Index Introduction Database Detailed Entries Updates Concise List HJT Forums Rogues Message Board

Windows startup programs - Database search

If you're frustrated with the time it takes your Windows 10/8/7/Vista/XP PC to boot and then it seems to be running slowly you may have too many programs running at start-up - and you have come to the right place to identify them. This is the original start-up programs (as opposed to processes/tasks) list - one of the most accurate and comprehensive. Services are not included - see below. For further information on this and how to identify and disable start-up programs please visit the Introduction page.

See here for further information on random entries - which are typically added by viruses and other malware or unwanted programs.

Last database update :- 31st October, 2017
52257 listed

You can search for any of the following terms to find and display entries in the start-up programs database but the minimum search is 3 characters and you must click on the "Search" button. Results are sorted by the Startup Item/Name field.

Alternatively, you can browse the full database (without the search facility) over a number of pages or you can use the alphabetical index below to list the entries for that letter by the Command/Data field, but the results may take longer to appear due to the number of them:

A | B | C | D | E | F | G | H | I | J | K | L | B | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

NOTE: Searching for common words (i.e. "the" or "where") will mean the results take longer to appear due to the number of them.

Please click on the Search button

791 results found for J

Startup Item or Name Status Command or Data Description Tested
JufualtXj2.exeDetected by Sophos as W32/Sdbot-ALJ and by Malwarebytes as Backdoor.BotNo
SoccerInferno Browser Plugin LoaderUj2brmon.exeSoccerInferno toolbar - powered by the Ask Partner Network toolbars by IAC Applications (was Mindspark). Detected by Malwarebytes as PUP.Optional.MindSpark. The file is located in %ProgramFiles%\SoccerInferno_1w\bar\*.bin - where * represents a number or letter. If bundled with another installer or not installed by choice then remove itNo
SoccerInferno Browser Plugin Loader 64Uj2brmon64.exeSoccerInferno toolbar - powered by the Ask Partner Network toolbars by IAC Applications (was Mindspark). Detected by Malwarebytes as PUP.Optional.MindSpark. The file is located in %ProgramFiles%\SoccerInferno_1w\bar\*.bin - where * represents a number or letter. If bundled with another installer or not installed by choice then remove itNo
J2G4NVAZSUSN.exeXJ2G4NVAZSUSN.exeDetected by McAfee as RDN/FakeAV-M.bfr!i and by Malwarebytes as Trojan.Downloader.MDONo
eFax [version]UJ2GDllCmd.exeDLL Command Utility for eFax Messenger from j2 Global Communications, Inc. - which "is a free software that can be used to enhance your eFax service. The software allows you to create and edit faxes, complete with text notes, highlights, and signatures"No
eFax DllCmd [version]UJ2GDllCmd.exeDLL Command Utility for eFax Messenger from j2 Global Communications, Inc. - which "is a free software that can be used to enhance your eFax service. The software allows you to create and edit faxes, complete with text notes, highlights, and signatures." Older versionNo
eFax Live Menu 3.3UJ2GDllCmd.exeDLL Command Utility for eFax Messenger from j2 Global Communications, Inc. - which "is a free software that can be used to enhance your eFax service. The software allows you to create and edit faxes, complete with text notes, highlights, and signatures." Older versionNo
eFax [version]UJ2GTray.exeSystem Tray access to eFax Messenger from j2 Global Communications, Inc. - which "is a free software that can be used to enhance your eFax service. The software allows you to create and edit faxes, complete with text notes, highlights, and signatures"No
eFax Tray Menu [version]UJ2GTray.exeSystem Tray access to eFax Messenger from j2 Global Communications, Inc. - which "is a free software that can be used to enhance your eFax service. The software allows you to create and edit faxes, complete with text notes, highlights, and signatures." Older versionNo
SoccerInferno EPM SupportUj2medint.exeSoccerInferno toolbar - powered by the Ask Partner Network toolbars by IAC Applications (was Mindspark). Detected by Malwarebytes as PUP.Optional.MindSpark. The file is located in %ProgramFiles%\SoccerInferno_1w\bar\*.bin - where * represents a number or letter. If bundled with another installer or not installed by choice then remove itYes
SoccerInferno Search Scope MonitorUj2SrchMn.exeSoccerInferno toolbar - powered by the Ask Partner Network toolbars by IAC Applications (was Mindspark). Detected by Malwarebytes as PUP.Optional.MindSpark. The file is located in %ProgramFiles%\SoccerInferno_1w\bar\*.bin - where * represents a number or letter. If bundled with another installer or not installed by choice then remove itNo
jvsoftXj3ewro.exeDetected by Trend Micro as WORM_ONLINEG.AFU and by Malwarebytes as Spyware.OnlineGamesNo
A5118rXj6321422.exeDetected by Sophos as W32/Brontok-AKNo
J6nULNb348MKXJ6nULNb348MK.exeDetected by Malwarebytes as Trojan.Agent. The file is located in %Root%\J6nULNb348MKNo
ja3vaw.exeXja3vaw.exeDetected by Malwarebytes as Trojan.FakeMS. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows startsNo
UserinitXjabconf32.exeDetected by Dr.Web as Trojan.Siggen5.16078 and by Malwarebytes as Trojan.Agent. The file is located in %AppData%No
UserinitXjabconf32.exeDetected by Dr.Web as Trojan.Inject1.27973 and by Malwarebytes as Trojan.Agent. The file is located in %AppData%\IdentitiesNo
UserinitXjabconf32.exeDetected by Malwarebytes as Trojan.Agent. The file is located in %System%\IdentitiesNo
JA Cfg Util v2Xjacfg2.exeDetected by Sophos as W32/Rbot-ALNo
HDSTORAGEXJacksparrow23.exeDetected by McAfee as RDN/Spybot.bfr!h and by Malwarebytes as Backdoor.Agent.SILNo
JackzXJackz.exeDetected by McAfee as RDN/Downloader.a!nn and by Malwarebytes as Backdoor.Messa.ENo
JavaXJadencidePasswordCracker.exeDetected by McAfee as RDN/Generic.bfr and by Malwarebytes as Backdoor.Agent.DCENo
jafatgortycxXjafatgortycx.exeDetected by McAfee as PWS-Zbot.gen.apy and by Malwarebytes as Trojan.Agent.US. The file is located in %UserProfile%No
[various names]XJAguAr.exeFake startup entry created by the Wareout rogue spyware and dialer remover - not recommended, removal instructions here. Archived version of Andrew Clover's original pageNo
Norton Personal FirewallXjah.exeAdded by a variant of Backdoor:Win32/Rbot. The file is located in %System%No
appdataXjakarta.exeDetected by Malwarebytes as Trojan.Agent.Gen. The file is located in %AppData%\MicrosoftNo
RegXJam0.exeDetected by Dr.Web as Trojan.MulDrop4.55547 and by Malwarebytes as Trojan.Agent.ENo
Casino RoyaleXjamesbond.exeDetected by Sophos as W32/Rbot-FZONo
JammerUjammer.exeJammer by Agnitum - "Jammer is the last word in Internet security. It combines a user-friendly interface with very sophisticated and powerful security measures that protect your Windows system while you are surfing the web"No
Jammer2ndXJammer2nd.exeDetected by Symantec as W32.Netsky.Z@mmNo
jancanxuafofXjancanxuafof.exeDetected by McAfee as RDN/Generic.dx!dgb and by Malwarebytes as Trojan.Agent.USNo
*JanisRuckenbrodIIXjanis.comDetected by Symantec as W32.PopsNo
rocasedXjannibouge.exeDetected by Malwarebytes as Trojan.MalPack. The file is located in %System%No
januopaclezjXjanuopaclezj.exeDetected by McAfee as RDN/Generic Dropper!vf and by Malwarebytes as Trojan.Agent.USNo
ADOBESYSTEMSXjar.exeDetected by McAfee as PWS-Zbot.gen.aru and by Malwarebytes as Backdoor.AgentNo
HKLMXjarc.exeDetected by Malwarebytes as Backdoor.HMCPol.Gen. The file is located in %Root%\directory\CyberGate\installNo
PoliciesXjarc.exeDetected by Malwarebytes as Backdoor.Agent.PGen. The file is located in %Root%\directory\CyberGate\installNo
HKCUXjarc.exeDetected by Malwarebytes as Backdoor.HMCPol.Gen. The file is located in %Root%\directory\CyberGate\installNo
JaRdYNuXJaRdYNu.exeDetected by Dr.Web as Trojan.Bankfraud.1655 and by Malwarebytes as Trojan.BankerNo
JavaUpdateSchedXjasched.exe.lnkDetected by Malwarebytes as Spyware.KeyLogger. The file is located in %AppData%\JavaUpdateNo
Java VM v6.9.2Xjav.batDetected by Sophos as Troj/DwnLdr-HLMNo
Java VM v6.91Xjav.batDetected by Sophos as Troj/DwnLdr-HLLNo
Java (VM) v6.9Xjav.batDetected by Sophos as Troj/Agent-GZKNo
HP UpdatesXJava App.exeDetected by Dr.Web as Trojan.DownLoader9.10865No
Java Oracle RuntimeXJava Oracle Runtime.exeDetected by Malwarebytes as Backdoor.SpyNet. The file is located in %AppData%\mscftmonNo
Microsoft Word ProfissionalXJava Plug In close.exeDetected by Sophos as Troj/Banker-ELNo
Java SE BinaryXJava SE Platform.exeDetected by Malwarebytes as Spyware.Imminent. The file is located in %AppData%\Java SE UpdaterNo
Java UpXJava Up.exeDetected by Malwarebytes as Trojan.Agent.JV. The file is located in %AppData%\Java OrgNo
Java update 2014.exeXJava update 2014.exeDetected by Malwarebytes as Backdoor.RemoteAdmin. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows startsNo
Java Update Check.vbsXJava Update Check.vbsDetected by Dr.Web as Trojan.Inject1.27557 and by Malwarebytes as Trojan.Agent. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows startsNo
java update.exeXjava update.exeDetected by Dr.Web as Trojan.PWS.Siggen.24776No
Java update.exeXJava update.exeDetected by Malwarebytes as Backdoor.Bladabindi. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows startsNo
java1XJava Update.exeDetected by Dr.Web as Trojan.DownLoader4.13619 and by Malwarebytes as Trojan.VBKryptNo
*java update.exeXjava update.exeDetected by Dr.Web as Trojan.PWS.Siggen.24776No
Java Runtime UpdateXJava Update.exeAdded by an unidentified VIRUS, WORM or TROJAN! See here. The file is located in %UserTemp%\IXP00[random digit].TMPNo
Java UpdateXJava Update.exeDetected by Dr.Web as Trojan.MulDrop3.37603. The file is located in %AppData%No
Java UpdateXJava Update.exeDetected by McAfee as Generic.dx and by Malwarebytes as Trojan.Agent. The file is located in %AppData%\L3G!T-Labs\jdvs\0.0.0.0No
Java UpdateXJava Update.exeDetected by Dr.Web as Trojan.BtcMine.215 and by Malwarebytes as Trojan.Agent.Gen. The file is located in %Temp%\Java(TM)No
Java v3.0XJava v3.0.exeDetected by Malwarebytes as Backdoor.XTRat. The file is located in %AppData%\Java v3.0No
Java(TM) PlatformXJava(TM) Platform.exeDetected by Dr.Web as Trojan.DownLoader5.11796 and by Malwarebytes as Trojan.MSILNo
GlassFishWorks Oracle™XJava(TM) 7u#.exeDetected by Malwarebytes as Backdoor.Agent.PGen - where # represents one or more digits. The file is located in %System%\OracleNo
PoliciesXJava(TM) 7u#.exeDetected by Malwarebytes as Backdoor.Agent.PGen - where # represents one or more digits. The file is located in %System%\OracleNo
JavaPush2.1XJava(TM) 7u#.exeDetected by Malwarebytes as Backdoor.Agent.PGen - where # represents one or more digits. The file is located in %System%\OracleNo
Java(TM) Plataform SE binaryXJava(TM) Plataform SE binary.exeDetected by Malwarebytes as Spyware.Imminent. The file is located in %LocalAppData%\JavaNo
Java(TM) Platform SEXJava(TM) Platform .exeDetected by McAfee as RDN/Generic.bfr and by Malwarebytes as Trojan.Agent.ENo
Java(TM) Platform SE binaryXJava(TM) Platform .exeDetected by Malwarebytes as Trojan.Agent.E. The file is located in %System%\MicrosoftNo
Java(TM) UpdateXJava(TM) Platform .exeDetected by McAfee as RDN/Generic.bfr and by Malwarebytes as Trojan.Agent.ENo
PoliciesXJava(TM) Platform .exeDetected by McAfee as RDN/Generic.bfr and by Malwarebytes as Backdoor.Agent.PGenNo
RWWKWYSITFRJXJava(TM) Platform SE 8.exeDetected by McAfee as RDN/Generic BackDoor!bbr and by Malwarebytes as Backdoor.Agent.ENo
Java(TM) Platform SE Auto Updater 2 0XJava(TM) Platform SE Auto Updater 2 0.exeDetected by Dr.Web as Trojan.AVKill.29302No
Java(TM) Platform SE Auto UpdaterXJava(TM) Platform SE Auto Updater.exeDetected by McAfee as RDN/Generic.tfr!dn and by Malwarebytes as Trojan.MSILNo
Java(TM) Runtime SE Auto UpdaterXJava(TM) Runtime SE Auto Updater.exeDetected by Malwarebytes as Trojan.MSIL. The file is located in %AppData%\AcrobatNo
Java(TM) Update SchedulerXJava(TM) Update Scheduler.exeDetected by McAfee as RDN/Generic DropperNo
Java(TM) Update Scheduler.exeXJava(TM) Update Scheduler.exeDetected by Dr.Web as WBackDoor.Bladabindi.2639 and by Malwarebytes as Trojan.Agent. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows startsNo
Java(TM)XJava(TM).exeDetected by McAfee as Generic BackDoor!1pd and by Malwarebytes as Trojan.BankerNo
Keygen.and.PatchXJava(TM).exeDetected by Malwarebytes as Trojan.Keygen.DL. The file is located in %UserTemp%No
Java(TM)Update.exeXJava(TM)Update.exeDetected by Sophos as Mal/VB-TSNo
Java**.exe [* = random char]XJava**.exe [* = random char]CoolWebSearch/HomeSearch adware - for examples, see this logNo
Java**32.exe [* = random char]XJava**32.exe [* = random char]CoolWebSearch/HomeSearch adware - for examples, see this logNo
HKLMddXjava-plugins.exeDetected by Malwarebytes as Trojan.Dropped.E. The file is located in %ProgramFiles%\java-plugsNo
HKCUddXjava-plugins.exeDetected by Malwarebytes as Trojan.Dropped.E. The file is located in %ProgramFiles%\java-plugsNo
PoliciesXjava-plugins.exeDetected by Malwarebytes as Backdoor.Agent.PGen. The file is located in %ProgramFiles%\java-plugsNo
Flash-pulginXJava-pulginDetected by McAfee as RDN/Ransom and by Malwarebytes as Backdoor.Agent.DCENo
JAVA RMI 100 SEXjava-rmi.exeDetected by McAfee as RDN/Generic.bfr!hs and by Malwarebytes as Trojan.Agent.MTANo
Sun MicroSystemXjava-update.exeDetected by Kaspersky as Trojan.Win32.Genome.lhki and by Malwarebytes as Trojan.Agent. The file is located in %System%No
JavaSoftXJava-updater.exeDetected by Malwarebytes as Trojan.Agent.JV. The file is located in %MyDocuments%\JavaNo
AssassanXJava.exeDetected by McAfee as RDN/Generic.bfr!ff and by Malwarebytes as Backdoor.Agent.ENo
users moodeXjava.exeDetected by Dr.Web as Trojan.DownLoad3.29872 and by Malwarebytes as Trojan.Agent.JVNo
appliesXjava.exeDetected by Malwarebytes as Backdoor.Agent.DCE. The file is located in %Temp%\applicatiesNo
SkypeXjava.exeDetected by Malwarebytes as Backdoor.Agent.SK. The file is located in %ProgramFiles%\Java\jre[version]\binNo
startuoXJava.exeDetected by Malwarebytes as Backdoor.Agent. The file is located in %AppData%\JavaNo
StartupXJava.exeDetected by Malwarebytes as Backdoor.Agent. The file is located in %AppData%\MicrosoftNo
System Process HandlerXjava.exeDetected by McAfee as Generic.bfr and by Malwarebytes as Backdoor.MessaNo
sysinfoXjava.exeDetected by Malwarebytes as Backdoor.Agent.FXT. The file is located in %Root%\DOCUME 1\[UserName]No
java updatexXJava.exeDetected by Malwarebytes as Trojan.Vbkrypt. The file is located in %Temp%\Java SunNo
SEXEXjava.exeDetected by McAfee as Generic BackDoor and by Malwarebytes as Trojan.AgentNo
javaupdatesXjava.exeDetected by McAfee as RDN/Generic BackDoor!g and by Malwarebytes as Backdoor.Agent.DCEGenNo
svchost.exeXjava.exeDetected by Malwarebytes as Trojan.Agent. The file is located in %AppData%No
IDT PC AudioXjava.exeDetected by Dr.Web as Trojan.DownLoader3.45713 and by Malwarebytes as Trojan.AgentNo
JavaVMXjava.exeDetected by Symantec as W32.Mydoom.M@mm and by Malwarebytes as Trojan.Downloader.JVNo
UpdateXjava.exeDetected by Malwarebytes as Trojan.Agent. The file is located in %UserTemp%No
PGUENNXJava.exeDetected by McAfee as RDN/Generic.dx!csk and by Malwarebytes as Trojan.Agent.JVNo
AVIRAXjava.exeDetected by McAfee as Generic BackDoor and by Malwarebytes as Backdoor.Agent.TJNo
HKLMXjava.exeDetected by Kaspersky as Trojan.Win32.Llac.soi and by Malwarebytes as Backdoor.Agent.PGen. The file is located in %ProgramFiles%\javaNo
HKLMXjava.exeDetected by Malwarebytes as Backdoor.HMCPol.Gen. The file is located in %System%\installNo
EXPLORERXjava.exeDetected by McAfee as Generic BackDoor and by Malwarebytes as Backdoor.Agent.TJNo
