Index Introduction Database Detailed Entries Updates Concise List HJT Forums Rogues Message Board

Windows startup programs - Database search

If you're frustrated with the time it takes your Windows 10/8/7/Vista/XP PC to boot and then it seems to be running slowly you may have too many programs running at start-up - and you have come to the right place to identify them. This is the original start-up programs (as opposed to processes/tasks) list - one of the most accurate and comprehensive. Services are not included - see below. For further information on this and how to identify and disable start-up programs please visit the Introduction page.

See here for further information on random entries - which are typically added by viruses and other malware or unwanted programs.

Last database update :- 28th April, 2017
51365 listed

You can search for any of the following terms to find and display entries in the start-up programs database but the minimum search is 3 characters and you must click on the "Search" button. Results are sorted by the Startup Item/Name field.

Alternatively, you can browse the full database (without the search facility) over a number of pages or you can use the alphabetical index below to list the entries for that letter by the Command/Data field, but the results may take longer to appear due to the number of them:

A | B | C | D | E | F | G | H | I | J | K | L | B | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

NOTE: Searching for common words (i.e. "the" or "where") will mean the results take longer to appear due to the number of them.

Please click on the Search button

781 results found for J

Startup Item or Name Status Command or Data Description Tested
JufualtXj2.exeDetected by Sophos as W32/Sdbot-ALJ and by Malwarebytes as Backdoor.BotNo
SoccerInferno Browser Plugin LoaderUj2brmon.exeSoccerInferno toolbar - powered by the Ask Partner Network toolbars by IAC Applications (was Mindspark). Detected by Malwarebytes as PUP.Optional.MindSpark. The file is located in %ProgramFiles%\SoccerInferno_1w\bar\*.bin - where * represents a number or letter. If bundled with another installer or not installed by choice then remove itNo
SoccerInferno Browser Plugin Loader 64Uj2brmon64.exeSoccerInferno toolbar - powered by the Ask Partner Network toolbars by IAC Applications (was Mindspark). Detected by Malwarebytes as PUP.Optional.MindSpark. The file is located in %ProgramFiles%\SoccerInferno_1w\bar\*.bin - where * represents a number or letter. If bundled with another installer or not installed by choice then remove itNo
J2G4NVAZSUSN.exeXJ2G4NVAZSUSN.exeDetected by Intel Security/McAfee as RDN/FakeAV-M.bfr!i and by Malwarebytes as Trojan.Downloader.MDONo
eFax [version]UJ2GDllCmd.exeDLL Command Utility for eFax Messenger from j2 Global Communications, Inc. - which "is a free software that can be used to enhance your eFax service. The software allows you to create and edit faxes, complete with text notes, highlights, and signatures"No
eFax DllCmd [version]UJ2GDllCmd.exeDLL Command Utility for eFax Messenger from j2 Global Communications, Inc. - which "is a free software that can be used to enhance your eFax service. The software allows you to create and edit faxes, complete with text notes, highlights, and signatures." Older versionNo
eFax Live Menu 3.3UJ2GDllCmd.exeDLL Command Utility for eFax Messenger from j2 Global Communications, Inc. - which "is a free software that can be used to enhance your eFax service. The software allows you to create and edit faxes, complete with text notes, highlights, and signatures." Older versionNo
eFax [version]UJ2GTray.exeSystem Tray access to eFax Messenger from j2 Global Communications, Inc. - which "is a free software that can be used to enhance your eFax service. The software allows you to create and edit faxes, complete with text notes, highlights, and signatures"No
eFax Tray Menu [version]UJ2GTray.exeSystem Tray access to eFax Messenger from j2 Global Communications, Inc. - which "is a free software that can be used to enhance your eFax service. The software allows you to create and edit faxes, complete with text notes, highlights, and signatures." Older versionNo
SoccerInferno EPM SupportUj2medint.exeSoccerInferno toolbar - powered by the Ask Partner Network toolbars by IAC Applications (was Mindspark). Detected by Malwarebytes as PUP.Optional.MindSpark. The file is located in %ProgramFiles%\SoccerInferno_1w\bar\*.bin - where * represents a number or letter. If bundled with another installer or not installed by choice then remove itYes
SoccerInferno Search Scope MonitorUj2SrchMn.exeSoccerInferno toolbar - powered by the Ask Partner Network toolbars by IAC Applications (was Mindspark). Detected by Malwarebytes as PUP.Optional.MindSpark. The file is located in %ProgramFiles%\SoccerInferno_1w\bar\*.bin - where * represents a number or letter. If bundled with another installer or not installed by choice then remove itNo
jvsoftXj3ewro.exeDetected by Trend Micro as WORM_ONLINEG.AFU and by Malwarebytes as Spyware.OnlineGamesNo
A5118rXj6321422.exeDetected by Sophos as W32/Brontok-AKNo
J6nULNb348MKXJ6nULNb348MK.exeDetected by Malwarebytes as Trojan.Agent. The file is located in %Root%\J6nULNb348MKNo
ja3vaw.exeXja3vaw.exeDetected by Malwarebytes as Trojan.FakeMS. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows startsNo
UserinitXjabconf32.exeDetected by Dr.Web as Trojan.Siggen5.16078 and by Malwarebytes as Trojan.Agent. The file is located in %AppData%No
UserinitXjabconf32.exeDetected by Dr.Web as Trojan.Inject1.27973 and by Malwarebytes as Trojan.Agent. The file is located in %AppData%\IdentitiesNo
UserinitXjabconf32.exeDetected by Malwarebytes as Trojan.Agent. The file is located in %System%\IdentitiesNo
JA Cfg Util v2Xjacfg2.exeDetected by Sophos as W32/Rbot-ALNo
HDSTORAGEXJacksparrow23.exeDetected by Intel Security/McAfee as RDN/Spybot.bfr!h and by Malwarebytes as Backdoor.Agent.SILNo
JackzXJackz.exeDetected by Intel Security/McAfee as RDN/Downloader.a!nn and by Malwarebytes as Backdoor.Messa.ENo
JavaXJadencidePasswordCracker.exeDetected by Intel Security/McAfee as RDN/Generic.bfr and by Malwarebytes as Backdoor.Agent.DCENo
jafatgortycxXjafatgortycx.exeDetected by Intel Security/McAfee as PWS-Zbot.gen.apy and by Malwarebytes as Trojan.Agent.US. The file is located in %UserProfile%No
[various names]XJAguAr.exeFake startup entry created by the Wareout rogue spyware and dialer remover - not recommended, removal instructions here. Archived version of Andrew Clover's original pageNo
Norton Personal FirewallXjah.exeAdded by a variant of Backdoor:Win32/Rbot. The file is located in %System%No
appdataXjakarta.exeDetected by Malwarebytes as Trojan.Agent.Gen. The file is located in %AppData%\MicrosoftNo
RegXJam0.exeDetected by Dr.Web as Trojan.MulDrop4.55547 and by Malwarebytes as Trojan.Agent.ENo
Casino RoyaleXjamesbond.exeDetected by Sophos as W32/Rbot-FZONo
JammerUjammer.exeJammer by Agnitum - "Jammer is the last word in Internet security. It combines a user-friendly interface with very sophisticated and powerful security measures that protect your Windows system while you are surfing the web"No
Jammer2ndXJammer2nd.exeAdded by the NETSKY.Z WORM!No
jancanxuafofXjancanxuafof.exeDetected by Intel Security/McAfee as RDN/Generic.dx!dgb and by Malwarebytes as Trojan.Agent.USNo
*JanisRuckenbrodIIXjanis.comDetected by Symantec as W32.PopsNo
rocasedXjannibouge.exeDetected by Malwarebytes as Trojan.MalPack. The file is located in %System%No
januopaclezjXjanuopaclezj.exeDetected by Intel Security/McAfee as RDN/Generic Dropper!vf and by Malwarebytes as Trojan.Agent.USNo
ADOBESYSTEMSXjar.exeDetected by Intel Security/McAfee as PWS-Zbot.gen.aru and by Malwarebytes as Backdoor.AgentNo
HKLMXjarc.exeDetected by Malwarebytes as Backdoor.HMCPol.Gen. The file is located in %Root%\directory\CyberGate\installNo
PoliciesXjarc.exeDetected by Malwarebytes as Backdoor.Agent.PGen. The file is located in %Root%\directory\CyberGate\installNo
HKCUXjarc.exeDetected by Malwarebytes as Backdoor.HMCPol.Gen. The file is located in %Root%\directory\CyberGate\installNo
JaRdYNuXJaRdYNu.exeDetected by Dr.Web as Trojan.Bankfraud.1655 and by Malwarebytes as Trojan.BankerNo
JavaUpdateSchedXjasched.exe.lnkDetected by Malwarebytes as Spyware.KeyLogger. The file is located in %AppData%\JavaUpdateNo
Java VM v6.9.2Xjav.batDetected by Sophos as Troj/DwnLdr-HLMNo
Java VM v6.91Xjav.batDetected by Sophos as Troj/DwnLdr-HLLNo
Java (VM) v6.9Xjav.batDetected by Sophos as Troj/Agent-GZKNo
HP UpdatesXJava App.exeDetected by Dr.Web as Trojan.DownLoader9.10865No
Java Oracle RuntimeXJava Oracle Runtime.exeDetected by Malwarebytes as Backdoor.SpyNet. The file is located in %AppData%\mscftmonNo
Microsoft Word ProfissionalXJava Plug In close.exeDetected by Sophos as Troj/Banker-ELNo
Java SE BinaryXJava SE Platform.exeDetected by Malwarebytes as Spyware.Imminent. The file is located in %AppData%\Java SE UpdaterNo
Java UpXJava Up.exeDetected by Malwarebytes as Trojan.Agent.JV. The file is located in %AppData%\Java OrgNo
Java update 2014.exeXJava update 2014.exeDetected by Malwarebytes as Backdoor.RemoteAdmin. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows startsNo
Java Update Check.vbsXJava Update Check.vbsDetected by Dr.Web as Trojan.Inject1.27557 and by Malwarebytes as Trojan.Agent. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows startsNo
java1XJava Update.exeDetected by Dr.Web as Trojan.DownLoader4.13619 and by Malwarebytes as Trojan.VBKryptNo
Java Runtime UpdateXJava Update.exeAdded by an unidentified VIRUS, WORM or TROJAN! See here. The file is located in %UserTemp%\IXP00[random digit].TMPNo
*java update.exeXjava update.exeDetected by Dr.Web as Trojan.PWS.Siggen.24776No
Java UpdateXJava Update.exeDetected by Dr.Web as Trojan.MulDrop3.37603. The file is located in %AppData%No
Java UpdateXJava Update.exeDetected by Intel Security/McAfee as Generic.dx and by Malwarebytes as Trojan.Agent. The file is located in %AppData%\L3G!T-Labs\jdvs\0.0.0.0No
Java UpdateXJava Update.exeDetected by Dr.Web as Trojan.BtcMine.215 and by Malwarebytes as Trojan.Agent.Gen. The file is located in %Temp%\Java(TM)No
java update.exeXjava update.exeDetected by Dr.Web as Trojan.PWS.Siggen.24776No
Java update.exeXJava update.exeDetected by Malwarebytes as Backdoor.Bladabindi. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows startsNo
Java v3.0XJava v3.0.exeDetected by Malwarebytes as Backdoor.XTRat. The file is located in %AppData%\Java v3.0No
Java(TM) PlatformXJava(TM) Platform.exeDetected by Dr.Web as Trojan.DownLoader5.11796 and by Malwarebytes as Trojan.MSILNo
PoliciesXJava(TM) 7u#.exeDetected by Malwarebytes as Backdoor.Agent.PGen - where # represents one or more digits. The file is located in %System%\OracleNo
GlassFishWorks Oracle™XJava(TM) 7u#.exeDetected by Malwarebytes as Backdoor.Agent.PGen - where # represents one or more digits. The file is located in %System%\OracleNo
JavaPush2.1XJava(TM) 7u#.exeDetected by Malwarebytes as Backdoor.Agent.PGen - where # represents one or more digits. The file is located in %System%\OracleNo
Java(TM) Plataform SE binaryXJava(TM) Plataform SE binary.exeDetected by Malwarebytes as Spyware.Imminent. The file is located in %LocalAppData%\JavaNo
Java(TM) Platform SEXJava(TM) Platform .exeDetected by Intel Security/McAfee as RDN/Generic.bfr and by Malwarebytes as Trojan.Agent.ENo
Java(TM) Platform SE binaryXJava(TM) Platform .exeDetected by Malwarebytes as Trojan.Agent.E. The file is located in %System%\MicrosoftNo
Java(TM) UpdateXJava(TM) Platform .exeDetected by Intel Security/McAfee as RDN/Generic.bfr and by Malwarebytes as Trojan.Agent.ENo
PoliciesXJava(TM) Platform .exeDetected by Intel Security/McAfee as RDN/Generic.bfr and by Malwarebytes as Backdoor.Agent.PGenNo
RWWKWYSITFRJXJava(TM) Platform SE 8.exeDetected by Intel Security/McAfee as RDN/Generic BackDoor!bbr and by Malwarebytes as Backdoor.Agent.ENo
Java(TM) Platform SE Auto Updater 2 0XJava(TM) Platform SE Auto Updater 2 0.exeDetected by Dr.Web as Trojan.AVKill.29302No
