intrenat]
  10757. Filename=Intrenat.exe
  10758. Confirmed=X
  10759. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/pwsteal.lemir.e.html" target="_blank">LEMIR.E</a> TROJAN!
  10760. [introducing media manager]
  10761. Filename=SPLASHA.EXE
  10762. Confirmed=N
  10763. Description=<a href="http://www.frontpageworld.com/frontpagetools/mediamanager/default.htm" target="_blank">MS Media Manager</a> tour. Not required
  10764. [introduction-registration]
  10765. Filename=??
  10766. Confirmed=N
  10767. Description=For Compaq PC's. Should only run first time, PC Introduction & Compaq registration
  10768. [intruderalert]
  10769. Filename=ia99.exe
  10770. Confirmed=X
  10771. Description=<a href="http://www.safersite.com/PestInfo/db/i/internetalert.asp" target="_blank">Intruder Alert '99</a> from Bonzi - spyware
  10772. [inventory scan]
  10773. Filename=LDISCN32.EXE
  10774. Confirmed=U
  10775. Description=LANDesk <a href="http://www.landesk.com/Products/LDMS/" target=_blank>Management_Suite</a> software component
  10776. [ioadqm]
  10777. Filename=Media Player.exe
  10778. Confirmed=X
  10779. Description=Added by the <a href="http://www.symantec.com/avcenter/venc/data/w32.hawawi.worm.html" target="_blank">HAWAWI</a> WORM!
  10780. [iobi]
  10781. Filename=iobiClient.exe
  10782. Confirmed=N
  10783. Description=<a href="https://www22.verizon.com/iobihome/" target=_blank>iobi Home</a> - a mail/voice service by Verizon
  10784. [iolo task agent]
  10785. Filename=Task_Agent.exe
  10786. Confirmed=U
  10787. Description=iOlo <a href="http://www.iolo.com/sm/index.htm" target="_blank">System Mechanic</a> Task Agent. Scheduled maintenance
  10788. [iomega automatic backup]
  10789. Filename=ibackup.exe
  10790. Confirmed=U
  10791. Description=<a href="http://www.iomega-europe.com/eu/category.asp?catalog%5Fname=Iomega&category%5Fname=Iomega+Automatic+Backup&Page=1" target="_blank">Iomega Automatic Backup</a> - automatic backups for use with Iomega portable HDD
  10792. [iomega automatic backup 1.0.1]
  10793. Filename=ibackup.exe
  10794. Confirmed=U
  10795. Description=<a href="http://www.iomega-europe.com/eu/category.asp?catalog%5Fname=Iomega&category%5Fname=Iomega+Automatic+Backup&Page=1" target="_blank">Iomega Automatic Backup</a> - automatic backups for use with Iomega portable HDD
  10796. [iomega backup scheduler]
  10797. Filename=dtiom98.exe
  10798. Confirmed=N
  10799. Description=Used by Iomega drives. Details of its purpose can be found <a href="http://pw2.netcom.com/~deepone/zipjaz/ioware.html#startup" target="_blank">here</a>. Available via Start -> Programs
  10800. [iomega disk icons]
  10801. Filename=IMGICON.EXE
  10802. Confirmed=U
  10803. Description=Displays Iomega icons in Explorer/My Computer, ejects Zip disks on shutdown and displays a special delete confirmation box when deleting files on an Iomega drive. Available via Start -> Programs. If you disable it remember to eject disks first before powering the drive down - hence the "U" recommendation. Note - FreeCell may not run with ImgIcon running
  10804. [iomega drive icons]
  10805. Filename=IMGICON.EXE
  10806. Confirmed=U
  10807. Description=Displays Iomega icons in Explorer/My Computer, ejects Zip disks on shutdown and displays a special delete confirmation box when deleting files on an Iomega drive. Available via Start -> Programs. If you disable it remember to eject disks first before powering the drive down - hence the "U" recommendation. Note - FreeCell may not run with ImgIcon running
  10808. [iomega imiconxp]
  10809. Filename=imiconxp.exe
  10810. Confirmed=U
  10811. Description=Iomega <a href="http://www.iomega.com/software/revsystemsw.html" target=_blank>REV System</a> Software - allows your Iomega REV drive to interact with the operating system via the Iomega REV UDF file system, and provides drag-and-drop file access, access and write protection, and formatting of the disks
  10812. [iomega quicksync]
  10813. Filename=Quicksync.exe
  10814. Confirmed=?
  10815. Description=<font color="#FF0000">??</font>
  10816. [iomega startup options]
  10817. Filename=IMGSTART.EXE
  10818. Confirmed=N
  10819. Description=Used by Iomega drives. Details of its purpose can be found <a href="http://pw2.netcom.com/~deepone/zipjaz/ioware.html#startup" target="_blank">here</a>. Available via Start -> Programs
  10820. [iomega watch]
  10821. Filename=IOWATCH.EXE
  10822. Confirmed=N
  10823. Description=Used by Iomega drives. Available via Start -> Programs
  10824. [iomegaware]
  10825. Filename=COMMANDER.EXE
  10826. Confirmed=N
  10827. Description=Used by Iomega drives. Details of its purpose can be found <a href="http://pw2.netcom.com/~deepone/zipjaz/ioware.html#startup" target="_blank">here</a>. Available via Start -> Programs
  10828. [iomon98.exe]
  10829. Filename=Iomon98.exe
  10830. Confirmed=U
  10831. Description=PC-Cillin 98 real time virus check. Can cause floppy disk accesses to hang
  10832. [ip stack]
  10833. Filename=ipstack.exe
  10834. Confirmed=X
  10835. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_AGOBOT.CW" target="_blank">AGOBOT.CW</a> WORM!
  10836. [ipalm]
  10837. Filename=mon.exe
  10838. Confirmed=N
  10839. Description=Installed with a Panasonic <a href="http://www.panasonic.com/consumer_electronics/digital_cameras/ipalm.asp" target="_blank">iPalm</a> digital camera. Used to uploaded photos from the camera. If your camera is not connected (via USB port) you do not need this program loaded
  10840. [ipc connection]
  10841. Filename=ipcconn.exe
  10842. Confirmed=X
  10843. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotaeg.html" target=_blank>RBOT-AEG</a> WORM!
  10844. [ipcfg.exe]
  10845. Filename=ipcfg.exe
  10846. Confirmed=X
  10847. Description=Adware - recognized by McAfee antivirus as a variant of the <a href="http://vil.mcafeesecurity.com/vil/content/v_130215.htm" target=_blank>AdClicker-BM</a> trojan
  10848. [ipctrl]
  10849. Filename=ipcon32.exe
  10850. Confirmed=X
  10851. Description=Added by an unidentified VIRUS, WORM or TROJAN!
  10852. [ipfw]
  10853. Filename=ipwf.exe
  10854. Confirmed=X
  10855. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojdloaderyf.html" target=_blank>DLOADER-YF</a> TROJAN!
  10856. [ipinsightlan 01]
  10857. Filename=ipclient.exe
  10858. Confirmed=X
  10859. Description=Installed with Verizon DSL accounts. IP Insight is a Quality of Service monitor and diagnostic tool that isn't required - see <a href="http://www.dslreports.com/faq/1247" target="_blank">here</a> for more information. This one constantly "phones home" and wastes resource - hence the "X" status
  10860. [ipinsightmonitor 01]
  10861. Filename=ipmon32.exe
  10862. Confirmed=N
  10863. Description=Installed with Verizon DSL accounts. IP Insight is a Quality of Service monitor and diagnostic tool that isn't required - see <a href="http://www.dslreports.com/faq/1247" target="_blank">here</a> for more information
  10864. [ipinst]
  10865. Filename=N/A
  10866. Confirmed=Y
  10867. Description=For Gilat Communications internet satellite systems. Gilat rescue (Satellite system restore). Required if you have this system. Can cause a BSOD (blue screen of death) if left out
  10868. [ipmon.exe]
  10869. Filename=ipmon.exe
  10870. Confirmed=X
  10871. Description=Added by the <a href="http://www.symantec.com/avcenter/venc/data/backdoor.recerv.html" target="_blank">RECERV</a> or <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.r3c.b.html" target="_blank">R3C.B</a> TROJANS!
  10872. [ipnuker]
  10873. Filename=Ipnuker.vbs
  10874. Confirmed=X
  10875. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/vbs.inker.b@mm.html" target=_blank>INKER.B</a> WORM!
  10876. [ipodmanager]
  10877. Filename=iPodManager.exe
  10878. Confirmed=U
  10879. Description=Apple iPod Management software for the iPod MP3 player. Allows updating, formating, restoring and other functions associated with iPods
  10880. [ipodwatcher]
  10881. Filename=iPodWatcher.exe
  10882. Confirmed=?
  10883. Description=Associated with Apple's iPod MP3 player. <font color="#FF0000">Detects when the iPod is connected?</font>
  10884. [ipot usb service driver]
  10885. Filename=hpsebc087.exe
  10886. Confirmed=X
  10887. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32sdbotwa.html" target= blank>SDBOT-WA</a> WORM!
  10888. [ipot usb service drv32]
  10889. Filename=hpsebc08.exe
  10890. Confirmed=X
  10891. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32sdbotwh.html" target=_blank>SDBOT-WH</a> WORM!
  10892. [ipreg]
  10893. Filename=ipreg.exe
  10894. Confirmed=X
  10895. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojzagabanh.html" target=_blank>ZAGABAN-H</a> TROJAN!
  10896. [iprint tray]
  10897. Filename=iprntctl.exe
  10898. Confirmed=N
  10899. Description=Novell?<a href="http://www.novell.com/products/netware/printing/quicklook.html" target=_blank>iPrint</a> - based on Novell Distributed Print Services - enables you to send documents to printers located throughout the Net
  10900. [iprotectyou]
  10901. Filename=ip.exe
  10902. Confirmed=U
  10903. Description=<a href="http://www.softforyou.com/ip-index.html" target="_blank">iProtectYou</a> - internet filtering/parental control and network monitoring software
  10904. [iprun]
  10905. Filename=iPY.exe
  10906. Confirmed=X
  10907. Description=<a href="http://securityresponse.symantec.com/avcenter/venc/data/spyware.iprotectyou.html" target=_blank>iProtectYou</a> spyware
  10908. [ipsecmon]
  10909. Filename=IPSecMon.exe
  10910. Confirmed=Y
  10911. Description=<a href="http://www.microsoft.com/windows2000/server/evaluation/news/bulletins/l2tpclient.asp" target="_blank">Microsoft L2TP/IPSec VPN Client</a> for Win98/Me/NT. Secure technology for making remote access virtual private network (VPN) connections across public networks such as the Internet
  10912. [iptable configuration]
  10913. Filename=Winipcfgs.exe
  10914. Confirmed=X
  10915. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  10916. [iptray]
  10917. Filename=iptray.exe
  10918. Confirmed=U
  10919. Description=Intel Desktop Utility module - provides system info such as estimated cpu temp, fan speed, etc
  10920. [ipv6 helper driver]
  10921. Filename=csass.exe
  10922. Confirmed=X
  10923. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_AGOBOT.TC" target=_blank>AGOBOT.TC</a> WORM!
  10924. [ipv6 stun service]
  10925. Filename=netstun.exe
  10926. Confirmed=X
  10927. Description=Added by a variant of the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=BKDR_SDBOT.GEN" target=_blank>SDBOT</a> WORM!
  10928. [ipw]
  10929. Filename=IPW.exe
  10930. Confirmed=N
  10931. Description=<a href="http://www.actiontec.com/index.php" target=_blank>Internet Phone Wizard</a> from Actiontec - Voice over IP (VoIP) that allows you to "make and receive free Internet calls on your regular phone" whilst "at the same time, make and receive regular (landline) calls on your phone"
  10932. [ipwf]
  10933. Filename=ipwf.exe
  10934. Confirmed=X
  10935. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/trojan.schoeberl.html" target=_blank>SCHOEBERL</a> TROJAN!
  10936. [iqes.exe]
  10937. Filename=iqes.exe
  10938. Confirmed=?
  10939. Description=<font color="#FF0000">??</font>
  10940. [irassync]
  10941. Filename=irasyncd.exe
  10942. Confirmed=X
  10943. Description=Added by <a href="http://research.sunbelt-software.com/threat_display.cfm?name=Adw.NewAds.IRASSync&threatid=42624" target=_blank>IRASSync</a> ADWARE!
  10944. [irc session]
  10945. Filename=sessionmgr.exe
  10946. Confirmed=X
  10947. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32sdbotace.html" target=_blank>SDBOT-ACE</a> WORM!
  10948. [ireike]
  10949. Filename=IreIKE.exe
  10950. Confirmed=Y
  10951. Description=<a href="http://www.microsoft.com/windows2000/server/evaluation/news/bulletins/l2tpclient.asp" target="_blank">Microsoft L2TP/IPSec VPN Client</a> for Win98/Me/NT. Secure technology for making remote access virtual private network (VPN) connections across public networks such as the Internet
  10952. [iris active monitor]
  10953. Filename=winmon32.exe
  10954. Confirmed=N
  10955. Description=Iris Antivirus - discontinued, replace with good alternative
  10956. [iris antivirus active monitor]
  10957. Filename=WIMMUN32.exe
  10958. Confirmed=N
  10959. Description=Iris Antivirus - discontinued, replace with good alternative
  10960. [iriver autodb]
  10961. Filename=MLService.exe
  10962. Confirmed=U
  10963. Description=Associated with the <a href="http://www.iriver.com/" target=_blank>iRiver</a> Music Manager
  10964. [iriver updater]
  10965. Filename=Updater.exe
  10966. Confirmed=N
  10967. Description=Updates for the <a href="http://www.iriver.com/" target="_blank">iRiver Music Manager</a> - used with their digital music players
  10968. [irmon]
  10969. Filename=IRMON.EXE
  10970. Confirmed=U
  10971. Description=System Tray access to infra-red devices. Not required unless you use infra-red devices
  10972. [irpmonitor]
  10973. Filename=itcnmon.exe
  10974. Confirmed=?
  10975. Description=<font color="#FF0000">??</font>
  10976. [irxfer]
  10977. Filename=IrXfer.exe
  10978. Confirmed=U
  10979. Description=Microsoft Infrared Transfer application
  10980. [is cfgwiz]
  10981. Filename=cfgwiz.exe
  10982. Confirmed=N
  10983. Description=Norton Internet Security configuration wizard
  10984. [isass]
  10985. Filename=Isass.exe
  10986. Confirmed=X
  10987. Description=Added by the <a href="http://www.symantec.com/avcenter/venc/data/backdoor.futro.html" target=_blank>FUTRO</a> TROJAN!
  10988. [isdbdc]
  10989. Filename=isdbdc.exe
  10990. Confirmed=N
  10991. Description=For Compaq PC's. May install properties in dial-up networking when you register with an ISP
  10992. [isdeleteme]
  10993. Filename=isDel.bat
  10994. Confirmed=U
  10995. Description=Used by Norton Internet Security to remove certain files and directories on reboot when uninstalling their product
  10996. [isdn monitor]
  10997. Filename=Linksts.exe
  10998. Confirmed=N
  10999. Description=Tray icon which gets installed when you install the drivers for Asuscom internal ISDN modem cards (or rebadged Asuscom ISDN cards, such as MRi). This icon enables you to monitor or configure your ISDN card. Once you have configured your ISDN card correctly, you will never need to use this icon
  11000. [isdnwatch]
  11001. Filename=IWatch.exe
  11002. Confirmed=U
  11003. Description=<a href="http://www.avm.de/en/press/announcements/2003/2003_05_19_1.php3" target="_blank">FRITZ!X ISDNWatch</a> - "dialing filter for more security and control on the ISDN PC. The PC is doubly protected against dialer programs and premium-service numbers: ISDNWatch allows the user to block calls to and from both individual numbers and whole number blocks"
  11004. [ishelp]
  11005. Filename=help.exe
  11006. Confirmed=U
  11007. Description=<a href="http://sarc.com/avcenter/venc/data/spyware.ispy.html" target=_blank>ISpy</a> is a security risk that logs keystrokes and captures screenshots. If you didn't install this yourself uninstall it
  11008. [ishield]
  11009. Filename=iShield.exe
  11010. Confirmed=U
  11011. Description=GuardWare <a href="http://www.guardwareinc.com/ishield/isaboutus.html" target=_blank>iShield</a> blocks pornographic images when you surf the Internet on your computer using a web browser
  11012. [islp2sta]
  11013. Filename=ISLP2STA.EXE
  11014. Confirmed=Y
  11015. Description=A process from Cisco Systems Inc associated with Windows Update for wireless NIC drivers
  11016. [isp.com high speed]
  11017. Filename=slipgui.exe
  11018. Confirmed=Y
  11019. Description=User interface for <a href="http://www.slipstream.com/our_solutions/value-added.html" target=_blank>Slipstream</a> - internet acceleration through compression/decompression techniques, intelligent cacheing on the server side, and real-time conversion of large/high-bandwidth images to less bulky pix. Used by popular ISPs such as IceNet, Wanadoo, Terra, OnSpeed, United Online and AOL Canada. Required if the user's account is locked in to that proxy server
  11020. [ispynow]
  11021. Filename=ispynow.exe
  11022. Confirmed=U
  11023. Description=<a href="http://www.ispynow.com/" target="_blank">iSpyNOW</a> - remote monitoring and surveillance software
  11024. [israfel]
  11025. Filename=Israfel.vbs
  11026. Confirmed=X
  11027. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/vbs.gaggle.d.html" target="_blank">GAGGLE.D</a> or <a href="http://securityresponse.symantec.com/avcenter/venc/data/vbs.gaggle.e.html" target="_blank">GAGGLE.E</a> WORMS!
  11028. [isreminder]
  11029. Filename=ISPopup.exe
  11030. Confirmed=N
  11031. Description=Related to GuardWare <a href="http://castlecops.com/s11820-iShield.html" target=_blank>iShield</a> - this is the registration reminder for the trial version, so not required in startup
  11032. [issenc32svr]
  11033. Filename=issEnc32.exe
  11034. Confirmed=X
  11035. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  11036. [isstart]
  11037. Filename=ISStart.exe
  11038. Confirmed=U
  11039. Description=LogitechGalleryRepair/LogitechVideoRepair - part of Logitech Image Studio - installed with Logitech QuickCam cameras. Required from version 8.11 onwards if you use the software to take pictures and capture videos, not if you don't. Also not required for versions up to and including 7.30 and after version 8.30 - hence the "U" rather than "Y" recommendation
  11040. [issvc]
  11041. Filename=ISSVC.exe
  11042. Confirmed=Y
  11043. Description=Part of Norton Internet Security Suite
  11044. [ist service]
  11045. Filename=istsvc.exe
  11046. Confirmed=X
  11047. Description=<a href="http://www.doxdesk.com/parasite/ISTbar.html" target="_blank">ISTBar</a> foistware
  11048. [ist service uninstall]
  11049. Filename=[random filename]
  11050. Confirmed=X
  11051. Description=<a href="http://sarc.com/avcenter/venc/data/adware.istbar.html" target="_blank">ISTBar</a> parasite related
  11052. [istinstall zazzer.exe]
  11053. Filename=istinstall zazzer.exe
  11054. Confirmed=X
  11055. Description=Unidentified adware downloader/installer
  11056. [isuspm startup]
  11057. Filename=ISUSPM.exe
  11058. Confirmed=N
  11059. Description=InstallShield Update Service Scheduler. Automatically searches for and performs any updates to the software so youÆre always working with the most current version
  11060. [isusscheduler]
  11061. Filename=issch.exe
  11062. Confirmed=N
  11063. Description=InstallShield Update Service Scheduler. Automatically searches for and performs any updates to the software so youÆre always working with the most current version
  11064. [isystem]
  11065. Filename=isystem.exe
  11066. Confirmed=X
  11067. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojchorusa.html" target=_blank>CHORUS-A</a> TROJAN! Searchforfree browser hijacker
  11068. [itk]
  11069. Filename=Itk.exe
  11070. Confirmed=U
  11071. Description=<a href="http://www.itksoft.com/index.asp" target="_blank">In The Know</a> - surveillance software that creates records of everything people do on a computer, ie, spying or monitoring depending upon how you call it
  11072. [itouch]
  11073. Filename=iTouch.exe
  11074. Confirmed=U
  11075. Description=iTouch loads the iTouch configuration program for Logitech keyboards. ItÆs needed if your keyboard has shortcut buttons and if you use them. ItÆs also needed if your keyboard does not have the num lock, caps lock, and scroll lock lights on it and you use the on-screen displays for num lock, caps lock, and scroll lock
  11076. [itsdeductiblepopup]
  11077. Filename=ItsDeductible.exe
  11078. Confirmed=N
  11079. Description=<a href="http://www.itsdeductible2.com/" target="_blank">ItsDeductible</a> from Income Dynamics. Calculates your noncash donations quickly and easily. This startup entry checks a registry entry for the next 'PopUp' date and if it is a past or current date displays a program related tip
  11080. [itunes helper]
  11081. Filename=iTunesHelper.exe
  11082. Confirmed=Y
  11083. Description=Installed with Apple's iTunes for Windows. Uses ~3-4MB of memory and if disabled in MSCONFIG or deleted from the registry it will re-instate itself after running iTunes a few times - hence the reluctant Y recommendation
  11084. [ituneshelper]
  11085. Filename=iTunesHelper.exe
  11086. Confirmed=Y
  11087. Description=Installed with Apple's iTunes for Windows. Uses ~3-4MB of memory and if disabled in MSCONFIG or deleted from the registry it will re-instate itself after running iTunes a few times - hence the reluctant Y recommendation
  11088. [iusage]
  11089. Filename=netdet.exe
  11090. Confirmed=N
  11091. Description=<a href="http://members.tripod.com/gauravdhup0/iumos.html" target="_blank">Internet Usage Monitor</a> - utility to calculate the cost and time on the internet via dial-up
  11092. [ivpservicemgr]
  11093. Filename=ivpsvmgr.exe
  11094. Confirmed=N
  11095. Description=Toshiba IVP Service Manager application which appears as a red satellite dish icon in the System Tray. This is ToshibaÆs equivalent to the Windows Automatic Update feature as, whenever you are connected to the Internet, it will check for Windows updates and Toshiba updates
  11096. [iw controlcenter]
  11097. Filename=iwctrl.exe
  11098. Confirmed=N
  11099. Description=<a href="http://www.pinnaclesys.com/" target="_blank">Pinnacle Systems</a> InstantWrite enables you to use your CD-R, CD-RW and DVD-RAM drive just like a hard disk or floppy disk. You can drag and drop files, create new directories right on your CD-R, CD-RW or DVD-RAM. Maybe required if you use this feature on a regular basis
  11100. [iwctrl]
  11101. Filename=iwctrl.exe
  11102. Confirmed=U
  11103. Description=<a href="http://www.pinnaclesys.com/" target="_blank">Pinnacle Systems</a> InstantWrite enables you to use your CD-R, CD-RW and DVD-RAM drive just like a hard disk or floppy disk. You can drag and drop files, create new directories right on your CD-R, CD-RW or DVD-RAM. Maybe required if you use this feature on a regular basis
  11104. [ixplore]
  11105. Filename=ixplore.exe
  11106. Confirmed=X
  11107. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojsdbotcy.html" target=_blank>SDBOT-CY</a> TROJAN!
  11108. [ixproxy]
  11109. Filename=[path to trojan]
  11110. Confirmed=X
  11111. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojxorpixa.html" target=_blank>XORPIX-A</a> TROJAN!
  11112. [iyelejiv]
  11113. Filename=yujixit.exe
  11114. Confirmed=X
  11115. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_SDBOT.BJK&VSect=P" target=_blank>SDBOT.BJK</a> WORM!
  11116. [ize]
  11117. Filename=N/A
  11118. Confirmed=?
  11119. Description=<font color="#FF0000">??</font>
  11120. [j2 tray menu]
  11121. Filename=HotTray.exe
  11122. Confirmed=N
  11123. Description=eFax Messenger Tray Menu system tray icon for eFax Messenger Plus. Available via Start -> Programs. Disabling instructions available <a href="http://www.efax.com/help/index.asp" target="_blank">here</a>
  11124. [ja cfg util v2]
  11125. Filename=jacfg2.exe
  11126. Confirmed=X
  11127. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotal.html" target=_blank>RBOT-AL</a> WORM!
  11128. [jammer]
  11129. Filename=jammer.exe
  11130. Confirmed=U
  11131. Description=<a href="http://www.agnitum.com/products/jammer/" target="_blank">Jammer</a> by Agnitum - "Jammer is the last word in Internet security. It combines a user-friendly interface with very sophisticated and powerful security measures that protect your Windows system while you are surfing the web"
  11132. [jammer2nd]
  11133. Filename=Jammer2nd.exe
  11134. Confirmed=X
  11135. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.netsky.z@mm.html" target="_blank">NETSKY.Z</a> WORM!
  11136. [java applet]
  11137. Filename=javaup.exe
  11138. Confirmed=X
  11139. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32sdbotacf.html" target=_blank>SDBOT-ACF</a> WORM!
  11140. [java auto update]
  11141. Filename=ujm.exe
  11142. Confirmed=X
  11143. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32sdbotadh.html" target=_blank>SDBOT-ADH</a> WORM!
  11144. [java runtimes]
  11145. Filename=iexplore.exe
  11146. Confirmed=X
  11147. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/trojan.killav.b.html" target=_blank>KILLAV.B</a> WORM! Note - this is not the legitimate Internet Explorer <a href="http://www.liutilities.com/products/wintaskspro/processlibrary/iexplore/" target=_blank>iexplore.exe</a> process which is always located in the Program Files\Internet Explorer folder and should not normally figure in Msconfig/Startup! This file is located in a Winnt\Java\Java folder
  11148. [java virtual machine]
  11149. Filename=javaw.exe
  11150. Confirmed=X
  11151. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  11152. [javascript debugging service]
  11153. Filename=JsDbgMan.exe
  11154. Confirmed=X
  11155. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.derdero.e@mm.html" target=_blank>DERDEO.E</a> WORM!
  11156. [javaupdate0.07]
  11157. Filename=[filename]
  11158. Confirmed=X
  11159. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.jupdate.html" target=_blank>JUPDATE</a> TROJAN!
  11160. [javaupdatesched]
  11161. Filename=jusched32.exe
  11162. Confirmed=X
  11163. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojbckdrckb.html" target=_blank>CKB</a> TROJAN!
  11164. [javavm]
  11165. Filename=java.exe
  11166. Confirmed=X
  11167. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.mydoom.m@mm.html" target="_blank">MYDOOM.M</a> or <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.mydoom.n@mm.html" target="_blank">MYDOOM.N</a> or other variants of the MYDOOM WORMS! Note - not to be confused with the valid Windows "java.exe" which resides in C:\Windows\System (Win9x/Me), C:\Winnt\System32 (WinNT/2K) or C:\Windows\System32 (WinXP) as this resides in C:\Windows or C:\Winnt
  11168. [jawa32]
  11169. Filename=jawa32.exe
  11170. Confirmed=X
  11171. Description=Added by the <a href="http://www.liutilities.com/products/wintaskspro/processlibrary/aqadcup/" target="_blank">AGENT.BG</a> WORM!
  11172. [jawa322]
  11173. Filename=jawa32.exe
  11174. Confirmed=X
  11175. Description=Added by a variant of the <a href="http://www.liutilities.com/products/wintaskspro/processlibrary/jawa32/" target=_blank>AGENT.BG</a> trojan
  11176. [jb]
  11177. Filename=Jiffybar.exe
  11178. Confirmed=N
  11179. Description="Get Paid As You surf" application
  11180. [jet detection]
  11181. Filename=ADGJDet.exe
  11182. Confirmed=N
  11183. Description=Added with SoundBlaster Live! or Audigy soundcards for headphone autodetection
  11184. [jetadmin discovery indicator]
  11185. Filename=HPJETDSC.EXE
  11186. Confirmed=Y
  11187. Description=HP JetAdmin software for HP JetDirect Print Servers. HPJETDSC.EXE is the file necessary for the JetAdmin Discovery Indicator (paper airplane in the taskbar). It gets launched automatically through the registry, and remains active to control the Discovery Indicator
  11188. [jete]
  11189. Filename=yujixit.exe
  11190. Confirmed=X
  11191. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_SDBOT.BRT&VSect=P" target=_blank>SDBOT.BRT</a> WORM!
  11192. [jijbl]
  11193. Filename=ezlwy.bat
  11194. Confirmed=X
  11195. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.hllw.reddw@mm.html" target="_blank">REDDW</a> WORM!
  11196. [jobhisinit]
  11197. Filename=JobHisInit.exe
  11198. Confirmed=U
  11199. Description=Used by Ricoh network printers to enable network printing from the client
  11200. [jog serve]
  11201. Filename=JogServ2.exe
  11202. Confirmed=U
  11203. Description="Jog Dial" on a Sony Vaio laptop.  The dial can select various functions such as control audio. Needed if you use its features
  11204. [jogserv2]
  11205. Filename=JogServ2.exe
  11206. Confirmed=U
  11207. Description="Jog Dial" on a Sony Vaio laptop.  The dial can select various functions such as control audio. Needed if you use its features
  11208. [jotl]
  11209. Filename=millenzje.exe
  11210. Confirmed=?
  11211. Description=<font color="#FF0000">??</font>
  11212. [jreg]
  11213. Filename=Jreg2b.exe
  11214. Confirmed=X
  11215. Description=<a href="http://sarc.com/avcenter/venc/data/adware.broadcastpc.b.html" target="_blank">BroadcastPC</a> adware variant
  11216. [jusched]
  11217. Filename=jusched.exe
  11218. Confirmed=N
  11219. Description=Checks with Sun's Java updates site to see if newer Java versions are available. Visit <a href="http://java.sun.com" target="_blank"> http://java.sun.com</a> or just run the Java Plug-In Control Panel
  11220. [jushed32.exe]
  11221. Filename=jushed32.exe
  11222. Confirmed=X
  11223. Description=<a href="http://cwshredder.net/cwshredder/cwschronicles.html" target=_blank>CoolWebSearch</a> parasite variant - also detected as the <a href="http://www.sophos.com/virusinfo/analyses/trojbiztenl.html" target= blank>BIZTEN-L</a> TROJAN!
  11224. [jutsu]
  11225. Filename=jutsu.exe
  11226. Confirmed=X
  11227. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotls.html" target=_blank>RBOT-LS</a> WORM!
  11228. [jv16 pt tempfiletool]
  11229. Filename=TempTool.exe
  11230. Confirmed=U
  11231. Description=<a href="http://www.vtoy.fi/jv16/shtml/powertools.shtml" target="_blank">jv16 PowerTools</a>' temporary file remover
  11232. [jv16pt - privacy protector]
  11233. Filename=Task.jvb
  11234. Confirmed=U
  11235. Description=jv16 PowerTools 2005 - <a href="http://www.macecraft.com/pt2005/privacyprotector/" target= blank>Privacy Protector</a> allows you to protect your privacy by clearing the unwanted history items and cookies from you computer every time you startup your computer
  11236. [jv16pt network resident]
  11237. Filename=jv16pt_network.exe
  11238. Confirmed=U
  11239. Description=<a href="http://www.vtoy.fi/jv16/shtml/powertools.shtml" target="_blank">jv16 PowerTools</a>' network resident program. Only needed if you are using the program's network features
  11240. [jvdnlssn]
  11241. Filename=fljzsshc.exe
  11242. Confirmed=X
  11243. Description=Flingstone.com adware - and its Golden Palace Casino program
  11244. [jvm0.12]
  11245. Filename=[random filename]
  11246. Confirmed=X
  11247. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojteadoora.html" target= blank>TEADOOR-A</a> TROJAN!
  11248. [jvm0.14]
  11249. Filename=[random filename]
  11250. Confirmed=X
  11251. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojteadoorb.html" target=_blank>TEADOOR-B</a> TROJAN!
  11252. [jzi16]
  11253. Filename=jzi16.exe
  11254. Confirmed=?
  11255. Description=<font color="#FF0000">??</font>
  11256. [k2ps_full.task]
  11257. Filename=K2ps_full.exe
  11258. Confirmed=X
  11259. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=TROJ_JUNTADOR.K" target="_blank">JUNTADOR.K</a> TROJAN!
  11260. [k6cpu.exe]
  11261. Filename=K6CPU.EXE
  11262. Confirmed=N
  11263. Description=Authenticates CPU as K6 in system properties
  11264. [kadoc]
  11265. Filename=[random filename].exe
  11266. Confirmed=X
  11267. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.staprew.html" target=_blank>STAPREW</a> TROJAN!
  11268. [kak]
  11269. Filename=kak.hta
  11270. Confirmed=X
  11271. Description=Added by the <a href="http://www.symantec.com/avcenter/venc/data/wscript.kakworm.html" target="_blank">KAKWORM</a> WORM!
  11272. [kalibump]
  11273. Filename=Kalibump.exe
  11274. Confirmed=U
  11275. Description=Used with the now unsupported <a href="http://www.kali.net/" target="_blank">Kali</a> software for on-line gaming. This is used to automatically bump up the priority of WinProxy to GREATLY improve game speed when using a SOCKS proxy
  11276. [kana reminder]
  11277. Filename=Reminder.exe
  11278. Confirmed=N
  11279. Description=<a href="http://www.istop.com/~phartana/reminder/" target="_blank">Kana Reminder</a> is a program which can be used to set a reminder to be triggered at a specified time
  11280. [karen's once-a-day ii]
  11281. Filename=PTOAD.exe
  11282. Confirmed=U
  11283. Description="Have a job that should be run exactly once each day? <a href="http://www.karenware.com/powertools/ptoad.asp" target=_blank>Karen's Once-A-Day II</a> is just what you need!" Scheduler that lets you specify progams, web pages and files that be run or opened automatically, the first time
  11284. [kasp]
  11285. Filename=OESpamTest.exe
  11286. Confirmed=U
  11287. Description=Kaspersky <a href="http://www.kaspersky.com/antispamenterprise" target=_blank>Anti-Spam</a>
  11288. [kasper antivirus]
  11289. Filename=KASPERANTIVIRUS.EXE
  11290. Confirmed=X
  11291. Description=Added by a variant of the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.spybot.worm.html" target=_blank>SPYBOT</a> WORM!
  11292. [kaspersky anti-hacker]
  11293. Filename=KAVPF.exe
  11294. Confirmed=Y
  11295. Description=Kaspersky <a href="http://www.kaspersky.com/antihacker" target= blank>Anti-Hacker</a> firewall
  11296. [kaspersky antivirus]
  11297. Filename=KasperskyAV.exe
  11298. Confirmed=X
  11299. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  11300. [kasperskyav]
  11301. Filename=kaspersky.exe
  11302. Confirmed=X
  11303. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.mimail.t@mm.html" target="_blank">MIMAIL.T</a> WORM! Note - this has nothing to do with the real Kaspersky AntiVirus
  11304. [kasperskyaveng]
  11305. Filename=Kasperskyaveng.exe
  11306. Confirmed=X
  11307. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.netsky.v@mm.html" target="_blank">NETSKY.V</a> WORM!
  11308. [kavfox]
  11309. Filename=win1ogoin.exe
  11310. Confirmed=X
  11311. Description=Added by <a href="http://www.sophos.com/virusinfo/analyses/trojgwghostm.html" target=_blank>GWGHOST-M</a> TROJAN!
  11312. [kavpersonal]
  11313. Filename=svchost.exe
  11314. Confirmed=X
  11315. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojlineagev.html" target=_blank>LINEAGE-V</a> TROJAN! Note - this is not the legitimate <a href="http://www.liutilities.com/products/wintaskspro/processlibrary/svchost/" target=_blank>svchost.exe</a> process which is always located in the System (9x/Me) or System32 (NT/2K/XP) folder and should not normally figure in Msconfig/Startup! This file is located in the Winnt or Windows folder
  11316. [kavpersonal50]
  11317. Filename=Kav.exe
  11318. Confirmed=Y
  11319. Description=<a href="http://www.kaspersky.com/personal" target="_blank">Kaspersky</a> Anti-Virus Personal 5.0
  11320. [kavpersonal90]
  11321. Filename=wscntfy.exe
  11322. Confirmed=X
  11323. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojbankerfz.html" target=_blank>BANKER-FZ</a> TROJAN!
  11324. [kavpfw]
  11325. Filename=KavPFW.exe
  11326. Confirmed=Y
  11327. Description=<a href="http://www.kingsoft.com/en/" target=_blank>KingSoft</a> Personal Firewall
  11328. [kavruns]
  11329. Filename=Windll.exe
  11330. Confirmed=X
  11331. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.trynoma.html" target="_blank">TRYNOMA</a> TROJAN!
  11332. [kavstart]
  11333. Filename=KAVStart.exe
  11334. Confirmed=Y
  11335. Description=<a href="http://www.kingsoft.com/en/" target=_blank>KingSoft</a> Personal Firewall
  11336. [kavutil]
  11337. Filename=[worm filename]
  11338. Confirmed=X
  11339. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.wintoo.b.worm.html" target="_blank">WINTOO.B</a> WORM!
  11340. [kazaa]
  11341. Filename=kazaa.exe
  11342. Confirmed=N
  11343. Description=KAZAA is a file-sharing program which unfortunately being ad-based includes "Cy-door" adware. Check <a href="http://www.cexx.org/cydoor.htm" target="_blank">here</a> for information about "Cy-door" and <a href="http://www.lavasoft.de/software/adaware/" target="_blank">here</a> for a program that can remove it
  11344. [kazaa download accelerator updater (required)]
  11345. Filename=regsvr32 [path] kdp****.dll [* = random char]
  11346. Confirmed=X
  11347. Description=<a href="http://www.pestpatrol.com/PestInfo/s/safeguardprotect.asp" target="_blank">SafeguardProtect/Veevo</a> hijacker
  11348. [kazaa lptt01]
  11349. Filename=kazaa.exe
  11350. Confirmed=X
  11351. Description=<a href="http://www.wilderssecurity.net/specialinfo/rapidblaster.html" target="_blank">RapidBlaster</a> variant (in a "kazaa" folder in Program Files). Recommended you use RapidBlaster Killer to uninstall - see <a ref="http://www.wilderssecurity.net/specialinfo/rapidblaster.html#removal" target="_blank"> here</a>. Note - this is not the valid KaZaA file sharing program which has the same executable name
  11352. [kazaa ml097e]
  11353. Filename=kazaa.exe
  11354. Confirmed=X
  11355. Description=<a href="http://www.wilderssecurity.net/specialinfo/rapidblaster.html" target="_blank">RapidBlaster</a> variant (in a "kazaa" folder in Program Files). Recommended you use RapidBlaster Killer to uninstall - see <a ref="http://www.wilderssecurity.net/specialinfo/rapidblaster.html#removal" target="_blank"> here</a>. Note - this is not the valid KaZaA file sharing program which has the same executable name
  11356. [kazaacuf]
  11357. Filename=9
  11358. Confirmed=X
  11359. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.kitro.d.worm.html" target="_blank"> KITRO.D</a> (or <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_ARGEN.A&VSect=T" target="_blank">ARGEN.A</a>) WORM!
  11360. [kazaalite]
  11361. Filename=kazaalite.exe
  11362. Confirmed=N
  11363. Description=<a href="http://www.webattack.com/get/kazaalite.shtml" target="_blank">Kazaalite</a> is a file sharing client - not to be confused with the original Kazaa program. Unlike the original, this one does not contain any advertising or tracking mechanisms
  11364. [kazoom]
  11365. Filename=KaZooM.Exe
  11366. Confirmed=N
  11367. Description=KaZoom from <a href="http://www.bluehavenmedia.com/" target="_blank"> Blue Haven Media</a> - "add-on application that automatically speeds up the download process and finds the files you want with far more power than regular KaZaA searches"
  11368. [kb891711]
  11369. Filename=KB891711.exe
  11370. Confirmed=Y
  11371. Description=Installed by the Windows KB891711 critical update, see <a href="http://www.microsoft.com/technet/security/Bulletin/MS05-002.mspx" target=_blank>this</a> security bulletin - this file reportedly needs to continue running in order to patch the vulnerability, at least until a more practical solution is found. There have however been reports of fatal exception errors in systems running Windows 98, and in such a case Microsoft advises to either uninstall the patch (Add/Remove Programs) or prevent it from running at startup
  11372. [kbd]
  11373. Filename=KBD.EXE
  11374. Confirmed=U
  11375. Description=Multimedia keyboard manager. Required if you use the multimedia keys
  11376. [kbd mediacenter]
  11377. Filename=MEDIACTR.EXE
  11378. Confirmed=U
  11379. Description=Multimedia keyboard manager. Required if you use the multimedia keys
  11380. [kbddrv32]
  11381. Filename=kbddrv32.exe
  11382. Confirmed=X
  11383. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=TROJ_CRYPTER.A" target="_blank">CRYPTER.A</a> TROJAN!
  11384. [kbddrvinf]
  11385. Filename=kbddrvinf.exe
  11386. Confirmed=X
  11387. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=TROJ_CRYPTER.A" target="_blank">CRYPTER.A</a> TROJAN!
  11388. [kceasy]
  11389. Filename=KCeasy.exe
  11390. Confirmed=N
  11391. Description=<a href="http://kceasy.com/about/" target=_blank>KCeasy</a> - a Windows peer-to-peer filesharing application which uses <a href="http://www.encyclopedia-online.info/GiFT_P2P" target=_blank>giFT</a> as its 'back end' foundation. The networks currently supported are OpenFT and Gnutella
  11392. [kclient]
  11393. Filename=kstatus.exe
  11394. Confirmed=U
  11395. Description=KClient Kerberos client software for Win32 systems. It provides the libraries and utilities needed to use Kerberos-based PC applications developed by Computing Services such as KWeb and NiftyTelnet
  11396. [kdx]
  11397. Filename=KHost.exe
  11398. Confirmed=N
  11399. Description=KonTiki <a href="http://help.kontiki.com/enduser/group.jsp;jsessionid=445B8C402E10C9AFBC8E053A3BBC395C?node=1829" target="_blank">Secure Delivery Plug In</a> related. "The Kontiki Delivery Management System (DMS) is a secure delivery network for distribution of video, software, audio, documents, and other digital media. The Kontiki DMS enables enterprises to efficiently publish, secure, deliver and track digital media to employees, partners, and customers"
  11400. [ke9801]
  11401. Filename=DriBat32.exe
  11402. Confirmed=U
  11403. Description=<a href="http://www.reset.bg/ke9801.htm" target="_blank">KE-9801</a> multimedia keyboard - required if you use the multimedia keys
  11404. [keenvalue]
  11405. Filename=Keenvalue.exe
  11406. Confirmed=X
  11407. Description=<a href="http://www.infobeat.com/infobar/terms.html" target="_blank">Keenvalue</a> spyware - see <a href="http://www.dslreports.com/forum/remark,6752007~root=security,1~mode=flat" target="_blank">here</a>
  11408. [kemailkb]
  11409. Filename=KEMailKb.EXE
  11410. Confirmed=U
  11411. Description=Controls the buttons at the top of the <a href="http://www.mic-innovations.com/micro_inv/large_image_pages/kb650i.htm" target="_blank"> Micro Innovations 650i Internet Access Keyboard</a>. If you disable it you cannot use the buttons - like volume control or shut down
  11412. [kemet]
  11413. Filename=kemet.exe
  11414. Confirmed=?
  11415. Description=<font color="#FF0000">??</font>
  11416. [kerio vpn client]
  11417. Filename=kvpnclient.exe
  11418. Confirmed=U
  11419. Description=<a href="http://www.kerio.com/kwf_vpn.html" target=_blank>Kerio</a> VPN Client
  11420. [kern64dll]
  11421. Filename=[random filename]
  11422. Confirmed=X
  11423. Description=Added by the <a href="http://www.symantec.com/avcenter/venc/data/pwsteal.tarno.j.html" target="_blank">TARNO.J</a> TROJAN!
  11424. [kernal fault check]
  11425. Filename=ntosrkl.exe
  11426. Confirmed=X
  11427. Description=Added by a variant of the <a href="http://vil.nai.com/vil/content/v_100454.htm" target=_blank>SDBOT</a> WORM!
  11428. [kernctl32]
  11429. Filename=rundll32 kctl32.dll, initialize
  11430. Confirmed=X
  11431. Description=Added by the AGENT.AT TROJAN!
  11432. [kernel 32]
  11433. Filename=SKERNEL32.com
  11434. Confirmed=X
  11435. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32semapia.html" target= blank>SEMAPI-A</a> WORM
  11436. [kernel faults]
  11437. Filename=ftphost.exe
  11438. Confirmed=X
  11439. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_RBOT.BHU&VSect=P" target=_blank>RBOT.BHU</a> WORM!
  11440. [kernel loader]
  11441. Filename=ntkrnl.exe
  11442. Confirmed=X
  11443. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.cervivec.a@mm.html" target="_blank">CERVIVEC.A</a> WORM!
  11444. [kernel manager]
  11445. Filename=krnlmgr.exe
  11446. Confirmed=X
  11447. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=TROJ_JUNY.A&VSect=P" target=_blank>JUNY.A</a> TROJAN!
  11448. [kernel system daemon]
  11449. Filename=ACTIVAT0R.exe
  11450. Confirmed=X
  11451. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.randex.aw.html" target="_blank">RANDEX.AW</a> WORM!
  11452. [kernel12.exe]
  11453. Filename=kernel12.exe
  11454. Confirmed=X
  11455. Description=Added by an unidentified WORM or TROJAN!
  11456. [kernel32dll]
  11457. Filename=guardpc.exe
  11458. Confirmed=X
  11459. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32forbotcu.html" target=_blank>FORBOT-CU</a> WORM!
  11460. [kernelcheck]
  11461. Filename=sys****.exe [* = digit]
  11462. Confirmed=X
  11463. Description=Added by an unidentified TROJAN!
  11464. [kernelfaultchk]
  11465. Filename=sms.exe
  11466. Confirmed=X
  11467. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.hllw.deadhat.html" target="_blank">DEADHAT</a> WORM! Do not confuse with the valid "kernelfaultcheck" which runs "dumprep 0 -k" or "dumprep 0 -u"
  11468. [kernell]
  11469. Filename=systems.exe
  11470. Confirmed=X
  11471. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/pwsteal.tarno.c.html" target="_blank">TARNO.C</a> TROJAN!
  11472. [kernell32]
  11473. Filename=Kernell.dll
  11474. Confirmed=X
  11475. Description=Added by the <a href="http://www.antivirus.com/vinfo/virusencyclo/default5.asp?VName=TROJ_DESTINY.A" target="_blank">DESTINY.A</a> TROJAN!
  11476. [kernelw]
  11477. Filename=Kernelw32.exe
  11478. Confirmed=X
  11479. Description=Added by the <a href="http://www.symantec.com/avcenter/venc/data/w32.hllw.indor.e@mm.html" target="_blank">INDOR.E</a> WORM!
  11480. [kernel_check]
  11481. Filename=wmiprvse.exe
  11482. Confirmed=X
  11483. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32sonebotb.html" target=_blank>SONEBOT-B</a> WORM!
  11484. [key logger]
  11485. Filename=csrss.exe
  11486. Confirmed=X
  11487. Description=Added by the <a href="http://www.symantec.com/avcenter/venc/data/w32.buchon.a@mm.html" target=_blank>BUCHON.A</a> WORM! Note - this is not the legitimate <a href="http://www.liutilities.com/products/wintaskspro/processlibrary/csrss/" target=_blank>csrss.exe</a> process which is always located in the System (9x/Me) or System32 (NT/2K/XP) folder and should not normally figure in Msconfig/Startup! This file is located in the root folder - normally C:
  11488. [key text]
  11489. Filename=KeyText.exe
  11490. Confirmed=N
  11491. Description=<a href="http://www.mjmsoft.com/keytext.htm" target="_blank">Key Text 2000</a> from MJMSoft Design - utility to automate repetitive keyboard tasks. Available via Start -> Programs
  11492. [key1]
  11493. Filename=Rlid.exe
  11494. Confirmed=X
  11495. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.lixy.html" target="_blank">LIXY</a> TROJAN!
  11496. [keyaccess]
  11497. Filename=keyacc32.exe
  11498. Confirmed=Y
  11499. Description=KeyServer KeyAccess client software - "when the KeyServer program is launched, the KeyServer process becomes active so license requests from client computers can be serviced. Without KeyAccess, a keyed program cannot run, so license control is very secure"
  11500. [keybdcntl]
  11501. Filename=keybdcntl.exe
  11502. Confirmed=X
  11503. Description=Added by a variant of the <a href="http://www.sophos.com/virusinfo/analyses/trojcrypterc.html" target="_blank">CRYPTER.C</a> TROJAN!
  11504. [keyboard manager]
  11505. Filename=MMKeybd.exe
  11506. Confirmed=U
  11507. Description=Multimedia keyboard manager. Required if you use the additional keys
  11508. [keyboard preload check]
  11509. Filename=Preload.exe
  11510. Confirmed=Y
  11511. Description=Millenium Multi-Function Keyboard driver
  11512. [keyboard_enum]
  11513. Filename=keyboard_enum.exe
  11514. Confirmed=X
  11515. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojbdoorgp.html" target= blank>GP</a> TROJAN!
  11516. [keymaestro]
  11517. Filename=kmaestro.exe
  11518. Confirmed=U
  11519. Description=Multimedia keyboard manager. Required if you use the multimedia keys
  11520. [keymap]
  11521. Filename=keymap.exe
  11522. Confirmed=U
  11523. Description=System Tray utility and background task used by games produced by Kesmai (published by Interactive Magic) and which enables you to program keys to do specific actions during the game
  11524. [keymgrldr]
  11525. Filename=rundll32 setupapi, InstallHinfSection... keymgr3.inf
  11526. Confirmed=X
  11527. Description=CoolWebSearch <a href="http://cwshredder.net/cwshredder/cwschronicles.html#oemsyspnp" target=_blank>Oemsyspnp</a> parasite variant
  11528. [keypatrol]
  11529. Filename=KeyPatrol.exe
  11530. Confirmed=U
  11531. Description=<a href="http://www.pestpatrol.com/KeyPatrol/" target="_blank">KeyPatrol</a> - detects Key Loggers ("keyboard loggers" or "keyloggers") using both behavioral and pattern-matching algorithms
  11532. [keyserv]
  11533. Filename=keyserv.exe
  11534. Confirmed=X
  11535. Description=Added by the <a href="http://www.symantec.com/avcenter/venc/data/spyware.keythief.html" target=_blank>KeyThief</a> SPYWARE!
  11536. [keystroke]
  11537. Filename=keystroke.exe
  11538. Confirmed=U
  11539. Description=<a href="http://sarc.com/avcenter/venc/data/spyware.quicklaunch.html" target=_blank>QuickLaunch</a> is a surveillance software program that logs keystrokes and captures screenshots. If you didn't install this yourself remove it
  11540. [keywallet]
  11541. Filename=KWallet.exe
  11542. Confirmed=U
  11543. Description="<a href="http://www.keywallet.com/index.php" target="_blank">KeyWallet</a> is a useful and convenient desktop utility that spares you the trouble of filling in your logins, passwords and other personal data manually"
  11544. [kfienq]
  11545. Filename=masbl.bat
  11546. Confirmed=X
  11547. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.kifer.html" target="_blank">KIFER</a> TROJAN!
  11548. [khooker]
  11549. Filename=khooker.exe
  11550. Confirmed=N
  11551. Description=SiS Keyboard Daemon. System Tray utility which gets installed by the drivers of the latter day SiS VGA cards. Can cause errors at startup and isn't required
  11552. [kickmon.exe]
  11553. Filename=KICKMON.EXE
  11554. Confirmed=U
  11555. Description=KeepItClean - utility that deletes safe to remove files, cookies, browsing history, etc. This is the scheduler - if you don't schedule clean-ups it isn't required
  11556. [kill popup]
  11557. Filename=KillPopup.exe
  11558. Confirmed=U
  11559. Description=<a href="http://www.killpopup.shareware-rating.com/" target="_blank">KillPopup</a> - pop-up stopper
  11560. [kimochiz.exe]
  11561. Filename=kimochiz.exe
  11562. Confirmed=X
  11563. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojmdropbb.html" target=_blank>MDROP-BB</a> TROJAN!
  11564. [kinberlink]
  11565. Filename=Kinberlink.exe
  11566. Confirmed=N
  11567. Description=<a href="http://www.kinberlin.com/kinberlink/index.asp" target="_blank">Kinberlink</a> network messaging. Available via Start -> Programs
  11568. [kk loader]
  11569. Filename=loadkk.exe
  11570. Confirmed=U
  11571. Description=<a href="http://www.keykey.com/index1.html" target="_blank">KeyKey XP Professional</a> from KeyKey.com. "Monitor Instant Messages, Chats, Emails, Web Site URLs, Passwords, Computer Programs, Start Up and Shut Down time and much more completely undetected to the user."
  11572. [kkm service]
  11573. Filename=kkm.exe
  11574. Confirmed=X
  11575. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32nanpyi.html" target=_blank>NANPY-I</a> WORM!
  11576. [kl antifunlove]
  11577. Filename=flcss.exe
  11578. Confirmed=X
  11579. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.funlove.4099.html" target=_blank>FUNLOVE.4099</a> WORM!
  11580. [klog]
  11581. Filename=Keyspy.exe
  11582. Confirmed=U
  11583. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/hacktool.keyloggpro.b.html" target=_blank>KeyLoggPro.B</a> keystroke logger/monitoring program - remove unless you installed it yourself
  11584. [km9801u]
  11585. Filename=MMHotKey.exe
  11586. Confirmed=U
  11587. Description=Multimedia key handling for the relevant type of Turbo-Media keyboard. Shortcut available. Note that with this running it can crash DirectX8/9 under WinXP when a game switches to full-screen
  11588. [kmw_run.exe]
  11589. Filename=kmw_run.exe
  11590. Confirmed=U
  11591. Description=Kensington MouseWorks - mouse/trackball software. Not required unles you use any special features
  11592. [kmw_show.exe]
  11593. Filename=kmw_show.exe
  11594. Confirmed=U
  11595. Description=Kensington MouseWorks - mouse/trackball software. Not required unles you use any special features
  11596. [kodak batch transfer]
  11597. Filename=pezdow1.exe
  11598. Confirmed=N
  11599. Description=Part of "Kodak Picture Easy" software for digital cameras. Includes the display of an icon in the System Tray to quickly transfer photos to a PC
  11600. [kodak easyshare software]
  11601. Filename=EasyShare.exe
  11602. Confirmed=U
  11603. Description=Software bundled with Kodak digital cameras to manage the connection between the PC and the Camera. Can be started manually
  11604. [kodak picture transfer software]
  11605. Filename=pts.exe
  11606. Confirmed=N
  11607. Description=Looks for Kodak camera connection and media insertion. Available via Start -> Programs
  11608. [kodak software updater]
  11609. Filename=backweb*****.exe
  11610. Confirmed=N
  11611. Description=Software updater for <a href="http://www.kodak.com/global/en/digital/easyShare/indexFlash.jhtml" target="_blank">Kodak Easyshare</a> digital cameras
  11612. [kodakccs]
  11613. Filename=KodakCCS.exe
  11614. Confirmed=Y
  11615. Description=Kodak DC File System Driver
  11616. [komunikator]
  11617. Filename=tlen.exe
  11618. Confirmed=U
  11619. Description=<a href="http://tlen.pl/" target=_blank>Tlen</a> - a Polish language instant messaging client
  11620. [konni symbol autostart]
  11621. Filename=KonniSymbol.exe
  11622. Confirmed=N
  11623. Description=Gives configuration access to <a href="http://www.besoftware.com/index.html" target="_blank">RagTime Solo</a> professional business publishing software. RagTime Solo is the private user version of RagTime 5
  11624. [kontiki]
  11625. Filename=kontiki.exe
  11626. Confirmed=N
  11627. Description=<a href="http://help.kontiki.com/enduser/group.jsp;jsessionid=2C47C896EA1784C5321FD3E6845E8157?node=2846" target="_blank">Kontiki Delivery Manager</a> - Windows-based client software that enables secure delivery of content to users' desktops
  11628. [kpdrv4xp]
  11629. Filename=KPDrv4XP.exe
  11630. Confirmed=Y
  11631. Description=MediaKey USB Keypad Driver
  11632. [krec32]
  11633. Filename=krec32.exe
  11634. Confirmed=U
  11635. Description=StarrCommander Pro Keystroke logging software
  11636. [krnlcheck]
  11637. Filename=csrss.exe
  11638. Confirmed=X
  11639. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.botnachala.html" target=_blank>BOTNACHALA</a> TROJAN! Note - this is not the legitimate <a href="http://www.liutilities.com/products/wintaskspro/processlibrary/csrss/" target=_blank>csrss.exe</a> process which is always located in the System (9x/Me) or System32 (NT/2K/XP) folder and should not normally figure in Msconfig/Startup! This file is located in the Windows or Winnt folder
  11640. [krnlmod]
  11641. Filename=Krnlmod.exe
  11642. Confirmed=U
  11643. Description=Keylogger - see <a href="http://www.pestpatrol.com/PestInfo/W/Windows_Keylogger.asp" target="_blank">here</a>. Given a "U" recommendation because it depends if you intentionally installed it. If you didn't, treat it as "X" and uninstall or remove
  11644. [ksrv32]
  11645. Filename=Ksrv32.exe
  11646. Confirmed=X
  11647. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32agobotpi.html" target=_blank>AGOBOT-PI</a> WORM!
  11648. [ktax auto loader]
  11649. Filename=ktax.exe
  11650. Confirmed=X
  11651. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32sdbotmz.html" target=_blank>SDBOT-MZ</a> WORM!
  11652. [ktchnsnk]
  11653. Filename=ktchnsnk.exe
  11654. Confirmed=U
  11655. Description=HP program found with the Office Jet 500/600/700 series which initializes the Office Jet manager each time the computer is booted up or rebooted
  11656. [kv2005]
  11657. Filename=word.EXE
  11658. Confirmed=X
  11659. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojvbiw.html" target=_blank>IW</a> TROJAN!
  11660. [kv3000]
  11661. Filename=lover.vbe
  11662. Confirmed=X
  11663. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/vbs.zsyang.b@mm.html" target="_blank">ZSYANG.B</a> WORM!
  11664. [kvern16.dll]
  11665. Filename=regsvr32.exe [path] kvern16.dll
  11666. Confirmed=X
  11667. Description=<a href="http://www.doxdesk.com/parasite/DailyWinner.html" target=_blank>DailyWinner</a> adware
  11668. [kv_host]
  11669. Filename=cxjx.exe
  11670. Confirmed=X
  11671. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojlegmirbb.html" target=_blank>LEGMIR-BB</a> TROJAN!
  11672. [kw3eef76]
  11673. Filename=rundll32.exe [path] kw3eef76.dll, EnableRunDLL32
  11674. Confirmed=X
  11675. Description=<a href="http://www.spywareguide.com/product_show.php?id=853" target="_blank">LZIO.com</a> adware downloader
  11676. [kx mixer]
  11677. Filename=kxmixer.exe
  11678. Confirmed=N
  11679. Description=Provides Mixer and Control functionality to KxProject Audio driver for EMU10k based soundcards
  11680. [kx509]
  11681. Filename=kx509_kfwk5.exe
  11682. Confirmed=U
  11683. Description=<a href="http://www.mcmcse.com/win2k/guides/kerberos.shtml" target=_blank>Kerberos</a> Secure Authentication for Windows
  11684. [kyk control settings]
  11685. Filename=KYSVCXD.EXE
  11686. Confirmed=X
  11687. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  11688. [kym control settings]
  11689. Filename=phqghum.exe
  11690. Confirmed=X
  11691. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_RBOT.BQD&VSect=P" target=_blank>RBOT.BQD</a> WORM!
  11692. [l4r1$$a]
  11693. Filename=L4r1$$a.pif
  11694. Confirmed=X
  11695. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32assiralc.html" target= blank>ASSIRAL-C</a> WORM!
  11696. [lan driver]
  11697. Filename=landriver32.exe
  11698. Confirmed=X
  11699. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_RBOT.BT&VSect=P" target=_blank>RBOT.BT</a> WORM!
  11700. [lanbrup]
  11701. Filename=lanbrup.exe
  11702. Confirmed=X
  11703. Description=<a href="http://securityresponse.symantec.com/avcenter/venc/data/spyware.safesurfing.html" target=_blank>SafeSurfing</a> adware
  11704. [languagemonitor]
  11705. Filename=Oplmsb01.exe
  11706. Confirmed=U
  11707. Description=OKI Printer language support monitor
  11708. [lanspeed2]
  11709. Filename=LanSpeed2.exe
  11710. Confirmed=U
  11711. Description=Monitors any traffic that is using a LAN adapter (Ethernet or Token ring network card)
  11712. [laokey.exe]
  11713. Filename=LaoKey.exe
  11714. Confirmed=U
  11715. Description=Lao Script for Windows <a href="http://www.tavultesoft.com/lswin/" target= blank>(LSWin)</a> is an extension to the Windows operating system to allow Lao language to be used with many different Windows-based applications
  11716. [laplink scheduler]
  11717. Filename=Llsched.exe
  11718. Confirmed=U
  11719. Description=Utility that automatically performs file transfers as unattended background operations
  11720. [larissa anti virus]
  11721. Filename=LARISSA_ANTI_VIRUS.exe
  11722. Confirmed=X
  11723. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/trojan.klassir.html" target=_blank>KLASSIR</a> TROJAN!
  11724. [lasb]
  11725. Filename=ewat.exe
  11726. Confirmed=?
  11727. Description=<font color="#FF0000">??</font>
  11728. [laserma]
  11729. Filename=Ermasys32.exe
  11730. Confirmed=X
  11731. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32lermaa.html" target=_blank>LERMA-A</a> WORM!
  11732. [lasiaf32]
  11733. Filename=RePEAtLD.exe
  11734. Confirmed=X
  11735. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.hllw.repeatld.html" target="_blank">REPEATLD</a> WORM!
  11736. [lastinst]
  11737. Filename=N/A
  11738. Confirmed=Y
  11739. Description=For Gilat Communications internet satellite systems. Gilat rescue (Satellite system restore). Required if you have this system. Can cause a BSOD (blue screen of death) if left out
  11740. [later]
  11741. Filename=later.exe
  11742. Confirmed=?
  11743. Description=<font color="#FF0000">??</font>
  11744. [launapp]
  11745. Filename=LaunApp.exe
  11746. Confirmed=U
  11747. Description=Part of Acer Launch Manager - programmable keys on such laptops as the TravelMate 610
  11748. [launcg]
  11749. Filename=launcg.exe
  11750. Confirmed=?
  11751. Description=<font color="#FF0000">??</font>
  11752. [launch ai booster]
  11753. Filename=OverClk.exe
  11754. Confirmed=U
  11755. Description=ASUS <a href="http://www.asuscom.de/pub/ASUS/mb/sock478/p4p800/AIBooster_u.pdf" target=_blank>Ai Booster</a> is an application that allows you to overclock the CPU either manually or automatically without the hassle of entering the BIOS Setup
  11756. [launch context 5.0]
  11757. Filename=Launch.exe
  11758. Confirmed=N
  11759. Description=<a href="http://www.informatic.ru/" target="_blank">Context</a> - electronic dictionary
  11760. [launch norton antivirus 2000]
  11761. Filename=jorgf.exe
  11762. Confirmed=X
  11763. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotaui.html" target=_blank>RBOT-AUI</a> WORM!
  11764. [launch yahoopops! at windows startup]
  11765. Filename=YAHOOPOPS.EXE
  11766. Confirmed=N
  11767. Description=<a href="http://yahoopops.sourceforge.net/" target="_blank">YahooPOPs</a> - enables free POP3/SMTP access to Yahoo! Mail through a service on localhost that emulates the web interface. Available via Start -> Programs
  11768. [launchap]
  11769. Filename=LaunchAp.exe
  11770. Confirmed=U
  11771. Description=Programmable keys on Acer, Fujitsu and other laptops
  11772. [launchapp]
  11773. Filename=Alaunch.exe
  11774. Confirmed=U
  11775. Description=<a href="http://global.acer.com/" target="_blank">Acer</a> Launch tool utility on laptops
  11776. [launchboard]
  11777. Filename=lnchbrd.exe
  11778. Confirmed=U
  11779. Description="LaunchBoard software from Darwin turns your keyboard into a remote control for the Internet and your computer! With LaunchBoard 2.0, you can customize up to 38 keys on your PC keyboard to instantly launch Web Sites, start applications, perform custom macros, handle Windows shortcuts, store passwords, and perform loads of other customizable functions"
  11780. [lavasoft ad-aware]
  11781. Filename=Ad-Aware.exe
  11782. Confirmed=X
  11783. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotso.html" target=_blank>RBOT-SO</a> WORM! Note - this is not the popular <a href="http://www.lavasoft.de/software/adaware/" target="_blank">Ad-aware</a> spware/adware removal tool
  11784. [lavasoft adwatch]
  11785. Filename=Ad-watch.exe
  11786. Confirmed=U
  11787. Description=Part of Lavasoft <a href="http://www.lavasoft.de/software/adaware/" target="_blank">Ad-aware Plus</a> - realtime spyware-monitor watching your memory and registry for spyware that tries to install or change your system
  11788. [laxmsp32.exe]
  11789. Filename=laxmsp32.exe
  11790. Confirmed=Y
  11791. Description=Lexmark Scan and Copy Control Program for the X63 (and maybe others) printer/scanner. Required for the scanner to work 
  11792. [laz]
  11793. Filename=Kernn.exe
  11794. Confirmed=X
  11795. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojbancosln.html" target= blank>BANCOS-LN</a> WORM!