HKLMXJava.exeDetected by Malwarebytes as Backdoor.HMCPol.Gen. The file is located in %Windir%\GameNo
HKLMXjava.exeDetected by McAfee as Generic BackDoor!fqb and by Malwarebytes as Backdoor.HMCPol.Gen. The file is located in %Windir%\InstallDirNo
HKLMXjava.exeDetected by Malwarebytes as Backdoor.HMCPol.Gen. The file is located in %Windir%\javaNo
javaXjava.exeDetected by Malwarebytes as Trojan.Agent. The file is located in %AppData%No
javaXjava.exeDetected by Malwarebytes as Backdoor.Agent.DCEGen. The file is located in %AppData%\DCSCMINNo
JavaXJava.exeDetected by Malwarebytes as Backdoor.Agent.E. The file is located in %AppData%\InstallNo
Reparo FacilXJava.exeDetected by Malwarebytes as Trojan.Injector. The file is located in %UserTemp%No
JavaXJava.exeDetected by McAfee as RDN/Generic.bfr!bc and by Malwarebytes as Trojan.Backdoor. The file is located in %AppData%\JavaNo
javaXjava.exeDetected by McAfee as Generic PWS.y and by Malwarebytes as Backdoor.AgentNo
WindowsXjava.exeDetected by Malwarebytes as Trojan.Agent.E. The file is located in %System%\PluguinNo
fWqAdDsXXjava.exeDetected by Kaspersky as Trojan.Win32.Buzus.gxjr and by Malwarebytes as Backdoor.Bifrose. The file is located in %System%\javaNo
javaXjava.exeDetected by Malwarebytes as Spyware.Stealer. The file is located in %AppData%\MicrosoftNo
Realtek AudioXjava.exeDetected by Malwarebytes as Backdoor.Agent.E. The file is located in %System%\MicrosoftNo
javaXjava.exeDetected by Malwarebytes as Backdoor.Agent.DCEGen. The file is located in %AppData%\MSDCSCNo
javaXjava.exeDetected by McAfee as RDN/Generic BackDoor and by Malwarebytes as Backdoor.Agent.DCEGen. The file is located in %MyDocuments%\DCSCMINNo
loadXjava.exeDetected by Malwarebytes as Backdoor.NanoCore. Note - this entry modifies the legitimate HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows "load" value data to include the file "java.exe" (which is located in %MyDocuments%)No
javaXjava.exeDetected by Malwarebytes as Trojan.Agent. The file is located in %MyDocuments%\JavaNo
javaXjava.exeDetected by Malwarebytes as Backdoor.Agent.DCEGen. The file is located in %MyDocuments%\MSDCSCNo
JavaXJava.exeDetected by Trend Micro as TROJ_BANKER.BJG. The file is located in %Root%\Arquivos de programasNo
Java.exeXJava.exeDetected by McAfee as RDN/Generic Downloader.x!cy. Note - the file is located in %AllUsersStartup% and its presence there ensures it runs when Windows startsNo
JavaXJava.exeDetected by Malwarebytes as Trojan.Vbkrypt. The file is located in %Temp%\Java SunNo
Java.exeXJava.exeDetected by Malwarebytes as Backdoor.Agent.JVGen. The file is located in %AppData%No
javaXjava.exeDetected by McAfee as W32/Autorun.worm.bbp and by Malwarebytes as Backdoor.Bifrose. The file is located in %System%\javaNo
Java.exeXJava.exeDetected by McAfee as RDN/Generic.bfr!d and by Malwarebytes as Trojan.Agent. The file is located in %AppData%\JavaNo
hYlvfeXJava.exeDetected by Malwarebytes as Backdoor.Agent. The file is located in %AppData%\MicrosoftNo
JavaXjava.exeDetected by Malwarebytes as Trojan.Agent.E. The file is located in %System%\PluguinNo
java.exeXjava.exeDetected by McAfee as Generic.dx and by Malwarebytes as Backdoor.Agent.JVGen. The file is located in %AppData%\windowsNo
JavaXJava.exeDetected by McAfee as RDN/Generic.bfr!ff and by Malwarebytes as Backdoor.Agent.E. The file is located in %System%\RestoreNo
Java.exeXJava.exeDetected by Malwarebytes as Trojan.Agent. The file is located in %LocalAppData%No
javaXjava.exeDetected by Malwarebytes as Trojan.Backdoor. The file is located in %System%\wbemNo
Java.exeXJava.exeDetected by Malwarebytes as Trojan.Agent.AI. The file is located in %Root%No
JavaXJava.exeDetected by Sophos as Troj/Mdrop-EYP and by Malwarebytes as Trojan.Agent. The file is located in %Temp%No
JAVA.exeXJAVA.exeDetected by Dr.Web as Trojan.DownLoader9.19833 and by Malwarebytes as Trojan.Agent.JVGenNo
JavaXJava.exeDetected by Sophos as Troj/Agent-ABLN and by Malwarebytes as Trojan.Agent.JVGen. The file is located in %Temp%\JavaNo
java.exeXjava.exeDetected by Dr.Web as Trojan.DownLoader9.19833 and by Malwarebytes as Trojan.Agent.AI. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows startsNo
PoliciesXjava.exeDetected by Kaspersky as Trojan.Win32.Llac.soi and by Malwarebytes as Backdoor.Agent.PGen. The file is located in %ProgramFiles%\javaNo
PoliciesXJava.exeDetected by McAfee as Generic.dx!bh3e and by Malwarebytes as Backdoor.Agent.PGen. The file is located in %ProgramFiles%\LargeNo
PoliciesXjava.exeDetected by Malwarebytes as Backdoor.Agent.PGen. The file is located in %Root%\javaNo
PoliciesXjava.exeDetected by Malwarebytes as Backdoor.Agent.PGen. The file is located in %System%\installNo
PoliciesXjava.exeDetected by Kaspersky as Trojan.Win32.Buzus.gxjr and by Malwarebytes as Backdoor.Agent.PGen. The file is located in %System%\javaNo
PoliciesXJava.exeDetected by Malwarebytes as Backdoor.Agent.PGen. The file is located in %Windir%\GameNo
PoliciesXjava.exeDetected by Malwarebytes as Backdoor.Agent.PGen. The file is located in %Windir%\javaNo
MSQMXjava.exeDetected by Malwarebytes as Backdoor.Agent.E. The file is located in %System%\MicrosoftNo
Manager WindowXJava.exeDetected by McAfee as RDN/Generic Downloader.x!lg and by Malwarebytes as Trojan.Agent.MWGenNo
explorer.exeXJava.exeDetected by Malwarebytes as Trojan.Agent. The file is located in %UserTemp%\JAVANo
Java (TM) PlatformXJava.exeDetected by McAfee as RDN/Generic.bfr!d and by Malwarebytes as Backdoor.AgentNo
jioqze20v3aGnP9QXjava.exeDetected by Malwarebytes as Trojan.Agent.ED. The file is located in %AppData%\Dropbox\installerNo
Microsoft StartXJava.exeDetected by McAfee as RDN/Generic.bfr and by Malwarebytes as Trojan.AgentNo
svchostXJava.exeDetected by Malwarebytes as Backdoor.Bot.E. The file is located in %UserTemp%No
JAVACHEDXJava.exeDetected by Malwarebytes as Backdoor.Agent. The file is located in %AppData%\binNo
svchostXjava.exeDetected by McAfee as Generic.bfr!ek and by Malwarebytes as Trojan.AgentNo
HKCUXjava.exeDetected by Kaspersky as Trojan.Win32.Llac.soi and by Malwarebytes as Backdoor.Agent.PGen. The file is located in %ProgramFiles%\javaNo
HKCUXjava.exeDetected by Malwarebytes as Backdoor.HMCPol.Gen. The file is located in %System%\installNo
HKCUXJava.exeDetected by Malwarebytes as Backdoor.HMCPol.Gen. The file is located in %Windir%\GameNo
Java Auto UpdaterXjava.exeDetected by Malwarebytes as Trojan.Agent.JV. The file is located in %CommonAppData%\JawaNo
HKCUXjava.exeDetected by McAfee as Generic BackDoor!fqb and by Malwarebytes as Backdoor.HMCPol.Gen. The file is located in %Windir%\InstallDirNo
npnpXjava.exeDetected by Malwarebytes as Trojan.Agent.CPL. The file is located in %AllUsersProfile%\Menu Iniciar\ProgramasNo
HKCUXjava.exeDetected by Malwarebytes as Backdoor.HMCPol.Gen. The file is located in %Windir%\javaNo
dmwXJava.exeDetected by Malwarebytes as Backdoor.Agent. The file is located in %AppData%\JavaNo
HKCMXJava.exeDetected by McAfee as Generic.dx!bh3e and by Malwarebytes as Backdoor.Agent.RgenNo
Java Platform SE Auto UpdaterXjava.exeDetected by Malwarebytes as Backdoor.Agent.SK. The file is located in %ProgramFiles%\Java\jre[version]\binNo
WindowsUpdateXjava.exeDetected by Malwarebytes as Backdoor.Agent.DCEGen. The file is located in %UserTemp%\MSDCSC - see hereNo
JAVAJDKXjava.exeDetected by McAfee as Generic.grp!s and by Malwarebytes as Backdoor.MessaNo
JavaJDKXJava.exeDetected by McAfee as RDN/Generic.bfr and by Malwarebytes as Trojan.Agent.JVGenNo
SunJavaUpdateSchedXjava.exeDetected by McAfee as RDN/Generic.bfr!ew and by Malwarebytes as Backdoor.BotNo
Microsoft Synchronization ManagerXjava.exeAdded by a variant of W32/Sdbot.worm. The file is located in %System%No
Windows DefenderXjava.exeDetected by Malwarebytes as Trojan.Agent.Gen. The file is located in %AppData%\Microsoft - see hereNo
icloudXjava.exeDetected by McAfee as Generic PWS.y and by Malwarebytes as Backdoor.AgentNo
Google ChromeXjava.exeDetected by Dr.Web as Trojan.DownLoader3.45713 and by Malwarebytes as Trojan.Agent. Note - this is not a legitimate Google Chrome browser entry and the file is located in %LocalAppData%No
Wnd32Xjava.exeDetected by Dr.Web as Trojan.DownLoader10.44202 and by Malwarebytes as Worm.AutoRun.WNGenNo
sunmicrosystemXjava.exeDetected by McAfee as RDN/Generic.bfr!fg and by Malwarebytes as Backdoor.Agent.DCENo
NetWireXjava.exeDetected by Malwarebytes as Backdoor.Agent.E. The file is located in %AppData%\Install - see hereNo
AVASTXXJava.exeDetected by McAfee as RDN/Generic.bfr!gr and by Malwarebytes as Backdoor.XTRat.ENo
Java UpdateXJava.exeDetected by Dr.Web as Trojan.MulDrop2.48031No
winlogonXjava.exeDetected by Dr.Web as Trojan.DownLoader7.18358 and by Malwarebytes as Trojan.Agent.TraceNo
Microsoft SecurityXjava.exeDetected by Malwarebytes as Backdoor.Agent.E. The file is located in %System%\MicrosoftNo
Microsoft® Windows® Operating SystemXJava.exeDetected by Malwarebytes as Backdoor.Agent. The file is located in %UserTemp%No
EQaSzxSdXjava.exeDetected by Kaspersky as Trojan.Win32.Buzus.gxjr and by Malwarebytes as Backdoor.Bifrose. The file is located in %System%\javaNo
JavaTMXJava.exeDetected by Malwarebytes as Trojan.Agent. The file is located in %MyDocuments%\JavaNo
ShellXJava.exe,explorer.exeDetected by Malwarebytes as Hijack.ShellA.Gen. Note - this entry adds an illegal HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon "Shell" entry. The value data points to "explorer.exe" (which is a legitimate file located in %Windir% and shouldn't be deleted) and "Java.exe" (which is located in %UserTemp%\JAVA)No
java.scrXjava.scrDetected by Dr.Web as Trojan.DownLoader9.54297 and by Malwarebytes as Trojan.Agent. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows startsNo
Windows Service AjavXjava128.exeAdded by a variant of Backdoor:Win32/Rbot. The file is located in %System%No
WinUpd32Xjava2.exeDetected by Malwarebytes as Trojan.Agent.OT. The file is located in %Appdata%No
JufualtXjava2.exeDetected by Trend Micro as WORM_SDBOT.AOE and by Malwarebytes as Backdoor.BotNo
Java_UpdateXJava2.exeDetected by Dr.Web as Trojan.DownLoader9.47899No
Java_UpdateXJava2.exeDetected by Dr.Web as Trojan.DownLoader11.6509 and by Malwarebytes as Backdoor.Agent.JVNo
Java SofteXJava32.comAdded by a variant of Backdoor:Win32/Rbot. The file is located in %System%No
WinJavaXjava32.cplDetected by Malwarebytes as Trojan.Banker.JV. The file is located in %UserRoot%\Commonfiles - see hereNo
MicroSun JavaXjava32.exeDetected by Trend Micro as WORM_RBOT.BRXNo
java32Xjava32.exeDetected by McAfee as RDN/Generic BackDoor!xl and by Malwarebytes as Backdoor.Agent.JVGenNo
WindowshelpXjava32.exeDetected by Kaspersky as Worm.Win32.Bybz.dbk. The file is located in %AppData%No
Java64XJava64.exeDetected by McAfee as RDN/Generic BackDoor and by Malwarebytes as Backdoor.Agent.JVGenNo
Java7.exeXJava7.exeDetected by McAfee as PWS-Banker!ddm and by Malwarebytes as Trojan.Banker. Note - the file is located in %AllUsersStartup% and/or %UserStartup% and its presence there ensures it runs when Windows startsNo
javaaXjavaa.exeDetected by Malwarebytes as Trojan.FakeJava. The file is located in %AppData%\usercache - see hereNo
JavaApplicationtKitXJavaAK.exeDetected by Malwarebytes as Trojan.AutoIt. The file is located in %AppData%\JavaAKNo
WinDefenderXJavaApp.exeDetected by Dr.Web as Trojan.MulDrop3.6236 and by Malwarebytes as Trojan.Agent.GenNo
MS Java Applets for Windows NT & XPXjavaapplet.exeDetected by Sophos as W32/Vanebot-BNo
JavaAppletXJavaApplet.exeDetected by ESET as Win32/Qhost.OWY. The file is located in %AppData% - see hereNo
JavaAppletXJavaApplet.exeDetected by Malwarebytes as Backdoor.Agent.JV. The file is located in %FilePath%\JavaAppletNo
JavaAppletXJavaApplet.exeDetected by Dr.Web as Trojan.Korwap.314. The file is located in %Windir%No
MS Java Applets for Windows NT, ME & XPXjavaapplets.exeDetected by Symantec as W32.Randex.GELNo
javabackupXjavabackup.exeDetected by Malwarebytes as Trojan.FakeJAVA. The file is located in %CommonFiles%No
javacXjavac.exeDetected by Malwarebytes as Trojan.Winlock. The file is located in %AppData%\javacNo
javac.exeXjavac.exeDetected by Malwarebytes as Trojan.Winlock. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows startsNo
JavaCheckXJavaC.exeDetected by Dr.Web as Trojan.DownLoader9.65. The file is located in %AppData%\JavaCheckNo
JavaCheckXjavac.exeDetected by McAfee as Generic Downloader.x!gf3. The file is located in %System%No
JavainstXJavac.exeDetected by Malwarebytes as Backdoor.Messa.E. The file is located in %AppData%No
Sun Microsystems, Inc. S.AXjavacheck.exeAdded by a variant of PWS-Banker!hc3. The file is located in %AppData%\Microsoft\Windows\Start Menu\Programs (10/8/7/Vista) or %UserProfile%\Start Menu\Programs (XP)No
Sun Microsystems, Inc. S.AXjavacheck.exeDetected by McAfee as PWS-Banker!hc3 and by Malwarebytes as Trojan.Banker. The file is located in %UserProfile%\AppData\LocalFilesNo
JavaCheckXJavaCheck.exeDetected by Malwarebytes as Trojan.MSIL. The file is located in %UserTemp%\JavaCheckNo
javacheckerXjavachecker.exeDetected by Malwarebytes as Trojan.MSIL.DJ. Note - this entry loads from the Windows Startup folder and the file is located in %UserTemp%No
javachecker.lnkXjavachecker.exeDetected by Malwarebytes as Trojan.MSIL.DJ. Note - this entry loads from HKCU\Run and the file is located in %UserTemp%No
[random]Ujavaclient32.exeDetected by Malwarebytes as PUP.Optional.JavaUpdate. The file is located in %ProgramFiles%\Java Update. If bundled with another installer or not installed by choice then remove it. Also detected by Microsoft as Trojan:Win32/Tivmonk.BNo
Windows Client ManagerUjavaclient32.exeDetected by Malwarebytes as PUP.Optional.JavaUpdater. The file is located in %ProgramFiles%\Java Update. If bundled with another installer or not installed by choice then remove itNo
JavaCoreXJavaCore.exeDetected by McAfee as Matcash and by Malwarebytes as Trojan.Downloader. The file is located in %ProgramFiles%\JavaCoreNo
Windows DefenderXjavacp.exeDetected by Sophos as Troj/VB-FLZ and by Malwarebytes as Trojan.Agent.GenNo
Sun Java Updater v4Xjavacpl.exeDetected by Kaspersky as Worm.Win32.AutoRun.eve and by Malwarebytes as Trojan.Agent. The file is located in %System%No
JavaCPLXJavaCPL.exeDetected by McAfee as RDN/Generic BackDoor and by Malwarebytes as Backdoor.Agent.DCENo
SunUpdaterXjavacpl.exeDetected by McAfee as Spy-Agent.bwNo
SunJavaUpdateSched v3.5Xjavacq.exeDetected by Sophos as W32/Prolaco-A and by Malwarebytes as Trojan.AgentNo
JavaDXJavaD.exeDetected by Dr.Web as Trojan.Siggen4.20010No
javadd155Xjavadd155.exeDetected by Dr.Web as Trojan.Winlock.11437 and by Malwarebytes as Trojan.Agent.WNLNo
JavaDllXJavaDll.exeDetected by McAfee as RDN/Generic.dx!dhw and by Malwarebytes as Trojan.Agent.JVNo
SamLogic VI 2012Xjavadoc.exeDetected by McAfee as Generic and by Malwarebytes as Backdoor.IRCBot.SMGenNo
JavaUpdateXJavaEVMupdate.exeDetected by McAfee as RDN/Generic.bfr!fc and by Malwarebytes as Backdoor.Agent.DCENo
JavaEVMupdateXJavaEVMupdate.exeDetected by McAfee as RDN/Generic BackDoor!ua and by Malwarebytes as Backdoor.Agent.DCENo
elegidoXjavaextension.exeDetected by Malwarebytes as Backdoor.Agent.ZPT. The file is located in %AppData% - see hereNo
Microsoft System ServiceXjavaflash.exeDetected by McAfee as W32/Sality.gen and by Malwarebytes as Backdoor.BotNo
javafutxubyqXjavafutxubyq.exeDetected by McAfee as RDN/Generic.dx!cmf and by Malwarebytes as Trojan.Agent.USNo
Java Sun SystemsXjavaguncelleme.exeDetected by McAfee as RDN/Downloader.a!pd and by Malwarebytes as Trojan.Agent.MNFNo
javahelper.exeXjavahelper.exeDetected by McAfee as W32/Induc!noNo
unirent javaXjavahenji.exeDetected by McAfee as RDN/Generic.dx and by Malwarebytes as Trojan.Agent.JVSNo
javahlXjavahl.exeDetected by Trend Micro as TROJ_BNLOAD.SMI and by Malwarebytes as Trojan.Banker. The file is located in %Root%\CommonFilesNo
javahlXjavahl.exeDetected by Trend Micro as TROJ_DLOADE.SMIA and by Malwarebytes as Trojan.Banker. The file is located in %Root%\pathNo
