Windows startup programs - Database search. If you're frustrated with the time it takes your Windows 8/7/Vista/XP PC to boot and then it seems to be running slowly you may have too. This is the original. Services are not included - see below. For further information on this and how to identify and disable. Introduction page. See here for further information on random entries - which are typically added by viruses and other. Last database update : - 3. August, 2. 01. 65. You can search for any of the following terms to find and display entries in the start- up programs database but the minimum search is 3.
Diagram 1 is a simple flowchart of the major programs that control the sequence of a normal Windows startup. There are many more essential programs that are. DOS (Disk Operating System) is an operating system that runs from a hard disk drive. The term can also refer to a particular family of disk operating systems, most. A DOS (8086) cross compiler is currently being developed in FPC trunk (the development version). It started as a hobby project meant to explore how to port. Windows startup programs - Database search. If you're frustrated with the time it takes your Windows 8/7/Vista/XP PC to boot and then it seems to be running slowly. Change Startup Programs DostResults are sorted by the Startup Item/Name field. From Windows 8 Task Manager (CTRL+SHIFT+ESC . It's a small antidialer utility which monitors whether you're trying to dial a new connection. It basically asks you do you want to dial the shown number or not. Protects agains dialer malware. No. Post. Update. Xt. exe. Detected by Malwarebytes Anti- Malware as Trojan. Injector. MSIL. The file is located in %App. Data%\Microsoft. Not. Xt. exe. Detected by Dr. Web as Trojan. Down. Loader. 9. 2. 55. Malwarebytes Anti- Malware as Trojan. Agent. TNo. Sygate Personal Firewall. Xt. 1ktik. exe. Detected by Sophos as W3. Rbot- VPNomicrososot. Xt. 2. exe. Detected by Dr. Web as Trojan. Down. Loader. 2. 4. 55. Malwarebytes Anti- Malware as Trojan. Agent. Not. 2serv. Xt. 2serv. exe. Detected by Intel Security/Mc. Afee as W3. 2/Stration. No. T3. Console. UT3. Console. exe. Related to T3 Security Suite - prevents unauthorized or inappropriate access to your PC and data. No. WINTASKXt. 4skgmr. Added by the MYTOB. CM WORM! No. WINTASKXt. Detected by Sophos as W3. Mytob- AKNo. Taakj. XTaakj. 20. 05. exe. Detected by Dr. Web as Trojan. Btc. Mine. 5. 07 and by Malwarebytes Anti- Malware as Trojan. Agent. MNRNo. Tabbtn. Ex. XTabbtn. Ex. exe. Detected by Sophos as Troj/Agent- ABMG and by Malwarebytes Anti- Malware as Trojan. Banker. H. The file is located in %Local. App. Data%\App. Server. No. Tabbtn. Ex. XTabbtn. Ex. exe. Detected by Malwarebytes Anti- Malware as Trojan. Banker. H. The file is located in %Local. App. Data%\Microsoft\Windows\. The file is located in %Program. Files%\Tab. Choice. No. Tablet. NTablet. Loads the drivers for a Wacom Graphics Tablet on older OS's. Can be unchecked in MSConfig without problems if you don't need the tablet functional all the time - create your own shortcut if you need to run it ad hoc. If you forget to run it before running Paint Shop Pro & Adobe Photo Shop you may find the following: (1) Paint Shop Pro (version 7. Browse function will NOT work (program freezes) (b) On program exit, PSP does not terminate (you have to CTRL+ALT+DEL to close it) (2) Photo Shop (version 6. Program functions slowdown (d) On program exit it takes noticeably longer to shut down (like 3. No. Microsoft Text Input Processor. XTable. Text. Service. Detected by Microsoft as Trojan. Dropper: Win. 32/Duberath. A. The file is located in %Common. Files%\System. No. Microsoft Text Input Processor. XTable. Text. Service. Detected by Dr. Web as Trojan. Down. Loader. 4. 