To download Windows 8. You can search for any of the following terms to find and display entries in the start up programs database but the minimum search is 3. Search button. Results are sorted by the Startup ItemName field. From Windows 1. 08 Task Manager CTRLSHIFTESC Startup Name, Command Note right click on any column heading and ensure Command is tickedFrom MSConfig Start Run msconfig Startup Startup Item, Command. From Registry Editor Start Run regedit Name, Data. From Sys. Internals free Auto. Uniblue Registrycleanerkit Speed Laptop Fix, Clean UNIBLUE REGISTRYCLEANERKIT SPEED LAPTOP And Optimize PC SPEED Up Your PC FREE Scan Now Speedy Pc Pro Cleaner Fix, Clean SPEEDY PC PRO CLEANER And Optimize PC SPEED Up Your PC FREE Scan Now Recommended. Aml Registry Cleaner. Runs utility Auto. Run Entry, Filename from Image PathFrom Windows Defender for XPVista Tools Software Explorer Display Name, Filename. O4 entries from Hijack. This or similar logging utilities Text highlighted here this text or here Startup this text. Filename. Any other text. Alternatively, you can browse the full database without the search facility over a number of pages or. CommandData field, but the results may. A B C D E F G H I J K L B N O P Q R S T U V W X Y ZNOTE Searching for common words i. Please click on the Search button. IStartup Item or Name. Status. Command or Data. Description. Testedtest. Xi love you. exe. Detected by Sophos as TrojSingu TNo. IObit. Bar Browser Plugin Loader. Ui. 0brmon. exe. Detected by Malwarebytes as PUP. Optional. Mind. Spark. The file is located in Program. FilesIObit. Bartoolbar. If bundled with another installer or not installed by choice then remove it. Norate. exe. Xi. 11r. Detected by Sophos as W3. Bagle INorate. exe. Xi. 1ru. 74n. 4. exe. Detected by Symantec as W3. Beagle. Emm. No. I3. XI3. 86. exe. Detected by Symantec as W3. My. Power. Bmm and by Malwarebytes as Backdoor. Agent. Noi. 38. 6app. Xi. 38. 6app. EXEDetected by Mc. Afee as RDNGeneric. No. Config Loadatiorin. XI3. Explorer. exe. Detected by Symantec as Backdoor. Sdbot. HNo. XX3. VJ0. EZINXi. 40. Tgc. D. Detected by Mc. Afee as Generic Back. Door and by Malwarebytes as Backdoor. Agent. DCENoi. 6g. Xi. 6g. 8xs. exe. Detected by Kaspersky as Virus. Win. 32. Virut. ce and by Malwarebytes as Trojan. Agent. The file is located in App. DataNo. I8. 1SHELLI8. SHELL. exe. Appears to be related to drivers for an Intel 8. ASUS motherboard. What does it do and is it requiredNoi. Qwldt. 9MZxoi. Edov. R. vbs. Xi. Qwldt. MZxoi. Edov. R. vbs. Detected by Mc. Afee as RDNGeneric DropperMalwarebytes as Trojan. Agent. WSC. Note the file is located in User. Startup and its presence there ensures it runs when Windows starts. Noi. 8kfangui. UI8kfan. GUI. exe. I8kfan. GUI Dell InspironLatitudePrecision fan control utility. No. Intruder. Alert. Xia. 99. exe. Intruder Alert 9. Bonzi spyware. No. IAAnotif. UIaanotif. Part of Intel Matrix Storage Manager formally known as Intel Application Accelerator and Intel Application Accelerator RAID Edition. Used in conjunction with the event monitor service IAANTMON Iaantmon. RAID volume status changes, HDD IO errors or HDD SMART event via a System Tray icon when an event occurs. Via this icon you can then choose to launch the Intel Matrix Storage Console or ignore the current alert. Yes. RAID Event Monitor. UIaanotif. exe. Part of Intel Matrix Storage Manager formally known as Intel Application Accelerator and Intel Application Accelerator RAID Edition. Used in conjunction with the event monitor service IAANTMON Iaantmon. RAID volume status changes, HDD IO errors or HDD SMART event via a System Tray icon when an event occurs. Via this icon you can then choose to launch the Intel Matrix Storage Console or ignore the current alert. Yesi. Plus. Agent. Ui. Agent. exeiriver PLUS media management utility for their range of portable media devices. Noi. Plus. Agent. Ui. Agent. 