javahrXjavahr.exeDetected by Trend Micro as TROJ_BNLOAD.SMI and by Malwarebytes as Trojan.Banker. The file is located in %Root%\CommonFilesNo
javahrXjavahr.exeDetected by Trend Micro as TROJ_DLOADE.SMIA and by Malwarebytes as Trojan.Banker. The file is located in %Root%\pathNo
javahr2Xjavahr2.exeDetected by Trend Micro as TROJ_BNLOAD.SMI and by Malwarebytes as Trojan.Banker. The file is located in %Root%\CommonFilesNo
javahr2Xjavahr2.exeDetected by Trend Micro as TROJ_DLOADE.SMIA and by Malwarebytes as Trojan.Banker. The file is located in %Root%\pathNo
javaingXjavaing.exeDetected by McAfee as RDN/Generic.bfr!fs and by Malwarebytes as Backdoor.Agent.SBMNo
xc80853N29246Xjavaingsloads.exeDetected by Malwarebytes as Trojan.FakeJava. The file is located in %UserProfile%\fq91855Q61425 - see hereNo
JavaXjavains.exeDetected by Dr.Web as Trojan.DownLoader4.35867 and by Malwarebytes as Trojan.Agent.JVGenNo
JavaXjavainstall.exeDetected by Malwarebytes as Trojan.MSIL. The file is located in %AppData%\[folder] - see an example hereNo
Java Update ManagerXJavaj.exeDetected by Dr.Web as Trojan.FakeAV.17702 and by Malwarebytes as Trojan.Agent.JVGenNo
SunJavaUpdaterv12Xjavajar.exeDetected by Sophos as Mal/VBInject-D and by Malwarebytes as Trojan.AgentNo
Java UpdaterXjavajdk.exeDetected by Malwarebytes as Trojan.FakeJava. The file is located in %UserTemp%No
PoliciesXJavajdk.exeDetected by McAfee as Generic BackDoor.bfr and by Malwarebytes as Backdoor.Agent.PGenNo
Javajdk.exeXJavajdk.exeDetected by McAfee as Generic BackDoor.bfr and by Malwarebytes as Backdoor.AgentNo
Sun Java Updater v5Xjavajre.exeDetected by Sophos as W32/Autorun-XI and by Malwarebytes as Trojan.AgentNo
HKLMXjavajw.exeDetected by Malwarebytes as Backdoor.HMCPol.Gen. The file is located in %AppData%\javaNo
HKCUXjavajw.exeDetected by Malwarebytes as Backdoor.HMCPol.Gen. The file is located in %AppData%\javaNo
qXf72CXjaval0aders.exeDetected by Malwarebytes as Spyware.Zbot.AI. The file is located in %UserProfile%\tDi45NNo
JavaLauncherXJavaLauncher.exeDetected by Malwarebytes as Trojan.Onlinegames. The file is located in %AppData%\JavaLauncherNo
SunJava Updater v7Xjavale.exeDetected by Symantec as W32.Ackantta.B@mmNo
SunJavaUpXJavaMachine.exeDetected by McAfee as W32/Autorun.worm.h and by Malwarebytes as Worm.AutoRunNo
Service MonitorXjavams32.exeDetected by Sophos as Troj/Delf-NKNo
Service MonitorXjavams64.exeDetected by Sophos as W32/Sdbot-AFONo
SunJavaUpdateSchedXjavamx.exeDetected by Sophos as W32/Sdbot-WINo
SunJavaUpdaterv14Xjavan.exeDetected by McAfee as W32/Routrobot.worm and by Malwarebytes as Trojan.AgentNo
MS Java for Windows XP & NTXjavanet.exeDetected by Sophos as W32/Vanebot-ANo
IAVA UPDATESXjavanx.exeDetected by McAfee as RDN/Generic.dx and by Malwarebytes as Backdoor.Agent.JVNo
javanx.exeXjavanx.exeDetected by McAfee as RDN/Generic.dx and by Malwarebytes as Backdoor.Agent.JVGenNo
HKCUXjavap.exeDetected by Malwarebytes as Backdoor.IRCBot.Gen. The file is located in %System%\Oracle - see hereNo
javaplXjavaplDetected by McAfee as RDN/Generic PWS.y and by Malwarebytes as Backdoor.AgentNo
Sun Java Security PluginXjavaplugin.exeDetected by McAfee as RDN/Generic.tfr!r and by Malwarebytes as Trojan.AgentNo
Java Oracle Web PluginXjavaplugin.exeDetected by Dr.Web as Trojan.DownLoader10.15072No
xxxjokerXjavaplugin.exeDetected by Malwarebytes as Backdoor.SpyNet. The file is located in %System%\Internet ExplorerNo
SunJavaUpdateSchedZXjavapool.exeDetected by Malwarebytes as Trojan.Downloader. The file is located in %System%No
JavaXJavaq.exeDetected by Malwarebytes as Trojan.Agent.JVGen. The file is located in %AppData%\JavaNo
Java updateXjavaqs.exeDetected by Trend Micro as WORM_SWARLEY.A and by Malwarebytes as Trojan.Agent.GenNo
startupXJavar.exeDetected by Malwarebytes as Trojan.Injector. The file is located in %AppData%\JavaNo
HKLMXjavar.exeDetected by Malwarebytes as Backdoor.HMCPol.Gen. The file is located in %System%\InstallDirNo
PoliciesXjavar.exeDetected by Malwarebytes as Backdoor.Agent.PGen. The file is located in %Root%\directory\CyberGate\installNo
dmwXJavar.exeDetected by Malwarebytes as Trojan.Injector. The file is located in %AppData%\JavaNo
HKCUXjavar.exeDetected by Malwarebytes as Backdoor.HMCPol.Gen. The file is located in %System%\InstallDirNo
Windows RuntimeXjavar.jarDetected by Malwarebytes as Backdoor.Agent. The file is located in %UserProfile%No
javaRE.exeXjavaRE.exeDetected by Dr.Web as Trojan.DownLoader10.31885 and by Malwarebytes as Trojan.Downloader.E. Note - the file is located in %AllUsersStartup% and %UserStartup% and its presence there ensures it runs when Windows startsNo
SystemKeyXjavaRE.exeDetected by Dr.Web as Trojan.DownLoader10.31885 and by Malwarebytes as Trojan.Downloader.ENo
Java(Sys86)Xjavarec64.cplDetected by Malwarebytes as Trojan.Banker.JV. The file is located in %CommonAppData%\gldsysNo
JavaSystemXjavarec86.cplDetected by Malwarebytes as Trojan.Banker.JV. The file is located in %CommonAppData%\gldsysNo
EtrafficXJavaRun.exeRelated to TopMoxie adwareNo
Sun Java Updater v5.1Xjavarun.exeDetected by Trend Micro as WORM_PROLACO.C and by Malwarebytes as Trojan.AgentNo
windowXjavarunner.exeDetected by Malwarebytes as Trojan.Agent. The file is located in %AppData%\javasNo
javarunningXjavarunning.exeDetected by Malwarebytes as Trojan.Agent. The file is located in %AppData%\javasNo
JavaRuntimePEXJavaRunNW.exeDetected by Dr.Web as Trojan.PWS.Multi.1017No
JavaRuntimeXJavaRuntime.exeDetected by Malwarebytes as Trojan.Agent.JV. The file is located in %UserTemp%\JavaRuntimeNo
JavaRuntimeyXJavaRuntimey.scrDetected by Malwarebytes as Backdoor.Agent.DC. The file is located in %AppData%\System ConfigurationNo
Iava updatesXjavarupd.exeDetected by Malwarebytes as Backdoor.Agent.JVS. The file is located in %AppData%\java sun, see hereNo
javarupd.exeXjavarupd.exeDetected by Malwarebytes as Backdoor.Agent.JVS. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows starts, see hereNo
JavaUpdaterXJavaS.exeDetected by Malwarebytes as Backdoor.Agent. The file is located in %AppData%\MicrosoftNo
javawXjavas.exeDetected by Malwarebytes as Backdoor.Agent.JV. The file is located in %Windir%\javawsNo
javawsXjavas.exeDetected by Malwarebytes as Backdoor.Agent.JV. The file is located in %Windir%\javawsNo
WindowsAppzXjavas.exeDetected by Malwarebytes as Backdoor.Bladabindi. The file is located in %AppData%\WindowsAppsNo
PoliciesXjavas.exeDetected by Malwarebytes as Backdoor.Agent.PGen. The file is located in %System%\JavasNo
Win32Xjavas.exeDetected by Malwarebytes as Backdoor.Agent.PGen. The file is located in %System%\JavasNo
javasched.exeXjavasched.exeDetected by Malwarebytes as Trojan.Agent.E.Generic. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows startsNo
Java UpdateXjavasclp.exeDetected by Malwarebytes as Trojan.Agent.JV. The file is located in %AppData%No
Javascript.exeXJavascript.exeDetected by McAfee as RDN/Generic Downloader.x!cy. Note - the file is located in %AllUsersStartup% and its presence there ensures it runs when Windows startsNo
javascripting.exeXjavascripting.exeDetected by Malwarebytes as Trojan.Agent. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows startsNo
java-pluginXjavasctp.exeAdded by the VB.AMX trojan. The file is located in %System%No
Java UpdaterXjavasdk.exeDetected by Malwarebytes as Trojan.FakeJava. The file is located in %UserTemp%No
Java RunTime SDKXJavaSDK.exeDetected by ESET as Win32/VB.NYT and by Malwarebytes as Trojan.AgentNo
Java(TM) Platform SE binaryXjavase.exeDetected by Malwarebytes as Trojan.Injector.JV. The file is located in %AppData%No
SunjavaXjavasmart.exeAdded by the AGENT.AHV TROJAN!No
PoliciesXJavaSoft.exeDetected by McAfee as Generic.bfr and by Malwarebytes as Backdoor.AgentNo
scvhostXJavaSoft.exeDetected by Dr.Web as Trojan.DownLoader2.48558 and by Malwarebytes as Trojan.AgentNo
JavaSoftXJavaSoft.exeDetected by McAfee as Generic.bfr and by Malwarebytes as Backdoor.Agent.PGenNo
javastateXjavastate.exeDetected by McAfee as RDN/Generic.dx!d2w and by Malwarebytes as Backdoor.Agent.ENo
Java sunXjavasun.exeDetected by Malwarebytes as Trojan.Banker.E. The file is located in %AppData%\JavaNo
javasunXjavasun.exeDetected by Malwarebytes as Backdoor.Agent. The file is located in %Root%\java sunNo
JavaSunXJavaSun.exeDetected by McAfee as Generic.bfr!cu. The file is located in %Windir%\WindupdtNo
JavaSvcXJavaSvc.exeDetected by Symantec as W32.Exploz.BNo
javasys.exeXjavasys.exeDetected by Malwarebytes as Trojan.Agent.STU. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows startsNo
javataskXjavatask.exeDetected by Malwarebytes as Trojan.Agent.JV. The file is located in %AppData%No
JavaTM0512XJavaTM0512.exeDetected by McAfee as RDN/Generic BackDoor and by Malwarebytes as Backdoor.Agent.DCNo
JavaTUpdateXJavaTUpdate.exeDetected by McAfee as RDN/Generic BackDoor!p and by Malwarebytes as Backdoor.Agent.DCNo
MicrosoftUpgradeXjavaup.exeDetected by Dr.Web as Trojan.DownLoader11.53799 and by Malwarebytes as Trojan.BankerNo
Java appletXjavaup.exeDetected by Sophos as W32/Sdbot-AERNo
javaupdateXjavaupd.exeDetected by McAfee as RDN/Generic.dxNo
Kaspersky Email SecurityXjavaupd.exeDetected by Trend Micro as WORM_SWARLEY.A and by Malwarebytes as Email.WormNo
SunJavaUpdateSchedXjavaupd.exeAdded by unidentified malware. The file is located in %Windir%No
bs_stealthXJavaUpdate.exeDetected by Malwarebytes as Backdoor.Agent.BSGen. The file is located in %AppData% - see hereNo
Java Update 12.7XJavaUpdate.exeDetected by Malwarebytes as Backdoor.Messa. The file is located in %AppData%No
Java Update ApplicationXjavaupdate.exeDetected by Malwarebytes as Trojan.Agent. The file is located in %Windir%%\JavaNo
Java Update ManagerXJavaUpdate.exeDetected by Sophos as Troj/Trackr-AM and by Malwarebytes as Trojan.Agent.JVGenNo
JavaUpdateXJavaUpdate.exeDetected by Malwarebytes as Trojan.Agent. The file is located in %AppData%No
JavaUpdateXJavaUpdate.exeDetected by McAfee as RDN/Generic BackDoor!tt and by Malwarebytes as Trojan.Clicker.MSIL. The file is located in %LocalAppData%No
JavaUpdateXJavaUpdate.exeDetected by Malwarebytes as Trojan.Agent.DF. The file is located in %LocalAppData%\Glusternob - see hereNo
javaupdateXjavaupdate.exeDetected by Dr.Web as Trojan.Packed.24140 and by Malwarebytes as Trojan.Agent.APLGen. The file is located in %MyDocuments%\Windows\AppLocNo
JavaUpdateXJavaUpdate.exeDetected by Dr.Web as Trojan.DownLoader7.21953. The file is located in %System%\WindowsNo
JavaUpdateXJavaUpdate.exeDetected by Malwarebytes as Backdoor.Agent.DC. The file is located in %UserTemp% - see hereNo
javaupdate.exeXjavaupdate.exeDetected by Dr.Web as Trojan.DownLoader6.10934 and by Malwarebytes as Trojan.Banker. The file is located in %Windir%No
JavaUpdate.exeXJavaUpdate.exeDetected by Dr.Web as Trojan.DownLoader7.21953 and by Malwarebytes as Trojan.Banker. The file is located in %System%\WindowsNo
JavaUpdate.exeXJavaUpdate.exeDetected by McAfee as Generic BackDoor!1fq and by Malwarebytes as Trojan.Banker. The file is located in %Temp%\JavaNo
javaupdate.exeXjavaupdate.exeDetected by Malwarebytes as Trojan.Banker. The file is located in %UserTemp%No
Java UpdaterXjavaupdate.exeDetected by Malwarebytes as Backdoor.Agent.DC. The file is located in %AppData%\JavaUpdaterNo
JavaUpdate.exeXJavaUpdate.exeDetected by Dr.Web as Trojan.Siggen5.49583 and by Malwarebytes as Trojan.Banker. The file is located in %Windir%No
JavaupdaterXJavaupdate.exeDetected by Kaspersky as Backdoor.Win32.BotNet.n. The file is located in %Root%\JavaNo
JavaupdaterXJavaupdate.exeDetected by McAfee as Ransom!dz and by Malwarebytes as Backdoor.Agent.DC. The file is located in %Root%\WindupdtNo
my selfies Xjavaupdate.exeDetected by Dr.Web as Trojan.Inject1.47286 and by Malwarebytes as Trojan.Agent.E. Note that there is a space at the end of the "Startup Item" fieldNo
Java(TM) Platform SE 7 U45Xjavaupdate.exeDetected by Malwarebytes as Trojan.FakeJava. The file is located in %UserTemp%No
AdobeManagerXJavaUpdate.exeDetected by Malwarebytes as Trojan.Banker.JV. The file is located in %CommonAppData%\Microsoft\Windows\Start Menu\iSoftware32 (10/8/7/Vista) or %AllUsersProfile%\Start Menu\iSoftware32 (XP)No
HKLMXjavaupdate.exeDetected by Malwarebytes as Backdoor.HMCPol.Gen. The file is located in %ProgramFiles%\JavaNo
HKLMXjavaupdate.exeDetected by Kaspersky as Trojan.Win32.Llac.bdm and by Malwarebytes as Backdoor.HMCPol.Gen. The file is located in %System%\microsoft\JavaNo
loadXJavaUpdate.exeDetected by Malwarebytes as Backdoor.Messa. Note - this entry modifies the legitimate HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows "load" value data to include the file "JavaUpdate.exe" (which is located in %AppData%)No
JavaXJavaUpdate.exeDetected by McAfee as Generic BackDoor!dhoNo
Java_UpdateXJavaUpdate.exeDetected by McAfee as RDN/Generic.dx!v and by Malwarebytes as Backdoor.Messa.GenNo
PoliciesXjavaupdate.exeDetected by Malwarebytes as Backdoor.Agent.PGen. The file is located in %ProgramFiles%\JavaNo
PoliciesXjavaupdate.exeDetected by Kaspersky as Trojan.Win32.Llac.bdm and by Malwarebytes as Backdoor.Agent.PGen. The file is located in %System%\microsoft\JavaNo
PoliciesXjavaupdate.exeDetected by Malwarebytes as Backdoor.Agent.PGen. The file is located in %Windir%\java updateNo
ratXJavaUpdate.exeDetected by Malwarebytes as Backdoor.Agent.DCEGen. The file is located in %MyDocuments%\DCSCMINNo
PoliciesXjavaupdate.exeDetected by Malwarebytes as Backdoor.Agent.PGen. The file is located in %Windir%\javaupdateNo
Sun JavaXjavaupdate.exeDetected by Dr.Web as Trojan.AVKill.32644. The file is located in %Temp%No
Sun JavaXjavaupdate.exeDetected by McAfee as Generic.dx!zkg and by Malwarebytes as Backdoor.Bifrose. The file is located in %Windir%No
HKCUXjavaupdate.exeDetected by Malwarebytes as Backdoor.HMCPol.Gen. The file is located in %ProgramFiles%\JavaNo
HKCUXjavaupdate.exeDetected by Kaspersky as Trojan.Win32.Llac.bdm and by Malwarebytes as Backdoor.HMCPol.Gen. The file is located in %System%\microsoft\JavaNo
SunJavaUpdateXJavaUpdate.exeDetected by Malwarebytes as Trojan.Agent. The file is located in %AppData%\MicrosoftNo
FlashplayerXJavaupdate.exeDetected by McAfee as RDN/Generic.bfr!fs and by Malwarebytes as Backdoor.Agent.ENo
Flashplayer1XJavaupdate.exeDetected by McAfee as RDN/Generic.bfr!fs and by Malwarebytes as Backdoor.Agent.ENo
GoogleXjavaupdate.exeDetected by Malwarebytes as Trojan.Agent. The file is located in %Windir%%\JavaNo
Windows DefenderXJavaUpdate.exeDetected by Dr.Web as Trojan.MulDrop3.57125 and by Malwarebytes as Trojan.Agent.GenNo
JavaRunXJavaUpdate.exeDetected by Malwarebytes as Trojan.Fynloski. The file is located in %System%\WindowsOldNo
java updateXjavaupdate.exeDetected by Malwarebytes as Trojan.Agent.E. The file is located in %Windir%\java update - see hereNo
java updateXjavaupdate.exeDetected by Malwarebytes as Trojan.Agent.Gen. The file is located in %Windir%\javaupdateNo
Java Update CheckerXJavaUpdate.jarAdded by the INCRAT HACKTOOL!No
javaupdate7Xjavaupdate7.exeDetected by Malwarebytes as Trojan.Banker.JVGen. The file is located in %AppData%\OrionNo
MicroUpdateXJavaupdated.exeDetected by McAfee as Generic BackDoor.xa and by Malwarebytes as Backdoor.Agent.DCGen. The file is located in %CommonAppData%\Microsoft\Windows\Start Menu\JavaCA (10/8/7/Vista) or %AllUsersProfile%\Start Menu\JavaCA (XP)No
JavaUpdateXJavaUpdater.exeDetected by Malwarebytes as Backdoor.Agent.JV. The file is located in %CommonAppData%No
JavaUpdateXJavaUpdater.exeDetected by Malwarebytes as Backdoor.Agent.JV. The file is located in %MyDocuments%No
JavaUpdaterXJavaupdater.exeDetected by Malwarebytes as Trojan.Agent.E. The file is located in %AppData%\JAVAUPNo
JavaUpdater.exeXjavaupdater.exeDetected by McAfee as RDN/Generic PUP.x and by Malwarebytes as Backdoor.Agent.JVGen. The file is located in %AppData%No
JavaUpdater.exeXJavaUpdater.exeDetected by McAfee as W32/Induc. The file is located in %System%No
javaupdater.exeXjavaupdater.exeDetected by Malwarebytes as Trojan.Agent.MSIL. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows startsNo
