Thanks to visit codestin.com
Credit goes to web.archive.org

CastleCops Home
Botmasters Take Heed . You Are Being Put On Notice
Report Evidence, Don't delete it! ... [Phish Filet] [Spoiling Spam] [Hunting Malware]
Need help? Click here to register for free! Absolutely zero advertisements on this site!

spacer spacer

O23 List of Windows XP/NT services

Currently 3393 entries and growing...
Last updated on 2007-10-01 20:24:26 Eastern.


This list was originally started at SpywareAid with 730 entries and Matt gave CastleCops permission to host it. CastleCops has since (May 2005) been adding new entries to it here. The new items may not be in the original list but attempts are made to ensure the original is also updated. The full HTML list is here.

KEY:
  • "L" = Legitimate
  • "O" = Open to Debate
  • "X" = Malware/Bad
  • "?" - Unknown

  •   

    ABC List: A - B - C - D - E - F - G - H - I - J - K - L - M - N - O - P - Q - R - S - T - U - V - W - X - Y - Z



    NameStatusFilenameDescription
    @%ProgramFiles%Windows Media Playerwmpnetwk.exe,-101
    (WMPNetworkSvc)
    Lwmpnetwk.exeRelated to Windows_Media_Player Network Sharing Service. Note: Located in %ProgramFiles%\Windows Media Player\
    a-squared Anti-Dialer Service (a2AntiDialer)La2service.exeRelated to Related to a-squared Virus protection software. Note: Located in \%Program Files%\a-squared Anti-Dialer\
    Belgium Identity Card Service
    (BELGIUM_ID_CARD_SERVICE)
    LBelpic PCSC Service.exe Belgium Identity Card Middleware from Zetes/CSC
    Dell Printer Status Database (DLSDB)?DLSDBNT.EXERelated to Dell_Printers Note: Located in C:\Program Files\Dell Printers\Additional Color Laser Software\Status Monitor\
    license Llic_srv.exelicense
    LXCCCustomerConnectLLXCCserv.exeRelated to Lexmark printers Note: Located in %windir%\System32\spool\DRIVERS\W32X86\3\\LXCCserv.exe
    Network Windows Service (MSWindows)Xurdvxc.exeAdded by the W32/Allaple-B WORM! Note: Located in C:\Windows\System (Win9x/Me), C:\%WINDIR%\System32 (XP/WinNT/2K)
    pcAnywhere Install Service - Symantec CorporationLpca_run.exe Part of Symantec PCAnywhere
    Remote Debug ServicesXsmsc.exeAdded by an unidentified TROJAN! of the Sdbot family. Note: This worm\trojan is located in C:\Windows\System (Win9x/Me), C:\%WINDIR%\System32 (XP/WinNT/2K)
    Shell Software Detection (ShellSWDetection)Xshellsw.exeAdded by an unidentified TROJAN! of the Sdbot family. Note: This worm\trojan is located in C:\Windows\System (Win9x/Me), C:\%WINDIR%\System32 (XP/WinNT/2K)
    SolidWorks Licensing ServiceLSolidWorksLicensing.exe Part of a SolidWorks product
    Windows Zero Connection (WinZConn)?mswnt.exe Probable backdoor trojan
    Wireless Adapter ConfiguratorLWirelessDaemon.exeRelated to BT's home hub products
    ##Id_String1.6844F930_1628_4223_B5CC_5BB94B879762##
    (Bonjour Service)
    LmDNSResponder.exemdnsresponder.exe is a process associated with "Bonjour for Windows" software. It is used by ITunes for music sharing. Note: Located in \%Program Files%\Bonjour\
    $sys$ariesXaries.sysAdded by the SonyBMG_First4DRM ROOTKIT! Read the link, rootkit type stealth involved. Thanks Sony.
    (4 random characters).sysXwindev(4 random characters).sys Troj/Dorf-K
    (Any service name)Osrvany.exeThis utility allows running Windows NT\2000\XP applications as services. Can also be used to load Malware. See Explanation ... Example of how to find the file being loaded with Service name iOpusService
    (non-roman characters)XsServer.exeAdded by the Troj/Feutel-AB TROJAN! Note: This trojan file is found in the Windows or Winnt folder.
    (random file name without extension)X(random file name).sysAdded by the TROJ_ROOTKIT.AI TROJAN! Read the link, rootkit type stealth involved.
    (Random Letters)X(Random FileName).dll Troj/Conhook-AG Note:Located in C:\Windows\System (Win9x/Me), C:\%WINDIR%\System32 (XP/WinNT/2K) Installs multiple services. Read link