Java(TM) Platform SE Auto UpdaterXJava(TM) Platform SE Auto Updater.exeDetected by Intel Security/McAfee as RDN/Generic.tfr!dn and by Malwarebytes as Trojan.MSILNo
Java(TM) Runtime SE Auto UpdaterXJava(TM) Runtime SE Auto Updater.exeDetected by Malwarebytes as Trojan.MSIL. The file is located in %AppData%\AcrobatNo
Java(TM) Update SchedulerXJava(TM) Update Scheduler.exeDetected by Intel Security/McAfee as RDN/Generic DropperNo
Java(TM) Update Scheduler.exeXJava(TM) Update Scheduler.exeDetected by Dr.Web as WBackDoor.Bladabindi.2639 and by Malwarebytes as Trojan.Agent. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows startsNo
Java(TM)XJava(TM).exeDetected by Intel Security/McAfee as Generic BackDoor!1pd and by Malwarebytes as Trojan.BankerNo
Keygen.and.PatchXJava(TM).exeDetected by Malwarebytes as Trojan.Keygen.DL. The file is located in %UserTemp%No
Java(TM)Update.exeXJava(TM)Update.exeDetected by Sophos as Mal/VB-TSNo
Java**.exe [* = random char]XJava**.exe [* = random char]CoolWebSearch/HomeSearch adware - for examples, see this logNo
Java**32.exe [* = random char]XJava**32.exe [* = random char]CoolWebSearch/HomeSearch adware - for examples, see this logNo
HKLMddXjava-plugins.exeDetected by Malwarebytes as Trojan.Dropped.E. The file is located in %ProgramFiles%\java-plugsNo
HKCUddXjava-plugins.exeDetected by Malwarebytes as Trojan.Dropped.E. The file is located in %ProgramFiles%\java-plugsNo
PoliciesXjava-plugins.exeDetected by Malwarebytes as Backdoor.Agent.PGen. The file is located in %ProgramFiles%\java-plugsNo
Flash-pulginXJava-pulginDetected by Intel Security/McAfee as RDN/Ransom and by Malwarebytes as Backdoor.Agent.DCENo
JAVA RMI 100 SEXjava-rmi.exeDetected by Intel Security/McAfee as RDN/Generic.bfr!hs and by Malwarebytes as Trojan.Agent.MTANo
Sun MicroSystemXjava-update.exeDetected by Kaspersky as Trojan.Win32.Genome.lhki and by Malwarebytes as Trojan.Agent. The file is located in %System%No
JavaSoftXJava-updater.exeDetected by Malwarebytes as Trojan.Agent.JV. The file is located in %MyDocuments%\JavaNo
java updatexXJava.exeDetected by Malwarebytes as Trojan.Vbkrypt. The file is located in %Temp%\Java SunNo
NetWireXjava.exeDetected by Malwarebytes as Backdoor.Agent.E. The file is located in %AppData%\Install - see hereNo
loadXjava.exeDetected by Malwarebytes as Backdoor.NanoCore. Note - this entry modifies the legitimate HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows "load" value data to include the file "java.exe" (which is located in %MyDocuments%)No
javaupdatesXjava.exeDetected by Intel Security/McAfee as RDN/Generic BackDoor!g and by Malwarebytes as Backdoor.Agent.DCEGenNo
dmwXJava.exeDetected by Malwarebytes as Backdoor.Agent. The file is located in %AppData%\JavaNo
SunJavaUpdateSchedXjava.exeDetected by Intel Security/McAfee as RDN/Generic.bfr!ew and by Malwarebytes as Backdoor.BotNo
JavaVMXjava.exeDetected by Symantec as W32.Mydoom.M@mm and by Malwarebytes as Trojan.Downloader.JVNo
AVIRAXjava.exeDetected by Intel Security/McAfee as Generic BackDoor and by Malwarebytes as Backdoor.Agent.TJNo
Microsoft Synchronization ManagerXjava.exeAdded by a variant of W32/Sdbot.worm. The file is located in %System%No
WindowsXjava.exeDetected by Malwarebytes as Trojan.Agent.E. The file is located in %System%\PluguinNo
Reparo FacilXJava.exeDetected by Malwarebytes as Trojan.Injector. The file is located in %UserTemp%No
sunmicrosystemXjava.exeDetected by Intel Security/McAfee as RDN/Generic.bfr!fg and by Malwarebytes as Backdoor.Agent.DCENo
javaXjava.exeDetected by Malwarebytes as Trojan.Agent. The file is located in %AppData%No
javaXjava.exeDetected by Malwarebytes as Backdoor.Agent.DCEGen. The file is located in %AppData%\DCSCMINNo
JavaXJava.exeDetected by Malwarebytes as Backdoor.Agent.E. The file is located in %AppData%\InstallNo
JavaXJava.exeDetected by Intel Security/McAfee as RDN/Generic.bfr!bc and by Malwarebytes as Trojan.Backdoor. The file is located in %AppData%\JavaNo
javaXjava.exeDetected by Intel Security/McAfee as Generic PWS.y and by Malwarebytes as Backdoor.AgentNo
javaXjava.exeDetected by Malwarebytes as Spyware.Stealer. The file is located in %AppData%\MicrosoftNo
javaXjava.exeDetected by Malwarebytes as Backdoor.Agent.DCEGen. The file is located in %AppData%\MSDCSCNo
Java.exeXJava.exeDetected by Intel Security/McAfee as RDN/Generic Downloader.x!cy. Note - the file is located in %AllUsersStartup% and its presence there ensures it runs when Windows startsNo
javaXjava.exeDetected by Intel Security/McAfee as RDN/Generic BackDoor and by Malwarebytes as Backdoor.Agent.DCEGen. The file is located in %MyDocuments%\DCSCMINNo
Java.exeXJava.exeDetected by Malwarebytes as Backdoor.Agent.JVGen. The file is located in %AppData%No
javaXjava.exeDetected by Malwarebytes as Trojan.Agent. The file is located in %MyDocuments%\JavaNo
Java.exeXJava.exeDetected by Intel Security/McAfee as RDN/Generic.bfr!d and by Malwarebytes as Trojan.Agent. The file is located in %AppData%\JavaNo
EQaSzxSdXjava.exeDetected by Kaspersky as Trojan.Win32.Buzus.gxjr and by Malwarebytes as Backdoor.Bifrose. The file is located in %System%\javaNo
javaXjava.exeDetected by Malwarebytes as Backdoor.Agent.DCEGen. The file is located in %MyDocuments%\MSDCSCNo
java.exeXjava.exeDetected by Intel Security/McAfee as Generic.dx and by Malwarebytes as Backdoor.Agent.JVGen. The file is located in %AppData%\windowsNo
IDT PC AudioXjava.exeDetected by Dr.Web as Trojan.DownLoader3.45713 and by Malwarebytes as Trojan.AgentNo
JavaXJava.exeDetected by Trend Micro as TROJ_BANKER.BJG. The file is located in %Root%\Arquivos de programasNo
Java.exeXJava.exeDetected by Malwarebytes as Trojan.Agent. The file is located in %LocalAppData%No
JavaXJava.exeDetected by Malwarebytes as Trojan.Vbkrypt. The file is located in %Temp%\Java SunNo
Java.exeXJava.exeDetected by Malwarebytes as Trojan.Agent.AI. The file is located in %Root%No
javaXjava.exeDetected by Intel Security/McAfee as W32/Autorun.worm.bbp and by Malwarebytes as Backdoor.Bifrose. The file is located in %System%\javaNo
JAVA.exeXJAVA.exeDetected by Dr.Web as Trojan.DownLoader9.19833 and by Malwarebytes as Trojan.Agent.JVGenNo
Realtek AudioXjava.exeDetected by Malwarebytes as Backdoor.Agent.E. The file is located in %System%\MicrosoftNo
JavaXjava.exeDetected by Malwarebytes as Trojan.Agent.E. The file is located in %System%\PluguinNo
java.exeXjava.exeDetected by Dr.Web as Trojan.DownLoader9.19833 and by Malwarebytes as Trojan.Agent.AI. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows startsNo
JavaXJava.exeDetected by Intel Security/McAfee as RDN/Generic.bfr!ff and by Malwarebytes as Backdoor.Agent.E. The file is located in %System%\RestoreNo
javaXjava.exeDetected by Malwarebytes as Trojan.Backdoor. The file is located in %System%\wbemNo
JavaXJava.exeDetected by Sophos as Troj/Mdrop-EYP and by Malwarebytes as Trojan.Agent. The file is located in %Temp%No
JavaXJava.exeDetected by Sophos as Troj/Agent-ABLN and by Malwarebytes as Trojan.Agent.JVGen. The file is located in %Temp%\JavaNo
Microsoft SecurityXjava.exeDetected by Malwarebytes as Backdoor.Agent.E. The file is located in %System%\MicrosoftNo
Microsoft® Windows® Operating SystemXJava.exeDetected by Malwarebytes as Backdoor.Agent. The file is located in %UserTemp%No
PGUENNXJava.exeDetected by Intel Security/McAfee as RDN/Generic.dx!csk and by Malwarebytes as Trojan.Agent.JVNo
UpdateXjava.exeDetected by Malwarebytes as Trojan.Agent. The file is located in %UserTemp%No
WindowsUpdateXjava.exeDetected by Malwarebytes as Backdoor.Agent.DCEGen. The file is located in %UserTemp%\MSDCSC - see hereNo
HKLMXjava.exeDetected by Kaspersky as Trojan.Win32.Llac.soi and by Malwarebytes as Backdoor.Agent.PGen. The file is located in %ProgramFiles%\javaNo
HKLMXjava.exeDetected by Malwarebytes as Backdoor.HMCPol.Gen. The file is located in %System%\installNo
HKLMXJava.exeDetected by Malwarebytes as Backdoor.HMCPol.Gen. The file is located in %Windir%\GameNo
HKLMXjava.exeDetected by Intel Security/McAfee as Generic BackDoor!fqb and by Malwarebytes as Backdoor.HMCPol.Gen. The file is located in %Windir%\InstallDirNo
HKLMXjava.exeDetected by Malwarebytes as Backdoor.HMCPol.Gen. The file is located in %Windir%\javaNo
System Process HandlerXjava.exeDetected by Intel Security/McAfee as Generic.bfr and by Malwarebytes as Backdoor.MessaNo
hYlvfeXJava.exeDetected by Malwarebytes as Backdoor.Agent. The file is located in %AppData%\MicrosoftNo
PoliciesXjava.exeDetected by Kaspersky as Trojan.Win32.Llac.soi and by Malwarebytes as Backdoor.Agent.PGen. The file is located in %ProgramFiles%\javaNo
sysinfoXjava.exeDetected by Malwarebytes as Backdoor.Agent.FXT. The file is located in %Root%\DOCUME 1\[UserName]No
PoliciesXJava.exeDetected by Intel Security/McAfee as Generic.dx!bh3e and by Malwarebytes as Backdoor.Agent.PGen. The file is located in %ProgramFiles%\LargeNo
PoliciesXjava.exeDetected by Malwarebytes as Backdoor.Agent.PGen. The file is located in %Root%\javaNo
jioqze20v3aGnP9QXjava.exeDetected by Malwarebytes as Trojan.Agent.ED. The file is located in %AppData%\Dropbox\installerNo
PoliciesXjava.exeDetected by Malwarebytes as Backdoor.Agent.PGen. The file is located in %System%\installNo
PoliciesXjava.exeDetected by Kaspersky as Trojan.Win32.Buzus.gxjr and by Malwarebytes as Backdoor.Agent.PGen. The file is located in %System%\javaNo
startuoXJava.exeDetected by Malwarebytes as Backdoor.Agent. The file is located in %AppData%\JavaNo
PoliciesXJava.exeDetected by Malwarebytes as Backdoor.Agent.PGen. The file is located in %Windir%\GameNo
PoliciesXjava.exeDetected by Malwarebytes as Backdoor.Agent.PGen. The file is located in %Windir%\javaNo
Java (TM) PlatformXJava.exeDetected by Intel Security/McAfee as RDN/Generic.bfr!d and by Malwarebytes as Backdoor.AgentNo
Wnd32Xjava.exeDetected by Dr.Web as Trojan.DownLoader10.44202 and by Malwarebytes as Worm.AutoRun.WNGenNo
JAVACHEDXJava.exeDetected by Malwarebytes as Backdoor.Agent. The file is located in %AppData%\binNo
StartupXJava.exeDetected by Malwarebytes as Backdoor.Agent. The file is located in %AppData%\MicrosoftNo
Java Auto UpdaterXjava.exeDetected by Malwarebytes as Trojan.Agent.JV. The file is located in %CommonAppData%\JawaNo
winlogonXjava.exeDetected by Dr.Web as Trojan.DownLoader7.18358 and by Malwarebytes as Trojan.Agent.TraceNo
JAVAJDKXjava.exeDetected by Intel Security/McAfee as Generic.grp!s and by Malwarebytes as Backdoor.MessaNo
SkypeXjava.exeDetected by Malwarebytes as Backdoor.Agent.SK. The file is located in %ProgramFiles%\Java\jre[version]\binNo
JavaJDKXJava.exeDetected by Intel Security/McAfee as RDN/Generic.bfr and by Malwarebytes as Trojan.Agent.JVGenNo
Java Platform SE Auto UpdaterXjava.exeDetected by Malwarebytes as Backdoor.Agent.SK. The file is located in %ProgramFiles%\Java\jre[version]\binNo
svchost.exeXjava.exeDetected by Malwarebytes as Trojan.Agent. The file is located in %AppData%No
Windows DefenderXjava.exeDetected by Malwarebytes as Trojan.Agent.Gen. The file is located in %AppData%\Microsoft - see hereNo
fWqAdDsXXjava.exeDetected by Kaspersky as Trojan.Win32.Buzus.gxjr and by Malwarebytes as Backdoor.Bifrose. The file is located in %System%\javaNo
EXPLORERXjava.exeDetected by Intel Security/McAfee as Generic BackDoor and by Malwarebytes as Backdoor.Agent.TJNo
AVASTXXJava.exeDetected by Intel Security/McAfee as RDN/Generic.bfr!gr and by Malwarebytes as Backdoor.XTRat.ENo
MSQMXjava.exeDetected by Malwarebytes as Backdoor.Agent.E. The file is located in %System%\MicrosoftNo
HKCUXjava.exeDetected by Kaspersky as Trojan.Win32.Llac.soi and by Malwarebytes as Backdoor.Agent.PGen. The file is located in %ProgramFiles%\javaNo
HKCUXjava.exeDetected by Malwarebytes as Backdoor.HMCPol.Gen. The file is located in %System%\installNo
HKCUXJava.exeDetected by Malwarebytes as Backdoor.HMCPol.Gen. The file is located in %Windir%\GameNo
HKCUXjava.exeDetected by Intel Security/McAfee as Generic BackDoor!fqb and by Malwarebytes as Backdoor.HMCPol.Gen. The file is located in %Windir%\InstallDirNo
HKCUXjava.exeDetected by Malwarebytes as Backdoor.HMCPol.Gen. The file is located in %Windir%\javaNo