IE Per-User Initialization utilityXJavaUpdater.exeDetected by Malwarebytes as Backdoor.Agent.Gen. The file is located in %MyDocuments%No
loadXJavaUpdater.exeDetected by Malwarebytes as Trojan.Agent. Note - this entry modifies the legitimate HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows "load" value data to include the file "JavaUpdater.exe" which is located in %UserTemp%No
java.exeXjavaupdater.exeDetected by Malwarebytes as Trojan.Agent.JVGen. The file is located in %AppData%No
SunJavaUpdateCtrlXjavaupdater.exeDetected by Malwarebytes as Trojan.Agent.MSIL. The file is located in %AppData%\Sun\Java\Java UpdateNo
SunJavaUpdaterv13Xjavaupdater.exeDetected by Kaspersky as Trojan.Win32.Inject.angt and by Malwarebytes as Trojan.Agent. The file is located in %System%No
IE Per-User Initialization utilityXJavaUpdaters.exeDetected by Malwarebytes as Backdoor.Agent.Gen. The file is located in %UserTemp% - see hereNo
ORACLE INCXjavaupdaterx32.exeDetected by Malwarebytes as Backdoor.Agent.DC. The file is located in %System%No
JavaUpdateSchedulerXJavaUpdateScheduler.exeDetected by McAfee as Generic.dx and by Malwarebytes as Trojan.Agent.JVSNo
javaupdatorXjavaupdt.exeDetected by Dr.Web as Trojan.PWS.Panda.3751 and by Malwarebytes as Trojan.Agent.APLGenNo
TregainXJavaUpdtr.exeDetected by Malwarebytes as Trojan.Agent.JV. The file is located in %AppData%\JavaNo
Java UpdtrXJavaUpdtr.exeDetected by Malwarebytes as Trojan.Agent.JV. The file is located in %AppData%\JavaNo
loadXJavaUpdtr.exeDetected by McAfee as RDN/Generic.bfr and by Malwarebytes as Backdoor.Agent.E. Note - this entry modifies the legitimate HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows "load" value data to include the file "JavaUpdtr.exe" (which is located in %AppData%)No
loadXJavaUpdtr.exeDetected by Sophos as Troj/MSILDrop-C and by Malwarebytes as Backdoor.Agent.E. Note - this entry modifies the legitimate HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows "load" value data to include the file "JavaUpdtr.exe" (which is located in %AppData%\Java)No
loadXJavaUpdtr.exeDetected by McAfee as RDN/Generic.dx!dgs and by Malwarebytes as Backdoor.Agent.E. Note - this entry modifies the legitimate HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows "load" value data to include the file "JavaUpdtr.exe" (which is located in %UserTemp%\Java)No
Java(TM) UpdaterXjavaupdx.exeDetected by Dr.Web as Trojan.Siggen3.55635No
JavaUploaderXJavaUploader.exeDetected by Sophos as Troj/DotNet-G and by Malwarebytes as Backdoor.Bot. The file is located in %AppData%\JavaUploaderNo
JavaUploaderXJavaUploader.exeDetected by McAfee as RDN/Generic.bfr!gm and by Malwarebytes as Backdoor.Messa.E. The file is located in %AppData%\JavaUploderNo
JavaXJavav.exeDetected by Malwarebytes as Trojan.Agent.JVGen. The file is located in %ProgramFiles%\Java\re6\binNo
PoliciesXJavav.exeDetected by Malwarebytes as Backdoor.Agent.PGen. The file is located in %ProgramFiles%\Java\re6\binNo
Microsoft Java Virtual MachineXjavavm.exeAdded by a variant of Backdoor:Win32/Rbot. The file is located in %System%No
javavmXjavavm.exeDetected by McAfee as PWS-Zbot.gen.aru and by Malwarebytes as Trojan.Downloader.JVNo
MS Java virtual machineXjavavm.exeDetected by Trend Micro as WORM_RBOT.ABGNo
JavaVmw.exeXJavaVmw.exeDetected by Kaspersky as Trojan.Win32.Buzus.czfz and by Malwarebytes as Backdoor.Agent. The file is located in %System%\WinVmwNo
WebSavingsFromEbatesXjavaw [path to code]Ebates "Web Savings" adware - detected by Symantec as Adware.TopMoxieNo
Windows NT ServiceXjavaw.exeDetected by Symantec as Trojan.Backoff and by Malwarebytes as Trojan.Agent.BOGenNo
Windows StartupXjavaw.exeDetected by Malwarebytes as Trojan.Agent. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name located in %ProgramFiles%\java\jre[version]\bin which is used to view Java applications. This one is located in %AppData%No
Java UpdaterXjavaw.exeDetected by Dr.Web as Trojan.Siggen6.18009 and by Malwarebytes as Trojan.AgentNo
Java Virtual MachineXjavaw.exeAdded by a variant of Backdoor:Win32/Rbot. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name located in %ProgramFiles%\java\jre[version]\bin which is used to view Java applications. This one is located in %System%No
MicrosoftCorpXjavaw.exeDetected by Kaspersky as Trojan.Win32.Buzus.bulo and by Malwarebytes as Trojan.Agent.MSGen. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name located in %ProgramFiles%\java\jre[version]\bin which is used to view Java applications. This one is located in %System%No
javawXjavaw.exeDetected by McAfee as Generic Dropper and by Malwarebytes as Backdoor.Messa. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name located in %ProgramFiles%\java\jre[version]\bin which is used to view Java applications. This one is located in %AppData%No
javawXjavaw.exeDetected by Kaspersky as Trojan-Banker.Win32.Banker.sjyc and by Malwarebytes as Trojan.Agent.I. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name located in %ProgramFiles%\java\jre[version]\bin which is used to view Java applications. This one is located in %AppData%\javawNo
javawXjavaw.exeDetected by Sophos as Mal/MSIL-HW and by Malwarebytes as Trojan.Agent. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name located in %ProgramFiles%\java\jre[version]\bin which is used to view Java applications. This one is located in %AppData%\MicrosoftNo
javaw.exeXjavaw.exeDetected by Kaspersky as Worm.Win32.Bybz.apr and by Malwarebytes as Trojan.Agent. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name located in %ProgramFiles%\java\jre[version]\bin which is used to view Java applications. This one is located in %AppData%\MicrosoftNo
javaw.exeXjavaw.exeDetected by Dr.Web as Trojan.Siggen3.62707 and by Malwarebytes as Trojan.Agent.E. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name located in %ProgramFiles%\java\jre[version]\bin which is used to view Java applications. This one is located in %UserStartup% and its presence there ensures it runs when Windows startsNo
Java(TM) UpdaterXjavaw.exeDetected by Dr.Web as Trojan.Siggen5.2149. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name located in %ProgramFiles%\java\jre[version]\bin which is used to view Java applications. This one is located in %AppData%No
AUDIODXXjavaw.exeDetected by McAfee as RDN/Generic.grp!gv and by Malwarebytes as Backdoor.Messa.E. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name located in %ProgramFiles%\java\jre[version]\bin which is used to view Java applications. This one is located in %AppData%\comNo
IE Per-User Initialization utilityXJavaw.exeDetected by Malwarebytes as Backdoor.Agent.Gen. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name located in %ProgramFiles%\java\jre[version]\bin which is used to view Java applications. This one is located in %LocalAppData%No
Intel(R) Common UserXjavaw.exeDetected by Malwarebytes as Backdoor.Agent.Gen. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name located in %ProgramFiles%\java\jre[version]\bin which is used to view Java applications. This one is located in %Windir%\installNo
JavaXjavaw.exeDetected by Malwarebytes as Trojan.Agent.Gen. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name located in %ProgramFiles%\java\jre[version]\bin which is used to view Java applications. This one is located in %AppData%No
javaXjavaw.exeDetected by Malwarebytes as Backdoor.Agent.E. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name located in %ProgramFiles%\java\jre[version]\bin which is used to view Java applications. This one is located in %Windir%No
PoliciesXjavaw.exeDetected by Malwarebytes as Backdoor.Agent.Gen. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name located in %ProgramFiles%\java\jre[version]\bin which is used to view Java applications. This one is located in %Windir%\installNo
MicrosoftNAPCXjavaw.exeDetected by Kaspersky as Trojan.Win32.Buzus.bulo and by Malwarebytes as Backdoor.Bot. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name located in %ProgramFiles%\java\jre[version]\bin which is used to view Java applications. This one is located in %System%No
54tgbrfv73uejdmc8ikws,x92owlsXjavaw.exeDetected by Kaspersky as Trojan.Win32.VBKrypt.cngj and by Malwarebytes as Password.Stealer. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name located in %ProgramFiles%\java\jre[version]\bin which is used to view Java applications. This one is located in %AppData%\javawNo
svchostXjavaw.exeDetected by Malwarebytes as Backdoor.Bot.E. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name located in %ProgramFiles%\java\jre[version]\bin which is used to view Java applications. This one is located in %AppData%\javawNo
Java auto-updaterXjavaw.exeDetected by Sophos as Troj/Agent-RUT and by Malwarebytes as Trojan.FakeJava. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name located in %ProgramFiles%\java\jre[version]\bin which is used to view Java applications. This one is located in %AppData%No
SunJavaUpdaterXjavaw.exeDetected by Trend Micro as WORM_MYTOB.QR. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name located in %ProgramFiles%\java\jre[version]\bin which is used to view Java applications. This one is located in %System%No
SunJavaUpdater v2Xjavaw.exeAdded by the AGENT.AEFE TROJAN! Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name located in %ProgramFiles%\java\jre[version]\bin which is used to view Java applications. This one is located in %System%No
commandXjavaw.exeDetected by Sophos as W32/Agobot-LG. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name located in %ProgramFiles%\java\jre[version]\bin which is used to view Java applications. This one is located in %System%No
Windows DefenderXjavaw.exeDetected by Malwarebytes as Trojan.Agent.Gen. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name located in %ProgramFiles%\java\jre[version]\bin which is used to view Java applications. This one is located in %AppData%No
AdobeXJavaw.exeDetected by McAfee as RDN/Generic.bfr!go and by Malwarebytes as Backdoor.Agent.DCE. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name located in %ProgramFiles%\java\jre[version]\bin which is used to view Java applications. This one is located in %Temp%\JavaNo
ShellXjavaw.exeDetected by Malwarebytes as Trojan.Agent.MTA. Note - this entry adds an illegal HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon "Shell" entry. The value data points to "javaw.exe" (which is located in %AppData%\FolderName and is not the legitimate Oracle (was Sun Microsystems) file of the same name located in %ProgramFiles%\java\jre[version]\bin which is used to view Java applications)No
ShellXjavaw.exeDetected by Dr.Web as Trojan.Siggen6.26392 and by Malwarebytes as Trojan.Agent.JV. Note - this entry adds an illegal HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon "Shell" entry. The value data points to "javaw.exe" (which is located in %Temp%\Windows Task Manager and is not the legitimate Oracle (was Sun Microsystems) file of the same name located in %ProgramFiles%\java\jre[version]\bin)No
winlogonXJavaw.exeDetected by Malwarebytes as Trojan.Agent.Trace. The file is located in %UserTemp%No
FileXjavaw.exe -jar [path] File.jarDetected by Malwarebytes as Trojan.Agent.JV. Note - this entry uses the legitimate Oracle (was Sun Microsystems) "javaw.exe" file (located in %ProgramFiles%\java\jre[version]\bin) to load the file "File.jar" from %AppData% - see an example hereNo
WinFirewallXjavaw.exe -jar [path] servctl.jarDetected by Symantec as Backdoor.Opsiness. Note - this entry uses the legitimate Oracle (was Sun Microsystems) "javaw.exe" file (located in %ProgramFiles%\java\jre[version]\bin) to load the file "servctl.jar" from %AppData%No
WindowsXjavaw.exe -jar [path] Svchost.exe.jarDetected by Malwarebytes as Trojan.Agent. Note - this entry uses the legitimate Oracle (was Sun Microsystems) "javaw.exe" file (located in %ProgramFiles%\java\jre[version]\bin) to load the file "Svchost.exe.jar" from %AppData%\System32No
javaw.exe.exeXjavaw.exe.exeDetected by Dr.Web as Trojan.Siggen3.37155 and by Malwarebytes as Trojan.AgentNo
Java UpdateXjavaw.exe.exeDetected by Trend Micro as BKDR_ANDROM.YUYBS and by Malwarebytes as Trojan.Agent.GenNo
Java(INCx86)Xjavaw64.cplDetected by McAfee as RDN/Generic.tfr!dw and by Malwarebytes as Trojan.Banker.JVNo
javaaXjavawa.exeDetected by McAfee as RDN/Generic.dx!dg3 and by Malwarebytes as Backdoor.Agent.DFTNo
JavawiXJavawe.exeDetected by Dr.Web as Trojan.Inject.38871 and by Malwarebytes as Backdoor.AgentNo
Gbp ServiceXjavawins.exeDetected by Trend Micro as TSPY_LDPINCH.CHP and by Malwarebytes as Trojan.BankerNo
gebariastoTnTXjavawins.exeDetected by Trend Micro as TSPY_LDPINCH.CHP and by Malwarebytes as Trojan.BankerNo
javawins.exeXjavawins.exeDetected by Malwarebytes as Trojan.Banker. Note - the file is located in %AllUsersStartup% and/or %UserStartup% and its presence there ensures it runs when Windows startsNo
javawisx.exeXjavawisx.exeDetected by McAfee as Generic Downloader.x!gay and by Malwarebytes as Trojan.BankerNo
nod32kabXjavawisx.exeDetected by Trend Micro as TSPY_LDPINCH.CHP and by Malwarebytes as Trojan.BankerNo
Sun Java Updater v7.7Xjavawm.exeDetected by Malwarebytes as Trojan.Agent. The file is located in %System%No
Java Web Start LauncherXjavaws.exeDetected by McAfee as RDN/Generic Dropper and by Malwarebytes as Backdoor.IRCBot.JVNo
javasunXjavaws.exeDetected by McAfee as RDN/Generic Dropper!qx and by Malwarebytes as Backdoor.IRCBot.JVNo
javawsa.exeXjavawsa.exeDetected by Sophos as Troj/Bank-YNo
JavaStartKitXJavaWSK.exeDetected by Malwarebytes as Trojan.Agent. The file is located in %AppData%\JavaWebSKNo
Cisco Systems VPN clientXjavawss.exeDetected by McAfee as W32/Routrobot.wormNo
Javawx UpdateXJavawx.exeDetected by Malwarebytes as Worm.Rebhip. The file is located in %AppData%\Java sunsNo
PoliciesXJavawx.exeDetected by Malwarebytes as Backdoor.Agent.PGen. The file is located in %AppData%\Java sunNo
Sun Java Updater v7.4Xjavawx.exeDetected by Symantec as W32.Ackantta.B@mm and by Malwarebytes as Trojan.AgentNo
Java sunXJavawx.exeDetected by Malwarebytes as Trojan.Dropper. The file is located in %AppData%\Java sunNo
Java X Run ClassXjavax.exeDetected by Malwarebytes as Trojan.Agent. The file is located in %Temp%No
geforceXjavax.exeDetected by Dr.Web as Trojan.Inject1.51138 and by Malwarebytes as Trojan.Agent.GFJNo
loadXjavax.exeDetected by Malwarebytes as Trojan.Injector. Note - this entry modifies the legitimate HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows "load" value data to include the file "javax.exe" (which is located in %AppData%\Configs)No
JavaXjavax.exeDetected by Dr.Web as Trojan.DownLoader8.39565 and by Malwarebytes as Trojan.BankerNo
microsoftXjavax.exeDetected by McAfee as RDN/Generic.bfr!hw and by Malwarebytes as Trojan.Agent.E.GenericNo
java sunsXjavaxr.exeDetected by Malwarebytes as Backdoor.Agent. The file is located in %AppData%\Java sunNo
Java micro kernel2Xjavaz.exeDetected by Malwarebytes as Trojan.Agent. The file is located in %System%No
java_updaterXjava_dev.exeDetected by McAfee as RDN/Generic.bfr!fb and by Malwarebytes as Trojan.MSILNo
java_pluginXjava_plugin.exeDetected by Malwarebytes as Backdoor.Agent.JVGen. The file is located in %CommonAppData%\Microsoft\Windows\Start Menu\Programs\java_updates (10/8/7/Vista) or %AllUsersProfile%\Start Menu\Programs\java_updates (XP)No
KernelUpdateXJava_UPDATE.exeDetected by Dr.Web as Trojan.Siggen6.20148 and by Malwarebytes as Backdoor.Agent.ENo
java_updateXjava_update.exeDetected by Kaspersky as Backdoor.Win32.Poison.beug. The file is located in %System%No
java_updateXjava_update.exeDetected by Dr.Web as Trojan.Siggen3.56954. The file is located in %Windir%No
Java UpdateXJava_Updater.exeDetected by Malwarebytes as Trojan.Agent.Gen. The file is located in %Temp%No
javaaXjaveshelp.exeDetected by Malwarebytes as Trojan.Agent.JV. The file is located in %Windir%No
javasecuXjavset.exeDetected by Malwarebytes as Trojan.Agent.JV. The file is located in %ProgramFiles%\winjavaNo