  11796. [lcdc]
  11797. Filename=LCDC.exe
  11798. Confirmed=U
  11799. Description=<a href="http://www.lcdc.cc/about.htm" target="_blank">LCDC</a> is an application that displays various information on your LCD or VFD screen. The number of things that LCDC can do is expandable by Plugins
  11800. [lcdplayer]
  11801. Filename=LCDPlyer.exe
  11802. Confirmed=Y
  11803. Description=Related to <a href="http://www.superadblocker.com/" target=_blank>SuperAdBlocker</a>
  11804. [lcfep]
  11805. Filename=lcfep.exe
  11806. Confirmed=N
  11807. Description=Tivoli æTME?System Tray icon - "'lcfep' is the program that displays statistics about the Endpoint. Apparently stopping/removing this process has no impact on the Endpoint itself which will continue to function normally"
  11808. [lcidconfig]
  11809. Filename=lcidchng.exe
  11810. Confirmed=?
  11811. Description=<font color="#FF0000">??</font>
  11812. [lclock]
  11813. Filename=lclock.exe
  11814. Confirmed=U
  11815. Description=<a href="http://www.softpedia.com/get/Desktop-Enhancements/Clocks-Time-Management/LClock.shtml" target=_blank>LClock</a> is a program that makes the Windows' clock look like a Windows Longhorn Clock
  11816. [lcvga]
  11817. Filename=lcvga.exe
  11818. Confirmed=X
  11819. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojhostola.html" target=_blank>HOSTOL-A</a> TROJAN!
  11820. [ld]
  11821. Filename=ld.exe
  11822. Confirmed=X
  11823. Description=CoolWebSearch <a href="http://cwshredder.net/cwshredder/cwschronicles.html#tooncomics" target=_blank>Tooncomics</a> parasite affiliate variant - redirects to fastwebfinder.com
  11824. [ldriver]
  11825. Filename=ldriver.exe
  11826. Confirmed=X
  11827. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojchorusa.html" target=_blank>CHORUS-A</a> TROJAN! Searchforfree browser hijacker
  11828. [led tray]
  11829. Filename=LEDTRAY.EXE
  11830. Confirmed=U
  11831. Description=Installs a USB compact flash card reader or drive on start-up. The device is distributed by Microtech and is made by a company called SnapShot. Required if you want the reader to work
  11832. [ledpointer]
  11833. Filename=CNYHKey.exe
  11834. Confirmed=U
  11835. Description=Chicony Electronics Multimedia Keyboard Hotkey Driver
  11836. [leechget]
  11837. Filename=LeechGet.exe
  11838. Confirmed=N
  11839. Description=<a href="http://www.leechget.de/">LeechGet</a> download manager
  11840. [leeman]
  11841. Filename=leeman.exe
  11842. Confirmed=X
  11843. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojcosiamd.html" target=_blank>COSIAM-D</a> TROJAN!
  11844. [letssearch]
  11845. Filename=LetsSearch.exe
  11846. Confirmed=X
  11847. Description=<a href="http://research.sunbelt-software.com/threat_display.cfm?name=BrowserAid&threatid=3342&search=browseraid" target=_blank>BrowserAid/BrowserPal</a> foistware
  11848. [lexmark 2200 series button manager]
  11849. Filename=lxbvbmgr.exe
  11850. Confirmed=Y
  11851. Description=Lexmark printer button manager. Required for correct operation
  11852. [lexmark 3100 series]
  11853. Filename=lxbrbmgr.exe
  11854. Confirmed=Y
  11855. Description=Lexmark printer button manager. Required for correct operation
  11856. [lexmark x6100 series]
  11857. Filename=lxbfbmgr.exe
  11858. Confirmed=Y
  11859. Description=Lexmark X6100 printer button manager - required for correct operation
  11860. [lexmark xxx button manager]
  11861. Filename=AcBtnMgr_Xxx.exe
  11862. Confirmed=Y
  11863. Description=Associated with the Lexmark Xxx (where "xx" is the model) all-in-one printer/scanner/copier. Required for correct operation
  11864. [lexmark xxx button monitor]
  11865. Filename=ACMonitor_Xxx.exe
  11866. Confirmed=Y
  11867. Description=Associated with the Lexmark Xxx (where "xx" is the model) all-in-one printer/scanner/copier. Required for correct operation
  11868. [lexmarkprintray]
  11869. Filename=printray.exe
  11870. Confirmed=N
  11871. Description=Lexmark Printer icon in the System Tray for quick access. Not required - uncheck via Printer configuration rather than MSCONFIG. Can also be listed as PrinTray
  11872. [lexplore]
  11873. Filename=lexplore.exe
  11874. Confirmed=X
  11875. Description=Added by the <a href="http://www.symantec.com/avcenter/venc/data/w32.bropia.html" target=_blank>BROPIA</a> WORM! Note - the executable is spelt with a lower case "L" rather than an lower or upper case "i" which is the case with Internet Explorer
  11876. [lexpps]
  11877. Filename=lexpps.exe
  11878. Confirmed=N
  11879. Description=For Lexmark printers. From Lexmark: "This enables bi-directional printing over a peer to peer network. If the printer is connected directly to your PC, the file is not used, (or should not be used) at all". It is known that firewalls can however alert you to "lexpps.exe" requesting server privileges
  11880. [lexstart]
  11881. Filename=lexstart.exe
  11882. Confirmed=U
  11883. Description=Lexmark printer software may add Lexstart.exe in the startup folder to handle print commands that you send to the printer. Sometimes required for the printer to work correctly - not in the case of a Lexmark Z42 for instance
  11884. [lfh]
  11885. Filename=Lfh.exe
  11886. Confirmed=X
  11887. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojzaurgaa.html" target= blank>ZAURGA-A</a> TROJAN!
  11888. [lfsndmng]
  11889. Filename=lfsndmng.exe
  11890. Confirmed=U
  11891. Description=<a href="http://www.lightningfax.com/products/lightningfax/features.htm" target="_blank">LightningFAX Enterprise Fax Server</a> - "puts faxing at the fingertips of networked enterprise users. It enables rapid, secure sending and Direct-To-Desktop Delivery of mission-critical documents"
  11892. [lhttseng]
  11893. Filename=rundll32.exe ..lhttseng.inf, RemoveCabinet
  11894. Confirmed=N
  11895. Description=Left over after installation of the British English version of the Lernout & Hauspie Text To Speech (TTS) Engine
  11896. [li-rcash00001]
  11897. Filename=vldial.exe
  11898. Confirmed=X
  11899. Description=Added by the <a href="http://www.actualresearch.fr/arunlist-306.html" target=_blank>Vl</a> TROJAN!
  11900. [li01f948]
  11901. Filename=rundll32.exe [path] li01f948.dll, EnableRunDLL32
  11902. Confirmed=X
  11903. Description=<a href="http://www.spywareguide.com/product_show.php?id=853" target="_blank">LZIO.com</a> adware downloader
  11904. [liccrtl]
  11905. Filename=runservice.exe
  11906. Confirmed=N
  11907. Description=Part of the <a href="http://www.elicense.com/" target=_blank>eLicense</a> Copy Protection scheme employed by some software and games. When this service is not running, the eLicense wrapper is unable to extract and execute the program
  11908. [licctrl]
  11909. Filename=rundll32.exe [path] MMFS.DLL, Service
  11910. Confirmed=U
  11911. Description=Part of the eLicense Copy Protection scheme employed by some software and games. When this service is not running, the eLicense wrapper is unable to extract and execute the program
  11912. [life firewall update1]
  11913. Filename=FireWall-Update1.exe
  11914. Confirmed=X
  11915. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotars.html" target=_blank>RBOT-ARS</a> WORM!
  11916. [lifedrive manager]
  11917. Filename=LifeDriveMgr.exe
  11918. Confirmed=N
  11919. Description=Keeps the Palm <a href="http://www.palm.com/us/products/mobilemanagers/lifedrive/" target=blank>LifeDrive Manager</a> utility in the systray. Shortcut available via Start -> Programs
  11920. [lifescape media detector]
  11921. Filename=PicasaMediaDetector.exe
  11922. Confirmed=N
  11923. Description=Media detector for <a href="http://www.picasa.net/" target="_blank">Picasa</a>'s automatic photo organizer
  11924. [lify]
  11925. Filename=yujixit.exe
  11926. Confirmed=X
  11927. Description=Added by a variant of the <a href="http://vil.nai.com/vil/content/v_100454.htm" target=_blank>SDBOT</a> WORM!
  11928. [lightning download]
  11929. Filename=Lightning.exe
  11930. Confirmed=U
  11931. Description=<a href="http://www.lightningdownload.com/index.shtml" target=_blank>Lightning Download</a> download manager. Can be launched manually, but will need to start up if you want it to "catch clicks" off Internet Explorer
  11932. [limewire]
  11933. Filename=LimeWire.exe
  11934. Confirmed=X
  11935. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotagh.html" target=_blank>RBOT-AGH</a> WORM!
  11936. [limewire x.x]
  11937. Filename=LimeWire.exe
  11938. Confirmed=N
  11939. Description=<a href="http://www.limewire.com/" target="_blank">LimeWire</a> - Peer to Peer (P2P) file-sharing client. x.x represents the version number. Note - as with all P2P sharing programs they are susceptible to various forms of malware
  11940. [limpet]
  11941. Filename=explorer16.exe
  11942. Confirmed=X
  11943. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotajd.html" target=_blank>RBOT-AJD</a> WORM!
  11944. [line speed meter v3.0]
  11945. Filename=LineSpeedMeter.exe
  11946. Confirmed=N
  11947. Description=<a href="http://www.tcpiq.com/tcpiq/linespeed/Default.asp" target="_blank">LineSpeedMeter</a> - detect the download and upload speed of your internet connection
  11948. [linker]
  11949. Filename=LinkMaker.exe
  11950. Confirmed=X
  11951. Description=<a href="http://securityresponse.symantec.com/avcenter/venc/data/pf/adware.links.html" target=_blank>Links</a> adware
  11952. [links]
  11953. Filename=links.exe
  11954. Confirmed=X
  11955. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojlowzonebi.html" target=_blank>LOWZONE-BI</a> TROJAN!
  11956. [linux]
  11957. Filename=Linux.vbs
  11958. Confirmed=X
  11959. Description=Added by the <a href="http://vil.nai.com/vil/content/v_98684.htm" target="_blank">LOVELETTER.AS</a> VIRUS!
  11960. [liquidview]
  11961. Filename=lviewj.exe
  11962. Confirmed=U
  11963. Description=Liquid View lets you increase the legibility of the Microsoft Windows interface regardless of your display's native resolution. The software lets you increase the size of items that are hard to read on your monitor
  11964. [lisa]
  11965. Filename=Lisa.exe
  11966. Confirmed=X
  11967. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/dialscomd.html" target= blank>SCOM-D</a> premium rate adult content dialler
  11968. [list checker 32 bit]
  11969. Filename=list32.exe
  11970. Confirmed=X
  11971. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotaho.html" target=_blank>RBOT-AHO</a> WORM!
  11972. [litebot]
  11973. Filename=[path to trojan]
  11974. Confirmed=X
  11975. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojlitebota.html" target=_blank>LITEBOT-A</a> TROJAN!
  11976. [live menu]
  11977. Filename=Dllcmd32.exe
  11978. Confirmed=N
  11979. Description=eFax Send button for eFax Messenger Plus. Available via Start -> Programs Disabling instructions available <a href="http://www.efax.com/help/index.asp" target="_blank">here</a>
  11980. [livemonitor]
  11981. Filename=LMonitor.exe
  11982. Confirmed=N
  11983. Description=MSI Live Update - auto-detects and suggests the latest BIOS/Driver/Utilities information
  11984. [livenote]
  11985. Filename=Livenote.exe
  11986. Confirmed=N
  11987. Description=Asus graphics card driver live update feature
  11988. [livesexcams]
  11989. Filename=LiveSexCams.exe
  11990. Confirmed=X
  11991. Description=Premium rate adult content dialler
  11992. [livre]
  11993. Filename=Dibane.bat
  11994. Confirmed=X
  11995. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w97m.banedi.html" target=_blank>BANEDI</a> VIRUS!
  11996. [llmodcl2]
  11997. Filename=rundll.exe setupx.dll, InstallHinfSection ..LLMODCL2.INF
  11998. Confirmed=?
  11999. Description=<font color="#FF0000">??</font>
  12000. [llsass]
  12001. Filename=llsass.exe
  12002. Confirmed=X
  12003. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojproxygg.html" target=_blank>PROXY-GG</a> TROJAN! Note - this malware actually changes the default value data of the registry "Run" key in order to force Windows to launch it at boot. Name field may be empty
  12004. [lm status]
  12005. Filename=LMSTATUS.EXE
  12006. Confirmed=N
  12007. Description=Xerox WorkCenter XE - language monitor status application
  12008. [lma manager]
  12009. Filename=lmamanager.exe
  12010. Confirmed=X
  12011. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32tilebotad.html" target=_blank>TILEBOT-AD</a> WORM!
  12012. [lmapl]
  12013. Filename=lMAPl.exe
  12014. Confirmed=X
  12015. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32agobotre.html" target= blank>AGOBOT-RE</a> WORM!
  12016. [lmgrosd]
  12017. Filename=OSDCtrl.exe
  12018. Confirmed=U
  12019. Description=OSD (on-screen-display) utility - part of Acer Launch Manager. Gives you control to customize the monitor to your liking...from sound, brightness, contrast, horizontal and vertical positions, phase, pixel clock, color and language
  12020. [lmonitor]
  12021. Filename=LMonitor.exe
  12022. Confirmed=N
  12023. Description=MSI Live Update - auto-detects and suggests the latest BIOS/Driver/Utilities information
  12024. [lmpdpsrv]
  12025. Filename=lmpdpsrv.exe
  12026. Confirmed=?
  12027. Description=<font color="#FF0000">Related to a Lexmark printer/scanner. Printer sharing server? Is it required?</font>
  12028. [lmrt]
  12029. Filename=lmrt.exe
  12030. Confirmed=X
  12031. Description=Unidentified adware
  12032. [lmstatus]
  12033. Filename=LMSTATUS.EXE
  12034. Confirmed=N
  12035. Description=Xerox WorkCenter XE - language monitor status application
  12036. [lmu]
  12037. Filename=LMU.exe
  12038. Confirmed=X
  12039. Description=Downloader trojan, recognized by <a href="http://www.kaspersky.com/personalpro" target=_blank>Kaspersky</a> antivirus as Agent.bg
  12040. [lnternet explorer]
  12041. Filename=AMSNDMGR.EXE
  12042. Confirmed=X
  12043. Description=Added by the <a href="http://http://securityresponse.symantec.com/avcenter/venc/data/w32.kwbot.r.worm.html" target="_blank">KWBOT.R</a> WORM! Note that the "l" is a lower case "L" and not an upper case "I"
  12044. [load wb]
  12045. Filename=LOADWB.EXE
  12046. Confirmed=U
  12047. Description=Part of Stardock's <a href="http://www.windowblinds.net/" target="_blank">WindowBlinds</a> custom desktop program. "WindowBlinds is the first utility of its kind. It extends Win98/NT/2K/XP to have a fully skinnable user interface. You can change the style of title bars, buttons, toolbars and much more". If you use it - keep it if not then uninstall it
  12048. [load-guard]
  12049. Filename=Wscript.exe LGuarg.exe.vbs
  12050. Confirmed=X
  12051. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/vbs.yeno.b@mm.html" target=_blank>YENO.B</a> and <a href="http://securityresponse.symantec.com/avcenter/venc/data/vbs.yeno.c@mm.html" target=_blank>YENO.C</a> WORMS!
  12052. [loadab1]
  12053. Filename=explorer.exe
  12054. Confirmed=X
  12055. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojlineageaj.html" target="_blank">LINEAGE-AJ</a> TROJAN! Note - the legitimate Windows Explorer (explorer.exe) is located in the Windows or Winnt folder and would only be in startups if you added it manually. This one is located in the Program Files folder
  12056. [loadblackd]
  12057. Filename=blackd.exe
  12058. Confirmed=Y
  12059. Description=This is the "intrusion detection system" of the <a href="http://blackice.iss.net/product_pc_protection.php" target="_blank">BlackICE PC Protection</a> (was Defender) firewall which loads independently of the "user interface" (BlackICE Utility)
  12060. [loadbtnhnd]
  12061. Filename=BtnHnd.exe
  12062. Confirmed=?
  12063. Description=<font color="#FF0000">Fujitsu LifeBook related</font>
  12064. [loaddbackup]
  12065. Filename=BcTool.exe
  12066. Confirmed=X
  12067. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.gibe@mm.html" target="_blank">GIBE</a> WORM!
  12068. [loaddll]
  12069. Filename=loaddll.exe
  12070. Confirmed=X
  12071. Description=<a href="http://securityresponse.symantec.com/avcenter/venc/data/spyware.winvest.html" target=_blank>Winvest</a> spyware
  12072. [loaddvpapi9x]
  12073. Filename=DVPAPI9X.exe
  12074. Confirmed=?
  12075. Description=<font color="#FF0000">Part of Command AntiVirus for Windows 95/98/Me. Is it needed?</font>
  12076. [loader32]
  12077. Filename=sys*****.exe [***** = random digit]
  12078. Confirmed=X
  12079. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/trojan.domcom.html" target=_blank>DOMCOM</a> TROJAN!
  12080. [loaders]
  12081. Filename=HeIp.exe
  12082. Confirmed=X
  12083. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32sdbotadb.html" target=_blank>SDBOT-ADB</a> WORM!
  12084. [loadfax]
  12085. Filename=loadfax.exe
  12086. Confirmed=X
  12087. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojwinfluxc.html" target=_blank>WINFLUX-C</a> TROJAN!
  12088. [loadgolfcourses]
  12089. Filename=LoadGolfCourses.exe
  12090. Confirmed=X
  12091. Description=PlayMiniGolf.com foistware - stealth installed!
  12092. [loadhtml]
  12093. Filename=rundll32.exe mshtmpre.dll, MShtmpre
  12094. Confirmed=X
  12095. Description=<a href="http://www.symantec.com/avcenter/venc/data/adware.mshtmpre.html" target=_blank>Mshtmpre</a> adware
  12096. [loadmanager]
  12097. Filename=msload.exe
  12098. Confirmed=X
  12099. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_OPASERV.T" target="_blank">OPASERV.T</a> WORM!
  12100. [loadmecq0]
  12101. Filename=explorer.exe
  12102. Confirmed=X
  12103. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/trojan.mumuboy.c.html" target="_blank">MUMUBOY.C</a> TROJAN! Note - the legitimate Windows Explorer (explorer.exe) is located in the Windows or Winnt folder and would only be in startups if you added it manually. This one is located in the Program Files folder
  12104. [loadmecq3]
  12105. Filename=rundll32.exe
  12106. Confirmed=X
  12107. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojlegmiras.html" target=_blank>LEGMIR-AS</a> TROJAN!
  12108. [loadmect1]
  12109. Filename=explorer.exe
  12110. Confirmed=X
  12111. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojlineagel.html" target= blank>LINEAGE-L</a> TROJAN! Note - the valid "explorer.exe" will always be located in C:\Windows or C:\Winnt whereas this one is found in the C:\Program Files folder!
  12112. [loadmsvcmm]
  12113. Filename=msvcmm32.exe
  12114. Confirmed=N
  12115. Description=Auto-update for <a href="http://www.movielink.com/" target="_blank">Movielink</a> - internet movie rental System Tray access
  12116. [loadorderverification]
  12117. Filename=[random filename]
  12118. Confirmed=X
  12119. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=BKDR_TRON.A" target="_blank">TRON.A</a> TROJAN!
  12120. [loadout manager]
  12121. Filename=nost_LM.exe
  12122. Confirmed=U
  12123. Description=Manager for the Belkin Nostromo n50 SpeedPad game controller - see <a href="http://catalog.belkin.com/IWCatProductPage.process?Merchant_Id=1&Product_Id=107727" target="_blank"> here</a>
  12124. [loadpfw]
  12125. Filename=wmimgr.exe
  12126. Confirmed=X
  12127. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32qedsb.html" target=_blank>QEDS-B</a> WORM!
  12128. [loadpowerscheme]
  12129. Filename=rundll32.exe powerprof.dll CheckPowerProfile
  12130. Confirmed=X
  12131. Description=<a href="http://securityresponse.symantec.com/avcenter/venc/data/dialer.ulubione.html" target=_blank>Ulubione</a> adult content dialer
  12132. [loadqm]
  12133. Filename=loadqm.exe
  12134. Confirmed=U
  12135. Description=Installed with MSN Explorer and loads the <a href="http://support.microsoft.com/default.aspx?scid=KB;EN-US;q309418" target="_blank"> MSN Queue Manager</a>. Required to enable the WU AutoUpdate feature. Note that disabling this can sometimes prevent internet sharing working on Win2K Pro SP2. Reports also suggest that removing it will re-enable internet access - hence the "users choice" recommendation. If you have problems leave it, otherwise I recommend you disable it
  12136. [loadsips]
  12137. Filename=rundll32.exe [path] SIPSPI32.dll, SIPSPI32
  12138. Confirmed=X
  12139. Description=<a href="http://research.sunbelt-software.com/threat_display.cfm?name=123Mania&threatid=14915" target=_blank>123Mania</a> adware
  12140. [loadwindowsfile]
  12141. Filename=[filename]
  12142. Confirmed=X
  12143. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.delf.b.html" target="_blank">DELF.B</a> TROJAN! where [filename] is the infected file
  12144. [local area network]
  12145. Filename=OpenGL.exe
  12146. Confirmed=X
  12147. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  12148. [local internet connection]
  12149. Filename=LIC.exe
  12150. Confirmed=X
  12151. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32sdbotya.html" target= blank>SDBOT-YA</a> WORM!
  12152. [local internet web drivers for win32]
  12153. Filename=phqghume.exe
  12154. Confirmed=X
  12155. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  12156. [local page]
  12157. Filename=http://find.naupoint.com
  12158. Confirmed=X
  12159. Description=<a href="http://www.spynet.com/spyware/spyware-NauPoint-Installer.aspx" target=_blank>Naupoint</a> browser hijacker
  12160. [local runole service]
  12161. Filename=srvc32.exe
  12162. Confirmed=X
  12163. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojsmalldp.html" target= blank>SMALL-DP</a> TROJAN!
  12164. [local security authority servce]
  12165. Filename=lssas.exe
  12166. Confirmed=X
  12167. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32poebott.html" target=_blank>POEBOT-T</a> WORM! Note - this is not the legitimate <a href="http://www.liutilities.com/products/wintaskspro/processlibrary/lsass/" target=_blank>lsass.exe</a> process
  12168. [local service]
  12169. Filename=Intenat.exe
  12170. Confirmed=X
  12171. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojnuclearj.html" target=_blank>NUCLEAR-J</a> TROJAN!
  12172. [locator service]
  12173. Filename=[filename]
  12174. Confirmed=X
  12175. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32agobotky.html" target=_blank>AGOBOT-KY</a> TROJAN!
  12176. [lock my pc]
  12177. Filename=lockpc.exe
  12178. Confirmed=U
  12179. Description=<a href="http://www.fspro.net/lmpc/" target=_blank>Lock_My_PC</a> - a tool for quick computer locking when you leave it unattended. It shows a lock screen, disables Windows hot keys and mouse
  12180. [login]
  12181. Filename=winlog.exe
  12182. Confirmed=U
  12183. Description=Salfeld <a href="http://www.salfeld.com/parental_control_overwiew.htm" target="_blank">Child Control 2003</a> - parental control software
  12184. [login screen saver]
  12185. Filename=login.scr
  12186. Confirmed=X
  12187. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotavn.html" target=_blank>RBOT-AVN</a> WORM!
  12188. [login service]
  12189. Filename=[path to file]
  12190. Confirmed=X
  12191. Description=Added by the <a href="https://www.europe.f-secure.com/v-descs/migmaf.shtml" target="_blank">MIGMAF</a> TROJAN!
  12192. [loginpassport]
  12193. Filename=Lgnpsp32.exe
  12194. Confirmed=X
  12195. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.hllw.redist.c@mm.html" target="_blank">REDIST.C</a> WORM!
  12196. [logitech]
  12197. Filename=Logitech.exe
  12198. Confirmed=X
  12199. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_RBOT.BJH&VSect=P" target=_blank>RBOT.BJH</a> WORM!
  12200. [logitech camera]
  12201. Filename=Soundcane.exe
  12202. Confirmed=X
  12203. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_SDBOT.MUC&VSect=T" target=_blank>SDBOT.MUC</a> WORM!
  12204. [logitech desktop controller]
  12205. Filename=wrcam.exe
  12206. Confirmed=X
  12207. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target= blank>RBOT</a> WORM!
  12208. [logitech hardware abstraction layer]
  12209. Filename=Khalmnpr.exe
  12210. Confirmed=U
  12211. Description=For a Logitech Bluetooth wireless mouse. Part of SetPoint that sets the Windows mouse sensitivity to minimum. The idea is that you will use the SetPoint Control Panel to adjust your mouse sensitivity. This setting is maintained separately from the Windows setting, but is combined with the Windows setting to determine the final sensitivity. For this reason, KHALMNPR sets the Windows setting to 0 so it doesn't alter the one you set in SetPoint
  12212. [logitech setpoint]
  12213. Filename=KEM.exe
  12214. Confirmed=U
  12215. Description=Keyboard and mouse drivers and utilities for Logitech's latest products - supersedes iTouch and MouseWare on their older products. Required if you use special features such as multimedia keys
  12216. [logitech utility]
  12217. Filename=Logi_MwX.exe
  12218. Confirmed=U
  12219. Description=Logitech Mouseware driver. Needed to support some additional functionality of Logitech mice/trackballs such as "SmartMove". If you disable it and find you don't need it leave it disabled
  12220. [logitech wakeup]
  12221. Filename=lgwakeup.exe
  12222. Confirmed=N
  12223. Description=Loads at startup and monitors the scanner. When a document is inserted in the scanner the wakeup program feeds the document a fraction of a inch into the scanner and then it launches the control center software. From the control center you can select whether to fax or copy or print the scanned documents. If you uncheck the Logitech wakeup software from the startup it no longer launches the control center or feeds the document a fraction of an inch. You can manually launch the control center software via Start ->Programs and still be able to scan images
  12224. [logitech wireless]
  12225. Filename=logitechwls.exe
  12226. Confirmed=X
  12227. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32mytobbs.html" target=_blank>MYTOB-BS</a> WORM!
  12228. [logitechgalleryrepair]
  12229. Filename=ISStart.exe
  12230. Confirmed=U
  12231. Description=LogitechGalleryRepair/LogitechVideoRepair - part of Logitech Image Studio - installed with Logitech QuickCam cameras. Required from version 8.11 onwards if you use the software to take pictures and capture videos, not if you don't. Also not required for versions up to and including 7.30 and after version 8.30 - hence the "U" rather than "Y" recommendation
  12232. [logitechimagestudiotray]
  12233. Filename=LogiTray.exe
  12234. Confirmed=N
  12235. Description=Logitech Image Studio - installed with Logitech QuickCams
  12236. [logitechs]
  12237. Filename=Logitechs.exe
  12238. Confirmed=X
  12239. Description=Added by the <a href="http://uk.trendmicro-europe.com/enterprise/vinfo/encyclopedia.php?LYstr=VMAINDATA&vNav=1&VName=WORM_SDBOT.BWE" target=_blank>SDBOT.BWE</a> WORM!
  12240. [logitechsoftwareupdate]
  12241. Filename=ManifestEngine.exe
  12242. Confirmed=?
  12243. Description=Updater, part of Logitech Image Studio - installed with Logitech QuickCam cameras. Probably not required
  12244. [logitechvideorepair]
  12245. Filename=ISStart.exe
  12246. Confirmed=U
  12247. Description=LogitechGalleryRepair/LogitechVideoRepair - part of Logitech Image Studio - installed with Logitech QuickCam cameras. Required from version 8.11 onwards if you use the software to take pictures and capture videos, not if you don't. Also not required for versions up to and including 7.30 and after version 8.30 - hence the "U" rather than "Y" recommendation
  12248. [logitechvideotray]
  12249. Filename=LogiTray.exe
  12250. Confirmed=N
  12251. Description=Logitech Image Studio - installed with Logitech QuickCams
  12252. [logitray]
  12253. Filename=LogiTray.exe
  12254. Confirmed=N
  12255. Description=Logitech Image Studio - installed with Logitech QuickCams
  12256. [logi_mwx]
  12257. Filename=Logi_MwX.exe
  12258. Confirmed=U
  12259. Description=Logitech Mouseware driver. Needed to support some additional functionality of Logitech mice/trackballs such as "SmartMove". If you disable it and find you don't need it leave it disabled
  12260. [logo]
  12261. Filename=[path to trojan]
  12262. Confirmed=X
  12263. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojdloaderrh.html" target=_blank>DLOADER-RH</a> TROJAN!
  12264. [logon loader]
  12265. Filename=LogonLoader.exe
  12266. Confirmed=U
  12267. Description=<a href="http://logonloader.danielmilner.com/" target=_blank>Logon Loader</a> - customize boot & login screens
  12268. [logon loader random]
  12269. Filename=LogonLoader.exe
  12270. Confirmed=U
  12271. Description=<a href="http://logonloader.danielmilner.com/" target=_blank>Logon Loader</a> - customize boot & login screens
  12272. [logon.exe]
  12273. Filename=logon.exe
  12274. Confirmed=X
  12275. Description=Added by the <a href="http://ae.trendmicro-europe.com/enterprise/security_info/ve_detail.php?Vname=BKDR_ZINS.A" target=_blank>ZINS.A</a> TROJAN!
  12276. [logonstudio]
  12277. Filename=logonstudio.exe
  12278. Confirmed=U
  12279. Description=WinCustomize <a href="http://www.stardock.com/products/logonstudio/" target="_blank">LogonStudio</a> - "Allows Windows XP users to edit, change, and apply new logon screens. LogonStudio comes built with a visual editor to make it easy to create your own logons which can then be uploaded to websites to be used by others users"
  12280. [logwatch]
  12281. Filename=logwat95.exe
  12282. Confirmed=U
  12283. Description=Licensing patch for products installed on NT by Computer Associates such as eTrust. Detects and updates old versions of lic98.dll - see <a href="http://support.ca.com/Download/patches/licenseit/LO51215.html" target="_blank">here</a>. Not required if you already have a newer version or the patch has been applied
  12284. [longos]
  12285. Filename=WIWT.EXE
  12286. Confirmed=X
  12287. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojbankercd.html" target=_blank>BANKER-CD</a> TROJAN!
  12288. [look 'n' stop]
  12289. Filename=looknstop.exe
  12290. Confirmed=Y
  12291. Description=<a href="http://www.looknstop.com/En/index2.htm">Look 'n' Stop</a> personal firewall
  12292. [looknmeet]
  12293. Filename=Agent.exe
  12294. Confirmed=N
  12295. Description=<a href="http://217.22.55.178/rdl/lnm_v4.3/nl/index.html" target=_blank>LooknMeet</a> dating service
  12296. [lookup_sys]
  12297. Filename=lookupsys.exe
  12298. Confirmed=X
  12299. Description=P04n trojan
  12300. [lotus organizer easyclip]
  12301. Filename=easyclip.exe
  12302. Confirmed=N
  12303. Description="The Easy Clip icon automates the collection of information from sources such as e-mail to create an Organizer address, appointment, task or Notepad page." Available via Start -> Programs
  12304. [lotus quickstart]
  12305. Filename=smartctr.exe
  12306. Confirmed=N
  12307. Description=Lotus central application, called SmartCenter, which runs on the Windows desktop. SmartCenter toolbar stretches across the top or, optionally, the bottom of the screen. Uses a lot of resources. Available via Start -> Programs
  12308. [lotus suitestart]
  12309. Filename=suitest.exe
  12310. Confirmed=U
  12311. Description=Puts the individual Lotus components in the system tray taskbar when you start Windows. Can be disabled via MSCONFIG -> Startup as "Lotus SuiteStart 97 Edition". All individual components available via Start -> Programs
  12312. [lowversionsupport]
  12313. Filename=[filename]
  12314. Confirmed=X
  12315. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.lastras.html" target="_blank">LASTRAS</a> TROJAN!
  12316. [lpr]
  12317. Filename=Lpr123.exe
  12318. Confirmed=X
  12319. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/spyware.rempsteal.html" target=_blank>REMPSTEAL</a> password stealer TROJAN!
  12320. [lpr123]
  12321. Filename=Lpr123.exe
  12322. Confirmed=X
  12323. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/spyware.rempsteal.html" target=_blank>REMPSTEAL</a> password stealer TROJAN!
  12324. [lps]
  12325. Filename=Lps.exe
  12326. Confirmed=U
  12327. Description=Local Port Scanner - "With LPS you're able to check your computer for open or listening ports"
  12328. [lptask]
  12329. Filename=lptask.exe
  12330. Confirmed=U
  12331. Description=<a href="http://www.sanegroup.com/sanegroup/lppro.html" target="_blank">Program Lock It And Protect Pro</a> - lock and protect your folders from being opened, moved or deleted
  12332. [lrbz utility 32]
  12333. Filename=lrbz32.exe
  12334. Confirmed=X
  12335. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32agobotjq.html" target=_blank>AGOBOT-JQ</a> WORM!
  12336. [ls120 superdisk]
  12337. Filename=??
  12338. Confirmed=N
  12339. Description=Supposed to accelerate transfer rate on LS-120, contributes to system lockups
  12340. [lsa service]
  12341. Filename=LSASS.exe
  12342. Confirmed=X
  12343. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.ahker.g@mm.html" target= blank>AHKER.G</a> WORM! Note - this is not the legitimate <a href="http://www.liutilities.com/products/wintaskspro/processlibrary/lsass/" target="_blank">lsass.exe</a> process, which should not appear in Msconfig/Startup!
  12344. [lsa services]
  12345. Filename=lsa2srv.exe
  12346. Confirmed=X
  12347. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32tamec.html" target=_blank>TAME-C</a> WORM!
  12348. [lsa shell (export version)]
  12349. Filename=LSASS.exe
  12350. Confirmed=X
  12351. Description=Added by several variants of the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_AHKER.K&VSect=P" target=_blank>AHKER</a> WORM! Note - this is not the legitimate <a href="http://www.liutilities.com/products/wintaskspro/processlibrary/lsass/" target=_blank>lsass.exe</a> process which is always located in the System (9x/Me) or System32 (NT/2K/XP) folder and should not normally figure in Msconfig/Startup! This file is located in the Winnt or Windows folder
  12352. [lsass 32]
  12353. Filename=ISASS32.pif
  12354. Confirmed=X
  12355. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32assiralc.html" target= blank>ASSIRAL-C</a> WORM!
  12356. [lsass authority]
  12357. Filename=lshosts32.exe
  12358. Confirmed=X
  12359. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojsdbotuy.html" target= blank>SDBOT-UY</a> TROJAN!
  12360. [lsass daemon]
  12361. Filename=LSASSd.exe
  12362. Confirmed=X
  12363. Description=Added by a variant of the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_AGOBOT.GEN" target=_blank>AGOBOT/GAOBOT</a> WORM!
  12364. [lsass service]
  12365. Filename=lsass2.exe
  12366. Confirmed=X
  12367. Description=Added by a variant of the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_AGOBOT.GEN" target=_blank>AGOBOT/GAOBOT</a> WORM!
  12368. [lsass2k update]
  12369. Filename=lsass2k.exe
  12370. Confirmed=X
  12371. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  12372. [lsass64bit.exe]
  12373. Filename=lsass64BiT.exe
  12374. Confirmed=X
  12375. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32forbotck.html" target=_blank>FORBOT-CK</a> WORM!
  12376. [lsassig]
  12377. Filename=lsassig.exe
  12378. Confirmed=X
  12379. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojbancosec.html" target=_blank>BANCOS-EC</a> TROJAN!
  12380. [lsasss]
  12381. Filename=lsasss.exe
  12382. Confirmed=X
  12383. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojgeekmya.html" target=_blank>GEEKMY-A</a> TROJAN!
  12384. [lsasss.exe]
  12385. Filename=lsasss.exe
  12386. Confirmed=X
  12387. Description=Added by the <a href="http://uk.trendmicro-europe.com/enterprise/security_info/ve_detail.php?VName=WORM_SASSER.E" target="_blank">SASSER.E</a> WORM!
  12388. [lsburnwatcher]
  12389. Filename=lsburnwatcher.exe
  12390. Confirmed=N
  12391. Description=Used for automatically updating HP programs
  12392. [lsess]
  12393. Filename=lsess.exe
  12394. Confirmed=X
  12395. Description=Added by the <a href="http://www.symantec.com/avcenter/venc/data/w32.sinnaka.a@mm.html" target=_blank>SINNAKA.A</a> WORM!
  12396. [lsmass]
  12397. Filename=lsmass.exe
  12398. Confirmed=X
  12399. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojwallopb.html" target=_blank>WALLOP-B</a> TROJAN!
  12400. [lsmss.exe]
  12401. Filename=lsmss.exe
  12402. Confirmed=X
  12403. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojproxygg.html" target=_blank>PROXY-GG</a> TROJAN!
  12404. [lspfix]
  12405. Filename=LSPmonitor.exe
  12406. Confirmed=N
  12407. Description=eAcceleration Stop-Sign related - not recommended, see <a href="http://www.spywarewarrior.com/rogue_anti-spyware.htm#ss_note" target=_blank>note</a>
  12408. [lspins]
  12409. Filename=igps.exe
  12410. Confirmed=X
  12411. Description=Reported as the VB.KC TROJAN by Kapersky Anti-Virus
  12412. [lspmonitor]
  12413. Filename=LSPmonitor.exe
  12414. Confirmed=N
  12415. Description=eAcceleration Stop-Sign related - not recommended, see <a href="http://www.spywarewarrior.com/rogue_anti-spyware.htm#ss_note" target=_blank>note</a>
  12416. [lssass]
  12417. Filename=lssas.exe
  12418. Confirmed=X
  12419. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_AGOBOT.RL" target=_blank>AGOBOT.RL</a> WORM!
  12420. [lsvr]
  12421. Filename=LSvr.exe
  12422. Confirmed=X
  12423. Description=<a href="http://research.sunbelt-software.com/threat_display.cfm?name=PowerStrip&threatid=14844&search=PowerStrip" target=_blank>PowerStrip</a> foistware
  12424. [lt daemon]
  12425. Filename=ltdaemon.exe
  12426. Confirmed=Y
  12427. Description=Acts as a data spooler for the DSL modem (similar to a cache). Do not uncheck if the DSL modem is being used
  12428. [ltdmgr]
  12429. Filename=LTDMgr.exe
  12430. Confirmed=X
  12431. Description=<a href="http://research.sunbelt-software.com/threat_display.cfm?name=PowerStrip&threatid=14844&search=PowerStrip" target=_blank>PowerStrip</a> foistware
  12432. [ltmoh]
  12433. Filename=Ltmoh.exe
  12434. Confirmed=U
  12435. Description=Modem On Hold utility - manages incoming/outgoing voice calls on a single phone line while being connected to the internet
  12436. [ltmsg]
  12437. Filename=ltmsg.exe
  12438. Confirmed=Y
  12439. Description=One of the "popular" WinModem series. WinModems use software rather than hardware - hence putting a load on the CPU. Needed if you have it for loading the drivers. See <a href="http://808hi.com/56k/winmodems.asp" target="_blank">here</a> for more WinModem information
  12440. [ltsmmsg]
  12441. Filename=LTSMMSG.exe
  12442. Confirmed=N
  12443. Description=Lucent Tech. Soft Modem Messaging application - may be found on Fujitsu Lifebook, Acer and Sony Vaio notebooks, maybe others too
  12444. [ltsmsg]
  12445. Filename=Shell32.exe
  12446. Confirmed=X
  12447. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/pwsteal.lemir.b.html" target="_blank">LEMIR.B</a> TROJAN!
  12448. [ltt2]
  12449. Filename=rundll32.exe
  12450. Confirmed=X
  12451. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojlineagebi.html" target=_blank>LINEAGE-BI</a> TROJAN!
  12452. [ltwinmodem1]
  12453. Filename=ltmsg.exe
  12454. Confirmed=Y
  12455. Description=One of the "popular" WinModem series. WinModems use software rather than hardware - hence putting a load on the CPU. Needed if you have it for loading the drivers. See <a href="http://808hi.com/56k/winmodems.asp" target="_blank">here</a> for more WinModem information
  12456. [luguard]
  12457. Filename=LUGuard.exe
  12458. Confirmed=U
  12459. Description=PC-Duo <a href="http://www.vector-networks.com/pc-duo-enterprise/remote-control.php" target=_blank>Remote Control</a> enables your help desk technicians to take instant control of any remote desktop PC at any location across the LAN, WAN or internet
  12460. [lusetup]
  12461. Filename=LUSetup.exe
  12462. Confirmed=Y
  12463. Description=Symantec <a href="http://service1.symantec.com/support/sharedtech.nsf/docid/1999051911110813" target=_blank>LiveUpdate installer</a> - required to install a new version of the application. Will only run once, and the entry is automatically deleted after a reboot
  12464. [lvcoms]
  12465. Filename=lvcoms.exe
  12466. Confirmed=U
  12467. Description=Lvcomm server. Related to Logitech Quick Cam - works fine without it but it is needed for the Logitech ImageStudio software to connect to the camera
  12468. [lvcomsx]
  12469. Filename=LVCOMSX.EXE
  12470. Confirmed=U
  12471. Description=It provides extra functionality for Logitech multimedia webcam devices. It is non-essential to the running of the system, but should not be terminated unless suspected to be causing problems
  12472. [lwinst run profiler]
  12473. Filename=lwtest.exe
  12474. Confirmed=N
  12475. Description=Logitech Wingman Profiler for the Logitech joysticks. Available via Start -> Programs
  12476. [lxamsp32]
  12477. Filename=lxamsp32.exe
  12478. Confirmed=?
  12479. Description=<font color="#FF0000">Associated with a Lexmark Printer - is it required?</font>
  12480. [lxbbmgr]
  12481. Filename=LXbbmgr.exe
  12482. Confirmed=?
  12483. Description=<font color="#FF0000">Lexmark printer button manager? Is it required?</font>
  12484. [lxblksk]
  12485. Filename=LXBLKsk.exe
  12486. Confirmed=?
  12487. Description=Lexmark related. <font color="#FF0000">What does it do, and is it required?</font>
  12488. [lxbrbmgr]
  12489. Filename=lxbrbmgr.exe
  12490. Confirmed=Y
  12491. Description=Lexmark printer button manager. Required for correct operation
  12492. [lxbrksk]
  12493. Filename=LXBRKsk.exe
  12494. Confirmed=?
  12495. Description=Lexmark printer related. <font color="#FF0000">What does it do and is it required?</font>
  12496. [lxbtcats]
  12497. Filename=rundll32 [path] LXBTtime.dll, _RunDLLEntry@16
  12498. Confirmed=?
  12499. Description=Lexmark printer related - <font color="#FF0000">what does it do and is it required?</font>
  12500. [lxsupmon]
  12501. Filename=LXSUPMON.EXE
  12502. Confirmed=N
  12503. Description=Lexmark Printer. The printer should work fine without it
  12504. [lycosinside]
  12505. Filename=Lyc_SysTray.exe
  12506. Confirmed=?
  12507. Description=<a href="http://email.about.com/gi/dynamic/offsite.htm?zi=1/XJ&sdn=email&zu=http://mail.lycos.com/" target=_blank>Lycos eMail</a> related - <font color="#FF0000">what does it do and is it required?</font>
  12508. [lyrahd2trayapp]
  12509. Filename=LYRAHD2TrayApp.exe
  12510. Confirmed=U
  12511. Description=Related to RCA Lyra MP3 Player
  12512. [lziomediaupdater]
  12513. Filename=LzioMediaUpdater.exe
  12514. Confirmed=X
  12515. Description=<a href="http://www.spywareguide.com/product_show.php?id=853" target="_blank">LZIO.com</a> adware downloader
  12516. [m player post installer]
  12517. Filename=postinstallm.exe
  12518. Confirmed=?
  12519. Description=<font color="#FF0000">??</font>
  12520. [m s dvd directx dll drivers]
  12521. Filename=msxdl.exe
  12522. Confirmed=X
  12523. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32sdbotbjn.html" target= blank>SDBOT-BJN</a> WORM!
  12524. [m-soft office]
  12525. Filename=M-soft Office.hta
  12526. Confirmed=X
  12527. Description=HTA file which creates an executable on the hard drive which subsequently proceeds to download files from a malware site!
  12528. [m1cr0s0ft s3rcurity]
  12529. Filename=systemconfig.exe
  12530. Confirmed=X
  12531. Description=Added by the <a href="http://uk.trendmicro-europe.com/enterprise/security_info/ve_detail.php?Vname=WORM_RBOT.BKB" target=_blank>RBOT.BKB</a> WORM!
  12532. [m1cr0s0ft upd4t4zs]
  12533. Filename=update32.exe
  12534. Confirmed=X
  12535. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotmi.html" target=_blank>RBOT-MI</a> WORM!
  12536. [m32info]
  12537. Filename=m32info.exe
  12538. Confirmed=X
  12539. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=TROJ_CRYPTER.A" target="_blank">CRYPTER.A</a> TROJAN!
  12540. [m3tray]
  12541. Filename=m3tray.exe
  12542. Confirmed=N
  12543. Description=<a href="http://www.movielink.com/" target="_blank">Movielink</a> - internet movie rental System Tray access
  12544. [macfee security patch]
  12545. Filename=Mpfsheild.exe
  12546. Confirmed=X
  12547. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotnp.html" target=_blank>RBOT-NP</a> WORM!
  12548. [machine update soft]
  12549. Filename=wusas.exe
  12550. Confirmed=X
  12551. Description=Added by an unidfentified WORM!
  12552. [maclic]
  12553. Filename=MacLic.exe
  12554. Confirmed=N
  12555. Description=Part of <a href="http://www.dataviz.com/products/conversionsplus/index.html" target="_blank">Conversions Plus</a> from DataViz - allowing PC and MAC owners to share disks
  12556. [macname]
  12557. Filename=MacName.exe
  12558. Confirmed=N
  12559. Description=Part of <a href="http://www.dataviz.com/products/conversionsplus/index.html" target="_blank">Conversions Plus</a> from DataViz - allowing PC and MAC owners to share disks
  12560. [macromedia critical updater]
  12561. Filename=rarww.exe
  12562. Confirmed=X
  12563. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  12564. [macromedia dreamweaver xm]
  12565. Filename=macdwXM.exe
  12566. Confirmed=X
  12567. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32agobotri.html" target=_blank>AGOBOT-RI</a> WORM!
  12568. [macromedia drive]
  12569. Filename=Iexplor32.exe
  12570. Confirmed=X
  12571. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  12572. [mad.exe]
  12573. Filename=MAD.EXE
  12574. Confirmed=Y
  12575. Description=MAD.exe is the MS Exchange 5.5 System Attendant and can also consume a large amount of resources - resolved by the latest Exchange 5.5 Service Pack. Also part of Exchange 2000 Server but does it have the same problems?. Apparently you need to leave this running but is it needed at start-up?
  12576. [madexe]
  12577. Filename=LaunchRA.exe
  12578. Confirmed=N
  12579. Description=Dell Resolution Assistant
  12580. [mafwtaskbarapp]
  12581. Filename=MAFWTray.exe
  12582. Confirmed=U
  12583. Description=Drivers for the M-Audio Firewire Audiophile - Interface
  12584. [magicdsk]
  12585. Filename=MAGICDSK.EXE
  12586. Confirmed=U
  12587. Description=Magic DeskTop is a small and novel utility which will allow you the option of hiding or showing your desktop icons
  12588. [magitime]
  12589. Filename=Magitime.exe
  12590. Confirmed=N
  12591. Description=<a href="http://www.geocities.com/magistone/magitime.htm" target="_blank">Magitime</a> - connection tracking utility which monitors online time, expense, data transfer
  12592. [mail.com]
  12593. Filename=mcalert.exe
  12594. Confirmed=?
  12595. Description=<a href="http://mail01.mail.com/" target="_blank">Mail.com</a> - free web-mail service. <font color="#FF0000">Does mcalert.exe notify you when new mail has arrived?</font>
  12596. [mailbell]
  12597. Filename=mailbell.exe
  12598. Confirmed=U
  12599. Description=<a href="http://www.emtec.com/mailbell/" target="_blank">MailBell</a> e-mail notification tool that will notify you about new messages arrived to your mailbox. Works with both POP3 mailboxes and web-mail based systems. You should be able to set your mail system to check all accounts at regular intervals anyway if you prefer (in Outlook for instance)
  12600. [mailbox verifier]
  12601. Filename=mboxvrfy.exe
  12602. Confirmed=U
  12603. Description=<a href="http://" target="_blank">Mailbox Verifier (MV)</a> is free software that will notify you about new messages arrived to your mailbox. Only works with POP3 mailboxes (not web-mail based systems). You should be able to set your mail system to check all accounts at regular intervals anyway if you prefer (in Outlook for instance)
  12604. [mailcleaner]
  12605. Filename=MAILCLEANER.EXE
  12606. Confirmed=X
  12607. Description=MailCleaner "protect your computer from viruses sent to your machine via the popular e-Mail reader Incredimail. In addition the program will check all incoming files downloaded by Internet Explorer, Netscape Navigator, ICQ and iMesh" - not recommended as it bundles <a href="http://www.doxdesk.com/parasite/Gator.html" target=_blank>Gator</a> adware
  12608. [mailman.exe]
  12609. Filename=mailman.exe
  12610. Confirmed=X
  12611. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojcertife.html" target=_blank>CERTIF-E</a> TROJAN!
  12612. [mailscan dispatcher]
  12613. Filename=Launch.exe
  12614. Confirmed=Y
  12615. Description=<a href="http://www.mspl.net/antivirus/mailscan/ms4adv.asp" target="_blank">MailScan</a> Dispatcher splits each e-mail message into various components such as the header, body and attachment. Compressed formats (ZIP, ARJ, etc.) are scanned for viruses and cleaned
  12616. [mail_check]
  12617. Filename=Mail_Check.exe
  12618. Confirmed=X
  12619. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_PANOIL.C" target="_blank">PANOIL.C</a> WORM!
  12620. [main]
  12621. Filename=main.exe
  12622. Confirmed=U
  12623. Description=<a href="http://www.spycop.com/" target="_blank">SpyCop</a> surveillance software detection - checks to see when your machine was last scanned and if it was more than a week asks if you want to scan
  12624. [main executable (hp)]
  12625. Filename=HP05T0R5.exe
  12626. Confirmed=?
  12627. Description=<font color="#FF0000">HP (Hewlett-Packard) related. Maybe related to printers. Now - what does it do?</font>
  12628. [main16]
  12629. Filename=main16.exe
  12630. Confirmed=X
  12631. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=TROJ_CRYPTER.A" target="_blank">CRYPTER.A</a> TROJAN!
  12632. [main32]
  12633. Filename=main32.exe
  12634. Confirmed=X
  12635. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=TROJ_CRYPTER.A" target="_blank">CRYPTER.A</a> TROJAN!
  12636. [mainstart]
  12637. Filename=svcmfte32.exe
  12638. Confirmed=X
  12639. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojstinxa.html" target=_blank>STINX-A</a> TROJAN!
  12640. [mainviewex]
  12641. Filename=mainviewex.exe
  12642. Confirmed=X
  12643. Description=Added by the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=40493" target=_blank>GEMA.D</a> TROJAN!
  12644. [major microsoft windows driver boot loader]
  12645. Filename=bpool.exe
  12646. Confirmed=X
  12647. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.mytob.aj@mm.html" target=_blank>MYTOB.AJ</a> WORM!
  12648. [manageprotocolctrl]
  12649. Filename=csmsv.exe
  12650. Confirmed=X
  12651. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.looksky.b.html" target=_blank>LOOKSKY.B</a> TROJAN!
  12652. [mania win restore]
  12653. Filename=RESWIN.EXE
  12654. Confirmed=N
  12655. Description=Pinball Mania for Windows from 21st Century Entertainment LTD (1995). Runs briefly at start-up then terminates. Available via Start -> Programs
  12656. [mantis]
  12657. Filename=[filename]
  12658. Confirmed=X
  12659. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.mantibe.html" target="_blank">MANTIBE</a> VIRUS!
  12660. [mapidrv]
  12661. Filename=mpisvc.exe
  12662. Confirmed=X
  12663. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.mipsiv.html" target="_blank">MIPSIV</a> TROJAN!
  12664. [mapisvc32]
  12665. Filename=mapisvc32.exe
  12666. Confirmed=X
  12667. Description=Added by the KX VIRUS and also recognised by Symantec as <a href="http://securityresponse.symantec.com/avcenter/venc/data/adware.fapi.html" target="_blank"> FPAI</a> adware
  12668. [mark the service]
  12669. Filename=xxtra32.exe
  12670. Confirmed=X
  12671. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_SDBOT.APP&VSect=T" target=_blank>SDBOT.APP</a> WORM!
  12672. [martini]
  12673. Filename=pinmart.exe
  12674. Confirmed=X
  12675. Description=Added by a variant of the <a href="http://vil.nai.com/vil/content/v_100454.htm" target=_blank>SDBOT</a> WORM!
  12676. [mascro soft sdk updates2]
  12677. Filename=SDKrepair2.exe
  12678. Confirmed=X
  12679. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_SDBOT.BXM&VSect=P" target=_blank>SDBOT.BXM</a> WORM!
  12680. [masqform.exe]
  12681. Filename=masqform.exe
  12682. Confirmed=N
  12683. Description=PureEdge Viewer 6.0, reportedly associated with viewing and text editing US Air Force electronic forms
  12684. [mass storage check registry]
  12685. Filename=rundll32.exe MSDServ.dll, check registry
  12686. Confirmed=N
  12687. Description=Used with a USB based smartmedia card reader
  12688. [master volume spy]
  12689. Filename=MASTERVOLUMESPY.EXE
  12690. Confirmed=U
  12691. Description=Volume control for the Gateway Destination "DestiVu" media interface
  12692. [matrixscreen]
  12693. Filename=[filename]
  12694. Confirmed=X
  12695. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/trojan.matrixscreen.html" target=_blank>MATRIXSCREEN</a> TROJAN!
  12696. [matrixscreensaver]
  12697. Filename=mss.exe
  12698. Confirmed=X
  12699. Description=Malware, see <a href="http://www.spywareinfo.com/forums/index.php?s=&act=ST&f=11&t=7278" target="_blank"> here</a>
  12700. [matrox color control]
  12701. Filename=hgcctl95.exe
  12702. Confirmed=N
  12703. Description=For Matrox video cards. Quick access to changing colors
  12704. [matrox control center]
  12705. Filename=mgactrl.exe
  12706. Confirmed=N
  12707. Description=For Matrox video cards. Quick access to settings
  12708. [matrox diagnostic]
  12709. Filename=mgadiag.exe
  12710. Confirmed=N
  12711. Description=For Matrox video cards. Quick access to diagnostics
  12712. [matrox powerdesk]
  12713. Filename=PDesk.exe
  12714. Confirmed=N
  12715. Description=For Matrox video cards. Quick access to tweak your card to your liking
  12716. [matrox powerdesk 8]
  12717. Filename=Matrox.PowerDesk.exe /silent
  12718. Confirmed=N
  12719. Description=For Matrox video cards. Quick access to tweak your card to your liking
  12720. [matrox quickdesk]
  12721. Filename=mgaqdesk.exe
  12722. Confirmed=N
  12723. Description=For Matrox video cards. Quick access to tweak your card to your liking
  12724. [maxalerts]
  12725. Filename=max.exe
  12726. Confirmed=X
  12727. Description=Bonzi MaxALERT - spyware
  12728. [maxtorcombo]
  12729. Filename=ComboButton.exe
  12730. Confirmed=Y
  12731. Description=Required to be able to use the Maxtor OneTouch button on your external Maxtor harddrive. It is used to start up backup software (Retrospect)
  12732. [maxtorreg]
  12733. Filename=AUTOREG.EXE
  12734. Confirmed=U
  12735. Description=Part of <a href="http://www.netsizzle.net/sysagent.asp" target="_blank">SYSagent</a> - small utility for retrieving all the hardware and software information required by anyone administering a machine and/or the network it's a part of
  12736. [mayapan]
  12737. Filename=MayaPan.Exe
  12738. Confirmed=Y
  12739. Description=Audiotrak <a href="http://www.soundcard-drivers.com/drivers/50/50137.htm" target=_blank>Maya</a> soundcard driver
  12740. [mbm 4]
  12741. Filename=MBM4.exe
  12742. Confirmed=U
  12743. Description=Motherboard Monitor 4 - only needed if you overclock your system and want to keep a check on system temperatures/voltages/etc. Available via Start -> Programs
  12744. [mbm 5]
  12745. Filename=MBM5.exe
  12746. Confirmed=U
  12747. Description=<a href="http://mbm.livewiredev.com/" target=_blank>Motherboard Monitor 5</a> - only needed if you overclock your system and want to keep a check on system temperatures/voltages/etc. Available via Start -> Programs
  12748. [mbnet]
  12749. Filename=mbnet.exe
  12750. Confirmed=U
  12751. Description=MBNet (Portugal) Credit Card Processing software
  12752. [mbprobe]
  12753. Filename=mbrpobe.exe
  12754. Confirmed=U
  12755. Description=<a href="http://mbprobe.livewiredev.com/about.html" target="_blank">MBProbe</a> - only needed if you overclock your system and want to keep a check on system temperatures/voltages/etc. Available via Start -> Programs
  12756. [mcafee]
  12757. Filename=McAffeAv.exe
  12758. Confirmed=X
  12759. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_NETSKY.AL&VSect=P" target=_blank>NETSKY.AL</a> WORM!
  12760. [mcafee anti scan]
  12761. Filename=NortonScn.exe
  12762. Confirmed=X
  12763. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target="_blank">RBOT</a> WORM!
  12764. [mcafee antivirus]
  12765. Filename=McAfeeAV.exe
  12766. Confirmed=X
  12767. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  12768. [mcafee antivirus monitoring system326]
  12769. Filename=VSStatmn326.exe
  12770. Confirmed=X
  12771. Description=Added by a variant of the <a href="http://vil.nai.com/vil/content/v_100454.htm" target=_blank>SDBOT</a> WORM!
  12772. [mcafee antivirus monitoring system32mn]
  12773. Filename=VSStatmn32.exe
  12774. Confirmed=X
  12775. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  12776. [mcafee antivirus protection]
  12777. Filename=mcafeeAV.exe
  12778. Confirmed=X
  12779. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target= blank>RBOT</a> WORM!
  12780. [mcafee auto protect]
  12781. Filename=mcafeshield.exe
  12782. Confirmed=X
  12783. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotuh.html" target=_blank>RBOT-UH</a> WORM!
  12784. [mcafee firewall]
  12785. Filename=CPD.EXE
  12786. Confirmed=Y
  12787. Description=Firewall bundled with McAfee VirusScan 6.*. Can also be listed as CPD_EXE
  12788. [mcafee guardian]
  12789. Filename=CMGRDIAN.EXE
  12790. Confirmed=N
  12791. Description=McAfee's QuickClean, an offline version of the one in their online Clinic. Normally run offline and not needed. Incidentally, incorporates more cleanup programs than the likes of WinOptimizer and System Mechanic
  12792. [mcafee quickclean imonitor]
  12793. Filename=Plguni.exe
  12794. Confirmed=N
  12795. Description=<a href="http://www.mcafee.com/myapps/qc3/default.asp" target=_blank>McAfee QuickClean 3.0</a> - removes internet clutter and unwanted programs
  12796. [mcafee software intrenet]
  12797. Filename=mcafee.exe
  12798. Confirmed=X
  12799. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotatr.html" target=_blank>RBOT-ATR</a> WORM! Note - this is not a valid McAfee program
  12800. [mcafee windows protection]
  12801. Filename=mcafee32.exe
  12802. Confirmed=X
  12803. Description=Added by a variant of the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.spybot.worm.html" target=_blank>SPYBOT</a> WORM!
  12804. [mcafee winguage]
  12805. Filename=??
  12806. Confirmed=N
  12807. Description=Part of McAfee Nuts & Bolts. "WinGuage is a dynamic reporting tool that constantly monitors your use of Windows and your applications, to alert you to potential problems before they become serious". Resource hog. Available via Start -> Programs
  12808. [mcafee.instantupdate.monitor]
  12809. Filename=RuLaunch.exe
  12810. Confirmed=U
  12811. Description=Instant Updater for McAfee's VirusScan, Internet Security, Quick Clean, Uninstaller and Firewall products. In the case of VirusScan leave it enabled unless you update manually on a regular basis
  12812. [mcafeescanplus]
  12813. Filename=McAfeeScanPlus.exe
  12814. Confirmed=X
  12815. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.mepcod.html" target=_blank>Backdoor.Mepcod</a> TROJAN! This trojan file does not belong to any McAfee Antivirus Software and is found in the Windows or Winnt folder
  12816. [mcafeeupdaterui]
  12817. Filename=UpdaterUI.exe
  12818. Confirmed=Y
  12819. Description=Associated with McAfee Enterprise 7.0.0. - background process
  12820. [mcafeevirusscanservice]
  12821. Filename=Avsynmgr.exe
  12822. Confirmed=Y
  12823. Description=From McAfee VirusScan version 5.x. Runs VirusScan System Tray (Vsstat.exe), WebScanX (Webscanx.exe), VirusScan System Scan (Vshwin32.exe) and VirusScan Console (Avconsol.exe) under one application
  12824. [mcafeewebscanx]
  12825. Filename=WebScanX.exe
  12826. Confirmed=Y
  12827. Description=From McAfee VirusScan up to version 4.x. Provides functionality for VShield Download Scan and Internet Filter modules. Enables internet scanning. Guards against malicious ActiveX programs, etc
  12828. [mcaffe antivirus]
  12829. Filename=Mcafeescn.exe
  12830. Confirmed=X
  12831. Description=Added by a variant of the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.spybot.worm.html" target="_blank">SPYBOT</a> WORM!
  12832. [mcagentexe]
  12833. Filename=mcagent.exe
  12834. Confirmed=U
  12835. Description=From McAfee VirusScan On-line. The Agent is a red M icon that appears in the Windows system tray or Notification Area (if you're running Windows XP). If you don't see the agent icon, VirusScan Online may not be installed
  12836. [mcappins.exe]
  12837. Filename=mcappins.exe
  12838. Confirmed=?
  12839. Description=McAfee Application Installer.<font color="#FF0000"> </font><font color="#FF0000">What does it do and is it required?</font>
  12840. [mchanger]
  12841. Filename=MChanger.exe
  12842. Confirmed=N
  12843. Description=Media Changer - utility that allows you to change wallpapers, sounds, themes, etc
  12844. [mcm3]
  12845. Filename=mcm3.exe
  12846. Confirmed=X
  12847. Description=<a href="http://www3.ca.com/securityadvisor/pest/pest.aspx?id=453076082" target= blank>ShopAtHome/SAHagent</a> adware variant
  12848. [mcregwiz]
  12849. Filename=mcregwiz.exe
  12850. Confirmed=?
  12851. Description=McAfee antivirus related. <font color="#FF0000">What does it do and is it required?</font>
  12852. [mcrosoftr update]
  12853. Filename=Mcrosoftr.exe
  12854. Confirmed=X
  12855. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  12856. [mcvsrte]
  12857. Filename=mcvsrte.exe
  12858. Confirmed=Y
  12859. Description=Part of McAfee's <a href="http://us.mcafee.com/root/product.asp?productid=msc" target="_blank">SecurityCenter</a>. Must remain checked but one user reports Windows glitches with no response from McAfee as to why
  12860. [mcvsshld]
  12861. Filename=mcvsshld.exe
  12862. Confirmed=Y
  12863. Description=McAfee VirusScan On-line. See also the McAgentExe entry
  12864. [mcx update]
  12865. Filename=wisp.exe
  12866. Confirmed=X
  12867. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotaqh.html" target=_blank>RBOT-AQH</a> WORM!