2. exeiriver PLUS media management utility for their range of portable media devices. No. 3PUDECIAXIAInstall. Installer for the Internet Antivirus and Internet Antivirus Pro rogue security software not recommended, removal instructions here. No. Internet Answering Machine. UIAM. exe. From Callwave offers a free utility to monitor your incoming phonecalls if you only have a single telephone line for internet access. Noiamapp. YIAMAPP. EXEPart of Symantecs now discontinued Norton Personal Firewall and also included in older versions of Norton Internet Security. Also part of their now discontinued Symantec Desktop Firewall for business customers. Formally At. Guard by WRQ until their acquisition by Symantec. Runs as a service on an NT based OS such as Windows 1. VistaXPNo. Internet Answering Machine. UIAMNET1. EXEFrom Callwave. It offers a free utility to monitor your incoming phonecalls if you only have a single telephone line for internet access. No. NAV Auto Update. Xiamsad. exe. Detected by Sophos as W3. Spybot CENo. Ia. Nv. Srv Ia. Nv. Srv. Related to the option ROM part of the Intel Matrix Storage Manager. Located in Program. FilesIntelIntel Matrix Storage ManagerOROMa. Nv. Srv. What does it do and is it required No. SMIANXianmonitor. Advanced. Cleaner rogue security software not recommended, see here. Removal instructions here. No. Iap IAP. EXEPart of Dell Open. Manage Client Instrumentation software that allows remote management application programs to access information about, monitor the status of or change the state of the client computer, such as shutting it down remotely. No. Live Enterprise Suite. XIAPro. exe. Live Enterprise Suite rogue security software not recommended, removal instructions here. No. Internet Antivirus Pro. XIAPro. exe. Internet Antivirus Pro rogue security software not recommended, removal instructions here. Detected by Malwarebytes as Rogue. Internet. Anti. Virus. Noias. Uias. exe. Invisible. ASpy keystroke loggermonitoring program remove unless you installed it yourself No. IASHLPRXIASHLPR. EXEDetected by Trend Micro as WORMOPASERV. TNo. Microsoft Keyboard Enhance 2. Xiasrecst. exe. Detected by Sophos as TrojBckdr QILNo. Microsoft Keyboard Enhance V2. Xiasrecst. exe. Detected by F Prot as W3. Downloader. 2. AILINo. Microsoft media services. XIassd. exe. Added by the SPYBOT. HE WORM No. Nz. FGQ0. Q5. MERGODVGQj. Y5. N0. Xiastool. exe. Detected by Malwarebytes as Backdoor. IRCBot. The file is located in User. ProfileNo. IAStor. Icon. UIAStor. Icon. System Tray access to, and notifications for Intel Rapid Storage Technology which provides new levels of protection, performance, and expandability for desktop and mobile platforms. Whether using one or multiple hard drives, users can take advantage of enhanced performance and lower power consumption. If enabled it will give you quick access to the main utility and provide alerts if any problems are detected. Yes. Delayed Launcher. Treasure Of The Old Man Of The Pyramids Pdf Viewer there. UIAStor. Icon. Launch. IAStor. Icon. exe. System Tray access to, and notifications for Intel Rapid Storage Technology which provides new levels of protection, performance, and expandability for desktop and mobile platforms. Whether using one or multiple hard drives, users can take advantage of enhanced performance and lower power consumption. If enabled it will give you quick access to the main utility and provide alerts if any problems are detected. Yes. IAStor. Icon. UIAStor. Icon. Launch. IAStor. Icon. exe. System Tray access to, and notifications for Intel Rapid Storage Technology which provides new levels of protection, performance, and expandability for desktop and mobile platforms.