Java UpdateXjavupdate.exeDetected by Dr.Web as Trojan.Inject1.21911 and by Malwarebytes as Backdoor.BifroseNo
loadXjawa.exeDetected by Malwarebytes as Trojan.Agent.E. Note - this entry modifies the legitimate HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows "load" value data to include the file "jawa.exe" (which is located in %AppData%\Configs) and also adds an illegal HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows "load" entry pointing to the same fileNo
jawa32Xjawa32.exeDetected as Backdoor.Agent.bg - see here. The file is located in %Windir%No
Jawa322Xjawa32.exeAdded by a variant of Backdoor.Agent.bg. The file is located in %Windir%No
Jawn.exeXJawn.exeDetected by Malwarebytes as Backdoor.Bot.AI. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows startsNo
Windows Live MessengerXjbmYZEakOeSphSPfDGzA.exeDetected by Sophos as Troj/Banbra-LC and by Malwarebytes as Trojan.MSILNo
Java Runtime EnvironmentXjbuild.exeDetected by Sophos as W32/Delbot-JNo
javacXjc.exeDetected by Malwarebytes as Trojan.Agent.JV. The file is located in %AppData%\JavaNo
UpdateWindowsXjc892jfwew4t3.exeDetected by Malwarebytes as Trojan.Agent.UPDGen. The file is located in %CommonAppData%No
jccatXjccat.exeDetected by Malwarebytes as Adware.Korad. The file is located in %ProgramFiles%\FlashGetNo
videodriversXjcheck.exeDetected by McAfee as RDN/Generic.dx!c2k and by Malwarebytes as Trojan.Agent.MNRNo
Sun Java Console for Windows NT & XPXjconsole.exeDetected by Sophos as W32/Vanebot-CNo
RunJavaXjcview.exeDetected by Sophos as W32/Autorun-BELNo
jdajkshdjkehkjjsXjdajkshdjkehkjjs.exeDetected by Dr.Web as Trojan.PWS.Banker1.12163 and by Malwarebytes as Trojan.Banker.ENo
Service Registry NT SaveXjdbgmgrnt.exeDetected by Sophos as Troj/Bancos-CGNo
MSConfigrXJDBGMRG.EXEDetected by Trend Micro as TROJ_DASMIN.CNo
MSAdminXjdbgmrg.exeDetected by Trend Micro as TROJ_DASMIN.A. Note - this is not the valid JDBGMGR.EXE file, see hereNo
jdkkslwXjdkkslws.exeDetected by Malwarebytes as Trojan.Agent. The file is located in %AppData%No
Adobe FontsXjds32.exeDetected by Dr.Web as Trojan.DownLoader7.11607 and by Malwarebytes as Trojan.DownloaderNo
qaswwwXjdsuml.exeDetected by Trend Micro as TROJ_LETHIC.A and by Malwarebytes as Trojan.AgentNo
A.EXEXjeabykcdxjaba.exeDetected by McAfee as Generic.dx and by Malwarebytes as Trojan.Agent.AgenNo
jeafesevyravXjeafesevyrav.exeDetected by Dr.Web as Trojan.DownLoader10.5036 and by Malwarebytes as Trojan.Agent.USNo
jeasutbyzkaqXjeasutbyzkaq.exeDetected by Malwarebytes as Trojan.Agent.US. The file is located in %UserProfile% - see hereNo
Windows MS Update 32Xjebote.exeDetected by Sophos as W32/Forbot-GKNo
KyvpIFXJeDJFR.exeDetected by Dr.Web as Trojan.DownLoader10.61653 and by Malwarebytes as Backdoor.Agent.ENo
KYVPIFXJeDJFR.exeDetected by McAfee as RDN/Generic.bfr!fg and by Malwarebytes as Backdoor.Agent.ENo
l80vS6v3d3gK1y1®XjedVOIjq46.exeDetected by Malwarebytes as Trojan.MSIL. The file is located in %AppData%\R2hSJYgkwAAgZCONo
(Default)Xjeff.exeDetected by Malwarebytes as Trojan.Agent. Note - this malware actually changes the value data of the "(Default)" key in HKCU\Run in order to force Windows to launch it at boot. The name field in MSConfig may be blank and the file is located in %AppData%No
jEGCsSWIMfSR.exeXjEGCsSWIMfSR.exeDetected by Malwarebytes as Rogue.Agent.SA. The file is located in %AppData%No
Windows Service AgccntXjeqcfyo.exeDetected by Sophos as W32/Rbot-GSTNo
aXjesse.exeDetected by Sophos as W32/Melo-CNo
jetdsd.exeXjetdsd.exeDetected by Malwarebytes as Trojan.Banker. The file is located in %Windir%No
JetEngineXJetEngine.comDetected by Malwarebytes as Worm.Agent.MLB. The file is located in %System%No
jexaspuotemjXjexaspuotemj.exeDetected by McAfee as RDN/Generic Dropper!vd and by Malwarebytes as Trojan.Agent.USNo
jezcobagnoqyXjezcobagnoqy.exeDetected by McAfee as RDN/Downloader.a!lt and by Malwarebytes as Trojan.Agent.USNo
jezumzugurpiXjezumzugurpi.exeDetected by McAfee as RDN/Generic BackDoor!qr and by Malwarebytes as Trojan.Agent.USNo
hjkfkfkflflflXjfhfhfjfjfjf.exeDetected by McAfee as RDN/Generic.bfr and by Malwarebytes as Backdoor.Agent.ENo
JfuBwunaXjfubwuna.exeDetected by Malwarebytes as Trojan.Agent.AI. This entry loads from the HKCU\Run key and the file is located in %LocalAppData%\bydojrejNo
jfubwuna.exeXjfubwuna.exeDetected by Malwarebytes as Trojan.Agent.AI. The file is located in %UserStartup% and its presence there ensures it runs when Windows startsNo
jfziemXjfziem.exeDetected by Sophos as W32/Agent-NPL and by Malwarebytes as Worm.SFDC. The file is located in %UserProfile%No
Jenkat Games Arcade AppNJGAA.exeJenkat Games Arcade Desktop App by Jenkat Media Inc - "is the ultimate desktop application that will connect you to the latest arcade games. This application is what every gamer would want as it reduces the hassle of searching and downloading. You can easily find the latest arcade games with a few simple clicks through the Jenkat application"No
JgncnlXJgncnl.exeDetected by Malwarebytes as Trojan.FkClean. The file is located in %AppData%No
Java UpdaterXjgs.exeDetected by McAfee as RDN/Generic.dx and by Malwarebytes as Trojan.Agent.JVGenNo
ChromeUpdateXjgssis.exeDetected by Dr.Web as Trojan.DownLoader6.37415 and by Malwarebytes as Backdoor.AgentNo
RPC ServiceXjgszznv.exeDetected by Sophos as W32/Rbot-EMSNo
JgUJevQpNnePtDMXJgUJevQpNnePtDM.exeWindows Recovery rogue security software - not recommended, removal instructions hereNo
Win UpdateXJhanB7W.exeDetected by Malwarebytes as Trojan.MSIL. The file is located in %AppData%No
svchostXJhanB7W.exeDetected by Malwarebytes as Backdoor.Bot.E. The file is located in %AppData%No
jhgj.exeXjhgj.exeDetected by Malwarebytes as Trojan.Injector. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows startsNo
UpdatedXjhgj.exeDetected by Malwarebytes as Trojan.Injector. The file is located in %UserStartup%No
Jiddtvxrkoarxnuc.exeXJiddtvxrkoarxnuc.exeDetected by Malwarebytes as Trojan.FakeCC. The file is located in %AppData%No
WINDOWSXjif.exeAdded by the MYTOB.MK WORM!No
jigikilamcasXjigikilamcas.exeDetected by McAfee as RDN/Generic Downloader.x!kg and by Malwarebytes as Trojan.Agent.USNo
uwuxusifXjijikete.exeDetected by Trend Micro as WORM_SDBOT.AXWNo
SFCHKXjike.exeDetected by McAfee as Generic Downloader.x and by Malwarebytes as Trojan.Agent.EJKNo
SlipStreamYjinetcore.exeJi-Speed Up Web Accelerator customized core module for Slipstream - internet acceleration through compression/decompression techniques, intelligent cacheing on the server side, and real-time conversion of large/high-bandwidth images to less bulky pixNo
Ji-Speed Up Web AcceleratorYjinetgui.exeJi-Speed Up Web Accelerator customized user interface for Slipstream - internet acceleration through compression/decompression techniques, intelligent cacheing on the server side, and real-time conversion of large/high-bandwidth images to less bulky pixNo
JingUJing.exeJing screen/video capture utility from TechSmith CorporationNo
SOFTWARELIVE78HKLMXjinmdll.exeDetected by McAfee as Swizzor.gen and by Malwarebytes as Backdoor.Agent.MCANo
PoliciesXjinmdll.exeDetected by McAfee as Swizzor.gen and by Malwarebytes as Backdoor.Agent.PGenNo
CORELIVE90HKCUXjinmdll.exeDetected by McAfee as Swizzor.gen and by Malwarebytes as Backdoor.Agent.MCANo
jiqonXjiqon.exeDetected by Malwarebytes as Worm.SFDC. The file is located in %UserProfile%No
ZWVAYLXJirjsnl.exeDetected by McAfee as RDN/Generic PWS.y!wg and by Malwarebytes as Trojan.Agent.ENo
jiupiXjiupi.exeAdded by the CHANGEUP-C WORM!No
jivekkuljujyXjivekkuljujy.exeDetected by McAfee as PWS-Zbot.gen.ari and by Malwarebytes as Trojan.CryptNo
jixhoframuajXjixhoframuaj.exeDetected by Dr.Web as Trojan.DownLoad3.34013 and by Malwarebytes as Trojan.Agent.USNo
jjXjj.exeDetected by Malwarebytes as Trojan.FakeAV. The file is located in %Windir% - see hereNo
jjanggametoolbarXjjanggametoolbar.exeDetected by Dr.Web as Trojan.Click2.16351 and by Malwarebytes as Trojan.ChinAdNo
JJangQXJJangQC.exeDetected by AVG as OpenShopper.D and by Malwarebytes as Adware.KorAd. The file is located in %ProgramFiles%\JJangQNo
JJangQSearchBarOSXJJangQSearchBar.exeDetected by AVG as OpenShopper.A and by Malwarebytes as Adware.KorAd. The file is located in %ProgramFiles%\JJangQ\JJangQSearchBarNo
Microsoft Update SetupXjjdrive32.exeDetected by Microsoft as Worm:Win32/Pushbot.OF and by Malwarebytes as Backdoor.BotNo
msjava critical updateXjjfixer.exeDetected by Sophos as Troj/Hector-ANo
jjj.vbs__.vbsXjjj.vbs__.vbsDetected by McAfee as RDN/Generic BackDoor and by Malwarebytes as Backdoor.Agent.VBS. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows startsNo
dlmcjjcefcXjjxzwzjy090504.exeDetected by Dr.Web as Trojan.PWS.Wsgame.39407 and by Malwarebytes as Trojan.DownloaderNo
WinUpdtrXjkduhy.exeDetected by Malwarebytes as Trojan.Agent.Gen. The file is located in %AppData%No
WINLODER UPDATEXJKEYS.exeDetected by McAfee as RDN/Generic BackDoor and by Malwarebytes as Backdoor.Agent.DCENo
Microsoft Update MachineXjkfrnz.exeDetected by Sophos as W32/Rbot-GOZ and by Malwarebytes as Backdoor.BotNo
jkhcorau.exeXjkhcorau.exeDetected by Malwarebytes as Trojan.Koobface.OL. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows startsNo
JkwkwtXJkwkwt.exeDetected by Malwarebytes as Backdoor.Bot. The file is located in %AppData%No
Microsoft Update MachineXjkydxg.exeDetected by Kaspersky as Backdoor.Win32.Rbot.aea and by Malwarebytes as Backdoor.Bot. The file is located in %System%No
Protocol Intelligent ProcessXjlipfave.exeDetected by Malwarebytes as Trojan.Agent. The file is located in %System%No
JMB36X IDE SetupUJMInsIDE.exeJMB36x series RAID configuration utility from JMicron for their PCI Express to SATA II and PATA Host ControllersNo
JmM2q.exeXJmM2q.exeDetected by Malwarebytes as Trojan.MSIL. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows startsNo
JmpyxPEOWqPOXJmpyxPEOWqPO.exeDetected by Sophos as Troj~FakeAV-DAQNo
36X Raid ConfigurerYJMRaidSetup.exeJMB36x series RAID configuration utility from JMicron for their PCI Express to SATA II and PATA Host ControllersNo
JMB36X ConfigureYJMRaidSetup.exeJMB36x series RAID configuration utility from JMicron for their PCI Express to SATA II and PATA Host ControllersNo
JMB36X ConfigureYJMRaidTool.exeJMB36x series RAID configuration utility from JMicron for their PCI Express to SATA II and PATA Host ControllersNo
Creata MailUJMSrvr.exeCreata_Mail. Smileys, stationary and more for you email. Required if you want to access the program from Outlook or Outlook ExpressNo
Usb driverXjmv2.exeDetected by Trend Micro as WORM_RANDEX.AVNo
jmVAaTxbPdQVXjmVAaTxbPdQV.exeDetected by Dr.Web as Trojan.Siggen5.31681 and by Malwarebytes as Backdoor.Agent.ENo
msjavadllXjnana.tsaAdded by the JNANABOT TROJAN!No
system64Xjnmhzdjtt.exeDetected by Malwarebytes as Trojan.Agent. The file is located in %CommonFiles%\system640No
Windows Service AgentXjnxrcyc.exeDetected by Kaspersky as Backdoor.Win32.Rbot.xat and by Malwarebytes as Backdoor.Bot. The file is located in %System%No
HKLMXjoaogay.exeDetected by Malwarebytes as Backdoor.HMCPol.Gen. The file is located in %Windir%\installNo
PoliciesXjoaogay.exeDetected by Malwarebytes as Backdoor.Agent.PGen. The file is located in %Windir%\installNo
HKCUXjoaogay.exeDetected by Malwarebytes as Backdoor.HMCPol.Gen. The file is located in %Windir%\installNo
joateoXjoateo.exeDetected by Sophos as W32/SillyFDC-FL and by Malwarebytes as Worm.SFDC. The file is located in %UserProfile%No
jobXjob.exeDetected by Dr.Web as Trojan.PWS.Siggen1.28616No
Form1Xjobdescription.exeDetected by Malwarebytes as Trojan.Banker. The file is located in %UserStartup% - see hereNo
jobdescription.exeXjobdescription.exeDetected by Malwarebytes as Trojan.MSIL. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows starts, see hereNo
JobHisInitUJobHisInit.exeUsed by Ricoh network printers to enable network printing from the clientNo
jociqpeaborlXjociqpeaborl.exeDetected by Dr.Web as Trojan.DownLoader10.7650 and by Malwarebytes as Trojan.Agent.USNo
Microsoft Config SetupXjodrive32.exeDetected by Sophos as Troj/Backdr-EYNo
JogServ2UJogServ2.exe"Jog Dial" on a Sony Vaio laptop. The dial can select various functions such as control audio. Needed if you use its featuresNo
JOGSERV2.EXEUJogServ2.exe"Jog Dial" on a Sony Vaio laptop. The dial can select various functions such as control audio. Needed if you use its featuresNo
ELDIMERA32XJOhanS.exeDetected by McAfee as Generic BackDoor and by Malwarebytes as Backdoor.Agent.ELDNo
SOUNDMIXXJOhanS.exeDetected by McAfee as Generic BackDoor and by Malwarebytes as Backdoor.Agent.ELDNo
Attacher ExtXJoin.txtDetected by Malwarebytes as Trojan.Agent.AT. The file is located in %System%No
PoliciesXJoinBot.exeDetected by Malwarebytes as Backdoor.Agent.PGen. The file is located in %ProgramFiles%\1033 - see hereNo
joinbotXJoinBot.exeDetected by Malwarebytes as Trojan.Banker.WX. The file is located in %ProgramFiles%\1033 - see hereNo
joinbotXjoinbot.exeDetected by McAfee as RDN/Generic BackDoor!bbg and by Malwarebytes as Backdoor.Agent.DCE. The file is located in %Root%\WinupdtNo
vbcXjoiSy.exeDetected by Malwarebytes as Trojan.Agent.AI. The file is located in %UserProfile%\vbcNo
jojezdixxofjXjojezdixxofj.exeDetected by McAfee as RDN/Generic Dropper!va and by Malwarebytes as Trojan.Agent.USNo
vscanXjoke.vbsDetected by Sophos as VBS/Rookie-ANo
JokerLoaderXJokerLoader.jsDetected by Malwarebytes as Malware.Trace. The file is located in %UserProfile%\JokerNo
jomasrihajoXjomasrihajo.exeDetected by McAfee as RDN/Generic.dx!dfd and by Malwarebytes as Trojan.Agent.USNo
[various names]Xjopplerg.exeFake startup entry created by the Wareout rogue spyware and dialer remover - not recommended, removal instructions here. Archived version of Andrew Clover's original pageNo
Launch Norton AntiVirus 2000Xjorgf.exeDetected by Sophos as W32/Rbot-AUINo
jotfemfualijXjotfemfualij.exeDetected by McAfee as RDN/Generic.tfr!ed and by Malwarebytes as Trojan.Agent.USNo
jotgesadosjyXjotgesadosjy.exeDetected by Dr.Web as Trojan.DownLoader6.62576 and by Malwarebytes as Trojan.Agent.USNo
jotogXjotog.exeDetected by Malwarebytes as Trojan.Downloader. The file is located in %UserProfile%No
JOYTECH USB Neo S ControllerUJoytechNeoSTrayIcon.exeSystem Tray access to Joytech Neo S PC gamepad controller softwareNo
Game DeviceNJOYUPDRV.EXEGenius game controller profile activatorNo
JPEGXJPEG.exeDetected by Malwarebytes as Trojan.Agent.E. Note - this entry loads from the Windows Startup folder and the file is located in %CommonAppData%\JPEGNo
JeticoPFStartupYjpf.exe"Jetico Personal Firewall software protects computers against hackers and malicious software when networked or connected to the Internet. It offers detailed, configurable event logs, reports, plus the option to view and edit the firewall configuration. The modular architecture is as open as possible to assist with easier evaluation of the security"No
king_jpXjpking.exeDetected by Sophos as Troj/Agent-POO and by Malwarebytes as Spyware.OnlineGamesNo
jpupdXjpupd.exeDetected by Trend Micro as TROJ_DIALER.CMNo
javaXjpxiinstall.exeDetected by Malwarebytes as Trojan.Agent. The file is located in %AppData%No
E2Y7AF5VP621XJQ4IGAVB.exeDetected by Malwarebytes as Trojan.Agent. The file is located in %AppData%No
JqfsfbXJqfsfb.exeDetected by Sophos as Troj/Mdrop-DUYNo
Java(TM) Update SchedulerXjqs.exeDetected by Kaspersky as Worm.Win32.Bybz.box. The file is located in %ProgramFiles%\Java\jre6\libNo
javaXjqs.exeDetected by Microsoft as Worm:Win32/Dorkbot.R and by Malwarebytes as Trojan.FkjavaNo
Java driveXjqs.exeDetected by Kaspersky as Worm.Win32.Bybz.box. The file is located in %ProgramFiles%\Java\jre6\libNo
JQSXjqs.exeDetected by McAfee as RDN/Generic.bfr!a and by Malwarebytes as Trojan.Agent.QJNo
JQSDXjqsd.exeDetected by Dr.Web as Trojan.Hosts.38132No
jqsd.exeXjqsd.exeDetected by Dr.Web as Trojan.Hosts.38132 and by Malwarebytes as Trojan.PasswordStealer. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows startsNo