  12868. [mcx updte]
  12869. Filename=scorti.exe
  12870. Confirmed=X
  12871. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotarp.html" target=_blank>RBOT-ARP</a> WORM!
  12872. [mdac_runonce]
  12873. Filename=runonce.exe
  12874. Confirmed=N
  12875. Description=Associated with MS Data Access Components (MDAC). Sometimes left over after installation - not required. NOTE :- don't delete "runonce.exe". 
  12876. [mddiskprotect.exe]
  12877. Filename=MDDiskProtect.exe
  12878. Confirmed=N
  12879. Description=MediaFour <a href="http://www.mediafour.com/products/macdrive6/" target= blank>MacDrive</a> for Windows - easily open, edit and save files from Mac-formatted disks, format Mac disks and burn Mac CDs and DVDs!
  12880. [mdetect]
  12881. Filename=[path to trojan]
  12882. Confirmed=X
  12883. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/trojan.spabot.html" target="_blank">SPABOT</a> TROJAN!
  12884. [mdm7]
  12885. Filename=mdm.exe
  12886. Confirmed=U
  12887. Description=Used by developers for debugging. Those who have encountered it have unchecked it with no degradation in performance. May cause your computer to "hang" if you have MS Visual Studio installed and this disabled because it appears to take over error handling - hence the U recommendatioon. Can also be listed as Machine Debug Manager. See <a href="http://support.microsoft.com/default.aspx?scid=kb;en-us;321410" target="_blank"> here</a> to disable
  12888. [mdmdll]
  12889. Filename=mdmdll.exe
  12890. Confirmed=X
  12891. Description=Added by the <a href="http://www.pestpatrol.com/PestInfo/t/trojandownloader_win32_crypter.asp" target=_blank>CRYPTER</a> TROJAN!
  12892. [mdmdll32]
  12893. Filename=mdmdll32.exe
  12894. Confirmed=X
  12895. Description=Added by a variant of the <a href="http://www.sophos.com/virusinfo/analyses/trojcrypterc.html" target="_blank">CRYPTER.C</a> TROJAN!
  12896. [mds.exe]
  12897. Filename=mds.exe
  12898. Confirmed=X
  12899. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojmadsa.html" target= blank>MADS-A</a> TROJAN!
  12900. [mdwmdmsp]
  12901. Filename=mdwmdmsp.exe
  12902. Confirmed=X
  12903. Description=Adware - recognized by <a href="http://www.kaspersky.com/personalpro" target=_blank>Kaspersky</a> antivirus and others as TrojanDownloader.Win32.Agent.am
  12904. [meca]
  12905. Filename=Meca.exe
  12906. Confirmed=N
  12907. Description=<a href="http://www.meca.com/Default.htm" target="_blank">Meca</a> instant messenging client
  12908. [medgs]
  12909. Filename=MEDGS1.exe
  12910. Confirmed=X
  12911. Description=<a href="http://www.benedelman.org/spyware/installations/pacerd/" target=_blank>PacerD_Media/Pacimedia.com</a> adware
  12912. [media gateway]
  12913. Filename=MediaGateway.exe
  12914. Confirmed=X
  12915. Description=<a href="http://www.pcpitstop.com/news/dave/2005-07.asp" target=_blank>180Solutions</a> Windupdates adware variant - also see <a href="http://www.pcpitstop.com/news/dave/2005-07.asp" target=_blank>here</a>
  12916. [media load]
  12917. Filename=msn32.exe
  12918. Confirmed=X
  12919. Description=Added by a unidentified WORM or TROJAN!
  12920. [media manager indexer]
  12921. Filename=AIRSVCU.EXE
  12922. Confirmed=U
  12923. Description=Part of MS Visual InterDev, Media Manager is an easy media file management system that works in conjunction with Windows Explorer. The Media Manager Indexer is a program that indexes all the information about your media files and puts it into a database. For more information see <a href="http://www.cug.edu.cn/fwzn/wlzx/wlfw/vid/USINGVID/0-7897/0-7897-0762-4/ch09.htm" target="_blank">here</a>
  12924. [media player update]
  12925. Filename=xpsp1mfh.exe
  12926. Confirmed=X
  12927. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  12928. [media plug x.1.2]
  12929. Filename=msdm.exe
  12930. Confirmed=X
  12931. Description=Added by the MULDROP.352 VIRUS!
  12932. [media software updater]
  12933. Filename=sscs.exe
  12934. Confirmed=X
  12935. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotabe.html" target= blank>RBOT-ABE</a> WORM!
  12936. [media x services]
  12937. Filename=MSNGRx.exe
  12938. Confirmed=X
  12939. Description=Added by the <a href="http://de.trendmicro-europe.com/enterprise/security_info/ve_detail.php?VName=WORM_RBOT.AUL" target=_blank>RBOT.AUL</a> WORM!
  12940. [media-xp-service-pack3]
  12941. Filename=msnzx.exe
  12942. Confirmed=X
  12943. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32sdbotacw.html" target=_blank>SDBOT-ACW</a> WORM!
  12944. [media32]
  12945. Filename=[path to trojan]
  12946. Confirmed=X
  12947. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojpurscanz.html" target=_blank>PURSCAN-Z</a> TROJAN!
  12948. [mediaface integration]
  12949. Filename=Sethook.exe
  12950. Confirmed=N
  12951. Description=Fellowes Neato?cd label design software. "Launch NEATO's MediaFACE II label making software directly from the productname toolbar"
  12952. [mediafour mac volume notifications]
  12953. Filename=Macvntfy.exe
  12954. Confirmed=U
  12955. Description=<a href="http://www.mediafour.com/products/xplay/" target="_blank">Mediafour Xplay</a> - allows you to use an Apple iPod digital music player with a PC running Windows. If not used regularily start manually before connecting the iPod
  12956. [mediafour xplay tray notification icon]
  12957. Filename=Xptryicn.exe
  12958. Confirmed=U
  12959. Description=<a href="http://www.mediafour.com/products/xplay/" target=_blank>Mediafour Xplay</a> - allows you to use an Apple iPod digital music player with a PC running Windows. If not used regularily start manually before connecting the iPod
  12960. [mediakey]
  12961. Filename=MediaKey.exe
  12962. Confirmed=U
  12963. Description=<a href="http://www.futurepowerusa.com/support/kb_911/help/overview.htm" target="_blank">Multimedia keyboard</a> manager. Required if you use the multimedia keys
  12964. [medialoads]
  12965. Filename=dw.exe
  12966. Confirmed=X
  12967. Description=<a href="http://research.sunbelt-software.com/threat_display.cfm?name=DownloadWare&threatid=4620&search=medialoads" target=_blank>Medialoads</a> adware
  12968. [medialoads installer]
  12969. Filename=dw.exe
  12970. Confirmed=X
  12971. Description=<a href="http://research.sunbelt-software.com/threat_display.cfm?name=DownloadWare&threatid=4620&search=medialoads" target=_blank>Medialoads</a> adware
  12972. [mediamonitor]
  12973. Filename=Mediam~1.exe
  12974. Confirmed=N
  12975. Description=Installed by Smartdisk MVP CD burning software. Software will work fine without it
  12976. [mediamotor.exe]
  12977. Filename=mmups.exe
  12978. Confirmed=X
  12979. Description=<a href="http://securityresponse.symantec.com/avcenter/venc/data/adware.popuppers.html" target= blank>MediaMotor/Popuppers</a> adware
  12980. [mediapipe p2p loader]
  12981. Filename=mpp2pl.exe
  12982. Confirmed=X
  12983. Description=Reported by <a href="http://www.ewido.net/en/" target=_blank>Ewido Security Suite</a> as MetaDirect SPYWARE!
  12984. [mediapluscash.exe]
  12985. Filename=mediapluscash.exe
  12986. Confirmed=X
  12987. Description=<a href="http://securityresponse.symantec.com/avcenter/venc/data/adware.popuppers.html" target=_blank>MediaMotor/Popuppers</a> adware
  12988. [mediaring talk]
  12989. Filename=mrtalk.exe
  12990. Confirmed=N
  12991. Description=Media Ring Talk, voice recognition software, Resource hog. Available via Start -> Programs
  12992. [mediaxpservicepack]
  12993. Filename=mxpsp.exe
  12994. Confirmed=X
  12995. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_SDBOT.CDT&VSect=T" target=_blank>SDBOT.CDT</a> WORM!
  12996. [media_driver]
  12997. Filename=media_driver.exe
  12998. Confirmed=X
  12999. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.tupeg.html" target=_blank>TUPEG</a> VIRUS! Note - this malware actually changes the default value data of the Registry "Run" key in order to force Windows to launch it at boot. Name field may be empty
  13000. [media_manager]
  13001. Filename=mediaman.exe
  13002. Confirmed=X
  13003. Description=<a target="_blank" href="http://www.mini-player.com/">Mini-Player</a>,  IMESH related foistware, see <a target="_blank" href="http://www.spywareinfo.com/yabbse/index.php?board=10;action=display;threadid=2633;start=0#msg20371">here</a>
  13004. [media_stub]
  13005. Filename=stub.exe
  13006. Confirmed=X
  13007. Description=<a target="_blank" href="http://www.mini-player.com/">Mini-Player</a>,  IMESH related foistware, see <a target="_blank" href="http://www.spywareinfo.com/yabbse/index.php?board=10;action=display;threadid=2633;start=0#msg20371">here</a>
  13008. [megapanel]
  13009. Filename=HSTrans.exe
  13010. Confirmed=U
  13011. Description=Homescan Internet Transporter - part of <a href="http://www2.acnielsen.com/products/cps_homescan.shtml" target=_blank>ACNielson Homescan</a>. Recognizes when the ACNielsen Homescan Scanner is attached to the computer and allows it to transmit scanner information to ACNielsen
  13012. [members area]
  13013. Filename=******.exe [* = random digit]
  13014. Confirmed=X
  13015. Description=Premium rate adult content dialer
  13016. [memconfig]
  13017. Filename=SetupIE.com
  13018. Confirmed=X
  13019. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.hllw.taplak.html" target="_blank">TAPLAK</a> WORM!
  13020. [memmonster]
  13021. Filename=memmnstr.exe
  13022. Confirmed=U
  13023. Description=<a href="http://www.daolnwod.com/memmonster_2923.htm" target=_blank>MemMonster</a> - memory optimizer. MS MVPs (Most Valued Professional) recommend not using memory managers with Win98/SE/ME. See <a href="http://www.aumha.org/a/memmgmt.htm" target="_blank">this</a> article and make up your own mind
  13024. [memokit]
  13025. Filename=MK.EXE
  13026. Confirmed=U
  13027. Description=Memory optimizer. It loads from startup group and it goes off as soon as the program (memokit.exe) is loaded in the System Tray. Mk.exe does not run while the memokit.exe is running. Probably loads a flash screen at startup and shutdown that stays on screen less than 5 seconds and gives you a button to push to purchase the full version. MS MVPs (Most Valued Professional) recommend not using memory managers with Win98/SE/ME. See <a href="http://www.aumha.org/a/memmgmt.htm" target="_blank">this</a> article and make up your own mind
  13028. [memory]
  13029. Filename=outlookrem.exe
  13030. Confirmed=X
  13031. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.nopir.c.html" target=_blank>NOPIR.C</a> WORM!
  13032. [memory check]
  13033. Filename=memore.exe
  13034. Confirmed=X
  13035. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/trojan.killav.c.html" target="_blank">KILLAV.C</a> TROJAN!
  13036. [memory watcher]
  13037. Filename=MemoryWatcher.exe
  13038. Confirmed=X
  13039. Description=<a href="http://www.pestpatrol.com/pestinfo/m/memory_watcher.asp" target=_blank>MemoryWatcher</a> spyware
  13040. [memory+]
  13041. Filename=tfimemsr.exe
  13042. Confirmed=U
  13043. Description=Memory optimizer. MS MVPs (Most Valued Professional) recommend not using memory managers with Win98/SE/ME. See <a href="http://www.aumha.org/a/memmgmt.htm" target="_blank">this</a> article and make up your own mind
  13044. [memoryboost]
  13045. Filename=MemoryBoost.exe
  13046. Confirmed=U
  13047. Description=<a href="http://www.tenebril.com/consumer/memboost/" target=_blank>MemoryBoost</a> - memory optimizing program made by Tenebril Inc. MS MVPs (Most Valued Professional) recommend not using memory managers with Win98/ME. See <a href="http://www.aumha.org/a/memmgmt.htm" target=_blank>this</a> article and make up your own mind
  13048. [memorymeter]
  13049. Filename=MemoryMeter.exe
  13050. Confirmed=X
  13051. Description=Autoinstalling spyware by <a href="http://www.totalvelocity.com/" target="_blank">Total Velocity</a>
  13052. [memreader.exe]
  13053. Filename=memreader.exe
  13054. Confirmed=X
  13055. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32agobotty.html" target=_blank>AGOBOT-TY</a> WORM!
  13056. [memreaload]
  13057. Filename=MEMreaload.exe
  13058. Confirmed=X
  13059. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/trojan.lazar.html" target=_blank>LAZAR</a> TROJAN!
  13060. [memscanner]
  13061. Filename=MemScanner.exe
  13062. Confirmed=N
  13063. Description=Part of Enigma SpyHunter - not recommended, see <a href="http://www.spywarewarrior.com/rogue_anti-spyware.htm#sh_note" target="_blank">note</a>
  13064. [memturbo]
  13065. Filename=memturbo.exe
  13066. Confirmed=U
  13067. Description=<a href="http://www.memturbo.com/" target="_blank">MemTurbo</a> memory optimizer. MS MVPs (Most Valued Professional) recommend not using memory managers with Win98/SE/ME. See <a href="http://www.aumha.org/a/memmgmt.htm" target="_blank">this</a> article and make up your own mind
  13068. [menusnap]
  13069. Filename=MenuSnap.exe
  13070. Confirmed=N
  13071. Description=<a href="http://www.rietta.com/menusnap/" target="_blank">MenuSnap</a> from Rietta Solutions. Utility that re-orders your Start Menu items alphabetically. You may not want this utility if you're able to do this manually by selecting Start -> Programs and right-clicking and choosing "Sort by Name" if availabe
  13072. [message queuing]
  13073. Filename=msmqs.exe
  13074. Confirmed=X
  13075. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.freefors.html" target="_blank">FREEFORS</a> TROJAN!
  13076. [messagerstarter freeserve]
  13077. Filename=StartMessager.exe
  13078. Confirmed=N
  13079. Description=<a href="http://messenger.freeserve.com/" target="_blank">Freeserve Messenger</a>
  13080. [message_blocker]
  13081. Filename=messageblock.exe
  13082. Confirmed=U
  13083. Description=<a href="http://www.ograhl.com/en/messageblocker/" target="_blank">Message Blocker</a> - "prevents Outlook Express from loading images or other content from the internet without confirmation, as well as executing scripts when displaying a formatted email message"
  13084. [messenger block]
  13085. Filename=msngrblock.exe
  13086. Confirmed=X
  13087. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.patoo@mm.html" target="_blank">PATOO</a> WORM!
  13088. [messenger protocol]
  13089. Filename=netsender.exe
  13090. Confirmed=X
  13091. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32sdbotacc.html" target=_blank>SDBOT-ACC</a> WORM!
  13092. [messenger start-up]
  13093. Filename=Msgran.exe
  13094. Confirmed=X
  13095. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.gramos.html" target="_blank">GRAMOS</a> WORM!
  13096. [messenger6]
  13097. Filename=command.pif
  13098. Confirmed=X
  13099. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.inzae.b@mm.html" target=_blank>INZAE.B</a> WORM!
  13100. [messengerdiscovery]
  13101. Filename=MessengerDiscovery.exe
  13102. Confirmed=U
  13103. Description=<a href="http://www.messengerdiscovery.com/" target=_blank>MessengerDiscovery</a> is a MSN Messenger add-on - adding over 70 new features
  13104. [messengerplus]
  13105. Filename=MsgPlus.exe
  13106. Confirmed=N
  13107. Description=<a href="http://www.msgplus.net/" target=_blank>MessengerPlus</a> - third party MSN Messenger extension that adds a number of useful features. Bundles the hard to remove C2Media <a href="http://inetexplorer.mvps.org/data/messenger_plus.htm" target=_blank>LOP</a> adware. The software does offer you a choice during setup - make sure to install MessengerPlus WITHOUT that "sponsor program"!
  13108. [messengerplus2]
  13109. Filename=MsgPlus.exe
  13110. Confirmed=N
  13111. Description=<a href="http://www.msgplus.net/" target=_blank>MessengerPlus</a> - third party MSN Messenger extension that adds a number of useful features. Bundles the hard to remove C2Media <a href="http://inetexplorer.mvps.org/data/messenger_plus.htm" target=_blank>LOP</a> adware. The software does offer you a choice during setup - make sure to install MessengerPlus WITHOUT that "sponsor program"!
  13112. [messengerplus3]
  13113. Filename=MsgPlus.exe
  13114. Confirmed=N
  13115. Description=<a href="http://www.msgplus.net/" target=_blank>MessengerPlus</a> - third party MSN Messenger extension that adds a number of useful features. Bundles the hard to remove C2Media <a href="http://inetexplorer.mvps.org/data/messenger_plus.htm" target=_blank>LOP</a> adware. The software does offer you a choice during setup - make sure to install MessengerPlus WITHOUT that "sponsor program"!
  13116. [metalrock (irc.musirc.com) has sex with printers]
  13117. Filename=metalrock-is-gay.exe
  13118. Confirmed=X
  13119. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_RANDEX.Q" target=_blank>RANDEX.Q</a> WORM!
  13120. [meuprograma]
  13121. Filename=accwizz.exe
  13122. Confirmed=X
  13123. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.ruland.a@mm.html" target=_blank>RULAND.A</a> WORM!
  13124. [mfgboot]
  13125. Filename=??
  13126. Confirmed=?
  13127. Description=<font color="#FF0000">??</font>
  13128. [mfilter]
  13129. Filename=MNeck.exe
  13130. Confirmed=X
  13131. Description=Added by the <a href="http://www.sophos.de/virusinfo/analyses/trojclickerag.html" target=_blank>CLICKER-AG</a> TROJAN!
  13132. [mfin32]
  13133. Filename=mfin32.exe
  13134. Confirmed=X
  13135. Description=MyFreeInternetUpdate - adware downloader
  13136. [mga hook]
  13137. Filename=Mgahook.exe
  13138. Confirmed=?
  13139. Description=MATROX Graphics card related. <font color="#FF0000">What does it do and is it required?</font>
  13140. [mga quickdesk]
  13141. Filename=MGAQDESK.EXE
  13142. Confirmed=N
  13143. Description=For Matrox video cards. Quick access to tweak your card to your liking
  13144. [mgabg]
  13145. Filename=Mgabg.exe
  13146. Confirmed=?
  13147. Description=Matrox BIOS Guard. <font color="#FF0000">What does it do and is it required?</font>
  13148. [mga_cd_install]
  13149. Filename=mgasetup.exe
  13150. Confirmed=N
  13151. Description=Matrox Millennium video driver. Not required once drivers installed
  13152. [mgmtapi]
  13153. Filename=mgmtapi.exe
  13154. Confirmed=X
  13155. Description=Unidentified malware
  13156. [mhdogstart]
  13157. Filename=mhdogst.EXE
  13158. Confirmed=X
  13159. Description=Added by an unidentified VIRUS, WORM or TROJAN! A possibility is a trojan known as PENIS
  13160. [mhinit]
  13161. Filename=MHINIT.EXE
  13162. Confirmed=N
  13163. Description=Part of the Cybermedia Clean Sweep package
  13164. [mickey mouse cereal]
  13165. Filename=[random filename].exe
  13166. Confirmed=X
  13167. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.ranky.q.html" target=_blank>RANKY.Q</a> TROJAN!
  13168. [micr update]
  13169. Filename=soundblaster.exe
  13170. Confirmed=X
  13171. Description=Added by the <a href="http://no.trendmicro-europe.com/enterprise/security_info/ve_detail.php?VName=WORM_SDBOT.NP" target="_blank">SDBOT.NP</a> WORM!
  13172. [micr0s0ft ms d0s]
  13173. Filename=msdx.exe
  13174. Confirmed=X
  13175. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotaon.html" target=_blank>RBOT-AON</a> WORM!
  13176. [micro process]
  13177. Filename=appconf.exe
  13178. Confirmed=X
  13179. Description=Added by an unidentified WORM or TROJAN!
  13180. [micro update]
  13181. Filename=dailin.exe
  13182. Confirmed=X
  13183. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rboter.html" target=_blank>RBOT-ER</a> WORM!
  13184. [microangelo desktop]
  13185. Filename=Muamgr.exe
  13186. Confirmed=U
  13187. Description=Quick access to MicroAngelo 5.0. It can make the background of the icon text transparent and also change the color of the shortcut's text to a color you want. Very useful, if you have a wallpaper. Available via Start -> Programs
  13188. [microattunedownload]
  13189. Filename=atmdlusr.exe
  13190. Confirmed=N
  13191. Description=Application Launcher, MS Office application. USR (US Robotics) modem auto updater. May be a sub-set of Attune
  13192. [microcq0]
  13193. Filename=explorer.exe
  13194. Confirmed=X
  13195. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojlineageak.html" target="_blank">LINEAGE-AK</a> TROJAN! Note - the legitimate Windows Explorer (explorer.exe) is located in the Windows or Winnt folder and would only be in startups if you added it manually. This one is located in the Program Files folder
  13196. [microdialler]
  13197. Filename=atdialler1.exe
  13198. Confirmed=U
  13199. Description=Part of the <a href="https://www.freeserve.com/time/anytimereg/migration/?redirect=int" target="_blank">Freeserve Connection Kit</a> - changes the dial-up for Freeserve AnyTime if access problems are encountered
  13200. [microedsoft toolbar]
  13201. Filename=Smoked.exe
  13202. Confirmed=X
  13203. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotaln.html" target=_blank>RBOT-ALN</a> WORM!
  13204. [microfinder lptt01]
  13205. Filename=mcf.exe
  13206. Confirmed=X
  13207. Description=<a href="http://www.wilderssecurity.net/specialinfo/rapidblaster.html" target="_blank">RapidBlaster</a> variant (in a "mcf" folder in Program Files). Recommended you use RapidBlaster Killer to uninstall - see <a ref="http://www.wilderssecurity.net/specialinfo/rapidblaster.html#removal" target="_blank"> here</a>
  13208. [microfinder ml097e]
  13209. Filename=mcf.exe
  13210. Confirmed=X
  13211. Description=<a href="http://www.wilderssecurity.net/specialinfo/rapidblaster.html" target="_blank">RapidBlaster</a> variant (in a "mcf" folder in Program Files). Recommended you use RapidBlaster Killer to uninstall - see <a ref="http://www.wilderssecurity.net/specialinfo/rapidblaster.html#removal" target="_blank"> here</a>
  13212. [microfot update]
  13213. Filename=winldx32.exe
  13214. Confirmed=X
  13215. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  13216. [microft exploerer]
  13217. Filename=spoolsac.exe
  13218. Confirmed=X
  13219. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotamd.html" target=_blank>RBOT-AMD</a> WORM!
  13220. [microft update 32]
  13221. Filename=winssx.exe
  13222. Confirmed=X
  13223. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotaqs.html" target=_blank>RBOT-AQS</a> WORM!
  13224. [microload]
  13225. Filename=[random filename]
  13226. Confirmed=X
  13227. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.hllw.darby.html" target="_blank">DARBY</a> WORM!
  13228. [micromedia flash update]
  13229. Filename=wdfmrg.exe
  13230. Confirmed=X
  13231. Description=Added by a variant of the <a href="http://vil.nai.com/vil/content/v_100454.htm" target=_blank>SDBOT</a> WORM!
  13232. [microoft timing]
  13233. Filename=pupdate.exe
  13234. Confirmed=X
  13235. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target= blank>RBOT</a> WORM!
  13236. [microsft confige 32]
  13237. Filename=msaconfigurez.exe
  13238. Confirmed=X
  13239. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_RBOT.CLC&VSect=P" target=_blank>RBOT.CLC</a> WORM!
  13240. [microsft mx update support]
  13241. Filename=taskmngrs.exe
  13242. Confirmed=X
  13243. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotauz.html" target=_blank>RBOT-AUZ</a> WORM!
  13244. [microsft windows updates]
  13245. Filename=mwupdate32.exe
  13246. Confirmed=X
  13247. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=41911" target=_blank>TOXBOT/CODBOT</a> WORM!
  13248. [microsof value]
  13249. Filename=nmatt.exe
  13250. Confirmed=X
  13251. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  13252. [microsof windows host]
  13253. Filename=svhost32.exe
  13254. Confirmed=X
  13255. Description=Added by the <a href="http://www.trendmicro.co.jp/vinfo/virusencyclo/default5.asp?VName=WORM_RBOT.ADY" target=_blank>RBOT.ADY</a> WORM!
  13256. [microsof winlog host]
  13257. Filename=wilogon32.exe
  13258. Confirmed=X
  13259. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_RBOT.XC" target=_blank>RBOT.XC</a> WORM!
  13260. [microsofot x386 system monitor]
  13261. Filename=system32.exe
  13262. Confirmed=X
  13263. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_WOOTBOT.M" target="_blank">WOOTBOT.M</a> WORM!
  13264. [microsoft  associates, inc.]
  13265. Filename=iexplorer.exe
  13266. Confirmed=X
  13267. Description=Added by a variant of the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.hllw.lovgate@mm.html" target="_blank">LOVGATE</a> WORM!
  13268. [microsoft (c) html application host]
  13269. Filename=[random filename]
  13270. Confirmed=X
  13271. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotyb.html" target= blank>RBOT-YB</a> WORM!
  13272. [microsoft .net confingurator]
  13273. Filename=msnconf.exe
  13274. Confirmed=X
  13275. Description=Added by an unidentified VIRUS, WORM or TROJAN!
  13276. [microsoft 16bit update]
  13277. Filename=wuapdate16.exe
  13278. Confirmed=X
  13279. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_RBOT.CZ" target="_blank">RBOT.CZ</a> WORM!
  13280. [microsoft 64 bit runtime updater]
  13281. Filename=wupdt64.exe
  13282. Confirmed=X
  13283. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  13284. [microsoft activex debugger nt]
  13285. Filename=[path to trojan]
  13286. Confirmed=X
  13287. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojbancosdo.html" target=_blank>BANCOS-DO</a> TROJAN!
  13288. [microsoft adservice]
  13289. Filename=[random filename]
  13290. Confirmed=X
  13291. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  13292. [microsoft agent]
  13293. Filename=mdss32.exe
  13294. Confirmed=X
  13295. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojkeylogag.html" target=_blank>KEYLOG-AG</a> TROJAN!
  13296. [microsoft alg32 protocol]
  13297. Filename=alg32.exe
  13298. Confirmed=X
  13299. Description=Added by a variant of the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.spybot.worm.html" target=_blank>SPYBOT</a> WORM!
  13300. [microsoft announcement listener]
  13301. Filename=Annclist.exe
  13302. Confirmed=N
  13303. Description=MS WebTV for Windows. Used to display TV on your PC via a compatible video card with in-built tuner (such as ATI All-In-Wonder). If you don't use it - uninstall it
  13304. [microsoft ansti update]
  13305. Filename=msie.exe
  13306. Confirmed=X
  13307. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotle.html" target="_blank">RBOT-LE</a> WORM!
  13308. [microsoft antispyware]
  13309. Filename=Bazzi.exe
  13310. Confirmed=X
  13311. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_AHKER.J&VSect=P" target=_blank>AHKER.J</a> WORM!
  13312. [microsoft aol instant messenger]
  13313. Filename=MSAOL32.exe
  13314. Confirmed=X
  13315. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotaai.html" target=_blank>RBOT-AAI</a> WORM!
  13316. [microsoft aol32 protocol]
  13317. Filename=aol32.exe
  13318. Confirmed=X
  13319. Description=Added by a variant of the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.spybot.worm.html" target=_blank>SPYBOT</a> WORM!
  13320. [microsoft application manager]
  13321. Filename=msapl32.exe
  13322. Confirmed=X
  13323. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojbropiaae.html" target=_blank>BROPIA-AE</a> TROJAN!
  13324. [microsoft authority service]
  13325. Filename=lsass.exe
  13326. Confirmed=X
  13327. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32kaleld.html" target=_blank>KALEL-D</a> WORM! Note - this is not the legitimate <a href="http://www.liutilities.com/products/wintaskspro/processlibrary/lsass/" target="_blank">lsass.exe</a> process, which should not appear in Msconfig/Startup!
  13328. [microsoft auto update]
  13329. Filename=winupdate.exe
  13330. Confirmed=X
  13331. Description=Added by the <a href="http://www.symantec.com/avcenter/venc/data/backdoor.bmbot.html" target="_blank">BMBOT</a> TROJAN!
  13332. [microsoft automatic update serivce]
  13333. Filename=msautou.exe
  13334. Confirmed=X
  13335. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotaob.html" target=_blank>RBOT-AOB</a> WORM!
  13336. [microsoft automatic updater]
  13337. Filename=Explorer.exe
  13338. Confirmed=X
  13339. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotsg.html" target="_blank">RBOT-SG</a> WORM! Note - the legitimate Windows Explorer (explorer.exe) is located in the Windows or Winnt folder and would only be in startups if you added it manually. This one is located in the System32 subfolder
  13340. [microsoft autoupdater]
  13341. Filename=svhost.exe
  13342. Confirmed=X
  13343. Description=Added by the <a href="http://es.trendmicro-europe.com/consumer/security_info/ve_detail.php?Vname=WORM_RBOT.QG" target="_blank">RBOT.QG</a> WORM!
  13344. [microsoft bool value]
  13345. Filename=MV2.exe
  13346. Confirmed=X
  13347. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  13348. [microsoft boot system cfg32]
  13349. Filename=actboost.exe
  13350. Confirmed=X
  13351. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.bropia.r.html" target=_blank>BROPIA.R</a> WORM!
  13352. [microsoft broadband networking]
  13353. Filename=MSBNTray.exe
  13354. Confirmed=U
  13355. Description=Microsoft Broadband Networking Tray Application
  13356. [microsoft cab manager]
  13357. Filename=exec.exe
  13358. Confirmed=X
  13359. Description=<a href="http://securityresponse.symantec.com/avcenter/venc/data/adware.affilred.b.html" target=_blank>Affilred.B</a> adware
  13360. [microsoft checker]
  13361. Filename=MsPMSPTv.exe
  13362. Confirmed=X
  13363. Description=Added by a variant of the <a href="http://vil.nai.com/vil/content/v_100454.htm" target=_blank>SDBOT</a> WORM!
  13364. [microsoft client]
  13365. Filename=mshost.exe
  13366. Confirmed=X
  13367. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotand.html" target=_blank>RBOT-AND</a> WORM!
  13368. [microsoft client pc]
  13369. Filename=spoolsrv.exe
  13370. Confirmed=X
  13371. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotaqm.html" target=_blank>RBOT-AQM</a> WORM!
  13372. [microsoft command line]
  13373. Filename=wincmd.exe
  13374. Confirmed=X
  13375. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  13376. [microsoft conf ldr]
  13377. Filename=sysconf.exe
  13378. Confirmed=X
  13379. Description=Added by a variant of the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.sdbot.html" target="_blank">SDBOT</a> TROJAN!
  13380. [microsoft confgkeys]
  13381. Filename=wurmgrd32.exe
  13382. Confirmed=X
  13383. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotarx.html" target=_blank>RBOT-ARX</a> WORM!
  13384. [microsoft config 32]
  13385. Filename=msconfigx32.exe
  13386. Confirmed=X
  13387. Description=Reported as the MSCONFIGX32 TROJAN! Possible Rbot variant
  13388. [microsoft config 32bit]
  13389. Filename=mscnfg32.exe
  13390. Confirmed=X
  13391. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotz.html" target=_blank>RBOT-Z</a> WORM!
  13392. [microsoft config file]
  13393. Filename=config.exe
  13394. Confirmed=X
  13395. Description=Added by the KILLFILES.GR TROJAN! This is malware that will attempt to delete all system dlls!
  13396. [microsoft configs 32]
  13397. Filename=msgconfigrs.exe
  13398. Confirmed=X
  13399. Description=Added by a variant of the <a href="http://vil.nai.com/vil/content/v_100454.htm" target=_blank>SDBOT</a> WORM!
  13400. [microsoft configure 32]
  13401. Filename=msgconfigre.exe
  13402. Confirmed=X
  13403. Description=Added by a variant of the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_AGOBOT.GEN" target=_blank>GAOBOT/AGOBOT</a> WORM!
  13404. [microsoft connection manager monitor]
  13405. Filename=cmmon.pif
  13406. Confirmed=X
  13407. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotakv.html" target=_blank>RBOT-AKV</a> WORM!
  13408. [microsoft control center]
  13409. Filename=crtl.exe
  13410. Confirmed=X
  13411. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotvx.html" target= blank>RBOT-VX</a> WORM!
  13412. [microsoft core support]
  13413. Filename=MSxUP32.exe
  13414. Confirmed=X
  13415. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotanr.html" target=_blank>RBOT-ANR</a> WORM!
  13416. [microsoft corp updates]
  13417. Filename=wupdates.exe
  13418. Confirmed=X
  13419. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotauu.html" target=_blank>RBOT-AUU</a> WORM!
  13420. [microsoft crs fix serv]
  13421. Filename=wincrs.exe
  13422. Confirmed=X
  13423. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_SDBOT.BWF&VSect=P" target=_blank>SDBOT.BWF</a> WORM!
  13424. [microsoft csrss32 protocol]
  13425. Filename=csrss32.exe
  13426. Confirmed=X
  13427. Description=Added by a variant of the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_AGOBOT.GEN" target=_blank>AGOBOT/GAOBOT</a> WORM!
  13428. [microsoft csrss386 protocol]
  13429. Filename=csrss386.exe
  13430. Confirmed=X
  13431. Description=Added by a variant of the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.spybot.worm.html" target=_blank>SPYBOT</a> WORM!
  13432. [microsoft cvrt]
  13433. Filename=mscvrt32.exe
  13434. Confirmed=X
  13435. Description=Added by an unidentified VIRUS, WORM or TROJAN!
  13436. [microsoft data helper]
  13437. Filename=cihost.exe
  13438. Confirmed=X
  13439. Description=Malware, possibly a variant of the <a href="http://securityresponse.symantec.com/avcenter/venc/data/trojan.linst.html" target="_blank">LINST</a> TROJAN
  13440. [microsoft data machine]
  13441. Filename=csdata32.exe
  13442. Confirmed=X
  13443. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  13444. [microsoft database handler]
  13445. Filename=mssql32.exe
  13446. Confirmed=X
  13447. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.randex.ax.html" target="_blank">RANDEX.AX</a> WORM!
  13448. [microsoft datalog application]
  13449. Filename=msdata.exe
  13450. Confirmed=X
  13451. Description=Added by a variant of the <a href="http://vil.nai.com/vil/content/v_100454.htm" target=_blank>SDBOT</a> WORM!
  13452. [microsoft dde control]
  13453. Filename=wupades.exe
  13454. Confirmed=X
  13455. Description=Added by a variant of the <a href="http://vil.nai.com/vil/content/v_100454.htm" target=_blank>SDBOT</a> WORM!
  13456. [microsoft ddes control]
  13457. Filename=Erun.pif
  13458. Confirmed=X
  13459. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotamu.html" target=_blank>RBOT-AMU</a> WORM!
  13460. [microsoft debug service]
  13461. Filename=dbgbgr.exe
  13462. Confirmed=X
  13463. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target= blank>RBOT</a> WORM!
  13464. [microsoft decryption technology]
  13465. Filename=Msfenoe.exe
  13466. Confirmed=X
  13467. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32spybotdg.html" target=_blank>SPYBOT-DG</a> WORM!
  13468. [microsoft desktop manager]
  13469. Filename=msdesk32.exe
  13470. Confirmed=X
  13471. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  13472. [microsoft dev]
  13473. Filename=iexplorer32.exe
  13474. Confirmed=X
  13475. Description=Added by a variant of the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_AGOBOT.GEN" target=_blank>AGOBOT/GAOBOT</a> WORM!
  13476. [microsoft development debugger]
  13477. Filename=msdev.exe
  13478. Confirmed=X
  13479. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  13480. [microsoft device manager]
  13481. Filename=msdevmgr32.exe
  13482. Confirmed=X
  13483. Description=Added by the <a href="http://www.symantec.com/avcenter/venc/data/backdoor.lateda.b.html" target=_blank>LATEDA.B</a> TROJAN!
  13484. [microsoft dll]
  13485. Filename=fumeta.exe
  13486. Confirmed=X
  13487. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotaug.html" target=_blank>RBOT-AUG</a> WORM!
  13488. [microsoft dll extensions]
  13489. Filename=SystemDll.exe
  13490. Confirmed=X
  13491. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotadv.html" target=_blank>RBOT-ADV</a> WORM!
  13492. [microsoft dll management]
  13493. Filename=windll.exe
  13494. Confirmed=X
  13495. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotmt.html" target=_blank>RBOT-MT</a> WORM!
  13496. [microsoft dll printer manager]
  13497. Filename=dllpt.exe
  13498. Confirmed=X
  13499. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_SDBOT.BIH&VSect=P" target=_blank>SDBOT.BIH</a> WORM!
  13500. [microsoft dllset32]
  13501. Filename=dllset32.exe
  13502. Confirmed=X
  13503. Description=Added by the <a href="http://uk.trendmicro-europe.com/consumer/security_info/ve_detail.php?Vname=WORM_RBOT.OZ" target=_blank>RBOT.OZ</a> WORM!
  13504. [microsoft dns query]
  13505. Filename=msdns.exe
  13506. Confirmed=X
  13507. Description=Added by a variant of the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_WOOTBOT.GEN" target=_blank>WOOTBOT</a> WORM!
  13508. [microsoft document]
  13509. Filename=krisp.exe
  13510. Confirmed=X
  13511. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32sdbotrq.html" target=_blank>SDBOT-RQ</a> WORM!
  13512. [microsoft driver]
  13513. Filename=faet.exe
  13514. Confirmed=X
  13515. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  13516. [microsoft driver manager]
  13517. Filename=mswindrv.exe
  13518. Confirmed=X
  13519. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32forbotez.html" target=_blank>FORBOT-EZ</a> WORM!
  13520. [microsoft driver update]
  13521. Filename=Mshome.exe
  13522. Confirmed=X
  13523. Description=Added by the SDBOT.BL WORM!
  13524. [microsoft drivers]
  13525. Filename=WSconf.exe
  13526. Confirmed=X
  13527. Description=Added by a variant of the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=BKDR_SDBOT.GEN" target=_blank>SDBOT</a> WORM!
  13528. [microsoft ergopack]
  13529. Filename=wserb32.exe
  13530. Confirmed=X
  13531. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotri.html" target=_blank>RBOT-RI</a> WORM!
  13532. [microsoft ev32 service]
  13533. Filename=MSev32.exe
  13534. Confirmed=X
  13535. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  13536. [microsoft excel]
  13537. Filename=msexcel.exe
  13538. Confirmed=X
  13539. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbottq.html" target=_blank>RBOT-TQ</a> WORM!
  13540. [microsoft excell]
  13541. Filename=wuamngr32.exe
  13542. Confirmed=X
  13543. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotqh.html" target=_blank>RBOT-QH</a> WORM!
  13544. [microsoft executing]
  13545. Filename=microsoft.exe
  13546. Confirmed=X
  13547. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_AGOBOT.UV" target=_blank>AGOBOT.UV</a> WORM!
  13548. [microsoft explorexp protocol]
  13549. Filename=explorexp.exe
  13550. Confirmed=X
  13551. Description=Added by a variant of the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.spybot.worm.html" target=_blank>SPYBOT</a> WORM!
  13552. [microsoft file demand manager]
  13553. Filename=wmgrdf.exe
  13554. Confirmed=X
  13555. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  13556. [microsoft find fast]
  13557. Filename=Findfast.exe
  13558. Confirmed=X
  13559. Description=Complete utter waste of space! Part of MS Office - searches disk drives for Office file types and creates an index to make opening them easier
  13560. [microsoft firewall]
  13561. Filename=firewallsp2.exe
  13562. Confirmed=X
  13563. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotmc.html" target="_blank">RBOT-MC</a> WORM!
  13564. [microsoft firewall client]
  13565. Filename=ISATRAY.EXE
  13566. Confirmed=Y
  13567. Description=MS Internet Security and Acceleration Server - see <a href="http://www.microsoft.com/isaserver/default.mspx" target=_blank>here</a>
  13568. [microsoft games]
  13569. Filename=gamemanager.exe
  13570. Confirmed=X
  13571. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_SPYBOT.AHQ&VSect=P" target=_blank>SPYBOT.AHQ</a> WORM!
  13572. [microsoft generic update manager]
  13573. Filename=wupdate.exe
  13574. Confirmed=X
  13575. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotawc.html" target=_blank>RBOT-AWC</a> TROJAN!
  13576. [microsoft gina v encryption]
  13577. Filename=MSGINAV.EXE
  13578. Confirmed=X
  13579. Description=Added by an unidentified VIRUS, WORM or TROJAN!
  13580. [microsoft greetings reminders]
  13581. Filename=MHPRMIND.EXE
  13582. Confirmed=N
  13583. Description=Microsoft Home Publishing greetings reminder
  13584. [microsoft greetings workshop reminder]
  13585. Filename=Gwremind.exe
  13586. Confirmed=N
  13587. Description=You really want to be reminded about somebody's birthday at the expense of resources?
  13588. [microsoft greetings  reminder]
  13589. Filename=MHPRMINF.EXE
  13590. Confirmed=N
  13591. Description=You really want to be reminded about somebody's birthday at the expense of resources?
  13592. [microsoft help support]
  13593. Filename=mshelp32.exe
  13594. Confirmed=X
  13595. Description=Addded by the <a href="http://www.sophos.com/virusinfo/analyses/w32kelvirbf.html" target=_blank>KELVIR-BF</a> WORM!
  13596. [microsoft help svc]
  13597. Filename=msnmngr.exe
  13598. Confirmed=X
  13599. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32sdbotpq.html" target="_blank">SDBOT-PQ</a> WORM!
  13600. [microsoft help system]
  13601. Filename=mshelp32.exe
  13602. Confirmed=X
  13603. Description=<a href="http://cwshredder.net/cwshredder/cwschronicles.html" target=_blank>CoolWebSearch</a> parasite variant
  13604. [microsoft host protocol]
  13605. Filename=svhost.exe
  13606. Confirmed=X
  13607. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  13608. [microsoft hosting service]
  13609. Filename=WINHOSTING.EXE
  13610. Confirmed=X
  13611. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_RBOT.AEV&VSect=P" target=_blank>RBOT.AEV</a> WORM!
  13612. [microsoft hosts service]
  13613. Filename=Isass.exe
  13614. Confirmed=X
  13615. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  13616. [microsoft hotmail monitor]
  13617. Filename=mshotmon.exe
  13618. Confirmed=U
  13619. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_MYTOB.LY&VSect=P" target=_blank>MYTOB.LY</a> WORM!
  13620. [microsoft hyptertext helper]
  13621. Filename=mshtha.exe
  13622. Confirmed=X
  13623. Description=Added by a variant of the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.spybot.worm.html" target=_blank>SPYBOT</a> WORM!
  13624. [microsoft idcn]
  13625. Filename=mshe1p.exe
  13626. Confirmed=X
  13627. Description=Added by an unidentified TROJAN!
  13628. [microsoft ie]
  13629. Filename=Iexplore.exe
  13630. Confirmed=X
  13631. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32forbotag.html" target=_blank>FORBOT-AG</a> WORM! Note - this is not the legitimate Internet Explorer <a href="http://www.liutilities.com/products/wintaskspro/processlibrary/iexplore/" target=_blank>iexplore.exe</a> process which is always located in the Program Files\Internet Explorer folder and should not normally figure in Msconfig/Startup! This file is located in the System (9x/Me) or System32 (NT/2K/XP) folder
  13632. [microsoft ie execute shell]
  13633. Filename=IEExec.exe
  13634. Confirmed=X
  13635. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.irc.aladinz.n.html" target="_blank">ALADINZ.N</a> TROJAN!
  13636. [microsoft ie sasser]
  13637. Filename=ISASS.EXE
  13638. Confirmed=X
  13639. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_SDBOT.MX&VSect=P" target=_blank>SDBOT.MX</a> WORM!
  13640. [microsoft inc.]
  13641. Filename=iexplorer.exe
  13642. Confirmed=X
  13643. Description=Added by a variant of the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.hllw.lovgate@mm.html" target="_blank">LOVGATE</a> WORM!
  13644. [microsoft incroporate]
  13645. Filename=mfs.exe
  13646. Confirmed=X
  13647. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotanf.html" target=_blank>RBOT-ANF</a> WORM!
  13648. [microsoft inet xp..]
  13649. Filename=teekids.exe
  13650. Confirmed=X
  13651. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.blaster.c.worm.html" target="_blank">BLASTER.C</a> WORM!
  13652. [microsoft instant messenger]
  13653. Filename=msngmsngr32.exe
  13654. Confirmed=X
  13655. Description=Added by the <a href="http://www.viruslist.com/en/viruses/encyclopedia?virusid=24975" target=_blank>SPYBOTER.GEN</a> TROJAN!
  13656. [microsoft int service]
  13657. Filename=MsIntSrv.exe
  13658. Confirmed=X
  13659. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  13660. [microsoft intellitype pro]
  13661. Filename=speedkey.exe
  13662. Confirmed=U
  13663. Description=Additional keyboard shortcuts on MS programmable keyboard
  13664. [microsoft internal antivirus systems]
  13665. Filename=dIlhost.exe
  13666. Confirmed=X
  13667. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotaev.html" target=_blank>RBOT-AEV</a> WORM!
  13668. [microsoft internet exp]
  13669. Filename=iiexplorer.exe
  13670. Confirmed=X
  13671. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotkx.html" target="_blank">RBOT-KX</a> WORM!
  13672. [microsoft internet firewall manager]
  13673. Filename=GMT16.exe
  13674. Confirmed=X
  13675. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.randex.at.html" target="_blank">RANDEX.AT</a> WORM!
  13676. [microsoft internet services]
  13677. Filename=Smss32.exe
  13678. Confirmed=X
  13679. Description=Added by the <a href="http://uk.trendmicro-europe.com/enterprise/security_info/ve_detail.php?Vname=WORM_RBOT.MS" target="_blank">RBOT.MS</a> WORM!
  13680. [microsoft java windows update]
  13681. Filename=[filename]
  13682. Confirmed=X
  13683. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotdz.html" target=_blank>RBOT-DZ</a> WORM!
  13684. [microsoft javavm]
  13685. Filename=msjarun.exe
  13686. Confirmed=X
  13687. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotjw.html" target="_blank">RBOT-JW</a> WORM!
  13688. [microsoft kernel]
  13689. Filename=Windows_kernel32.exe
  13690. Confirmed=X
  13691. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.netsky.ae@mm.html" target=_blank>NETSKY.AE</a> WORM!
  13692. [microsoft lan32 protocol]
  13693. Filename=lanXp.exe
  13694. Confirmed=X
  13695. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotss.html" target= blank>RBOT-SS</a> WORM!
  13696. [microsoft lmhosting service]
  13697. Filename=lmhosts.exe
  13698. Confirmed=X
  13699. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotrc.html" target=_blank>RBOT-RC</a> WORM!
  13700. [microsoft locals 332]
  13701. Filename=[random filename]
  13702. Confirmed=X
  13703. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotku.html" target="_blank">RBOT-KU</a> WORM!
  13704. [microsoft login]
  13705. Filename=winlogin.exe
  13706. Confirmed=X
  13707. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotajp.html" target=_blank>RBOT-AJP</a> WORM!
  13708. [microsoft lsa layer]
  13709. Filename=MSLSA32.exe
  13710. Confirmed=X
  13711. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotakz.html" target=_blank>RBOT-AKZ</a> WORM!
  13712. [microsoft lsass386 protocol]
  13713. Filename=scvhost32.exe
  13714. Confirmed=X
  13715. Description=Added by a variant of the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.spybot.worm.html" target=_blank>SPYBOT</a> WORM!
  13716. [microsoft lv]
  13717. Filename=[path to file]
  13718. Confirmed=X
  13719. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojbdoorbdl.html" target= blank>BDL</a> TROJAN!
  13720. [microsoft machine]
  13721. Filename=winjava.exe
  13722. Confirmed=X
  13723. Description=Added by a variant of the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_AGOBOT.GEN" target=_blank>AGOBOT/GAOBOT</a> WORM!
  13724. [microsoft macro protection subssy]
  13725. Filename=msacroprots386.exe
  13726. Confirmed=X
  13727. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32sdbotpn.html" target="_blank">RBOT-KE</a> WORM!
  13728. [microsoft management]
  13729. Filename=lmas.exe
  13730. Confirmed=X
  13731. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32forbotcz.html" target=_blank>FORBOT-CZ</a> WORM!
  13732. [microsoft manager]
  13733. Filename=msmanager.exe
  13734. Confirmed=X
  13735. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_MYTOB.LF&VSect=P" target=_blank>MYTOB.LF</a> WORM!
  13736. [microsoft map pc]
  13737. Filename=mappc.exe
  13738. Confirmed=X
  13739. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  13740. [microsoft mapped pc]
  13741. Filename=mappedpc.exe
  13742. Confirmed=X
  13743. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  13744. [microsoft media]
  13745. Filename=winmplayers.exe
  13746. Confirmed=X
  13747. Description=Added by a variant of the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.spybot.worm.html" target=_blank>SPYBOT</a> WORM!
  13748. [microsoft media player 9]
  13749. Filename=msmedia32.exe
  13750. Confirmed=X
  13751. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotado.html" target=_blank>RBOT-ADO</a> WORM!
  13752. [microsoft mediascope]
  13753. Filename=winmes.exe
  13754. Confirmed=X
  13755. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotxu.html" target=_blank>RBOT-XU</a> WORM!
  13756. [microsoft message machine]
  13757. Filename=msmesg32.exe
  13758. Confirmed=X
  13759. Description=Added by the <a href="http://se.trendmicro-europe.com/enterprise/security_info/ve_detail.php?Vname=WORM_SPYBOT.BI" target=_blank>SPYBOT.BI</a> WORM!
  13760. [microsoft messenger management controls]
  13761. Filename=msmgmctl.exe
  13762. Confirmed=X
  13763. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotapa.html" target=_blank>RBOT-APA</a> WORM!
  13764. [microsoft messenger service]
  13765. Filename=msmsg32.exe
  13766. Confirmed=X
  13767. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_RBOT.BOK&VSect=P" target=_blank>RBOT.BOK</a> WORM!
  13768. [microsoft messenger xp]
  13769. Filename=MSMSN32.exe
  13770. Confirmed=X
  13771. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotzp.html" target=_blank>RBOT-ZP</a> WORM!
  13772. [microsoft microp protocol]
  13773. Filename=wdgmr32.exe
  13774. Confirmed=X
  13775. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  13776. [microsoft movie maker]
  13777. Filename=Mmaker.exe
  13778. Confirmed=X
  13779. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.ircbot.c.html" target="_blank">IRCBOT.C</a> TROJAN! Note that this is not a valid Microsoft program
  13780. [microsoft msgplus32 protocol]
  13781. Filename=msgplus32.exe
  13782. Confirmed=X
  13783. Description=Added by a variant of the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.spybot.worm.html" target=_blank>SPYBOT</a> WORM!
  13784. [microsoft msngr32 protocol]
  13785. Filename=msngr32.exe
  13786. Confirmed=X
  13787. Description=Added by a variant of the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.spybot.worm.html" target=_blank>SPYBOT</a> WORM!
  13788. [microsoft msnseru]
  13789. Filename=msnseru.exe
  13790. Confirmed=X
  13791. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotapb.html" target=_blank>RBOT-APB</a> WORM!
  13792. [microsoft msnst]
  13793. Filename=msnst32.exe
  13794. Confirmed=X
  13795. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  13796. [microsoft msupdate]
  13797. Filename=SpoolSvc.exe
  13798. Confirmed=X
  13799. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojsxtba.html" target="_blank">SXTB-A</a> TROJAN!
  13800. [microsoft neser experience]
  13801. Filename=nese.exe
  13802. Confirmed=X
  13803. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotyh.html" target=_blank>RBOT-YH</a> WORM!
  13804. [microsoft netmeeting associates, inc.]
  13805. Filename=NetMeeting.exe
  13806. Confirmed=X
  13807. Description=Added by a variant of the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.hllw.lovgate@mm.html" target="_blank">LOVGATE</a> WORM!
  13808. [microsoft netview component v5.1]
  13809. Filename=msnv32.exe
  13810. Confirmed=X
  13811. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.randex.f.html" target="_blank">RANDEX.F</a> WORM!
  13812. [microsoft network daemon for win32]
  13813. Filename=Netd32.exe
  13814. Confirmed=X
  13815. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.sdbot.r.html" target="_blank">SDBOT.R</a> TROJAN!
  13816. [microsoft network host]
  13817. Filename=svc0host.exe
  13818. Confirmed=X
  13819. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32sdbotaen.html" target=_blank>SDBOT-AEN</a> WORM!
  13820. [microsoft network services controller]
  13821. Filename=mmsvc32.exe
  13822. Confirmed=X
  13823. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32nanpya.html" target=_blank>NANPY-A</a> WORM!
  13824. [microsoft networking agent for sp2]
  13825. Filename=msnac32.exe
  13826. Confirmed=X
  13827. Description=Added by the <a href="http://www.symantec.com/avcenter/venc/data/w32.spybot.pen.html" target=_blank>SPYBOT.PEN</a> WORM!
  13828. [microsoft notepad]
  13829. Filename=notepad.exe
  13830. Confirmed=X
  13831. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  13832. [microsoft nt update]
  13833. Filename=winexec32.exe
  13834. Confirmed=X
  13835. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  13836. [microsoft office fast cache]
  13837. Filename=Fastboot.exe
  13838. Confirmed=N
  13839. Description=Part of MS Office 95 (v7.0). According to <a href="http://support.microsoft.com/default.aspx?scid=kb;en-us;Q132755" target=_blank>this</a> it improves the performance. Most likely a predecessor of MS Find Fast and can be disabled
  13840. [microsoft office onenote 2003 quick launch]
  13841. Filename=ONENOTEM.EXE
  13842. Confirmed=U
  13843. Description=ONENOTEM.EXE is a part of the note taking program that ships with Microsoft Office 2003. It's required for the side note windows to work
  13844. [microsoft office shortcut bar]
  13845. Filename=Msoffice.exe
  13846. Confirmed=N
  13847. Description=Alternative shortcuts to the Start -> Programs way of running applications installed as part of MS Office. Some people prefer it but a better way is to create Desktop Shortcuts if you want access these programs quickly
  13848. [microsoft office start]
  13849. Filename=winupdates.exe
  13850. Confirmed=X
  13851. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.hllw.gaobot.bc.html" target="_blank">GAOBOT.BC</a> WORM!
  13852. [microsoft office studio]
  13853. Filename=scvhvst.exe
  13854. Confirmed=X
  13855. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.randex.cst.html" target=_blank>RANDEX.CST</a> WORM!
  13856. [microsoft officexp]
  13857. Filename=officeXP.exe
  13858. Confirmed=X
  13859. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=TROJ_KILLAV.MA&VSect=P" target=_blank>KILLAV.MA</a> WORM!
  13860. [microsoft opeions]
  13861. Filename=IEXwe.exe
  13862. Confirmed=X
  13863. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  13864. [microsoft pc health remote assistance file open & save controls]
  13865. Filename=sfrcdlg32.exe
  13866. Confirmed=X
  13867. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotavy.html" target=_blank>RBOT-AVY</a> WORM!
  13868. [microsoft pci manager]
  13869. Filename=mspci.exe
  13870. Confirmed=X
  13871. Description=Added by a variant of the <a href="http://www.malwareblog.com/?p=143" target=_blank>SDBOT</a> WORM!
  13872. [microsoft personal firewalls]
  13873. Filename=bakw.exe
  13874. Confirmed=X
  13875. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotks.html" target="_blank">RBOT-KS</a> WORM!
  13876. [microsoft proc driver32]
  13877. Filename=msprc.exe
  13878. Confirmed=X
  13879. Description=Added by a variant of the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_WOOTBOT.GEN" target=_blank>WOOTBOT</a> WORM!
  13880. [microsoft procedure call]
  13881. Filename=MSPCALL.exe
  13882. Confirmed=X
  13883. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  13884. [microsoft pstcp32 data]
  13885. Filename=pstcp32.exe
  13886. Confirmed=X
  13887. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  13888. [microsoft qmgr]
  13889. Filename=msnqmgr.exe
  13890. Confirmed=X
  13891. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojircbots.html" target=_blank>IRCBOT-S</a> TROJAN!
  13892. [microsoft rdll]
  13893. Filename=sysconf32.exe
  13894. Confirmed=X
  13895. Description=Added by a variant of the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.sdbot.html" target="_blank">SDBOT</a> TROJAN!
  13896. [microsoft registry]
  13897. Filename=csrse.exe
  13898. Confirmed=X
  13899. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotpc.html" target=_blank>RBOT-PC</a> WORM!
  13900. [microsoft remote secure service]
  13901. Filename=MSRSS.exe
  13902. Confirmed=X
  13903. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  13904. [microsoft restore]
  13905. Filename=scrgrd.exe
  13906. Confirmed=X
  13907. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_SPYBOT.BR" target=_blank>SPYBOT.BR</a> WORM!
  13908. [microsoft rundll]
  13909. Filename=windos.exe
  13910. Confirmed=X
  13911. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32sdbotwf.html" target= blank>SDBOT-WF</a> WORM!
  13912. [microsoft runtime]
  13913. Filename=CfgDll32.exe
  13914. Confirmed=X
  13915. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.randex.bd.html" target="_blank">RANDEX.BD</a> WORM!
  13916. [microsoft scanreg]
  13917. Filename=microsoftscanreg.exe
  13918. Confirmed=X
  13919. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_FRANRIV.A" target="_blank">FRANRIV.A</a> WORM!
  13920. [microsoft scvhost32 protocol]
  13921. Filename=scvhost32.exe
  13922. Confirmed=X
  13923. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  13924. [microsoft sddce contol]
  13925. Filename=taskmnegr.exe
  13926. Confirmed=X
  13927. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotaum.html" target=_blank>RBOT-AUM</a> WORM!
  13928. [microsoft sdk temp]
  13929. Filename=sdktemp.exe
  13930. Confirmed=X
  13931. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotanp.html" target=_blank>RBOT-ANP</a> WORM!
  13932. [microsoft sdkp3]
  13933. Filename=mswinsdq.exe
  13934. Confirmed=X
  13935. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotary.html" target=_blank>RBOT-ARY</a> WORM!
  13936. [microsoft secure messenger.net service]
  13937. Filename=securitychk.exe
  13938. Confirmed=X
  13939. Description=Added by the <a href="http://uk.trendmicro-europe.com/consumer/security_info/ve_detail.php?Vname=WORM_SDBOT.VT" target="_blank">SDBOT.VT</a> WORM!
  13940. [microsoft security]
  13941. Filename=winService.exe
  13942. Confirmed=X
  13943. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  13944. [microsoft security center]
  13945. Filename=savservices.exe
  13946. Confirmed=X
  13947. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotanu.html" target=_blank>RBOT-ANU</a> WORM!
  13948. [microsoft security controlers]
  13949. Filename=fxsecues.exe
  13950. Confirmed=X
  13951. Description=Added by a variant of the <a href="http://vil.nai.com/vil/content/v_100454.htm" target=_blank>SDBOT</a> WORM!
  13952. [microsoft security gmanagers]
  13953. Filename=[random filename]
  13954. Confirmed=X
  13955. Description=Added by a variant of the <a href="http://vil.nai.com/vil/content/v_100454.htm" target=_blank>SDBOT</a> WORM!
  13956. [microsoft security hot fix update]
  13957. Filename=mshotfix.exe
  13958. Confirmed=X
  13959. Description=<a href="http://sarc.com/avcenter/venc/data/pf/adware.affilred.html" target=_blank>Affilred</a> adware
  13960. [microsoft security manager]
  13961. Filename=winamp.exe
  13962. Confirmed=X
  13963. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_RBOT.TU&VSect=P" target=_blank>RBOT.TU</a> WORM! Note - this is not the Winamp media player executable (WinAmpa.exe)
  13964. [microsoft security panager]
  13965. Filename=[filename]
  13966. Confirmed=X
  13967. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotanl.html" target=_blank>RBOT-ANL</a> WORM!
  13968. [microsoft server application]
  13969. Filename=Sound.exe
  13970. Confirmed=X
  13971. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotne.html" target=_blank>RBOT-NE</a> WORM!
  13972. [microsoft server base]
  13973. Filename=lass.exe
  13974. Confirmed=X
  13975. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  13976. [microsoft service controller]
  13977. Filename=services.exe
  13978. Confirmed=X
  13979. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32kaleld.html" target=_blank>KALEL-D</a> WORM! Note - this is not the legitimate <a href="http://www.liutilities.com/products/wintaskspro/processlibrary/services/" target="_blank">services.exe</a> process, which should not appear in Msconfig/Startup!
  13980. [microsoft service host process]
  13981. Filename=svchost.exe
  13982. Confirmed=X
  13983. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_KRYNOS.B&VSect=P" target=_blank>KRYNOS.B</a> WORM! Note - this is not the legitimate <a href="http://www.liutilities.com/products/wintaskspro/processlibrary/svchost/" target=_blank>svchost.exe</a> process which is always located in the System (9x/Me) or System32 (NT/2K/XP) folder and should not normally figure in Msconfig/Startup! This file is located in a "Help" subfolder of the Winnt or Windows folder
  13984. [microsoft service pack]
  13985. Filename=WindowsSP.exe
  13986. Confirmed=X
  13987. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotrf.html" target=_blank>RBOT-RF</a> WORM!
  13988. [microsoft service pack2.1]
  13989. Filename=svchost2.exe
  13990. Confirmed=X
  13991. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  13992. [microsoft services unitd]
  13993. Filename=MSU32.exe
  13994. Confirmed=X
  13995. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  13996. [microsoft servicez manager]
  13997. Filename=servicemgrz.exe
  13998. Confirmed=X
  13999. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotasn.html" target=_blank>RBOT-ASN</a> WORM!
  14000. [microsoft session manager subsystem]
  14001. Filename=smss.exe
  14002. Confirmed=X
  14003. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32kaleld.html" target=_blank>KALEL-D</a> WORM! Note - this is not the legitimate <a href="http://www.liutilities.com/products/wintaskspro/processlibrary/smss/" target="_blank">smss.exe</a> process which should NOT appear in Msconfig/Startup!
  14004. [microsoft sidewinder game controller software]
  14005. Filename=SWTRAY.EXE
  14006. Confirmed=N
  14007. Description=MS SideWinder game controller system tray icon. Available via Start -> Programs
  14008. [microsoft sinsup]
  14009. Filename=odjiwjf.exe
  14010. Confirmed=X
  14011. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotdn.html" target= blank>RBOT-DN</a> WORM!
  14012. [microsoft software update]
  14013. Filename=nmon.exe
  14014. Confirmed=X
  14015. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_RBOT.HZ" target="_blank">RBOT.HZ</a> WORM!
  14016. [microsoft sound driver]
  14017. Filename=sound32.exe
  14018. Confirmed=X
  14019. Description=Added by a variant of the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.spybot.worm.html" target="_blank">SPYBOT</a> WORM!
  14020. [microsoft sound technology]
  14021. Filename=winsound.exe
  14022. Confirmed=X
  14023. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotagg.html" target=_blank>RBOT-AGG</a> WORM!
