I'm not familiar with "wmiprvsl.exe" or "msiexer.exe"(maybe msiexec.exe?)
The others you listed are all native to XP, with the exception of svxhost, which seems to be related to a worm.
http://it.trendmicro-europe.com/enterprise/security_info/ve_detail.php?VName=WORM_SDBOT.SR&VSect=T
svchost.exe is a system process belonging to the Microsoft Windows Operating System which handles processes executed from DLLs. It is pretty much a generic host process and may be associated with many different apps, which is why you may see many instances of it running at any given time.
spoolsv.exe is a Microsoft Windows system executable which handles the printing process to your local printers.
lsass.exe is a system process of the Microsoft Windows security mechanisms. It specifically deals with local security and login policies. Note: lsass.exe also relates to the W32/Windang.worm which spread via floppy disk drives. Please review file path for clarification of this.
csrss.exe is the main executable for the Microsoft Client/Server Runtime Server Subsystem. This process manages most graphical commands in Windows. This program is important for the stable and secure running of your computer and should not be terminated.
smss.exe is a process which is a part of the Microsoft Windows Operating System. It is called the Session Manager SubSystem and is responsible for handling sessions on your system. This program is important for the stable and secure running of your computer and should not be terminated.
It's not very likely that this was left behind after debugging, since the debug process wipes out all data and doesn't read any structure at all. It wipes everything, so having something left over is highly unlikely. Sounds more like you might be using a burned copy of the XP CD which is infected.