Messenger UpdateXJqsx.exeDetected by Malwarebytes as Trojan.Passwords. The file is located in %AppData%\Java sunsNo
Java sunsXJqsx.exeDetected by Malwarebytes as Backdoor.Agent. The file is located in %AppData%\Java sunsNo
BitcoinInjectorXJqtOq.exeDetected by Malwarebytes as Trojan.BitcoinMiner. The file is located in %AppData%No
SystesXjrdtifkkxbbsa.exeDetected by Sophos as W32/Rbot-ADCNo
Java RuntimeXjre.exeDetected by Dr.Web as Trojan.MulDrop4.8778 and by Malwarebytes as Trojan.AgentNo
wow64_32signXjreenulocloc.exeDetected by McAfee as RDN/Generic.bfr!fl and by Malwarebytes as Trojan.Agent.ENo
JregXJreg2b.exeFlashEnhancer adwareNo
JRESP7XJREUPD7.exeDetected by McAfee as Generic.dx!bh3h and by Malwarebytes as Trojan.AgentNo
jrun32Xjrun32.exeDetected by McAfee as RDN/Generic Dropper and by Malwarebytes as Backdoor.AgentNo
BArVzWXJrYnjU.exeDetected by Dr.Web as Trojan.DownLoader6.63357 and by Malwarebytes as Spyware.KeyloggerNo
Chrome UpdateXjs83kgso.exeDetected by McAfee as Generic.dx!bdrk and by Malwarebytes as Trojan.Agent. Note - this is not a legitimate Google Chrome browser fileNo
Chrome UpdaterXjs8dth3w.exeDetected by McAfee as Generic Dropper!1p3. Note - this is not a legitimate Google Chrome browser fileNo
SunJavaUpdateSched132Xjschd.exeDetected by Sophos as W32/AutoRun-AQYNo
JavascriptXjscript.exeDetected by Sophos as W32/Delbot-ADNo
Windows Javascript DaemonXjsdaemon.exeDetected by Microsoft as Backdoor:Win32/Rbot.EKNo
JavaScript Debugging ServiceXJsDbgMan.exeDetected by Symantec as W32.Derdero.E@mmNo
SPDriverUjsdrv.exeShopper-Pro shopping browser add-on. Detected by Malwarebytes as PUP.Optional.ShopperPro. The file is located in %ProgramFiles%\ShopperPro[version]\JSDriver\[version]. If bundled with another installer or not installed by choice then remove it, removal instructions hereNo
JsecXJsec.exeDetected by Malwarebytes as Backdoor.Agent.DC. The file is located in %AppData%No
jserd.exeXjserd.exeDetected by Malwarebytes as Spyware.PWS. The file is located in %Root%\addonsNo
SABDHASXjshdo.exeDetected by McAfee as RDN/Generic PWS.y!zb and by Malwarebytes as Backdoor.Agent.ENo
Audio DeviceXjshed.exeDetected by Malwarebytes as Backdoor.Agent. The file is located in %AppData%\InstallNo
SunJavaUpdateSched v3.4Xjshed.exeDetected by Kaspersky as Trojan.Win32.Buzus.auub and by Malwarebytes as Trojan.Agent. The file is located in %System%No
Java Auto UpdateXjsheded.exeDetected by Dr.Web as Trojan.Siggen5.6039 and by Malwarebytes as Backdoor.BotNo
Windows Microsoft ServiceXjsopfuud.exeDetected by Sophos as Troj/Agent-HCD and by Malwarebytes as Backdoor.BotNo
jspeqXjspeq.exeDetected by Malwarebytes as Worm.SFDC. The file is located in %UserProfile%No
jssvc23Xjsssvc.exeDetected by Trend Micro as WORM_RBOT.EIWNo
Java Update ManagerXjstchde.exeDetected by Kaspersky as Trojan-Downloader.Win32.Small.awbm and by Malwarebytes as Trojan.Agent. The file is located in %AppData%\HEX-5823-6893-6818No
ykemkfelXjsuyaxatssd.exeDetected by Sophos as Troj/Agent-ODYNo
betaXjtkyyvgiu.exeDetected by Malwarebytes as Trojan.Injector. The file is located in %CommonAppData%\botNo
jtoshibaXjtoshiba.exeDetected by McAfee as PWS-Zbot-FAJX!6245B271B2DA and by Malwarebytes as Trojan.Agent.ZBNo
jtperXjtper.exeDetected by Malwarebytes as Worm.SFDC. The file is located in %UserProfile% - see hereNo
Windows DefenderXJTVEBY4Z1V.exeDetected by Malwarebytes as Trojan.Agent.Gen. The file is located in %AppData%\win32No
jtvgjubbuencbfw.exeXjtvgjubbuencbfw.exeDetected by McAfee as RDN/Spybot.bfr!n and by Malwarebytes as Trojan.Agent.RND. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows startsNo
MICROSFT NT SUPPORTXjtzbpfnkxk.EXEDetected by Sophos as W32/Rbot-CMINo
jubidiswirorXjubidiswiror.exeDetected by Malwarebytes as Backdoor.Pushdo. The file is located in %UserProfile%No
jucheckXjucheck.exeDetected by Malwarebytes as Trojan.Agent.E. The file is located in %AppData%No
jucheckXjucheck.exeDetected by Symantec as W32.Scrimge.ONo
jucheck.exeXjucheck.exeDetected by Trend Micro as TROJ_BATWIPER.A and by Malwarebytes as Backdoor.PoisonNo
SkypeXjucheck.exeDetected by Malwarebytes as Backdoor.SpyNet. The file is located in %CommonFiles%\Java\Java UpdateNo
javaXjucheck.exeDetected by McAfee as RDN/Generic.bfr!gc and by Malwarebytes as Backdoor.Agent.SKNo
Adobe Reader And Acrobat ManagerXjucheck.exeDetected by Malwarebytes as Backdoor.SpyNet. The file is located in %CommonFiles%\Java\Java UpdateNo
Windows DefenderXjucheck.exeDetected by Malwarebytes as Backdoor.SpyNet. The file is located in %CommonFiles%\Java\Java UpdateNo
Windows Login accessXjucheck.exeDetected by Dr.Web as Trojan.StartPage.38448 and by Malwarebytes as Trojan.AgentNo
juchedXjuched.exeDetected by McAfee as RDN/Generic BackDoor!zm and by Malwarebytes as Backdoor.Agent.JCNo
juchedsys.exeXjuchedsys.exeDetected by Malwarebytes as Trojan.Banker. The file is located in %UserProfile%\Configurações locais\Dados de aplicativosNo
%UserProfile%\Configurações locais\Dados de aplicativos\juchedsys.exeXjuchedsys.exeDetected by Malwarebytes as Trojan.Banker. The file is located in %UserProfile%\Configurações locais\Dados de aplicativosNo
jucheedXjucheed.exeDetected by Dr.Web as Trojan.DownLoader4.633 and by Malwarebytes as Backdoor.IRCBotNo
Sun Java Updater v7.11Xjucshed.exeDetected by Sophos as W32/Autorun-ABH and by Malwarebytes as Trojan.AgentNo
SunJavaUpdateSched v3Xjucshed.exeDetected by Sophos as W32/Autorun-ABC and by Malwarebytes as Trojan.AgentNo
juddedoxofjuXjuddedoxofju.exeDetected by McAfee as RDN/Generic Dropper!vc and by Malwarebytes as Trojan.Agent.USNo
judferimemjuXjudferimemju.exeDetected by McAfee as RDN/Generic PWS.y!b2q and by Malwarebytes as Trojan.Agent.USNo
SystemXJuegs.exeDetected by Sophos as W32/Culler-CNo
juheggdsXjuheggds.exeDetected by Dr.Web as Trojan.DownLoader9.17772 and by Malwarebytes as Trojan.FakeEXTNo
JuiceNJuice.exeJuice - a free utility that "allows you to select and download audio files from anywhere on the Internet to your desktop". This entry is present if you choose the option to add it to the startup group during installationYes
Intel(R) HD GraphicsXJuicyJ.exeDetected by McAfee as RDN/Generic BackDoor and by Malwarebytes as Trojan.Agent.ASGenNo
juiloquisejuXjuiloquiseju.exeDetected by McAfee as RDN/Generic Dropper!vf and by Malwarebytes as Trojan.Agent.USNo
juimubequijuXjuimubequiju.exeDetected by McAfee as RDN/Generic Dropper!vl and by Malwarebytes as Trojan.Agent.USNo
DLL52Xjuin.exeDetected by Malwarebytes as Trojan.Agent.LDE. The file is located in %AppData%No
juisuXjuisu.exeDetected by Malwarebytes as Worm.SFDC. The file is located in %UserProfile%No
jujavaXjujava.exeDetected by Malwarebytes as Trojan.Winlock. The file is located in %AppData%\MicrosoftNo
VEFXYVZZBNWMJDJPXQZLDQTNBXJujvVloUUoRoqjOSRMtPFJxoA.exeDetected by Malwarebytes as Backdoor.Agent. The file is located in %AppData%No
jukaxjyxpolbXjukaxjyxpolb.exeDetected by McAfee as Downloader.a!db3 and by Malwarebytes as Trojan.Agent.USNo
HKCUXjulio.exeDetected by Malwarebytes as Backdoor.HMCPol.Gen. The file is located in %Root%\julio\julioNo
junbulsonsxXjunbulsonsx.exeDetected by Sophos as Troj/VB-INH and by Malwarebytes as Trojan.Agent.WSTRNo
junbulsonsx.exeXjunbulsonsx.exeDetected by Sophos as Troj/VB-INH and by Malwarebytes as Trojan.Agent.WSTR. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows startsNo
EleFunAnimatedWallpaperUJungle Waterfall.exeJungle Waterfall animated wallpaper fromNo
HKCUXjunio.exeDetected by Malwarebytes as Backdoor.HMCPol.Gen. The file is located in %ProgramFiles%\junioNo
junior2Xjunior2.exeDetected by Dr.Web as Trojan.PWS.Banker1.11137 and by Malwarebytes as Trojan.Banker.ENo
JunkCleanerXJunkCleaner.exeDetected by Malwarebytes as Rogue.TechSupportScam. The file is located in %ProgramFiles%\Pandaje Technical Services\Junk CleanerNo
JunkerXJunker.exeDetected by Malwarebytes as Trojan.ScreenLock. The file is located in %ProgramFiles%\JunkerNo
Junter.exeXJunter.exeDetected by Malwarebytes as Trojan.Agent.AP. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows starts - see hereNo
ArVzWJrYnXjUOghDDYN.exeDetected by McAfee as Generic PWS.y!dxb and by Malwarebytes as Trojan.AgentNo
jupdateXjupdate.exeDetected by Malwarebytes as Trojan.MSIL. The file is located in %AppData%No
Adobe FontsXjupdt.exeDetected by Dr.Web as Trojan.DownLoader10.52896 and by Malwarebytes as Trojan.DownloaderNo
USB SECURITY DEVICE CoInstallerYJupitCo.exeButterflyMedia USB Flash drive related - required for the password security feature to workNo
JuPoXjupos.exeDetected by Sophos as W32/Sdbot-CAGNo
jusb2Xjusb2.exeDetected by Malwarebytes as Trojan.Agent.RRUN. The file is located in %AppData%\MicrosoftNo
wininiitXjuschd.exeDetected by Malwarebytes as Trojan.Agent.E. The file is located in %AppData%\juschdNo
SunJavaUpdateXjuschd.exeDetected by Malwarebytes as Trojan.Scar. The file is located in %Windir%No
WinServicexXJuscheck.exeDetected by Dr.Web as Trojan.DownLoader3.35013No
Java Update ManagerXjusched.exeDetected by Sophos as CXmal/FkFldr-C and by Malwarebytes as Trojan.Agent. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name which is usually located in %ProgramFiles%\Java\version number\bin (up to version 6 update 16) or %CommonFiles%\Java\Java Update (from version 6 update 17). This one is located in %AppData%\HEX-5823-6893-6818No
winupdateXjusched.exeDetected by Sophos as Troj/DwnLdr-FUX and by Malwarebytes as Trojan.Agent. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name which is usually located in %ProgramFiles%\Java\version number\bin (up to version 6 update 16) or %CommonFiles%\Java\Java Update (from version 6 update 17). This one is located in %Windir%No
juschedXjusched.exeDetected by Dr.Web as Trojan.DownLoad2.45152 and by Malwarebytes as Trojan.Agent. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name which is usually located in %ProgramFiles%\Java\version number\bin (up to version 6 update 16) or %CommonFiles%\Java\Java Update (from version 6 update 17). This one is located in %AppData%No
juschedXjusched.exeDetected by McAfee as Generic BackDoor. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name which is usually located in %ProgramFiles%\Java\version number\bin (up to version 6 update 16) or %CommonFiles%\Java\Java Update (from version 6 update 17). This one is located in %AppData%\juschedNo
juschedYjusched.exeChecks with Oracle's (was Sun Microsystems) Java updates site to see if newer Java versions are available. Recommended that you leave this enabled due to potential Java vulnerabilities and exploits that may be used by malware writers. Note - this entry loads from the HKLM\Run key and the file is usually located in %ProgramFiles%\Java\jre[version]\bin (up to version 6 update 16) or %CommonFiles%\Java\Java Update (from version 6 update 17)Yes
juschedXjusched.exeDetected by Sophos as Troj/Banker-BOV. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name which is usually located in %ProgramFiles%\Java\version number\bin (up to version 6 update 16) or %CommonFiles%\Java\Java Update (from version 6 update 17). This one is located in %System%No
juschedXjusched.exeDetected by Sophos as Troj/Mdrop-EPP and by Malwarebytes as Backdoor.Agent. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name which is usually located in %ProgramFiles%\Java\version number\bin (up to version 6 update 16) or %CommonFiles%\Java\Java Update (from version 6 update 17). This one is located in %System%\CerberusNo
juschedXjusched.exeDetected by McAfee as RDN/Generic.bfr and by Malwarebytes as Trojan.Banker.Gen. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name which is usually located in %ProgramFiles%\Java\version number\bin (up to version 6 update 16) or %CommonFiles%\Java\Java Update (from version 6 update 17). This one is located in %Temp%\juschedNo
jusched.exeXjusched.exeDetected by Malwarebytes as Backdoor.Agent.E. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name which is usually located in %ProgramFiles%\Java\version number\bin (up to version 6 update 16) or %CommonFiles%\Java\Java Update (from version 6 update 17). This one is located in %AppData%\AppOne\Meta\Tags\UpdateNo
jusched.exeXjusched.exeDetected by Dr.Web as Trojan.DownLoader3.27090 and by Malwarebytes as Trojan.Agent. Note that this is not the legitimate Oracle (was Sun Microsystems) file (of the same name) which is usually located in %Program Files%\Java\version number\bin. This one is located in %AppData%\JavaVMNo
jusched.exeXjusched.exeDetected by Malwarebytes as Trojan.Agent. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name which is usually located in %ProgramFiles%\Java\version number\bin (up to version 6 update 16) or %CommonFiles%\Java\Java Update (from version 6 update 17). This one is located in %Windir%No
Java(TM) Platform SE 6Yjusched.exeChecks with Oracle's (was Sun Microsystems) Java updates site to see if newer Java versions are available. Recommended that you leave this enabled due to potential Java vulnerabilities and exploits that may be used by malware writers. The file is located in %ProgramFiles%\Java\jre[version]\bin (up to version 6 update 16) or %CommonFiles%\Java\Java Update (from version 6 update 17)Yes
Java(TM) Platform SE 6 U*Yjusched.exeChecks with Oracle's (was Sun Microsystems) Java updates site to see if newer Java versions are available. Recommended that you leave this enabled due to potential Java vulnerabilities and exploits that may be used by malware writers. The file is located in %ProgramFiles%\Java\jre[version]\bin (up to version 6 update 16) or %CommonFiles%\Java\Java Update (from version 6 update 17)Yes
Java(TM) Platform SE Auto UpdaterXjusched.exeDetected by Malwarebytes as Trojan.Agent.AI. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name which is usually located in %ProgramFiles%\Java\version number\bin (up to version 6 update 16) or %CommonFiles%\Java\Java Update (from version 6 update 17). This one is located in %AppData%\Adobe\Flash Player\AssetCache\EWRQTQXLNo
Java(TM) Platform SE Auto UpdaterXjusched.exeDetected by Malwarebytes as Trojan.Bitcoin. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name which is usually located in %ProgramFiles%\Java\version number\bin (up to version 6 update 16) or %CommonFiles%\Java\Java Update (from version 6 update 17). This one is located in %AppData%\Dropbox\installerNo
UpdateXjusched.exeDetected by Kaspersky as Trojan-Downloader.Win32.VB.amx and by Malwarebytes as Trojan.Agent.VB. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name which is usually located in %ProgramFiles%\Java\version number\bin (up to version 6 update 16) or %CommonFiles%\Java\Java Update (from version 6 update 17). This one is located in %System%No
Java(TM) Platform SE Auto UpdaterXjusched.exeDetected by Kaspersky as Trojan-Dropper.Win32.Dapato.bmpo and by Malwarebytes as Trojan.Agent.H. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name which is usually located in %ProgramFiles%\Java\version number\bin (up to version 6 update 16) or %CommonFiles%\Java\Java Update (from version 6 update 17). This one is located in %CommonAppData%No
FJSDRKTXjusched.exeDetected by McAfee as RDN/Generic.bfr and by Malwarebytes as Trojan.Agent. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name which is usually located in %ProgramFiles%\Java\version number\bin (up to version 6 update 16) or %CommonFiles%\Java\Java Update (from version 6 update 17). This one is located in %AppData%No
Java(TM) Platform SE Auto Updater 2 0Yjusched.exeChecks with Oracle's (was Sun Microsystems) Java updates site to see if newer Java versions are available. Recommended that you leave this enabled due to potential Java vulnerabilities and exploits that may be used by malware writers. The file is located in %ProgramFiles%\Java\jre[version]\bin (up to version 6 update 16) or %CommonFiles%\Java\Java Update (from version 6 update 17)Yes
Java(TM) Update SchedulerXjusched.exeDetected by Malwarebytes as Trojan.Agent. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name which is usually located in %ProgramFiles%\Java\version number\bin (up to version 6 update 16) or %CommonFiles%\Java\Java Update (from version 6 update 17). This one is located in %LocalAppData%\MicrosoftNo