  14024. [microsoft sound volume tool]
  14025. Filename=mssvol.exe
  14026. Confirmed=N
  14027. Description=This is a Blue version of the yellow speaker icon on the system tray and is used to edit advanced Sound Features that the MS DSS80 Speakers add. Should be accessible via Start -> Settings -> Control Panel
  14028. [microsoft sourcesafe]
  14029. Filename=csrss.exe
  14030. Confirmed=X
  14031. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/trojan.webus.html" target="_blank">WEBUS</a> TROJAN! Note - this is not the legitimate <a href="http://www.liutilities.com/products/wintaskspro/processlibrary/csrss/" target="_blank">csrss.exe</a> process, which should not appear in Msconfig/Startup!
  14032. [microsoft special offer]
  14033. Filename=infoebay.exe
  14034. Confirmed=X
  14035. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target= blank>RBOT</a> WORM!
  14036. [microsoft spool server for win32]
  14037. Filename=spoolsrv.exe
  14038. Confirmed=X
  14039. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.randex.h.html" target="_blank">RANDEX.H</a> WORM!
  14040. [microsoft ssisvri32 protocol]
  14041. Filename=ssisvri.exe
  14042. Confirmed=X
  14043. Description=Added by a variant of the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.spybot.worm.html" target=_blank>SPYBOT</a> WORM!
  14044. [microsoft standard executions library]
  14045. Filename=win32lib.exe
  14046. Confirmed=X
  14047. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotauk.html" target=_blank>RBOT-AUK</a> WORM!
  14048. [microsoft sum32]
  14049. Filename=sum32.exe
  14050. Confirmed=X
  14051. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotyw.html" target= blank>RBOT-YW</a> WORM!
  14052. [microsoft support]
  14053. Filename=sys32ms.exe
  14054. Confirmed=X
  14055. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotahi.html" target=_blank>RBOT-AHI</a> WORM!
  14056. [microsoft system]
  14057. Filename=msupdtm.exe
  14058. Confirmed=X
  14059. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.spybot.pkc.html" target=_blank>SPYBOT.PKC</a> WORM!
  14060. [microsoft system backup]
  14061. Filename=[random filename]
  14062. Confirmed=X
  14063. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotagm.html" target=_blank>RBOT-AGM</a> WORM!
  14064. [microsoft system debug]
  14065. Filename=services32.exe
  14066. Confirmed=X
  14067. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_RBOT.AKH&VSect=P" target=_blank>RBOT.AKH</a> WORM!
  14068. [microsoft system dll services configuration]
  14069. Filename=windir32.exe
  14070. Confirmed=X
  14071. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32sdbotacy.html" target=_blank>SDBOT-ACY</a> TROJAN!
  14072. [microsoft system nt]
  14073. Filename=svhost.exe
  14074. Confirmed=X
  14075. Description=Added by the <a href="http://www.enciclopediavirus.com/virus/vervirus.php?id=1446&alerta=1" target=_blank>SDBOT.COU</a> WORM!
  14076. [microsoft system restore configuration]
  14077. Filename=CBRSS.EXE
  14078. Confirmed=X
  14079. Description=Added by a variant of the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.spybot.worm.html" target="_blank">SPYBOT</a> WORM!
  14080. [microsoft system update]
  14081. Filename=sysupdate.exe
  14082. Confirmed=X
  14083. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_SDBOT.DG&VSect=P" target=_blank>SDBOT.DG</a> WORM!
  14084. [microsoft system32 update]
  14085. Filename=cmsrg.exe
  14086. Confirmed=X
  14087. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotgn.html" target=_blank>RBOT-GN</a> WORM!
  14088. [microsoft taskmanager updater]
  14089. Filename=keyboard.exe
  14090. Confirmed=X
  14091. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotalu.html" target=_blank>RBOT-ALU</a> WORM!
  14092. [microsoft telecom center]
  14093. Filename=tellecom.exe
  14094. Confirmed=X
  14095. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  14096. [microsoft telecoma center]
  14097. Filename=tellcoma.exe
  14098. Confirmed=X
  14099. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotawx.html" target=_blank>RBOT-AWX</a> WORM!
  14100. [microsoft time manager]
  14101. Filename=dveldr.exe
  14102. Confirmed=X
  14103. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbothq.html" target="_blank">RBOT-HQ</a> WORM!
  14104. [microsoft toolbar]
  14105. Filename=key.exe
  14106. Confirmed=X
  14107. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotaew.html" target=_blank>RBOT-AEW</a> WORM!
  14108. [microsoft transfer file server]
  14109. Filename=mtfs.exe
  14110. Confirmed=X
  14111. Description=Added by the <a href="http://www.trendmicro-middleeast.com/enterprise/security_info/ve_detail.php?VName=WORM_RBOT.AFE&VSect=T" target=_blank>RBOT.AFE</a> WORM!
  14112. [microsoft tray]
  14113. Filename=[random filename]
  14114. Confirmed=X
  14115. Description=Added by the <a href="http://www.vsantivirus.com/back-delf-bz.htm" target="_blank">DELF.BZ</a> TROJAN!
  14116. [microsoft u]
  14117. Filename=wuamkopxp.exe
  14118. Confirmed=X
  14119. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotahc.html" target=_blank>RBOT-AHC</a> WORM!
  14120. [microsoft uma update]
  14121. Filename=MSuma32.exe
  14122. Confirmed=X
  14123. Description=Added by the <a href="http://es.trendmicro-europe.com/enterprise/security_info/ve_detail.php?id=60738&VName=WORM_RBOT.FS&VSect=T" target=_blank>RBOT.FS</a> WORM!
  14124. [microsoft unpaccker system]
  14125. Filename=unpak32.exe
  14126. Confirmed=X
  14127. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  14128. [microsoft unpack system]
  14129. Filename=winrarx.exe
  14130. Confirmed=X
  14131. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  14132. [microsoft update 23]
  14133. Filename=NtKernelSystem.exe
  14134. Confirmed=X
  14135. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  14136. [microsoft update 33]
  14137. Filename=init.exe
  14138. Confirmed=X
  14139. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotatt.html" target=_blank>RBOT-ATT</a> WORM!
  14140. [microsoft update configuration]
  14141. Filename=WIN32SNC.EXE
  14142. Confirmed=X
  14143. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotai.html" target=_blank>RBOT-AI</a> WORM!
  14144. [microsoft update control]
  14145. Filename=Ms64.exe
  14146. Confirmed=X
  14147. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  14148. [microsoft update debugger]
  14149. Filename=wincfg32.exe
  14150. Confirmed=X
  14151. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_SPYBOT.ZC&VSect=T" target=_blank>SPYBOT.ZC</a> WORM!
  14152. [microsoft update dll]
  14153. Filename=rxxhost.exe
  14154. Confirmed=X
  14155. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  14156. [microsoft update emulator]
  14157. Filename=kern-mxe.exe
  14158. Confirmed=X
  14159. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  14160. [microsoft update loader]
  14161. Filename=[random filename]
  14162. Confirmed=X
  14163. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  14164. [microsoft update loaders 2006]
  14165. Filename=winusersystem32.exe
  14166. Confirmed=X
  14167. Description=Added by a variant of the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_AGOBOT.GEN" target=_blank>AGOBOT/GAOBOT</a> WORM!
  14168. [microsoft update mechene]
  14169. Filename=Updatez.exe
  14170. Confirmed=X
  14171. Description=Added by the <a href="http://www.sophos.com.au/virusinfo/analyses/w32rbotgi.html" target=_blank>RBOT-GI</a> WORM!
  14172. [microsoft update module]
  14173. Filename=rundll24.exe
  14174. Confirmed=X
  14175. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotps.html" target=_blank>RBOT-PS</a> WORM!
  14176. [microsoft update process]
  14177. Filename=wmipcvse.exe
  14178. Confirmed=X
  14179. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojagobotjf.html" target=_blank>AGOBOT-JF</a> TROJAN!
  14180. [microsoft update security patch]
  14181. Filename=mssecurityupdatepatch.exe
  14182. Confirmed=X
  14183. Description=Added by the AGENT.EF TROJAN!
  14184. [microsoft update server]
  14185. Filename=mssrv.exe
  14186. Confirmed=X
  14187. Description=Added by an unidentified VIRUS, WORM or TROJAN!
  14188. [microsoft update time]
  14189. Filename=wuam.exe
  14190. Confirmed=X
  14191. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotm.html" target="_blank">RBOT-M</a> WORM!
  14192. [microsoft update usb2]
  14193. Filename=wuammgrd32.exe
  14194. Confirmed=X
  14195. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotadt.html" target=_blank>RBOT-ADT</a> WORM!
  14196. [microsoft update v2.6]
  14197. Filename=lxxex.exe
  14198. Confirmed=X
  14199. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  14200. [microsoft update win32a]
  14201. Filename=winupdate32a.exe
  14202. Confirmed=X
  14203. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotlo.html" target="_blank">RBOT-LO</a> WORM!
  14204. [microsoft update win32x]
  14205. Filename=winupdate32x.exe
  14206. Confirmed=X
  14207. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotajn.html" target=_blank>RBOT-AJN</a> WORM!
  14208. [microsoft updater]
  14209. Filename=Winsys32.exe
  14210. Confirmed=X
  14211. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  14212. [microsoft updater resources]
  14213. Filename=WinFixd32.exe
  14214. Confirmed=X
  14215. Description=Added by the <a href="http://ae.trendmicro-europe.com/smb/security_info/ve_detail.php?Vname=WORM_SPYBOT.CA" target=_blank>SPYBOT.CA</a> WORM!
  14216. [microsoft updater32]
  14217. Filename=lsass.exe
  14218. Confirmed=X
  14219. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.randex.ar.html" target="_blank">RANDEX.AR</a> WORM! Note - this is not the legitimate <a href="http://www.liutilities.com/products/wintaskspro/processlibrary/lsass/" target="_blank">Lsass.exe</a> system file should normally NOT figure in Msconfig/Startup!
  14220. [microsoft updaters pros]
  14221. Filename=WINDLL32XP.EXE
  14222. Confirmed=X
  14223. Description=Added by the SPYBOTTER.GEN VIRUS!
  14224. [microsoft updates 2 usb]
  14225. Filename=wgafixer.exe
  14226. Confirmed=X
  14227. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  14228. [microsoft updates 5 usb]
  14229. Filename=sp3fixer.exe
  14230. Confirmed=X
  14231. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotads.html" target=_blank>RBOT-ADS</a> WORM!
  14232. [microsoft updates resources]
  14233. Filename=WinFixIDs.exe
  14234. Confirmed=X
  14235. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  14236. [microsoft updating client]
  14237. Filename=websvc.exe
  14238. Confirmed=X
  14239. Description=Added by the <a href="http://it.trendmicro-europe.com/enterprise/security_info/ve_detail.php?id=59772&VName=WORM_RBOT.AQ&VSect=T" target=_blank>RBOT.AQ</a> WORM!
  14240. [microsoft updating machine]
  14241. Filename=sysc0de.exe
  14242. Confirmed=X
  14243. Description=Added by the <a href="http://it.trendmicro-europe.com/consumer/security_info/ve_detail.php?Vname=WORM_RBOT.RB" target=_blank>RBOT.RB</a> WORM!
  14244. [microsoft updatting]
  14245. Filename=miroupdate.exe
  14246. Confirmed=X
  14247. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  14248. [microsoft updote]
  14249. Filename=[random filename]
  14250. Confirmed=X
  14251. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotarc.html" target=_blank>RBOT-ARC</a> WORM!
  14252. [microsoft upmachine]
  14253. Filename=doezs.exe
  14254. Confirmed=X
  14255. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_RBOT.BCT&VSect=P" target=_blank>RBOT.BCT</a> WORM!
  14256. [microsoft upnp update]
  14257. Filename=msie.exe
  14258. Confirmed=X
  14259. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotlq.html" target="_blank">RBOT-LQ</a> WORM!
  14260. [microsoft uptodate driver (32-bits)]
  14261. Filename=[random filename].exe
  14262. Confirmed=X
  14263. Description=Added by the <a href="http://www.symantec.com/avcenter/venc/data/w32.spybot.lxj.html" target=_blank>SPYBOT.LXJ</a> WORM!
  14264. [microsoft usb2 driver]
  14265. Filename=crmss.exe
  14266. Confirmed=X
  14267. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotvk.html" target= blank>RBOT-VK</a> WORM!
  14268. [microsoft utility startup]
  14269. Filename=OSA9.exe
  14270. Confirmed=N
  14271. Description=Application which launches common MS Office components to help speed up the launch of Office programs. It's somewhat of a resource hog, and some users claim there's no difference with or without it but it usually isn't required. Note - if you make use of the Microsoft Office Shortcut Bar outside an office program this application will need to be enabled for it to show
  14272. [microsoft vertupdate]
  14273. Filename=MSvert32.exe
  14274. Confirmed=X
  14275. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32mytobcy.html" target=_blank>MYTOB-CY</a> WORM!
  14276. [microsoft video capture controls]
  14277. Filename=MSsrvs32.exe
  14278. Confirmed=X
  14279. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32sdbotaak.html" target=_blank>SDBOT-AAK</a> WORM!
  14280. [microsoft video controls]
  14281. Filename=tskmsgr.exe
  14282. Confirmed=X
  14283. Description=Added by a variant of the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.spybot.worm.html" target="_blank">SPYBOT</a> WORM!
  14284. [microsoft virual machine]
  14285. Filename=sms.exe
  14286. Confirmed=X
  14287. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotsp.html" target=_blank>RBOT-SP</a> WORM!
  14288. [microsoft visual studio]
  14289. Filename=plscdksxg.exe
  14290. Confirmed=X
  14291. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotawv.html" target=_blank>RBOT-AWV</a> WORM!
  14292. [microsoft visual studio vsa]
  14293. Filename=varpc32.exe
  14294. Confirmed=X
  14295. Description=Added by a variant of the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.spybot.worm.html" target="_blank">SPYBOT</a> WORM!
  14296. [microsoft web device]
  14297. Filename=wdevice.exe
  14298. Confirmed=X
  14299. Description=Added by a variant of the <a href="http://vil.nai.com/vil/content/v_100454.htm" target=_blank>SDBOT</a> WORM!
  14300. [microsoft webserver]
  14301. Filename=svctrl.exe
  14302. Confirmed=U
  14303. Description=Personal web server program which enables you to create and host a web server from your computer. Not required for most people
  14304. [microsoft wind0ws updater]
  14305. Filename=winsupdater.exe
  14306. Confirmed=X
  14307. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  14308. [microsoft windows 128bit subsystem]
  14309. Filename=system12.exe
  14310. Confirmed=X
  14311. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojranckcz.html" target=_blank>RANCK-CZ</a> TROJAN!
  14312. [microsoft windows 16bit]
  14313. Filename=mswinn16.exe
  14314. Confirmed=X
  14315. Description=Added by a variant of the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.spybot.worm.html" target=_blank>SPYBOT</a> WORM!
  14316. [microsoft windows 2000]
  14317. Filename=Winupdsdgm.exe
  14318. Confirmed=X
  14319. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.hllw.gaobot.ao.html" target="_blank">GAOBOT.AO</a> WORM!
  14320. [microsoft windows 32bit]
  14321. Filename=mswinn32.exe
  14322. Confirmed=X
  14323. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  14324. [microsoft windows 64 bit]
  14325. Filename=mswin32.exe
  14326. Confirmed=X
  14327. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  14328. [microsoft windows control]
  14329. Filename=mswctl32.exe
  14330. Confirmed=X
  14331. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_RBOT.JP" target=_blank>RBOT.JP</a> WORM!
  14332. [microsoft windows csrss]
  14333. Filename=csrss.exe
  14334. Confirmed=X
  14335. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32kalela.html" target=_blank>KALEL-A</a> WORM! Note - this is not the legitimate <a href="http://www.liutilities.com/products/wintaskspro/processlibrary/csrss/" target="_blank">csrss.exe</a> process, which should not appear in Msconfig/Startup!
  14336. [microsoft windows dhcp]
  14337. Filename=___r.exe
  14338. Confirmed=X
  14339. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.maslan.a@mm.html" target=_blank>MASLAN.A</a> or <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.maslan.c@mm.html" target=_blank>MASLAN.C</a> WORMS!
  14340. [microsoft windows dll 32-bit]
  14341. Filename=msncheck32.exe
  14342. Confirmed=X
  14343. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32sdbotxx.html" target= blank>SDBOT-XX</a> WORM!
  14344. [microsoft windows dll services]
  14345. Filename=mwindll.exe
  14346. Confirmed=X
  14347. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32sdbotvx.html" target= blank>SDBOT-VX</a> WORM!
  14348. [microsoft windows dllhandler]
  14349. Filename=bitpaint.exe
  14350. Confirmed=X
  14351. Description=Added by the <a href="http://uk.trendmicro-europe.com/enterprise/security_info/ve_detail.php?id=82113&VName=WORM_SDBOT.AHG&VSect=T" target=_blank>SDBOT.AHG</a> WORM!
  14352. [microsoft windows dvr]
  14353. Filename=windvr.exe
  14354. Confirmed=X
  14355. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotaxd.html" target=_blank>RBOT-AXD</a> WORM!
  14356. [microsoft windows explorer]
  14357. Filename=iexplorer.exe
  14358. Confirmed=X
  14359. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target= blank>RBOT</a> WORM!
  14360. [microsoft windows files loader]
  14361. Filename=cgy32win.exe
  14362. Confirmed=X
  14363. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotaxr.html" target=_blank>RBOT-AXR</a> WORM!
  14364. [microsoft windows game updater]
  14365. Filename=msgame32.exe
  14366. Confirmed=X
  14367. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  14368. [microsoft windows kernel services]
  14369. Filename=winkrnl386.exe
  14370. Confirmed=X
  14371. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.zebroxy.html" target="_blank">ZEBROXY</a> TROJAN!
  14372. [microsoft windows loader]
  14373. Filename=wloader.exe
  14374. Confirmed=X
  14375. Description=Added by a variant of the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_AGOBOT.GEN" target=_blank>AGOBOT/GAOBOT</a> WORM!
  14376. [microsoft windows logon process]
  14377. Filename=winlogon.exe
  14378. Confirmed=X
  14379. Description=Added by the <a href="http://sophos.com/virusinfo/analyses/trojproxyserr.html" target=_blank>PROXYSER-R</a> TROJAN! Note - this is not the legitimate <a href="http://www.liutilities.com/products/wintaskspro/processlibrary/winlogon/" target=_blank>winlogon.exe</a> process, which should not appear in Msconfig/Startup and is always located in the System32 folder. This worm file is placed in the Winnt or Windows folder
  14380. [microsoft windows secure server]
  14381. Filename=rpcxWindows.exe
  14382. Confirmed=X
  14383. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotll.html" target="_blank">RBOT-LL</a> WORM!
  14384. [microsoft windows secure update]
  14385. Filename=rpcxwinupdt.exe
  14386. Confirmed=X
  14387. Description=Added by an unidentified WORM or TROJAN!
  14388. [microsoft windows securety]
  14389. Filename=wurguar.exe
  14390. Confirmed=X
  14391. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotky.html" target=_blank>RBOT-KY</a> WORM!
  14392. [microsoft windows service]
  14393. Filename=winsys.exe
  14394. Confirmed=X
  14395. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotadp.html" target=_blank>RBOT-ADP</a> WORM!
  14396. [microsoft windows service pack]
  14397. Filename=winspkn.exe
  14398. Confirmed=X
  14399. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotayd.html" target=_blank>RBOT-AYD</a> WORM!
  14400. [microsoft windows session manager subsystem]
  14401. Filename=smss.exe
  14402. Confirmed=X
  14403. Description=Added by the <a href="http://sophos.com/virusinfo/analyses/trojproxyserr.html" target=_blank>PROXYSER-R</a> TROJAN! Note - this is not the legitimate <a href="http://www.liutilities.com/products/wintaskspro/processlibrary/smss/" target=_blank>smss.exe</a> process which is always located in the System (9x/Me) or System32 (NT/2K/XP) folder and should not normally figure in Msconfig/Startup! This file is located in the Winnt or Windows folder
  14404. [microsoft windows storage machine service]
  14405. Filename=winms.exe
  14406. Confirmed=X
  14407. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotahk.html" target=_blank>RBOT-AHK</a> WORM!
  14408. [microsoft windows system service manager]
  14409. Filename=winsvc.exe
  14410. Confirmed=X
  14411. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_SPYBOT.LR&VSect=P" target=_blank>SPYBOT.LR</a> WORM!
  14412. [microsoft windows task manger]
  14413. Filename=Mstosk.exe
  14414. Confirmed=X
  14415. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32sdbotww.html" target="_blank">SDBOT-WW</a> WORM!
  14416. [microsoft windows updata]
  14417. Filename=scvhost.exe
  14418. Confirmed=X
  14419. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  14420. [microsoft windows update application]
  14421. Filename=wuap.exe
  14422. Confirmed=X
  14423. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  14424. [microsoft windows update logon]
  14425. Filename=win-logon.exe
  14426. Confirmed=X
  14427. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  14428. [microsoft windows update service]
  14429. Filename=wupdmgr32.exe
  14430. Confirmed=X
  14431. Description=Added by the <a href="http://www.symantec.com/avcenter/venc/data/dos.autocat.html" target="_blank">DOS.AUTOCAT</a> TROJAN!
  14432. [microsoft windows updaterd]
  14433. Filename=log32zx.exe
  14434. Confirmed=X
  14435. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.mydoom.w@mm.html" target="_blank">MYDOOM.W</a> WORM!
  14436. [microsoft windows updates]
  14437. Filename=explorer32.exe
  14438. Confirmed=X
  14439. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_SDBOT.VQ&VSect=T" target=_blank>SDBOT.VQ</a> WORM!
  14440. [microsoft windows w32 services]
  14441. Filename=mssw32.exe
  14442. Confirmed=X
  14443. Description=Added by a variant of the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.spybot.worm.html" target=_blank>SPYBOT</a> WORM!
  14444. [microsoft windows winsass management]
  14445. Filename=winsass.exe
  14446. Confirmed=X
  14447. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotapw.html" target=_blank>RBOT-APW</a> WORM!
  14448. [microsoft windows workstation]
  14449. Filename=devcode.exe
  14450. Confirmed=X
  14451. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotawl.html" target=_blank>RBOT-AWL</a> WORM!
  14452. [microsoft windows xp configuration loader]
  14453. Filename=m32svco.exe
  14454. Confirmed=X
  14455. Description=Added by the <a href="http://us.mcafee.com/virusInfo/default.asp?id=description&virus k=132310" target= blank>SDBOT.WORM.48548</a>
  14456. [microsoft wings32 protocol]
  14457. Filename=WinSGR32.exe
  14458. Confirmed=X
  14459. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotapu.html" target=_blank>RBOT-APU</a> WORM!
  14460. [microsoft winrar]
  14461. Filename=winrar.exe
  14462. Confirmed=X
  14463. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotaec.html" target=_blank>RBOT-AEC</a> WORM!
  14464. [microsoft winsock]
  14465. Filename=mswinsck.exe
  14466. Confirmed=X
  14467. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotank.html" target=_blank>RBOT-ANK</a> WORM!
  14468. [microsoft winsock service]
  14469. Filename=msusvc.exe
  14470. Confirmed=X
  14471. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotans.html" target=_blank>RBOT-ANS</a> WORM!
  14472. [microsoft winsock wrapper]
  14473. Filename=ws2_32s.exe
  14474. Confirmed=X
  14475. Description=Added by a variant of the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.spybot.worm.html" target=_blank>SPYBOT</a> WORM!
  14476. [microsoft winupdates]
  14477. Filename=serm32.exe
  14478. Confirmed=X
  14479. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_RBOT.GE&VSect=T" target="_blank">RBOT.GE</a> WORM!
  14480. [microsoft wm]
  14481. Filename=mswm32.exe
  14482. Confirmed=X
  14483. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojbckdram.html" target=_blank>BCKDR-AM</a> TROJAN!
  14484. [microsoft word]
  14485. Filename=BootSector.exe
  14486. Confirmed=X
  14487. Description=Added by a variant of the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_AGOBOT.GEN" target=_blank>AGOBOT/GAOBOT</a> WORM!
  14488. [microsoft works calendar reminders]
  14489. Filename=wkcalrem.exe
  14490. Confirmed=N
  14491. Description=Produces a pop-up reminder of events scheduled using the MS Works Calendar
  14492. [microsoft works portfolio]
  14493. Filename=WksSb.exe
  14494. Confirmed=N
  14495. Description=The Works Portfolio tool lets you collect and organize text and pictures from the Web or your favorite program.Can be prevented from starting from a setting within Portfolio
  14496. [microsoft works update detection]
  14497. Filename=wkdetect.exe
  14498. Confirmed=N
  14499. Description=Checks for updates to MS Works
  14500. [microsoft world service]
  14501. Filename=winworld.exe
  14502. Confirmed=X
  14503. Description=Added by an unidentified IRC worm with backdoor capability!
  14504. [microsoft wxdate]
  14505. Filename=Syswu32.exe
  14506. Confirmed=X
  14507. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_SPYBOT.HZ&VSect=T" target=_blank>SPYBOT.HZ</a> WORM!
  14508. [microsoft x update]
  14509. Filename=wuamkoppnp.exe
  14510. Confirmed=X
  14511. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotani.html" target=_blank>RBOT-ANI</a> WORM!
  14512. [microsoft xdaemon 2.0]
  14513. Filename=xdaemon.exe
  14514. Confirmed=X
  14515. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.delf.d.html" target="_blank">DELF.D</a> TROJAN!
  14516. [microsoft xml service]
  14517. Filename=msxmlx.exe
  14518. Confirmed=X
  14519. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_RBOT.KS" target="_blank">RBOT.KS</a> WORM!
  14520. [microsoft xp systems loader]
  14521. Filename=winsystem32xp.exe
  14522. Confirmed=X
  14523. Description=Added by the <a href="http://www.symantec.com/avcenter/venc/data/w32.kelvir.w.html" target=_blank>KELVIR.W</a> WORM!
  14524. [microsoft xp systems loaders]
  14525. Filename=win32xpsys.exe
  14526. Confirmed=X
  14527. Description=Added by the <a href="http://www.symantec.com/avcenter/venc/data/w32.spybot.nyt.html" target=_blank>SPYBOT.NYT</a> WORM!
  14528. [microsoft xpsp protocol]
  14529. Filename=xp386.exe
  14530. Confirmed=X
  14531. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  14532. [microsoft's system module]
  14533. Filename=Sysmodule.exe
  14534. Confirmed=X
  14535. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojbdoorfj.html" target= blank>FJ</a> TROJAN!
  14536. [microsoft--updates]
  14537. Filename=sxvhost.exe
  14538. Confirmed=X
  14539. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotfh.html" target="_blank">RBOT-FH</a> WORM!
  14540. [microsoft-software]
  14541. Filename=****.exe [* = random char]
  14542. Confirmed=X
  14543. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  14544. [microsoft-update]
  14545. Filename=wngard.exe
  14546. Confirmed=X
  14547. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotjv.html" target="_blank">RBOT-JV</a> WORM!
  14548. [microsoft-updates]
  14549. Filename=svxhost.exe
  14550. Confirmed=X
  14551. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotct.html" target="_blank">RBOT-CT</a> WORM!
  14552. [microsoft420]
  14553. Filename=microsoft420.exe
  14554. Confirmed=X
  14555. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_MENACE.B" target="_blank">MENACE.B</a> WORM!
  14556. [microsoft64]
  14557. Filename=antiv.exe
  14558. Confirmed=X
  14559. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.sober@mm.html" target=_blank>SOBER</a> WORM!
  14560. [microsoftf ddes contdll]
  14561. Filename=rune.pif
  14562. Confirmed=X
  14563. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotagf.html" target=_blank>RBOT-AGF</a> WORM!
  14564. [microsoftf ddes contrdl]
  14565. Filename=runm.pif
  14566. Confirmed=X
  14567. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotafq.html" target=_blank>RBOT-AFQ</a> WORM!
  14568. [microsoftkeysds]
  14569. Filename=lass32.exe
  14570. Confirmed=X
  14571. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  14572. [microsoftks]
  14573. Filename=Drivers.bat
  14574. Confirmed=X
  14575. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojshutdownf.html" target=_blank>SHUTDOWN-F</a> TROJAN!
  14576. [microsoftm eegs cuntrol]
  14577. Filename=loor.pif
  14578. Confirmed=X
  14579. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  14580. [microsoftmsn32.exe]
  14581. Filename=microsoftmsn32.exe
  14582. Confirmed=X
  14583. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojcertifc.html" target=_blank>CERTIF-C</a> TROJAN!
  14584. [microsoftmultimediatask]
  14585. Filename=Mmtask.exe
  14586. Confirmed=X
  14587. Description=Adware downloader - not the valid MusicMatch Jukebox which shares the same filename
  14588. [microsoftnetwork daemon for win32]
  14589. Filename=NETD32.EXE
  14590. Confirmed=X
  14591. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.randex.f.html" target="_blank">RANDEX.F</a> WORM!
  14592. [microsoftoem]
  14593. Filename=smvss.exe
  14594. Confirmed=X
  14595. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojdedlerg.html" target=_blank>DEDLER-G</a> TROJAN!
  14596. [microsofts security manager]
  14597. Filename=****.exe [**** = random char]
  14598. Confirmed=X
  14599. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotwh.html" target=_blank>RBOT-WH</a> TROJAN!
  14600. [microsofts service]
  14601. Filename=lcsrv16.exe
  14602. Confirmed=X
  14603. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  14604. [microsofts updates]
  14605. Filename=lsasss.exe
  14606. Confirmed=X
  14607. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotaex.html" target=_blank>RBOT-AEX</a> WORM!
  14608. [microsoftsourcesafe]
  14609. Filename=lsass.exe
  14610. Confirmed=X
  14611. Description=Added by the <a href="http://www.symantec.com/avcenter/venc/data/trojan.webus.b.html" target=_blank>WEBUS.B</a> TROJAN! Note - this is not the legitimate <a href="http://www.liutilities.com/products/wintaskspro/processlibrary/lsass/" target=_blank>lsass.exe</a> process which is always located in the System (9x/Me) or System32 (NT/2K/XP) folder and should not normally figure in Msconfig/Startup! This file is located in the System folder
  14612. [microsoftsys]
  14613. Filename=SPOOLSYS.exe
  14614. Confirmed=X
  14615. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/pwsteal.tarno.n.html" target=_blank>TARNO.N</a> TROJAN!
  14616. [microsoftupdates]
  14617. Filename=[path to trojan]
  14618. Confirmed=X
  14619. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojdelflo.html" target=_blank>DELF-LO</a> TROJAN!
  14620. [microsoftvalue]
  14621. Filename=syscnfg.exe
  14622. Confirmed=X
  14623. Description=Added by an unidentified VIRUS, WORM or TROJAN! "syscnfg.exe" is found in C:\windows\fonts (or C:\winnt\fonts) directory where no *.exe files should reside
  14624. [microsoftvirus]
  14625. Filename=sysoverload.exe
  14626. Confirmed=X
  14627. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32forbotal.html" target="_blank">FORBOT-AL</a> WORM!
  14628. [microsoftwindows]
  14629. Filename=[various filenames]
  14630. Confirmed=X
  14631. Description=MagicSearch - a <a href="http://cwshredder.net/cwshredder/cwschronicles.html" target=_blank>CoolWebSearch</a> parasite variant
  14632. [microsoft?pid lex]
  14633. Filename=PIDLex.exe
  14634. Confirmed=X
  14635. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.niovadoor.html" target="_blank">NIOVADOOR</a> TROJAN!
  14636. [microsoft?activex debugger nt]
  14637. Filename=setdebugnt.exe
  14638. Confirmed=X
  14639. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojbancoscz.html" target=_blank>BANCOS-CZ</a> TROJAN!
  14640. [microsoft?system mapper]
  14641. Filename=SysMap.exe
  14642. Confirmed=X
  14643. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.mapsy.html" target="_blank">MAPSY</a> TROJAN!
  14644. [microszoft update mach1nezs]
  14645. Filename=svchst.exe
  14646. Confirmed=X
  14647. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rboted.html" target=_blank>RBOT-ED</a> WORM!
  14648. [microzoft_ofiz]
  14649. Filename=KdzEregli.exe
  14650. Confirmed=X
  14651. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.amus.a@mm.html" target="_blank">AMUS.A</a> WORM!
  14652. [micrsoft cfg 32]
  14653. Filename=lrbzus32.exe
  14654. Confirmed=X
  14655. Description=Added by a variant of the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM AGOBOT.GEN" target= blank>AGOBOT/GAOBOT</a> WORM!
  14656. [micrsoft internet explorer]
  14657. Filename=IEXPL0RE.EXE
  14658. Confirmed=X
  14659. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotaqv.html" target=_blank>RBOT-AQV</a> WORM! Note the number "0" in the filename
  14660. [micsorosft security center]
  14661. Filename=wcnsfty.exe
  14662. Confirmed=X
  14663. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotahu.html" target=_blank>RBOT-AHU</a> WORM!
  14664. [mightyfax controller]
  14665. Filename=MFNTCTL.EXE
  14666. Confirmed=N
  14667. Description=<a href="http://www.rkssoftware.com/mightyfax/overview.html" target="_blank">Mighty FAX</a> from RKS Software - "installs a printer driver so that you can fax directly from Windows software"
  14668. [migrationvendorsetupcaller]
  14669. Filename=rundll32.exe migrate.dll, CallVendorSetupDlls
  14670. Confirmed=?
  14671. Description=<font color="#FF0000">??</font>
  14672. [mimboot]
  14673. Filename=mimboot.exe
  14674. Confirmed=N
  14675. Description=Starts <a href="http://www.musicmatch.com/" target=_blank>Musicmatch Jukebox</a> at bootup - can be started manually
  14676. [mincer]
  14677. Filename=Mincer.exe
  14678. Confirmed=X
  14679. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/wm97mincemea.html" target=_blank>MINCEME-A</a> WORM!
  14680. [minibug]
  14681. Filename=MINIBUG.EXE
  14682. Confirmed=X
  14683. Description=Displays ads inside Weatherbug - see <a href="http://spybot.safer-networking.de/index.php?lang=en&page=knowledgebase/threats/spybots-minibug" target="_blank">here</a>
  14684. [minifert.exe]
  14685. Filename=MINIFERT.EXE
  14686. Confirmed=N
  14687. Description=Part of Backweb
  14688. [minilog]
  14689. Filename=MINILOG.EXE
  14690. Confirmed=U
  14691. Description=If you don't have ZoneAlarm or ZoneAlarm Pro running you don't need this. This must be enabled if programs such as VisualZone Report utility or ZoneLog Analyzer are in use
  14692. [minimavis]
  14693. Filename=MiniMavis.exe
  14694. Confirmed=N
  14695. Description=Mavis Beacon typing tutor
  14696. [minimo]
  14697. Filename=[path to file]
  14698. Confirmed=X
  14699. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojmosuckx.html" target= blank>MOSUCK-X</a> TROJAN!
  14700. [mininote]
  14701. Filename=MININOTE.EXE
  14702. Confirmed=N
  14703. Description=<a href="http://www.fookes.com/software/mininote.htm" target="_blank">Mini NoteTab</a> was the first in the family of "NoteTab" text and HTML editors from Fookes Software
  14704. [miniphone]
  14705. Filename=glophone.exe
  14706. Confirmed=?
  14707. Description=<a href="http://www.voiceglo.com/" target=_blank>VoiceGlo</a> Glophone Voice over Internet Protocol (VOIP) communications software - "an affordable and convenient way to call friends and family throughout the world using a dial-up or broadband Internet connection on your computer" - <font color="#FF0000">is it required in startup?</font>
  14708. [miniport]
  14709. Filename=usb2chk.exe
  14710. Confirmed=X
  14711. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojlazara.html" target=_blank>LAZAR-A</a> TROJAN!
  14712. [miniportrt]
  14713. Filename=miniport_mp.exe
  14714. Confirmed=X
  14715. Description=Malware - see <a href="http://www.protext.com/support/Miniport_mpVirus.htm" target=_blank>here</a>
  14716. [miniserver.exe]
  14717. Filename=MiniServer.exe
  14718. Confirmed=X
  14719. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojlittlewe.html" target=_blank>LITTLEW-E</a> TROJAN!
  14720. [minmaxextender]
  14721. Filename=Mmext.exe
  14722. Confirmed=U
  14723. Description=<a href="http://www.geocities.com/revenger_inc/mmext.html" target="_blank">MinMaxExtender</a> - window handling tool
  14724. [miosf update]
  14725. Filename=wimsqaad.exe
  14726. Confirmed=X
  14727. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.sdbot.ag.html" target=_blank>SDBOT.AG</a> TROJAN!
  14728. [miramar systems, inc.]
  14729. Filename=atmsg.exe
  14730. Confirmed=U
  14731. Description=Miramar PC/Mac networking software
  14732. [miranda im]
  14733. Filename=miranda32.exe
  14734. Confirmed=N
  14735. Description=<a href="http://www.miranda-im.org/" target=_blank>Miranda</a> instant messaging client
  14736. [mirate sp 2 information]
  14737. Filename=miratesp2.exe
  14738. Confirmed=X
  14739. Description=Added by the <a href="http://uk.trendmicro-europe.com/consumer/security_info/ve_detail.php?Vname=WORM_RBOT.QH" target=_blank>RBOT.QH</a> WORM!
  14740. [mircosoft dns service]
  14741. Filename=svchost.exe
  14742. Confirmed=X
  14743. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojircbotak.html" target=_blank>IRCBOT-AK</a> TROJAN! Note - this is not the legitimate <a href="http://www.liutilities.com/products/wintaskspro/processlibrary/svchost/" target=_blank>svchost.exe</a> process which is always located in the System (9x/Me) or System32 (NT/2K/XP) folder and should not normally figure in Msconfig/Startup! This file is located in a "drivers" subfolder
  14744. [mircosoft update]
  14745. Filename=wuampkd.exe
  14746. Confirmed=X
  14747. Description=Added by a variant of the <a href="http://vil.nai.com/vil/content/v_100454.htm" target=_blank>SDBOT</a> WORM!
  14748. [mircrosoft svchost32]
  14749. Filename=svchost32.exe
  14750. Confirmed=X
  14751. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotazw.html" target=_blank>RBOT-AZW</a> WORM!
  14752. [mircrosoft windows config dll]
  14753. Filename=rundllc32b.exe
  14754. Confirmed=X
  14755. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotzy.html" target=_blank>RBOT-ZY</a> WORM!
  14756. [mirovideo tray tool]
  14757. Filename=misitray.exe
  14758. Confirmed=N
  14759. Description=Tool for quickly changing options for miro/Pinnacle capture cards during capture/playback/output. When this program is closed, another program (mv-ctrl) is also closed, but mv-ctrl does not have its own EXE file. Only needed when using the capture card, e.g. for the above actions
  14760. [mirrorfoldershell]
  14761. Filename=mrfshl.exe
  14762. Confirmed=U
  14763. Description=<a href="http://download.e-not.net/utilities/11696/mirrorfolder.html" target=_blank>MirrorFolder</a> backup software
  14764. [mirsoft sdce]
  14765. Filename=taskmegr.exe
  14766. Confirmed=X
  14767. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotawy.html" target=_blank>RBOT-AWY</a> WORM!
  14768. [miscrosoft windows explorer]
  14769. Filename=IEEXPLORER.exe
  14770. Confirmed=X
  14771. Description=Reported as the SDBOT.YX WORM!
  14772. [misictrl]
  14773. Filename=misiCTRL.exe
  14774. Confirmed=?
  14775. Description=<a href="http://www.video-drivers.com/drivers/26/26750.htm" target="_blank">Miro</a> video driver related.<font color="#FF0000"> Is it required?</font>
  14776. [misitray]
  14777. Filename=misiTRAY.exe
  14778. Confirmed=?
  14779. Description=<a href="http://www.video-drivers.com/drivers/26/26750.htm" target="_blank">Miro</a> video driver related.<font color="#FF0000"> Is it required?</font>
  14780. [mismo]
  14781. Filename=win32x.exe
  14782. Confirmed=X
  14783. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotjp.html" target=_blank>RBOT-JP</a> WORM!
  14784. [mixer]
  14785. Filename=Mixer.exe
  14786. Confirmed=N
  14787. Description=C-Media Mixer - C-Media produce audio chipsets that are often found on popular motherboards with on-board audio. Provides System Tray access to change audio settings. Available via Start -> Settings -> Control Panel or Start -> Programs
  14788. [mixghost]
  14789. Filename=mixghost.exe
  14790. Confirmed=N
  14791. Description=Management software for Altec Lansing speakers.  If a change is needed, the user can launch it from the Start menu
  14792. [ml00!.exe]
  14793. Filename=ml00!.exe
  14794. Confirmed=X
  14795. Description=Malware, detected by <a href="http://www.pandasoftware.com/products/titanium2005/" target= blank>Panda</a> antivirus as Trj/Downloader.BWD
  14796. [ml1helperstartup]
  14797. Filename=ML1Helper.exe
  14798. Confirmed=U
  14799. Description=ScreenScenes <a href="http://www.screenscenes.com/index.html" target=_blank>Midnight Lake</a> screensaver. The freeware version comes with <a href="http://www.cexx.org/gator.htm" target=_blank>Gator</a> branded ads (pop-ups and others). ScreenScenes do however offer you the option of doing away with the ads by purchasing the screensaver for a whopping $30...
  14800. [mload]
  14801. Filename=lxmstart.exe
  14802. Confirmed=X
  14803. Description=Added by an unidentified VIRUS, WORM or TROJAN!
  14804. [mm install]
  14805. Filename=setup.exe
  14806. Confirmed=?
  14807. Description=<font color="#FF0000">Possibly <a href="http://www.moneysoft.co.uk/" target="_blank">Money Manager</a> from Moneysoft?</font>
  14808. [mmb2]
  14809. Filename=explorer.exe
  14810. Confirmed=X
  14811. Description=Added by an unidentified WORM or TROJAN! Note - the legitimate Windows Explorer (explorer.exe) is located in the Windows or Winnt folder and would only be in startups if you added it manually. This one is located in the System or System32 subfolders
  14812. [mmc]
  14813. Filename=inisys.exe
  14814. Confirmed=X
  14815. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32oscaboti.html" target=_blank>OSCABOT-I</a> WORM!
  14816. [mmcndmgr]
  14817. Filename=mmcndmgr.exe
  14818. Confirmed=X
  14819. Description=Added by an unidentified VIRUS, WORM or TROJAN!
  14820. [mmcwinmgmt]
  14821. Filename=winmgmt.exe
  14822. Confirmed=N
  14823. Description=Used for Enterprise Management. If you are not an IT Administrator you don't need it to be running. Also runs from the PCHealth "scheduler" - refer <a href="http://groups.google.com/groups?q=PCHealth+pchschd.exe&hl=en&selm=eeuEENQ6AHA.1484@tkmsftngp03&rnum=1" target="_blank">here</a>
  14824. [mmerefresh]
  14825. Filename=MMERefresh.exe
  14826. Confirmed=U
  14827. Description=Part of <a href="http://www.digidesign.com/" target="_blank">Digidesgin</a> Protools. Refreshes your midi ports on the 002(R) (the 002R is a hardware audio/midi converter connected to your computer via firewire). Must be running in order to use the MIDI functionality of the Digi002R
  14828. [mmgsvc]
  14829. Filename=mmgsvc.exe
  14830. Confirmed=X
  14831. Description=Mmgsvc spyware
  14832. [mmhid]
  14833. Filename=mmhid.dll
  14834. Confirmed=U
  14835. Description=This is the <a href="http://www.microsoft.com/hwdev/tech/input/audctrl.asp" target="_blank">Human Interface Device Server</a> for Win98, it is required only if you are using USB Audio Devices you can disable via Msconfig. See <a href="http://www.microsoft.com/hwdev/hid/audctrl.htm" target="_blank">here</a>. Typical examples are USB multimedia keyboards with volume control and web-ready keyboards. For example - loaded by default with MS DSS80 Speakers because they have Volume, Mute and Bass controls on the speaker. Some users may experience problems disabling this - if this is the case then re-enable it. Equivalent to Hidserv in Win98SE/2000/Me/XP
  14836. [mmhk]
  14837. Filename=mmhk.exe
  14838. Confirmed=?
  14839. Description=<font color="#FF0000">A driver found on a Compaq Presario 800T notebook. Possibly something to do with multimedia hot keys?</font>
  14840. [mmhotkey]
  14841. Filename=MMHotKey.exe
  14842. Confirmed=N
  14843. Description=Multimedia key handling for the relevant type of Turbo-Media keyboard. Shortcut available. Note that with this running it can crash DirectX8/9 under WinXP when a game switches to full-screen
  14844. [mmkeybd]
  14845. Filename=MMKeybd.exe
  14846. Confirmed=U
  14847. Description=Multimedia keyboard manager. Required if you use the additional keys
  14848. [mmod]
  14849. Filename=mmod.exe
  14850. Confirmed=X
  14851. Description=eZula <a href="http://research.sunbelt-software.com/threat_display.cfm?name=eZula.TopText&threatid=5117&search=TopText" target=_blank>TopText</a> adware
  14852. [mmpti]
  14853. Filename=m1mmpti.exe
  14854. Confirmed=N
  14855. Description=Mpact Mediaware Properties Taskbar Icon - multimedia software icon for Chromatic Research Mpact video cards
  14856. [mmrun]
  14857. Filename=mmrun.exe
  14858. Confirmed=?
  14859. Description=<font color="#FF0000">??</font>
  14860. [mmsys]
  14861. Filename=recover.exe
  14862. Confirmed=?
  14863. Description=<font color="#FF0000">??</font>
  14864. [mmsystem]
  14865. Filename=RunDll32
  14866. Confirmed=X
  14867. Description=Added by the FUNNER-A WORM!
  14868. [mmtask service]
  14869. Filename=mmtask.exe
  14870. Confirmed=X
  14871. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojbackgata.html" target="_blank">BACKGAT.A</a> TROJAN! Not the valid MusicMatch Jukebox which has the same filename
  14872. [mmtray2k]
  14873. Filename=MMTray2K.exe
  14874. Confirmed=N
  14875. Description=Part of <a href="http://www.morgan-multimedia.com/" target="_blank"> Morgan Multimedia Codecs</a>. Only required when the codecs are used
  14876. [mmtraylsi]
  14877. Filename=MMTrayLSI.exe
  14878. Confirmed=N
  14879. Description=Part of <a href="http://www.morgan-multimedia.com/" target="_blank"> Morgan Multimedia Codecs</a>. Only required when the codecs are used
  14880. [mmusrstp]
  14881. Filename=procrun.exe
  14882. Confirmed=?
  14883. Description=<font color="#FF0000">??</font>
  14884. [mmxp2passion.exe]
  14885. Filename=mmxp2passion.exe
  14886. Confirmed=X
  14887. Description=<a href="http://securityresponse.symantec.com/avcenter/venc/data/adware.popuppers.html" target=_blank>MediaMotor/Popuppers</a> adware
  14888. [mnklins]
  14889. Filename=mnklins.exe
  14890. Confirmed=X
  14891. Description=<a href="http://research.sunbelt-software.com/threat_display.cfm?name=VX2.Transponder&threatid=12517&search=vx2" target=_blank>VX2.Transponder</a> parasite updater/installer related
  14892. [mnpol]
  14893. Filename=mnpol.exe
  14894. Confirmed=X
  14895. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/downloader.dluca.b.html" target=_blank>DLUCA.B</a> TROJAN!
  14896. [mns]
  14897. Filename=MNS.exe
  14898. Confirmed=U
  14899. Description=<a href="http://www.mobilenetswitch.com/" target=_blank>Mobile Net Switch</a> enables you to use your computer on more then one network with the click of a button. It allows you to automatically select the correct drive mappings, printer settings, IP settings and much more
  14900. [mnsvc]
  14901. Filename=mnsvc.exe
  14902. Confirmed=X
  14903. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.autoupder.html" target="_blank">AUTOUPDER</a> TROJAN!
  14904. [mnsvcsp]
  14905. Filename=mnsvcsp.exe
  14906. Confirmed=X
  14907. Description=Added by an unidentified VIRUS, WORM or TROJAN!
  14908. [mobsync]
  14909. Filename=mobsync.exe
  14910. Confirmed=N
  14911. Description=MS Syncrhonization Manager - updates the network copy of materials that were edited offline, such as documents, calendars, and e-mail messages
  14912. [mobsync32.exe]
  14913. Filename=mobsync32.exe
  14914. Confirmed=X
  14915. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/pwsteal.finero.html" target="_blank">FINERO</a> TROJAN!
  14916. [mod]
  14917. Filename=muamger.exe
  14918. Confirmed=N
  14919. Description=MicroAngelo On Display from <a href="http://www.impactsoft.com/muangelo/ondisplay/prodinfo.htm" target="_blank">Impact Software</a> lets you customize Windows icons. With a few exceptions, you can customize icons by right-clicking on them
  14920. [modem]
  14921. Filename=locatesvc.exe
  14922. Confirmed=X
  14923. Description=Added by a variant of the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.spybot.worm.html" target=_blank>SPYBOT</a> WORM!
  14924. [modem driverz updates]
  14925. Filename=mdmdrv.exe
  14926. Confirmed=X
  14927. Description=Added by a variant of the <a href="http://vil.nai.com/vil/content/v_100454.htm" target=_blank>SDBOT</a> WORM!
  14928. [modembtr]
  14929. Filename=MODEMBTR.EXE
  14930. Confirmed=U
  14931. Description=Modem Booster from <a href="http://inklineglobal.com/" target="_blank">inKline Global</a> to improve ISP connections
  14932. [modeminf]
  14933. Filename=Modeminf.exe
  14934. Confirmed=X
  14935. Description=Added by a variant of the <a href="http://www.sophos.com/virusinfo/analyses/trojcrypterc.html" target="_blank">CRYPTER.C</a> TROJAN!
  14936. [modemonhold]
  14937. Filename=MOH.EXE
  14938. Confirmed=U
  14939. Description=NetWaiting Modem-on-Hold Application
  14940. [modemutility]
  14941. Filename=mdmsetpe.exe
  14942. Confirmed=N
  14943. Description=System Tray configuration icon for Aztech modems
  14944. [modularconfig]
  14945. Filename=syscnfg.exe
  14946. Confirmed=X
  14947. Description=Added by an unidentified VIRUS, WORM or TROJAN! "syscnfg.exe" is found in C:\windows\fonts (or C:\winnt\fonts) directory where no *.exe files should reside
  14948. [module call initialize]
  14949. Filename=RUNDLL32.EXE reg.dll, ondll_reg
  14950. Confirmed=X
  14951. Description=Added by a variant of the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.hllw.lovgate@mm.html" target="_blank">LOVGATE</a> WORM!
  14952. [money express]
  14953. Filename=moneyexpress.exe
  14954. Confirmed=N
  14955. Description=Part of MS Money. Available via Start -> Programs
  14956. [moneystartup]
  14957. Filename=Money Startup.exe
  14958. Confirmed=N
  14959. Description=Microsoft Money
  14960. [moneystartup10.0]
  14961. Filename=Activation.exe
  14962. Confirmed=N
  14963. Description=Part of MS Money 2002. Available via Start -> Programs
  14964. [monitor]
  14965. Filename=monitor.exe
  14966. Confirmed=X
  14967. Description=Browser hijacker, redirecting to NCM Search
  14968. [monitor apache servers]
  14969. Filename=ApacheMonitor.exe
  14970. Confirmed=U
  14971. Description=Part of the Apache Web Server package. Useful only if you're running such a server on your PC. Available via Start -> Programs
  14972. [monitor helper]
  14973. Filename=monitor.exe
  14974. Confirmed=U
  14975. Description=<a href="http://www.symantec.com/avcenter/venc/data/spyware.mylittlespy.html" target= blank>MyLittleSpy</a> keystroke logger/monitoring program - remove unless you installed it yourself!
  14976. [monitoring service]
  14977. Filename=svchost.exe
  14978. Confirmed=X
  14979. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.cone.c@mm.html" target=_blank>CONE.C</a> WORM! Note - this is not the legitimate <a href="http://www.liutilities.com/products/wintaskspro/processlibrary/svchost/" target=_blank>svchost.exe</a> process which is always located in the System (9x/Me) or System32 (NT/2K/XP) folder and should not normally figure in Msconfig/Startup! This file is located in a "tasks" subfolder of the Winnt or Windows folder
  14980. [monitormgt]
  14981. Filename=Monitormgt.exe
  14982. Confirmed=X
  14983. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/trojan.gema.html" target="_blank">GEMA</a> TROJAN!
  14984. [monitorsd]
  14985. Filename=SDMonitor.exe
  14986. Confirmed=X
  14987. Description=Spyware remover - not recommended, search for "spywaredetector.net" <a href="http://www.spywarewarrior.com/rogue_anti-spyware.htm" target=_blank>here</a>
  14988. [monpluginsrivcs]
  14989. Filename=n3monap23.exe
  14990. Confirmed=X
  14991. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  14992. [monstersoundtray]
  14993. Filename=Freectrl.exe
  14994. Confirmed=N
  14995. Description=Diamond Multimedia sound card control panel
  14996. [montest]
  14997. Filename=vccxzq.exe
  14998. Confirmed=X
  14999. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32sdbotea.html" target=_blank>SDBOT-EA</a> WORM!
  15000. [moodbook]
  15001. Filename=mb.exe
  15002. Confirmed=U
  15003. Description=<a href="http://www.moodbook.com/" target=_blank>MoodBook</a> is a free Windows utility that brings art to your desktop
  15004. [moon phase]
  15005. Filename=moon.exe
  15006. Confirmed=N
  15007. Description=<a href="http://www.locutuscodeware.com" target="_blank">Moon Phase</a> - tray icon that indicates the phases of the moon
  15008. [morpheus]
  15009. Filename=morpheus.exe
  15010. Confirmed=N
  15011. Description=MusicCity Networks' Morpheus - another peer-to-peer client based on Kazaa. Notable in that this one doesn't seem to install the adware that clog the Kazaa download. They claim they are adware free, and a visitor quotes "I have seen no instance of any since using it"
  15012. [morphstb]
  15013. Filename=morphstb.exe
  15014. Confirmed=X
  15015. Description=Adware downloader - detected by <a href="http://www.kaspersky.com/personalpro" target= blank>Kaspersky</a> antivirus as Trojan-Downloader.Win32.Stubby.c
  15016. [mosearch]
  15017. Filename=mosearch.exe
  15018. Confirmed=X
  15019. Description=Fast Search in Office XP - similar to the new revision of the Find Fast feature in Office 2000. Fast Search uses the Indexing Services in Office XP to create a catalog of Office files on your computer's hard disk. As with Find Fast - a waste of resources. If it can't be disabled via MSCONFIG try <a href="http://support.microsoft.com/support/kb/articles/Q282/1/06.asp" target="_blank">here</a>
  15020. [motherboard sounds]
  15021. Filename=Sounds.exe
  15022. Confirmed=X
  15023. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotaap.html" target=_blank>RBOT-AAP</a> WORM!
  15024. [motivemonitor]
  15025. Filename=motmon.exe
  15026. Confirmed=U
  15027. Description=Found on HP/Dell and Compaq systems (and maybe others). MotiveMonitor is usedáthe suppliers on-line support and allows the agent at the far end to do harddrive/ram/video/etc tests on the computer. Can cause some users problems with IE and Netscape by disabling this - in this case leave it to run. You may also wish to leave it alone if the PC is still within the support period from the manufcaturer. For most users it's not required
  15028. [motivesb]
  15029. Filename=MotiveSB.exe
  15030. Confirmed=N
  15031. Description=System tray icon for the Virtual Assistant from <a href="http://www.attbi.com/" target="_blank">AT&T Broadband</a>, used to communicate internet problems via the network rather than telephone. Available via desktop shortcut or Start -> Programs - not required
  15032. [motmon]
  15033. Filename=motmon.exe
  15034. Confirmed=U
  15035. Description=Found on HP/Dell and Compaq systems (and maybe others). MotiveMonitor is usedáthe suppliers on-line support and allows the agent at the far end to do harddrive/ram/video/etc tests on the computer. Can cause some users problems with IE and Netscape by disabling this - in this case leave it to run. You may also wish to leave it alone if the PC is still within the support period from the manufcaturer. For most users it's not required
  15036. [motoin]
  15037. Filename=mm15201518.Stub.exe
  15038. Confirmed=X
  15039. Description=<a href="http://securityresponse.symantec.com/avcenter/venc/data/adware.delfin.html" target= blank>Delfin Promulgate</a> adware variant
  15040. [mount safe & sound]
  15041. Filename=Fbmount.exe
  15042. Confirmed=U
  15043. Description=From McAfee VirusScan version 5.x. Creates back-up sets of critical files in a separate area of a hard drive. If you make regular back-ups it's not needed and can be painful during system start
  15044. [mouse]
  15045. Filename=mouse.exe
  15046. Confirmed=X
  15047. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotahj.html" target=_blank>RBOT-AHJ</a> WORM!
  15048. [mouse 32a]
  15049. Filename=Mouse32A.exe
  15050. Confirmed=N
  15051. Description=Mouse driver to control mouse functions from Azona. Available via Start -> Programs
  15052. [mouse suite 98 daemon]
  15053. Filename=pelmiced.exe
  15054. Confirmed=N
  15055. Description=Mouse driver. Appears to cause a behaviour where the desktop suddenly flips back up when playing DirectX associated games
  15056. [mousebut]
  15057. Filename=mousebut.exe
  15058. Confirmed=X
  15059. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=TROJ_CRYPTER.A" target="_blank">CRYPTER.A</a> TROJAN!
  15060. [mousecntl]
  15061. Filename=mousecntl.exe
  15062. Confirmed=X
  15063. Description=Added by a variant of the <a href="http://www.sophos.com/virusinfo/analyses/trojcrypterc.html" target="_blank">CRYPTER.C</a> TROJAN!
  15064. [mousecount]
  15065. Filename=MC.exe
  15066. Confirmed=N
  15067. Description=<a href="http://www.kittyfeet.com/mousecount.htm" target="_blank">MouseCount</a> by Kittyfeet Software. "Utility for counting how many times us computer junkies click our mouse in a given session/day/week/month/year." Not required
  15068. [mouseimp]
  15069. Filename=MImpHost.exe
  15070. Confirmed=U
  15071. Description=MouseImp Pro - "A reliable assistant that turns your mouse into a simple, native but powerful controlling device"
  15072. [mousinfo]
  15073. Filename=mousinfo.exe
  15074. Confirmed=U
  15075. Description=MS mouse information tool - for troubleshooting mouse problems
  15076. [movesearch]
  15077. Filename=Search.exe
  15078. Confirmed=X
  15079. Description=<a href="http://www.symantec.com/avcenter/venc/data/adware.pigsearch.html" target=_blank>PigSearch</a> adware
  15080. [movielink manager uninstall]
  15081. Filename=msvcmm32.exe
  15082. Confirmed=N
  15083. Description=Auto-update for <a href="http://www.movielink.com/" target="_blank">Movielink</a> - internet movie rental System Tray access
  15084. [movienetworks]
  15085. Filename=MovieNetworks.exe
  15086. Confirmed=X
  15087. Description=<a href="http://www.movienetworks.com/" target="_blank">MovieNetworks</a> will connect you by DOMESTIC PREMIUM RATE TELEPHONE NUMBER 900-xxx-xxxx. So you get xxx rated pictures and junk. And it will allow you to stay on the internet on their line and $$$ and remove the C:\Program Files\MovieNetworks directory
  15088. [movieplace]
  15089. Filename=Movieplace.exe
  15090. Confirmed=X
  15091. Description=<a href="http://research.pestpatrol.com/PestInfo/Pest_Detail.asp?id=453060662" target="_blank">MoviePlace</a> malware
  15092. [mozilla firefox]
  15093. Filename=F1REF0X.EXE
  15094. Confirmed=X
  15095. Description=Added by a variant of the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=BKDR_SDBOT.GEN" target=_blank>SDBOT</a> WORM!
  15096. [mp tcloaxs]
  15097. Filename=mptcloaxs.exe
  15098. Confirmed=X
  15099. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_RANDEX.CT" target="_blank">RANDEX.CT</a> WORM!
  15100. [mp3 loader]
  15101. Filename=Sysdata.EXE
  15102. Confirmed=X
  15103. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32avettea.html" target=_blank>AVETTE-A</a> VIRUS!
  15104. [mpeo]
  15105. Filename=Csinsm32.exe
  15106. Confirmed=U
  15107. Description=Automatic logging of installs from Norton CleanSweep - available via Start -> Programs
  15108. [mpftray]
  15109. Filename=MpfTray.exe
  15110. Confirmed=Y
  15111. Description=McAfee Personal Firewall
  15112. [mpl32 driver]
  15113. Filename=MPL32.exe
  15114. Confirmed=X
  15115. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojloonym.html" target="_blank">LOONY-M</a> TROJAN!
  15116. [mplay64]
  15117. Filename=mplay64.exe
  15118. Confirmed=X
  15119. Description=Added by the <a href="http://www.superadblocker.com/M/MPLAY64.EXE-6741.html" target=_blank>MPLAY64</a> TROJAN!
  15120. [mplsetup]
  15121. Filename=MplSetup.exe
  15122. Confirmed=U
  15123. Description=Used by Ricoh network printers to enable network printing from the client
  15124. [mpm manager]
  15125. Filename=MPM.exe
  15126. Confirmed=X
  15127. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=TROJ_DONBOMB.A&VSect=P" target=_blank>DONBOMB.A</a> TROJAN!
  15128. [mpower]
  15129. Filename=MPower.exe
  15130. Confirmed=U
  15131. Description=<a href="http://www.mindbeat.com/" target="_blank">MPower</a> from MindBeat. "Defragments and frees your RAM giving more stability to your system and avoiding needless use of swap file. Willl also benchmark (speed test) your hard disk drives and your CPU load". MS MVPs (Most Valued Professional) recommend not using memory managers with Win98/SE/ME. See <a href="http://www.aumha.org/a/memmgmt.htm" target="_blank">this</a> article and make up your own mind
  15132. [mpr msg]
  15133. Filename=mprmsg32.exe
  15134. Confirmed=X
  15135. Description=Added by the <a href="http://www.symantec.com/avcenter/venc/data/w32.mytob.cf@mm.html" target= blank>MYTOB.CF</a> WORM!
  15136. [mprexe]
  15137. Filename=MPREXE.EXE
  15138. Confirmed=X
  15139. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_OPASERV.T" target="_blank">OPASERV.T</a> WORM! Note - this is not the legitimate <a href="http://www.liutilities.com/products/wintaskspro/processlibrary/mprexe/" target="_blank"> Mprexe.exe</a> system file
  15140. [mprexe.exe]
  15141. Filename=mprexe.exe
  15142. Confirmed=Y
  15143. Description=WIN32 Network Service Interface Process. MPREXE.exe enables the computer to have multiple clients/protocols for networks. There are some problems with it sometimes though - see <a href="http://support.microsoft.com/directory/article.asp?ID=KB;EN-US;Q178084" target="_blank">here</a> and <a href="http://www.ohsu.edu/win95/html/mprexe.html" target="_blank">here</a>. Note - why some people have it listed in start-up programs I don't know but I was asked to include it here. It automatically runs in the background. NOTE : sometimes it will appear in start-ups if you have a virus
  15144. [mprhtml]
  15145. Filename=MprHTML.exe
  15146. Confirmed=X
  15147. Description=Added by a variant of the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=BKDR_VAGRNOCK.12" target="_blank">VAGRNOCKER</a> TROJAN!
  15148. [mprocessor]
  15149. Filename=mprocessor.exe
  15150. Confirmed=X
  15151. Description=InstallDollars.com foistware
  15152. [mpsexe]
  15153. Filename=mscifapp.exe
  15154. Confirmed=U
  15155. Description=McAfee.com Privacy Service - "combines personal identifiable information (PII) protection with online advertisement blocking and content filtering"
  15156. [mpsonn]
  15157. Filename=MpsOnn.exe
  15158. Confirmed=Y
  15159. Description=Canon printer driver
  15160. [mpt]
  15161. Filename=MPT.exe
  15162. Confirmed=?
  15163. Description=<font color="#FF0000">??</font>
  15164. [mptask services]
  15165. Filename=mptask.exe
  15166. Confirmed=X
  15167. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.lala.html" target="_blank">LALA</a> or <a href="http://vil.nai.com/vil/content/v_99788.htm" target="_blank">AOT</a> TROJANS!