HKCMXJava.exeDetected by Intel Security/McAfee as Generic.dx!bh3e and by Malwarebytes as Backdoor.Agent.RgenNo
Java UpdateXJava.exeDetected by Dr.Web as Trojan.MulDrop2.48031No
icloudXjava.exeDetected by Intel Security/McAfee as Generic PWS.y and by Malwarebytes as Backdoor.AgentNo
JavaTMXJava.exeDetected by Malwarebytes as Trojan.Agent. The file is located in %MyDocuments%\JavaNo
npnpXjava.exeDetected by Malwarebytes as Trojan.Agent.CPL. The file is located in %AllUsersProfile%\Menu Iniciar\ProgramasNo
SEXEXjava.exeDetected by Intel Security/McAfee as Generic BackDoor and by Malwarebytes as Trojan.AgentNo
AssassanXJava.exeDetected by Intel Security/McAfee as RDN/Generic.bfr!ff and by Malwarebytes as Backdoor.Agent.ENo
explorer.exeXJava.exeDetected by Malwarebytes as Trojan.Agent. The file is located in %UserTemp%\JAVANo
appliesXjava.exeDetected by Malwarebytes as Backdoor.Agent.DCE. The file is located in %Temp%\applicatiesNo
users moodeXjava.exeDetected by Dr.Web as Trojan.DownLoad3.29872 and by Malwarebytes as Trojan.Agent.JVNo
Google ChromeXjava.exeDetected by Dr.Web as Trojan.DownLoader3.45713 and by Malwarebytes as Trojan.Agent. Note - this is not a legitimate Google Chrome browser entry and the file is located in %LocalAppData%No
svchostXJava.exeDetected by Malwarebytes as Backdoor.Bot.E. The file is located in %UserTemp%No
svchostXjava.exeDetected by Intel Security/McAfee as Generic.bfr!ek and by Malwarebytes as Trojan.AgentNo
Manager WindowXJava.exeDetected by Intel Security/McAfee as RDN/Generic Downloader.x!lg and by Malwarebytes as Trojan.Agent.MWGenNo
Microsoft StartXJava.exeDetected by Intel Security/McAfee as RDN/Generic.bfr and by Malwarebytes as Trojan.AgentNo
ShellXJava.exe,explorer.exeDetected by Malwarebytes as Hijack.ShellA.Gen. Note - this entry adds an illegal HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon "Shell" entry. The value data points to "explorer.exe" (which is a legitimate file located in %Windir% and shouldn't be deleted) and "Java.exe" (which is located in %UserTemp%\JAVA)No
java.scrXjava.scrDetected by Dr.Web as Trojan.DownLoader9.54297 and by Malwarebytes as Trojan.Agent. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows startsNo
Windows Service AjavXjava128.exeAdded by a variant of Backdoor:Win32/Rbot. The file is located in %System%No
Java_UpdateXJava2.exeDetected by Dr.Web as Trojan.DownLoader9.47899No
Java_UpdateXJava2.exeDetected by Dr.Web as Trojan.DownLoader11.6509 and by Malwarebytes as Backdoor.Agent.JVNo
WinUpd32Xjava2.exeDetected by Malwarebytes as Trojan.Agent.OT. The file is located in %Appdata%No
JufualtXjava2.exeDetected by Trend Micro as WORM_SDBOT.AOE and by Malwarebytes as Backdoor.BotNo
Java SofteXJava32.comAdded by a variant of Backdoor:Win32/Rbot. The file is located in %System%No
WinJavaXjava32.cplDetected by Malwarebytes as Trojan.Banker.JV. The file is located in %UserRoot%\Commonfiles - see hereNo
java32Xjava32.exeDetected by Intel Security/McAfee as RDN/Generic BackDoor!xl and by Malwarebytes as Backdoor.Agent.JVGenNo
WindowshelpXjava32.exeDetected by Kaspersky as Worm.Win32.Bybz.dbk. The file is located in %AppData%No
MicroSun JavaXjava32.exeDetected by Trend Micro as WORM_RBOT.BRXNo
Java64XJava64.exeDetected by Intel Security/McAfee as RDN/Generic BackDoor and by Malwarebytes as Backdoor.Agent.JVGenNo
javaaXjavaa.exeDetected by Malwarebytes as Trojan.FakeJava. The file is located in %AppData%\usercache - see hereNo
JavaApplicationtKitXJavaAK.exeDetected by Malwarebytes as Trojan.AutoIt. The file is located in %AppData%\JavaAKNo
WinDefenderXJavaApp.exeDetected by Dr.Web as Trojan.MulDrop3.6236 and by Malwarebytes as Trojan.Agent.GenNo
JavaAppletXJavaApplet.exeDetected by ESET as Win32/Qhost.OWY. The file is located in %AppData% - see hereNo
JavaAppletXJavaApplet.exeDetected by Malwarebytes as Backdoor.Agent.JV. The file is located in %FilePath%\JavaAppletNo
JavaAppletXJavaApplet.exeDetected by Dr.Web as Trojan.Korwap.314. The file is located in %Windir%No
MS Java Applets for Windows NT & XPXjavaapplet.exeDetected by Sophos as W32/Vanebot-BNo
MS Java Applets for Windows NT, ME & XPXjavaapplets.exeDetected by Symantec as W32.Randex.GELNo
javabackupXjavabackup.exeDetected by Malwarebytes as Trojan.FakeJAVA. The file is located in %CommonFiles%No
javacXjavac.exeDetected by Malwarebytes as Trojan.Winlock. The file is located in %AppData%\javacNo
javac.exeXjavac.exeDetected by Malwarebytes as Trojan.Winlock. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows startsNo
JavaCheckXJavaC.exeDetected by Dr.Web as Trojan.DownLoader9.65. The file is located in %AppData%\JavaCheckNo
JavaCheckXjavac.exeDetected by Intel Security/McAfee as Generic Downloader.x!gf3. The file is located in %System%No
JavainstXJavac.exeDetected by Malwarebytes as Backdoor.Messa.E. The file is located in %AppData%No
JavaCheckXJavaCheck.exeDetected by Malwarebytes as Trojan.MSIL. The file is located in %UserTemp%\JavaCheckNo
Sun Microsystems, Inc. S.AXjavacheck.exeAdded by a variant of PWS-Banker!hc3. The file is located in %AppData%\Microsoft\Windows\Start Menu\Programs (10/8/7/Vista) or %UserProfile%\Start Menu\Programs (XP)No
Sun Microsystems, Inc. S.AXjavacheck.exeDetected by Intel Security/McAfee as PWS-Banker!hc3 and by Malwarebytes as Trojan.Banker. The file is located in %UserProfile%\AppData\LocalFilesNo
javacheckerXjavachecker.exeDetected by Malwarebytes as Trojan.MSIL.DJ. Note - this entry loads from the Windows Startup folder and the file is located in %UserTemp%No
javachecker.lnkXjavachecker.exeDetected by Malwarebytes as Trojan.MSIL.DJ. Note - this entry loads from HKCU\Run and the file is located in %UserTemp%No
[random]Ujavaclient32.exeDetected by Malwarebytes as PUP.Optional.JavaUpdate. The file is located in %ProgramFiles%\Java Update. If bundled with another installer or not installed by choice then remove it. Also detected by Microsoft as Trojan:Win32/Tivmonk.BNo
Windows Client ManagerUjavaclient32.exeDetected by Malwarebytes as PUP.Optional.JavaUpdater. The file is located in %ProgramFiles%\Java Update. If bundled with another installer or not installed by choice then remove itNo
JavaCoreXJavaCore.exeDetected by Intel Security/McAfee as Matcash and by Malwarebytes as Trojan.Downloader. The file is located in %ProgramFiles%\JavaCoreNo
Windows DefenderXjavacp.exeDetected by Sophos as Troj/VB-FLZ and by Malwarebytes as Trojan.Agent.GenNo
SunUpdaterXjavacpl.exeDetected by Intel Security/McAfee as Spy-Agent.bwNo
JavaCPLXJavaCPL.exeDetected by Intel Security/McAfee as RDN/Generic BackDoor and by Malwarebytes as Backdoor.Agent.DCENo
Sun Java Updater v4Xjavacpl.exeDetected by Kaspersky as Worm.Win32.AutoRun.eve and by Malwarebytes as Trojan.Agent. The file is located in %System%No
SunJavaUpdateSched v3.5Xjavacq.exeDetected by Sophos as W32/Prolaco-A and by Malwarebytes as Trojan.AgentNo
JavaDXJavaD.exeDetected by Dr.Web as Trojan.Siggen4.20010No
javadd155Xjavadd155.exeDetected by Dr.Web as Trojan.Winlock.11437 and by Malwarebytes as Trojan.Agent.WNLNo
JavaDllXJavaDll.exeDetected by Intel Security/McAfee as RDN/Generic.dx!dhw and by Malwarebytes as Trojan.Agent.JVNo
SamLogic VI 2012Xjavadoc.exeDetected by Intel Security/McAfee as Generic and by Malwarebytes as Backdoor.IRCBot.SMGenNo
JavaEVMupdateXJavaEVMupdate.exeDetected by Intel Security/McAfee as RDN/Generic BackDoor!ua and by Malwarebytes as Backdoor.Agent.DCENo
JavaUpdateXJavaEVMupdate.exeDetected by Intel Security/McAfee as RDN/Generic.bfr!fc and by Malwarebytes as Backdoor.Agent.DCENo
elegidoXjavaextension.exeDetected by Malwarebytes as Backdoor.Agent.ZPT. The file is located in %AppData% - see hereNo
Microsoft System ServiceXjavaflash.exeDetected by Intel Security/McAfee as W32/Sality.gen and by Malwarebytes as Backdoor.BotNo
javafutxubyqXjavafutxubyq.exeDetected by Intel Security/McAfee as RDN/Generic.dx!cmf and by Malwarebytes as Trojan.Agent.USNo
Java Sun SystemsXjavaguncelleme.exeDetected by Intel Security/McAfee as RDN/Downloader.a!pd and by Malwarebytes as Trojan.Agent.MNFNo
javahelper.exeXjavahelper.exeDetected by Intel Security/McAfee as W32/Induc!noNo
unirent javaXjavahenji.exeDetected by Intel Security/McAfee as RDN/Generic.dx and by Malwarebytes as Trojan.Agent.JVSNo
javahlXjavahl.exeDetected by Trend Micro as TROJ_BNLOAD.SMI and by Malwarebytes as Trojan.Banker. The file is located in %Root%\CommonFilesNo
javahlXjavahl.exeDetected by Trend Micro as TROJ_DLOADE.SMIA and by Malwarebytes as Trojan.Banker. The file is located in %Root%\pathNo
javahrXjavahr.exeDetected by Trend Micro as TROJ_BNLOAD.SMI and by Malwarebytes as Trojan.Banker. The file is located in %Root%\CommonFilesNo
javahrXjavahr.exeDetected by Trend Micro as TROJ_DLOADE.SMIA and by Malwarebytes as Trojan.Banker. The file is located in %Root%\pathNo
javahr2Xjavahr2.exeDetected by Trend Micro as TROJ_BNLOAD.SMI and by Malwarebytes as Trojan.Banker. The file is located in %Root%\CommonFilesNo
javahr2Xjavahr2.exeDetected by Trend Micro as TROJ_DLOADE.SMIA and by Malwarebytes as Trojan.Banker. The file is located in %Root%\pathNo
javaingXjavaing.exeDetected by Intel Security/McAfee as RDN/Generic.bfr!fs and by Malwarebytes as Backdoor.Agent.SBMNo
xc80853N29246Xjavaingsloads.exeDetected by Malwarebytes as Trojan.FakeJava. The file is located in %UserProfile%\fq91855Q61425 - see hereNo
JavaXjavains.exeDetected by Dr.Web as Trojan.DownLoader4.35867 and by Malwarebytes as Trojan.Agent.JVGenNo
JavaXjavainstall.exeDetected by Malwarebytes as Trojan.MSIL. The file is located in %AppData%\[folder] - see an example hereNo
Java Update ManagerXJavaj.exeDetected by Dr.Web as Trojan.FakeAV.17702 and by Malwarebytes as Trojan.Agent.JVGenNo
SunJavaUpdaterv12Xjavajar.exeDetected by Sophos as Mal/VBInject-D and by Malwarebytes as Trojan.AgentNo
PoliciesXJavajdk.exeDetected by Intel Security/McAfee as Generic BackDoor.bfr and by Malwarebytes as Backdoor.Agent.PGenNo
Javajdk.exeXJavajdk.exeDetected by Intel Security/McAfee as Generic BackDoor.bfr and by Malwarebytes as Backdoor.AgentNo
Java UpdaterXjavajdk.exeDetected by Malwarebytes as Trojan.FakeJava. The file is located in %UserTemp%No
Sun Java Updater v5Xjavajre.exeDetected by Sophos as W32/Autorun-XI and by Malwarebytes as Trojan.AgentNo
HKLMXjavajw.exeDetected by Malwarebytes as Backdoor.HMCPol.Gen. The file is located in %AppData%\javaNo
HKCUXjavajw.exeDetected by Malwarebytes as Backdoor.HMCPol.Gen. The file is located in %AppData%\javaNo
qXf72CXjaval0aders.exeDetected by Malwarebytes as Spyware.Zbot.AI. The file is located in %UserProfile%\tDi45NNo
JavaLauncherXJavaLauncher.exeDetected by Malwarebytes as Trojan.Onlinegames. The file is located in %AppData%\JavaLauncherNo
SunJava Updater v7Xjavale.exeDetected by Symantec as W32.Ackantta.B@mmNo
SunJavaUpXJavaMachine.exeDetected by Intel Security/McAfee as W32/Autorun.worm.h and by Malwarebytes as Worm.AutoRunNo
Service MonitorXjavams32.exeDetected by Sophos as Troj/Delf-NKNo
Service MonitorXjavams64.exeDetected by Sophos as W32/Sdbot-AFONo
SunJavaUpdateSchedXjavamx.exeDetected by Sophos as W32/Sdbot-WINo
SunJavaUpdaterv14Xjavan.exeDetected by Intel Security/McAfee as W32/Routrobot.worm and by Malwarebytes as Trojan.AgentNo
MS Java for Windows XP & NTXjavanet.exeAdded by the VANEBOT-A WORM!No
IAVA UPDATESXjavanx.exeDetected by Intel Security/McAfee as RDN/Generic.dx and by Malwarebytes as Backdoor.Agent.JVNo
javanx.exeXjavanx.exeDetected by Intel Security/McAfee as RDN/Generic.dx and by Malwarebytes as Backdoor.Agent.JVGenNo
HKCUXjavap.exeDetected by Malwarebytes as Backdoor.IRCBot.Gen. The file is located in %System%\Oracle - see hereNo
javaplXjavaplDetected by Intel Security/McAfee as RDN/Generic PWS.y and by Malwarebytes as Backdoor.AgentNo
xxxjokerXjavaplugin.exeDetected by Malwarebytes as Backdoor.SpyNet. The file is located in %System%\Internet ExplorerNo
Java Oracle Web PluginXjavaplugin.exeDetected by Dr.Web as Trojan.DownLoader10.15072No
Sun Java Security PluginXjavaplugin.exeDetected by Intel Security/McAfee as RDN/Generic.tfr!r and by Malwarebytes as Trojan.AgentNo