Java(TM) Update SchedulerXjusched.exeDetected by Kaspersky as Trojan-Downloader.Win32.Genome.baax. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name which is usually located in %ProgramFiles%\Java\version number\bin (up to version 6 update 16) or %CommonFiles%\Java\Java Update (from version 6 update 17). This one is located in %System%No
JavaXJusched.exeDetected by Malwarebytes as IPH.Trojan.Zbot.REPS. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name which is usually located in %ProgramFiles%\Java\version number\bin (up to version 6 update 16) or %CommonFiles%\Java\Java Update (from version 6 update 17). This one is located in %AppData%\Java\JavaUpdateNo
Sun Java Update.exeXjusched.exeDetected by Dr.Web as Trojan.PWS.Lineage.9630. Note - this entry either replaces or loads the legitimate Oracle (was Sun Microsystems) file which is located in %CommonFiles%\Java\Java Update (from version 6 update 17 onwards). Which is the case is unknown at this timeNo
Java (TM) Platform SE Auto Updater 2.1Xjusched.exeDetected by Sophos as Troj/Mdrop-EPP and by Malwarebytes as Backdoor.Agent. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name which is usually located in %ProgramFiles%\Java\version number\bin (up to version 6 update 16) or %CommonFiles%\Java\Java Update (from version 6 update 17). This one is located in %System%\CerberusNo
Java developer Script BrowseXjusched.exeDetected by Sophos as Troj/VB-ESK and by Malwarebytes as Trojan.Agent. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name which is usually located in %ProgramFiles%\Java\version number\bin (up to version 6 update 16) or %CommonFiles%\Java\Java Update (from version 6 update 17). This one is located in %Windir%No
wmonXjusched.exeDetected by Sophos as W32/Agobot-OW. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name which is usually located in %ProgramFiles%\Java\version number\bin (up to version 6 update 16) or %CommonFiles%\Java\Java Update (from version 6 update 17). This one is located in %System%No
SunJavaUpdateXjusched.exeDetected by McAfee as Generic.bfr!cw and by Malwarebytes as Trojan.Agent. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name which is usually located in %ProgramFiles%\Java\version number\bin (up to version 6 update 16) or %CommonFiles%\Java\Java Update (from version 6 update 17). This one is located in %System%No
Java Platform SE Auto UpdaterXjusched.exeDetected by Malwarebytes as Trojan.Injector.AutoIt. Note - this entry either replaces or loads the legitimate Oracle (was Sun Microsystems) file which is located in %CommonFiles%\Java\Java Update (from version 6 update 17 onwards). Which is the case is unknown at this timeNo
Java Platform SE Auto UpdaterXjusched.exeDetected by Malwarebytes as Trojan.Agent. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name which is usually located in %ProgramFiles%\Java\version number\bin (up to version 6 update 16) or %CommonFiles%\Java\Java Update (from version 6 update 17). This one is located in %Windir%No
Java Platform UpdaterXjusched.exeDetected by Sophos as Troj/Trackr-AB and by Malwarebytes as Trojan.FakeJava. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name which is usually located in %ProgramFiles%\Java\version number\bin (up to version 6 update 16) or %CommonFiles%\Java\Java Update (from version 6 update 17). This one is located in %AppData%\Java SE Platform UpdaterNo
SunJavaUpdateSchedXjusched.exeDetected by Kaspersky as Trojan-Downloader.Win32.Agent.etq. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name which is usually located in %ProgramFiles%\Java\version number\bin (up to version 6 update 16) or %CommonFiles%\Java\Java Update (from version 6 update 17). This one is located in %CommonFiles%No
SunJavaUpdateSchedYjusched.exeChecks with Oracle's (was Sun Microsystems) Java updates site to see if newer Java versions are available. Recommended that you leave this enabled due to potential Java vulnerabilities and exploits that may be used by malware writers. The file is located in %ProgramFiles%\Java\jre[version]\bin (up to version 6 update 16) or %CommonFiles%\Java\Java Update (from version 6 update 17)Yes
SunJavaUpdateSchedXjusched.exeDetected by Trend Micro as TSPY_BANKER-2.001. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name which is usually located in %ProgramFiles%\Java\version number\bin (up to version 6 update 16) or %CommonFiles%\Java\Java Update (from version 6 update 17). This one is located in %Windir%\DebugNo
Java SE Platform UpdaterXjusched.exeDetected by Dr.Web as Trojan.DownLoader10.26900 and by Malwarebytes as Trojan.Agent.JVGenNo
SunJavaUpdateSched##Xjusched.exeDetected by Sophos as Troj/Lolbot-A and by Malwarebytes as Trojan.Downloader. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name which is usually located in %ProgramFiles%\Java\version number\bin (up to version 6 update 16) or %CommonFiles%\Java\Java Update (from version 6 update 17). This one is located in %ProgramFiles%\Java\jre-##\bin - where ## represents digitsNo
SunJavaUpdateSched,Xjusched.exeDetected by McAfee as PWS-Zbot and by Malwarebytes as Trojan.FakeJava.Gen. Note the addtional "," at the end of the startup name and that this is not the legitimate Oracle (was Sun Microsystems) file of the same name which is usually located in %ProgramFiles%\Java\version number\bin (up to version 6 update 16) or %CommonFiles%\Java\Java Update (from version 6 update 17). This one is located in %ProgramFiles%\Java\jre-07\binNo
Windows DefenderXjusched.exeDetected by Malwarebytes as Trojan.Injector.AutoIt. Note - this entry either replaces or loads the legitimate Oracle (was Sun Microsystems) file which is located in %CommonFiles%\Java\Java Update (from version 6 update 17 onwards). Which is the case is unknown at this timeNo
SunJavaUpdateSched9Xjusched.exeDetected by Sophos as Troj/Lolbot-A and by Malwarebytes as Trojan.FakeJava.Gen. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name which is usually located in %ProgramFiles%\Java\version number\bin (up to version 6 update 16) or %CommonFiles%\Java\Java Update (from version 6 update 17). This one is located in %ProgramFiles%\Java\jre-09\binNo
SunJavaUpdateSchedulerXjusched.exeDetected by McAfee as RDN/Generic.bfr. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name which is usually located in %ProgramFiles%\Java\version number\bin (up to version 6 update 16) or %CommonFiles%\Java\Java Update (from version 6 update 17). This one is located in %AppData%\Java Runtime EnvironmentNo
SunJavaUpdateSchedulerXjusched.exeDetected by Malwarebytes as Trojan.Agent.AI. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name which is usually located in %ProgramFiles%\Java\version number\bin (up to version 6 update 16) or %CommonFiles%\Java\Java Update (from version 6 update 17). This one is located in %ProgramFiles%\Java Runtime EnvironmentNo
vUj81HXjusched.exeDetected by Malwarebytes as Trojan.Agent.AI. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name which is usually located in %ProgramFiles%\Java\version number\bin (up to version 6 update 16) or %CommonFiles%\Java\Java Update (from version 6 update 17). This one is located in %UserProfile%\lPy43GNo
juschedXjusched16.exeDetected by McAfee as RDN/Generic.bfr!he and by Malwarebytes as Backdoor.Agent.JSNo
JavaUpdateSchedXjusched32.exeDetected by Sophos as Troj/Bckdr-CKBNo
HCRXjusched32.exeDetected by McAfee as RDN/Generic.bfr and by Malwarebytes as Backdoor.Agent.ENo
PoliciesXjusched32.exeDetected by McAfee as RDN/Generic.bfr and by Malwarebytes as Backdoor.Agent.PGenNo
WINTASK DLLXjusched32.exeDetected by Symantec as W32.Mytob.AI@mmNo
HRVXjusched32.exeDetected by McAfee as RDN/Generic.bfr and by Malwarebytes as Backdoor.Agent.ENo
A7675373-85EC-453E-B7CF-3CD09AFEFE-1421009279Xjuschedg.exeDetected by Dr.Web as Trojan.DownLoader8.24522 and by Malwarebytes as Trojan.AgentNo
WININITSTXjuschedi.exeDetected by McAfee as Generic Downloader.x!glh and by Malwarebytes as Trojan.AgentNo
jushedXjushed.exeDetected by Malwarebytes as Trojan.Agent. The file is located in %CommonAppData%No
Java(TM) Platform SE Auto UpdaterXjushed.exeDetected by McAfee as RDN/Autorun.worm.gen and by Malwarebytes as Trojan.FakeJavaNo
Java(TM) Platform SE Auto UpdaterXjushed.exeDetected by Malwarebytes as Backdoor.Agent.DCE. The file is located in %Windir%\Microsoft - see hereNo
JavaXjushed.exeDetected by Malwarebytes as Trojan.MSIL. The file is located in %AppData%No
JavaXjushed.exeDetected by Malwarebytes as Trojan.Agent. The file is located in %AppData%\MicrosoftNo
PoliciesXjushed.exeDetected by Malwarebytes as Backdoor.Agent.PGen. The file is located in %Windir%No
SunJavaUpdateSched v2Xjushed.exeDetected by Symantec as W32.Ackantta.B@mm and by Malwarebytes as Trojan.Agent. The file is located in %System%No
SunJavaUpdateSched v3.3Xjushed.exeDetected by Kaspersky as Trojan.Win32.Buzus.asuu and by Malwarebytes as Trojan.Agent. The file is located in %System%No
SunJavaUpdateSched10Xjushed.exeDetected by Symantec as W32.Ackantta.F@mm and by Malwarebytes as Trojan.DownloaderNo
ShellXjushed.exe,explorer.exeDetected by Malwarebytes as Trojan.FakeAlert. Note - this entry adds an illegal HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon "Shell" entry. The value data points to "explorer.exe" (which is a legitimate file located in %Windir% and shouldn't be deleted) and "jushed.exe" (which is located in %Windir%\Microsoft), see hereNo
ShellXjushed.exe,explorer.exeDetected by McAfee as RDN/Autorun.worm.gen and by Malwarebytes as Trojan.FakeAlert. Note - this entry adds an illegal HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon "Shell" entry. The value data points to "explorer.exe" (which is a legitimate file located in %Windir% and shouldn't be deleted) and "jushed.exe" (which is located in %AppData%\Microsoft)No
jushed32.exeXjushed32.exeCoolWebSearch parasite variant - also detected as the BIZTEN-L TROJAN!No
pnvifjXjusodl.exeDetected by Sophos as W32/QQRob-ADNNo
spc_wNjuspc.exeJuno Search Enhancements related by United Online, IncNo
JussDropUtilityUJussDrop.exeRelated to DropShots Inc. A subscription based service for family to connect, converse and share photos and videosNo
just.exeXjust.exeDetected by Malwarebytes as Trojan.Banker.Gen. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows starts - see hereNo
mstcsXjust.exeDetected by Malwarebytes as Backdoor.Agent.E. Note - this entry loads from the Windows Startup folder and the file is located in %Templates%No
JustCloudUJustCloud.exeJustCloud online backup solution by Just Develop It - "will automatically backup and protect your photos, documents and more to our Google powered cloud." Detected by Malwarebytes as PUP.Optional.JustCloud. Note - this entry loads from the Windows Startup folder and the file is located in %ProgramFiles%\JustCloud. If bundled with another installer or not installed by choice then remove it, removal instructions hereNo
Just GesturesUJustGestures.exeJust Gestures by Miroslav Dzurenko - "is an easy and elegant way to enhance your mouse with endless possibilities. The main idea is to get maximum efficiency out of your mouse and use the keyboard as little as possible. The program allows you to create mouse gestures with user-defined actions; you can use mouse movements and click combinations. Just Gestures will recognize gestures you perform and invoke the appropriate actions"No
JustinsControlXJustinsComputerHelper.exeDetected by Malwarebytes as Trojan.Agent.E.Generic. The file is located in %AppData%\JustinsComputer HelperNo
JustUrlsNjusturls.exeJustUrls by Eastern Digital Software - "is a Web Page launching program. So useful, you will wonder how you ever got by without it! The program is designed to get you to your favorite URL's easily and quickly without any fuss"No
JustVoipNJustVoip.exeJustVoip - free internet telephony utility using the VoIP (Voice over Internet Protocol). Call online friends for free and regular phones either for free (limited use) or low rates. One of a number provided by Betamax - the others generally have different rate plans. Similar to the more popular SkypeYes
Java Update ManagerXjutched.exeDetected by Trend Micro as WORM_PUSHBOT.TAF and by Malwarebytes as Trojan.AgentNo
jutsuXjutsu.exeDetected by Sophos as W32/Rbot-LSNo
juzchedXjuzched.exeDetected by Sophos as Troj/Zlob-ATO and by Malwarebytes as Trojan.BankerNo
Jv16pt Network ResidentUjv16pt_network.exejv16 PowerTools network resident program. Only needed if you are using the program's network featuresNo
HKLMXjva1.exeDetected by Malwarebytes as Backdoor.HMCPol.Gen. The file is located in %System%\System32No
HKCUXjva1.exeDetected by Malwarebytes as Backdoor.HMCPol.Gen. The file is located in %System%\System32No
PLUGIN OPERATORSXjvcrsss.exeDetected by McAfee as RDN/Generic BackDoor and by Malwarebytes as Backdoor.Messa.ENo
javasunXjvcsun.exeDetected by Malwarebytes as Trojan.Agent. The file is located in %System%No
JvcHostXjvcsvc32.exeDetected by Sophos as W32/Agobot-AIUNo
Microsoft CorporationXjview.exeDetected by Sophos as W32/Rbot-AOD and by Malwarebytes as Backdoor.AgentNo
Rundll32Xjviwe.exeDetected by Malwarebytes as Trojan.Agent. The file is located in %Windir%No
JVM0XJVM0.exeDetected by Avira as TR/Dldr.Delf.awl. Note - this entry loads from the HKLM\Run kay and the file is located in %System%No
JVM0.exeXJVM0.exeDetected by Avira as TR/Dldr.Delf.awl and by Malwarebytes as Trojan.Banker. Note - the file is located in %AllUsersStartup% and its presence there ensures it runs when Windows startsNo
jvms.exeXjvms.exeAdded by the ORCU.B TROJAN!No
Adobe FontsXjvschd.exeDetected by Malwarebytes as Trojan.Downloader. The file is located in %Windir% - see hereNo
SunJavaUpdateSched16Xjvshed.exeDetected by Symantec as W32.Ackantta.G@mm and by Malwarebytes as Trojan.DownloaderNo
[random]Ujvsystem32.exeDetected by Malwarebytes as PUP.Optional.JavaLive. The file is located in %ProgramFiles%\JavaLive! Manager. If bundled with another installer or not installed by choice then remove it. Also detected by Microsoft as Trojan:Win32/Tivmonk.BNo
AXjvupdtr32.exeDetected by McAfee as RDN/Generic BackDoor and by Malwarebytes as Backdoor.Agent.DCGenNo
jvsoftXjvvo.exeDetected by Trend Micro as WORM_AUTORUN.ATQ and by Malwarebytes as Spyware.OnlineGamesNo
MDRCKKXJvWsGU.exeDetected by McAfee as RDN/Generic PWS.y!ut and by Malwarebytes as Backdoor.XTRat.ENo
jwXjwbrowser.exeDetected by Dr.Web as Trojan.Siggen6.4877 and by Malwarebytes as Trojan.Downloader.ENo
wintask32XJwintask.comDetected by Sophos as W32/Nafbot-A and by Malwarebytes as Worm.P2PNo
JW ManagerXjwmngr.exeDetected by Sophos as W32/Delbot-GNo
Microsoft Driver SetupXJwrb.exeDetected by Sophos as W32/AutoRun-AOB and by Malwarebytes as Worm.PalevoNo
jxef1104Xjxef1104.exeDetected by Sophos as W32/Xipi-ANo
JXL RadioXjxl.exeDetected by Sophos as W32/Rbot-EBENo
JufualtXjxx2.exeDetected by Trend Micro as WORM_SDBOT.BTG and by Malwarebytes as Backdoor.BotNo
jyczozeszexaXjyczozeszexa.exeDetected by McAfee as BackDoor-FAGP!486358B665D3 and by Malwarebytes as Trojan.Agent.USNo
jyfzanicogobXjyfzanicogob.exeDetected by McAfee as RDN/Generic Dropper!qi and by Malwarebytes as Trojan.Agent.USNo
jypozimqeapeXjypozimqeape.exeDetected by Malwarebytes as Trojan.Agent.US. The file is located in %UserProfile% - see hereNo
ba2dXjywoktpy.exeDetected by Malwarebytes as Malware.Packer.T. The file is located in %System%No
jyzqajyjynalXjyzqajyjynal.exeDetected by McAfee as RDN/Downloader.a!qh and by Malwarebytes as Trojan.Agent.USNo
jzvfvsqpcXjzvfvsqpc.exeDetected by Sophos as Troj/Agent-GWPNo
TaskmanXjzwmgw.exeDetected by Malwarebytes as Worm.Palevo. Note - this entry adds a HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon "Taskman" entry which loads the file "jzwmgw.exe" (which is located in %AppData%)No
[random]Xj[6 random characters].exeDetected by Sophos as W32/Brontok-AINo