4. The file is located in %Program. Files%\Windows NT\Table. Text. Service. No. Tablet Task. Xtabletsk. Detected by Sophos as W3. Rbot- AJBNotabloc. Xtabloc. exe. Detected by Intel Security/Mc. Afee as RDN/Generic. Malwarebytes Anti- Malware as Trojan. Agent. TBL. Note - the file is located in %User. Startup% and its presence there ensures it runs when Windows starts. Notabsync. Xtabsyncu. Detected by Intel Security/Mc. Afee as Generic PUP. Malwarebytes Anti- Malware as Adware. Winggo. KNo. Tablet. Tip. Utabtip. exe. This is the Tablet PC Input Panel for Windows XP Tablet PC Edition. This utility allows you to use a pen (in conjunction with a touchscreen or tablet) to enter text into a document or input field (such as a URL in a browser) using either handwriting or the on- screen keyboard. This utility is also included with Windows 7 and Vista but only appears to run at startup if using the XP Tablet PC version. This cannot be confirmed at present. No. Tab. User. W. YTab. User. W. exe. Wacom pen tablet driver. No. Tacawcxlkorxopzk. XTacawcxlkorxopzk. Detected by Malwarebytes Anti- Malware as Trojan. PWS. IRCBot. The file is located in %App. Data%No. TAcel. Mgr? TAcel. Mgr. exe. TOSHIBA Acceleration Utilities related. What does it do and is it required? No. Tad. Ntad. exe. From Turtle Beach's Santa Cruz on a Dell Win. ME system. Not required - works fine without it including keyboard hot controls for volume and mute. No. HKEYok. Xtadxtr. Detected by Sophos as Troj/QQPass- ONo. Regexit. Xtadxtr. Detected by Sophos as Troj/QQPass- ONo. Rnudll. 32. Xtadxtr. Detected by Sophos as Troj/QQPass- ONo. Rundil. 32. Xtadxtr. Detected by Sophos as Troj/QQPass- ONo. Rundli. 32. Xtadxtr. Detected by Sophos as Troj/QQPass- ONosdsr. Xtadxtr. exe. Detected by Sophos as Troj/QQPass- ONo. TAG? tag. exe?? No. Windows Tagmsnger. Xtagmr. exe. Added by the MYTOB- G WORM! No. Tahni Deskmate. NTahni. exe. Tahni Deskmate - . The file is located in %User. Startup% and its presence there ensures it runs when Windows starts. No. Google. Update. XTakis. ESD. exe. Detected by Malwarebytes Anti- Malware as Trojan. Agent. The file is located in %Temp%No. Media SDKXtakshost. Detected by Malwarebytes Anti- Malware as Backdoor. Agent. SDK. Generic. The file is located in %App. Data%\msconf. No. Realtek Voice Manage. Xtakshost. exe. Detected by Intel Security/Mc. Afee as RDN/Generic Dropper! Malwarebytes Anti- Malware as Trojan. Agent. MNRNo. Start Upping. Xtaksmgr. exe. Added by the RBOT- QK WORM! No. Windows Service Controller Agent. Xtaksmgr. exe. Added by a variant of the IRCBOT BACKDOOR! See here. No. Win. XPService. Xtaksmgr. Detected by Trend Micro as BKDR. The file is located in %Root%No. Win. XPService. Xtaksmgr. Detected by Trend Micro as BKDR. The file is located in %System%No. Win. XPService. Xtaksmgr. Detected by Microsoft as Backdoor: Win. Kirsun. A and by Malwarebytes Anti- Malware as Backdoor. Bot. The file is located in %Windir%\Fonts. No. Windows UDP Control Center. Xtaksmrg. exe. Detected by Kaspersky as Trojan. Win. 32. Agent. woh and by Malwarebytes Anti- Malware as Backdoor. Bot. The file is located in %Windir%Notalk. Xtalk. bat. Detected by Sophos as W3. Tiotua- GNo. Talk. Host. Xtalkhost. exe. Detected by Malwarebytes Anti- Malware as Trojan. Downloader. TK. The file is located in %Local. App. Data%No. Talking. Reminder. NTalking. Reminder. exe. Talking Reminder from Software River Solutions - talking calendar reminder. Notalknow? talknow. Could it be related to this or something similar? No. OLFMLS4. SJ0. M7. XTALXROU8. exe. Detected by Intel Security/Mc. Afee as RDN/Generic Dropper! Malwarebytes Anti- Malware as Backdoor. Agent. RNDNotamio. Xtamio. exe. Detected by Malwarebytes Anti- Malware as Trojan. Ransom. BL. The file is located in %App. Data%No*Tamp. Mon? Part of the Norton Family parental control system. No. Service ares. Xtanga. exe. Added by the IRCBOT- AHO TROJAN! No. Tango. Manager? Tango. Manager. exe. Tango Broadband access software. The