SunJavaUpdateSchedZXjavapool.exeDetected by Malwarebytes as Trojan.Downloader. The file is located in %System%No
JavaXJavaq.exeDetected by Malwarebytes as Trojan.Agent.JVGen. The file is located in %AppData%\JavaNo
Java updateXjavaqs.exeDetected by Trend Micro as WORM_SWARLEY.A and by Malwarebytes as Trojan.Agent.GenNo
dmwXJavar.exeDetected by Malwarebytes as Trojan.Injector. The file is located in %AppData%\JavaNo
HKLMXjavar.exeDetected by Malwarebytes as Backdoor.HMCPol.Gen. The file is located in %System%\InstallDirNo
PoliciesXjavar.exeDetected by Malwarebytes as Backdoor.Agent.PGen. The file is located in %Root%\directory\CyberGate\installNo
startupXJavar.exeDetected by Malwarebytes as Trojan.Injector. The file is located in %AppData%\JavaNo
HKCUXjavar.exeDetected by Malwarebytes as Backdoor.HMCPol.Gen. The file is located in %System%\InstallDirNo
Windows RuntimeXjavar.jarDetected by Malwarebytes as Backdoor.Agent. The file is located in %UserProfile%No
SystemKeyXjavaRE.exeDetected by Dr.Web as Trojan.DownLoader10.31885 and by Malwarebytes as Trojan.Downloader.ENo
javaRE.exeXjavaRE.exeDetected by Dr.Web as Trojan.DownLoader10.31885 and by Malwarebytes as Trojan.Downloader.E. Note - the file is located in %AllUsersStartup% and %UserStartup% and its presence there ensures it runs when Windows startsNo
Java(Sys86)Xjavarec64.cplDetected by Malwarebytes as Trojan.Banker.JV. The file is located in %CommonAppData%\gldsysNo
JavaSystemXjavarec86.cplDetected by Malwarebytes as Trojan.Banker.JV. The file is located in %CommonAppData%\gldsysNo
EtrafficXJavaRun.exeRelated to TopMoxie adwareNo
Sun Java Updater v5.1Xjavarun.exeDetected by Trend Micro as WORM_PROLACO.C and by Malwarebytes as Trojan.AgentNo
windowXjavarunner.exeDetected by Malwarebytes as Trojan.Agent. The file is located in %AppData%\javasNo
javarunningXjavarunning.exeDetected by Malwarebytes as Trojan.Agent. The file is located in %AppData%\javasNo
JavaRuntimePEXJavaRunNW.exeDetected by Dr.Web as Trojan.PWS.Multi.1017No
JavaRuntimeXJavaRuntime.exeDetected by Malwarebytes as Trojan.Agent.JV. The file is located in %UserTemp%\JavaRuntimeNo
JavaRuntimeyXJavaRuntimey.scrDetected by Malwarebytes as Backdoor.Agent.DC. The file is located in %AppData%\System ConfigurationNo
Iava updatesXjavarupd.exeDetected by Malwarebytes as Backdoor.Agent.JVS. The file is located in %AppData%\java sun, see hereNo
javarupd.exeXjavarupd.exeDetected by Malwarebytes as Backdoor.Agent.JVS. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows starts, see hereNo
WindowsAppzXjavas.exeDetected by Malwarebytes as Backdoor.Bladabindi. The file is located in %AppData%\WindowsAppsNo
javawXjavas.exeDetected by Malwarebytes as Backdoor.Agent.JV. The file is located in %Windir%\javawsNo
javawsXjavas.exeDetected by Malwarebytes as Backdoor.Agent.JV. The file is located in %Windir%\javawsNo
Win32Xjavas.exeDetected by Malwarebytes as Backdoor.Agent.PGen. The file is located in %System%\JavasNo
PoliciesXjavas.exeDetected by Malwarebytes as Backdoor.Agent.PGen. The file is located in %System%\JavasNo
JavaUpdaterXJavaS.exeDetected by Malwarebytes as Backdoor.Agent. The file is located in %AppData%\MicrosoftNo
javasched.exeXjavasched.exeDetected by Malwarebytes as Backdoor.Agent. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows startsNo
Java UpdateXjavasclp.exeDetected by Malwarebytes as Trojan.Agent.JV. The file is located in %AppData%No
Javascript.exeXJavascript.exeDetected by Intel Security/McAfee as RDN/Generic Downloader.x!cy. Note - the file is located in %AllUsersStartup% and its presence there ensures it runs when Windows startsNo
java-pluginXjavasctp.exeAdded by the VB.AMX TROJAN!No
Java RunTime SDKXJavaSDK.exeDetected by ESET as Win32/VB.NYT and by Malwarebytes as Trojan.AgentNo
Java UpdaterXjavasdk.exeDetected by Malwarebytes as Trojan.FakeJava. The file is located in %UserTemp%No
Java(TM) Platform SE binaryXjavase.exeDetected by Malwarebytes as Trojan.Injector.JV. The file is located in %AppData%No
SunjavaXjavasmart.exeAdded by the AGENT.AHV TROJAN!No
scvhostXJavaSoft.exeDetected by Dr.Web as Trojan.DownLoader2.48558 and by Malwarebytes as Trojan.AgentNo
PoliciesXJavaSoft.exeDetected by Intel Security/McAfee as Generic.bfr and by Malwarebytes as Backdoor.AgentNo
JavaSoftXJavaSoft.exeDetected by Intel Security/McAfee as Generic.bfr and by Malwarebytes as Backdoor.Agent.PGenNo
javastateXjavastate.exeDetected by Intel Security/McAfee as RDN/Generic.dx!d2w and by Malwarebytes as Backdoor.Agent.ENo
Java sunXjavasun.exeDetected by Malwarebytes as Trojan.Banker.E. The file is located in %AppData%\JavaNo
javasunXjavasun.exeDetected by Malwarebytes as Backdoor.Agent. The file is located in %Root%\java sunNo
JavaSunXJavaSun.exeDetected by Intel Security/McAfee as Generic.bfr!cu. The file is located in %Windir%\WindupdtNo
JavaSvcXJavaSvc.exeDetected by Symantec as W32.Exploz.BNo
javasys.exeXjavasys.exeDetected by Malwarebytes as Trojan.Agent.STU. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows startsNo
javataskXjavatask.exeDetected by Malwarebytes as Trojan.Agent.JV. The file is located in %AppData%No
JavaTM0512XJavaTM0512.exeDetected by Intel Security/McAfee as RDN/Generic BackDoor and by Malwarebytes as Backdoor.Agent.DCNo
JavaTUpdateXJavaTUpdate.exeDetected by Intel Security/McAfee as RDN/Generic BackDoor!p and by Malwarebytes as Backdoor.Agent.DCNo
MicrosoftUpgradeXjavaup.exeDetected by Dr.Web as Trojan.DownLoader11.53799 and by Malwarebytes as Trojan.BankerNo
Java appletXjavaup.exeDetected by Sophos as W32/Sdbot-AERNo
SunJavaUpdateSchedXjavaupd.exeAdded by unidentified malware. The file is located in %Windir%No
Kaspersky Email SecurityXjavaupd.exeDetected by Trend Micro as WORM_SWARLEY.A and by Malwarebytes as Email.WormNo
javaupdateXjavaupd.exeDetected by Intel Security/McAfee as RDN/Generic.dxNo
loadXJavaUpdate.exeDetected by Malwarebytes as Backdoor.Messa. Note - this entry modifies the legitimate HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows "load" value data to include the file "JavaUpdate.exe" (which is located in %AppData%)No
SunJavaUpdateXJavaUpdate.exeDetected by Malwarebytes as Trojan.Agent. The file is located in %AppData%\MicrosoftNo
Java(TM) Platform SE 7 U45Xjavaupdate.exeDetected by Malwarebytes as Trojan.FakeJava. The file is located in %UserTemp%No
AdobeManagerXJavaUpdate.exeDetected by Malwarebytes as Trojan.Banker.JV. The file is located in %CommonAppData%\Microsoft\Windows\Start Menu\iSoftware32 (10/8/7/Vista) or %AllUsersProfile%\Start Menu\iSoftware32 (XP)No
JavaXJavaUpdate.exeDetected by Intel Security/McAfee as Generic BackDoor!dhoNo
Java_UpdateXJavaUpdate.exeDetected by Intel Security/McAfee as RDN/Generic.dx!v and by Malwarebytes as Backdoor.Messa.GenNo
ratXJavaUpdate.exeDetected by Malwarebytes as Backdoor.Agent.DCEGen. The file is located in %MyDocuments%\DCSCMINNo
my selfies Xjavaupdate.exeDetected by Dr.Web as Trojan.Inject1.47286 and by Malwarebytes as Trojan.Agent.E. Note that there is a space at the end of the "Startup Item" fieldNo
HKLMXjavaupdate.exeDetected by Malwarebytes as Backdoor.HMCPol.Gen. The file is located in %ProgramFiles%\JavaNo
HKLMXjavaupdate.exeDetected by Kaspersky as Trojan.Win32.Llac.bdm and by Malwarebytes as Backdoor.HMCPol.Gen. The file is located in %System%\microsoft\JavaNo
PoliciesXjavaupdate.exeDetected by Malwarebytes as Backdoor.Agent.PGen. The file is located in %ProgramFiles%\JavaNo
PoliciesXjavaupdate.exeDetected by Kaspersky as Trojan.Win32.Llac.bdm and by Malwarebytes as Backdoor.Agent.PGen. The file is located in %System%\microsoft\JavaNo
PoliciesXjavaupdate.exeDetected by Malwarebytes as Backdoor.Agent.PGen. The file is located in %Windir%\java updateNo
PoliciesXjavaupdate.exeDetected by Malwarebytes as Backdoor.Agent.PGen. The file is located in %Windir%\javaupdateNo
Windows DefenderXJavaUpdate.exeDetected by Dr.Web as Trojan.MulDrop3.57125 and by Malwarebytes as Trojan.Agent.GenNo
JavaRunXJavaUpdate.exeDetected by Malwarebytes as Trojan.Fynloski. The file is located in %System%\WindowsOldNo
bs_stealthXJavaUpdate.exeDetected by Malwarebytes as Backdoor.Agent.BSGen. The file is located in %AppData% - see hereNo
HKCUXjavaupdate.exeDetected by Malwarebytes as Backdoor.HMCPol.Gen. The file is located in %ProgramFiles%\JavaNo
HKCUXjavaupdate.exeDetected by Kaspersky as Trojan.Win32.Llac.bdm and by Malwarebytes as Backdoor.HMCPol.Gen. The file is located in %System%\microsoft\JavaNo
java updateXjavaupdate.exeDetected by Malwarebytes as Trojan.Agent.E. The file is located in %Windir%\java update - see hereNo
java updateXjavaupdate.exeDetected by Malwarebytes as Trojan.Agent.Gen. The file is located in %Windir%\javaupdateNo
Java Update 12.7XJavaUpdate.exeDetected by Malwarebytes as Backdoor.Messa. The file is located in %AppData%No
Java Update ApplicationXjavaupdate.exeDetected by Malwarebytes as Trojan.Agent. The file is located in %Windir%%\JavaNo
JavaUpdateXJavaUpdate.exeDetected by Malwarebytes as Trojan.Agent. The file is located in %AppData%No
Java Update ManagerXJavaUpdate.exeDetected by Sophos as Troj/Trackr-AM and by Malwarebytes as Trojan.Agent.JVGenNo
JavaUpdateXJavaUpdate.exeDetected by Intel Security/McAfee as RDN/Generic BackDoor!tt and by Malwarebytes as Trojan.Clicker.MSIL. The file is located in %LocalAppData%No
JavaUpdateXJavaUpdate.exeDetected by Malwarebytes as Trojan.Agent.DF. The file is located in %LocalAppData%\Glusternob - see hereNo
javaupdateXjavaupdate.exeDetected by Dr.Web as Trojan.Packed.24140 and by Malwarebytes as Trojan.Agent.APLGen. The file is located in %MyDocuments%\Windows\AppLocNo
JavaUpdateXJavaUpdate.exeDetected by Dr.Web as Trojan.DownLoader7.21953. The file is located in %System%\WindowsNo
JavaUpdateXJavaUpdate.exeDetected by Malwarebytes as Backdoor.Agent.DC. The file is located in %UserTemp% - see hereNo
GoogleXjavaupdate.exeDetected by Malwarebytes as Trojan.Agent. The file is located in %Windir%%\JavaNo
javaupdate.exeXjavaupdate.exeDetected by Dr.Web as Trojan.DownLoader6.10934 and by Malwarebytes as Trojan.Banker. The file is located in %Windir%No
Sun JavaXjavaupdate.exeDetected by Dr.Web as Trojan.AVKill.32644. The file is located in %Temp%No
FlashplayerXJavaupdate.exeDetected by Intel Security/McAfee as RDN/Generic.bfr!fs and by Malwarebytes as Backdoor.Agent.ENo
JavaUpdate.exeXJavaUpdate.exeDetected by Dr.Web as Trojan.DownLoader7.21953 and by Malwarebytes as Trojan.Banker. The file is located in %System%\WindowsNo
Sun JavaXjavaupdate.exeDetected by Intel Security/McAfee as Generic.dx!zkg and by Malwarebytes as Backdoor.Bifrose. The file is located in %Windir%No
JavaUpdate.exeXJavaUpdate.exeDetected by Intel Security/McAfee as Generic BackDoor!1fq and by Malwarebytes as Trojan.Banker. The file is located in %Temp%\JavaNo
javaupdate.exeXjavaupdate.exeDetected by Malwarebytes as Trojan.Banker. The file is located in %UserTemp%No
Flashplayer1XJavaupdate.exeDetected by Intel Security/McAfee as RDN/Generic.bfr!fs and by Malwarebytes as Backdoor.Agent.ENo
JavaUpdate.exeXJavaUpdate.exeDetected by Dr.Web as Trojan.Siggen5.49583 and by Malwarebytes as Trojan.Banker. The file is located in %Windir%No
Java UpdaterXjavaupdate.exeDetected by Malwarebytes as Backdoor.Agent.DC. The file is located in %AppData%\JavaUpdaterNo
JavaupdaterXJavaupdate.exeDetected by Kaspersky as Backdoor.Win32.BotNet.n. The file is located in %Root%\JavaNo
JavaupdaterXJavaupdate.exeDetected by Intel Security/McAfee as Ransom!dz and by Malwarebytes as Backdoor.Agent.DC. The file is located in %Root%\WindupdtNo
Java Update CheckerXJavaUpdate.jarAdded by the INCRAT HACKTOOL!No
javaupdate7Xjavaupdate7.exeDetected by Malwarebytes as Trojan.Banker.JVGen. The file is located in %AppData%\OrionNo
MicroUpdateXJavaupdated.exeDetected by Intel Security/McAfee as Generic BackDoor.xa and by Malwarebytes as Backdoor.Agent.DCGen. The file is located in %CommonAppData%\Microsoft\Windows\Start Menu\JavaCA (10/8/7/Vista) or %AllUsersProfile%\Start Menu\JavaCA (XP)No
JavaUpdater.exeXjavaupdater.exeDetected by Intel Security/McAfee as RDN/Generic PUP.x and by Malwarebytes as Backdoor.Agent.JVGen. The file is located in %AppData%No