  15168. [mptbox]
  15169. Filename=MPTBOX.EXE
  15170. Confirmed=N
  15171. Description=Cannon Multi-Pass toolbox - a button bar
  15172. [mptsgsvc.exe]
  15173. Filename=mptsgsvc.exe
  15174. Confirmed=X
  15175. Description=<a href="http://www.f-secure.com/v-descs/hacktool.shtml" target= blank>Hacker Tool</a> - detected by <a href="http://tds.diamondcs.com.au/" target= blank>TDS-3</a> antitrojan as "HackTool.Win32.Hidd.j"
  15176. [mpxtray]
  15177. Filename=mpxptray.exe
  15178. Confirmed=N
  15179. Description=Windows Media Player PowerToy which is run from the taskbar. It can be used to hide Windows Media Player (when in use) and choose various standard buttons (play/pause, next,previous) etc
  15180. [mp_status_monitor]
  15181. Filename=monitr32.exe
  15182. Confirmed=U
  15183. Description=Cannon Multi-Pass status monitor - your choice
  15184. [mqbkup]
  15185. Filename=mqbkup.exe
  15186. Confirmed=X
  15187. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.opaserv.k.worm.html" target="_blank">OPASERV.K</a> WORM!
  15188. [mrtmngr]
  15189. Filename=mrtMngr.exe
  15190. Confirmed=N
  15191. Description=Maintenance Release Task Manager for IntuitÆs QuickBooks or Quicken
  15192. [mru-blaster scheduler]
  15193. Filename=scheduler.exe
  15194. Confirmed=U
  15195. Description=<a href="http://www.wilderssecurity.com/mrublaster.html" target="_blank">MRU-Blaster</a> scheduler - detects and cleans MRU (most recently used) lists on your computer
  15196. [mru-blaster silent clean]
  15197. Filename=mrublaster.exe
  15198. Confirmed=N
  15199. Description=<a href="http://www.wilderssecurity.com/mrublaster.html" target="_blank">MRU-Blaster</a> - performs silent cleaning of MRU lists at boot
  15200. [mrublaster]
  15201. Filename=indexcleaner.exe
  15202. Confirmed=U
  15203. Description=<a href="http://www.wilderssecurity.com/mrublaster.html" target=_blank>MRU-Blaster</a> related - runs once in order to delete the index.dat file in the Temporary Internet Files and/or Cookies folder
  15204. [ms auto-ipsec protection]
  15205. Filename=MSASP32.exe
  15206. Confirmed=X
  15207. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotaer.html" target=_blank>RBOT-AER</a> WORM!
  15208. [ms autoloader 32]
  15209. Filename=MSAuto32.exe
  15210. Confirmed=X
  15211. Description=Added by the <a href="http://ae.trendmicro-europe.com/enterprise/security_info/ve_detail.php?Vname=WORM_SPYBOT.BD" target=_blank>SPYBOT.BD</a> WORM!
  15212. [ms builders]
  15213. Filename=Wupated.exe
  15214. Confirmed=X
  15215. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32agobotss.html" target=_blank>AGOBOT-SS</a> WORM!
  15216. [ms config service]
  15217. Filename=Msloader32.exe
  15218. Confirmed=X
  15219. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotkj.html" target="_blank">RBOT-KJ</a> WORM!
  15220. [ms config v13]
  15221. Filename=lrbz32.exe
  15222. Confirmed=U
  15223. Description=Added by the <a href="http://www.sarc.com/avcenter/venc/data/w32.gaobot.aol.html" target=_blank>GAOBOT.AOL</a> WORM!
  15224. [ms database]
  15225. Filename=MSDATA32.EXE
  15226. Confirmed=X
  15227. Description=Added by a variant of the <a href="http://vil.nai.com/vil/content/v_100454.htm" target=_blank>SDBOT</a> WORM!
  15228. [ms decryption software]
  15229. Filename=active.exe
  15230. Confirmed=X
  15231. Description=<a href="http://www.spywareguide.com/product_show.php?id=813" target="_blank">MediaTickets</a> adware variant
  15232. [ms directx sound drivers]
  15233. Filename=msdrvdx.exe
  15234. Confirmed=X
  15235. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_RBOT.BCX&VSect=T" target=_blank>RBOT.BCX</a> WORM!
  15236. [ms dvd directx dll drivers]
  15237. Filename=mdxdl.exe
  15238. Confirmed=X
  15239. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32sdbotxi.html" target= blank>SDBOT-XI</a> WORM!
  15240. [ms dvd directx sound drivers]
  15241. Filename=msdrvdx.exe
  15242. Confirmed=X
  15243. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32sdbotxj.html" target= blank>SDBOT-XJ</a> WORM!
  15244. [ms explorer]
  15245. Filename=mexplore.exe
  15246. Confirmed=X
  15247. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.yaha.ae@mm.html" target="_blank">YAHA.AE</a> WORM!
  15248. [ms html location class]
  15249. Filename=MSHTML32.exe
  15250. Confirmed=X
  15251. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotyd.html" target= blank>RBOT-YD</a> WORM!
  15252. [ms internet executor 32]
  15253. Filename=MSIXEC32.exe
  15254. Confirmed=X
  15255. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotaeq.html" target=_blank>RBOT-AEQ</a> WORM!
  15256. [ms lsass startup]
  15257. Filename=lsass135.exe
  15258. Confirmed=X
  15259. Description=Added by the <a href="http://ae.trendmicro-europe.com/enterprise/security_info/ve_detail.php?Vname=WORM_RBOT.WM" target=_blank>RBOT.WM</a> WORM!
  15260. [ms management console]
  15261. Filename=mms.exe
  15262. Confirmed=?
  15263. Description=<font color="#FF0000">Suspicious as the Microsoft Management Console is "mmc.exe" and doesn't normally run at startup</font>
  15264. [ms microsoft socket deamon]
  15265. Filename=MSSCKD32.exe
  15266. Confirmed=X
  15267. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  15268. [ms network control]
  15269. Filename=mswin.exe
  15270. Confirmed=X
  15271. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/trojan.dumba.html" target="_blank">DUMBA</a> TROJAN!
  15272. [ms ownage]
  15273. Filename=winPE.exe
  15274. Confirmed=X
  15275. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotajl.html" target=_blank>RBOT-AJL</a> WORM!
  15276. [ms plus inc]
  15277. Filename=wpad.exe
  15278. Confirmed=X
  15279. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32mytoban.html" target=_blank>MYTOB-AN</a> WORM!
  15280. [ms processe manager]
  15281. Filename=msproc.exe
  15282. Confirmed=X
  15283. Description=Added by the <a href="http://be.trendmicro-europe.com/enterprise/security_info/ve_detail.php?VName=WORM_RBOT.ATO&VSect=T" target=_blank>RBOT.ATO</a> WORM!
  15284. [ms real player]
  15285. Filename=RealPlyr.exe
  15286. Confirmed=X
  15287. Description=Added by the <a href="http://de.trendmicro-europe.com/consumer/vinfo/encyclopedia.php?LYstr=VMAINDATA&vNav=1&VName=WORM_RBOT.MR" target=_blank>RBOT.MR</a> WORM!
  15288. [ms registry service]
  15289. Filename=MSRMS32.exe
  15290. Confirmed=X
  15291. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotakp.html" target=_blank>RBOT-AKP</a> WORM!
  15292. [ms remote procedure call]
  15293. Filename=msrpc32.exe
  15294. Confirmed=X
  15295. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotql.html" target=_blank>RBOT-QL</a> WORM!
  15296. [ms screen saver]
  15297. Filename=scrsave.scr
  15298. Confirmed=X
  15299. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotagt.html" target=_blank>RBOT-AGT</a> WORM!
  15300. [ms security]
  15301. Filename=systm.pif
  15302. Confirmed=X
  15303. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotaqn.html" target=_blank>RBOT-AQN</a> WORM!
  15304. [ms security authority service]
  15305. Filename=lsass.exe
  15306. Confirmed=X
  15307. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32kalelb.html" target=_blank>KALEL-B</a> WORM! Note - this is not the legitimate <a href="http://www.liutilities.com/products/wintaskspro/processlibrary/lsass/" target=_blank>lsass.exe</a> process which is always located in the System (9x/Me) or System32 (NT/2K/XP) folder and should not normally figure in Msconfig/Startup! This file is located in the System folder
  15308. [ms security hotfix]
  15309. Filename=service5.exe
  15310. Confirmed=X
  15311. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.hllw.gaobot.ag.html" target="_blank">GAOBOT.AG</a> WORM!
  15312. [ms service]
  15313. Filename=msservice.exe
  15314. Confirmed=X
  15315. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotzg.html" target= blank>RBOT-ZG</a> WORM!
  15316. [ms sound config 16bit]
  15317. Filename=sndcfg16.exe
  15318. Confirmed=X
  15319. Description=Added by the <a href="http://www.f-secure.com/v-descs/sdbot_mb.shtml" target="_blank">SDBOT.MB</a> TROJAN!
  15320. [ms sound drivers]
  15321. Filename=msdrv.exe
  15322. Confirmed=X
  15323. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32sdbotwr.html" target=_blank>SDBOT-WR</a> WORM!
  15324. [ms spool32]
  15325. Filename=MS SPOOL32.EXE
  15326. Confirmed=X
  15327. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.assasin.html" target="_blank">ASASSIN</a> TROJAN!
  15328. [ms sys restore]
  15329. Filename=sysrestore.exe
  15330. Confirmed=X
  15331. Description=Added by the <a href="http://es.trendmicro-europe.com/enterprise/security_info/ve_detail.php?id=66436&VName=WORM_RBOT.XM&VSect=T" target=_blank>RBOT.XM</a> WORM!
  15332. [ms sys security]
  15333. Filename=mswin.pif
  15334. Confirmed=X
  15335. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotapj.html" target=_blank>RBOT-APJ</a> WORM!
  15336. [ms system security]
  15337. Filename=mswin32.pif
  15338. Confirmed=X
  15339. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotaox.html" target=_blank>RBOT-AOX</a> WORM!
  15340. [ms task manager]
  15341. Filename=tskmgr.exe
  15342. Confirmed=X
  15343. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_SDBOT.CCD&VSect=Sn" target=_blank>SDBOT.CCD</a> WORM!
  15344. [ms taskbars]
  15345. Filename=taskbars.exe
  15346. Confirmed=X
  15347. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32sdbotacv.html" target=_blank>SDBOT-ACV</a> WORM!
  15348. [ms taskmanager]
  15349. Filename=tskmgr.exe
  15350. Confirmed=X
  15351. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotaka.html" target=_blank>RBOT-AKA</a> WORM!
  15352. [ms unix]
  15353. Filename=navupdate64.exe
  15354. Confirmed=X
  15355. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  15356. [ms update]
  15357. Filename=syshost.exe
  15358. Confirmed=X
  15359. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32evamanf.html" target="_blank">EVAMAN-F</a> WORM!
  15360. [ms updating utility]
  15361. Filename=msupdater.exe
  15362. Confirmed=X
  15363. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotxr.html" target= blank>RBOT-XR</a> WORM!
  15364. [ms usb 2.0 windows support]
  15365. Filename=msusb32.exe
  15366. Confirmed=X
  15367. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  15368. [ms valud loader]
  15369. Filename=Svhots.exe
  15370. Confirmed=X
  15371. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32agobotsp.html" target=_blank>AGOBOT-SP</a> WORM!
  15372. [ms window update]
  15373. Filename=******.exe [* = random character]
  15374. Confirmed=X
  15375. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  15376. [ms windows aol driver]
  15377. Filename=MSAOLdrv.exe
  15378. Confirmed=X
  15379. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotasp.html" target=_blank>RBOT-ASP</a> WORM!
  15380. [ms windows data list process]
  15381. Filename=MSDATLST.exe
  15382. Confirmed=X
  15383. Description=Added by an unidentified WORM or TROJAN!
  15384. [ms windows procces 32]
  15385. Filename=msprocces.exe
  15386. Confirmed=X
  15387. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotaez.html" target=_blank>RBOT-AEZ</a> WORM!
  15388. [ms windows process class]
  15389. Filename=MSPRCSS32.exe
  15390. Confirmed=X
  15391. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotyq.html" target= blank>RBOT-YQ</a> WORM!
  15392. [ms windows process init]
  15393. Filename=MSWPI32.exe
  15394. Confirmed=X
  15395. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotasq.html" target=_blank>RBOT-ASQ</a> WORM!
  15396. [ms windows security updater]
  15397. Filename=updater.pif
  15398. Confirmed=X
  15399. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotaky.html" target=_blank>RBOT-AKY</a> WORM!
  15400. [ms windows update]
  15401. Filename=scguard.exe
  15402. Confirmed=X
  15403. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotyz.html" target= blank>RBOT-YZ</a> WORM!
  15404. [ms wins binary]
  15405. Filename=ign32.pif
  15406. Confirmed=X
  15407. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotasb.html" target=_blank>RBOT-ASB</a> WORM!
  15408. [ms-dos boot service]
  15409. Filename=Boot32.pif
  15410. Confirmed=X
  15411. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotamf.html" target=_blank>RBOT-AMF</a> WORM!
  15412. [ms-dos security service]
  15413. Filename=ms-dos.pif
  15414. Confirmed=X
  15415. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotamr.html" target=_blank>RBOT-AMR</a> WORM!
  15416. [ms-dos windows service]
  15417. Filename=MS-DOS.PIF
  15418. Confirmed=X
  15419. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotajw.html" target=_blank>RBOT-AJW</a> WORM!
  15420. [ms-html]
  15421. Filename=[random filename]
  15422. Confirmed=X
  15423. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=BKDR_LATINUS.15" target="_blank">LATINUS.15</a> TROJAN!
  15424. [ms-runkey]
  15425. Filename=arr.exe
  15426. Confirmed=X
  15427. Description=MS-Connect dialler/hijacker
  15428. [ms7531]
  15429. Filename=ms7531.exe
  15430. Confirmed=X
  15431. Description=Homepage hijacker
  15432. [msacm]
  15433. Filename=msacm.exe
  15434. Confirmed=X
  15435. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32opaservo.html" target="_blank">OPASERV-O</a> WORM!
  15436. [msadcheck]
  15437. Filename=msadcheck32.exe
  15438. Confirmed=X
  15439. Description=Browser hijacker, redirecting to search-system.com
  15440. [msadmin]
  15441. Filename=jdbgmrg.exe
  15442. Confirmed=X
  15443. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=TROJ_DASMIN.A" target="_blank">DASMIN.A</a> TROJAN! Note - this is not the valid JDBGMGR.EXE file - see <a href="http://vil.mcafee.com/dispVirus.asp?virus_k=99436" target="_blank">here</a>
  15444. [msagentxp]
  15445. Filename=MSAgentXP.exe
  15446. Confirmed=X
  15447. Description=Reported by <a href="http://www.ewido.net/en/" target=_blank>Ewido Security Suite</a> as TrojanDownloader.Reqlook.c
  15448. [msaim]
  15449. Filename=msaolim.exe
  15450. Confirmed=U
  15451. Description=<a href="http://www.symantec.com/avcenter/venc/data/spyware.messagespy.html" target= blank>MessageSpy</a> keystroke logger/monitoring program - remove unless you installed it yourself!
  15452. [msappts32]
  15453. Filename=msappts32.exe
  15454. Confirmed=X
  15455. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojelburroa.html" target=_blank>ELBURRO-A</a> TROJAN!
  15456. [msbackups]
  15457. Filename=backups.exe
  15458. Confirmed=X
  15459. Description=Added by <a href="http://www.sophos.com/virusinfo/analyses/trojbanloadtl.html" target=_blank>BANLOAD-TL</a> TROJAN!
  15460. [msbb]
  15461. Filename=msbb.exe
  15462. Confirmed=X
  15463. Description=Advertising spyware
  15464. [msbcs]
  15465. Filename=msbcs.exe
  15466. Confirmed=X
  15467. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojdadobrag.html" target=_blank>DADOBRA-G</a> TROJAN!
  15468. [msbootmgr.exe]
  15469. Filename=MsBootMgr.exe
  15470. Confirmed=X
  15471. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.verify.html" target=_blank>VERIFY</a> TROJAN!
  15472. [msbsc]
  15473. Filename=[path to trojan]
  15474. Confirmed=X
  15475. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojbankerdf.html" target=_blank>BANKER-DF</a> TROJAN!
  15476. [mschoexe]
  15477. Filename=suge.exe
  15478. Confirmed=X
  15479. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  15480. [msci]
  15481. Filename=mcinfo.exe
  15482. Confirmed=?
  15483. Description=McAfee Internet Security related. <font color="#FF0000">What does it do and is it required?</font>
  15484. [mscman]
  15485. Filename=mscman.exe
  15486. Confirmed=X
  15487. Description=<a href="http://research.sunbelt-software.com/threat_display.cfm?name=ClientMan&threatid=3754&search=ClientMan" target=_blank>ClientMan</a> parasite variant
  15488. [mscn]
  15489. Filename=mscn.exe
  15490. Confirmed=U
  15491. Description=Part of the SafeChildNet internet filtering program - required if you use it
  15492. [mscnt]
  15493. Filename=mscnt.exe
  15494. Confirmed=X
  15495. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojdlucac.html" target=_blank>DLUCA-C</a> TROJAN!
  15496. [mscolour]
  15497. Filename=mscolour.exe
  15498. Confirmed=X
  15499. Description=Added by the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?ID=40574" target=_blank>GEMA</a> TROJAN!
  15500. [mscommx]
  15501. Filename=mscommx.exe
  15502. Confirmed=X
  15503. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target="_blank">RBOT</a> WORM!
  15504. [msconfg32.exe]
  15505. Filename=MSCONFG32.EXE
  15506. Confirmed=X
  15507. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.optix.04.c.html" target="_blank">OPTIX.04.C</a> TROJAN!
  15508. [msconfig lptt01]
  15509. Filename=msconfig.exe
  15510. Confirmed=X
  15511. Description=<a href="http://www.wilderssecurity.net/specialinfo/rapidblaster.html" target="_blank">RapidBlaster</a> variant (in a "msconfig" folder in Program Files). Recommended you use RapidBlaster Killer to uninstall - see <a ref="http://www.wilderssecurity.net/specialinfo/rapidblaster.html#removal" target="_blank"> here</a>. Note - this is not the valid Windows Msconfig which has the same executable name
  15512. [msconfig manager]
  15513. Filename=msupdate.exe
  15514. Confirmed=X
  15515. Description=<a href="http://cwshredder.net/cwshredder/cwschronicles.html" target=_blank>CoolWebSearch</a> parasite variant
  15516. [msconfig ml097e]
  15517. Filename=msconfig.exe
  15518. Confirmed=X
  15519. Description=<a href="http://www.wilderssecurity.net/specialinfo/rapidblaster.html" target="_blank">RapidBlaster</a> variant (in a "msconfig" folder in Program Files). Recommended you use RapidBlaster Killer to uninstall - see <a ref="http://www.wilderssecurity.net/specialinfo/rapidblaster.html#removal" target="_blank"> here</a>. Note - this is not the valid Windows Msconfig which has the same executable name
  15520. [msconfig service]
  15521. Filename=MSupdate32.exe
  15522. Confirmed=X
  15523. Description=Added by a variant of the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.spybot.worm.html" target="_blank">SPYBOT</a> WORM!
  15524. [msconfig45]
  15525. Filename=MSConfig45.exe
  15526. Confirmed=X
  15527. Description=Added by the <a href="http://uk.trendmicro-europe.com/enterprise/security_info/ve_detail.php?id=56539&VName=BKDR_SDBOT.OJ" target="_blank">SDBOT.OJ</a> TROJAN!
  15528. [msconfigr]
  15529. Filename=jdbgmrg.exe
  15530. Confirmed=X
  15531. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=TROJ_DASMIN.C" target="_blank">DASMIN.C</a> TROJAN! Note - this is not the valid JDBGMGR.EXE file - see <a href="http://vil.mcafee.com/dispVirus.asp?virus_k=99436" target="_blank">here</a>
  15532. [msconfigreminder]
  15533. Filename=msconfig.exe
  15534. Confirmed=N
  15535. Description=Entry that appears when you uncheck an item in the MSConfig Startup group, and will disappear if on the next reboot you select the option to not be reminded that you are running in Selective Startup mode
  15536. [msconfigs]
  15537. Filename=MsConfigs.exe
  15538. Confirmed=X
  15539. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_ALCAN.A" target=_blank>ALCAN.A</a> WORM!
  15540. [mscontrol28]
  15541. Filename=crsss.exe
  15542. Confirmed=X
  15543. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_SPYBOT.AJX&VSect=P" target=_blank>SPYBOT.AJX</a> WORM!
  15544. [mscontrol31]
  15545. Filename=winnsyst.exe
  15546. Confirmed=X
  15547. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_RBOT.CFY&VSect=P" target=_blank>RBOT.CFY</a> WORM!
  15548. [mscontrol3d1]
  15549. Filename=isasse.exe
  15550. Confirmed=X
  15551. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_RBOT.CGU&VSect=P" target=_blank>RBOT.CGU</a> WORM!
  15552. [mscore]
  15553. Filename=syscnfg.exe
  15554. Confirmed=X
  15555. Description=Added by an unidentified VIRUS, WORM or TROJAN! "syscnfg.exe" is found in C:\windows\fonts (or C:\winnt\fonts) directory where no *.exe files should reside
  15556. [mscsgs]
  15557. Filename=MSCSGS.EXE
  15558. Confirmed=X
  15559. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.zezer.worm.html" target="_blank">ZEZER</a> WORM!
  15560. [mscsgs32]
  15561. Filename=MSCSGS32.EXE
  15562. Confirmed=X
  15563. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.zezer.worm.html" target="_blank">ZEZER</a> WORM!
  15564. [mscsvc.exe]
  15565. Filename=mscsvc.exe
  15566. Confirmed=X
  15567. Description=Added by the <a href="http://www.sarc.com/avcenter/venc/data/pwsteal.bancos.t.html" target= blank>BANCOS.T</a> TROJAN!
  15568. [msctrl32]
  15569. Filename=Msctrl32.scr
  15570. Confirmed=X
  15571. Description=Added by the <a href="http://www.symantec.com/avcenter/venc/data/w32.hllw.redist@mm.html" target="_blank">REDIST</a> WORM!
  15572. [mscvt]
  15573. Filename=MSCVT.exe
  15574. Confirmed=X
  15575. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.hllw.slideshow.html" target="_blank">SLIDESHOW</a> WORM!
  15576. [msdcom]
  15577. Filename=MSDcom.exe
  15578. Confirmed=X
  15579. Description=Added by a variant of the <a href="http://vil.nai.com/vil/content/v_100454.htm" target=_blank>SDBOT</a> WORM!
  15580. [msdirect.exe]
  15581. Filename=msdirect.exe
  15582. Confirmed=X
  15583. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojcertifl.html" target=_blank>CERTIF-L</a> TROJAN!
  15584. [msdll]
  15585. Filename=syscnfg.exe
  15586. Confirmed=X
  15587. Description=Added by an unidentified VIRUS, WORM or TROJAN! "syscnfg.exe" is found in C:\windows\fonts (or C:\winnt\fonts) directory where no *.exe files should reside
  15588. [msdmxm]
  15589. Filename=msdmxm.exe
  15590. Confirmed=X
  15591. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojdloaddc.html" target=_blank>DLOAD-DC</a> TROJAN!
  15592. [msdn]
  15593. Filename=nese.exe
  15594. Confirmed=X
  15595. Description=Added by the SDBOT.AHY WORM!
  15596. [msdn help]
  15597. Filename=msdn.exe
  15598. Confirmed=X
  15599. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_AGOBOT.AIB&VSect=P" target=_blank>AGOBOT.AIB</a> WORM!
  15600. [msdos security service]
  15601. Filename=msdos.pif
  15602. Confirmed=X
  15603. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotamp.html" target=_blank>RBOT-AMP</a> WORM!
  15604. [msdos service]
  15605. Filename=MSDOS.PIF
  15606. Confirmed=X
  15607. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotaiy.html" target=_blank>RBOT-AIY</a> WORM!
  15608. [msdos windows service]
  15609. Filename=MSDOS.PIF
  15610. Confirmed=X
  15611. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotakf.html" target=_blank>RBOT-AKF</a> WORM!
  15612. [msdos32]
  15613. Filename=Msdos32.pif
  15614. Confirmed=X
  15615. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.recory@mm.html" target="_blank">RECORY</a> WORM!
  15616. [msdos423]
  15617. Filename=msdos423.exe
  15618. Confirmed=X
  15619. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_MENACE.A" target="_blank">MENACE.A</a> WORM!
  15620. [msdosdrv]
  15621. Filename=msdosdrv.exe
  15622. Confirmed=N
  15623. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.bacros.html" target=_blank>BACROS</a> WORM!
  15624. [msdtc]
  15625. Filename=msdtc.exe
  15626. Confirmed=N
  15627. Description=MS Distributed Transaction Coordinator - handles transactions across multiple servers and is installed by MS Personal Web Server and MS SQL Server
  15628. [msemu32]
  15629. Filename=Msemu32.exe
  15630. Confirmed=X
  15631. Description=Unidentified spyware/adware/hijacker
  15632. [mservices.exe]
  15633. Filename=mservices.exe
  15634. Confirmed=X
  15635. Description=Added by the <a href="http://it.trendmicro-europe.com/smb/security_info/ve_detail.php?Vname=WORM_SDBOT.WJ" target=_blank>SDBOT.WJ</a> WORM!
  15636. [msfind]
  15637. Filename=Msfind.exe
  15638. Confirmed=X
  15639. Description=<a href="http://cwshredder.net/cwshredder/cwschronicles.html" target=_blank>CoolWebSearch</a> parasite variant
  15640. [msfind32]
  15641. Filename=msfind32.exe
  15642. Confirmed=X
  15643. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.hllw.cayam@mm.html" target="_blank">CAYAM</a> WORM!
  15644. [msfindosa.exe]
  15645. Filename=msfindosa.exe
  15646. Confirmed=X
  15647. Description=Added by the <a href="http://vil.nai.com/vil/content/v_99960.htm" target="_blank">DOWNLOADER-BS</a> TROJAN!
  15648. [msftp service config]
  15649. Filename=r3grun.exe
  15650. Confirmed=X
  15651. Description=Added by a variant of the <a href="http://vil.nai.com/vil/content/v_100454.htm" target=_blank>SDBOT</a> WORM!
  15652. [msfwavtsm]
  15653. Filename=FTPDev.exe
  15654. Confirmed=X
  15655. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotacf.html" target= blank>RBOT-ACF</a> WORM!
  15656. [msg fixage]
  15657. Filename=msgfixed.exe
  15658. Confirmed=X
  15659. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_SDBOT.ZD" target=_blank>SDBOT.ZD</a> WORM!
  15660. [msgapi]
  15661. Filename=[path to file]
  15662. Confirmed=X
  15663. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojdedlerd.html" target="_blank">DEDLER-D</a> TROJAN!
  15664. [msgb1]
  15665. Filename=msgb1.exe
  15666. Confirmed=X
  15667. Description=Added by the DLUCA.GEN TROJAN!
  15668. [msgcenterexe]
  15669. Filename=RealOneMessageCenter.exe
  15670. Confirmed=N
  15671. Description=RealNetworks <a href="http://www.real.com/" target=_blank>RealPlayer</a> related - disabling this application will not affect Real Player in any way
  15672. [msgex32]
  15673. Filename=msgex32.exe
  15674. Confirmed=X
  15675. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32appfleta.html" target=_blank>APPFLET-A</a> WORM!
  15676. [msgmgr]
  15677. Filename=[path to worm]
  15678. Confirmed=X
  15679. Description=Added by the <a href="http://www.symantec.com/avcenter/venc/data/w32.babybear@mm.html" target="_blank">BABYBEAR</a> WORM!
  15680. [msgserv_]
  15681. Filename=Syss.exe
  15682. Confirmed=X
  15683. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/fanta.trojan.html" target=_blank>FANTA</a> TROJAN!
  15684. [msgsm32]
  15685. Filename=msgsm32.exe
  15686. Confirmed=X
  15687. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotasg.html" target=_blank>RBOT-ASG</a> WORM!
  15688. [msgsrv16]
  15689. Filename=Msgsrv16.exe
  15690. Confirmed=X
  15691. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.delf.family.html" target="_blank">DELF</a> family of TROJANS!
  15692. [msgsrv32.exe]
  15693. Filename=msgsrv32.exe
  15694. Confirmed=Y
  15695. Description=Windows 32-bit VxD Message Server. For more information on its function and why it's needed, see <a href="http://support.microsoft.com/support/kb/articles/q138/7/08.asp" target="_blank">here</a>. Note - why some people have it listed in start-up programs I don't know but I was asked to include it here. It automatically runs in the background
  15696. [msgsvcmgr32]
  15697. Filename=cmdzxdll.exe
  15698. Confirmed=X
  15699. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotaek.html" target=_blank>RBOT-AEK</a> WORM!
  15700. [msgsvr32]
  15701. Filename=msgsvr32.exe
  15702. Confirmed=X
  15703. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.hllw.deadhat.b.html" target="_blank">DEADHAT.B</a> WORM! Note - not to be confused with the valid "msgsrv32.exe" file which resides in the same directory (C:\Windows\System) on a Win9x/Me machine
  15704. [msgtag]
  15705. Filename=MSGTAG.exe
  15706. Confirmed=U
  15707. Description=<a href="http://www.msgtag.com/home/" target=_blank>MSGTAG</a> is an application that tells you when your emails have been received and opened
  15708. [msgtray]
  15709. Filename=sys16.exe
  15710. Confirmed=X
  15711. Description=Added by an unknown VIRUS!
  15712. [mshelp32]
  15713. Filename=mshelp32.exe
  15714. Confirmed=X
  15715. Description=<a href="http://cwshredder.net/cwshredder/cwschronicles.html" target=_blank>CoolWebSearch</a> parasite variant
  15716. [msht@]
  15717. Filename=MSHT@.EXE
  15718. Confirmed=X
  15719. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=PE_MAGISTR.A" target="_blank">MAGISTR.A</a> VIRUS!
  15720. [msident]
  15721. Filename=msident.exe
  15722. Confirmed=X
  15723. Description=Unidentified adware or trojan
  15724. [msidle]
  15725. Filename=msidle.exe
  15726. Confirmed=X
  15727. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32opaservo.html" target="_blank">OPASERV-O</a> WORM!
  15728. [msidle32.exe]
  15729. Filename=MsIdle32.exe
  15730. Confirmed=X
  15731. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.verify.html" target=_blank>VERIFY</a> TROJAN!
  15732. [msidll]
  15733. Filename=winmp.exe
  15734. Confirmed=X
  15735. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  15736. [msiew]
  15737. Filename=mseiw.exe
  15738. Confirmed=X
  15739. Description=Added by the <a href="http://www.symantec.com/avcenter/venc/data/trojan.littlog.html" target=_blank>LITTLOG</a> TROJAN!
  15740. [msimn32]
  15741. Filename=MSIMN32.EXE
  15742. Confirmed=X
  15743. Description=Hijacker - recognized by <a href="http://www.kaspersky.com/personalpro" target=_blank>Kaspersky</a> antivirus as Trojan.Agent.cx
  15744. [msin]
  15745. Filename=MSin.exe
  15746. Confirmed=?
  15747. Description=<font color="#FF0000">??</font>
  15748. [msinet]
  15749. Filename=Msinet.exe
  15750. Confirmed=X
  15751. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotaoa.html" target=_blank>RBOT-AOA</a> WORM!
  15752. [msinstall]
  15753. Filename=smvss.exe
  15754. Confirmed=X
  15755. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojdedlerg.html" target=_blank>DEDLER-G</a> TROJAN!
  15756. [msjava service]
  15757. Filename=xpcd.exe
  15758. Confirmed=X
  15759. Description=Added by the <a href="http://de.trendmicro-europe.com/consumer/security_info/ve_detail.php?VName=WORM_SDBOT.VM&VSect=T" target="_blank">SDBOT.VM</a> WORM!
  15760. [mskagentexe]
  15761. Filename=MskAgent.exe
  15762. Confirmed=U
  15763. Description=Part of <a href="http://us.mcafee.com/root/package.asp?pkgid=156" target="_blank">McAfee Spamkiller</a>
  15764. [mskces32]
  15765. Filename=[random filename]
  15766. Confirmed=X
  15767. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.irc.cloner.html" target="_blank">CLONER</a> TROJAN!
  15768. [mskdetectorexe]
  15769. Filename=MSKDetct.exe
  15770. Confirmed=U
  15771. Description=Part of <a href="http://us.mcafee.com/root/package.asp?pkgid=156" target="_blank">McAfee Spamkiller</a>
  15772. [mskexe]
  15773. Filename=spamkiller.exe
  15774. Confirmed=U
  15775. Description=McAfee <a href="http://us.mcafee.com/root/PkgPricePlan.asp?pkgid=123&ACTION=BUY&cid=5177" target="_blank"> SpamKiller</a>
  15776. [mskj]
  15777. Filename=mskj.exe
  15778. Confirmed=X
  15779. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/trojan.kaemon.html" target=_blank>KAEMON</a> TROJAN!
  15780. [mskserverexe]
  15781. Filename=MSKSrvr.exe
  15782. Confirmed=U
  15783. Description=Part of McAfee <a href="http://us.mcafee.com/root/package.asp?pkgid=156" target=_blank>Spamkiller</a>
  15784. [mslagent]
  15785. Filename=mslagent.exe
  15786. Confirmed=X
  15787. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojwintrimf.html" target=_blank>WINTRIM-F</a> TROJAN!
  15788. [mslarissa]
  15789. Filename=MSLARISSA.pif
  15790. Confirmed=X
  15791. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.assiral.b@mm.html" target=_blank>ASSIRAL.B</a> WORM!
  15792. [mslib32]
  15793. Filename=mswatch32.exe
  15794. Confirmed=?
  15795. Description=<font color="#FF0000">??</font>
  15796. [mslog]
  15797. Filename=MicrosoftLog.exe
  15798. Confirmed=X
  15799. Description=Added by a variant of the <a href="http://vil.nai.com/vil/content/v_100454.htm" target=_blank>SDBOT</a> WORM!
  15800. [mslogon lptt01]
  15801. Filename=mslogon.exe
  15802. Confirmed=X
  15803. Description=<a href="http://www.wilderssecurity.net/specialinfo/rapidblaster.html" target="_blank">RapidBlaster</a> variant (in a "Mslogon" folder in Program Files). Recommended you use RapidBlaster Killer to uninstall - see <a ref="http://www.wilderssecurity.net/specialinfo/rapidblaster.html#removal" target="_blank"> here</a>
  15804. [mslogon ml097e]
  15805. Filename=mslogon.exe
  15806. Confirmed=X
  15807. Description=<a href="http://www.wilderssecurity.net/specialinfo/rapidblaster.html" target="_blank">RapidBlaster</a> variant (in a "Mslogon" folder in Program Files). Recommended you use RapidBlaster Killer to uninstall - see <a ref="http://www.wilderssecurity.net/specialinfo/rapidblaster.html#removal" target="_blank"> here</a>
  15808. [msmanager]
  15809. Filename=msmgr32.exe
  15810. Confirmed=X
  15811. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.yaha.af@mm.html" target="_blank">YAHA.AF</a> WORM!
  15812. [msmanager32]
  15813. Filename=msmngr32.exe
  15814. Confirmed=X
  15815. Description=Added by the <a href="http://www.us.sophos.com/virusinfo/analyses/w32randonr.html" target="_blank">RANDON-R</a> (or <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=BKDR_WOMANIZ.A" target="_blank">WOMANIZ.A</a>) WORM!
  15816. [msmautoprotect]
  15817. Filename=msmssgs.exe
  15818. Confirmed=X
  15819. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojbifroseaj.html" target= blank>BIFROSE-AJ</a> TROJAN!
  15820. [msmcafeee]
  15821. Filename=Avsynmgr32e.exe
  15822. Confirmed=X
  15823. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/trojan.framar.html" target="_blank">FRAMAR</a> TROJAN!
  15824. [msmcafeeh]
  15825. Filename=Avsynmgr32h.exe
  15826. Confirmed=X
  15827. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.frango.html" target="_blank">FRANGO</a> TROJAN!
  15828. [msmcafees]
  15829. Filename=Avsynmgr32S.exe
  15830. Confirmed=X
  15831. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.volac.html" target="_blank">VOLAC</a> or <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.volac.dr.html" target="_blank">VOLAC.DR</a> TROJANS!
  15832. [msmessnger]
  15833. Filename=msnupd.exe
  15834. Confirmed=X
  15835. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotady.html" target=_blank>RBOT-ADY</a> WORM!
  15836. [msmgt]
  15837. Filename=msmgt.exe
  15838. Confirmed=X
  15839. Description=<a href="http://www.totalvelocity.com/" target="_blank">Total Velocity</a> adware/hijacker
  15840. [msmntgnt]
  15841. Filename=MSMNTGNT.EXE
  15842. Confirmed=X
  15843. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojbankerie.html" target=_blank>BANKER-IE</a> TROJAN!
  15844. [msmntjbe]
  15845. Filename=MSMNTJBE.EXE
  15846. Confirmed=X
  15847. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojbancosef.html" target=_blank>Bancos-EF</a> TROJAN!
  15848. [msmntjng]
  15849. Filename=MSMNTJNG.EXE
  15850. Confirmed=X
  15851. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojgraberg.html" target=_blank>GRABER-G</a> TROJAN!
  15852. [msmntmts]
  15853. Filename=MSMNTMTS.EXE
  15854. Confirmed=X
  15855. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojbankergz.html" target=_blank>BANKER-GZ</a> TROJAN!
  15856. [msmon]
  15857. Filename=msmon.exe
  15858. Confirmed=X
  15859. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=40493" target=_blank>GEMA.D</a> TROJAN!
  15860. [msmovies]
  15861. Filename=MsMovies.exe
  15862. Confirmed=X
  15863. Description=Malware - detected by <a href="http://www.kaspersky.com/personalpro" target=_blank>Kaspersky</a> antivirus as Trojan-Dropper.Win32.WinAD.h
  15864. [msmqintcert]
  15865. Filename=regsvr32 /s mqrt.dll
  15866. Confirmed=?
  15867. Description=Microsoft Message Queue Server - Internal Certificate - see <a href="http://www.microsoft.com/msmq/" target="_blank">here</a> for more info and <a href="http://support.microsoft.com/default.aspx?scid=kb;en-us;230050" target="_blank">here</a> for a potential problem.<font color="#FF0000"> Is it required?</font>
  15868. [msmsgr]
  15869. Filename=msmsgss.exe
  15870. Confirmed=X
  15871. Description=Reported by Kaspersky Anti-Virus as RBOT.AJJ
  15872. [msmsgsrv]
  15873. Filename=msmsgsrv.exe
  15874. Confirmed=X
  15875. Description=Added by the <a href="http://vil.nai.com/vil/content/v 132938.htm" target= blank>CQO</a> TROJAN!
  15876. [msmsgsvc]
  15877. Filename=MSMSGSVC.exe
  15878. Confirmed=X
  15879. Description=Browser hijacker, identified by some antiviruses as a variant of the StartPage.QC TROJAN!
  15880. [msmsngr]
  15881. Filename=msmsngr.exe
  15882. Confirmed=X
  15883. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32dopbotb.html" target=_blank>DOPBOT-B</a> WORM!
  15884. [msn 9.0 plus]
  15885. Filename=[random letters].exe
  15886. Confirmed=X
  15887. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotaly.html" target=_blank>RBOT-ALY</a> WORM!
  15888. [msn administration for windows]
  15889. Filename=msnadp32.exe
  15890. Confirmed=X
  15891. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_BROPIA.W&VSect=P" target=_blank>BROPIA.W</a> WORM!
  15892. [msn ang]
  15893. Filename=cssrss.exe
  15894. Confirmed=X
  15895. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32forbotce.html" target=_blank>FORBOT-CE</a> WORM!
  15896. [msn beta]
  15897. Filename=service.exe
  15898. Confirmed=X
  15899. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_RBOT.AUU&VSect=P" target=_blank>RBOT.AUU</a> WORM!
  15900. [msn config]
  15901. Filename=msngf.exe
  15902. Confirmed=X
  15903. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotqg.html" target=_blank>RBOT-QG</a> WORM!
  15904. [msn configuration loader]
  15905. Filename=msngms.exe
  15906. Confirmed=X
  15907. Description=Added by the <a href="http://www.symantec.com/avcenter/venc/data/w32.kelvir.t.html" target=_blank>KELVIR.T</a> WORM!
  15908. [msn funny images]
  15909. Filename=imsngsr.exe
  15910. Confirmed=X
  15911. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32agobottt.html" target=_blank>AGOBOT-TT</a> WORM!
  15912. [msn internet access]
  15913. Filename=trayclnt.exe
  15914. Confirmed=N
  15915. Description=Quick way to connect to MSN internet service - replaces "MSN Quick View" from V5.6 onwards
  15916. [msn message background loader]
  15917. Filename=msnmesg.exe
  15918. Confirmed=X
  15919. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  15920. [msn messages]
  15921. Filename=msnmesg.exe
  15922. Confirmed=X
  15923. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotacn.html" target=_blank>RBOT-ACN</a> WORM!
  15924. [msn messanger]
  15925. Filename=msnmsng.exe
  15926. Confirmed=X
  15927. Description=Added by the <a href="http://uk.trendmicro-europe.com/enterprise/security_info/ve_detail.php?Vname=WORM_SDBOT.XN" target="_blank">SDBOT.XN</a> WORM!
  15928. [msn messeng]
  15929. Filename=windns.exe
  15930. Confirmed=X
  15931. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  15932. [msn messenge]
  15933. Filename=IExplorer.exe
  15934. Confirmed=X
  15935. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojdelfll.html" target=_blank>DELF-LL</a> TROJAN!
  15936. [msn messenger 32]
  15937. Filename=msniu.exe
  15938. Confirmed=X
  15939. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotawb.html" target=_blank>RBOT-AWB</a> WORM!
  15940. [msn messenger 323]
  15941. Filename=msniu3.exe
  15942. Confirmed=X
  15943. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotaxb.html" target=_blank>RBOT-AXB</a> WORM!
  15944. [msn messenger 6.2]
  15945. Filename=tyd.exe
  15946. Confirmed=X
  15947. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  15948. [msn messenger service]
  15949. Filename=mssgs.exe
  15950. Confirmed=X
  15951. Description=Added by an unidentified TROJAN! Note - this is not the real MSN Messenger, see this <a href="http://forums.techguy.org/showthread.php?s=&threadid=109054" target="_blank">thread</a>
  15952. [msn messenger service starter]
  15953. Filename=msnmgsr.exe
  15954. Confirmed=X
  15955. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotaos.html" target=_blank>RBOT-AOS</a> WORM!
  15956. [msn messenger update]
  15957. Filename=msnupdate.exe
  15958. Confirmed=X
  15959. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target= blank>RBOT</a> WORM!
  15960. [msn messenger user controls]
  15961. Filename=msmsgr.exe
  15962. Confirmed=X
  15963. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.kelvir.hi.html" target=_blank>KELVIR.HI</a> WORM!
  15964. [msn messengers]
  15965. Filename=MSNMSGR.EXE
  15966. Confirmed=X
  15967. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_RBOT.KX&VSect=T" target="_blank">RBOT.KX</a> WORM!
  15968. [msn mmissenger]
  15969. Filename=mssmmspgr.exe
  15970. Confirmed=X
  15971. Description=Added by the <a href="http://www.symantec.com/avcenter/venc/data/w32.kelvir.aj.html" target=_blank>KELVIR.AJ</a> WORM!
  15972. [msn patch]
  15973. Filename=msndp.exe
  15974. Confirmed=X
  15975. Description=Added by the <a href="http://uk.trendmicro-europe.com/smb/security_info/ve_detail.php?Vname=WORM_RBOT.AAI" target=_blank>RBOT.AAI</a> WORM!
  15976. [msn patches]
  15977. Filename=msndr.exe
  15978. Confirmed=X
  15979. Description=Added by a variant of the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=BKDR_SDBOT.GEN" target=_blank>SDBOT</a> WORM!
  15980. [msn plus updater]
  15981. Filename=msnplus.exe
  15982. Confirmed=X
  15983. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotmu.html" target=_blank>RBOT-MU</a> WORM!
  15984. [msn processe manager]
  15985. Filename=msni32.exe
  15986. Confirmed=X
  15987. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotadx.html" target=_blank>RBOT-ADX</a> WORM!
  15988. [msn quick view]
  15989. Filename=Msndc.exe
  15990. Confirmed=N
  15991. Description=Quick way to connect to MSN internet service
  15992. [msn registry loader]
  15993. Filename=msmnwin.exe
  15994. Confirmed=X
  15995. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.kelvir.fk.html" target=_blank>KELVIR.FK</a> WORM!
  15996. [msn service updates]
  15997. Filename=winproc.exe
  15998. Confirmed=X
  15999. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32kelvirbb.html" target=_blank>KELVIR-BB</a> WORM!
  16000. [msn service utilities]
  16001. Filename=nkn.exe
  16002. Confirmed=X
  16003. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32kelvirbc.html" target=_blank>KELVIR-BC</a> WORM!
  16004. [msn start]
  16005. Filename=msnmsgr7.exe
  16006. Confirmed=X
  16007. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotph.html" target=_blank>RBOT-PH</a> WORM!
  16008. [msn update manager (sp2)]
  16009. Filename=MSMSGS.EXE
  16010. Confirmed=X
  16011. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32agobotnl.html" target=_blank>AGOBOT-NL</a> WORM!
  16012. [msn update service]
  16013. Filename=userx.exe
  16014. Confirmed=X
  16015. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.mytob.jf@mm.html" target=_blank>MYTOB.JF</a> WORM!
  16016. [msn updaters]
  16017. Filename=virtualmemory.exe
  16018. Confirmed=X
  16019. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotjk.html" target="_blank">RBOT-JK</a> WORM!
  16020. [msn.exe]
  16021. Filename=son.exe
  16022. Confirmed=X
  16023. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojstartpags.html" target=_blank>STARTPA-GS</a> TROJAN!
  16024. [msn32 x service]
  16025. Filename=MSN32x.EXE
  16026. Confirmed=X
  16027. Description=Added by an unidentified WORM!
  16028. [msn8m startup]
  16029. Filename=msn8m.exe
  16030. Confirmed=X
  16031. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  16032. [msnager32]
  16033. Filename=svchostt.exe
  16034. Confirmed=X
  16035. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=BKDR_WOMANIZ.E&VSect=P" target=_blank>WOMANIZ.E</a> TROJAN!
  16036. [msnappau]
  16037. Filename=msnappau.exe
  16038. Confirmed=N
  16039. Description=Updater for the MSN toolbar that can be downloaded onto IE. Calls home every day or so to "update" the toolbar
  16040. [msnarrator]
  16041. Filename=msnarrator.exe
  16042. Confirmed=X
  16043. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=TROJ_NARAT.A" target="_blank">NARAT.A</a> TROJAN! - also identified as <a href="http://securityresponse.symantec.com/avcenter/venc/data/adware.mpgcom.html" target="_blank">MPGCOM Toolbar</a> adware
  16044. [msnavwh]
  16045. Filename=MSWkwrH.exe
  16046. Confirmed=X
  16047. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32anava.html" target= blank>ANAV-A</a> WORM!
  16048. [msndrvsys]
  16049. Filename=msndrvsys.exe
  16050. Confirmed=X
  16051. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojbroggerd.html" target=_blank>BROGGER-D</a> TROJAN!
  16052. [msnet]
  16053. Filename=msnet.exe
  16054. Confirmed=X
  16055. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/trojan.boa.html" target="_blank">BOA</a> WORM!
  16056. [msnfixer]
  16057. Filename=msnfixjs.js
  16058. Confirmed=?
  16059. Description=<font color="#FF0000">Located in the HPbinmsnfix directory of a HP PC</font>
  16060. [msngrabber]
  16061. Filename=MSNgrabber.exe
  16062. Confirmed=X
  16063. Description=Added by the <a href="http://www.symantec.com/avcenter/venc/data/w32.envid.a@mm.html" target=_blank>ENVID.A</a> WORM!
  16064. [msngta32]
  16065. Filename=msngta32.exe
  16066. Confirmed=X
  16067. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  16068. [msnia]
  16069. Filename=MSNIASVC.EXE
  16070. Confirmed=N
  16071. Description=Added with MSN version 9. Resets certain internet settings upon bootup and can't be disabled via MSCONFIG
  16072. [msnload32.exe]
  16073. Filename=msnload32.exe
  16074. Confirmed=X
  16075. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/pwsteal.bancos.m.html" target="_blank">BANCOS.M</a> TROJAN!
  16076. [msnmesenger]
  16077. Filename=Main.exe
  16078. Confirmed=X
  16079. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.prorat.html" target="_blank">PRORAT</a> TROJAN!
  16080. [msnmsg.exe]
  16081. Filename=mscmd32.exe
  16082. Confirmed=X
  16083. Description=Added by a variant of the AGENT.AH TROJAN!
  16084. [msnmsgq32]
  16085. Filename=msnmsgq.exe
  16086. Confirmed=X
  16087. Description=Added by the <a href="http://vic.zonelabs.com/tmpl/body/CA/virusDetails.jsp?VId=42022" target= blank>TACTSLAY.H</a> TROJAN!
  16088. [msnmsgr32-.exe]
  16089. Filename=msnmsgr-.exe
  16090. Confirmed=X
  16091. Description=Added by a variant of the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.spybot.worm.html" target="_blank">SPYBOT</a> WORM!
  16092. [msnmsgr5]
  16093. Filename=MSNMSGR5.exe
  16094. Confirmed=X
  16095. Description=Added by the <a href="http://uk.trendmicro-europe.com/enterprise/security_info/virus_encyclopedia.php?s=1&VName=WORM_RBOT.PQ" target="_blank">RBOT.PQ</a> WORM!
  16096. [msnmsgre]
  16097. Filename=swef.bat
  16098. Confirmed=X
  16099. Description=IRC backdoor TROJAN or WORM!
  16100. [msnmsgrr]
  16101. Filename=swin.bat
  16102. Confirmed=X
  16103. Description=IRC backdoor TROJAN or WORM!
  16104. [msnmsgrs1]
  16105. Filename=swed.bat
  16106. Confirmed=X
  16107. Description=IRC backdoor TROJAN or WORM!
  16108. [msnmsgs.exe]
  16109. Filename=msnmsgs.exe
  16110. Confirmed=X
  16111. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojbankerhk.html" target=_blank>BANKER-HK</a> TROJAN! Note - not to be confused with msmsgs.exe, the well known MSN Instant Messaging application!
  16112. [msnmsgsgs]
  16113. Filename=msnmsgsgs.exe
  16114. Confirmed=X
  16115. Description=Added by the "Catal" alias Spy.Delitall.B backdoor TROJAN!
  16116. [msnpluginsrivcs]
  16117. Filename=n3vasap23.exe
  16118. Confirmed=X
  16119. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  16120. [msnsched2]
  16121. Filename=msnsched2.exe
  16122. Confirmed=X
  16123. Description=Added by the <a href="http://www.symantec.com/avcenter/venc/data/w32.spybot.nnt.html" target=_blank>SPYBOT.NNT</a> WORM!
  16124. [msnservice]
  16125. Filename=MSNService.exe
  16126. Confirmed=X
  16127. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.hllw.carpet.c.html" target="_blank">CARPET.C</a> WORM!
  16128. [msnsgs]
  16129. Filename=msnsgs.exe
  16130. Confirmed=X
  16131. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojcheukob.html" target=_blank>CHEUKO-B</a> TROJAN!
  16132. [msnshed]
  16133. Filename=msnshed.exe
  16134. Confirmed=X
  16135. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotyn.html" target= blank>RBOT-YN</a> WORM!
  16136. [msnsysrestore]
  16137. Filename=pc32.exe
  16138. Confirmed=X
  16139. Description=Added by a variant of the MASTAK VIRUS!
  16140. [msntoolbaar]
  16141. Filename=msnmsgesc.exe
  16142. Confirmed=X
  16143. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_RBOT.BMF&VSect=P" target=_blank>RBOT.BMF</a> WORM!
  16144. [msobject32]
  16145. Filename=MSObject32.js
  16146. Confirmed=X
  16147. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/js.pun.trojan.html" target="_blank">PUN</a> TROJAN!
  16148. [msoffice32]
  16149. Filename=msjcf.exe
  16150. Confirmed=X
  16151. Description=Added by the <a href="http://www.us.sophos.com/virusinfo/analyses/trojrakera.html" target=_blank>RAKER-A</a> TROJAN!
  16152. [msoffwz]
  16153. Filename=msoffwz.EXE
  16154. Confirmed=X
  16155. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojbancbanhq.html" target=_blank>BANCBAN-HQ</a> TROJAN!
  16156. [msoleath32]
  16157. Filename=winss.exe
  16158. Confirmed=X
  16159. Description=Added by the <a href="http://vil.nai.com/vil/content/v_100491.htm" target=_blank>KATHER</a> TROJAN!
  16160. [msoobd]
  16161. Filename=MSOOBD.EXE
  16162. Confirmed=X
  16163. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=PE_MAGISTR.A" target="_blank">MAGISTR.A</a> VIRUS!
  16164. [mspaint.exe]
  16165. Filename=check32.exe
  16166. Confirmed=X
  16167. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojagentah.html" target=_blank>AGENT.AH</a> TROJAN!
  16168. [mspatch69]
  16169. Filename=[path to trojan]
  16170. Confirmed=X
  16171. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.mprox.html" target="_blank">MPROX</a> TROJAN!
  16172. [mspatch89]
  16173. Filename=cnqmax.exe
  16174. Confirmed=X
  16175. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.randex.p.html" target="_blank">RANDEX.P</a> WORM!
  16176. [msping]
  16177. Filename=msping.exe
  16178. Confirmed=X
  16179. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/trojan.floodblack.html" target=_blank>FLOODBLACK</a> TROJAN!
  16180. [msping.exe]
  16181. Filename=msping.exe
  16182. Confirmed=X
  16183. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojbdoormz.html" target=_blank>MZ</a> TROJAN!
  16184. [mspluginsrvc]
  16185. Filename=p3.exe
  16186. Confirmed=X
  16187. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotwv.html" target= blank>RBOT-WV</a> WORM!
  16188. [msplus]
  16189. Filename=msplus32.exe
  16190. Confirmed=X
  16191. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32mytobam.html" target=_blank>MYTOB-AM</a> or <a href="http://www.sophos.com/virusinfo/analyses/w32mytobcl.html" target=_blank>MYTOB-CL</a> WORMS!
  16192. [mspp system update 64]
  16193. Filename=wiaadmgr.exe
  16194. Confirmed=X
  16195. Description=Reported by Kaspersky Anti-Virus as the RANKY.GEN TROJAN!
  16196. [mspqfile]
  16197. Filename=MSA****.TMP
  16198. Confirmed=X
  16199. Description=Homepage hijacker. See <a href="http://www.spywareinfo.com/yabbse/index.php?board=11;action=display;threadid=776;start=10" target="_blank">here</a> for more information. **** can be anything
  16200. [msprotect.exe]
  16201. Filename=MSprotect.exe
  16202. Confirmed=X
  16203. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=PE_DABYREV.A" target="_blank">DABYREV.A</a> VIRUS!
  16204. [mspy2002]
  16205. Filename=ImScInst.exe
  16206. Confirmed=N
  16207. Description=Part of Microsoft's Input Message Editor (IME) for translating Japanese/Chinese text in IE, Outlook and Word
  16208. [msr]
  16209. Filename=msr.exe
  16210. Confirmed=X
  16211. Description=Added by the <a href="http://uk.trendmicro-europe.com/enterprise/security_info/ve_detail.php?Vname=WORM_AGOBOT.RT" target=_blank>AGOBOT.RT</a> WORM!
  16212. [msrc]
  16213. Filename=Msrc.exe
  16214. Confirmed=X
  16215. Description=Added by the KRYPTONIC GHOST TROJAN!
  16216. [msreg.exe]
  16217. Filename=msrege.exe
  16218. Confirmed=X
  16219. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.zinx.html" target="_blank">ZINX</a> TROJAN!
  16220. [msreg32 loader]
  16221. Filename=msreg32.exe
  16222. Confirmed=X
  16223. Description=Added by the <a href="http://uk.trendmicro-europe.com/enterprise/security_info/ve_detail.php?VName=WORM_AGOBOT.IU&VSect=T" target=_blank>AGOBOT.IU</a> WORM!
  16224. [msregit]
  16225. Filename=Msgp.exe
  16226. Confirmed=X
  16227. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=BKDR_KRYPGHOS.13" target="_blank">KRYPGHOS.13</a> TROJAN!
  16228. [msregsvc]
  16229. Filename=regsvc32.exe
  16230. Confirmed=X
  16231. Description=Homepage hijacker that changes your homepage to an adult content site
  16232. [msresear]
  16233. Filename=[path to trojan]
  16234. Confirmed=X
  16235. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojweasywb.html" target=_blank>WEASYW-B</a> TROJAN!
  16236. [msrundll]
  16237. Filename=msrund1l32.exe
  16238. Confirmed=X
  16239. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.binghe.html" target=_blank>BINGHE</a> TROJAN!
  16240. [msrunocx32]
  16241. Filename=msrunocx32.exe
  16242. Confirmed=X
  16243. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.hllw.skus.html" target="_blank">SKUS</a> WORM!
  16244. [msscdl]
  16245. Filename=MSSCDLL.exe
  16246. Confirmed=U
  16247. Description=<a href="http://www.symantec.com/avcenter/venc/data/spyware.spycapture.html" target= blank>SpyCapture</a> keystroke logger/monitoring program - remove unless you installed it yourself!
  16248. [msserv]
  16249. Filename=msserv.exe
  16250. Confirmed=X
  16251. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojblackloga.html" target=_blank>BLACKLOG-A</a> TROJAN!
  16252. [msserv32]
  16253. Filename=msserv32.exe
  16254. Confirmed=X
  16255. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotack.html" target= blank>RBOT-ACK</a> WORM!
  16256. [msservice]
  16257. Filename=msserv.exe
  16258. Confirmed=X
  16259. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.hyd@mm.html" target="_blank">HYD</a> WORM!
  16260. [mssfos]
  16261. Filename=sfool.exe
  16262. Confirmed=X
  16263. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.randex.eus.html" target=_blank>RANDEX.EUS</a> WORM!
  16264. [mssgisg]
  16265. Filename=[path to file]
  16266. Confirmed=X
  16267. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.ranky.n.html" target=_blank>RANKY.N</a> TROJAN!
  16268. [msshow]
  16269. Filename=MSShow.exe
  16270. Confirmed=X
  16271. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojqqrobm.html" target=_blank>QQROB-M</a> TROJAN!
  16272. [msshvc]
  16273. Filename=MSSHVC.exe
  16274. Confirmed=X
  16275. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.nuffy.a.html" target="_blank">NUFFY.A</a> WORM!
  16276. [mssoul]
  16277. Filename=msmscc2.exe
  16278. Confirmed=X
  16279. Description=Added by the DAPIZL.A banker WORM! (A "banker worm" is designed to pillage banking information and send it back to the perpetrators!)
  16280. [mssp3]
  16281. Filename=mssp22.exe
  16282. Confirmed=X
  16283. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojibankd.html" target=_blank>IBANK-D</a> TROJAN!
  16284. [mssql]
  16285. Filename=Mssql.exe
  16286. Confirmed=X
  16287. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.sdbot.html" target="_blank">SDBOT</a> TROJAN!
  16288. [msstart]
  16289. Filename=msstart.exe
  16290. Confirmed=X
  16291. Description=Added by the <a href="http://it.trendmicro-europe.com/enterprise/security_info/ve_detail.php?Vname=BKDR_LIVUP.C" target="_blank">LIVUP.C</a> TROJAN!
  16292. [msstask]
  16293. Filename=msstask.exe
  16294. Confirmed=X
  16295. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.myparty@mm.html" target="_blank">MYPARTY</a> WORM!
  16296. [mssurfer lptt01]
  16297. Filename=mssurfer.exe
  16298. Confirmed=X
  16299. Description=<a href="http://www.wilderssecurity.net/specialinfo/rapidblaster.html" target="_blank">RapidBlaster</a> variant (in a "surfer" folder in Program Files). Recommended you use RapidBlaster Killer to uninstall - see <a ref="http://www.wilderssecurity.net/specialinfo/rapidblaster.html#removal" target="_blank"> here</a>
  16300. [mssurfer ml097e]
  16301. Filename=mssurfer.exe
  16302. Confirmed=X
  16303. Description=<a href="http://www.wilderssecurity.net/specialinfo/rapidblaster.html" target="_blank">RapidBlaster</a> variant (in a "surfer" folder in Program Files). Recommended you use RapidBlaster Killer to uninstall - see <a ref="http://www.wilderssecurity.net/specialinfo/rapidblaster.html#removal" target="_blank"> here</a>
  16304. [mssvc.exe]
  16305. Filename=MSSVC.EXE
  16306. Confirmed=Y
  16307. Description=<a href="http://www.stealthdisk.com/" target="_blank">Stealthdisk</a> - hides folders, files and applications. Will also encrypt them for better protection
  16308. [mssvc32]
  16309. Filename=mssvc32.exe
  16310. Confirmed=X
  16311. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32agobotme.html" target=_blank>AGOBOT-ME</a> WORM!
  16312. [mssys]
  16313. Filename=mssys.exe
  16314. Confirmed=X
  16315. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/trojan.myss.b.html" target="_blank">MYSS.B</a> TROJAN!
  16316. [mssyslanhelper]
  16317. Filename=msmsgri32.exe
  16318. Confirmed=X
  16319. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.randex.d.html" target="_blank">RANDEX.D</a> WORM!
  16320. [mstapi]
  16321. Filename=Mstapi.exe
  16322. Confirmed=X
  16323. Description=Keylogger trojan
  16324. [mstaskbar 32]
  16325. Filename=tbsvc32.exe
  16326. Confirmed=X
  16327. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_RBOT.BQZ&VSect=P" target=_blank>RBOT.BQZ</a> WORM!
  16328. [mstasks]
  16329. Filename=mstasks.exe
  16330. Confirmed=X
  16331. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojmultidray.html" target=_blank>MULTIDR-AY</a> TROJAN!
  16332. [mstcgww]
  16333. Filename=MSTCGWW.EXE
  16334. Confirmed=?
  16335. Description=<font color="#FF0000">??</font>
  16336. [mstmon_n]
  16337. Filename=MSTMON_N.EXE
  16338. Confirmed=N
  16339. Description=Generates an error message on startup if a Konica Minolta printer is not turned on and ready
  16340. [mstmon_q]
  16341. Filename=MSTMON_Q.exe
  16342. Confirmed=N
  16343. Description=Generates an error message on startup if the Konica Minolta PagePro 1350W printer is not turned on and ready
  16344. [mstng32]
  16345. Filename=MSTng32.exe
  16346. Confirmed=X
  16347. Description=Added by the <a href="http://www.symantec.com/avcenter/venc/data/w32.hllw.tang@mm.html" target="_blank">TANG</a> WORM!
  16348. [msupdate.exe]
  16349. Filename=N/A
  16350. Confirmed=X
  16351. Description=<a href="http://cwshredder.net/cwshredder/cwschronicles.html" target=_blank>CoolWebSearch</a> parasite variant - resets home page to an adult content site
  16352. [msupdatedevkit]
  16353. Filename=axfd.exe
  16354. Confirmed=X
  16355. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32sdbotzd.html" target= blank>SDBOT-ZD</a> WORM!
  16356. [msupdater system]
  16357. Filename=udpsys32.exe
  16358. Confirmed=X
  16359. Description=Added by the <a href="http://uk.trendmicro-europe.com/smb/security_info/ve_detail.php?id=66137&VName=WORM_RBOT.AAA&VSect=O" target=_blank>RBOT.AAA</a> WORM!
  16360. [msupdater.exe]
  16361. Filename=N/A
  16362. Confirmed=X
  16363. Description=<a href="http://cwshredder.net/cwshredder/cwschronicles.html" target=_blank>CoolWebSearch</a> parasite variant. Installs the Winshow.dll browser plugin
  16364. [msupdater25]
  16365. Filename=lsasser.exe
  16366. Confirmed=X
  16367. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotats.html" target=_blank>RBOT-ATS</a> WORM!
  16368. [msupdates]
  16369. Filename=msupdt.exe
  16370. Confirmed=X
  16371. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotjo.html" target="_blank">RBOT-JO</a> WORM!