Notes & Warnings

If you can help identify new entries and verify/identify those entries with a "?" status (especially hardware specific - such as laptops and motherboards) then please E-mail us (startups_at_pacs-portal_dot_co_dot_uk).

"Status" key:

Variables:

DISCLAIMER: It is assumed that users are familiar with the operating system they are using and comfortable with making the suggested changes. We will not be held responsible if changes you make cause a system failure.

WARNING: This is NOT a list of tasks/processes taken from the Task Manager (CTRL+SHIFT+ESC) "Processes" tab. This displays some startup programs AND other background tasks and "Services". These pages are concerned with startup programs from the common startup locations shown above ONLY. Please do not submit entries collected from this method as they will not be used. For a list of tasks/processes you should try the list at PC Pitstop, the Process Library from Uniblue or one of the many others now available.

Therefore, before ending a task/process via CTRL+SHIFT+ESC just because it has an "X" recommendation, please check whether it's in the registry or common startup locations first. An example would be "svchost.exe" - which doesn't appear in either under normal conditions but does via CTRL+SHIFT+ESC. If in doubt, don't do anything.

To avoid the database becoming too large, all malware entries are only shown using the registry version which is common to all Windows versions. Otherwise there would be multiple entries for popular filenames that viruses often use - such as "svchost.exe" above for example. Multiple malware can also use the same start-up entries, in this case only those with significant differences (such as file location) are repeated in this database.

As more than 25K entries in this database related to malware you should use a quality internet security package. Which ever you choose, keep it updated and get the latest version at least every two years.

There are a number of virus and malware entries listed in this database where specific removal instructions haven't been given. If this is the case then you could try ComboFix, a program written by sUBs that can remove many different types of Trojans and Worms. See here for a tutorial on how to use the program.

NOTE: A number of entries are repeated due to the way that different operating systems display startup items. For example, WinMe lists "POPROXY.EXE" as "Norton eMail Protect" in both MSCONFIG and the registry whereas WinXP lists it as "Poproxy" in MSCONFIG and "Norton eMail Protect" in the registry.

SERVICES: "Services" from the Windows 8/7/Vista/XP/2K/NT operating systems are not included. We fully understand that some programs with these OS's use "Services" as an alternative to load their component parts at startup but these are handled in a different way. We recommend you try BlackViper for information on services for the relevant operating systems.

Copyright

Presentation, format & comments Copyright © 2001 - 2017 Pacman's Portal
Portions Copyright © Peter Forrest, Denny Denham, Sylvain Prevost, Tony Klein, CastleCops & Bleeping Computer
Powered by Malwarebytes
All rights reserved

Valid XHTML 1.0 Transitional

Privacy Policy Site Map Home