JavaUpdater.exeXJavaUpdater.exeDetected by Intel Security/McAfee as W32/Induc. The file is located in %System%No
javaupdater.exeXjavaupdater.exeDetected by Malwarebytes as Trojan.Agent.MSIL. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows startsNo
loadXJavaUpdater.exeDetected by Malwarebytes as Trojan.Agent. Note - this entry modifies the legitimate HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows "load" value data to include the file "JavaUpdater.exe" which is located in %UserTemp%No
SunJavaUpdateCtrlXjavaupdater.exeDetected by Malwarebytes as Trojan.Agent.MSIL. The file is located in %AppData%\Sun\Java\Java UpdateNo
SunJavaUpdaterv13Xjavaupdater.exeDetected by Kaspersky as Trojan.Win32.Inject.angt and by Malwarebytes as Trojan.Agent. The file is located in %System%No
java.exeXjavaupdater.exeDetected by Malwarebytes as Trojan.Agent.JVGen. The file is located in %AppData%No
IE Per-User Initialization utilityXJavaUpdater.exeDetected by Malwarebytes as Backdoor.Agent.Gen. The file is located in %MyDocuments%No
JavaUpdateXJavaUpdater.exeDetected by Malwarebytes as Backdoor.Agent.JV. The file is located in %CommonAppData%No
JavaUpdateXJavaUpdater.exeDetected by Malwarebytes as Backdoor.Agent.JV. The file is located in %MyDocuments%No
JavaUpdaterXJavaupdater.exeDetected by Malwarebytes as Trojan.Agent.E. The file is located in %AppData%\JAVAUPNo
IE Per-User Initialization utilityXJavaUpdaters.exeDetected by Malwarebytes as Backdoor.Agent.Gen. The file is located in %UserTemp% - see hereNo
ORACLE INCXjavaupdaterx32.exeDetected by Malwarebytes as Backdoor.Agent.DC. The file is located in %System%No
JavaUpdateSchedulerXJavaUpdateScheduler.exeDetected by Intel Security/McAfee as Generic.dx and by Malwarebytes as Trojan.Agent.JVSNo
javaupdatorXjavaupdt.exeDetected by Dr.Web as Trojan.PWS.Panda.3751 and by Malwarebytes as Trojan.Agent.APLGenNo
Java UpdtrXJavaUpdtr.exeDetected by Malwarebytes as Trojan.Agent.JV. The file is located in %AppData%\JavaNo
loadXJavaUpdtr.exeDetected by Intel Security/McAfee as RDN/Generic.bfr and by Malwarebytes as Backdoor.Agent.E. Note - this entry modifies the legitimate HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows "load" value data to include the file "JavaUpdtr.exe" (which is located in %AppData%)No
loadXJavaUpdtr.exeDetected by Sophos as Troj/MSILDrop-C and by Malwarebytes as Backdoor.Agent.E. Note - this entry modifies the legitimate HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows "load" value data to include the file "JavaUpdtr.exe" (which is located in %AppData%\Java)No
loadXJavaUpdtr.exeDetected by Intel Security/McAfee as RDN/Generic.dx!dgs and by Malwarebytes as Backdoor.Agent.E. Note - this entry modifies the legitimate HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows "load" value data to include the file "JavaUpdtr.exe" (which is located in %UserTemp%\Java)No
Java(TM) UpdaterXjavaupdx.exeDetected by Dr.Web as Trojan.Siggen3.55635No
JavaUploaderXJavaUploader.exeDetected by Sophos as Troj/DotNet-G and by Malwarebytes as Backdoor.Bot. The file is located in %AppData%\JavaUploaderNo
JavaUploaderXJavaUploader.exeDetected by Intel Security/McAfee as RDN/Generic.bfr!gm and by Malwarebytes as Backdoor.Messa.E. The file is located in %AppData%\JavaUploderNo
JavaXJavav.exeDetected by Malwarebytes as Trojan.Agent.JVGen. The file is located in %ProgramFiles%\Java\re6\binNo
PoliciesXJavav.exeDetected by Malwarebytes as Backdoor.Agent.PGen. The file is located in %ProgramFiles%\Java\re6\binNo
javavmXjavavm.exeDetected by Intel Security/McAfee as PWS-Zbot.gen.aru and by Malwarebytes as Trojan.Downloader.JVNo
Microsoft Java Virtual MachineXjavavm.exeAdded by a variant of Backdoor:Win32/Rbot. The file is located in %System%No
MS Java virtual machineXjavavm.exeDetected by Trend Micro as WORM_RBOT.ABGNo
JavaVmw.exeXJavaVmw.exeDetected by Kaspersky as Trojan.Win32.Buzus.czfz and by Malwarebytes as Backdoor.Agent. The file is located in %System%\WinVmwNo
WebSavingsFromEbatesXjavaw [path to code]Ebates "Web Savings" adware - detected by Symantec as Adware.TopMoxieNo
Java Virtual MachineXjavaw.exeAdded by a variant of Backdoor:Win32/Rbot. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name located in %ProgramFiles%\java\jre[version]\bin which is used to view Java applications. This one is located in %System%No
SunJavaUpdaterXjavaw.exeAdded by the MYTOB.QR WORM! Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name located in %ProgramFiles%\java\jre[version]\bin which is used to view Java applications. This one is located in %System%No
SunJavaUpdater v2Xjavaw.exeAdded by the AGENT.AEFE TROJAN! Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name located in %ProgramFiles%\java\jre[version]\bin which is used to view Java applications. This one is located in %System%No
javawXjavaw.exeDetected by Intel Security/McAfee as Generic Dropper and by Malwarebytes as Backdoor.Messa. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name located in %ProgramFiles%\java\jre[version]\bin which is used to view Java applications. This one is located in %AppData%No
javawXjavaw.exeDetected by Kaspersky as Trojan-Banker.Win32.Banker.sjyc and by Malwarebytes as Trojan.Agent.I. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name located in %ProgramFiles%\java\jre[version]\bin which is used to view Java applications. This one is located in %AppData%\javawNo
javawXjavaw.exeDetected by Sophos as Mal/MSIL-HW and by Malwarebytes as Trojan.Agent. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name located in %ProgramFiles%\java\jre[version]\bin which is used to view Java applications. This one is located in %AppData%\MicrosoftNo
javaw.exeXjavaw.exeDetected by Kaspersky as Worm.Win32.Bybz.apr and by Malwarebytes as Trojan.Agent. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name located in %ProgramFiles%\java\jre[version]\bin which is used to view Java applications. This one is located in %AppData%\MicrosoftNo
javaw.exeXjavaw.exeDetected by Dr.Web as Trojan.Siggen3.62707 and by Malwarebytes as Trojan.Agent.E. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name located in %ProgramFiles%\java\jre[version]\bin which is used to view Java applications. This one is located in %UserStartup% and its presence there ensures it runs when Windows startsNo
Java(TM) UpdaterXjavaw.exeDetected by Dr.Web as Trojan.Siggen5.2149. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name located in %ProgramFiles%\java\jre[version]\bin which is used to view Java applications. This one is located in %AppData%No
AUDIODXXjavaw.exeDetected by Intel Security/McAfee as RDN/Generic.grp!gv and by Malwarebytes as Backdoor.Messa.E. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name located in %ProgramFiles%\java\jre[version]\bin which is used to view Java applications. This one is located in %AppData%\comNo
commandXjavaw.exeDetected by Sophos as W32/Agobot-LG. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name located in %ProgramFiles%\java\jre[version]\bin which is used to view Java applications. This one is located in %System%No
Intel(R) Common UserXjavaw.exeDetected by Malwarebytes as Backdoor.Agent.Gen. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name located in %ProgramFiles%\java\jre[version]\bin which is used to view Java applications. This one is located in %Windir%\installNo
JavaXjavaw.exeDetected by Malwarebytes as Trojan.Agent.Gen. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name located in %ProgramFiles%\java\jre[version]\bin which is used to view Java applications. This one is located in %AppData%No
javaXjavaw.exeDetected by Malwarebytes as Backdoor.Agent.E. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name located in %ProgramFiles%\java\jre[version]\bin which is used to view Java applications. This one is located in %Windir%No
IE Per-User Initialization utilityXJavaw.exeDetected by Malwarebytes as Backdoor.Agent.Gen. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name located in %ProgramFiles%\java\jre[version]\bin which is used to view Java applications. This one is located in %LocalAppData%No
ShellXjavaw.exeDetected by Malwarebytes as Trojan.Agent.MTA. Note - this entry adds an illegal HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon "Shell" entry. The value data points to "javaw.exe" (which is located in %AppData%\FolderName and is not the legitimate Oracle (was Sun Microsystems) file of the same name located in %ProgramFiles%\java\jre[version]\bin which is used to view Java applications)No
ShellXjavaw.exeDetected by Dr.Web as Trojan.Siggen6.26392 and by Malwarebytes as Trojan.Agent.JV. Note - this entry adds an illegal HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon "Shell" entry. The value data points to "javaw.exe" (which is located in %Temp%\Windows Task Manager and is not the legitimate Oracle (was Sun Microsystems) file of the same name located in %ProgramFiles%\java\jre[version]\bin)No
PoliciesXjavaw.exeDetected by Malwarebytes as Backdoor.Agent.Gen. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name located in %ProgramFiles%\java\jre[version]\bin which is used to view Java applications. This one is located in %Windir%\installNo
Java auto-updaterXjavaw.exeDetected by Sophos as Troj/Agent-RUT and by Malwarebytes as Trojan.FakeJava. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name located in %ProgramFiles%\java\jre[version]\bin which is used to view Java applications. This one is located in %AppData%No
winlogonXJavaw.exeDetected by Malwarebytes as Trojan.Agent.Trace. The file is located in %UserTemp%No
54tgbrfv73uejdmc8ikws,x92owlsXjavaw.exeDetected by Kaspersky as Trojan.Win32.VBKrypt.cngj and by Malwarebytes as Password.Stealer. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name located in %ProgramFiles%\java\jre[version]\bin which is used to view Java applications. This one is located in %AppData%\javawNo
Windows DefenderXjavaw.exeDetected by Malwarebytes as Trojan.Agent.Gen. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name located in %ProgramFiles%\java\jre[version]\bin which is used to view Java applications. This one is located in %AppData%No
MicrosoftCorpXjavaw.exeDetected by Kaspersky as Trojan.Win32.Buzus.bulo and by Malwarebytes as Trojan.Agent.MSGen. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name located in %ProgramFiles%\java\jre[version]\bin which is used to view Java applications. This one is located in %System%No
Windows NT ServiceXjavaw.exeDetected by Symantec as Trojan.Backoff and by Malwarebytes as Trojan.Agent.BOGenNo
AdobeXJavaw.exeDetected by Intel Security/McAfee as RDN/Generic.bfr!go and by Malwarebytes as Backdoor.Agent.DCE. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name located in %ProgramFiles%\java\jre[version]\bin which is used to view Java applications. This one is located in %Temp%\JavaNo
Windows StartupXjavaw.exeDetected by Malwarebytes as Trojan.Dropper. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name located in %ProgramFiles%\java\jre[version]\bin which is used to view Java applications. This one is located in %AppData%No
MicrosoftNAPCXjavaw.exeDetected by Kaspersky as Trojan.Win32.Buzus.bulo and by Malwarebytes as Backdoor.Bot. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name located in %ProgramFiles%\java\jre[version]\bin which is used to view Java applications. This one is located in %System%No
Java UpdaterXjavaw.exeDetected by Dr.Web as Trojan.Siggen6.18009 and by Malwarebytes as Trojan.AgentNo
svchostXjavaw.exeDetected by Malwarebytes as Backdoor.Bot.E. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name located in %ProgramFiles%\java\jre[version]\bin which is used to view Java applications. This one is located in %AppData%\javawNo
FileXjavaw.exe -jar [path] File.jarDetected by Malwarebytes as Trojan.Agent.JV. Note - this entry uses the legitimate Oracle (was Sun Microsystems) "javaw.exe" file (located in %ProgramFiles%\java\jre[version]\bin) to load the file "File.jar" from %AppData% - see an example hereNo