  16372. [msupdsrv]
  16373. Filename=msupdsrv.exe
  16374. Confirmed=X
  16375. Description=Browser hijacker, redirecting to a adult content site
  16376. [msurl]
  16377. Filename=msurl32.exe
  16378. Confirmed=X
  16379. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=TROJ_CRYPTER.A" target="_blank">CRYPTER.A</a> TROJAN!
  16380. [msuser32.exe]
  16381. Filename=msuser32.exe
  16382. Confirmed=X
  16383. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/trojan.androv.html" target="_blank">ANDROV</a> TROJAN!
  16384. [msvbvm60]
  16385. Filename=MSVBVBM60.pif
  16386. Confirmed=X
  16387. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32scoldb.html" target= blank>SCOLD-B</a> WORM!
  16388. [msvcc]
  16389. Filename=msvchost.exe
  16390. Confirmed=X
  16391. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/trojan.xombe.html" target="_blank">XOMBE</a> TROJAN!
  16392. [msvhost]
  16393. Filename=aig.exe
  16394. Confirmed=X
  16395. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojaimbotbc.html" target=_blank>AIMBOT-BC</a> TROJAN!
  16396. [msvload32]
  16397. Filename=msvload32.exe
  16398. Confirmed=X
  16399. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotaci.html" target= blank>RBOT-ACI</a> WORM!
  16400. [msvsc32]
  16401. Filename=msdev.exe
  16402. Confirmed=X
  16403. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotgj.html" target=_blank>RBOT-GJ</a> WORM!
  16404. [msvsmt]
  16405. Filename=rpcxctx.exe
  16406. Confirmed=X
  16407. Description=Added by an unidentified WORM or TROJAN!
  16408. [msvsync]
  16409. Filename=videosync.exe
  16410. Confirmed=X
  16411. Description=Added by a variant of the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.spybot.worm.html" target="_blank">SPYBOT</a> WORM!
  16412. [msvxd]
  16413. Filename=MSVXD.EXE
  16414. Confirmed=X
  16415. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_DATOM.A" target="_blank">DATOM.A</a> WORM!
  16416. [mswave]
  16417. Filename=mswave.exe
  16418. Confirmed=X
  16419. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=TROJ_CRYPTER.A" target="_blank">CRYPTER.A</a> TROJAN!
  16420. [mswavedll]
  16421. Filename=mswavedll.exe
  16422. Confirmed=X
  16423. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojcrypterc.html" target="_blank">CRYPTER-C</a> TROJAN!
  16424. [mswheel]
  16425. Filename=mswheel.exe
  16426. Confirmed=U
  16427. Description=<a href="http://www.microsoft.com/intellipoint/" target="_blank">Microsoft Intellipoint</a> software for their Intellimouse series of mice - required if you use non-standard Windows driver features
  16428. [mswin]
  16429. Filename=mswin.exe
  16430. Confirmed=X
  16431. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojbankercu.html" target=_blank>BANKER-CU</a> TROJAN!
  16432. [mswincfg]
  16433. Filename=Mswincfg32.exe
  16434. Confirmed=X
  16435. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=BKDR_CYBERSPY.D" target="_blank">CYBRSPY.D</a> TROJAN!
  16436. [mswindows drt drivers]
  16437. Filename=wsdrt32.exe
  16438. Confirmed=X
  16439. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_RBOT.ALT&VSect=T" target=_blank>RBOT.ALT</a> WORM!
  16440. [mswindows ssl drivers]
  16441. Filename=mssl32.exe
  16442. Confirmed=X
  16443. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_SPYBOT.API&VSect=T" target=_blank>SPYBOT.API</a> WORM!
  16444. [mswindows sysdate]
  16445. Filename=sysmsvc.exe
  16446. Confirmed=X
  16447. Description=Added by the <a href="http://www.symantec.com/avcenter/venc/data/w32.spybot.fcd.html" target=_blank>SPYBOT.FCD</a> WORM!
  16448. [mswindows syspg]
  16449. Filename=mspg32.exe
  16450. Confirmed=X
  16451. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbottb.html" target=_blank>RBOT-TB</a> WORM!
  16452. [mswindowsupdate]
  16453. Filename=Systern.exe
  16454. Confirmed=X
  16455. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotafd.html" target=_blank>RBOT-AFD</a> WORM!
  16456. [mswinpid32]
  16457. Filename=mswinpid32.exe
  16458. Confirmed=X
  16459. Description=Added by the LAPOS.A TROJAN! This is a keylogger which emails back to China PayPal passwords and account information - thus allowing the perpetrators to steal PayPal funds in the name of the victim!
  16460. [mswinsrv]
  16461. Filename=MSWinSrv.exe
  16462. Confirmed=X
  16463. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.mtron.html" target=_blank>MTRON</a> TROJAN!
  16464. [mswinsrv32]
  16465. Filename=MSWinSrv32.exe
  16466. Confirmed=X
  16467. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojmtronb.html" target=_blank>MTRON-B</a> TROJAN!
  16468. [mswinupd]
  16469. Filename=winupd.exe
  16470. Confirmed=U
  16471. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojdloaderye.html" target=_blank>DLOADER-YE</a> or <a href="http://www.sophos.com/virusinfo/analyses/trojdloadraaa.html" target=_blank>DLOADR-AAA</a> or <a href="http://www.sophos.com/virusinfo/analyses/trojdloaderzf.html" target=_blank>DLOADER-ZF</a> TROJAN!
  16472. [mswinupdate]
  16473. Filename=winupdate.exe
  16474. Confirmed=X
  16475. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojdloadraaw.html" target=_blank>DLOADR-AAW</a> TROJAN!
  16476. [mswinvgr]
  16477. Filename=msvgr.exe
  16478. Confirmed=X
  16479. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.mytob.le@mm.html" target=_blank>MYTOB.LE</a> WORM!
  16480. [mswkork service]
  16481. Filename=msework.exe
  16482. Confirmed=X
  16483. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  16484. [msword]
  16485. Filename=msword.exe
  16486. Confirmed=X
  16487. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotadr.html" target=_blank>RBOT-ADR</a> WORM!
  16488. [msxct]
  16489. Filename=msxct.exe
  16490. Confirmed=X
  16491. Description=<a href="http://www3.ca.com/securityadvisor/pest/pest.aspx?id=453072519" target=_blank>eXact Advertising</a> (NaviSearch, BargainBuddy, CashBack) adware
  16492. [msy1 startups]
  16493. Filename=msyj32.exe
  16494. Confirmed=X
  16495. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32agobotqq.html" target= blank>AGOBOT-QQ</a> WORM!
  16496. [msys lptt01]
  16497. Filename=msys.exe
  16498. Confirmed=X
  16499. Description=<a href="http://www.wilderssecurity.net/specialinfo/rapidblaster.html" target="_blank">RapidBlaster</a> variant (in a "Msyss" folder in Program Files). Recommended you use RapidBlaster Killer to uninstall - see <a ref="http://www.wilderssecurity.net/specialinfo/rapidblaster.html#removal" target="_blank"> here</a>
  16500. [msys32]
  16501. Filename=morfitwebentrance.exe
  16502. Confirmed=X
  16503. Description=<a href="http://www.morfit.com/Eng/" target="_blank">Morfit ADjectPager</a> - "uses home page rental technology for generating revenues". Homepage hi-jacker that re-defines your IE or Netscape start page as http://www.web-entrance.com/. Any installed application including this must be un-installed before you can reset your homepage 
  16504. [msysdrv]
  16505. Filename=msdrv.exe
  16506. Confirmed=X
  16507. Description=Added by the VB.WF TROJAN!
  16508. [ms_anti_spyware]
  16509. Filename=mwfirewall.exe
  16510. Confirmed=X
  16511. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/trojan.gamqowi.html" target=_blank>GAMQOWI</a> TROJAN!
  16512. [ms_larissa]
  16513. Filename=MS_LARISSA.exe
  16514. Confirmed=X
  16515. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.assiral@mm.html" target=_blank>ASSIRAL</a> WORM!
  16516. [ms_netd_win32]
  16517. Filename=netd32.EXE
  16518. Confirmed=X
  16519. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.randex.f.html" target="_blank">RANDEX.F</a> WORM!
  16520. [ms_setup.exe]
  16521. Filename=MS_SETUP.EXE
  16522. Confirmed=X
  16523. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.charge.html" target="_blank">CHARGE</a> TROJAN!
  16524. [ms_update check]
  16525. Filename=wdfmgr.exe
  16526. Confirmed=X
  16527. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32agobottb.html" target=_blank>AGOBOT-TB</a> WORM!
  16528. [mtr2]
  16529. Filename=mtr2.exe
  16530. Confirmed=X
  16531. Description=Added by the KRYPTONIC GHOST TROJAN!
  16532. [mual]
  16533. Filename=mual.exe
  16534. Confirmed=U
  16535. Description=Millesky video mail updater and launcher
  16536. [muamgr]
  16537. Filename=muamgr.exe
  16538. Confirmed=U
  16539. Description=Quick access to MicroAngelo 5.0. It can make the background of the icon text transparent and also change the color of the shortcut's text to a color you want. Very useful, if you have a wallpaper. Available via Start -> Programs
  16540. [mufix]
  16541. Filename=mufix.exe
  16542. Confirmed=?
  16543. Description=Part of INFOConnect, web-based, enterprise client configuration, management, and deployment software, as used by ABSS (a financial management system used by the US military which will allow purchase request packages to be electronically submitted to contracting, and which also facilitates electronic receipt of items and EFT) - <font color="#FF0000">what does it do and is it required</font>
  16544. [multi-function keyboard]
  16545. Filename=GWHotkey.exe
  16546. Confirmed=U
  16547. Description=Software that sets up the Gateway AnyKey keyboard shortcuts (a series of buttons that allow one-click access to e-mail, browser, volume and CD/DVD controls, etc)
  16548. [multicam initializer]
  16549. Filename=MCamBoot.exe
  16550. Confirmed=U
  16551. Description=The MultiCAM Initializer is part of the MultiCAM software package provided by <a href="http://www.vistaimaging.com/multicam.htm" target="_blank">Vista Imaging</a> in order to run up to 10 USB ViCAM or 3Com Home Connect PC Digital cameras on a single computer. Clears itself from memory once initialized but can also be safely disabled
  16552. [multimedia codecs]
  16553. Filename=mcc.exe
  16554. Confirmed=X
  16555. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojdloadermb.html" target=_blank>DLOADER-MB</a> TROJAN!
  16556. [multimedia kbd]
  16557. Filename=MMKeybd.exe
  16558. Confirmed=U
  16559. Description=Multimedia keyboard manager. Required if you use the additional keys
  16560. [multimedia keyboard]
  16561. Filename=MMKeybd.exe
  16562. Confirmed=U
  16563. Description=Multimedia keyboard manager. Required if you use the additional keys
  16564. [multiran]
  16565. Filename=multiran.exe
  16566. Confirmed=X
  16567. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojcosiame.html" target=_blank>COSIAM-E</a> TROJAN!
  16568. [multires]
  16569. Filename=MultiRes.exe
  16570. Confirmed=U
  16571. Description=<a href="http://www.entechtaiwan.com/" target="_blank">MultiRes</a> - system tray utility allowing quick access to changing desktop resolutions and has the ability to lock the screen refresh rate in WinNT/2K/XP
  16572. [mups]
  16573. Filename=MUPS.exe
  16574. Confirmed=U
  16575. Description=Lauches the <a href="http://www.belkin.com/" target="_blank">Belkin</a> Bulldog Plus Service - required if you want to access the UPS advanced functions
  16576. [murphy shield]
  16577. Filename=lmgui.exe
  16578. Confirmed=Y
  16579. Description=Firewall part of <a href="http://www.bitdefender.com/" target="_blank">BitDefender</a> virus scanner/firewall
  16580. [music01 server]
  16581. Filename=Music01 Server.exe
  16582. Confirmed=N
  16583. Description=J River <a target="_blank" href="http://www.musicex.com/mediajukebox/">Media Jukebox</a>
  16584. [musirc (irc.music.com) client]
  16585. Filename=musirc4.71.exe
  16586. Confirmed=X
  16587. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_RANDEX.Q" target=_blank>RANDEX.Q</a> WORM!
  16588. [mutexserviceex]
  16589. Filename=Sys32Smm.exe
  16590. Confirmed=N
  16591. Description=Webroot Sofware's discontinued "Privacy Master"
  16592. [mw1helperstartup]
  16593. Filename=MW1HEL~1.EXE
  16594. Confirmed=U
  16595. Description=<a href="http://www.screenscenes.com/product.html?screensaver=MagicWaterfall" target=_blank>MagicWaterfall</a> screensaver. The freeware version comes with GAIN branded ads (pop-ups and others). ScreenScenes do however offer you the option of doing away with the ads by purchasing the screensaver for a whopping $30...
  16596. [mwavscan]
  16597. Filename=mwavscan.com
  16598. Confirmed=U
  16599. Description=MicroWorld Anti Virus Toolkit is a free anti-virus scanner that runs on-demand. You can choose to scan your entire system, including memory, services, starup items and registry, or only scan files in a specified folder or drive
  16600. [mwproeng]
  16601. Filename=MWProEng.exe
  16602. Confirmed=N
  16603. Description=Logitech Mouseware Pro software - only required when using special functions
  16604. [mwsnap]
  16605. Filename=MWSnap.exe
  16606. Confirmed=N
  16607. Description=<a href="http://www.mirekw.com/winfreeware/mwsnap.html" target="_blank">MWSnap</a> - screen capture utility. Start manually when required
  16608. [mwsoemon]
  16609. Filename=mwsoemon.exe
  16610. Confirmed=U
  16611. Description=<a href="http://help.funwebproducts.com/ns/myway-websearch.html" target=blank>My Way Search/My Web Search Toolbar</a> - "browser search tool compatible with IE (4.x or above) and Netscape 4.x. The Toolbar displays algorithmic search results from Google, Ask Jeeves, Yahoo and LookSmart, along with sponsored listings, primarily from Google." Older versions had security issues but the current versions do not
  16612. [mwsvm]
  16613. Filename=mwsvm.exe
  16614. Confirmed=X
  16615. Description=SeekSeek search hijacker related - as seen <a href="http://www.net-integration.net/cgi-bin/forum/ikonboard.cgi?act=ST&f=32&t=6790&st=0&&#entry34543" target="_blank"> here</a>
  16616. [mxhlp32]
  16617. Filename=MxHLp32.exe
  16618. Confirmed=X
  16619. Description=Added by a variant of the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=BKDR_VAGRNOCK.12" target="_blank">VAGRNOCKER</a> TROJAN!
  16620. [mxo auto loader]
  16621. Filename=MXOaldr.exe
  16622. Confirmed=U
  16623. Description=Maxtor includes a driver to bypass the Windows certified drivers check just when it detects an external drive. MXOaldr.exe is installed with the new driver and if disabled the button on a Maxtor OneTouch External Store no longer functions
  16624. [mxobg]
  16625. Filename=MXOALDR.EXE
  16626. Confirmed=U
  16627. Description=Maxtor includes a driver to bypass the Windows certified drivers check just when it detects an external drive. MXOaldr.exe is installed with the new driver and if disabled the button on a Maxtor OneTouch External Store no longer functions
  16628. [mxrunner]
  16629. Filename=MxRunner.exe
  16630. Confirmed=U
  16631. Description=<a href="http://www.aladdinsys.com/easyuninstall/" target="_blank">EasyUninstall</a> from Aladdin Systems (formerly by Ontrack)
  16632. [my agent]
  16633. Filename=msagent.exe
  16634. Confirmed=X
  16635. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=TROJ_NEGASMS.A" target="_blank">NEGASMS.A</a> TROJAN!
  16636. [my app]
  16637. Filename=SMSSvc.exe
  16638. Confirmed=X
  16639. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=TROJ_NEGASMS.A" target="_blank">NEGASMS.A</a> TROJAN!
  16640. [my search bar eq]
  16641. Filename=S4BAREQ.EXE
  16642. Confirmed=X
  16643. Description=<a href="http://doxdesk.com/parasite/MySearch.html" target="_blank">MySearch bar</a> parasite
  16644. [my-disgo]
  16645. Filename=MyKey disgo.exe
  16646. Confirmed=U
  16647. Description=Related to <a href="http://www.mydisgo.com/shop/disgo_pro_1GB.php" target=_blank>disgo pro</a>. Program will synchronize data
  16648. [myaccessmedia]
  16649. Filename=tmp**.exe [* = random char/digit]
  16650. Confirmed=X
  16651. Description=My AccessMedia toolbar related, stealth installed!
  16652. [myagttry]
  16653. Filename=MyAgtTry.exe
  16654. Confirmed=U
  16655. Description=System tray notification for McAfee <a href="http://www.mcafeeasap.com/content/virusscan_asap/default.asp" target="_blank">VirusScan ASaP</a> on-line scanner. Not required to be protected but you lose notifications
  16656. [myav]
  16657. Filename=avpguard.exe
  16658. Confirmed=X
  16659. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.netsky.j@mm.html" target="_blank">NETSKY.J</a> WORM!
  16660. [mycio agent service]
  16661. Filename=myagtsvc.exe
  16662. Confirmed=Y
  16663. Description=McAfee <a href="http://www.mcafeeasap.com/content/virusscan_asap/default.asp" target="_blank">VirusScan ASaP</a> Agent service
  16664. [mycio.com asap]
  16665. Filename=MyAgtTry.exe
  16666. Confirmed=U
  16667. Description=System tray notification for McAfee <a href="http://www.mcafeeasap.com/content/virusscan_asap/default.asp" target="_blank">VirusScan ASaP</a> on-line scanner. Not required to be protected but you lose notifications
  16668. [mycio.com splash]
  16669. Filename=Splash.exe
  16670. Confirmed=N
  16671. Description=Splash screen for McAfee <a href="http://www.mcafeeasap.com/content/virusscan_asap/default.asp" target="_blank">VirusScan ASaP</a> on-line scanner
  16672. [mycometcursor]
  16673. Filename=MYCOME~1.EXE
  16674. Confirmed=X
  16675. Description=<a href="http://research.sunbelt-software.com/threat_display.cfm?name=Comet%20Cursor&threatid=29168&search=Comet%20Cursor" target=_blank>Comet Cursor</a> adware
  16676. [myfastaccess]
  16677. Filename=myfastupdate.exe
  16678. Confirmed=N
  16679. Description=My-Fast-Access toolbar updater
  16680. [mylife]
  16681. Filename=CmdServ.exe
  16682. Confirmed=X
  16683. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_HOLAR.A" target="_blank">HOLAR.A</a> WORM!
  16684. [mynetwatchman]
  16685. Filename=nwclient.exe
  16686. Confirmed=U
  16687. Description=Sends your firewall alerts to a <a href="http://www.mynetwatchman.com/" target="_blank">website</a>, which then filters them and forwards details of suspicious activities to the host ISP they originated from. Only needs to be running when your firewall is running
  16688. [mypointspointalert]
  16689. Filename=wjview ...MyPointsPointAlertrun.exe
  16690. Confirmed=X
  16691. Description="With MyPoints you can earn rewards from name-brand merchants. You can even earn vacations and frequent flyer miles". Dubious privacy policy
  16692. [myprint mileage]
  16693. Filename=mpm.exe
  16694. Confirmed=U
  16695. Description=Reports battery status on a portable printer
  16696. [myslscan]
  16697. Filename=msvc32.exe
  16698. Confirmed=X
  16699. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32forboteh.html" target=_blank>FORBOT-EH</a> WORM!
  16700. [mysoft]
  16701. Filename=winexplor.exe
  16702. Confirmed=X
  16703. Description=Browser hijacker, also detected as the <a href="http://www.sophos.com/virusinfo/analyses/trojstartpajr.html" target= blank>STARTPA-JR</a> TROJAN!
  16704. [mysoftware newsflash]
  16705. Filename=Newsflsh.exe
  16706. Confirmed=?
  16707. Description=<font color="#FF0000">??</font>
  16708. [myteksystrayexepath]
  16709. Filename=MyTekSystray.exe
  16710. Confirmed=U
  16711. Description=<a href="http://www.mytek.com.au/" target="_blank">MyTek</a> system tray - web site providing computer tech support in Australia
  16712. [mytotalsearch email plugin]
  16713. Filename=mtsoemon.exe
  16714. Confirmed=X
  16715. Description=<a href="http://www.spynet.com/spyware/spyware-My-Total-Search-Toolbar.aspx" target=_blank>MyTotalSearchBar</a> adware
  16716. [myvirt.exe]
  16717. Filename=MyVirt.exe
  16718. Confirmed=X
  16719. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojremadmc.html" target=_blank>REMADM-C</a> TROJAN!
  16720. [myvitalagent]
  16721. Filename=VtlAgent.exe
  16722. Confirmed=U
  16723. Description=<a href="http://www.qip.lucent.com/qip/spectra/invoke.cfm?id=FBAD6307%2D6CCA%2D4CC3%2D851F5D42DB652AB2&Method=DisplayDetails" target="_blank">MyVitalAgent</a> from Lucent Technologies. Replacement for Net.Medic, monitoring all popular internet transactions and alerting the user of the loaction of connection problems. Available via Start -> Programs
  16724. [mywebsearch email plugin]
  16725. Filename=mwsoemon.exe
  16726. Confirmed=U
  16727. Description=<a href="http://help.funwebproducts.com/ns/myway-websearch.html" target=blank>My Way Search/My Web Search Toolbar</a> - "browser search tool compatible with IE (4.x or above) and Netscape 4.x. The Toolbar displays algorithmic search results from Google, Ask Jeeves, Yahoo and LookSmart, along with sponsored listings, primarily from Google." Older versions had security issues but the current versions do not
  16728. [n2ptray]
  16729. Filename=Net2fone.exe
  16730. Confirmed=U
  16731. Description=An Internet telephony application. Needed only if you have an account at <a href="http://web.net2phone.com/" target="_blank">Net2Phone, Inc</a>
  16732. [nadaemon]
  16733. Filename=NADAEMON.EXE
  16734. Confirmed=N
  16735. Description=Program by <a href="http://www.netactive.com/" target="_blank">NetActive</a> which appears to be piggybacked onto some Nvidia graphics cards software. They seem to look after "digital rights management". One user reports disabling it has no detrimental affect - not required
  16736. [naggerrunkey]
  16737. Filename=nagger.exe
  16738. Confirmed=N
  16739. Description=Packard Bell Free Internet Signup screen
  16740. [naimagent_service]
  16741. Filename=EPOAgentnaimas32.exe
  16742. Confirmed=Y
  16743. Description=Networked version of McAfee VirusScan. Installs, configures and updates the software and DAT (virus definition) files on local computers from a network server. A resource hog but required for DAT updates and if disabled can also cause random freezes and error messages
  16744. [name]
  16745. Filename=Iexplorer0.exe
  16746. Confirmed=X
  16747. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.threadsys.html" target="_blank">THREADSYS</a> TROJAN!
  16748. [namedpipe system]
  16749. Filename=namedpipe.exe
  16750. Confirmed=X
  16751. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32mytobfh.html" target=_blank>MYTOB-FH</a> TROJAN!
  16752. [nap32]
  16753. Filename=NAP32.exe
  16754. Confirmed=X
  16755. Description=Premium rate adult content dialler
  16756. [narrator]
  16757. Filename=******.exe [* = random char]
  16758. Confirmed=X
  16759. Description=Added by the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=43264" target=_blank>QOOLOGIC</a> TROJAN!
  16760. [natal]
  16761. Filename=Natal.scr
  16762. Confirmed=X
  16763. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.opaserv.ae.worm.html" target="_blank">OPASERV.AE</a> WORM!
  16764. [nav]
  16765. Filename=RuxDLL32.exe
  16766. Confirmed=X
  16767. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.mapson.d.worm.html" target="_blank">MAPSON.D</a> WORM!
  16768. [nav auto prot]
  16769. Filename=navprot1.exe
  16770. Confirmed=X
  16771. Description=Added by the <a href="http://de.trendmicro-europe.com/enterprise/security_info/ve_detail.php?VName=WORM_RBOT.ZAC" target=_blank>RBOT.ZAC</a> WORM!
  16772. [nav auto update]
  16773. Filename=Navautoupdate.exe
  16774. Confirmed=X
  16775. Description=Added by a variant of the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.spybot.worm.html" target="_blank">SPYBOT</a> WORM!
  16776. [nav cfgwiz]
  16777. Filename=cfgwiz.exe
  16778. Confirmed=N
  16779. Description=Introduced with Norton Anti-Virus 2002, this is a real resource hog. Many NAV users will find they can live without loading it
  16780. [nav configuration wizard]
  16781. Filename=cfgwiz.exe
  16782. Confirmed=N
  16783. Description=Introduced with Norton Anti-Virus 2002, this is a real resource hog. Many NAV users will find they can live without loading it
  16784. [nav defalert]
  16785. Filename=DefAlert.exe
  16786. Confirmed=U
  16787. Description=Norton Anti-Virus Definitions Alert. Warns you if virus definitions are out of date. Leave enabled unless you manually update virus definitions on a regular basis
  16788. [nav live update]
  16789. Filename=[path to worm]
  16790. Confirmed=X
  16791. Description=Added by the <a href="http://www.symantec.com/avcenter/venc/data/w32.hllw.deborms.c.html" target="_blank">DEBORMS.C</a> WORM! Note - this is not a valid Norton Anti-Virus (NAV) function from Symantec
  16792. [nav scan service]
  16793. Filename=NAVSCAN32.EXE
  16794. Confirmed=X
  16795. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_SDBOT.VG" target="_blank">SDBOT.VG</a> WORM!
  16796. [navapp]
  16797. Filename=navapp.exe
  16798. Confirmed=X
  16799. Description=<a href="http://www.doxdesk.com/parasite/NavExcel.html" target=_blank>NavExcel</a> adware variant
  16800. [navapw32]
  16801. Filename=navapw32.exe
  16802. Confirmed=Y
  16803. Description=Norton Anti-Virus's background scanning process
  16804. [naviscope]
  16805. Filename=naviscope.exe
  16806. Confirmed=U
  16807. Description=<a href="http://naviscope.com/" target="_blank">Naviscope</a> is a multipurpose browser enhancement that can speed up Web searches, lock out cookies, examine HTML send/receive headers, provide single-click network diagnostics, and much more
  16808. [navisearch]
  16809. Filename=nls.exe
  16810. Confirmed=X
  16811. Description=NaviSearch, eXact Advertising variant
  16812. [navman_20]
  16813. Filename=sysnav32.exe
  16814. Confirmed=X
  16815. Description=Hijacker, possibly a <a href="http://cwshredder.net/cwshredder/cwschronicles.html" target=_blank>CoolWebSearch</a> parasite variant
  16816. [navp.exe]
  16817. Filename=navp.exe
  16818. Confirmed=X
  16819. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32agobotoe.html" target=_blank>AGOBOT-OE</a> WORM!
  16820. [navpass]
  16821. Filename=NavPass.exe
  16822. Confirmed=X
  16823. Description=Free system for gaining access to and downloading from adult content web-sites
  16824. [navscan]
  16825. Filename=[filename]
  16826. Confirmed=X
  16827. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/trojan.obsorb.html" target="_blank">OBSORB</a> TROJAN!
  16828. [navscan32.exe]
  16829. Filename=NAVSCAN32.exe
  16830. Confirmed=X
  16831. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32sdbotdo.html" target=_blank>SDBOT-DO</a> WORM!
  16832. [navscanner32]
  16833. Filename=NAVSCANNER32.EXE
  16834. Confirmed=X
  16835. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_RBOT.QC" target="_blank">RBOT.QC</a> WORM!
  16836. [navupd]
  16837. Filename=rundll32.exe navupd.dll, Startup
  16838. Confirmed=X
  16839. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/pwsteal.navu.html" target="_blank">NAVU</a> TROJAN!
  16840. [nav_update]
  16841. Filename=NAV_Update.exe
  16842. Confirmed=X
  16843. Description=Unidentified WORM or TROJAN!
  16844. [nawadll32]
  16845. Filename=nawadll32.exe
  16846. Confirmed=X
  16847. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32sdbotzi.html" target=_blank>SDBOT-ZI</a> WORM!
  16848. [nawdll32]
  16849. Filename=nawdll32.exe
  16850. Confirmed=X
  16851. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32sdbotzm.html" target=_blank>SDBOT-ZM</a> WORM!
  16852. [nb common dialog enhancements]
  16853. Filename=COMDLGEX.EXE
  16854. Confirmed=N
  16855. Description=Part of McAfee Nuts & Bolts. With Common Dialog Enhancements, you can add MRU list box to open dialogs
  16856. [nb start menu]
  16857. Filename=STARTM.EXE
  16858. Confirmed=N
  16859. Description=Part of McAfee Nuts & Bolts. Provides the same control as MSCONFIG and can be used instead if you have N&B
  16860. [nb windows patterns]
  16861. Filename=WINDBKGND.EXE
  16862. Confirmed=N
  16863. Description=Part of McAfee Nuts & Bolts. With Background Patterns, you can change background patterns of wizard and dialog windows
  16864. [nbj]
  16865. Filename=NBJ.exe
  16866. Confirmed=U
  16867. Description=Ahead Nero <a href="http://www.nero.com/en/631898241464531.html" target="_blank"> BackItUp</a> backup program. Only required for if you have scheduled back-ups
  16868. [nbkctrl]
  16869. Filename=NbkCtrl.exe
  16870. Confirmed=U
  16871. Description=Scheduling engine of <a href="http://www.no-panic.com/backup/n_backup.html" target="_blank"> NovaSTOR Backup</a> Service. Only required if scheduling is enabled and wanted - see <a href="http://www.no-panic.com/backup/tech_supt/nbackup7_commandline.html" target="_blank"> here</a>
  16872. [nbt system alias]
  16873. Filename=[path] repcale.exe [path] beird.exe
  16874. Confirmed=X
  16875. Description=Added by a variant of the <a href="http://uk.trendmicro-europe.com/enterprise/security_info/ve_detail.php?Vname=WORM_RANDON.AN" target=_blank>RANDON.AN</a> WORM!
  16876. [nbustrce1d]
  16877. Filename=nbustrce1D.exe
  16878. Confirmed=?
  16879. Description=Device driver, possibly CD/DVD - <font color="#FF0000">what exactly is it and is it required in startup?</font>
  16880. [ncao]
  16881. Filename=osoa.exe
  16882. Confirmed=X
  16883. Description=<a href="http://research.sunbelt-software.com/threat_display.cfm?name=ClickSpring.PuritySCAN&threatid=10115" target=_blank>PurityScan/Clickspring</a> adware
  16884. [ncclient]
  16885. Filename=N/A
  16886. Confirmed=?
  16887. Description=<font color="#FF0000">??</font>
  16888. [ncd]
  16889. Filename=ncd.exe
  16890. Confirmed=N
  16891. Description=Norton Change Directory - from the DOS days that allows the user to change directories on their machine without typing the complete path
  16892. [nclaunch]
  16893. Filename=NCLAUNCH.Exe
  16894. Confirmed=?
  16895. Description=Part of <a href="http://www.northcode.com/products/swfstudio/index.html" target="_blank">SWF Studio</a> from Northcode Inc - an extension to Flash. Bundled when you create a self-installing screen-saver on Win2K/XP. <font color="#FF0000">Is it required?</font>
  16896. [ncs_ss]
  16897. Filename=Csinsm32.exe
  16898. Confirmed=N
  16899. Description=Same as CleanSweep Smart Sweep-Internet Sweep
  16900. [nddeagnt]
  16901. Filename=NDDEAGNT.EXE
  16902. Confirmed=?
  16903. Description=WinNT default process. Network Dynamic Data Exchange (DDE) Agent, handles requests for network DDE services
  16904. [ndps]
  16905. Filename=DPMW32.EXE
  16906. Confirmed=U
  16907. Description=Novell Distributed Printer Services - part of Novell's <a href="http://www.novell.com/products/netware/" target="_blank">Netware</a> Client and <a href="http://www.novell.com/products/groupwise/" target="_blank"> Groupwise</a> products. Not required if you don't use this feature
  16908. [ndrv]
  16909. Filename=NDrv.exe
  16910. Confirmed=X
  16911. Description=<a href="http://research.sunbelt-software.com/threat_display.cfm?name=ClickSpring.PuritySCAN&threatid=10115" target=_blank>PurityScan/Clickspring</a> adware
  16912. [ndstray]
  16913. Filename=NDSTray.exe
  16914. Confirmed=U
  16915. Description=ConfigFree Tray on a Toshiba laptop. Tray utility for their network switching application which permits switching network devices and settings with a click on the tray icon. While it is not required, for people who span multiple networks and want an easy way to go from wired to wireless and change addresses and other network settings, it's a must have
  16916. [necbar]
  16917. Filename=Necbar.exe
  16918. Confirmed=N
  16919. Description=Nec Assistant; Ark's Navigator, a graphical interface for NEC computers
  16920. [necmfk]
  16921. Filename=necmfk.exe
  16922. Confirmed=Y
  16923. Description=NEC wireless keyboard driver
  16924. [necutray]
  16925. Filename=Necutray.exe
  16926. Confirmed=U
  16927. Description=Driver for external USB storage devices (hard drives, flsh disks, etc)
  16928. [neqprvfy.exe]
  16929. Filename=neqprvfy.exe
  16930. Confirmed=?
  16931. Description=<font color="#FF0000">Appears to be related to the downloading of some application - possibly verifying updates?</font>
  16932. [nero]
  16933. Filename=shch.exe
  16934. Confirmed=X
  16935. Description=Added by a variant of the <a href="http://www.sophos.com/virusinfo/analyses/trojbdooreb.html" target= blank>EB</a> TROJAN!
  16936. [nero checker]
  16937. Filename=nerocheck.exe
  16938. Confirmed=X
  16939. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojproxyx.html" target=_blank>PROXY-X</a> TROJAN! Note - this is not related to "Nero Burning Rom" CD writing software
  16940. [nero updater.6.12]
  16941. Filename=wmp9.exe
  16942. Confirmed=X
  16943. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32agobotaag.html" target=_blank>AGOBOT-AAG</a> WORM!
  16944. [nero.ma]
  16945. Filename=***.exe [*** = 2 to 3 digits]
  16946. Confirmed=X
  16947. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.jonbarr.d@mm.html" target="_blank">JONBARR.D</a> WORM!
  16948. [neroautostartclient]
  16949. Filename=NeroASM.exe
  16950. Confirmed=X
  16951. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_AGOBOT.VG&VSect=T" target=_blank>AGOBOT.VG</a> WORM!
  16952. [nerofiltercheck]
  16953. Filename=NeroCheck.exe
  16954. Confirmed=U
  16955. Description=Associated with "Nero Burning Rom" CD writing software. Checks for driver issues
  16956. [neroloader]
  16957. Filename=NeroLoader.exe
  16958. Confirmed=X
  16959. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojbancbanej.html" target=_blank>BANCBAN-EJ</a> TROJAN!
  16960. [neronettrayicon]
  16961. Filename=NNServiceCtrl.exe
  16962. Confirmed=N
  16963. Description=System tray access to <a href="http://www.nero.com/us/631898255953125.html" target="_blank">NeroNET</a> - Ahead Software's network-capable extension of their CD/DVD burning program. NeroNET allows a burner to be shared across a network
  16964. [neroupdater6.8]
  16965. Filename=winjava.exe
  16966. Confirmed=X
  16967. Description=Added by the <a href="http://www.trendmicro.co.jp/vinfo/virusencyclo/default5.asp?VName=WORM_AGOBOT.AMK" target=_blank>AGOBOT.AMK</a> WORM!
  16968. [net]
  16969. Filename=WINREG.EXE
  16970. Confirmed=X
  16971. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.assasin.d.html" target="_blank">ASSASIN.D</a> TROJAN!
  16972. [net accelerator]
  16973. Filename=NetAccelerator.exe
  16974. Confirmed=U
  16975. Description=<a href="http://www.rizalsoftware.com/" target="_blank">Rizal</a> NetAccelerator - "Optimizing Dial-Up, Lan, Cable, DSL, and Satellite connections do you want to speed up your Internet access up to 200% - 300% ???". Only required if you find it helps improve your performance
  16976. [net activity diagram]
  16977. Filename=nad.exe
  16978. Confirmed=U
  16979. Description=<a href="http://www.metaproducts.com/mp/mpProducts_Detail.asp?id=20" target="_blank">Net Activity Diagram</a> from MetaProducts. Monitors your computer internet activity. Available via Start -> Programs
  16980. [net bios stats]
  16981. Filename=ntbstats.exe
  16982. Confirmed=X
  16983. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32sdbotzx.html" target=_blank>SDBOT-ZX</a> WORM!
  16984. [net-it launcher]
  16985. Filename=NILaunch.exe
  16986. Confirmed=N
  16987. Description=<a href="http://www.net-it.com/" target="_blank">Net-It</a> - web publishing software
  16988. [netaccelerator]
  16989. Filename=NetAccel.exe
  16990. Confirmed=U
  16991. Description=<a href="http://www.netaccelerator.net/" target="_blank">NetAccelerator</a> is a "software utility that optimizes your internet access up to 1200% faster!. NetAccelerator speeds all modems allowing you to download faster, browse faster, surf faster!. Only required if you find it helps improve your performance
  16992. [netadm7]
  16993. Filename=NETADM7.EXE
  16994. Confirmed=X
  16995. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/pwsteal.bancos.f.html" target="_blank">BANCOS.F</a> TROJAN!
  16996. [netapi]
  16997. Filename=Netapi.exe
  16998. Confirmed=X
  16999. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=BKDR_NETDEVIL.14" target="_blank">NETDEVIL.14</a> TROJAN!
  17000. [netapi32]
  17001. Filename=netapi32.exe
  17002. Confirmed=X
  17003. Description=Added by an unidentified TROJAN!
  17004. [netapp]
  17005. Filename=winserv.exe
  17006. Confirmed=X
  17007. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=BKDR_SHADOWTHIEF" target="_blank">SHADOWTHIEF</a> TROJAN!
  17008. [netbios helper]
  17009. Filename=nbthlp.exe
  17010. Confirmed=X
  17011. Description=Added by the <a href="http://vil.nai.com/vil/content/v_134470.htm" target=_blank>BANKER.Y</a> TROJAN!
  17012. [netconfig]
  17013. Filename=netconfig.exe
  17014. Confirmed=X
  17015. Description=Added by the <a href="http://www.pestpatrol.com/PestInfo/n/netware_trojan_v1_0.asp" target="_blank">NETCONF</a> TROJAN!
  17016. [netcruiser dialer]
  17017. Filename=NCDialer.exe
  17018. Confirmed=U
  17019. Description=<a href="http://www.netcruiser-software.com/products.html" target="_blank">NetCruiser Dialer</a> from NetCruiser Software. "An Internet dialer and connection monitor with features to launch applications when a connection is detected, dial and hangup at predefined times and automatic redialing of dropped connections"
  17020. [netdaemon]
  17021. Filename=netdaemon /v
  17022. Confirmed=X
  17023. Description=Malware designed to "kill" a number of antispyware applications (SpyBot, Giant, SpyDoctor, SpySweeper, SpyHunter, Anvir, WinPatrol, and more)
  17024. [netdll32]
  17025. Filename=netdll32.exe
  17026. Confirmed=X
  17027. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=TROJ_CRYPTER.A" target="_blank">CRYPTER.A</a> TROJAN!
  17028. [netdllex]
  17029. Filename=netdllex.Exe
  17030. Confirmed=X
  17031. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=TROJ_CRYPTER.A" target="_blank">CRYPTER.A</a> TROJAN!
  17032. [netdy]
  17033. Filename=VisualGuard.exe
  17034. Confirmed=X
  17035. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.netsky.n@mm.html" target="_blank">NETSKY.N</a> or <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.netsky.w@mm.html" target="_blank">NETSKY.W</a> WORMS!
  17036. [netfp32.exe]
  17037. Filename=NETFP32.EXE
  17038. Confirmed=X
  17039. Description=Added by the AGENT.CD TROJAN!
  17040. [netfxupdate]
  17041. Filename=netfxupdate.exe
  17042. Confirmed=?
  17043. Description=<font color="#FF0000">Would appear to be a valid Microsoft .NET file (see <a href="http://support.microsoft.com/default.aspx?scid=kb;en-us;827801" target="_blank">here</a>) but <a href="http://www.techsupportforum.com/computer/topic/8189-1.html" target="_blank"> this</a> suggest's it's a trojan?</font>
  17044. [netfxupdate_v1.0.3705]
  17045. Filename=netfxupdate.exe
  17046. Confirmed=?
  17047. Description=<font color="#FF0000">Would appear to be a valid Microsoft .NET file (see <a href="http://support.microsoft.com/default.aspx?scid=kb;en-us;827801" target="_blank">here</a>) but <a href="http://www.techsupportforum.com/computer/topic/8189-1.html" target="_blank"> this</a> suggest's it's a trojan?</font>
  17048. [netguard]
  17049. Filename=NetGuard.exe
  17050. Confirmed=U
  17051. Description=FBM Software ZeroSpyware 2004 spyware detector and remover - real time monitor
  17052. [nethost.exe]
  17053. Filename=[path to file]
  17054. Confirmed=X
  17055. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojperdaj.html" target=_blank>PERDA-J</a> TROJAN!
  17056. [netlimiter]
  17057. Filename=Netlimiter.exe
  17058. Confirmed=U
  17059. Description=<a href="http://www.netlimiter.com/" target="_blank">Netlimiter</a> - "An internet traffic control tool to monitor applications which access the internet and actively control their internet traffic. Use it o set (download/upload) speed limits for applications or even single connection. NetLimiter also allows you to share your internet connection bandwidth among all applications running on your PC."
  17060. [netline user]
  17061. Filename=netchk.exe
  17062. Confirmed=N
  17063. Description=Netline supplies internet related products and services and this program identifies user ID and IP information. Found installed along with the Falcon 4 game, for example
  17064. [netlink]
  17065. Filename=netlink32.exe
  17066. Confirmed=X
  17067. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.gaobot.wo.html" target="_blank">GAOBOT.WO</a> WORM!
  17068. [netlogon]
  17069. Filename=userint.exe
  17070. Confirmed=X
  17071. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32sdbotbc.html" target=_blank>SDBOT-BC</a> WORM!
  17072. [netmanagerservice]
  17073. Filename=ntss.exe
  17074. Confirmed=X
  17075. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=BKDR_BESTPICS.A" target="_blank">BESTPICS.A</a> TROJAN!
  17076. [netmon]
  17077. Filename=netmon.exe
  17078. Confirmed=X
  17079. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.mimail.m@mm.html" target="_blank">MIMAIL.M</a> WORM!
  17080. [netmonw]
  17081. Filename=Netmonw.exe
  17082. Confirmed=X
  17083. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojbdoorfx.html" target=_blank>BDOOR-FX</a> TROJAN!
  17084. [netmsg]
  17085. Filename=netmsg.exe
  17086. Confirmed=U
  17087. Description=<a href="http://users.pandora.be/Grrrippp/" target=_blank>Net_Message</a> is a small tool to send messages across the network, using the Windows Messenger Service, so there is no client install required to receive the messages. It has a number of other features as well
  17088. [netpatrol]
  17089. Filename=winclient.exe
  17090. Confirmed=U
  17091. Description=<a href="http://www.digitalweb.com.br/netpatrol/" target="_blank">NetPatrol</a> network monitoring software
  17092. [netpc32.exe]
  17093. Filename=netpc32.exe
  17094. Confirmed=X
  17095. Description=Malware, probably a <a href="http://cwshredder.net/cwshredder/cwschronicles.html" target=_blank>CoolWebSearch</a> parasite variant
  17096. [netpersec]
  17097. Filename=NetPerSec.exe
  17098. Confirmed=N
  17099. Description=<a href="http://www.pcmag.com/article2/0,4149,1735,00.asp" target="_blank">NetPerSec</a> - measures the real-time speed of your Internet connection
  17100. [netpumper]
  17101. Filename=NetPumperIEProxy.exe
  17102. Confirmed=N
  17103. Description=<a href="http://www.netpumper.com/" target=_blank>NetPumper</a> download manager - bundles Cydoor and SaveNow adware, see <a href="http://www.kephyr.com/spywarescanner/library/netpumper/index.phtml" target=_blank>here</a>
  17104. [netreach]
  17105. Filename=nrcheck.exe
  17106. Confirmed=X
  17107. Description=Added by an unidentified VIRUS, WORM or TROJAN!
  17108. [netropa internet receiver]
  17109. Filename=Netropa.exe
  17110. Confirmed=X
  17111. Description=Netropa Internet Receiver. Shows a scrolling bar with the news. Major resource hog and flagged as spyware
  17112. [netrun]
  17113. Filename=NetRun.exe
  17114. Confirmed=U
  17115. Description=<a href="http://www.czarsoft.shorturl.com/" target="_blank">NetRun</a> - will 'RUN' a 'List' of programs only when a internet connection is detected, and close/kill the same 'List' when the connection is lost
  17116. [netscape messenger]
  17117. Filename=NETSCAPE.EXE
  17118. Confirmed=N
  17119. Description=In Netscape 6 (I know for sure with 6.2.1, maybe with 6.0) Netscape.exe is the main executable file for Netscape Navigator, Netscape Mail and News, and Netscape Messenger (the new name for the embedded AIM, no doubt to make it sound like Windows Messenger, the XP version of MSN Messenger). Basically, netscape.exe can be more than just Netscape Messenger, and Messenger can be more then just AIM in disguise, depending on the version of Netscape installed
  17120. [netscp6]
  17121. Filename=Netscp6.exe
  17122. Confirmed=N
  17123. Description=Netscape 6
  17124. [netscreen-remote]
  17125. Filename=SafeCfg.exe
  17126. Confirmed=U
  17127. Description=<a href="http://www.nscreensales.com/products/nsremote.php" target=_blank>NetScreen Remote</a> VPN client software
  17128. [netservice]
  17129. Filename=ntsvc.exe
  17130. Confirmed=X
  17131. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojqqpassdu.html" target=_blank>QQPASS-DU</a> TROJAN!
  17132. [netshow powerpoint helper]
  17133. Filename=NSPPTHLP.EXE
  17134. Confirmed=U
  17135. Description=If disabled, user created fonts can no longer be seen by other programs
  17136. [netstart]
  17137. Filename=svchost.exe
  17138. Confirmed=X
  17139. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32mkara.html" target=_blank>MKAR-A</a> VIRUS! Note - this is not the legitimate <a href="http://www.liutilities.com/products/wintaskspro/processlibrary/svchost/" target=_blank>svchost.exe</a> process which is always located in the System (9x/Me) or System32 (NT/2K/XP) folder and should not normally figure in Msconfig/Startup! This file is located in a NETSTART subfolder
  17140. [netstat live]
  17141. Filename=Nsl.exe
  17142. Confirmed=N
  17143. Description=AnalogX <a href="http://www.analogx.com/contents/download/network/nsl.htm" target="_blank">NetStat Live</a> - TCP/IP protocol monitor which can be used to see your exact throughput on both incoming and outgoing data
  17144. [netsv32]
  17145. Filename=netsv32.exe
  17146. Confirmed=X
  17147. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32sdbotpx.html" target="_blank">SDBOT-PX</a> WORM!
  17148. [nettime]
  17149. Filename=NETTIME.EXE
  17150. Confirmed=U
  17151. Description=From a visitor - "This is the executable for NetTime. It is started from the registry when you check the box to start at startup. NetTime allows you to synchronize your computers' clock with a server on your local net or the internet using any of several protocols, e.g. NTP."
  17152. [netturbo]
  17153. Filename=netturbo.exe
  17154. Confirmed=U
  17155. Description=<a href="http://www.netturbo.com/" target="_blank">NetTurbo</a> from SharewareOnline.com. "Accelerate Your Internet Connections by up to 600%". If you find it helps your connectivity leave it enabled
  17156. [netunit32]
  17157. Filename=wunit32.exe
  17158. Confirmed=X
  17159. Description=Added by an unidentified WORM or TROJAN!
  17160. [netvisionpasse-partout]
  17161. Filename=Passe-partout.exe
  17162. Confirmed=X
  17163. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/dialdialcarm.html" target=_blank>DIALCAR-M</a> DIALER!
  17164. [netwatch32]
  17165. Filename=netwatch.exe
  17166. Confirmed=X
  17167. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.mimail.c@mm.html" target="_blank">MIMAIL.C</a> WORM!
  17168. [netword agent]
  17169. Filename=nwant33.exe
  17170. Confirmed=N
  17171. Description=An interesting browser utility that allows you to navigate by typing a single word or phrase (a "NetWord") related to what you're looking for into your browser's location field. It also puts an icon in the system tray icon that is a circle with the letter N in the center to access the menu faster. Available via Start -> Programs
  17172. [network]
  17173. Filename=csrs.exe
  17174. Confirmed=X
  17175. Description=Added by the <a href="http://uk.trendmicro-europe.com/enterprise/security_info/ve_detail.php?VName=WORM_AGOBOT.JJ" target="_blank">AGOBOT.JJ</a> WORM!
  17176. [network access]
  17177. Filename=winssh.exe
  17178. Confirmed=X
  17179. Description=Added by a variant of the <a href="http://vil.nai.com/vil/content/v_100454.htm" target=_blank>SDBOT</a> WORM!
  17180. [network administration]
  17181. Filename=NAS.exe
  17182. Confirmed=X
  17183. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.antilam.20.q.html" target="_blank">ANTILAM.20.Q</a> TROJAN!
  17184. [network administration service]
  17185. Filename=rsvc32.exe
  17186. Confirmed=X
  17187. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_RBOT.ABH" target=_blank>RBOT.ABH</a> WORM!
  17188. [network associates error reporting service]
  17189. Filename=TBMon.exe
  17190. Confirmed=U
  17191. Description=Network Associates Error Reporting Tool - tool traps errors and requests submission to NAI for the purpose of betatesting new software
  17192. [network connections]
  17193. Filename=internat.exe
  17194. Confirmed=X
  17195. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojvbzd.html" target=_blank>ZD</a> TROJAN!
  17196. [network device driver]
  17197. Filename=msfirewall.exe
  17198. Confirmed=X
  17199. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojdelflb.html" target=_blank>DELF-LB</a> TROJAN!
  17200. [network device switch]
  17201. Filename=NetDevSW.exe
  17202. Confirmed=U
  17203. Description=Toshiba laptops with built-in Wi-Fi. Allows switching between Wi-Fi and internal ethernet. Only necessary if you have regular need to switch back and forward between these network interfaces. Located in Startup folder so make own shortcut to it and disable if not really necessary
  17204. [network host controller]
  17205. Filename=[path to trojan]
  17206. Confirmed=X
  17207. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.irc.whisper.html" target="_blank">WHISPER</a> TROJAN!
  17208. [network security]
  17209. Filename=secsvc.exe
  17210. Confirmed=X
  17211. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotalx.html" target=_blank>RBOT-ALX</a> WORM!
  17212. [networkassociates inc]
  17213. Filename=internet.exe
  17214. Confirmed=X
  17215. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.hllw.lovgate@mm.html" target="_blank">LOVGATE</a> WORM!
  17216. [networkclient]
  17217. Filename=NetworkClient.exe
  17218. Confirmed=X
  17219. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.hllw.lemur.html" target="_blank">LEMUR</a> WORM!
  17220. [networkkey]
  17221. Filename=netkey.exe
  17222. Confirmed=X
  17223. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojircbotaj.html" target=_blank>IRCBOT-AJ</a> TROJAN!
  17224. [networks configurator]
  17225. Filename=NetConfs.exe
  17226. Confirmed=X
  17227. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotox.html" target=_blank>RBOT-OX</a> WORM!
  17228. [networks controler]
  17229. Filename=Netsis.exe
  17230. Confirmed=X
  17231. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotng.html" target=_blank>RBOT-NG</a> WORM!
  17232. [networksetup]
  17233. Filename=dlink.exe
  17234. Confirmed=N
  17235. Description=<a href="http://www.dlink.com/tech/faq/dlink-icon.htm" target="_blank">D-Link</a> System Tray icon
  17236. [netzip smart downloader]
  17237. Filename=npnzdad.exe
  17238. Confirmed=X
  17239. Description=Advertising spyware
  17240. [netzipfolders]
  17241. Filename=nzfprop.exe
  17242. Confirmed=N
  17243. Description=<a href="http://www.netzip.com/products/info_netzip_win.html?src=site,netzip,plugin,nzc" target="_blank">Netzip Classic</a> zip file manager
  17244. [neuromedia(iespeaker)]
  17245. Filename=NeuroMedia.exe
  17246. Confirmed=X
  17247. Description=Part of an older freeware version of <a href="http://www.iespeaker.com" target="_blank"> IESpeaker</a> - a program that allows you to listen to web pages. NeuroMedia.exe only downloads advertisments. Not included in the paid-for version currently available
  17248. [neurospeech oespeaker]
  17249. Filename=OEMonitor.exe
  17250. Confirmed=N
  17251. Description=Part of <a href="http://www.iespeaker.com" target="_blank"> OESpeaker</a> - a program that allows you to listen to long E-mails instead of reading them in Outlook Express. OEMonitor.exe checks whether OE is open or not
  17252. [new csnm manager]
  17253. Filename=csmn.exe
  17254. Confirmed=X
  17255. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_SDBOT.BZS&VSect=P" target=_blank>SDBOT.BZS</a> WORM!
  17256. [new.net]
  17257. Filename=rundll32.exe NewDotNetStartup Newdot~2.exe
  17258. Confirmed=X
  17259. Description=<a href="http://research.sunbelt-software.com/threat_display.cfm?name=NewDotNet&threatid=9108&search=NewDotNet" target=_blank>NewDotNet</a> foistware
  17260. [new.net startup]
  17261. Filename=rundll32 [path], NewDotNetStartup -s
  17262. Confirmed=X
  17263. Description=<a href="http://research.sunbelt-software.com/threat_display.cfm?name=NewDotNet&threatid=9108&search=NewDotNet" target=_blank>NewDotNet</a> foistware
  17264. [newdot~1]
  17265. Filename=rundll32.exe NewDotNetStartup Newdot~2.exe
  17266. Confirmed=X
  17267. Description=<a href="http://research.sunbelt-software.com/threat_display.cfm?name=NewDotNet&threatid=9108&search=NewDotNet" target=_blank>NewDotNet</a> foistware
  17268. [newman]
  17269. Filename=playavi.exe
  17270. Confirmed=X
  17271. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojlineageat.html" target=_blank>LINEAGE-AT</a> TROJAN! Note - This trojan file is found in the Windows\java or Winnt\java folder
  17272. [news service]
  17273. Filename=ispnews.exe
  17274. Confirmed=?
  17275. Description=<a href="http://www.f-secure.com/solutions/home.shtml" target="_blank">F-Secure</a> antivirus related. <font color="#FF0000" target="_blank">However, is this particular item required?</font>
  17276. [newsalrt]
  17277. Filename=NEWSALRT.EXE
  17278. Confirmed=N
  17279. Description=MSNBC News system tray utility to alert you to new news
  17280. [newsgroup lptt01]
  17281. Filename=newsgroup.exe
  17282. Confirmed=X
  17283. Description=<a href="http://www.wilderssecurity.net/specialinfo/rapidblaster.html" target="_blank">RapidBlaster</a> variant (in a "newsgroup" folder in Program Files). Recommended you use RapidBlaster Killer to uninstall - see <a ref="http://www.wilderssecurity.net/specialinfo/rapidblaster.html#removal" target="_blank"> here</a>
  17284. [newsgroup ml097e]
  17285. Filename=newsgroup.exe
  17286. Confirmed=X
  17287. Description=<a href="http://www.wilderssecurity.net/specialinfo/rapidblaster.html" target="_blank">RapidBlaster</a> variant (in a "newsgroup" folder in Program Files). Recommended you use RapidBlaster Killer to uninstall - see <a ref="http://www.wilderssecurity.net/specialinfo/rapidblaster.html#removal" target="_blank"> here</a>
  17288. [newsupd]
  17289. Filename=newsupd.exe
  17290. Confirmed=N
  17291. Description=For Creative Soundblaster Live! series soundcards. System tray application for News updates. Available via Start -> Programs. Also spyware - see <a href="http://cexx.org/newsupd.htm" target="_blank">here</a>.
  17292. [newtonknowsupd]
  17293. Filename=NewtKnow.exe ...NewtnUpd.dll, runkey
  17294. Confirmed=X
  17295. Description=<a href="http://www.doxdesk.com/parasite/NewtonKnows.html" target="_blank">NewtonKnow</a> hijacker
  17296. [nfm service]
  17297. Filename=NPDOR9x.exe
  17298. Confirmed=U
  17299. Description=Appears in startup if you have chosen to participate in on survey by <a href="http://www.npdor.com/" target="_blank"> NPD Online Research</a>. Required for the survey to work correctly. Otherwise not required
  17300. [nforce tray options]
  17301. Filename=sstray.exe
  17302. Confirmed=N
  17303. Description=nVidia nForce Taskbar Utility - quick access to the nForce2 "Sound Storm" control panel and related utilitys
  17304. [ngclient]
  17305. Filename=ngctw32.exe
  17306. Confirmed=U
  17307. Description=Symantec Ghost Server software - needed for a "a Ghost multicast" (transfer images to multiple machines). Can be launched manually
  17308. [ngpw36]
  17309. Filename=ngpw36.exe
  17310. Confirmed=X
  17311. Description=<a href="http://securityresponse.symantec.com/avcenter/venc/data/adware.adblaster.html" target=_blank>AdBlaster</a> adware variant
  17312. [ngserver]
  17313. Filename=ngserver.exe
  17314. Confirmed=N
  17315. Description=Symantec/Norton Ghost Console service
  17316. [ni.uwfx5]
  17317. Filename=UWFX5NetInstaller.exe
  17318. Confirmed=X
  17319. Description=WinFixer web installer. Winfixer is "Foistware", pretending to be system optimization, protection and recovery software - stealth installed, see <a href="http://research.sunbelt-software.com/threat_display.cfm?name=misc.winsoftware.winfixer&threatid=40196" target=_blank>here</a>
  17320. [ni.uwfx5lp_0001_0802]
  17321. Filename=UWFX5LP_0001_0802NetInstaller.exe
  17322. Confirmed=X
  17323. Description=WinFixer web installer. Winfixer is "Foistware", pretending to be system optimization, protection and recovery software - stealth installed, see <a href="http://research.sunbelt-software.com/threat_display.cfm?name=misc.winsoftware.winfixer&threatid=40196" target=_blank>here</a>
  17324. [ni.uwfx5lp_0001_0803]
  17325. Filename=UWFX5LP_0001_0803NetInstaller.exe
  17326. Confirmed=X
  17327. Description=WinFixer web installer. Winfixer is "Foistware", pretending to be system optimization, protection and recovery software - stealth installed, see <a href="http://research.sunbelt-software.com/threat_display.cfm?name=misc.winsoftware.winfixer&threatid=40196" target=_blank>here</a>
  17328. [ni.uwfx5t]
  17329. Filename=UWFX5TNetInstaller.exe
  17330. Confirmed=X
  17331. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojdownldrbo.html" target=_blank>DOWNLDR-BO</a> TROJAN!
  17332. [ni.uwfx5v_0001_0802]
  17333. Filename=UWFX5V_0001_0802NetInstaller.exe
  17334. Confirmed=X
  17335. Description=WinFixer web installer. Winfixer is "Foistware", pretending to be system optimization, protection and recovery software - stealth installed, see <a href="http://research.sunbelt-software.com/threat_display.cfm?name=misc.winsoftware.winfixer&threatid=40196" target=_blank>here</a>
  17336. [nicedownloads]
  17337. Filename=rundll32.exe MSA64CHK.dll, DllMostrar
  17338. Confirmed=X
  17339. Description=<a href="http://research.sunbelt-software.com/threat_display.cfm?name=MatrixDialer&threatid=14914&search=MatrixDialer" target=_blank>MatrixDialer</a> related
  17340. [nielsen netratings]
  17341. Filename=insight.exe
  17342. Confirmed=N
  17343. Description=<a href="http://www.nielsen-netratings.com/mktg.jsp?section=ps" target="_blank">Nielsen NetRatings</a> -  "Provides real-time research and analysis about Internet users, delivering the timely, actionable data you need to make critical business decisions on your competition, your Web siteÆs audience and your customers". <font color="#FF0000">Is it required?</font>
  17344. [nihomeam]
  17345. Filename=LiteClientAM.exe
  17346. Confirmed=U
  17347. Description=A managed web based internet security service that provides comprehensive & total protection for laptops/desktops - regardless of how, when or where they connect to the Internet. Made by <a href="http://www.netintelligence.com/" target=_blank>Netintelligence Ltd</a>
  17348. [niklaus]
  17349. Filename=nikLaus.exe
  17350. Confirmed=X
  17351. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.hllw.niklas.html" target="_blank">NIKLAS</a> WORM!
  17352. [ninit]
  17353. Filename=NInit.exe
  17354. Confirmed=N
  17355. Description=Norton Uninstall Deluxe. Monitors programs being installed and logs them for removing later. Available via Start -> Programs for manual logging - not required
  17356. [nisserv]
  17357. Filename=NISSERV.EXE
  17358. Confirmed=Y
  17359. Description=Norton Personal Firewall
  17360. [nisum]
  17361. Filename=NISUM.EXE
  17362. Confirmed=Y
  17363. Description=Norton Personal Firewall
  17364. [nisvcloc]
  17365. Filename=niSvcLoc.exe
  17366. Confirmed=U
  17367. Description=Related to National Instruments Corp. <a href="http://www.ni.com/labview/" target=_blank>LabView</a>
  17368. [njg40]
  17369. Filename=NJG40.EXE
  17370. Confirmed=X
  17371. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/pwsteal.bancos.d.html" target="_blank">BANCOS.D</a> TROJAN!
  17372. [nkbmonitor]
  17373. Filename=NkbMonitor.exe
  17374. Confirmed=N
  17375. Description=Part of <a href="http://www.symantec.com/avcenter/venc/data/spyware.cmkeylogger.html" target=blank>Nikon PictureProject</a> - image management for Nikon digital cameras
  17376. [nkvmon.exe]
  17377. Filename=NkvMon.exe
  17378. Confirmed=N
  17379. Description=Nikon View 5 - for transferring pictures from Nikon digital cameras
  17380. [nkvwmon.exe]
  17381. Filename=NkVwMon.exe
  17382. Confirmed=N
  17383. Description=Nikon View - for transferring pictures from Nikon digital cameras
  17384. [nls keyboard]
  17385. Filename=keyboard.exe
  17386. Confirmed=X
  17387. Description=Added by a variant of the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.spybot.worm.html" target=_blank>SPYBOT</a> WORM!
  17388. [nls monitor]
  17389. Filename=nlsmon.exe
  17390. Confirmed=X
  17391. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotaxj.html" target=_blank>RBOT-AXJ</a> WORM!
  17392. [nmbgmonitor]
  17393. Filename=NMBgMonitor.exe
  17394. Confirmed=?
  17395. Description=Associated with the Nero digital media suite - <font color="#FF0000">what does it do and is it required?</font>
  17396. [nmgr]
  17397. Filename=nnmgr.exe
  17398. Confirmed=X
  17399. Description=Added by the <a href="http://www.sarc.com/avcenter/venc/data/adware.fftoolbar.html" target=_blank>Adware.FFToolBar</a> adware toolbar
  17400. [nmssvc]
  17401. Filename=NMSSVC.EXE
  17402. Confirmed=?
  17403. Description=NIC Management Service - diagnostics program for Intel Pro family network cards
  17404. [nmsvc]
  17405. Filename=nmSvc.exe
  17406. Confirmed=Y
  17407. Description=<a href="http://www.covenanteyes.com/about.php" target="_blank">Covenant Eyes</a> - surveillance software that creates records of everything people do on a computer, ie, spying or monitoring depending upon how you call it. Disabling it means loss of internet connection until renabled - therefore required if you use it
  17408. [nmtaskbarservice]
  17409. Filename=nMtsk.exe
  17410. Confirmed=?
  17411. Description=Taskbar control for ISDN <a href="http://netmod.intracom.gr/" target=_blank>NetMod</a> modem. <font color="#FF0000">What does it do and is it required?</font>
  17412. [nnqcouu]
  17413. Filename=nnqcouu.exe
  17414. Confirmed=X
  17415. Description=<a href="http://www.geekstogo.com/forum/The_ABI_Network-t42642.html" target="_blank">The Abi Network</a> adware
  17416. [nnsvc]
  17417. Filename=nnsvc.exe
  17418. Confirmed=U
  17419. Description=<a href="http://www.netnanny.com/products/netnanny5/index.html" target="_blank">NetNanny</a> internet filter
  17420. [no credit card]
  17421. Filename=plugin-[random].exe
  17422. Confirmed=X
  17423. Description=Adult content pop-up dialler
  17424. [no-ip duc]
  17425. Filename=DUC20.exe
  17426. Confirmed=U
  17427. Description=Part of <a href="http://www.no-ip.com" target="_blank">http://www.no-ip.com</a> provided service. Keeps No-IP's dynamic nameserver (DNS) updated if and when your computer's (network's) dynamic IP-address changes so that you can run servers on computers with dynamic IP. Shortcut available
  17428. [noads]
  17429. Filename=NoAds.exe
  17430. Confirmed=U
  17431. Description=Blocks advertisement banners in Internet Explorer
  17432. [noadware]
  17433. Filename=NoAdware.exe
  17434. Confirmed=U
  17435. Description=NoAdware Adware/Spyware remover - initially considerered a "rogue" program - see <a href="http://www.adwarereport.com/mt/archives/000023.html" target=_blank>here</a>. Has since apparently mended its ways: see <a href="http://www.spywarewarrior.com/rogue_anti-spyware.htm#naw_note" target=_blank>note</a>
  17436. [noadware3]
  17437. Filename=NoAdware3.exe
  17438. Confirmed=U
  17439. Description=NoAdware Adware/Spyware remover - initially considerered a "rogue" program - see <a href="http://www.adwarereport.com/mt/archives/000023.html" target=_blank>here</a>. Has since apparently mended its ways: see <a href="http://www.spywarewarrior.com/rogue_anti-spyware.htm#naw_note" target=_blank>note</a>
  17440. [nocana]
  17441. Filename=[path to worm]
  17442. Confirmed=X
  17443. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32anaconb.html" target=_blank>ANACON-B</a> WORM!