    (random name)Xwindow.exe Troj/Hupigon-BS Note: Located in %windir% Read the link, steals information and allows remote access
    (Random) *See description*Xirjit.dllAdded by the Backdoor.CVM TROJAN! Note: This trojan file is found in the System or System32 folder. *Check the link for the list of random service names.*
    (special characters) (myserver)Xmyserver.exeAdded by the Troj/Dropper-BR TROJAN!
    *Microsoft UpdateXwstcl.exeNo from Microsoft.
    *Microsoft UpdateXwuytc.exeunknown virus
    *windows updateXwsctl.exemalware virus. possibly "Win32.Rbot.gen"
    *windows updateXwuaucrlt.exeAdded by the W32.Spybot.HUR WORM!
    *wuauclt.exeXrandomRelated to WORM_RBOT.AKU or variant.
    .NET Framework ServiceXsvchost.exe"Trojan-PSW.Win32.Sagic.15" Virus
    .NET Framework Service (.NET Connection Service)Xsvchost.exeAdded by an unidentified TROJAN! of the Sdbot family. Note: This worm\trojan is located in C:\%WINDIR%\ Note The proper location for that operating file is in C:\%WINDIR%\System32
    .NET Runtime Optimization Service v2.0.50215_X86
    (clr_optimization_v2.0.50215_32)
    Lmscorsvw.exeRelated to Microsoft_NET_Framework NET Runtime Optimization Service.
    1784-PCIDS DeviceNet?PcidsService.exe Appears to be from Rockwell software
    1789-SIM Simulator Module (SimModuleService)?SimModuleService.exe Appears to be from Rockwell software
    19E7E238X19E7E238.EXE Troj/Agent-ELX
    2D98923DXE69C6CEE.exe Troj/Agent-FYY Note:Located in C:\Windows\System (Win9x/Me), C:\%WINDIR%\System32 (XP/WinNT/2K) Allows others to access the computer
    32-bit Installation Host (inst32)Xinst32.exeAdded by the W32/Chinegan-A WORM! Note: This worm is located in C:\Program Files\Common Files\inst32\
    32-bit Registration Host (reghost32)Xreghost32.exeAdded by the W32/Rbot-GKR WORM! Note: This worm is located in C:\Program Files\Common Files\System\
    39672EA4X39672EA4.EXE Troj/GrayBir-EW
    3Com DMI AgentL3CDMINIC.EXE3Com DMI (DynamicAccess Desktop Management Interface) Agent associated with 3Com network cards
    3ComBOOTPL3CBOOTPS.EXEA 3Com Product Allows network administrators to remotely manage client PCs on their network by allowing them to deploy an array of desktop management tasks in a pre-OS booting environment. Note: Located in Drive:\Program Files\3Com\Boot Services
    3ComPXEL3CPXES.EXEA 3Com Product Allows network administrators to remotely manage client PCs on their network by allowing them to deploy an array of desktop management tasks in a pre-OS booting environment. Note: Located in Drive:\Program Files\3Com\Boot Services
    3ComTFTPL3CTFTPS.EXEA 3Com Product Allows network administrators to remotely manage client PCs on their network by allowing them to deploy an array of desktop management tasks in a pre-OS booting environment. Note: Located in Drive:\Program Files\3Com\Boot Services
    3dkeybdO3dkeybd.exeUnknown... No answers on the net.
    55euf6X55euf6.sys Troj/DwnLdr-GWX Note:Located in C:\Windows\System\Drivers (Win9x/Me), C:\%WINDIR%\System32\Drivers (XP/WinNT/2K) May install another service a6fyts35
    64Bit architecture emulation (wrmsrvice)XWRMSRVICE.SYSAdded by the TROJ_ROOTKIT.AG TROJAN! Read the link, rootkit type stealth involved.
    79F5137EXDBB6ED81.EXE W32/SlliyFD-G Note:Located in C:\Windows\System (Win9x/Me), C:\%WINDIR%\System32 (XP/WinNT/2K) Allows others to access the computer
    80xFire daemon (80xFire)X80xFire.exeAdded by the W32/Tilebot-BK WORM! Note: This worm\trojan file is found in the Windows or Winnt folder. Read the link, rootkit type stealth involved.
    9F9DF57CX(random name) Troj/DwnLdr-GUT
    @%SystemRoot%system32snmptrap.exe,-3 (SNMPTRAP)Lsnmptrap.exeRelated to MKS_Toolkit In Windows Vista. Note:Located in C:\%WINDIR%\System32
    @%SystemRoot%ehomeehstart.dll,-101 (ehstart)Lsvchost.exeWindows Media Center Service Launcher in the Windows Vista edition

    Engine Version 2.0 by CastleCops

    spacer spacer