WinFirewallXjavaw.exe -jar [path] servctl.jarDetected by Symantec as Backdoor.Opsiness. Note - this entry uses the legitimate Oracle (was Sun Microsystems) "javaw.exe" file (located in %ProgramFiles%\java\jre[version]\bin) to load the file "servctl.jar" from %AppData%No
WindowsXjavaw.exe -jar [path] Svchost.exe.jarDetected by Malwarebytes as Trojan.Agent. Note - this entry uses the legitimate Oracle (was Sun Microsystems) "javaw.exe" file (located in %ProgramFiles%\java\jre[version]\bin) to load the file "Svchost.exe.jar" from %AppData%\System32No
javaw.exe.exeXjavaw.exe.exeDetected by Dr.Web as Trojan.Siggen3.37155 and by Malwarebytes as Trojan.AgentNo
Java UpdateXjavaw.exe.exeDetected by Trend Micro as BKDR_ANDROM.YUYBS and by Malwarebytes as Trojan.Agent.GenNo
Java(INCx86)Xjavaw64.cplDetected by Intel Security/McAfee as RDN/Generic.tfr!dw and by Malwarebytes as Trojan.Banker.JVNo
javaaXjavawa.exeDetected by Intel Security/McAfee as RDN/Generic.dx!dg3 and by Malwarebytes as Backdoor.Agent.DFTNo
JavawiXJavawe.exeDetected by Dr.Web as Trojan.Inject.38871 and by Malwarebytes as Backdoor.AgentNo
javawisx.exeXjavawisx.exeDetected by Intel Security/McAfee as Generic Downloader.x!gay and by Malwarebytes as Trojan.BankerNo
Sun Java Updater v7.7Xjavawm.exeDetected by Malwarebytes as Trojan.Agent. The file is located in %System%No
Java Web Start LauncherXjavaws.exeDetected by Intel Security/McAfee as RDN/Generic Dropper and by Malwarebytes as Backdoor.IRCBot.JVNo
javasunXjavaws.exeDetected by Intel Security/McAfee as RDN/Generic Dropper!qx and by Malwarebytes as Backdoor.IRCBot.JVNo
javawsa.exeXjavawsa.exeDetected by Sophos as Troj/Bank-YNo
JavaStartKitXJavaWSK.exeDetected by Malwarebytes as Trojan.Agent. The file is located in %AppData%\JavaWebSKNo
Cisco Systems VPN clientXjavawss.exeDetected by Intel Security/McAfee as W32/Routrobot.wormNo
Javawx UpdateXJavawx.exeDetected by Malwarebytes as Worm.Rebhip. The file is located in %AppData%\Java sunsNo
PoliciesXJavawx.exeDetected by Malwarebytes as Backdoor.Agent.PGen. The file is located in %AppData%\Java sunNo
Java sunXJavawx.exeDetected by Malwarebytes as Trojan.Dropper. The file is located in %AppData%\Java sunNo
Sun Java Updater v7.4Xjavawx.exeDetected by Symantec as W32.Ackantta.B@mm and by Malwarebytes as Trojan.AgentNo
microsoftXjavax.exeDetected by Intel Security/McAfee as RDN/Generic.bfr!hw and by Malwarebytes as Trojan.Agent.MSGenNo
Java X Run ClassXjavax.exeDetected by Malwarebytes as Trojan.Agent. The file is located in %Temp%No
loadXjavax.exeDetected by Malwarebytes as Trojan.Injector. Note - this entry modifies the legitimate HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows "load" value data to include the file "javax.exe" (which is located in %AppData%\Configs)No
JavaXjavax.exeDetected by Dr.Web as Trojan.DownLoader8.39565 and by Malwarebytes as Trojan.BankerNo
geforceXjavax.exeDetected by Dr.Web as Trojan.Inject1.51138 and by Malwarebytes as Trojan.Agent.GFJNo
java sunsXjavaxr.exeDetected by Malwarebytes as Backdoor.Agent. The file is located in %AppData%\Java sunNo
Java micro kernel2Xjavaz.exeDetected by Malwarebytes as Trojan.Agent. The file is located in %System%No
java_updaterXjava_dev.exeDetected by Intel Security/McAfee as RDN/Generic.bfr!fb and by Malwarebytes as Trojan.MSILNo
java_pluginXjava_plugin.exeDetected by Malwarebytes as Backdoor.Agent.JVGen. The file is located in %CommonAppData%\Microsoft\Windows\Start Menu\Programs\java_updates (10/8/7/Vista) or %AllUsersProfile%\Start Menu\Programs\java_updates (XP)No
KernelUpdateXJava_UPDATE.exeDetected by Dr.Web as Trojan.Siggen6.20148 and by Malwarebytes as Backdoor.Agent.ENo
java_updateXjava_update.exeDetected by Kaspersky as Backdoor.Win32.Poison.beug. The file is located in %System%No
java_updateXjava_update.exeDetected by Dr.Web as Trojan.Siggen3.56954. The file is located in %Windir%No
Java UpdateXJava_Updater.exeDetected by Malwarebytes as Trojan.Agent.Gen. The file is located in %Temp%No
javaaXjaveshelp.exeDetected by Malwarebytes as Trojan.Agent.JV. The file is located in %Windir%No
javasecuXjavset.exeDetected by Malwarebytes as Trojan.Agent.JV. The file is located in %ProgramFiles%\winjavaNo
Java UpdateXjavupdate.exeDetected by Dr.Web as Trojan.Inject1.21911 and by Malwarebytes as Backdoor.BifroseNo
loadXjawa.exeDetected by Malwarebytes as Trojan.Agent.E. Note - this entry modifies the legitimate HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows "load" value data to include the file "jawa.exe" (which is located in %AppData%\Configs) and also adds an illegal HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows "load" entry pointing to the same fileNo
jawa32Xjawa32.exeDetected as Backdoor.Agent.bg - see here. The file is located in %Windir%No
Jawa322Xjawa32.exeAdded by a variant of Backdoor.Agent.bg. The file is located in %Windir%No
Jawn.exeXJawn.exeDetected by Malwarebytes as Backdoor.Bot.AI. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows startsNo
Windows Live MessengerXjbmYZEakOeSphSPfDGzA.exeDetected by Sophos as Troj/Banbra-LC and by Malwarebytes as Trojan.MSILNo
Java Runtime EnvironmentXjbuild.exeDetected by Sophos as W32/Delbot-JNo
javacXjc.exeDetected by Malwarebytes as Trojan.Agent.JV. The file is located in %AppData%\JavaNo
UpdateWindowsXjc892jfwew4t3.exeDetected by Malwarebytes as Trojan.Agent.UPDGen. The file is located in %CommonAppData%No
jccatXjccat.exeDetected by Malwarebytes as Adware.Korad. The file is located in %ProgramFiles%\FlashGetNo
videodriversXjcheck.exeDetected by Intel Security/McAfee as RDN/Generic.dx!c2k and by Malwarebytes as Trojan.Agent.MNRNo
Sun Java Console for Windows NT & XPXjconsole.exeDetected by Sophos as W32/Vanebot-CNo
RunJavaXjcview.exeDetected by Sophos as W32/Autorun-BELNo
jdajkshdjkehkjjsXjdajkshdjkehkjjs.exeDetected by Dr.Web as Trojan.PWS.Banker1.12163 and by Malwarebytes as Trojan.Banker.ENo
Service Registry NT SaveXjdbgmgrnt.exeDetected by Sophos as Troj/Bancos-CGNo
MSAdminXjdbgmrg.exeDetected by Trend Micro as TROJ_DASMIN.A. Note - this is not the valid JDBGMGR.EXE file, see hereNo
MSConfigrXJDBGMRG.EXEDetected by Trend Micro as TROJ_DASMIN.CNo
jdkkslwXjdkkslws.exeDetected by Malwarebytes as Trojan.Agent. The file is located in %AppData%No
Adobe FontsXjds32.exeDetected by Dr.Web as Trojan.DownLoader7.11607 and by Malwarebytes as Trojan.DownloaderNo
qaswwwXjdsuml.exeDetected by Trend Micro as TROJ_LETHIC.A and by Malwarebytes as Trojan.AgentNo
A.EXEXjeabykcdxjaba.exeDetected by Intel Security/McAfee as Generic.dx and by Malwarebytes as Trojan.Agent.AgenNo
jeafesevyravXjeafesevyrav.exeDetected by Dr.Web as Trojan.DownLoader10.5036 and by Malwarebytes as Trojan.Agent.USNo
jeasutbyzkaqXjeasutbyzkaq.exeDetected by Malwarebytes as Trojan.Agent.US. The file is located in %UserProfile% - see hereNo
Windows MS Update 32Xjebote.exeAdded by the FORBOT-GK WORM!No
KyvpIFXJeDJFR.exeDetected by Dr.Web as Trojan.DownLoader10.61653 and by Malwarebytes as Backdoor.Agent.ENo
KYVPIFXJeDJFR.exeDetected by Intel Security/McAfee as RDN/Generic.bfr!fg and by Malwarebytes as Backdoor.Agent.ENo
l80vS6v3d3gK1y1®XjedVOIjq46.exeDetected by Malwarebytes as Trojan.MSIL. The file is located in %AppData%\R2hSJYgkwAAgZCONo
(Default)Xjeff.exeDetected by Malwarebytes as Trojan.Agent. Note - this malware actually changes the value data of the "(Default)" key in HKCU\Run in order to force Windows to launch it at boot. The name field in MSConfig may be blank and the file is located in %AppData%No
jEGCsSWIMfSR.exeXjEGCsSWIMfSR.exeDetected by Malwarebytes as Rogue.Agent.SA. The file is located in %AppData%No
Windows Service AgccntXjeqcfyo.exeAdded by the RBOT-GST WORM!No
aXjesse.exeDetected by Sophos as W32/Melo-CNo
jetdsd.exeXjetdsd.exeDetected by Malwarebytes as Trojan.Banker. The file is located in %Windir%No
JetEngineXJetEngine.comDetected by Malwarebytes as Worm.Agent.MLB. The file is located in %System%No
jexaspuotemjXjexaspuotemj.exeDetected by Intel Security/McAfee as RDN/Generic Dropper!vd and by Malwarebytes as Trojan.Agent.USNo
jezcobagnoqyXjezcobagnoqy.exeDetected by Intel Security/McAfee as RDN/Downloader.a!lt and by Malwarebytes as Trojan.Agent.USNo
jezumzugurpiXjezumzugurpi.exeDetected by Intel Security/McAfee as RDN/Generic BackDoor!qr and by Malwarebytes as Trojan.Agent.USNo
hjkfkfkflflflXjfhfhfjfjfjf.exeDetected by Intel Security/McAfee as RDN/Generic.bfr and by Malwarebytes as Backdoor.Agent.ENo
JfuBwunaXjfubwuna.exeDetected by Malwarebytes as Trojan.Agent.AI. This entry loads from the HKCU\Run key and the file is located in %LocalAppData%\bydojrejNo
jfubwuna.exeXjfubwuna.exeDetected by Malwarebytes as Trojan.Agent.AI. The file is located in %UserStartup% and its presence there ensures it runs when Windows startsNo
jfziemXjfziem.exeDetected by Sophos as W32/Agent-NPL and by Malwarebytes as Worm.SFDC. The file is located in %UserProfile%No
Jenkat Games Arcade AppNJGAA.exeJenkat Games Arcade Desktop App by Jenkat Media Inc - "is the ultimate desktop application that will connect you to the latest arcade games. This application is what every gamer would want as it reduces the hassle of searching and downloading. You can easily find the latest arcade games with a few simple clicks through the Jenkat application"No
JgncnlXJgncnl.exeDetected by Malwarebytes as Trojan.FkClean. The file is located in %AppData%No
Java UpdaterXjgs.exeDetected by Intel Security/McAfee as RDN/Generic.dx and by Malwarebytes as Trojan.Agent.JVGenNo
ChromeUpdateXjgssis.exeDetected by Dr.Web as Trojan.DownLoader6.37415 and by Malwarebytes as Backdoor.AgentNo
RPC ServiceXjgszznv.exeAdded by the RBOT-EMS WORM!No
JgUJevQpNnePtDMXJgUJevQpNnePtDM.exeWindows Recovery rogue security software - not recommended, removal instructions hereNo
Win UpdateXJhanB7W.exeDetected by Malwarebytes as Trojan.MSIL. The file is located in %AppData%No
svchostXJhanB7W.exeDetected by Malwarebytes as Backdoor.Bot.E. The file is located in %AppData%No
jhgj.exeXjhgj.exeDetected by Malwarebytes as Trojan.Injector. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows startsNo
UpdatedXjhgj.exeDetected by Malwarebytes as Trojan.Injector. The file is located in %UserStartup%No
Jiddtvxrkoarxnuc.exeXJiddtvxrkoarxnuc.exeDetected by Malwarebytes as Trojan.FakeCC. The file is located in %AppData%No
WINDOWSXjif.exeAdded by the MYTOB.MK WORM!No
jigikilamcasXjigikilamcas.exeDetected by Intel Security/McAfee as RDN/Generic Downloader.x!kg and by Malwarebytes as Trojan.Agent.USNo
uwuxusifXjijikete.exeDetected by Trend Micro as WORM_SDBOT.AXWNo
SFCHKXjike.exeDetected by Intel Security/McAfee as Generic Downloader.x and by Malwarebytes as Trojan.Agent.EJKNo
SlipStreamYjinetcore.exeJi-Speed Up Web Accelerator customized core module for Slipstream - internet acceleration through compression/decompression techniques, intelligent cacheing on the server side, and real-time conversion of large/high-bandwidth images to less bulky pixNo
Ji-Speed Up Web AcceleratorYjinetgui.exeJi-Speed Up Web Accelerator customized user interface for Slipstream - internet acceleration through compression/decompression techniques, intelligent cacheing on the server side, and real-time conversion of large/high-bandwidth images to less bulky pixNo
JingUJing.exeJing screen/video capture utility from TechSmith CorporationNo
CORELIVE90HKCUXjinmdll.exeDetected by Intel Security/McAfee as Swizzor.gen and by Malwarebytes as Backdoor.Agent.MCANo
PoliciesXjinmdll.exeDetected by Intel Security/McAfee as Swizzor.gen and by Malwarebytes as Backdoor.Agent.PGenNo
SOFTWARELIVE78HKLMXjinmdll.exeDetected by Intel Security/McAfee as Swizzor.gen and by Malwarebytes as Backdoor.Agent.MCANo
jiqonXjiqon.exeDetected by Malwarebytes as Worm.SFDC. The file is located in %UserProfile%No
ZWVAYLXJirjsnl.exeDetected by Intel Security/McAfee as RDN/Generic PWS.y!wg and by Malwarebytes as Trojan.Agent.ENo
jiupiXjiupi.exeAdded by the CHANGEUP-C WORM!No
jivekkuljujyXjivekkuljujy.exeDetected by Intel Security/McAfee as PWS-Zbot.gen.ari and by Malwarebytes as Trojan.CryptNo