  17444. [nod32 free antivirus]
  17445. Filename=nod32krn.exe
  17446. Confirmed=X
  17447. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotaao.html" target=_blank>RBOT-AAO</a> WORM! Note - not the popular free <a href="http://www.nod32.com/home/home.htm" target=_blank>Nod32</a> antivirus software, which shares the same filename
  17448. [nod32cc]
  17449. Filename=nod32cc.exe
  17450. Confirmed=U
  17451. Description=Control Center part of Eset's <a href="http://www.nod32.com/home/home.htm" target="_blank">NOD32</a> virus-scanner. Leave this enabled if you want to update your virus data files via the click of a button
  17452. [nod32kernel]
  17453. Filename=Nod32krn.exe
  17454. Confirmed=Y
  17455. Description=<a href="http://www.nod32.com/home/home.htm" target="_blank">Nod32</a> Antivirus Version 2
  17456. [nod32kui]
  17457. Filename=nod32kui.exe
  17458. Confirmed=Y
  17459. Description=<a href="http://www.nod32.com/home/home.htm" target="_blank">Nod32</a> Antivirus Version 2
  17460. [nod32pop3]
  17461. Filename=Pop3scan.exe
  17462. Confirmed=Y
  17463. Description=POP3 E-mail part of Eset's <a href="http://www.nod32.com/home/home.htm" target="_blank">NOD32</a> virus-scanner
  17464. [nod3d2 free antivirus]
  17465. Filename=N0D32KRN.EXE
  17466. Confirmed=X
  17467. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotabq.html" target= blank>RBOT-ABQ</a> WORM!
  17468. [nodemnger]
  17469. Filename=Nodemngr.exe
  17470. Confirmed=?
  17471. Description=<font color="#FF0000">Part of the Dell OpenManage Client installation - to allow Dell representatives to remote logon?</font>
  17472. [nodriver]
  17473. Filename=AUEKXRZ.EXE
  17474. Confirmed=X
  17475. Description=Added by a variant of the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.spybot.worm.html" target="_blank">SPYBOT</a> WORM!
  17476. [noha]
  17477. Filename=aasd.exe
  17478. Confirmed=X
  17479. Description=<a href="http://research.sunbelt-software.com/threat_display.cfm?name=ClickSpring.PuritySCAN&threatid=10115" target=_blank>PurityScan/Clickspring</a> adware
  17480. [nokia connection monitor]
  17481. Filename=NclConf.exe
  17482. Confirmed=N
  17483. Description=Monitors the infrared port, the serial ports and the Bluetooth for a Nokia phone connection. It is installed by the Nokia PC Suite (and Nokia PC Connectivity SDK), and the tray icon shows if a phone has been connected. If you have a conflict with another program, such as TV tuner card remote control monitor, you can disable it, and run only when needed. Available via a desktop shortcut or Start -> Programs - not required
  17484. [nokia tray application]
  17485. Filename=NclTray.exe
  17486. Confirmed=U
  17487. Description=Nokia PC Suite 5 - "A collection of powerful tools that you can use to manage your phone features and data." Synchronize the phone with, for example Outlook. You can also use it to browse your phone, edit the phone list and so on
  17488. [nomad detector]
  17489. Filename=ctnmrun.exe
  17490. Confirmed=U
  17491. Description=Detects the Creative NOMAD jukebox/MP3 player at the time it is attached to USB and starts the needed application (Creative PlayCentre 2) that you use to copy MP3 files to and from it. This is required if you want PlayCentre 2 to take control of the NOMAD once connected
  17492. [nomdcheck]
  17493. Filename=nomdchek.exe
  17494. Confirmed=N
  17495. Description=Part of Intel's Native Audio
  17496. [nomtray]
  17497. Filename=nomtray.exe
  17498. Confirmed=U
  17499. Description=System Tray access to NetMotion Wireless options - including connectivity status (see <a href="http://www.netmotionwireless.com/support/technotes/2140.asp" target=_blank>here</a>)
  17500. [norman zanda]
  17501. Filename=ZLH.EXE
  17502. Confirmed=U
  17503. Description=System Tray icon for <a href="http://www.norman.com/" target="_blank">Norman Antivirus</a>
  17504. [norten software intrenet]
  17505. Filename=norten.pif
  17506. Confirmed=X
  17507. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotawa.html" target=_blank>RBOT-AWA</a> WORM!
  17508. [norton antivirus]
  17509. Filename=nortonav.exe
  17510. Confirmed=X
  17511. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotaye.html" target=_blank>RBOT-AYE</a> TROJAN! Note - this is not the real Norton AV!
  17512. [norton antivirus 2004]
  17513. Filename=SYMANTECAV2.EXE
  17514. Confirmed=X
  17515. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32spybotdy.html" target=_blank>SPYBOT-DY</a> WORM! Note - this is not the real Norton AV!
  17516. [norton antivirus 7.0a]
  17517. Filename=[path to file]
  17518. Confirmed=X
  17519. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojperdab.html" target=_blank>PERDA-B</a> or <a href="http://www.sophos.com/virusinfo/analyses/trojranckct.html" target=_blank>RANCK-CT</a> TROJANS!
  17520. [norton antivirus av]
  17521. Filename=FVProtect.exe
  17522. Confirmed=X
  17523. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.netsky.p@mm.html" target="_blank">NETSKY.P</a> WORM! Note - this is not the popular AV software!
  17524. [norton antivirus sys]
  17525. Filename=NAVsys32.exe
  17526. Confirmed=X
  17527. Description=Added by a variant of the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_WOOTBOT.GEN" target=_blank>WOOTBOT</a> WORM!
  17528. [norton auto protect]
  17529. Filename=nava.exe
  17530. Confirmed=X
  17531. Description=Added by an unidentified WORM or TROJAN!
  17532. [norton av preload]
  17533. Filename=Premend.exe
  17534. Confirmed=?
  17535. Description=Norton Antivirus related. <font color="#FF0000"> What does it do and is it required</font>
  17536. [norton crashguard monitor]
  17537. Filename=cgmenu.exe
  17538. Confirmed=N
  17539. Description=Troublesome program that doesn't actually work with WinME so Norton removed it from SystemWorks 2001
  17540. [norton disk doctor]
  17541. Filename=Ndd32.exe
  17542. Confirmed=N
  17543. Description=Norton Disk Doctor from Norton Utilities. Automatically runs at start-up, checking for disk errors. Better than ScanDisk but can be started manually via Start -> Programs. Delete the shortcut in the Start -> Programs -> Startup folder as well
  17544. [norton drive protection]
  17545. Filename=msdt32.exe
  17546. Confirmed=X
  17547. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32forbotgb.html" target=_blank>FORBOT-GB</a> WORM! Note - this not a valid Norton program!
  17548. [norton email protect]
  17549. Filename=POPROXY.EXE
  17550. Confirmed=Y
  17551. Description=Proxy E-mail protection from Norton Anti-Virus (prior to 2002). If you have it installed, leave it enabled to automatically check for suspect attachments in E-mails that may contain viruses. It downloads the E-mail into poproxy, which serves as a proxy server on the local machine, before scanning it
  17552. [norton firewall]
  17553. Filename=[path to trojan]
  17554. Confirmed=X
  17555. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojbankeret.html" target=_blank>BANKER-ET</a> TROJAN!
  17556. [norton ghost 9.0]
  17557. Filename=GhostTray.exe
  17558. Confirmed=N
  17559. Description=<a href="http://www.symantec.com/sabu/ghost/ghost_personal/" target=_blank>Norton Ghost</a> tray icon - the application can be launched manually
  17560. [norton guard 32]
  17561. Filename=ntguard32.exe
  17562. Confirmed=X
  17563. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  17564. [norton live update server]
  17565. Filename=cpsdv.exe
  17566. Confirmed=X
  17567. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_AGOBOT.EW" target="_blank">AGOBOT.EW</a> TROJAN!
  17568. [norton navigator loader]
  17569. Filename=nnloader.exe
  17570. Confirmed=N
  17571. Description=An older Norton utility for file management under Windows 95. More information <a href="http://www.mg.co.za/mg/pc/history/dec10-nortnavigator.html" target="_blank">here</a>
  17572. [norton program scheduler event checker]
  17573. Filename=npscheck.exe
  17574. Confirmed=?
  17575. Description=<font color="#FF0000">Part of Norton Anti-Virus. What does it do? Apparently it can safely be disabled without causing problems. Can also be listed as NPS Event Checker</font>
  17576. [norton protect]
  17577. Filename=npprotect.exe
  17578. Confirmed=X
  17579. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotww.html" target= blank>RBOT-WW</a> WORM!
  17580. [norton protect activies]
  17581. Filename=csrss.exe
  17582. Confirmed=X
  17583. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojbankercz.html" target=_blank>BANKER-CZ</a> TROJAN! Note - this is not the legitimate <a href="http://www.liutilities.com/products/wintaskspro/processlibrary/csrss/" target=_blank>csrss.exe</a> process which is always located in the System (9x/Me) or System32 (NT/2K/XP) folder and should not normally figure in Msconfig/Startup! This file is located in a "D5133" subfolder
  17584. [norton service driver]
  17585. Filename=wsul.exe
  17586. Confirmed=X
  17587. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotabi.html" target= blank>RBOT-ABI</a> WORM!
  17588. [norton service process]
  17589. Filename=navapvc.exe
  17590. Confirmed=X
  17591. Description=Added by a variant of the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_AGOBOT.GEN" target=_blank>AGOBOT/GAOBOT</a> WORM!
  17592. [norton spysweeper autoupdate]
  17593. Filename=navsw.exe
  17594. Confirmed=X
  17595. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32forbotas.html" target="_blank">FORBOT-AS</a> WORM!
  17596. [norton system doctor]
  17597. Filename=Sysdoc32.exe
  17598. Confirmed=N
  17599. Description=Norton Disk Doctor from Norton Utilities. Automatically runs at start-up, major resource hog and best started manually form Start -> Programs. Delete the shortcut in the Start -> Programs -> Startup folder as well
  17600. [norton systemworks]
  17601. Filename=cfgwiz.exe
  17602. Confirmed=N
  17603. Description=Norton System Works configuration wizard. Reportedly a resource hog. Many users find they can live without loading it
  17604. [norton updated]
  17605. Filename=NVSV32.EXE
  17606. Confirmed=X
  17607. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_SDBOT.ABH&VSect=P" target=_blank>SDBOT.ABH</a> WORM!
  17608. [norton wizzard]
  17609. Filename=nwiz.exe
  17610. Confirmed=X
  17611. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.gaobot.zx.html" target="_blank">GAOBOT.ZX</a> or <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.gaobot.adv.html" target="_blank">GAOBOT.ADV</a> WORMS! Note - this is not the valid nVidia application that shares the same name
  17612. [norton32]
  17613. Filename=norton32.exe
  17614. Confirmed=X
  17615. Description=Added by an unidentified VIRUS, WORM or TROJAN!
  17616. [nortonantivirus]
  17617. Filename=LSASS.exe
  17618. Confirmed=X
  17619. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.pexmor@mm.html" target=_blank>PEXMOR</a> WORM! Note - this is not the legitimate <a href="http://www.liutilities.com/products/wintaskspro/processlibrary/lsass/" target=_blank>lsass.exe</a> process which is always located in the System (9x/Me) or System32 (NT/2K/XP) folder and should not normally figure in Msconfig/Startup! This file is located in a "Temp" subfolder of the Winnt or Windows folder. It also has nothing to do with Norton AV
  17620. [nortons av system]
  17621. Filename=scvchost.exe
  17622. Confirmed=X
  17623. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  17624. [nortonsantivirus]
  17625. Filename=ccEvtMngr.exe
  17626. Confirmed=X
  17627. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojhzdoora.html" target=_blank>HZDOOR-A</a> TROJAN!
  17628. [nortonvplus]
  17629. Filename=svchost.exe
  17630. Confirmed=X
  17631. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojroamera.html" target=_blank>ROAMER-A</a> TROJAN! Note - this is not the legitimate <a href="http://www.liutilities.com/products/wintaskspro/processlibrary/svchost/" target=_blank>svchost.exe</a> process which should not normally figure in Msconfig/Startup!
  17632. [notebook maximizer]
  17633. Filename=maximizer_startup.exe
  17634. Confirmed=U
  17635. Description=Toshiba Notebook Maximizer software - adjust settings to save battery power and increase efficiency
  17636. [notebookmanager]
  17637. Filename=nbm.exe
  17638. Confirmed=?
  17639. Description=<font color="#FF0000">Associated with Acer notebook PCs. What does it do and is it required?</font>
  17640. [notepad]
  17641. Filename=NOTEPAD.exe
  17642. Confirmed=X
  17643. Description=Added as the result of the RUSTY VIRUS! Note - not to be confused with the valid Windows "NOTEPAD" text editor! This malware actually changes the default value data of the Registry "Run" key in order to force Windows to launch it at boot. Name field may be empty
  17644. [notepad lptt01]
  17645. Filename=notepad.exe
  17646. Confirmed=X
  17647. Description=<a href="http://www.wilderssecurity.net/specialinfo/rapidblaster.html" target="_blank">RapidBlaster</a> variant (in a "Notepad" folder in Program Files). Recommended you use RapidBlaster Killer to uninstall - see <a ref="http://www.wilderssecurity.net/specialinfo/rapidblaster.html#removal" target="_blank"> here</a>. Note - this is not Windows Notepad which has the same executable name
  17648. [notepad ml097e]
  17649. Filename=notepad.exe
  17650. Confirmed=X
  17651. Description=<a href="http://www.wilderssecurity.net/specialinfo/rapidblaster.html" target="_blank">RapidBlaster</a> variant (in a "Notepad" folder in Program Files). Recommended you use RapidBlaster Killer to uninstall - see <a ref="http://www.wilderssecurity.net/specialinfo/rapidblaster.html#removal" target="_blank"> here</a>. Note - this is not Windows Notepad which has the same executable name
  17652. [notepad2.exe]
  17653. Filename=popuper.exe
  17654. Confirmed=X
  17655. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojpupere.html" target= blank>PUPER-E</a> TROJAN!
  17656. [notes]
  17657. Filename=notepaad.exe
  17658. Confirmed=X
  17659. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_RBOT.BME&VSect=P" target=_blank>RBOT.BME</a> WORM!
  17660. [notification utility]
  17661. Filename=altpayV2.exe
  17662. Confirmed=X
  17663. Description=Reported by <a href="http://www.ewido.net/en/" target=_blank>Ewido Security Suite</a> as WeirWeb ADWARE!
  17664. [novaportal single user service]
  17665. Filename=NPSU.exe
  17666. Confirmed=?
  17667. Description=<font color="#FF0000">??</font>
  17668. [novastorschedulerd]
  17669. Filename=SCHENGD.EXE
  17670. Confirmed=U
  17671. Description=NovaStor NovaBACKUP Scheduler - back-up utility. If you don't have regularly scheduled back-ups you don't need it
  17672. [noypi_kang_astig]
  17673. Filename=Exit to DosPrompt.pif
  17674. Confirmed=X
  17675. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.filukin.a@mm.html" target=_blank>FILUKIN.A</a> WORM!
  17676. [npf value]
  17677. Filename=NPFMONTR.exe
  17678. Confirmed=X
  17679. Description=Added by a variant of the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.spybot.worm.html" target=_blank>SPYBOT</a> WORM!
  17680. [npfmonitor]
  17681. Filename=NPFMntor.exe
  17682. Confirmed=?
  17683. Description=Norton AntiVirus Firewall Install Monitor. <font color="#FF0000">What does it do and is it required?</font>
  17684. [nprotect]
  17685. Filename=nprotect.exe
  17686. Confirmed=U
  17687. Description=Norton Protected Recycle Bin from Norton Utilities. Adds an extra layer of safety before you remove deleted files from the Recycled Bin. Can be listed twice which is valid - see <a href="http://service1.symantec.com/SUPPORT/nunt.nsf/e35d98be79cddc2785256951004d59cd/b6cb75a0d23fd6fb8825662f00734a64?OpenDocument&src=bar_sc" target="_blank"> here</a>
  17688. [nps event checker]
  17689. Filename=npscheck.exe
  17690. Confirmed=?
  17691. Description=<font color="#FF0000">Part of Norton Anti-Virus. What does it do? Apparently it can safely be disabled without causing problems. Can also be listed as </font>Norton Program Scheduler Event Checker
  17692. [ns]
  17693. Filename=ns.exe
  17694. Confirmed=X
  17695. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32agoboths.html" target=_blank>AGOBOT-HS</a> WORM!
  17696. [nscheck]
  17697. Filename=NSCHECK.EXE
  17698. Confirmed=X
  17699. Description=<a href="http://www.doxdesk.com/parasite/MarketScore.html" target=_blank>NetSetter/Marketscore</a> foistware
  17700. [nscntrl]
  17701. Filename=nscntrl.exe
  17702. Confirmed=X
  17703. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojdloaddc.html" target=_blank>DLOAD-DC</a> TROJAN!
  17704. [nsdcmd services]
  17705. Filename=nsdcmdav.exe
  17706. Confirmed=X
  17707. Description=Added by a variant of the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_AGOBOT.GEN" target=_blank>AGOBOT/GAOBOT</a> WORM!
  17708. [nsdcmd vid process]
  17709. Filename=nsdcmdwin.exe
  17710. Confirmed=X
  17711. Description=Added by a variant of the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_AGOBOT.GEN" target=_blank>AGOBOT/GAOBOT</a> WORM!
  17712. [nsdlua]
  17713. Filename=nsdlua.exe
  17714. Confirmed=X
  17715. Description=All-In-One Telcom - adult content dialler
  17716. [nsdriver]
  17717. Filename=nssys32.exe
  17718. Confirmed=X
  17719. Description=<a href="http://doxdesk.com/parasite/NetShagg.html" target=_blank>NetShagg</a> adware
  17720. [nse]
  17721. Filename=nse.exe
  17722. Confirmed=X
  17723. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32agobotml.html" target=_blank>AGOBOT-ML</a> WORM!
  17724. [nsengine]
  17725. Filename=Nsengine.exe
  17726. Confirmed=U
  17727. Description=Scheduling engine of <a href="http://www.no-panic.com/backup/n_backup.html" target="_blank"> NovaSTOR Backup</a> Service. Only required if scheduling is enabled and wanted - see <a href="http://www.no-panic.com/backup/tech_supt/nbackup7_commandline.html" target="_blank"> here</a>
  17728. [nshelper]
  17729. Filename=aexnsinstallhelper.exe
  17730. Confirmed=U
  17731. Description=Altiris Express Notification Server Install helper - monitors integrity of the installation
  17732. [nssysconf]
  17733. Filename=[random filename]
  17734. Confirmed=X
  17735. Description=Added by the <a href="http://de.trendmicro-europe.com/enterprise/security_info/ve_detail.php?id=59209&VName=TROJ_VIVIA.A&VSect=T" target="_blank">VIVIA.A</a> TROJAN!
  17736. [nstat]
  17737. Filename=netstat.exe
  17738. Confirmed=X
  17739. Description=Adult content dialler
  17740. [nsupdate]
  17741. Filename=NSupdate.exe
  17742. Confirmed=X
  17743. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/diallaetb.html" target=_blank>Dial/Laet-B</a> premium rate dialer!
  17744. [nsv]
  17745. Filename=nsvsvc.exe
  17746. Confirmed=X
  17747. Description=<a href="http://securityresponse.symantec.com/avcenter/venc/data/adware.delfin.html" target=_blank>Delfin Promulgate</a> adware
  17748. [nsvcin]
  17749. Filename=n20050308.exe
  17750. Confirmed=X
  17751. Description=Adware, probably <a href="http://sarc.com/avcenter/venc/data/adware.look2me.html" target=_blank>VX2/Look2Me</a> related
  17752. [nsvdr]
  17753. Filename=nsvdr.exe
  17754. Confirmed=X
  17755. Description=Adult content dialler
  17756. [nsys]
  17757. Filename=nsys.exe
  17758. Confirmed=U
  17759. Description=<a href="http://www.symantec.com/avcenter/venc/data/spyware.netspy.html" target= blank>NetSpy</a> keystroke logger/monitoring program - remove unless you installed it yourself!
  17760. [nsys32]
  17761. Filename=nsys32.exe
  17762. Confirmed=X
  17763. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32agobotsu.html" target=_blank>AGOBOT-SU</a> WORM!
  17764. [nsystemmonitor]
  17765. Filename=Symmon.exe
  17766. Confirmed=N
  17767. Description=Norton Uninstall Deluxe - monitors programs being installed and logs them for removing later. Available via Start -> Programs for manual logging
  17768. [nt kernel patch]
  17769. Filename=ntkrnlpt.exe
  17770. Confirmed=N
  17771. Description=<a href="http://www.accpac.com/products/communication/faxserve/" target="_blank">FaxServe</a> network fax software
  17772. [nt logging service]
  17773. Filename=Syslog32.exe
  17774. Confirmed=X
  17775. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.hllw.donk.b.html" target="_blank">DONK.B</a> or  <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.hllw.donk.c.html" target="_blank">DONK.C</a> or <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.hllw.donk.l.html" target="_blank">DONK.L</a> or <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.hllw.donk.m.html" target="_blank">DONK.M</a> or <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.hllw.donk.o.html" target="_blank">DONK.O</a> WORMS!
  17776. [nt microsoft svcd]
  17777. Filename=ntvsvcd.exe
  17778. Confirmed=X
  17779. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  17780. [nt security]
  17781. Filename=rundll32.com
  17782. Confirmed=X
  17783. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotajc.html" target=_blank>RBOT-AJC</a> WORM!
  17784. [nt service]
  17785. Filename=NTOKSRNL.EXE
  17786. Confirmed=X
  17787. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotaag.html" target=_blank>RBOT-AAG</a> WORM!
  17788. [nt services]
  17789. Filename=ntsvc.exe
  17790. Confirmed=X
  17791. Description=Added by the <a href="http://uk.trendmicro-europe.com/enterprise/security_info/ve_detail.php?Vname=WORM_AGOBOT.VJ" target="_blank">AGOBOT.VJ</a> WORM!
  17792. [nt virtual machine]
  17793. Filename=[path to file]
  17794. Confirmed=X
  17795. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32scaerbota.html" target= blank>SCAERBOT-A</a> WORM!
  17796. [nt-virtual device manager]
  17797. Filename=ntvdmn.exe
  17798. Confirmed=X
  17799. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32sdbotaaa.html" target=_blank>SDBOT-AAA</a> WORM!
  17800. [ntcheck]
  17801. Filename=mapserver.exe
  17802. Confirmed=X
  17803. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojtompaib.html" target=_blank>TOMPAI-B</a> WORM!
  17804. [ntcommlib3]
  17805. Filename=NTCommLib3.exe
  17806. Confirmed=X
  17807. Description=<a href="http://securityresponse.symantec.com/avcenter/venc/data/adware.admess.html" target=_blank>Admess</a> adware variant
  17808. [ntddetect]
  17809. Filename=ntddetect.exe
  17810. Confirmed=X
  17811. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojagentcu.html" target=_blank>AGENT-CU</a> TROJAN!
  17812. [ntdll]
  17813. Filename=ntdll.exe
  17814. Confirmed=X
  17815. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.bionet.404.html" target="_blank">BIONET.404</a> TROJAN!
  17816. [ntdlm]
  17817. Filename=csrss.exe
  17818. Confirmed=X
  17819. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.hale.html" target=_blank>HALE</a> TROJAN! Note - this is not the legitimate <a href="http://www.liutilities.com/products/wintaskspro/processlibrary/csrss/" target=_blank>csrss.exe</a> process which is always located in the System (9x/Me) or System32 (NT/2K/XP) folder and should not normally figure in Msconfig/Startup! This file is located in a "Qossrv" subfolder
  17820. [ntech.patchs]
  17821. Filename=[trojan filename]
  17822. Confirmed=X
  17823. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/pwsteal.lemir.g.html" target="_blank">LEMIR.G</a> TROJAN!
  17824. [ntechin]
  17825. Filename=n20050308.exe
  17826. Confirmed=X
  17827. Description=Adware, probably <a href="http://sarc.com/avcenter/venc/data/adware.look2me.html" target=_blank>VX2/Look2Me</a> related
  17828. [ntfs16]
  17829. Filename=ntfs16.exe
  17830. Confirmed=X
  17831. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotly.html" target="_blank">RBOT-LY</a> WORM!
  17832. [ntfsclup]
  17833. Filename=NTFSCLUP.EXE
  17834. Confirmed=Y
  17835. Description=Part of ConfigSafe- "checks if an ntfssos restore has been performed since it was last run. It exits immediately after running. 99+% of the time it will only execute about a dozen instructions before exiting"
  17836. [ntfsmonitorpro]
  17837. Filename=ntfs64.exe
  17838. Confirmed=X
  17839. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32forboteb.html" target=_blank>FORBOT-EB</a> WORM!
  17840. [ntldr]
  17841. Filename=ntldr.exe
  17842. Confirmed=X
  17843. Description=Browser hijacker to search-control.com (TrojanDropper.Win32.Small.ig). In addition to Registry changes found by HijackThis, also creates the following system files: C:\WINDOWS\SYSTEM\ntldr.exe, C:\m.exe, C:\WINDOWS\Search-For-You.url, C:\n.bat, C:\q.exe, C:\r.bat
  17844. [ntlfreedom]
  17845. Filename=rundll32 [path] RyDial.dll, QuickStart
  17846. Confirmed=N
  17847. Description=<a href="http://secure.ntlfreedom.com/bundled/bundle_DialUp.aspx" target="_blank">NTL Freedom</a> dial-up ISP software - not required
  17848. [ntp server]
  17849. Filename=[path to trojan]
  17850. Confirmed=X
  17851. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.ranky.f.html" target="_blank">RANKY.F</a> TROJAN!
  17852. [ntrayfw]
  17853. Filename=ntrayfw.exe
  17854. Confirmed=Y
  17855. Description=Software interface for NVIDIA ActiveArmor - hardware firewall built into nVidia nForce motherboard chipsets
  17856. [ntrtc]
  17857. Filename=ntrtc.exe
  17858. Confirmed=N
  17859. Description=Dell year 2000 tool to deal with non-standard applications. Only required on older Dell PCs that may need this support - see <a href="http://www.euro.dell.com/countries/ae/enu/bsd/topics/y2k_rtctest.htm" target="_blank">here</a>
  17860. [ntset32]
  17861. Filename=services.exe
  17862. Confirmed=X
  17863. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojwinspyc.html" target=_blank>WINSPY-C</a> TROJAN! Note - this is not the legitimate <a href="http://www.liutilities.com/products/wintaskspro/processlibrary/services/" target="_blank">services.exe</a> process which is always located in the System (9x/Me) or System32 (NT/2K/XP) folder and should not normally figure in Msconfig/Startup! This file is located in a "dll32" subfolder of the Windows or Winnt folder
  17864. [ntsmod]
  17865. Filename=ntsmod.exe
  17866. Confirmed=X
  17867. Description=Adware downloader/installer, probably <a href="http://sarc.com/avcenter/venc/data/adware.look2me.html" target=_blank>VX2/Look2Me</a> related - also detected as the WIN32.VB.RL TROJAN!
  17868. [ntsocket]
  17869. Filename=NoeWinnt.exe
  17870. Confirmed=X
  17871. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojatakae.html" target="_blank">ATAKA-E</a> TROJAN!
  17872. [ntsrv.exe]
  17873. Filename=NTsrv.exe
  17874. Confirmed=X
  17875. Description=Added by a variant of the <a href="http://www.sophos.com/virusinfo/analyses/trojservuo.html" target=_blank>SERVU-O</a> TROJAN!
  17876. [ntune]
  17877. Filename=nTune.exe
  17878. Confirmed=U
  17879. Description=nVidia <a href="http://www.nvidia.com/object/ntune_2.00.23.html" target="_blank">nTune</a> - motherboard monitoring and overclocking utility for nVidia nForce chipset based motherboards
  17880. [ntupd32]
  17881. Filename=ntupd32.exe
  17882. Confirmed=X
  17883. Description=Unidentified adware/spyware
  17884. [ntupdate]
  17885. Filename=dnsvc.exe
  17886. Confirmed=X
  17887. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32sdbottc.html" target=_blank>SDBOT-TC</a> WORM!
  17888. [ntupdater]
  17889. Filename=[path to trojan]
  17890. Confirmed=X
  17891. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojdigarixd.html" target=_blank>DIGARIX-D</a> TROJAN!
  17892. [ntvdm]
  17893. Filename=NTVDM.EXE
  17894. Confirmed=U
  17895. Description=Windows NT Virtual DOS Machine (NTVDM) for running 16-bit tasks on the 32-bit OS's (Windows NT, 2K and XP). Required if hardware on a machine with these OS's needs 16-bit DOS drivers. You can find a bit more about NTVDM <a href="http://support.microsoft.com/default.aspx?scid=kb;en-us;Q264320" target="_blank">here</a>
  17896. [ntvdmd]
  17897. Filename=ntvdmd.exe
  17898. Confirmed=X
  17899. Description=Adware downloader - also detected as the <a href="http://www.sophos.com/virusinfo/analyses/trojdloaderyp.html" target=_blank>DLOADER-YP</a> TROJAN!
  17900. [ntvdscm]
  17901. Filename=ntvdscm.exe
  17902. Confirmed=X
  17903. Description=Added by the <a href="http://uk.trendmicro-europe.com/enterprise/security_info/ve_detail.php?id=66002&VName=TROJ_SCKEYLOG.O&VSect=O" target="_blank">SCKEYLOG.O</a> TROJAN!
  17904. [nutcsetupenviron]
  17905. Filename=ncoeenv.exe
  17906. Confirmed=Y
  17907. Description=Used by the <a href="http://www.mkssoftware.com/products/tk/ds_tkedev.asp" target="_blank">MKS Toolkit for Enterprise Developers</a> product. NuTCracker is a Unix runtime environment for Windows, so disabling this would be unwise if you are using NuTCracker or any 3rd party package that is using it. Since you might not know what is actually using it it's probably best left alone
  17908. [nvagnt]
  17909. Filename=nvagNT.exe
  17910. Confirmed=X
  17911. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32agobotrv.html" target= blank>AGOBOT-RV</a> WORM!
  17912. [nvc win32]
  17913. Filename=nvcvc.exe
  17914. Confirmed=X
  17915. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotadd.html" target=_blank>RBOT-ADD</a> WORM!
  17916. [nvclock]
  17917. Filename=rundll32 nvclock.dll, fnNvclock
  17918. Confirmed=?
  17919. Description=<font color="#FF0000">Overclocking utility for nVidia based graphics cards?</font>
  17920. [nvcolorinit]
  17921. Filename=rundll32.exe NvQtwk.dll, NvColorInit
  17922. Confirmed=?
  17923. Description=<font color="#FF0000">Associated with Nvidia based graphics cards</font>
  17924. [nvcom]
  17925. Filename=NVCOM.exe
  17926. Confirmed=X
  17927. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32agobotsb.html" target= blank>AGOBOT-SB</a> WORM!
  17928. [nvcpldaemon32]
  17929. Filename=anvshell32.exe
  17930. Confirmed=X
  17931. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojvbxu.html" target=_blank>XU</a> TROJAN!
  17932. [nvcpldeamon]
  17933. Filename=nvdisp.exe
  17934. Confirmed=X
  17935. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojpeepviei.html" target=_blank>PEEPVIE-I</a> TROJAN!
  17936. [nvcpldmn]
  17937. Filename=NAVSVC.EXE
  17938. Confirmed=X
  17939. Description=Added by an unidentified VIRUS, WORM or TROJAN!
  17940. [nvctrl.exe]
  17941. Filename=nvctrl.exe
  17942. Confirmed=X
  17943. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/trojan.zlob.g.html" target=_blank>ZLOB.G</a> TROJAN!
  17944. [nvd32 lptt01]
  17945. Filename=nvd32.exe
  17946. Confirmed=X
  17947. Description=<a href="http://www.wilderssecurity.net/specialinfo/rapidblaster.html" target="_blank">RapidBlaster</a> variant (in a "nvd32" folder in Program Files). Recommended you use RapidBlaster Killer to uninstall - see <a ref="http://www.wilderssecurity.net/specialinfo/rapidblaster.html#removal" target="_blank"> here</a>
  17948. [nvd32 ml097e]
  17949. Filename=nvd32.exe
  17950. Confirmed=X
  17951. Description=<a href="http://www.wilderssecurity.net/specialinfo/rapidblaster.html" target="_blank">RapidBlaster</a> variant (in a "nvd32" folder in Program Files). Recommended you use RapidBlaster Killer to uninstall - see <a ref="http://www.wilderssecurity.net/specialinfo/rapidblaster.html#removal" target="_blank"> here</a>
  17952. [nvid]
  17953. Filename=[8 random charachters]
  17954. Confirmed=X
  17955. Description=Unidentified adware
  17956. [nvid32]
  17957. Filename=Nvid32.exe
  17958. Confirmed=X
  17959. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/trojan.gema.html" target="_blank">GEMA</a> TROJAN!
  17960. [nvidex32]
  17961. Filename=Nvidex32.exe
  17962. Confirmed=X
  17963. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/trojan.gema.html" target="_blank">GEMA</a> TROJAN!
  17964. [nvidia activearmor]
  17965. Filename=ntrayfw.exe
  17966. Confirmed=Y
  17967. Description=Software interface for NVIDIA ActiveArmor - hardware firewall built into nVidia nForce motherboard chipsets
  17968. [nvidia control daemon]
  17969. Filename=nksvc32.exe
  17970. Confirmed=X
  17971. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32agobotov.html" target=_blank>AGOBOT-OV</a> WORM!
  17972. [nvidia control panel]
  17973. Filename=ncsvc32.exe
  17974. Confirmed=X
  17975. Description=Added by an unidentified VIRUS, WORM or TROJAN!
  17976. [nvidia driver]
  17977. Filename=MSPMSPSU.EXE
  17978. Confirmed=X
  17979. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_WOOTBOT.Y" target="_blank">WOOTBOT.Y</a> WORM!
  17980. [nvidia drivers]
  17981. Filename=nVidiaDrvers.exe
  17982. Confirmed=X
  17983. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32sdbotafx.html" target=_blank>SDBOT-AFX</a> WORM! Note - this is not related to any nVidia based motherboard or graphics card
  17984. [nvidia nforce apu1 utilities]
  17985. Filename=NVATray.exe
  17986. Confirmed=N
  17987. Description=nVidia's nForce Audio Processing Unit (<a href="http://www.nvidia.com/object/apu.html" target="_blank">APU</a>)- "provides 3D positional audio and DirectX 8.0 compatibility, and encodes and decodes Dolby Digital 5.1 audio in real time"
  17988. [nvidia ntune]
  17989. Filename=nTune.exe
  17990. Confirmed=U
  17991. Description=nVidia <a href="http://www.nvidia.com/object/ntune_2.00.23.html" target="_blank">nTune</a> - motherboard monitoring and overclocking utility for nVidia nForce chipset based motherboards
  17992. [nvidia system utility]
  17993. Filename=NVSystemUtility.exe
  17994. Confirmed=U
  17995. Description=<a href="http://www.nvidia.com/object/sysutility 1.0.html" target= blank>NVidia System Utility</a> lets you adjust bus speeds, hardware voltages, memory controller timings, and fan speed as well as additional settings to increase performance aggressiveness and hardware voltages. Will also display a dynamic graph of CPU and system temperatures, hardware voltages, and memory bus speeds
  17996. [nvidia32]
  17997. Filename=nvidia32.exe
  17998. Confirmed=X
  17999. Description=<a href="http://cwshredder.net/cwshredder/cwschronicles.html" target=_blank>CoolWebSearch</a> parasite variant - also detected as the <a href="http://www.sophos.com/virusinfo/analyses/trojhostsb.html" target= blank>HOSTS-B</a> TROJAN!
  18000. [nvidiaquicktweak]
  18001. Filename=rundll32.exe NvQtwk.dll, NvTaskbarInit
  18002. Confirmed=N
  18003. Description=System Tray icon used to manage settings for nVidia based graphics cards. May be required for some 3D applications to recognize your card correctly - such as the game "Everquest". Otherwise, settings can be changed manually via Display Properties
  18004. [nvidll32]
  18005. Filename=nvidll32.exe
  18006. Confirmed=X
  18007. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotxk.html" target= blank>RBOT-XK</a> WORM!
  18008. [nview]
  18009. Filename=rundll32.exe nview.dll, nViewLoadHook
  18010. Confirmed=U
  18011. Description=This is a DLL to enable multiple display monitors on a single computer. It can be a cause of numerous problems on some computers
  18012. [nviload32]
  18013. Filename=nviload32.exe
  18014. Confirmed=X
  18015. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32sdbotvt.html" target=_blank>SDBOT-VT</a> WORM!
  18016. [nvinitialize]
  18017. Filename=rundll32.exe NvQtwk.dll, NvXTInit
  18018. Confirmed=N
  18019. Description=Thought to enable the clock frequency option on nVidia control panels. You can overclock without leaving this enabled
  18020. [nvirundll]
  18021. Filename=nvirundll.exe
  18022. Confirmed=X
  18023. Description=Added by the <a href="http://www.symantec.com/avcenter/venc/data/w32.spybot.nps.html" target=_blank>SPYBOT.NPS</a> WORM!
  18024. [nvjxue]
  18025. Filename=nvjxue.exe
  18026. Confirmed=X
  18027. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32eyevegj.html" target=_blank>EYEVEG-J</a> WORM!
  18028. [nvmax]
  18029. Filename=NVmax.exe
  18030. Confirmed=Y
  18031. Description=NVmax is a old tweaking utility for NVidia graphics cards. In the startup list if the user chooses to overclock their card
  18032. [nvmctray]
  18033. Filename=RUNDLL32.EXE ...NVMCTRAY.DLL, NvTaskbarInit
  18034. Confirmed=N
  18035. Description=System Tray icon used to manage settings for nVidia based graphics cards. May be required for some 3D applications to recognize your card correctly - such as the game "Everquest". Otherwise, settings can be changed manually via Display Properties
  18036. [nvmediacenter]
  18037. Filename=RunDLL32.exe NvMCTray.dll, NvTaskbarInit
  18038. Confirmed=U
  18039. Description=System Tray icon used to manage settings for nVidia based graphics cards. May be required for some 3D applications to recognize your card correctly - such as the game "Everquest". Otherwise, settings can be changed manually via Display Properties
  18040. [nvmixertray]
  18041. Filename=NVMixerTray.exe
  18042. Confirmed=N
  18043. Description=System Tray access to audio controls from nVidia's motherboard ForceWare software
  18044. [nvmsgdwn]
  18045. Filename=NVMSGDWN.EXE
  18046. Confirmed=X
  18047. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojgraberd.html" target=_blank>GRABER-D</a> TROJAN!
  18048. [nvquicktweak]
  18049. Filename=rundll32.exe NvQtwk.dll, NvTaskbarInit
  18050. Confirmed=N
  18051. Description=System Tray icon used to manage settings for nVidia based graphics cards. May be required for some 3D applications to recognize your card correctly - such as the game "Everquest". Otherwise, settings can be changed manually via Display Properties
  18052. [nvraidservice]
  18053. Filename=nvraidservice.exe
  18054. Confirmed=N
  18055. Description=nVidia <a href="http://www.nvidia.com/object/feature_raid.html" target="_blank">NVRaid</a> - hard disk striping/mirroring utility for increased performance and reliability. Doesn't seem to be required if you have a <a href="http://data-recovery.lsoft.net/concept_raid.html" target="_blank">RAID</a> setup as there is no performance difference without it
  18056. [nvrt]
  18057. Filename=nvrt.exe
  18058. Confirmed=N
  18059. Description=NVRefreshTool is a utility that will automatically detect the maximum refresh rate at each resolution that your monitor supports
  18060. [nvrtclk]
  18061. Filename=NVRTClk.exe
  18062. Confirmed=?
  18063. Description=Related to a Gigabyte video card. <font color="#FF0000">What does it do, and is it required?</font>
  18064. [nvsvca32]
  18065. Filename=nvsvca32.exe
  18066. Confirmed=X
  18067. Description=Added by the <a href="http://vic.zonelabs.com/tmpl/body/CA/virusDetails.jsp?VId=42022" target= blank>TACTSLAY.E</a> TROJAN!
  18068. [nvsystem32]
  18069. Filename=nvscv32.exe
  18070. Confirmed=X
  18071. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32agobotno.html" target=_blank>AGOBOT-NO</a> WORM!
  18072. [nvupdater]
  18073. Filename=nwiz32.exe
  18074. Confirmed=X
  18075. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  18076. [nvxpldeamon]
  18077. Filename=xstyles.exe
  18078. Confirmed=X
  18079. Description=Added by the SMALL.AJ VIRUS!
  18080. [nwereboot]
  18081. Filename=dummy.exe
  18082. Confirmed=?
  18083. Description=<font color="#FF0000">??</font>
  18084. [nwiz]
  18085. Filename=nwiz.exe
  18086. Confirmed=N
  18087. Description=Associated with the newer versions of nVidia graphics cards drivers.  Allows you to immensely improve desktop layouts by setting preferences and optimizations.  However, this isn't necessary for the operation of your system
  18088. [nwiz32]
  18089. Filename=nwiz32.exe
  18090. Confirmed=X
  18091. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojsinbanka.html" target=_blank>SINBANK-A</a> TROJAN!
  18092. [nwpopup]
  18093. Filename=Nwpopup.exe
  18094. Confirmed=Y
  18095. Description=Broadcast message handler part of <a href="http://www.novell.com/products/netware/" target=_blank>Novell Netware</a> that displays server, printer and other messages
  18096. [nwrecmsg]
  18097. Filename=nwrecmsg.exe
  18098. Confirmed=U
  18099. Description=Broadcast message handler part of <a href="http://www.novell.com/products/netware/" target=_blank>Novell Netware</a> that displays server, printer and other messages - can cause crashes
  18100. [nwss]
  18101. Filename=Sp0.exe
  18102. Confirmed=X
  18103. Description=Added by the <a href="http://www.symantec.com/avcenter/venc/data/spyware.spyoutside.html" target=_blank>SpyOutside</a> surveillance software. Uninstall this software unless you put it there yourself
  18104. [nwtray]
  18105. Filename=nwtray.exe
  18106. Confirmed=Y
  18107. Description=<a href="http://www.novell.com/products/netware/" target="_blank">Novell Netware</a>. Displays the red "N" tray icon which can be disabled (by right-click on the icon) but is also needed by the client
  18108. [oadaemon]
  18109. Filename=oadaemon.exe
  18110. Confirmed=?
  18111. Description=Background process that establishes connection with a C3-1000 scanner and watch general status of the device and for scanner button presses. <font color="#FF0000">Can it be started manually?</font>
  18112. [oahstifr]
  18113. Filename=oahstifr.exe
  18114. Confirmed=Y
  18115. Description=Comes with <a href="http://www.hypertextstudio.com" target="_blank">HyperTextStudio</a>. From the supplier - "The Osserver maintains the database for HyperText Studio projects - absolutely vital, it verifies all the links etc in a site. It runs as a service in NT, 2K and XP but needs to start up in Win 9.x so you'll see a DOS box for a short while during boot up."
  18116. [oakstart]
  18117. Filename=OAKSTART.EXE
  18118. Confirmed=U
  18119. Description=Sets the spindown timeout and access speeds at startup and displays a splash screen for CD-RW.
  18120. [oaktask]
  18121. Filename=OAKTASK.EXE
  18122. Confirmed=N
  18123. Description=Taskbar utility for a "control panel" for a CD-RW
  18124. [oasclnt]
  18125. Filename=oasclnt.exe
  18126. Confirmed=U
  18127. Description=McAfee VirusScan On-Access Scan Client service
  18128. [object store server]
  18129. Filename=osserver.exe
  18130. Confirmed=Y
  18131. Description=Comes with <a href="http://www.hypertextstudio.com" target="_blank">HyperTextStudio</a>. From the supplier - "The Osserver maintains the database for HyperText Studio projects - absolutely vital, it verifies all the links etc in a site. It runs as a service in NT, 2K and XP but needs to start up in Win 9.x so you'll see a DOS box for a short while during boot up."
  18132. [objtjprx]
  18133. Filename=objtjprx.exe
  18134. Confirmed=?
  18135. Description=<font color="#FF0000">??</font>
  18136. [obsver]
  18137. Filename=obsver.exe
  18138. Confirmed=?
  18139. Description=Part of <a href="http://www.lingoware.com/english/" target=_blank>LingoWare</a> translating software - <font color="#FF0000">what does it do and is it required?</font>
  18140. [ocaudioini]
  18141. Filename=OCAudioIni.exe
  18142. Confirmed=N
  18143. Description=<a href="http://www.streamware-dev.com/products.html" target="_blank">One-click Audio Converter</a> - allows you to convert files of multiple audio formats right from Windows Explorer
  18144. [ocraware]
  18145. Filename=ocraware.exe
  18146. Confirmed=N
  18147. Description=<u>O</u>ptical <u>C</u>haracter <u>R</u>ecognition software as part of OmniPage Limited Edition - supplied with some scanners. Scan directly into most word processor applications, such as Word, WordPerfect, etc. Available via Start -> Programs
  18148. [ocx32]
  18149. Filename=ocx32.exe
  18150. Confirmed=X
  18151. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.hllw.astef.html" target="_blank">ASTEF</a> or <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.hllw.repsan.html" target="_blank">RESPAN</a> WORMS!
  18152. [ocxupdt32]
  18153. Filename=ocxupdt32.exe
  18154. Confirmed=X
  18155. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32agobotif.html" target=_blank>AGOBOT-IF</a> WORM!
  18156. [od]
  18157. Filename=SYSCNTR.EXE
  18158. Confirmed=X
  18159. Description=HotVideo dialler
  18160. [od-matrxx]
  18161. Filename=od-matrxx.exe
  18162. Confirmed=X
  18163. Description=Adult dialler - xx can be any number
  18164. [od-stndxx]
  18165. Filename=od-stndxx.exe
  18166. Confirmed=X
  18167. Description=Adult dialler - xx can be any number
  18168. [od-teenxx]
  18169. Filename=od-teenxx.exe
  18170. Confirmed=X
  18171. Description=Adult dialler - xx can be any number
  18172. [odbc backup]
  18173. Filename=fdxxl.exe
  18174. Confirmed=U
  18175. Description=G Data "PC Spion" - monitoring and surveillance software, captures all users activity on the PC, see <a href="http://www.chip.de/artikel/c_artikel_8806643.html" target=_blank>here</a>. Disable/remove if you didn't install it yourself!
  18176. [oddworldz.exe]
  18177. Filename=oddworldz.exe
  18178. Confirmed=X
  18179. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojmultidreg.html" target=_blank>MULTIDR-EG</a> TROJAN!
  18180. [odometer]
  18181. Filename=Odometer.EXE
  18182. Confirmed=N
  18183. Description=Mouse odometer - tracks how far your pointer/arrow has traveled on the screen. Shortcut available
  18184. [odspconfig]
  18185. Filename=ODSPConfig.exe
  18186. Confirmed=U
  18187. Description=<a href="http://securityresponse.symantec.com/avcenter/venc/data/spyware.dsktopsurveil.html" target= blank>DsktopSurveil</a> surveillance software - get rid of it unless you installed it yourself!
  18188. [oeloader]
  18189. Filename=Oeloader.exe
  18190. Confirmed=X
  18191. Description=Xupiter <a href="http://research.sunbelt-software.com/threat_display.cfm?name=Xupiter&threatid=12203&search=OrbitExplorer" target=_blank>OrbitExplorer</a> toolbar related. Drive-by foistware. Use Spybot S&D, Adware or similar to detect and remove and to prevent it re-installing in the future see <a href="http://www.alanluber.com/pcfearfactor/officialxupiterpage.htm" target=_blank>here</a>
  18192. [oem tools 32]
  18193. Filename=tres32.exe
  18194. Confirmed=X
  18195. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_RBOT.QB&VSect=T" target="_blank">RBOT.QB</a> WORM!
  18196. [oem32 tools]
  18197. Filename=sres32.exe
  18198. Confirmed=X
  18199. Description=Added by a variant of the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.spybot.worm.html" target="_blank">SPYBOT</a> WORM!
  18200. [oemcleanup]
  18201. Filename=oemreset.exe
  18202. Confirmed=N
  18203. Description=Resets OEM installation settings at bootup. Not required unless you're new to PC's
  18204. [oemreset]
  18205. Filename=oemreset.exe
  18206. Confirmed=U
  18207. Description=Resets OEM installation settings at bootup. Not required unless you're new to PC's
  18208. [oemrunonce]
  18209. Filename=oemrun.exe
  18210. Confirmed=U
  18211. Description=Windows Millennium file - used by setup when installing the OEM 'express' version of the operating system. Uncheck after setup has finished
  18212. [oeplugin]
  18213. Filename=bxOEPlugin.exe
  18214. Confirmed=U
  18215. Description=<a href="http://www.baxbex.com/nohtml.html" target=_blank>noHTML</a> for Outlook Express is an add-on that protects Outlook Express from email viruses and email scripts by converting incoming email messages from HTML format to simple text
  18216. [oepowerplugs]
  18217. Filename=winoeinit.exe
  18218. Confirmed=?
  18219. Description=<font color="#FF0000">??</font>
  18220. [oespamtest]
  18221. Filename=OESpamTest.ExE
  18222. Confirmed=U
  18223. Description=Kaspersky <a href="http://www.kaspersky.com/antispamenterprise" target=_blank>Anti-Spam</a>
  18224. [oexcheck]
  18225. Filename=EA2Check.exe
  18226. Confirmed=N
  18227. Description=<a href="http://www.ajsystems.com/oexhome.html" target="_blank">Express Assist</a> from AJSystems.com. Utility for use with Outlook Express to backup, restore, synchronize amongst others
  18228. [offer companion]
  18229. Filename=offers.exe
  18230. Confirmed=X
  18231. Description=Adware
  18232. [offers]
  18233. Filename=offers.exe
  18234. Confirmed=X
  18235. Description=Adware
  18236. [officedeamon]
  18237. Filename=msorunner.exe
  18238. Confirmed=X
  18239. Description=Added by a variant of the <a href="http://vic.zonelabs.com/tmpl/body/CA/virusDetails.jsp?VId=42022" target= blank>TACTSLAY</a> TROJAN!
  18240. [officeguard regchecker]
  18241. Filename=ogrc.exe
  18242. Confirmed=Y
  18243. Description=<a href="http://www.kaspersky.com/" target="_blank">Kaspersky Labs</a> anti-virus
  18244. [officeguardui]
  18245. Filename=svcss.exe
  18246. Confirmed=X
  18247. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojdedlerc.html" target=_blank>DEDLER-C</a> TROJAN!
  18248. [officejet 6100]
  18249. Filename=hposol08.exe
  18250. Confirmed=?
  18251. Description=Associated with a HP PSC2110 (and maybe others) all-in-one machine
  18252. [officequickaccess]
  18253. Filename=OfficeHost.vbs
  18254. Confirmed=X
  18255. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.pexmor@mm.html" target=_blank>PEXMOR</a> WORM!
  18256. [offices]
  18257. Filename=msnmgd32.exe
  18258. Confirmed=X
  18259. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32forbotdv.html" target=_blank>FORBOT-DV</a> WORM!
  18260. [officescan95]
  18261. Filename=pccwin97.exe
  18262. Confirmed=Y
  18263. Description=Trend Micro antivirus <a href="http://www.trendmicro.com/en/products/desktop/osce/evaluate/overview.htm" target=_blank>OfficeScan</a>
  18264. [officescannt monitor]
  18265. Filename=pccntmon.exe
  18266. Confirmed=Y
  18267. Description=Trend Micro <a href="http://www.trendmicro.com/en/products/desktop/osce/evaluate/overview.htm" target="_blank">OfficeScan</a> Antivirus real-time scan monitor
  18268. [officexp]
  18269. Filename=OFFICEXP.exe
  18270. Confirmed=X
  18271. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_WOOTBOT.HE&VSect=P" target=_blank>WOOTBOT.HE</a> WORM!
  18272. [office_update]
  18273. Filename=[path to trojan]
  18274. Confirmed=X
  18275. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojdloaderzb.html" target=_blank>DLOADER-ZB</a> TROJAN!
  18276. [ofotonow usb detection]
  18277. Filename=Rundll32.exe OFUSBS.DLL, WatchForConnection OfotoNow
  18278. Confirmed=N
  18279. Description=Autodetects when a digital camera is attached to a USB port and launches <a href="http://www.ofoto.com/DownloadClient30.jsp?UV=673857175481_20140377403&US=0&c=f_on">OfotoNow</a> image software. Available via Start -> Programs
  18280. [ogrc]
  18281. Filename=ogrc.exe
  18282. Confirmed=Y
  18283. Description=<a href="http://www.kaspersky.com/" target="_blank">Kaspersky Labs</a> anti-virus
  18284. [oil change]
  18285. Filename=OCTray32.exe
  18286. Confirmed=N
  18287. Description=From CyberMedia/Network Associates. Checks for updates to software installed on your PC. Available via Start -> Programs
  18288. [oim]
  18289. Filename=oim.exe
  18290. Confirmed=?
  18291. Description=<font color="#FF0000">Related to the <a href="http://www.o2.co.uk/about/0,,600,00.html" target="_blank">O2</a> (was "genie") mobile phone service. What does it do and is it required?</font>
  18292. [oki lpr utility]
  18293. Filename=okilpr.exe
  18294. Confirmed=U
  18295. Description=OKI printer utility
  18296. [ole]
  18297. Filename=[filename]
  18298. Confirmed=X
  18299. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/keylogger.stawin.html" target="_blank">STAWIN</a> or <a href="http://securityresponse.symantec.com/avcenter/venc/data/pwsteal.tarno.d.html" target="_blank">TARNO.D</a> TROJANS!
  18300. [ole automation server]
  18301. Filename=ole32aut.vbe
  18302. Confirmed=X
  18303. Description=<a href="http://cwshredder.net/cwshredder/cwschronicles.html" target=_blank>CoolWebSearch</a> parasite variant
  18304. [oleaccrc]
  18305. Filename=oleaccrc.exe
  18306. Confirmed=X
  18307. Description=Adware downloader - recognized by <a href="http://www.kaspersky.com/personalpro" target=_blank>Kaspersky</a> antivirus as TrojanDownloader.Agent.am
  18308. [oledb service]
  18309. Filename=runoledb32.exe
  18310. Confirmed=X
  18311. Description=Added by a variant of the <a href="http://www.sophos.com/virusinfo/analyses/trojspyreb.html" target=_blank>SPYRE.B</a> TROJAN!
  18312. [olehelp]
  18313. Filename=olehelp.exe
  18314. Confirmed=X
  18315. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/trojan.bookmarker.d.html" target="_blank">BOOKMARKER.D</a> or <a href="http://securityresponse.symantec.com/avcenter/venc/data/trojan.bookmarker.g.html" target="_blank">BOOKMARKER.G</a> TROJANS!
  18316. [oleloader]
  18317. Filename=ole32.exe
  18318. Confirmed=X
  18319. Description=Added by the DELF.BR TROJAN!
  18320. [olesvr]
  18321. Filename=olesvr.exe
  18322. Confirmed=U
  18323. Description=Salfeld <a href="http://www.salfeld.com/parental_control_overwiew.htm" target="_blank">Child Control 2003</a> - parental control software
  18324. [olive system]
  18325. Filename=Szchost.exe
  18326. Confirmed=X
  18327. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/trojan.mercurycas.a.html" target="_blank">MERCURYCAS.A</a> TROJAN!
  18328. [olympic]
  18329. Filename=IE4321.exe
  18330. Confirmed=X
  18331. Description=Adult content premium rate dialer - also detected as SMALL.CZ
  18332. [omf4]
  18333. Filename=OMF4.EXE
  18334. Confirmed=X
  18335. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/pwsteal.freemega.html" target="_blank">FREEMEGA</a> TROJAN!
  18336. [omgstartup]
  18337. Filename=omgstartup.exe
  18338. Confirmed=N
  18339. Description=Sony program called OpenMG Jukebox - player and music organizer
  18340. [omnihttpd]
  18341. Filename=ohttpd.exe
  18342. Confirmed=U
  18343. Description=<a href="http://www.omnicron.ca/httpd/" target="_blank">OmniHTTPd</a> web server from Omnicron
  18344. [omnipage]
  18345. Filename=Opware32.exe
  18346. Confirmed=N
  18347. Description=Part of <a href="http://www.scansoft.com/omnipage/">OmniPage Pro</a> from Scansoft (was Caere) - "the fastest, easiest way to turn paper documents into digital files you can edit." Opware32.exe links Word, via OLE, with OmniPage. If running, a user can call up OmniPage from inside of Word and ask it to scan something, via "File, Acquire Page." Also some of OmniPage's Options dialog boxes are accessible from within Word. Only required by novices and is Available via Start -> Programs
  18348. [omnipass]
  18349. Filename=scureapp.exe
  18350. Confirmed=U
  18351. Description=OmniPass from <a href="http://www.softexinc.com/" target="_blank">Softex Inc.</a> - secure password management software
  18352. [on screen display]
  18353. Filename=OSD.EXE
  18354. Confirmed=U
  18355. Description=By Netropa for HP and other brands. Same group as KBD MediaCenter & Touch Manager. Pressing a "hot key" on such a keyboard brings a corresponding panel on the screen for volume, etc. Nice but not required if you don't adjust things regularly - can also freeze
  18356. [once]
  18357. Filename=help.exe
  18358. Confirmed=X
  18359. Description=Identified as the DELF.LF by <a href="http://www.ewido.net/en/" target=_blank>Ewido Security Suite</a>
  18360. [onecareui]
  18361. Filename=winssnotify.exe
  18362. Confirmed=Y
  18363. Description=Related to <a href="http://www.windowsonecare.com/" target=_blank>Windows OneCare Live</a> from Microsoft
  18364. [onetouch monitor]
  18365. Filename=OneTouchMon.exe
  18366. Confirmed=N
  18367. Description=For Visioneer OneTouch scanners. System tray access to the control panel for the scanner
  18368. [onflow]
  18369. Filename=onflow.exe
  18370. Confirmed=X
  18371. Description=Onflow is a internet company that offers an online advertising program. Not required - uninstall
  18372. [online cdrom]
  18373. Filename=Active acid.exe
  18374. Confirmed=?
  18375. Description=<font color="#FF0000">??</font>
  18376. [online service]
  18377. Filename=svchost.exe
  18378. Confirmed=X
  18379. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.hostidel.trojan.b.html" target="_blank">HOSTIDEL.B</a> or <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.hostidel.trojan.c.html" target="_blank">HOSTIDEL.C</a> or <a href="http://securityresponse.symantec.com/avcenter/venc/data/pwsteal.tarno.b.html" target="_blank">TARNO.B</a> TROJANS! Note - this is not the legitimate <a href="http://www.liutilities.com/products/wintaskspro/processlibrary/svchost/" target="_blank">svchost.exe</a> process which should NOT appear in Msconfig/Startup!
  18380. [onlinepcfix smoothsurfer]
  18381. Filename=SS.exe
  18382. Confirmed=U
  18383. Description=<a href="http://www.smooth-surfer.com/" target="_blank">Smooth-Surfer</a> - blocks banners, ads, popups, and cleans MRU and Recent file lists
  18384. [onlinetime]
  18385. Filename=onlinetime.exe
  18386. Confirmed=N
  18387. Description=<a target="_blank" href="http://www.freedownloadscenter.com/Network_and_Internet/Online_Timers/OnlineTimer_Pro.html">OnlineTimer</a> - monitors your Windows dial-up network and logs the time you spend online as well as the resulting costs
  18388. [online_party]
  18389. Filename=online_party.exe
  18390. Confirmed=X
  18391. Description=Adult content dialler
  18392. [onsrvr]
  18393. Filename=OnSrvr.exe
  18394. Confirmed=X
  18395. Description=OnWebMedia adware
  18396. [oo4]
  18397. Filename=RunDLL32.EXE oo4.dll, DllRun
  18398. Confirmed=X
  18399. Description=<a href="http://research.sunbelt-software.com/threat_display.cfm?name=BookedSpace&threatid=3275&search=bookedspace" target=_blank>BookedSpace</a> parasite
  18400. [oolhelpt]
  18401. Filename=OOLHELPT.exe
  18402. Confirmed=?
  18403. Description=<font color="#FF0000">??</font>
  18404. [op12 reminder]
  18405. Filename=Ereg.exe
  18406. Confirmed=N
  18407. Description=Registration reminder for <a href="http://www.scansoft.com/omnipage/" target="_blank">OmniPage Pro 12</a> from ScanSoft
  18408. [open service drivers]
  18409. Filename=opiater.exe
  18410. Confirmed=X
  18411. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  18412. [opengl drivers]
  18413. Filename=0penGLD.exe
  18414. Confirmed=X
  18415. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32yimpa.html" target=_blank>YIMP-A</a> WORM!
  18416. [openoffice.org x]
  18417. Filename=QUICKS~1.EXE
  18418. Confirmed=N
  18419. Description=Displays <a href="http://www.openoffice.org/" target="_blank">OpenOffice</a> quick start applet in System tray. Right clicking on the icon allows rapid starting up of components of the OpenOffice suite. Available via Start -> Programs. Will automatically be started when any OpenOffice component is started from Start -> Programs. A resource hog (takes > 16 MB of memory). "x" represents the version number
  18420. [openwares liveupdate]
  18421. Filename=LiveUpdate.exe
  18422. Confirmed=U
  18423. Description=Web-update utility as used by various types of software - see <a href="http://liveupdate.openwares.org/" target="_blank">here</a>
  18424. [operations typhoon rising registration]
  18425. Filename=NOVG.EXE
  18426. Confirmed=N
  18427. Description=<a href="http://www.gamespot.com/pc/action/jointoperations/" target=_blank>Joint Operations</a> registration reminder
  18428. [opistat]
  18429. Filename=OPISTAT.EXE
  18430. Confirmed=N
  18431. Description=<a href="http://www.opistat.com/mp/index.html" target="_blank">OpiStat</a> is a European Research Institute whose goal is to understand consumer needs and opinions better
  18432. [opqfile]
  18433. Filename=regedit.exe /s ...rad03FA6.tmp
  18434. Confirmed=X
  18435. Description=Unsavoury program that resets your homepage every time you restart - uncheck in MSCONFIG and delete it via a registry edit
  18436. [opr]
  18437. Filename=opr.exe
  18438. Confirmed=X
  18439. Description=<a href="http://securityresponse.symantec.com/avcenter/venc/data/adware.popuppers.html" target=_blank>MediaMotor/Popuppers</a> adware
  18440. [opsql update check]
  18441. Filename=opsql.exe
  18442. Confirmed=X
  18443. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotacj.html" target= blank>RBOT-ACJ</a> WORM!