file is located in %System%No. TAPNETXtap. exe. Detected by Intel Security/Mc. Afee as PWS- Zbot. Malwarebytes Anti- Malware as Backdoor. Agent. DCNo. Tapicfg. XTapicfg. exe. Cool. Web. Search Tapicfg parasite variant. No. Tapicfg. exe. Xtapicfg. exe. Malware installed by different rogue security software including Spy. Killer. Pro. No. Tapi. TNAUTapi. TNA. exe. Telephony Location Selector allowing mobile users to change dialling locations - part of the Win. Power Toys. No. Google. Chrome. Auto. Launch. The file is located in %Local. App. Data%\Taplika\Application. If bundled with another installer or not installed by choice then remove it. No. Internet Security Services. XTaquito. exe. Detected by Malwarebytes Anti- Malware as Worm. Auto. Run. The file is located in %Root%\RESTORE\S- 1- 5- 2. No. Tardis. UTardis. Tardis - time synchronization software. No. HKCUXTarget Manager. Detected by Intel Security/Mc. Afee as RDN/Generic. Malwarebytes Anti- Malware as Backdoor. HMCPol. Gen. No. HKLMXTarget Manager. Detected by Intel Security/Mc. Afee as RDN/Generic. Malwarebytes Anti- Malware as Backdoor. HMCPol. Gen. No. Policies. XTarget Manager. exe. Detected by Intel Security/Mc. Afee as RDN/Generic. Malwarebytes Anti- Malware as Backdoor. Agent. PGen. No. Target Manager. XTarget Manager. exe. Detected by Intel Security/Mc. Afee as RDN/Generic. Malwarebytes Anti- Malware as Backdoor. Agent. ENo. Wnd. 32. Xtarhost. exe. Detected by Dr. Web as Win. 32. HLLW. Autoruner. 2. 1. 28. Malwarebytes Anti- Malware as Worm. Auto. Run. WNGen. Notascmgr. exe. Xtascmgr. Detected by Malwarebytes Anti- Malware as Trojan. Tech. Support. Scam. Note - this entry loads from the Windows Startup folder and the file is located in %App. Data%\Microsoft. Exch. No. Taesk managers. Xtase. pif. Detected by Sophos as W3. Rbot- AYKNo. Host Process for Windows Tasks. Xtashost. exe. Detected by Intel Security/Mc. Afee as Generic PWS. Malwarebytes Anti- Malware as Trojan. Key. Logger. TSNo. Task Scheduler Engine. XTask Scheduler Engine . Detected by Intel Security/Mc. Afee as Generic Dropper. Notaskeng. exe. XTask Scheduler Engine. Detected by Malwarebytes Anti- Malware as Backdoor. Password. Stealer. The file is located in %User. Temp%No. Task Scheduler. Xtask scheduler. exe. Detected by Microsoft as Trojan: Win. Reveton. No. SPLASHSCREENSTARTERXTask Service. Detected by Intel Security/Mc. Afee as RDN/Generic. Malwarebytes Anti- Malware as Backdoor. Messa. ENo. Windows Bootup. Xtask- mngr. exe. Detected by Sophos as W3. Rbot- AWPNo. AVIXtask. Detected by Malwarebytes Anti- Malware as Backdoor. Agent. E. The file is located in %Windir%\task. No. HKCUXtask. exe. Detected by Malwarebytes Anti- Malware as Backdoor. HMCPol. Gen. The file is located in %System%\install. No. HKCUXtask. exe. Detected by Malwarebytes Anti- Malware as Backdoor. HMCPol. Gen. The file is located in %System%\System. No. HKLMXtask. exe. Detected by Malwarebytes Anti- Malware as Backdoor. HMCPol. Gen. The file is located in %System%\install. No. HKLMXtask. exe. Detected by Malwarebytes Anti- Malware as Backdoor. Interesting DOS programs - Utility Programs. Here are several links to various DOS software and other DOS related websites. Most are freeware but a few are. I welcome any comments and/or suggestions you may have about this webpage or other DOS programs for me to know about. Also, do email a thank you to the authors of any of the programs you use. If you like to see Interesting Windows and Mac programs similiar to this page, visit my computer user group, the Trinidad and Tobago Computer Society. View all of the DOS programs on one webpage : Interesting DOS programs - Full index (note : size of page is about 5. K)Comments? My E- mail address : Dev Anand Teelucksingh, devtee at gmail. Last updated: April 2.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
January 2017
Categories |