jixhoframuajXjixhoframuaj.exeDetected by Dr.Web as Trojan.DownLoad3.34013 and by Malwarebytes as Trojan.Agent.USNo
jjXjj.exeDetected by Malwarebytes as Trojan.FakeAV. The file is located in %Windir% - see hereNo
jjanggametoolbarXjjanggametoolbar.exeDetected by Dr.Web as Trojan.Click2.16351 and by Malwarebytes as Trojan.ChinAdNo
JJangQXJJangQC.exeDetected by AVG as OpenShopper.D and by Malwarebytes as Adware.KorAd. The file is located in %ProgramFiles%\JJangQNo
JJangQSearchBarOSXJJangQSearchBar.exeDetected by AVG as OpenShopper.A and by Malwarebytes as Adware.KorAd. The file is located in %ProgramFiles%\JJangQ\JJangQSearchBarNo
Microsoft Update SetupXjjdrive32.exeDetected by Microsoft as Worm:Win32/Pushbot.OF and by Malwarebytes as Backdoor.BotNo
msjava critical updateXjjfixer.exeDetected by Sophos as Troj/Hector-ANo
jjj.vbs__.vbsXjjj.vbs__.vbsDetected by Intel Security/McAfee as RDN/Generic BackDoor and by Malwarebytes as Backdoor.Agent.VBS. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows startsNo
dlmcjjcefcXjjxzwzjy090504.exeDetected by Dr.Web as Trojan.PWS.Wsgame.39407 and by Malwarebytes as Trojan.DownloaderNo
WinUpdtrXjkduhy.exeDetected by Malwarebytes as Trojan.Agent.Gen. The file is located in %AppData%No
WINLODER UPDATEXJKEYS.exeDetected by Intel Security/McAfee as RDN/Generic BackDoor and by Malwarebytes as Backdoor.Agent.DCENo
Microsoft Update MachineXjkfrnz.exeDetected by Sophos as W32/Rbot-GOZ and by Malwarebytes as Backdoor.BotNo
jkhcorau.exeXjkhcorau.exeDetected by Malwarebytes as Trojan.Koobface.OL. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows startsNo
JkwkwtXJkwkwt.exeDetected by Malwarebytes as Backdoor.Bot. The file is located in %AppData%No
Microsoft Update MachineXjkydxg.exeDetected by Kaspersky as Backdoor.Win32.Rbot.aea and by Malwarebytes as Backdoor.Bot. The file is located in %System%No
Protocol Intelligent ProcessXjlipfave.exeDetected by Malwarebytes as Trojan.Agent. The file is located in %System%No
JMB36X IDE SetupUJMInsIDE.exeJMB36x series RAID configuration utility from JMicron for their PCI Express to SATA II and PATA Host ControllersNo
JmM2q.exeXJmM2q.exeDetected by Malwarebytes as Trojan.MSIL. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows startsNo
JmpyxPEOWqPOXJmpyxPEOWqPO.exeAdded by the FAKEAV-DAQ TROJAN!No
36X Raid ConfigurerYJMRaidSetup.exeJMB36x series RAID configuration utility from JMicron for their PCI Express to SATA II and PATA Host ControllersNo
JMB36X ConfigureYJMRaidSetup.exeJMB36x series RAID configuration utility from JMicron for their PCI Express to SATA II and PATA Host ControllersNo
JMB36X ConfigureYJMRaidTool.exeJMB36x series RAID configuration utility from JMicron for their PCI Express to SATA II and PATA Host ControllersNo
Creata MailUJMSrvr.exeCreata_Mail. Smileys, stationary and more for you email. Required if you want to access the program from Outlook or Outlook ExpressNo
Usb driverXjmv2.exeAdded by the RANDEX.AV WORM!No
jmVAaTxbPdQVXjmVAaTxbPdQV.exeDetected by Dr.Web as Trojan.Siggen5.31681 and by Malwarebytes as Backdoor.Agent.ENo
msjavadllXjnana.tsaAdded by the JNANABOT TROJAN!No
system64Xjnmhzdjtt.exeDetected by Malwarebytes as Trojan.Agent. The file is located in %CommonFiles%\system640No
Windows Service AgentXjnxrcyc.exeDetected by Kaspersky as Backdoor.Win32.Rbot.xat and by Malwarebytes as Backdoor.Bot. The file is located in %System%No
HKLMXjoaogay.exeDetected by Malwarebytes as Backdoor.HMCPol.Gen. The file is located in %Windir%\installNo
PoliciesXjoaogay.exeDetected by Malwarebytes as Backdoor.Agent.PGen. The file is located in %Windir%\installNo
HKCUXjoaogay.exeDetected by Malwarebytes as Backdoor.HMCPol.Gen. The file is located in %Windir%\installNo
joateoXjoateo.exeDetected by Sophos as W32/SillyFDC-FL and by Malwarebytes as Worm.SFDC. The file is located in %UserProfile%No
jobXjob.exeDetected by Dr.Web as Trojan.PWS.Siggen1.28616No
Form1Xjobdescription.exeDetected by Malwarebytes as Trojan.Banker. The file is located in %UserStartup% - see hereNo
jobdescription.exeXjobdescription.exeDetected by Malwarebytes as Trojan.MSIL. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows starts, see hereNo
JobHisInitUJobHisInit.exeUsed by Ricoh network printers to enable network printing from the clientNo
jociqpeaborlXjociqpeaborl.exeDetected by Dr.Web as Trojan.DownLoader10.7650 and by Malwarebytes as Trojan.Agent.USNo
Microsoft Config SetupXjodrive32.exeAdded by the BACKDR-EY BACKDOOR!No
JogServ2UJogServ2.exe"Jog Dial" on a Sony Vaio laptop. The dial can select various functions such as control audio. Needed if you use its featuresNo
JOGSERV2.EXEUJogServ2.exe"Jog Dial" on a Sony Vaio laptop. The dial can select various functions such as control audio. Needed if you use its featuresNo
ELDIMERA32XJOhanS.exeDetected by Intel Security/McAfee as Generic BackDoor and by Malwarebytes as Backdoor.Agent.ELDNo
SOUNDMIXXJOhanS.exeDetected by Intel Security/McAfee as Generic BackDoor and by Malwarebytes as Backdoor.Agent.ELDNo
Attacher ExtXJoin.txtDetected by Malwarebytes as Trojan.Agent.AT. The file is located in %System%No
PoliciesXJoinBot.exeDetected by Malwarebytes as Backdoor.Agent.PGen. The file is located in %ProgramFiles%\1033 - see hereNo
joinbotXJoinBot.exeDetected by Malwarebytes as Trojan.Banker.WX. The file is located in %ProgramFiles%\1033 - see hereNo
joinbotXjoinbot.exeDetected by Intel Security/McAfee as RDN/Generic BackDoor!bbg and by Malwarebytes as Backdoor.Agent.DCE. The file is located in %Root%\WinupdtNo
vbcXjoiSy.exeDetected by Malwarebytes as Trojan.Agent.AI. The file is located in %UserProfile%\vbcNo
jojezdixxofjXjojezdixxofj.exeDetected by Intel Security/McAfee as RDN/Generic Dropper!va and by Malwarebytes as Trojan.Agent.USNo
vscanXjoke.vbsDetected by Sophos as VBS/Rookie-ANo
JokerLoaderXJokerLoader.jsDetected by Malwarebytes as Malware.Trace. The file is located in %UserProfile%\JokerNo
jomasrihajoXjomasrihajo.exeDetected by Intel Security/McAfee as RDN/Generic.dx!dfd and by Malwarebytes as Trojan.Agent.USNo
[various names]Xjopplerg.exeFake startup entry created by the Wareout rogue spyware and dialer remover - not recommended, removal instructions here. Archived version of Andrew Clover's original pageNo
Launch Norton AntiVirus 2000Xjorgf.exeDetected by Sophos as W32/Rbot-AUINo
jotfemfualijXjotfemfualij.exeDetected by Intel Security/McAfee as RDN/Generic.tfr!ed and by Malwarebytes as Trojan.Agent.USNo
jotgesadosjyXjotgesadosjy.exeDetected by Dr.Web as Trojan.DownLoader6.62576 and by Malwarebytes as Trojan.Agent.USNo
jotogXjotog.exeDetected by Malwarebytes as Trojan.Downloader. The file is located in %UserProfile%No
JOYTECH USB Neo S ControllerUJoytechNeoSTrayIcon.exeSystem Tray access to Joytech Neo S PC gamepad controller softwareNo
Game DeviceNJOYUPDRV.EXEGenius game controller profile activatorNo
JPEGXJPEG.exeDetected by Malwarebytes as Trojan.Agent.E. Note - this entry loads from the Windows Startup folder and the file is located in %CommonAppData%\JPEGNo
JeticoPFStartupYjpf.exe"Jetico Personal Firewall software protects computers against hackers and malicious software when networked or connected to the Internet. It offers detailed, configurable event logs, reports, plus the option to view and edit the firewall configuration. The modular architecture is as open as possible to assist with easier evaluation of the security"No
king_jpXjpking.exeDetected by Sophos as Troj/Agent-POO and by Malwarebytes as Spyware.OnlineGamesNo
jpupdXjpupd.exeDetected by Trend Micro as TROJ_DIALER.CMNo
javaXjpxiinstall.exeDetected by Malwarebytes as Trojan.Agent. The file is located in %AppData%No
E2Y7AF5VP621XJQ4IGAVB.exeDetected by Malwarebytes as Trojan.Agent. The file is located in %AppData%No
JqfsfbXJqfsfb.exeAdded by the MDROP-DUY TROJAN!No
Java(TM) Update SchedulerXjqs.exeDetected by Kaspersky as Worm.Win32.Bybz.box. The file is located in %ProgramFiles%\Java\jre6\libNo
javaXjqs.exeDetected by Microsoft as Worm:Win32/Dorkbot.R and by Malwarebytes as Trojan.FkjavaNo
Java driveXjqs.exeDetected by Kaspersky as Worm.Win32.Bybz.box. The file is located in %ProgramFiles%\Java\jre6\libNo
JQSXjqs.exeDetected by Intel Security/McAfee as RDN/Generic.bfr!a and by Malwarebytes as Trojan.Agent.QJNo
Messenger UpdateXJqsx.exeDetected by Malwarebytes as Trojan.Passwords. The file is located in %AppData%\Java sunsNo
Java sunsXJqsx.exeDetected by Malwarebytes as Backdoor.Agent. The file is located in %AppData%\Java sunsNo
BitcoinInjectorXJqtOq.exeDetected by Malwarebytes as Trojan.BitcoinMiner. The file is located in %AppData%No
SystesXjrdtifkkxbbsa.exeDetected by Sophos as W32/Rbot-ADCNo
Java RuntimeXjre.exeDetected by Dr.Web as Trojan.MulDrop4.8778 and by Malwarebytes as Trojan.AgentNo
wow64_32signXjreenulocloc.exeDetected by Intel Security/McAfee as RDN/Generic.bfr!fl and by Malwarebytes as Trojan.Agent.ENo
JregXJreg2b.exeFlashEnhancer adwareNo
JRESP7XJREUPD7.exeDetected by Intel Security/McAfee as Generic.dx!bh3h and by Malwarebytes as Trojan.AgentNo
jrun32Xjrun32.exeDetected by Intel Security/McAfee as RDN/Generic Dropper and by Malwarebytes as Backdoor.AgentNo
BArVzWXJrYnjU.exeDetected by Dr.Web as Trojan.DownLoader6.63357 and by Malwarebytes as Spyware.KeyloggerNo
Chrome UpdateXjs83kgso.exeDetected by Intel Security/McAfee as Generic.dx!bdrk and by Malwarebytes as Trojan.Agent. Note - this is not a legitimate Google Chrome browser fileNo
Chrome UpdaterXjs8dth3w.exeDetected by Intel Security/McAfee as Generic Dropper!1p3. Note - this is not a legitimate Google Chrome browser fileNo
SunJavaUpdateSched132Xjschd.exeDetected by Sophos as W32/AutoRun-AQYNo
JavascriptXjscript.exeDetected by Sophos as W32/Delbot-ADNo
Windows Javascript DaemonXjsdaemon.exeDetected by Microsoft as Backdoor:Win32/Rbot.EKNo
JavaScript Debugging ServiceXJsDbgMan.exeAdded by the DERDERO.E WORM!No
SPDriverUjsdrv.exeShopper-Pro shopping browser add-on. Detected by Malwarebytes as PUP.Optional.ShopperPro. The file is located in %ProgramFiles%\ShopperPro[version]\JSDriver\[version]. If bundled with another installer or not installed by choice then remove it, removal instructions hereNo
JsecXJsec.exeDetected by Malwarebytes as Backdoor.Agent.DC. The file is located in %AppData%No
jserd.exeXjserd.exeDetected by Malwarebytes as Spyware.PWS. The file is located in %Root%\addonsNo
SABDHASXjshdo.exeDetected by Intel Security/McAfee as RDN/Generic PWS.y!zb and by Malwarebytes as Backdoor.Agent.ENo
SunJavaUpdateSched v3.4Xjshed.exeDetected by Kaspersky as Trojan.Win32.Buzus.auub and by Malwarebytes as Trojan.Agent. The file is located in %System%No
Audio DeviceXjshed.exeDetected by Malwarebytes as Backdoor.Agent. The file is located in %AppData%\InstallNo
Java Auto UpdateXjsheded.exeDetected by Dr.Web as Trojan.Siggen5.6039 and by Malwarebytes as Backdoor.BotNo
Windows Microsoft ServiceXjsopfuud.exeDetected by Sophos as Troj/Agent-HCD and by Malwarebytes as Backdoor.BotNo
jspeqXjspeq.exeDetected by Malwarebytes as Worm.SFDC. The file is located in %UserProfile%No
jssvc23Xjsssvc.exeDetected by Trend Micro as WORM_RBOT.EIWNo
Java Update ManagerXjstchde.exeDetected by Kaspersky as Trojan-Downloader.Win32.Small.awbm and by Malwarebytes as Trojan.Agent. The file is located in %AppData%\HEX-5823-6893-6818No
ykemkfelXjsuyaxatssd.exeDetected by Sophos as Troj/Agent-ODYNo
betaXjtkyyvgiu.exeDetected by Malwarebytes as Trojan.Injector. The file is located in %CommonAppData%\botNo
jtoshibaXjtoshiba.exeDetected by Intel Security/McAfee as PWS-Zbot-FAJX!6245B271B2DA and by Malwarebytes as Trojan.Agent.ZBNo
jtperXjtper.exeDetected by Malwarebytes as Worm.SFDC. The file is located in %UserProfile% - see hereNo
Windows DefenderXJTVEBY4Z1V.exeDetected by Malwarebytes as Trojan.Agent.Gen. The file is located in %AppData%\win32No
jtvgjubbuencbfw.exeXjtvgjubbuencbfw.exeDetected by Intel Security/McAfee as RDN/Spybot.bfr!n and by Malwarebytes as Trojan.Agent.RND. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows startsNo
MICROSFT NT SUPPORTXjtzbpfnkxk.EXEAdded by the RBOT-CMI WORM!No
jubidiswirorXjubidiswiror.exeDetected by Malwarebytes as Backdoor.Pushdo. The file is located in %UserProfile%No