  18444. [optimizer]
  18445. Filename=iexplore.exe
  18446. Confirmed=X
  18447. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.evivinc.html" target=_blank>EVEVINC</a> TROJAN! Note - this is not the legitimate Internet Explorer <a href="http://www.liutilities.com/products/wintaskspro/processlibrary/iexplore/" target=_blank>iexplore.exe</a> process which is always located in the Program Files\Internet Explorer folder and should not normally figure in Msconfig/Startup! This file is located in the System (9x/Me) or System32 (NT/2K/XP) folder
  18448. [optimum online]
  18449. Filename=Netsurf.exe
  18450. Confirmed=N
  18451. Description=<a href="http://www.optimumonline.com/index.jhtml;jsessionid=5LMI3XSXKRAYYCQLARQCF3QKBMCGCI5G?pageType=what" target="_blank">Optimum Online</a> ISP software. Not required, just window dressing & advertising from Optimum
  18452. [optional web drivers for win32]
  18453. Filename=phqghume.exe
  18454. Confirmed=X
  18455. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  18456. [optus cable data monitor]
  18457. Filename=datamonitor.exe
  18458. Confirmed=U
  18459. Description=Allows Optus customers to monitor their actual data usage against Optus' "data allowance limits"
  18460. [optusnetusage]
  18461. Filename=OptusNet Usage Meter.exe
  18462. Confirmed=U
  18463. Description=Designed specifically for OptusNet users who wish to have their connection monitored on a frequent basis. It can also estimate when you are going to hit your usage limit, and how far over your suggested limit you should be
  18464. [opware12]
  18465. Filename=Opware12.exe
  18466. Confirmed=N
  18467. Description=<a href="http://www.scansoft.com/omnipage/" target="_blank">OmniPage Pro 12</a> from ScanSoft
  18468. [opware14]
  18469. Filename=Opware14.exe
  18470. Confirmed=N
  18471. Description=ScanSoft's <a href="http://www.scansoft.com/omnipage/" target=_blank>OmniPage Pro 14</a> - If running, a user can call up OmniPage from inside of Word and ask it to scan something, via "File, Acquire Page." Also some of OmniPage's Options dialog boxes are accessible from within Word. Only required by novices and is available via Start -> Programs
  18472. [opwarese2]
  18473. Filename=OpwareSE2.exe
  18474. Confirmed=N
  18475. Description=ScanSoft's <a href="http://www.scansoft.com/omnipage/" target=_blank>OmniPage_Pro_14</a> - If running, a user can call up OmniPage from inside of Word and ask it to scan something, via "File, Acquire Page." Also some of OmniPage's Options dialog boxes are accessible from within Word. Only required by novices and is Available via Start -> Programs
  18476. [orbitupdate]
  18477. Filename=update.exe
  18478. Confirmed=X
  18479. Description=Xupiter <a href="http://research.sunbelt-software.com/threat_display.cfm?name=Xupiter&threatid=12203&search=OrbitExplorer" target=_blank>OrbitExplorer</a> toolbar related. Drive-by foistware. Use Spybot S&D, Adware or similar to detect and remove and to prevent it re-installing in the future see <a href="http://www.alanluber.com/pcfearfactor/officialxupiterpage.htm" target=_blank>here</a>
  18480. [orbitview]
  18481. Filename=view.exe
  18482. Confirmed=X
  18483. Description=Xupiter <a href="http://research.sunbelt-software.com/threat_display.cfm?name=Xupiter&threatid=12203&search=OrbitExplorer" target=_blank>OrbitExplorer</a> toolbar related. Drive-by foistware. Use Spybot S&D, Adware or similar to detect and remove and to prevent it re-installing in the future see <a href="http://www.alanluber.com/pcfearfactor/officialxupiterpage.htm" target=_blank>here</a>
  18484. [org5.exe]
  18485. Filename=org5.exe
  18486. Confirmed=?
  18487. Description=Lotus Organizer 5 application file, Lotus Organizer software. <font color="#FF0000">What does it do and is it required?</font>
  18488. [orgycam]
  18489. Filename=OrgyCam.exe
  18490. Confirmed=X
  18491. Description=Adult content dialler
  18492. [origrage128tweaker]
  18493. Filename=RAGE128TWEAK.EXE
  18494. Confirmed=U
  18495. Description=Third party tweaker for ATI Rage 128 Video cards from <a href="http://www.rageunderground.com">http://www.rageunderground.com</a>
  18496. [orinoco]
  18497. Filename=Cmluc.exe
  18498. Confirmed=U
  18499. Description=Client Manager software for an <a href="http://www.orinocowireless.com/" target="_blank">ORiNOCO</a> wireless LAN card
  18500. [os security]
  18501. Filename=mswind32.pif
  18502. Confirmed=X
  18503. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotasu.html" target=_blank>RBOT-ASU</a> WORM!
  18504. [osa]
  18505. Filename=winword.exe
  18506. Confirmed=X
  18507. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32kangarooa.html" target=_blank>KANGAROO-A</a> TROJAN!
  18508. [osa32]
  18509. Filename=NTOSA32.exe
  18510. Confirmed=X
  18511. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.hllw.anig.html" target="_blank">ANIG</a> WORM!
  18512. [osd]
  18513. Filename=OSD.exe
  18514. Confirmed=U
  18515. Description=By Netropa for HP and other brands. Same group as KBD MediaCenter & Touch Manager. Pressing a "hot key" on such a keyboard brings a corresponding panel on the screen for volume, etc. Nice but not required if you don't adjust things regularly - can also freeze
  18516. [ossproxy]
  18517. Filename=OSSPROXY.EXE
  18518. Confirmed=X
  18519. Description=<a href="http://www.doxdesk.com/parasite/MarketScore.html" target=_blank>NetSetter/Marketscore</a> foistware
  18520. [ostivityinvagt]
  18521. Filename=ostivity.exe
  18522. Confirmed=U
  18523. Description=<a href="http://www.somix.com/products/ostivity.php" target="_blank">OStivity</a> - "a desktop and server hardware and software asset/inventory solution for small to enterprise sized organizations that need to quickly gain knowledge of 'what's installed' without having to manually touch every computer in the company. The next time the computer logs into the network, a complete inventory (software and hardware) is taken of the system"
  18524. [otcx]
  18525. Filename=otcxxh.exe
  18526. Confirmed=X
  18527. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.carool.html" target="_blank">CAROOL</a> TROJAN!
  18528. [outlook]
  18529. Filename=outlook.exe
  18530. Confirmed=X
  18531. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32sdbotru.html" target=_blank>SDBOT-RU</a> WORM!
  18532. [outlook express config]
  18533. Filename=*****.exe [* = random char]
  18534. Confirmed=X
  18535. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  18536. [outlook express protocol]
  18537. Filename=look.exe
  18538. Confirmed=X
  18539. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotacs.html" target=_blank>RBOT-ACS</a> WORM!
  18540. [outlooks]
  18541. Filename=InSane.exe
  18542. Confirmed=X
  18543. Description=Added by the <a href="http://www.symantec.com/avcenter/venc/data/trojan.swoop.html" target= blank>SWOOP</a> TROJAN!
  18544. [outpost firewall]
  18545. Filename=outpost.exe
  18546. Confirmed=Y
  18547. Description=<a href="http://www.agnitum.com/products/outpost/" target="_blank">Outpost</a> personal firewall
  18548. [outpostupdate]
  18549. Filename=outpostupdate.exe
  18550. Confirmed=X
  18551. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojcosiamc.html" target=_blank>COSIAM-C</a> TROJAN!
  18552. [outwar]
  18553. Filename=syslaunch.exe
  18554. Confirmed=X
  18555. Description=Outwar adware downloader
  18556. [ovcj]
  18557. Filename=ovcj.exe
  18558. Confirmed=?
  18559. Description=<font color="#FF0000">??</font>
  18560. [overnet]
  18561. Filename=Overnet.exe
  18562. Confirmed=N
  18563. Description=<a href="http://www.overnet.com/" target="_blank">Overnet</a> peer-to-peer (P2P) file sharing program
  18564. [ovyriwi]
  18565. Filename=telace.exe
  18566. Confirmed=X
  18567. Description=Added by the <a href="http://uk.trendmicro-europe.com/enterprise/vinfo/encyclopedia.php?LYstr=VMAINDATA&vNav=1&VName=WORM_SDBOT.BVS" target=_blank>SDBOT.BVS</a> WORM!
  18568. [owccardbustray]
  18569. Filename=ocbtray.exe
  18570. Confirmed=U
  18571. Description=Icon in the system tray for safely removing PCMCIA cards. Only required if you have a laptop or desktop which includes a PCMCIA card interface
  18572. [owcwebcamdv]
  18573. Filename=wcdvtray.exe
  18574. Confirmed=U
  18575. Description=<a href="http://www.orangemicro.com/webcamdv.html" target="_blank">WebCamDV</a> from Orange Micro, Inc - enables the user to use a DV camera connected via Firewire as a Webcam
  18576. [owmngr]
  18577. Filename=OWMngr.exe
  18578. Confirmed=X
  18579. Description=OnWebMedia advertising foistware - see <a href="http://www.f-secure.com/v-descs/checkin.shtml" target="_blank"> here</a> for exactly what to look for
  18580. [oz2]
  18581. Filename=oz2.exe
  18582. Confirmed=X
  18583. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.mydoom.w@mm.html" target="_blank">MYDOOM.W</a> WORM!
  18584. [p0w3rf1y]
  18585. Filename=svchost.exe
  18586. Confirmed=X
  18587. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojbdoormm.html" target=_blank>MM</a> TROJAN! Note - this is not the legitimate <a href="http://www.liutilities.com/products/wintaskspro/processlibrary/svchost/" target=_blank>svchost.exe</a> process which is always located in the System (9x/Me) or System32 (NT/2K/XP) folder and should not normally figure in Msconfig/Startup! This file is located in the Winnt or Windows folder
  18588. [p17helper]
  18589. Filename=Rundll32 P17.dll, P17Helper
  18590. Confirmed=?
  18591. Description=<a href="http://www.soundblaster.com/resources/read.asp?articleid=60&cat=2" target=_blank>ASIO</a> driver for the Sound Blaster Audigy & Audigy 2 series sound card - <font color="#FF0000">is it required in startup?</font>
  18592. [p2p networking2]
  18593. Filename=P2P Networking2.exe
  18594. Confirmed=X
  18595. Description=P2P Networking2.exe is an advertising program by Joltid. This process monitors your browsing habits and distributes the data back to the author's servers for analysis. This also prompts advertising popups. This program is a registered security risk and should be removed immediately
  18596. [p2p networking3]
  18597. Filename=P2P Networking3.exe
  18598. Confirmed=N
  18599. Description=P2P Networking, a component bundled with Kazaa that enables other applications to use Peer-to-Peer functionality. Not required - see <a href="http://www.kephyr.com/spywarescanner/library/p2pnetworking/index.phtml" target="_blank">here</a>
  18600. [p2pnetwork]
  18601. Filename=p2pnetwork.exe
  18602. Confirmed=X
  18603. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_ALCAN.A" target=_blank>ALCAN.A</a> WORM!
  18604. [p2pnetworking]
  18605. Filename=p2pnetworking.exe
  18606. Confirmed=X
  18607. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotafl.html" target=_blank>RBOT-AFL</a> WORM!
  18608. [p3p4chk]
  18609. Filename=P3p4chk.exe
  18610. Confirmed=X
  18611. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/trojan.gema.html" target="_blank">GEMA</a> TROJAN!
  18612. [p4mx4]
  18613. Filename=p4mx4.exe
  18614. Confirmed=X
  18615. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=TROJ_CRYPTER.A" target="_blank">CRYPTER.A</a> TROJAN!
  18616. [pacisoft]
  18617. Filename=pacis.exe
  18618. Confirmed=X
  18619. Description=<a href="http://www.benedelman.org/spyware/installations/pacerd/" target= blank>PacerD Media/Pacimedia.com</a> adware installer
  18620. [packard bell eversafe tray control]
  18621. Filename=TrayControl.exe
  18622. Confirmed=?
  18623. Description=Packard Bell EverSafe software. <font color="#FF0000">What does it do, and is it required?</font>
  18624. [padtouch]
  18625. Filename=PadExe.exe
  18626. Confirmed=N
  18627. Description=Toshiba Touch and Launch - offers easy movement and freedom of programs navigation with TouchPad
  18628. [pagekeeper jobs]
  18629. Filename=pkjobs.exe
  18630. Confirmed=U
  18631. Description=PageKeeper Jobs is a separate PageKeeper program that handles the analysis of new documents and keeps track of the location and content of current documents in PageKeeper. Pagekeeper comes bundled with scanners such has HP, Microtek, etc
  18632. [pagekeeper lite]
  18633. Filename=pkjobs.exe
  18634. Confirmed=U
  18635. Description=PageKeeper Jobs is a separate PageKeeper program that handles the analysis of new documents and keeps track of the location and content of current documents in PageKeeper. Pagekeeper comes bundled with scanners such has HP, Microtek, etc
  18636. [pagent]
  18637. Filename=PAgent.exe
  18638. Confirmed=X
  18639. Description=Scans your hard drive for the popular P2P file-sharing applications BearShare, Grokster, Kazaa, Limewire and Morpheus. After searching the entire local filesystem for any files with those names it connects to the DownloadWare servers and tells it what, if anything, is found. See <a href="http://and.doxdesk.com/parasite/DownloadWare.html" target="_blank">here</a> for more info
  18640. [pagis scheduler]
  18641. Filename=Monitor.exe
  18642. Confirmed=N
  18643. Description=Scheduler for the <a href="http://www.scansoft.com/pagis/" target="_blank">Pagis</a> scanning suite from Scansoft. 
  18644. [pagmstart]
  18645. Filename=client.exe
  18646. Confirmed=?
  18647. Description=<font color="#FF0000">Possibly related to <a href="http://www.pagm.com/default.asp" target="_blank">this</a>?</font>
  18648. [pagoo]
  18649. Filename=PAGOO.EXE
  18650. Confirmed=N
  18651. Description=<a href="http://www.pagoo.com/cc.asp" target="_blank">Pagoo</a> - internet call waiting. Intercepts telephone calls like an answering machine and plays the voice message on your PC. Only required when you're on-line and via dial-up modem
  18652. [paint.exe]
  18653. Filename=shnlog.exe
  18654. Confirmed=X
  18655. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojpupera.html" target= blank>PUPER-A</a> TROJAN!
  18656. [paintingroom evidence monitor]
  18657. Filename=paintingroom.exe
  18658. Confirmed=X
  18659. Description=Paintingroom.com smiley software - not recommended as the site tries to drop a trojan on you...
  18660. [paintingroom smile monitor]
  18661. Filename=paintingroom.exe
  18662. Confirmed=X
  18663. Description=Paintingroom.com smiley software - not recommended as the site tries to drop a trojan on you...
  18664. [palm multiuser config]
  18665. Filename=Configtool.exe
  18666. Confirmed=?
  18667. Description=<font color="#FF0000">MultiUser configuration for a Palm PDA device?. Is it required?</font>
  18668. [palm.exe]
  18669. Filename=Palm.exe
  18670. Confirmed=N
  18671. Description=<a href="http://www.palm.com/support/downloads/win_desktop.html" target="_blank">Palm Desktop Software</a> for use with Palm handheld devices. Available via Start -> Programs
  18672. [palmone registration]
  18673. Filename=register.exe
  18674. Confirmed=N
  18675. Description=Registration reminder for <a href="http://www.palm.com/us/" target=blank>Palm</a> products
  18676. [palnetaware]
  18677. Filename=pnetaware.exe
  18678. Confirmed=X
  18679. Description=PalTalk adware - as included in Morpheus, see <a href="http://www.pestpatrol.com/pestinfo/m/morpheus.asp" target="_blank">here</a> towards the bottom of the page
  18680. [paltalknetaware.exe]
  18681. Filename=PALNETAW~1.EXE
  18682. Confirmed=N
  18683. Description=Voice chat program. This program stores all buddy list info apparently on the server itself so you never lose your buddy list should you need to reinstall the program due for whatever reason or even reformat. Available via Start -> Programs. Delete the shortcut in Start -> Programs -> StartUp as well otherwise it will be reinstated
  18684. [pamela.exe]
  18685. Filename=pamela.exe
  18686. Confirmed=U
  18687. Description=<a href="http://www.pamela-systems.com/" target=_blank>Pamela</a> is a plug-in or add-on that adds features to <a href="http://www.skype.com/" target=_blank>Skype</a> peer to peer voice service
  18688. [panda antispam server service]
  18689. Filename=PasSrv.exe
  18690. Confirmed=U
  18691. Description=AntiSpam software, part of Panda <a href="http://enterprises.pandasoftware.com/products/platinum_is2005/" target=_blank>Platinum Internet Security</a>
  18692. [panda cleaner]
  18693. Filename=pavdr.exe
  18694. Confirmed=Y
  18695. Description=Panda Antivirus related - possibly Panda <a href="http://www.pandasoftware.com/products/activescan/com/activescan principal.htm" target= blank>ActiveScan</a>
  18696. [panda preventium+ service]
  18697. Filename=PREVSRV.EXE
  18698. Confirmed=Y
  18699. Description=<a href="http://www.pandasoftware.com/products/titanium2006_part.htm" target=_blank>Panda Titanium</a> Antivirus
  18700. [panda scheduler]
  18701. Filename=pavsched.exe
  18702. Confirmed=U
  18703. Description=<a href="http://www.pandasoftware.com/" target="_blank">Panda Antivirus</a> scan scheduler. Required if this is your virus scanner program and you have scans scheduled on a regular basis. I recommend that you scan manually so you don't need this but if you tend to forget then leave it
  18704. [panda software intrenet]
  18705. Filename=panda.pif
  18706. Confirmed=X
  18707. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotatz.html" target=_blank>RBOT-ATZ</a> WORM!
  18708. [pandaavengine]
  18709. Filename=PandaAVEngine.exe
  18710. Confirmed=X
  18711. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.netsky.r@mm.html" target="_blank">NETSKY.R</a> WORM!
  18712. [pandascheduler]
  18713. Filename=pavsched.exe
  18714. Confirmed=U
  18715. Description=<a href="http://www.pandasoftware.com/" target="_blank">Panda Antivirus</a> scan scheduler. Required if this is your virus scanner program and you have scans scheduled on a regular basis. I recommend that you scan manually so you don't need this but if you tend to forget then leave it
  18716. [pantera]
  18717. Filename=pantera.exe
  18718. Confirmed=X
  18719. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_SDBOT.AYN&VSect=P" target=_blank>SDBOT.AYN</a> WORM!
  18720. [paperport]
  18721. Filename=runppdrv.exe
  18722. Confirmed=N
  18723. Description=Loads the drivers associated with monitoring scanner status associated with PaperPort software. Can be a resource hog - see <a href="http://groups.google.com/groups?q=runppdrv.exe&hl=en&rnum=7&selm=6v04nv%24q3l%241%40supernews.com" target="_blank">here</a>
  18724. [paperport ptd]
  18725. Filename=pptd40nt.exe
  18726. Confirmed=N
  18727. Description="PaperPort" software associated with scanners
  18728. [paperquote system tray icon]
  18729. Filename=PQTRAY.EXE
  18730. Confirmed=N
  18731. Description=PaperQuote is a "wallpaper" changer with daily quotes that are either for inspiration or motivation
  18732. [parallel tasking]
  18733. Filename=ptask.exe
  18734. Confirmed=X
  18735. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojsmallcj.html" target= blank>SMALL-CJ</a> TROJAN!
  18736. [partseal]
  18737. Filename=PartSeal.exe
  18738. Confirmed=U
  18739. Description=System backup for Sony Vaio PCs. Adds a recovery mechanism for users over and above any System Restore features - allowing users to revert a drive back to the state it was when bought form the factory by hitting F10. The user obviously loses any data stored if not backed-up elsewhere
  18740. [password door loader]
  18741. Filename=PDMonitor.exe
  18742. Confirmed=U
  18743. Description=<a href="http://www.toplang.com/passworddoor.htm" target="_blank">Password Door</a> - password protection software
  18744. [pastelister]
  18745. Filename=plister.exe
  18746. Confirmed=N
  18747. Description=<a href="http://www.progency.com/pastelister.html" target="_blank">PasteLister</a> - clipboard extender. Start manually when required
  18748. [patch]
  18749. Filename=patch.exe
  18750. Confirmed=X
  18751. Description=Added by the <a href="http://www.dark-e.com/archive/trojans/netbusworm/index.shtml" target="_blank"> NETBUS</a> WORM!
  18752. [patches value]
  18753. Filename=WinGamed.exe
  18754. Confirmed=X
  18755. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_SDBOT.BR" target="_blank">SDBOT.BR</a> WORM!
  18756. [path]
  18757. Filename=lide.exe
  18758. Confirmed=?
  18759. Description=<font color="#FF0000">??</font>
  18760. [pathname]
  18761. Filename=pathname.exe
  18762. Confirmed=X
  18763. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.irccontact.html" target=_blank>IRCCONTACT</a> TROJAN!
  18764. [pathnvidiatv]
  18765. Filename=patchnvidiaTVout.exe
  18766. Confirmed=?
  18767. Description=Appears to be related to Nvidia Gigabyte Video card. Typical file location is the Program Files\Gigabyte\Nvidia folder
  18768. [pavfires]
  18769. Filename=PavFires.exe
  18770. Confirmed=Y
  18771. Description=<a href="http://www.pandasoftware.com/" target="_blank">Panda Antivirus</a>
  18772. [pavfnsvr]
  18773. Filename=PavFnSvr.exe
  18774. Confirmed=Y
  18775. Description=<a href="http://www.pandasoftware.com/products/titanium2004/" target=_blank>Panda</a> Titanium Antivirus
  18776. [pavkre9x]
  18777. Filename=pavkre9x.exe
  18778. Confirmed=Y
  18779. Description=<a href="http://www.pandasoftware.com/products/titanium2006_part.htm" target=_blank>Panda Titanium</a> Antivirus
  18780. [pavproc]
  18781. Filename=PavPrS9x.exe
  18782. Confirmed=Y
  18783. Description=<a href="http://www.pandasoftware.com/products/titanium2004/" target=_blank>Panda</a> Titanium Antivirus
  18784. [pavprot]
  18785. Filename=PavProt.exe
  18786. Confirmed=Y
  18787. Description=<a href="http://www.pandasoftware.com/products/titanium2004/" target=_blank>Panda</a> Titanium Antivirus
  18788. [pavprot9]
  18789. Filename=Pavprot9.exe
  18790. Confirmed=Y
  18791. Description=<a href="http://www.pandasoftware.com/products/titanium2006_part.htm" target=_blank>Panda Titanium</a> Antivirus
  18792. [paytime]
  18793. Filename=paytime.exe
  18794. Confirmed=X
  18795. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojstartpayr.html" target=_blank>STARTPA-YR</a> TROJAN!
  18796. [pbagent]
  18797. Filename=pbagent.exe
  18798. Confirmed=U
  18799. Description=<a href="http://www.symantec.com/avcenter/venc/data/spyware.probot.html" target= blank>Probot</a> keystroke logger/monitoring program - remove unless you installed it yourself!
  18800. [pbkscheduler]
  18801. Filename=PBKScheduler.exe
  18802. Confirmed=U
  18803. Description=Scheduler for CyberLink <a href="http://www.cyberlink.com/multi/products/main_29_ENU.html" target=_blank>PowerBackup</a> - archiving/backup utility
  18804. [pc alert iii]
  18805. Filename=alert.exe
  18806. Confirmed=U
  18807. Description=MSI PC Alert III - allows you to view your system and cpu temperature, fan rpm and more. Only required if you overclock
  18808. [pc booster]
  18809. Filename=pcbooster.exe
  18810. Confirmed=U
  18811. Description=<a href="http://www.inklineglobal.net/products/pcb/index.html" target="_blank">PC Booster</a> from inKline Global - "easy-to-use computer system optimizer that gives your system the extra speed and stability you want while ensuring that your computer is kept clean and in tip-top condition"
  18812. [pc dynamics sdwmon32]
  18813. Filename=sdwmon32.exe
  18814. Confirmed=U
  18815. Description=<a href="http://www.pcdynamics.com/SafeHousePP/" target=_blank>SafeHouse</a> "Personal Privacy" protects and hides your private and personal photos, videos, files and folders by making them "invisible" and encrypted
  18816. [pc-config32]
  18817. Filename=corona.exe
  18818. Confirmed=X
  18819. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32coronexa.html" target="_blank">CORONEX.A</a> WORM!
  18820. [pcanywhere agent]
  18821. Filename=pcamgt.exe
  18822. Confirmed=U
  18823. Description=Part of  <a href="http://www.symantec.com/pcanywhere/Consumer/index.html" target= blank>pcAnywhere</a> 9.0 or later. This process listens for incoming PC Anywhere connections if your PC is configured as a PC Anywhere host
  18824. [pcbg]
  18825. Filename=PCBODYGUARD.EXE
  18826. Confirmed=Y
  18827. Description=<a href="http://www.calluna.com/pcbody.html" target="_blank">PC Bodyguard</a> from Calluna - protects system files and settings from being deleted, modified, etc
  18828. [pcbodyguard]
  18829. Filename=PCBODYGUARD.EXE
  18830. Confirmed=Y
  18831. Description=<a href="http://www.calluna.com/pcbody.html" target="_blank">PC Bodyguard</a> from Calluna - protects system files and settings from being deleted, modified, etc
  18832. [pcboost]
  18833. Filename=PcBoost.exe
  18834. Confirmed=U
  18835. Description=<a href="http://www.pgware.com/" target=_blank>PCBoost</a> from PGWARE, LLC increases computer performance by allocating higher portions of CPU power to active applications and games
  18836. [pccclient.exe]
  18837. Filename=PCCClient.exe
  18838. Confirmed=Y
  18839. Description=PC-Cillin 2002 antivirus software
  18840. [pccguide.exe]
  18841. Filename=pccguide.exe
  18842. Confirmed=Y
  18843. Description=PC-Cillin 2002 antivirus software
  18844. [pcciomon.exe]
  18845. Filename=PCCIOMON.EXE
  18846. Confirmed=Y
  18847. Description=PC-Cillin 2000 antivirus software. This is the actual virus-scanner
  18848. [pcclient.exe]
  18849. Filename=PCClient.exe
  18850. Confirmed=Y
  18851. Description=Trend Micro <a href="http://www.trendmicro.com/en/products/desktop/pc-cillin/evaluate/overview.htm" target="_blank">PC-Cillin</a> Internet Security
  18852. [pccpfw]
  18853. Filename=PccPfw.exe
  18854. Confirmed=Y
  18855. Description=Trend Micro <a href="http://www.trendmicro.com.au/pccillin/" target=_blank>PC-Cillin</a> personal firewall
  18856. [pcctlcom]
  18857. Filename=Pcctlcom.exe
  18858. Confirmed=Y
  18859. Description=Trend Micro <a href="http://www.trendmicro.com/en/products/desktop/pc-cillin/evaluate/overview.htm" target=_blank>PC-cillin</a> Internet Security
  18860. [pcdrealtime]
  18861. Filename=realtime.exe
  18862. Confirmed=N
  18863. Description=Apparently the monitoring device for PC Doctor Online. It provides a "free" examination on system files (i.e. registry), reports the number of errors it finds, and invites you to "order" the fee-based fixes from its web site
  18864. [pcexplode]
  18865. Filename=specialfile.exe
  18866. Confirmed=X
  18867. Description=Added by the <a href="http://it.trendmicro-europe.com/consumer/security_info/ve_detail.php?Vname=WORM_RBOT.RH" target="_blank">RBOT.RH</a> WORM!
  18868. [pchbutton]
  18869. Filename=PCHbutton.exe
  18870. Confirmed=N
  18871. Description=Used by HP Instant Support
  18872. [pchealth]
  18873. Filename=pchschd.exe
  18874. Confirmed=N
  18875. Description=This is a "scheduler" and does not turn off PC Health. For more information refer <a href="http://groups.google.com/groups?q=PCHealth%2Bpchschd.exe&hl=en&selm=eeuEENQ6AHA.1484%40tkmsftngp03&rnum=1" target="_blank">here</a>
  18876. [pcheasysearch]
  18877. Filename=STUpdate.exe
  18878. Confirmed=X
  18879. Description=PCH EasySearch bar
  18880. [pcimodem]
  18881. Filename=pcimodem.exe
  18882. Confirmed=?
  18883. Description=Associated with Lucent based Aztech MDP7800-U PCI modems. <font color="#FF0000">Is it required?</font>
  18884. [pclepci]
  18885. Filename=ppe.exe
  18886. Confirmed=U
  18887. Description=Pinnacle Systems <a href="http://www.pinnaclesys.com/docsupport1.asp?division_id=1&langue_id=2&product_id=469&product_name=Studio%20version%207&page_id=146" target="_blank">PCI Performance Enhancer</a>. "This tool helps to increase the PCI Busmaster performance of all Pinnacle PCI boards."
  18888. [pclk]
  18889. Filename=PClK.exe
  18890. Confirmed=X
  18891. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojlegmirbl.html" target=_blank>LEGMIR-BL</a> TROJAN!
  18892. [pcmcia resource monitor]
  18893. Filename=nvp2pmon.exe
  18894. Confirmed=?
  18895. Description=NVIDIA nForce P2P Driver. <font color="#FF0000">What does it do and is it required?</font>
  18896. [pcmmrealtime]
  18897. Filename=pcmm.exe
  18898. Confirmed=U
  18899. Description=<a href="http://www.pcmightymax.net/cgi-bin/view.cgi//index.html" target="_blank">PC MightyMax</a> - diagnostic program that identifies and fixes problems. However, some users report it does the opposite and messes up their systems (see <a href="http://www.techspot.com/vb/topic21210.html" target="_blank">here</a>) and they also have problems removing it (see <a href="http://www.bullguard.com/forum/9/PC-MightyMax-removal_8719.html" target="_blank">here</a>)
  18900. [pcmservice]
  18901. Filename=PCMService.exe
  18902. Confirmed=?
  18903. Description=<font color="#FF0000">In a DellMedia Experience sub-directory</font>
  18904. [pcprot]
  18905. Filename=crcss.exe
  18906. Confirmed=X
  18907. Description=Added by an unidentified WORM!
  18908. [pcqmqgn.exe]
  18909. Filename=pcqmqgn.exe
  18910. Confirmed=?
  18911. Description=<font color="#FF0000">??</font>
  18912. [pcrecsa]
  18913. Filename=PCRecSA.exe
  18914. Confirmed=U
  18915. Description=Part of the IBM/XPoint Rapid Restore backup utility. If you choose, you can use it to create a "clean" backup of your hard drive. The process involves the software partitioning your hard drive, making a compressed image of the working drive which will then allow you to revert to that should you need to
  18916. [pcserver]
  18917. Filename=server.exe
  18918. Confirmed=X
  18919. Description=<a href="http://securityresponse.symantec.com/avcenter/venc/data/spyware.ssppyy.html" target=_blank>Ssppyy</a> spyware
  18920. [pcshield]
  18921. Filename=regsvr32 /s [path] sfg_****.dll [* = random char]
  18922. Confirmed=X
  18923. Description=<a href="http://www.pestpatrol.com/PestInfo/s/safeguardprotect.asp" target=_blank>SafeguardProtect/Veevo</a> malware
  18924. [pcstart]
  18925. Filename=Pcm25.exe
  18926. Confirmed=N
  18927. Description=Runs as part of <a href="http://pcmonitor.com/" target="_blank">PCMonitor</a> which is a program for monitoring your activity on your system. It makes screen dumps and key logging. It can hang-up your system because the screen dump page gets VERY big
  18928. [pcsv]
  18929. Filename=pcsvc.exe
  18930. Confirmed=X
  18931. Description=<a href="http://www.spywareguide.com/product_show.php?id=727" target=_blank>Delfin Media Viewer</a> or "Promulgate" adware
  18932. [pctavapp]
  18933. Filename=PCTAV.exe
  18934. Confirmed=Y
  18935. Description=Related to <a href="http://www.pctools.com/anti-virus/" target=_blank>PC TOOLS</a> Antivirus software
  18936. [pctspk]
  18937. Filename=pctspk.exe
  18938. Confirmed=U
  18939. Description=Used for modems based upon PC-TEL chipsets. Normally used for some Voice and Speakerphone functions and also for some Power management options. If you remove it you may not be able to use any of those functions
  18940. [pctvoice]
  18941. Filename=pctvoice.exe
  18942. Confirmed=U
  18943. Description=The program PCTVoice is used by the modem to interface with your computer and also used for some V.80 functions for Video Conferencing. if you uncheck it, it comes back. ItÆs better to leave it
  18944. [pcwatch]
  18945. Filename=pcwatch.exe
  18946. Confirmed=U
  18947. Description=Added by <a href="http://www.sarc.com/avcenter/venc/data/spyware.pcwatch.html" target=_blank>PCWatch</a> surveillance software. Uninstall this software if you did not install it yourself
  18948. [pda commander]
  18949. Filename=stisvc32.exe
  18950. Confirmed=X
  18951. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32agobottx.html" target=_blank>AGOBOT-TX</a> WORM!
  18952. [pdascan]
  18953. Filename=pdascan.exe
  18954. Confirmed=X
  18955. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32agobotqy.html" target= blank>AGOBOT-QY</a> WORM!
  18956. [pdengine]
  18957. Filename=PDEngine.exe
  18958. Confirmed=U
  18959. Description=<a href="http://www.raxco.com/products/perfectdisk2k/" target="_blank">PerfectDisk</a> from Raxco - disk defragmenter. Only required if you schedule disk defragmenting at re-boot
  18960. [pdexplo]
  18961. Filename=PDEXPLO.EXE
  18962. Confirmed=N
  18963. Description=<a href="http://www.ontrack.com/powerdesk/">PowerDesk Pro</a> by Ontrack. Enhanced desktop and file manager. Available via Start -> Programs
  18964. [pdf converter registry controller]
  18965. Filename=RegistryController.exe
  18966. Confirmed=?
  18967. Description=ScanSoft <a href="http://www.scansoft.com/pdfconverter/" target=_blank>PDF_Converter</a> related - <font color="#FF0000">what does it do and is it required?</font>
  18968. [pdffactory pro dispatcher v1]
  18969. Filename=fppdis1.exe
  18970. Confirmed=N
  18971. Description="With <a href="http://www.fineprint.com/software/index.html" target="_blank">pdfFactory</a> you can create PDF documents from any program printing to the virtual PDF printer". Available via a desktop shortcut or Start -> Programs
  18972. [pdfsaver3]
  18973. Filename=pdfSaver3.exe
  18974. Confirmed=N
  18975. Description=<a href="http://www.docu-track.com/home/prod_user/pdfxchange_pro/" target=_blank>PDF-XChange</a> - create Adobe compatible PDF files from virtually any Windows software such as MS Word, Excel, AutoCAD, MS Publisher etc
  18976. [pdirect]
  18977. Filename=PDirect.exe
  18978. Confirmed=N
  18979. Description=IBM Presentation Director software
  18980. [pdp server]
  18981. Filename=ctpdpsrvr.exe
  18982. Confirmed=U
  18983. Description=Included and setup with the drivers for my Compaq A3000 all-in-one printer/scanner - maybe for networking. Works fine without it - but may be needed when used over a network
  18984. [pdvdserv]
  18985. Filename=PDVDServ.exe
  18986. Confirmed=U
  18987. Description=Remote Control background application for CyberLink's PowerDVD version 5 and above. Enables you to use a remote control with your DVD drive if your drive came with one. Not required if you don't have a remote control, or don't wish to use one
  18988. [pe2ckfnt se]
  18989. Filename=chkfont.exe
  18990. Confirmed=N
  18991. Description=Used to check whether the fonts are installed properly on your computer or not for a scanner. If you don't want to execute it, you can uncheck it in the startup menu
  18992. [peeramid]
  18993. Filename=PService.exe
  18994. Confirmed=?
  18995. Description=In a "Koptimizer" folder in Program Files. <font color="#FF0000">What does it do and is it required?</font>
  18996. [pent@value 3.2]
  18997. Filename=Pent@VALUE.exe
  18998. Confirmed=U
  18999. Description=Pent@VALUE Digital Satellite Internet PC Receiver
  19000. [peqbl100]
  19001. Filename=PEQBL100.exe
  19002. Confirmed=X
  19003. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.envid.d@mm.html" target=_blank>ENVID.D</a> WORM!
  19004. [per email protection]
  19005. Filename=pavmail.exe
  19006. Confirmed=Y
  19007. Description=<a href="http://www.perantivirus.com/antivir.htm" target="_blank">PER Antivirus</a>
  19008. [perfectprint]
  19009. Filename=pfppop70.exe
  19010. Confirmed=N
  19011. Description=Print engine used by Corel WordPerfect 7 and Presentations 7
  19012. [perfomance monitor]
  19013. Filename=davcsync.exe
  19014. Confirmed=X
  19015. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32lamuda.html" target=_blank>LAMUD-A</a> WORM!
  19016. [perfomance settings]
  19017. Filename=svchost.exe
  19018. Confirmed=X
  19019. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojtofgerap.html" target=_blank>TOFGER-AP</a> TROJAN! Note - this is not the legitimate <a href="http://www.liutilities.com/products/wintaskspro/processlibrary/svchost/" target=_blank>svchost.exe</a> process which is always located in the System (9x/Me) or System32 (NT/2K/XP) folder and should not normally figure in Msconfig/Startup! This file is found in the Winnt or Windows folder
  19020. [persfw]
  19021. Filename=PersFw.exe
  19022. Confirmed=Y
  19023. Description=<a href="http://www.kerio.com/us/kpf_home.html" target="_blank">Kerio</a> or <a href="http://www.tinysoftware.com/home/tiny2?la=EN" target="_blank">Tiny</a> Personal Firewall
  19024. [persistence]
  19025. Filename=igfxpers.exe
  19026. Confirmed=N
  19027. Description=Associated with the Common User Interface module for Intel graphics cards
  19028. [personal computer]
  19029. Filename=scvhost.exe
  19030. Confirmed=X
  19031. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotaje.html" target=_blank>RBOT-AJE</a> WORM!
  19032. [personal firwall]
  19033. Filename=ptmedsrv.exe
  19034. Confirmed=X
  19035. Description=Added by the <a href="http://uk.trendmicro-europe.com/enterprise/security_info/ve_detail.php?Vname=WORM_SDBOT.XY" target=_blank>SDBOT.XY</a> WORM!
  19036. [pervasive.sql workgroup engine]
  19037. Filename=W3dbsmgr.exe
  19038. Confirmed=U
  19039. Description=Database Service Manager for Pervasive SQL 2000 Workgroup edition. Required if you use Pervasive SQL but it's recommended you start it manually before using it as it has a tendancy to crash/freeze if loaded with other applications at startup
  19040. [pestpatrol control center]
  19041. Filename=PPControl.exe
  19042. Confirmed=U
  19043. Description=<a href="http://www.pestpatrol.com/PPControl/" target="_blank">PestPatrol Control Terminal</a> - launches <a href="http://www.pestpatrol.com/default.asp" target="_blank">PestPatrol</a> features such as PPMemCheck and CookiePatrol
  19044. [pestpatrolcl]
  19045. Filename=PestPatrolCL.exe
  19046. Confirmed=?
  19047. Description=<a href="http://www.pestpatrol.com/" target= blank>PestPatrol's</a> command line scanner, combines with the Windows Task scheduler and is required in cases where schedules for regular scanning are set
  19048. [petit larousse 2001]
  19049. Filename=HIPL2000Popup.exe
  19050. Confirmed=U
  19051. Description=Popup dictionary tool
  19052. [pex sound driver]
  19053. Filename=Today's Results.vbs
  19054. Confirmed=X
  19055. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32trodea.html" target=_blank>TRODE-A</a> WORM!
  19056. [pex sound driver 2]
  19057. Filename=Today's Results.vbs
  19058. Confirmed=X
  19059. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32trodea.html" target=_blank>TRODE-A</a> WORM!
  19060. [pfw_cfgengine]
  19061. Filename=PFWCFG~1.EXE
  19062. Confirmed=?
  19063. Description=<font color="#FF0000">Personal Firewall related?</font>
  19064. [pfw_pullsrv]
  19065. Filename=PULL.EXE
  19066. Confirmed=?
  19067. Description=<font color="#FF0000">Personal Firewall related?</font>
  19068. [pgmonitr]
  19069. Filename=PgMonitr.exe
  19070. Confirmed=X
  19071. Description=<a href="http://sarc.com/avcenter/venc/data/adware.delfin.b.html" target=_blank>Delfin Promulgate</a> adware variant
  19072. [pgpsdksvc]
  19073. Filename=pgpsdkserv.exe
  19074. Confirmed=Y
  19075. Description=PGPsdkServ.exe is the new SDK service which is responsible for performing all PGP key management and cryptographic functions. This functionality was moved into a service to allow multiple modules simultaneous read/write access to the keyrings, among other things. As you can imagine, it is necessary for PGPsdkServ to be running in order to perform practically any PGP functionality
  19076. [pgpservice]
  19077. Filename=pgpservice.exe
  19078. Confirmed=U
  19079. Description=PGPservice.exe has two main purposes: (1) it handles a large part of the PGPnet functionality (along with the PGPnet driver) and (2) it allows efficient access to the PGP preferences database. The individual PGP modules normally access the preferences through PGPservice, but they are capable of a "fall-back" mode where they can handle such access on their own. Thus, if you are not running PGPnet, you may not immediately notice much of a difference if you disable PGPservice. If you are running PGPnet, you will notice a big difference
  19080. [pgptray]
  19081. Filename=pgptray.exe
  19082. Confirmed=N
  19083. Description=PGP 7.x. Provides icon tray shortcuts to PGP programs from Network Associates. Available via Start -> Programs
  19084. [pgstub.exe]
  19085. Filename=[various filenames]
  19086. Confirmed=X
  19087. Description=Unidentified adware
  19088. [pgtaff]
  19089. Filename=pgtaff.exe
  19090. Confirmed=X
  19091. Description=AdRotator adware variant
  19092. [phime2002a]
  19093. Filename=TINTSETP.EXE
  19094. Confirmed=N
  19095. Description=Part of Microsoft's Input Message Editor (IME) for translating Japanese/Chinese text in IE, Outlook and Word
  19096. [phime2002async]
  19097. Filename=TINTSETP.EXE
  19098. Confirmed=N
  19099. Description=Part of Microsoft's Input Message Editor (IME) for translating Japanese/Chinese text in IE, Outlook and Word
  19100. [phime2oo2asyst]
  19101. Filename=[path to trojan]
  19102. Confirmed=X
  19103. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojdbdoorb.html" target=_blank>DBDOOR-B</a> TROJAN!
  19104. [phonefree version 6.2]
  19105. Filename=PHONEF??.EXE
  19106. Confirmed=U
  19107. Description=An Internet telephony application. Complicated registration and ad banners tailored to your profile - see <a href="http://www.phonefree.com/" target="_blank">here</a>
  19108. [photo express calendar checker se]
  19109. Filename=CALCHECK.EXE
  19110. Confirmed=N
  19111. Description=If you create multiple Weekly/Monthly/Yearly calendars to use as your wallpaper, Photo Express will replace the wallpaper automatically. Photo Express 2.0 has a calendar checker which checks the date on your system and updates your wallpaper accordingly
  19112. [photo loader supervisory]
  19113. Filename=Plauto.exe
  19114. Confirmed=N
  19115. Description=Casio's Photo Loader software. Hook up your camera to the USB port, and it pops up and asks you if you want to load your pictures
  19116. [photoshow deluxe media manager]
  19117. Filename=mssysmgr.exe
  19118. Confirmed=N
  19119. Description=Simple Star <a href="http://www.simplestar.com/site_html/index.php" target=blank>PhotoShow Deluxe</a> photo editing and organizing software, makes it easy to send and share digital photos. Bundled with software from Nero, ComCast, SnapFish, MacroMedia and others
  19120. [photowise quicklink]
  19121. Filename=quicklnk.exe
  19122. Confirmed=N
  19123. Description=Agfa PhotoWise - "PhotoWise QuickLinkTM lets you drag and drop photos right from the camera into your document (applications must be OLE-compliant). Use PhotoWise to print contact sheets and photographic prints. Create slide shows, screen savers, wallpaper and more."
  19124. [pic system]
  19125. Filename=picx.exe
  19126. Confirmed=X
  19127. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_MYTOB.LL&VSect=P" target=_blank>MYTOB.LL</a> WORM!
  19128. [picasa media detector]
  19129. Filename=PicasaMediaDetector.exe
  19130. Confirmed=N
  19131. Description=Media detector for <a href="http://www.picasa.net/" target="_blank">Picasa</a>'s automatic photo organizer
  19132. [picasanet]
  19133. Filename=Hello.exe
  19134. Confirmed=N
  19135. Description=<a href="http://www.hello.com/index.php" target=_blank>Hello</a> is an application that allows Blogger users to post digital photos and captions directly to their personal weblogs, or blogs
  19136. [pickatag]
  19137. Filename=pickatag.exe
  19138. Confirmed=N
  19139. Description=<a href="http://home.wanadoo.nl/jeroen/software.html" target="_blank">Pick-a-tag</a> - "Freeware utility for random selection of your taglines. This utility randomly picks a tagline out of a list of taglines. It will create a signature file which your mailer can use to place under your messages"
  19140. [picprtr]
  19141. Filename=PICPRTR.EXE
  19142. Confirmed=N
  19143. Description=Program for viewing and measuring a variety of 3D CAD data formats
  19144. [picsvr]
  19145. Filename=picsvr.exe
  19146. Confirmed=X
  19147. Description=<a href="http://securityresponse.symantec.com/avcenter/venc/data/adware.delfin.html" target=_blank>Delfin Promulgate</a> adware
  19148. [picturebuzztray]
  19149. Filename=swtray.exe
  19150. Confirmed=N
  19151. Description=System Tray access to <a href="http://www.picturebuzz.com" target="_blank">PictureBUZZ</a> on-line printing software from Streetwise Software. If you use the software set the page you use as a favourite in your browser and run it manually
  19152. [pidunhk]
  19153. Filename=PIDUNHK.EXE
  19154. Confirmed=U
  19155. Description=Part of the Prodigy Internet software - part of the dialer/DUN. Presumably needed for users of that service otherwise you may not be able to connect, although you may try creating your own shortcut and see what happens
  19156. [piiserviceoe]
  19157. Filename=N/A
  19158. Confirmed=U
  19159. Description=<a href="http://www.giantcompany.com/" target=_blank>Spam Inspector</a> (nee Postal Inspector) from The Giant Company or <a href="http://www.sunbelt-software.com/product.cfm?id=930" target=_blank>iHateSpam</a> from Sunbelt Software - spam filter add-ons for OE
  19160. [pilif]
  19161. Filename=pilif.exe
  19162. Confirmed=X
  19163. Description=Added by the <a href="http://www.symantec.com/avcenter/venc/data/w32.fili@mm.html" target="_blank">FILI</a> WORM!
  19164. [pinger]
  19165. Filename=pinger.exe
  19166. Confirmed=N
  19167. Description=Pinger is the resident program for Toshiba updates. Periodically checks to see if there are any software/driver upgrades for your particular computer model. If it finds any, it posts a notification
  19168. [pingtimeout institution]
  19169. Filename=pingchek.exe
  19170. Confirmed=X
  19171. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32sdbotvy.html" target=_blank>SDBOT-VY</a> WORM!
  19172. [pinnacledrivercheck]
  19173. Filename=PSDrvCheck.exe
  19174. Confirmed=Y
  19175. Description=Part of <a href="http://www.pinnaclesys.com/" target="_blank">Pinnacle Systems</a> InstantCD/DVD and InstantCopy CD/DVD copying software that verifies drive settings. Once loaded it doesn't use any resources so you can leave it enabled
  19176. [piolet]
  19177. Filename=piolet.exe
  19178. Confirmed=N
  19179. Description=<a href="http://www.piolet.com/" target="_blank">Piolet</a> - peer-to-peer file sharing client
  19180. [pipe system]
  19181. Filename=pipe.exe
  19182. Confirmed=X
  19183. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32mytobff.html" target=_blank>MYTOB-FF</a> WORM!
  19184. [piracy]
  19185. Filename=SysUtil.exe
  19186. Confirmed=N
  19187. Description=Software Piracy Alert feature bundled with <a href="http://www.pgware.com/products/gamegain/" target=_blank>PGWare</a> software. Cries foul when it detects an 'illegal' version. The alerts are reported to disappear as soon as the software is correctly registered. There are privacy issues though: "The Software includes a feature that assigns a unique order number to GameGain based on purchase information. The Software reports this number to us via the internet either when you run the Software or enter the registration number, or both. The Software may also identify and report to us your IP address, date and time of installation, registration and/or use. We use this information strictly to count the number of installations, detect unauthorized access or piracy of the Software, and develop rough statistical data regarding the geographic location of our users"
  19188. [pivotsoftware]
  19189. Filename=wpctrl.exe
  19190. Confirmed=N
  19191. Description=PivotPro from <a href="http://www.portrait.com/" target="_blank"> Portrait Studios</a> - allows a screen to be rotated to match rotated LCD screens, for example). Shortcut available via Display Properties
  19192. [pixel32]
  19193. Filename=Pixel32.exe
  19194. Confirmed=X
  19195. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/trojan.gema.html" target="_blank">GEMA</a> TROJAN!
  19196. [pixelpwr32]
  19197. Filename=Pixelpwr32.exe
  19198. Confirmed=X
  19199. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/trojan.gema.html" target="_blank">GEMA</a> TROJAN!
  19200. [pixelsvr]
  19201. Filename=Pixelsvr.exe
  19202. Confirmed=X
  19203. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/trojan.gema.html" target="_blank">GEMA</a> TROJAN!
  19204. [pjwebcam]
  19205. Filename=pjWebCam.exe
  19206. Confirmed=U
  19207. Description=Webcam automation software that saves regular photos from webcam and can also act as HTTP server
  19208. [pk guard]
  19209. Filename=pkguard32.exe
  19210. Confirmed=X
  19211. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.guapim.html" target=_blank>GUAPIM</a> WORM!
  19212. [pk services]
  19213. Filename=pksvc.exe
  19214. Confirmed=X
  19215. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32forbotbw.html" target=_blank>FORBOT-BW</a> WORM!
  19216. [pktanything]
  19217. Filename=PocketCompanion.exe
  19218. Confirmed=U
  19219. Description=<a href="http://www.o2pocket.com/pocketanythinginfo" target=_blank>PocketAnything</a> lets you save anything on your computer to your mobile, with one click
  19220. [planlµgningsagent]
  19221. Filename=mstask.exe
  19222. Confirmed=U
  19223. Description=Windows Task Scheduler (on Danish language versions of Windows) - displayed as a box with a stopwatch in the System Tray. Required if you have regularly scheduled tasks like defragmenting, ScanDisk, weekly virus scans and so on
  19224. [playboy]
  19225. Filename=playavi.exe
  19226. Confirmed=X
  19227. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/pwsteal.gamanlock.html" target=_blank>GAMANLOCK</a> TROJAN!
  19228. [pleapcpucpl]
  19229. Filename=pleapu.exe
  19230. Confirmed=U
  19231. Description=<a href="http://www.powerleap.com/Products/ccp.htm" target="_blank">CPU Control Panel</a> for the Powerleap CPU upgrade
  19232. [plffap]
  19233. Filename=HotfixQ0306270.exe
  19234. Confirmed=?
  19235. Description=Prolific Technology Inc. USB Flash Disk driver - <font color="#FF0000">is it required in startup?</font>
  19236. [plguni]
  19237. Filename=Plguni.exe
  19238. Confirmed=N
  19239. Description=<a href="http://www.mcafee.com/myapps/qc3/default.asp" target="_blank">McAfee QuickClean 3.0</a> - removes internet clutter and unwanted programs
  19240. [plmg.exe]
  19241. Filename=plmg.exe
  19242. Confirmed=U
  19243. Description=Paragon Last Minute Bidder - auction assistant software
  19244. [ploader]
  19245. Filename=umsd.exe
  19246. Confirmed=?
  19247. Description=USB Mass Storage Disk related tray icon. <font color="#FF0000">Is it required?</font>
  19248. [plob]
  19249. Filename=kernel.com
  19250. Confirmed=X
  19251. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=BKDR_OPTIXPRO.12" target="_blank">OPTIXPRO.12</a> TROJAN!
  19252. [plook]
  19253. Filename=plook.exe
  19254. Confirmed=X
  19255. Description=AffiliateTarget.com alias <a href="http://www.symantec.com/avcenter/venc/data/adware.plook.html" target=_blank>PLook</a> adware
  19256. [pluck tray]
  19257. Filename=PluckTray.exe
  19258. Confirmed=U
  19259. Description=RSS (XML TAGS) reader program
  19260. [plucksvr]
  19261. Filename=PluckUpdater.exe
  19262. Confirmed=?
  19263. Description=<a href="http://www.pluck.com/" target=_blank>Pluck</a> Toolbar updater
  19264. [plug and play]
  19265. Filename=msnmsg.exe
  19266. Confirmed=X
  19267. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotid.html" target=_blank>RBOT-ID</a> WORM!
  19268. [pluto! pager]
  19269. Filename=srvhandle.exe
  19270. Confirmed=X
  19271. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.redplut.html" arget=_blank>REDPLUT</a> VIRUS!
  19272. [plxstart]
  19273. Filename=PLXSTART.EXE
  19274. Confirmed=U
  19275. Description=Sets the spindown timeout and access speeds at startup and displays the "Plextor Manager 2000" splash screen for Plextor CD-RW.
  19276. [plxtask]
  19277. Filename=PLXTASK.EXE
  19278. Confirmed=N
  19279. Description=Taskbar utility for a "control panel" for a Plextor CD-RW. Has MVP 2000 (audio CD player), DiscDupe 2000 (self explanatory CD copying program) and AudioCapture 2000 (rips audio CDs into MP3 or WAV files)
  19280. [pm32ctrl]
  19281. Filename=pwr32crtl.exe
  19282. Confirmed=X
  19283. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=TROJ_CRYPTER.A" target="_blank">CRYPTER.A</a> TROJAN!
  19284. [pm32info]
  19285. Filename=pm32info.exe
  19286. Confirmed=X
  19287. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=TROJ_CRYPTER.A" target="_blank">CRYPTER.A</a> TROJAN!
  19288. [pmc]
  19289. Filename=764.exe
  19290. Confirmed=X
  19291. Description=Adult content dialler
  19292. [pmcqt]
  19293. Filename=pmcqt.exe
  19294. Confirmed=X
  19295. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojdlucav.html" target=_blank>DLUCA-V</a> TROJAN!
  19296. [pmedia]
  19297. Filename=winsrvc.exe
  19298. Confirmed=X
  19299. Description=Internet marketing sofware from <a href="http://www.permissionedmedia.com/" target="_blank">Permissioned Media Inc.</a> as used in E-Card FriendGreetings foistware - see <a href="http://vil.nai.com/vil/content/v_99760.htm" target="_blank">here</a>. Treated by Trend as the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_FRIENDGRT.B" target="_blank">FRIENDGRT.B</a> WORM!
  19300. [pmproxy]
  19301. Filename=PmProxy.exe
  19302. Confirmed=?
  19303. Description=Associated with Analog Devices "SoundMAX" audio chipset - often built-in to motherboards. <font color="#FF0000">What does it do and is it required?</font>
  19304. [pmr]
  19305. Filename=pmr.exe
  19306. Confirmed=X
  19307. Description=<a href="http://research.sunbelt-software.com/threat_display.cfm?name=PowerStrip&threatid=14844&search=PowerStrip" target=_blank>PowerStrip</a> foistware
  19308. [pmt]
  19309. Filename=personalmoneytree.exe
  19310. Confirmed=U
  19311. Description=According to the web site <a href="http://www.personalmoneytree.com/" target=_blank>Personal Money Tree</a> is an automatic cash rebate program. Note: Not recommended
  19312. [pmtshoot]
  19313. Filename=pmtshoot.exe
  19314. Confirmed=N
  19315. Description=MS tool for troubleshooting power management problems
  19316. [pmxinit]
  19317. Filename=pmxinit.exe
  19318. Confirmed=U
  19319. Description=Restores user display preferences Kyro2 based graphics cards. Not required unless you change the default settings - such as gamma 
  19320. [pnagent]
  19321. Filename=PNAgent.exe
  19322. Confirmed=N
  19323. Description=<a href="http://www.phatnoise.com/products/software/music_manager.php" target="_blank">PhatNoise Music Manager</a> - manages WMA, MP3, WAV, etc music files
  19324. [pnp]
  19325. Filename=wuaaclt.exe
  19326. Confirmed=X
  19327. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32lilbrea.html" target=_blank>LILBRE-A</a> WORM!
  19328. [pnp driver]
  19329. Filename=playboy.exe
  19330. Confirmed=X
  19331. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32forbotfr.html" target=_blank>FORBOT-FR</a> WORM!
  19332. [pnp fix]
  19333. Filename=[worm filename]
  19334. Confirmed=X
  19335. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/w32rbotakq.html" target=_blank>RBOT-AKQ</a> WORM!
  19336. [pnpchk]
  19337. Filename=Pnpchk.exe
  19338. Confirmed=U
  19339. Description=<a target="_blank" href="http://www.aztech.com/index.htm">Aztech Labs</a> Sound 3 PnP driver
  19340. [pnsetup]
  19341. Filename=PNSetup.exe
  19342. Confirmed=U
  19343. Description=<a href="http://www.hdsoft.com/?0.1" target="_blank">PopNot</a> - pop-up killer
  19344. [pntask services]
  19345. Filename=pntask.exe
  19346. Confirmed=X
  19347. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/backdoor.lala.c.html" target="_blank">LALA.C</a> TROJAN!
  19348. [pocket sheet sync]
  19349. Filename=PSXLTRAY.EXE
  19350. Confirmed=U
  19351. Description=Casio <a href="http://www.pcsync.de/download/e_pocketsheet.asp" target="_blank"> Pocket Sheet</a> synchronization software
  19352. [poet]
  19353. Filename=Poet.exe
  19354. Confirmed=X
  19355. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.doep.a.html" target="_blank">DOEP.A</a> WORM!
  19356. [pofatch]
  19357. Filename=nstrue.exe
  19358. Confirmed=X
  19359. Description=Added by the <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.randexz.html" target="_blank">RANDEX.Z</a> WORM!
  19360. [point32]
  19361. Filename=point32.exe
  19362. Confirmed=U
  19363. Description=<a href="http://www.microsoft.com/intellipoint/" target="_blank">Microsoft Intellipoint</a> software for their Intellimouse series of mice - required if you use non-standard Windows driver features
  19364. [pointer]
  19365. Filename=point32.exe
  19366. Confirmed=U
  19367. Description=<a href="http://www.microsoft.com/intellipoint/" target="_blank">Microsoft Intellipoint</a> software for their Intellimouse series of mice - required if you use non-standard Windows driver features
  19368. [pollon]
  19369. Filename=pollone.exe
  19370. Confirmed=X
  19371. Description=Added by the <a href="http://se.trendmicro-europe.com/smb/security_info/ve_detail.php?Vname=WORM_SPYBOT.FW" target=_blank>SPYBOT.FW</a> WORM!
  19372. [polo.exe]
  19373. Filename=polo.exe
  19374. Confirmed=X
  19375. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojagentpe.html" target=_blank>AGENT-PE</a> TROJAN!
  19376. [pop]
  19377. Filename=PopSrv***.exe
  19378. Confirmed=X
  19379. Description=<a href="http://www.pchell.com/support/peopleonpage.shtml" target="_blank">PeopleonPage</a> foistware, bundled with Grokster where *** are random digits
  19380. [pop-up smasher]
  19381. Filename=PopupSmasher.exe
  19382. Confirmed=U
  19383. Description=<a href="http://www.popupsmasher.com/" target="_blank">Pop-Up Smasher</a> - pop-up killer
  19384. [pop-up stopper]
  19385. Filename=dpps2.exe
  19386. Confirmed=U
  19387. Description=<a href="http://www.popupstopper.net/product_dpps.html" target="_blank">Pop-Up Stopper</a> Companion from Panicware. Pop-up blocker integrated into the IE toolbar. Note that the Pro version doesn't load in startup as it is installed as an Internet Explorer toolbar. Can cause problems with IE if you use WinXP and uninstall Service Pack 1. Uninstalling the software leaves it in the startup group
  19388. [pop-up_blocker]
  19389. Filename=Popup.exe
  19390. Confirmed=U
  19391. Description=A <a href="http://www.totalidea.com/frameset-tweakxp.htm" target=_blank>Tweak-XP</a> component, blocks advertisement pop-up windows in Internet Explorer. Can be enabled/disabled via Tweak-XP -> Internet Tweaks
  19392. [pop-up_scanner]
  19393. Filename=Popupscn.exe
  19394. Confirmed=U
  19395. Description=<a href="http://www.panicware.com/" target=_blank>Panicware</a> popup blocker
  19396. [pop3trap.exe]
  19397. Filename=pop3trap.exe
  19398. Confirmed=Y
  19399. Description=PC-Cillin 2000 antivirus software -> E-mail scanner
  19400. [popesvr]
  19401. Filename=PopeSvr.exe
  19402. Confirmed=X
  19403. Description=Added by the <a href="http://www.sophos.com/virusinfo/analyses/trojlegmiraj.html" target=_blank>LEGMIR-AJ</a> TROJAN!
  19404. [popmark]
  19405. Filename=WinTask.exe
  19406. Confirmed=X
  19407. Description="Pop Marketing" adware
  19408. [popnot]
  19409. Filename=PopNot.exe
  19410. Confirmed=U
  19411. Description=<a href="http://www.hdsoft.com/?0.1" target="_blank">PopNot</a> - pop-up killer
  19412. [popoops]
  19413. Filename=PopOops.exe
  19414. Confirmed=U
  19415. Description=<a href="http://www.gasanov.net/PopOops.htm" target="_blank">PopOops</a> - pop-up killer
  19416. [popopen]
  19417. Filename=popopen.exe
  19418. Confirmed=U
  19419. Description=<a href="http://www.jsmadeeasy.com/archive/shellutilities/" target="_blank">PopOpen</a> makes your windows spring open with animation effects
  19420. [poproxy]
  19421. Filename=POPROXY.EXE
  19422. Confirmed=Y
  19423. Description=Proxy E-mail protection from Norton Anti-Virus (prior to 2002). If you have it installed, leave it enabled to automatically check for suspect attachments in E-mails that may contain viruses. It downloads the E-mail into poproxy, which serves as a proxy server on the local machine, before scanning it
  19424. [popsrv146]
  19425. Filename=popsrv146.exe
  19426. Confirmed=X
  19427. Description=<a href="http://research.sunbelt-software.com/threat_display.cfm?name=AproposMedia&threatid=14978&search=AproposMedia" target=_blank>AproposMedia</a> adware
  19428. [popsubtract]
  19429. Filename=PopSub.exe
  19430. Confirmed=U
  19431. Description=<a href="http://www.popsubtract.com/features.html" target="_blank">PopSubtract</a> - pop-up killer
  19432. [popup ad filter]
  19433. Filename=PopFilter.exe
  19434. Confirmed=U
  19435. Description=<a href="http://www.meaya.com/" target="_blank">Popup Ad Filter</a> - pop-up killer
  19436. [popup blocker system]
  19437. Filename=PopUpBlocker.exe
  19438. Confirmed=X
  19439. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  19440. [popup blocker system326a monitoring]
  19441. Filename=PopUpBlocker6a.exe
  19442. Confirmed=X
  19443. Description=Added by the <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_RBOT.AUH&VSect=P" target=_blank>RBOT.AUH</a> WORM!
  19444. [popup blocker system8 monitoring]
  19445. Filename=PopUpBlocker8.exe
  19446. Confirmed=X
  19447. Description=Added by a variant of the <a href="http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39437" target=_blank>RBOT</a> WORM!
  19448. [popup blocker updater]
  19449. Filename=regsvr32 veev****.dll [**** = random char]
  19450. Confirmed=X
  19451. Description=<a href="http://www.pestpatrol.com/PestInfo/s/safeguardprotect.asp" target=_blank>SafeguardProtect/Veevo</a> hijacker
  19452. [popup buster+]
  19453. Filename=popupbuster.exe
  19454. Confirmed=N
  19455. Description=<a href="http://popupbuster.net/" target=_blank>PopUp Buster</a> - free Pop-up blocker
  19456. [popup defence updater]
  19457. Filename=regsvr32 /s [path] pdf****.dll [* = random char/digit]
  19458. Conf