javaXjucheck.exeDetected by Intel Security/McAfee as RDN/Generic.bfr!gc and by Malwarebytes as Backdoor.Agent.SKNo
Adobe Reader And Acrobat ManagerXjucheck.exeDetected by Malwarebytes as Backdoor.SpyNet. The file is located in %CommonFiles%\Java\Java UpdateNo
SkypeXjucheck.exeDetected by Malwarebytes as Backdoor.SpyNet. The file is located in %CommonFiles%\Java\Java UpdateNo
Windows DefenderXjucheck.exeDetected by Malwarebytes as Backdoor.SpyNet. The file is located in %CommonFiles%\Java\Java UpdateNo
Windows Login accessXjucheck.exeDetected by Dr.Web as Trojan.StartPage.38448 and by Malwarebytes as Trojan.AgentNo
jucheckXjucheck.exeDetected by Malwarebytes as Trojan.Agent.E. The file is located in %AppData%No
jucheckXjucheck.exeDetected by Symantec as W32.Scrimge.ONo
jucheck.exeXjucheck.exeDetected by Trend Micro as TROJ_BATWIPER.A and by Malwarebytes as Backdoor.PoisonNo
juchedXjuched.exeDetected by Intel Security/McAfee as RDN/Generic BackDoor!zm and by Malwarebytes as Backdoor.Agent.JCNo
%UserProfile%\Configurações locais\Dados de aplicativos\juchedsys.exeXjuchedsys.exeDetected by Malwarebytes as Trojan.Banker. The file is located in %UserProfile%\Configurações locais\Dados de aplicativosNo
juchedsys.exeXjuchedsys.exeDetected by Malwarebytes as Trojan.Banker. The file is located in %UserProfile%\Configurações locais\Dados de aplicativosNo
jucheedXjucheed.exeDetected by Dr.Web as Trojan.DownLoader4.633 and by Malwarebytes as Backdoor.IRCBotNo
SunJavaUpdateSched v3Xjucshed.exeDetected by Sophos as W32/Autorun-ABC and by Malwarebytes as Trojan.AgentNo
Sun Java Updater v7.11Xjucshed.exeDetected by Sophos as W32/Autorun-ABH and by Malwarebytes as Trojan.AgentNo
juddedoxofjuXjuddedoxofju.exeDetected by Intel Security/McAfee as RDN/Generic Dropper!vc and by Malwarebytes as Trojan.Agent.USNo
judferimemjuXjudferimemju.exeDetected by Intel Security/McAfee as RDN/Generic PWS.y!b2q and by Malwarebytes as Trojan.Agent.USNo
SystemXJuegs.exeDetected by Sophos as W32/Culler-CNo
juheggdsXjuheggds.exeDetected by Dr.Web as Trojan.DownLoader9.17772 and by Malwarebytes as Trojan.FakeEXTNo
JuiceNJuice.exeJuice - a free utility that "allows you to select and download audio files from anywhere on the Internet to your desktop". This entry is present if you choose the option to add it to the startup group during installationYes
Intel(R) HD GraphicsXJuicyJ.exeDetected by Intel Security/McAfee as RDN/Generic BackDoor and by Malwarebytes as Trojan.Agent.ASGenNo
juiloquisejuXjuiloquiseju.exeDetected by Intel Security/McAfee as RDN/Generic Dropper!vf and by Malwarebytes as Trojan.Agent.USNo
juimubequijuXjuimubequiju.exeDetected by Intel Security/McAfee as RDN/Generic Dropper!vl and by Malwarebytes as Trojan.Agent.USNo
DLL52Xjuin.exeDetected by Malwarebytes as Trojan.Agent.LDE. The file is located in %AppData%No
juisuXjuisu.exeDetected by Malwarebytes as Worm.SFDC. The file is located in %UserProfile%No
jujavaXjujava.exeDetected by Malwarebytes as Trojan.Winlock. The file is located in %AppData%\MicrosoftNo
VEFXYVZZBNWMJDJPXQZLDQTNBXJujvVloUUoRoqjOSRMtPFJxoA.exeDetected by Malwarebytes as Backdoor.Agent. The file is located in %AppData%No
jukaxjyxpolbXjukaxjyxpolb.exeDetected by Intel Security/McAfee as Downloader.a!db3 and by Malwarebytes as Trojan.Agent.USNo
HKCUXjulio.exeDetected by Malwarebytes as Backdoor.HMCPol.Gen. The file is located in %Root%\julio\julioNo
junbulsonsxXjunbulsonsx.exeDetected by Sophos as Troj/VB-INH and by Malwarebytes as Trojan.Agent.WSTRNo
junbulsonsx.exeXjunbulsonsx.exeDetected by Sophos as Troj/VB-INH and by Malwarebytes as Trojan.Agent.WSTR. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows startsNo
EleFunAnimatedWallpaperUJungle Waterfall.exeJungle Waterfall animated wallpaper fromNo
HKCUXjunio.exeDetected by Malwarebytes as Backdoor.HMCPol.Gen. The file is located in %ProgramFiles%\junioNo
junior2Xjunior2.exeDetected by Dr.Web as Trojan.PWS.Banker1.11137 and by Malwarebytes as Trojan.Banker.ENo
JunkCleanerXJunkCleaner.exeDetected by Malwarebytes as Rogue.TechSupportScam. The file is located in %ProgramFiles%\Pandaje Technical Services\Junk CleanerNo
JunkerXJunker.exeDetected by Malwarebytes as Trojan.ScreenLock. The file is located in %ProgramFiles%\JunkerNo
Junter.exeXJunter.exeDetected by Malwarebytes as Trojan.Agent.AP. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows starts - see hereNo
ArVzWJrYnXjUOghDDYN.exeDetected by Intel Security/McAfee as Generic PWS.y!dxb and by Malwarebytes as Trojan.AgentNo
jupdateXjupdate.exeDetected by Malwarebytes as Trojan.MSIL. The file is located in %AppData%No
Adobe FontsXjupdt.exeDetected by Dr.Web as Trojan.DownLoader10.52896 and by Malwarebytes as Trojan.DownloaderNo
USB SECURITY DEVICE CoInstallerYJupitCo.exeButterflyMedia USB Flash drive related - required for the password security feature to workNo
JuPoXjupos.exeAdded by the SDBOT-CAG WORM!No
jusb2Xjusb2.exeDetected by Malwarebytes as Trojan.Agent.RRUN. The file is located in %AppData%\MicrosoftNo
SunJavaUpdateXjuschd.exeDetected by Malwarebytes as Trojan.Scar. The file is located in %Windir%No
wininiitXjuschd.exeDetected by Malwarebytes as Trojan.Agent.E. The file is located in %AppData%\juschdNo
WinServicexXJuscheck.exeDetected by Dr.Web as Trojan.DownLoader3.35013No
SunJavaUpdateXjusched.exeDetected by Intel Security/McAfee as Generic.bfr!cw and by Malwarebytes as Trojan.Agent. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name which is usually located in %ProgramFiles%\Java\version number\bin (up to version 6 update 16) or %CommonFiles%\Java\Java Update (from version 6 update 17). This one is located in %System%No
Java(TM) Platform SE 6Yjusched.exeChecks with Oracle's (was Sun Microsystems) Java updates site to see if newer Java versions are available. Recommended that you leave this enabled due to potential Java vulnerabilities and exploits that may be used by malware writers. The file is located in %ProgramFiles%\Java\jre[version]\bin (up to version 6 update 16) or %CommonFiles%\Java\Java Update (from version 6 update 17)Yes
Java(TM) Platform SE 6 U*Yjusched.exeChecks with Oracle's (was Sun Microsystems) Java updates site to see if newer Java versions are available. Recommended that you leave this enabled due to potential Java vulnerabilities and exploits that may be used by malware writers. The file is located in %ProgramFiles%\Java\jre[version]\bin (up to version 6 update 16) or %CommonFiles%\Java\Java Update (from version 6 update 17)Yes
SunJavaUpdateSchedXjusched.exeDetected by Kaspersky as Trojan-Downloader.Win32.Agent.etq. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name which is usually located in %ProgramFiles%\Java\version number\bin (up to version 6 update 16) or %CommonFiles%\Java\Java Update (from version 6 update 17). This one is located in %CommonFiles%No
Java(TM) Platform SE Auto UpdaterXjusched.exeDetected by Malwarebytes as Trojan.Agent.AI. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name which is usually located in %ProgramFiles%\Java\version number\bin (up to version 6 update 16) or %CommonFiles%\Java\Java Update (from version 6 update 17). This one is located in %AppData%\Adobe\Flash Player\AssetCache\EWRQTQXLNo
SunJavaUpdateSchedYjusched.exeChecks with Oracle's (was Sun Microsystems) Java updates site to see if newer Java versions are available. Recommended that you leave this enabled due to potential Java vulnerabilities and exploits that may be used by malware writers. The file is located in %ProgramFiles%\Java\jre[version]\bin (up to version 6 update 16) or %CommonFiles%\Java\Java Update (from version 6 update 17)Yes
Java(TM) Platform SE Auto UpdaterXjusched.exeDetected by Malwarebytes as Trojan.Bitcoin. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name which is usually located in %ProgramFiles%\Java\version number\bin (up to version 6 update 16) or %CommonFiles%\Java\Java Update (from version 6 update 17). This one is located in %AppData%\Dropbox\installerNo
SunJavaUpdateSchedXjusched.exeDetected by Trend Micro as TSPY_BANKER-2.001. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name which is usually located in %ProgramFiles%\Java\version number\bin (up to version 6 update 16) or %CommonFiles%\Java\Java Update (from version 6 update 17). This one is located in %Windir%\DebugNo
Java(TM) Platform SE Auto UpdaterXjusched.exeDetected by Kaspersky as Trojan-Dropper.Win32.Dapato.bmpo and by Malwarebytes as Trojan.Agent.H. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name which is usually located in %ProgramFiles%\Java\version number\bin (up to version 6 update 16) or %CommonFiles%\Java\Java Update (from version 6 update 17). This one is located in %CommonAppData%No
Java(TM) Platform SE Auto Updater 2 0Yjusched.exeChecks with Oracle's (was Sun Microsystems) Java updates site to see if newer Java versions are available. Recommended that you leave this enabled due to potential Java vulnerabilities and exploits that may be used by malware writers. The file is located in %ProgramFiles%\Java\jre[version]\bin (up to version 6 update 16) or %CommonFiles%\Java\Java Update (from version 6 update 17)Yes
SunJavaUpdateSched##Xjusched.exeDetected by Sophos as Troj/Lolbot-A and by Malwarebytes as Trojan.Downloader. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name which is usually located in %ProgramFiles%\Java\version number\bin (up to version 6 update 16) or %CommonFiles%\Java\Java Update (from version 6 update 17). This one is located in %ProgramFiles%\Java\jre-##\bin - where ## represents digitsNo
SunJavaUpdateSched,Xjusched.exeDetected by Intel Security/McAfee as PWS-Zbot and by Malwarebytes as Trojan.FakeJava.Gen. Note the addtional "," at the end of the startup name and that this is not the legitimate Oracle (was Sun Microsystems) file of the same name which is usually located in %ProgramFiles%\Java\version number\bin (up to version 6 update 16) or %CommonFiles%\Java\Java Update (from version 6 update 17). This one is located in %ProgramFiles%\Java\jre-07\binNo
SunJavaUpdateSched9Xjusched.exeDetected by Sophos as Troj/Lolbot-A and by Malwarebytes as Trojan.FakeJava.Gen. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name which is usually located in %ProgramFiles%\Java\version number\bin (up to version 6 update 16) or %CommonFiles%\Java\Java Update (from version 6 update 17). This one is located in %ProgramFiles%\Java\jre-09\binNo
Java(TM) Update SchedulerXjusched.exeDetected by Malwarebytes as Trojan.Agent. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name which is usually located in %ProgramFiles%\Java\version number\bin (up to version 6 update 16) or %CommonFiles%\Java\Java Update (from version 6 update 17). This one is located in %LocalAppData%\MicrosoftNo
SunJavaUpdateSchedulerXjusched.exeDetected by Intel Security/McAfee as RDN/Generic.bfr. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name which is usually located in %ProgramFiles%\Java\version number\bin (up to version 6 update 16) or %CommonFiles%\Java\Java Update (from version 6 update 17). This one is located in %AppData%\Java Runtime EnvironmentNo
Java(TM) Update SchedulerXjusched.exeDetected by Kaspersky as Trojan-Downloader.Win32.Genome.baax. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name which is usually located in %ProgramFiles%\Java\version number\bin (up to version 6 update 16) or %CommonFiles%\Java\Java Update (from version 6 update 17). This one is located in %System%No
SunJavaUpdateSchedulerXjusched.exeDetected by Malwarebytes as Trojan.Agent.AI. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name which is usually located in %ProgramFiles%\Java\version number\bin (up to version 6 update 16) or %CommonFiles%\Java\Java Update (from version 6 update 17). This one is located in %ProgramFiles%\Java Runtime EnvironmentNo
wmonXjusched.exeDetected by Sophos as W32/Agobot-OW. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name which is usually located in %ProgramFiles%\Java\version number\bin (up to version 6 update 16) or %CommonFiles%\Java\Java Update (from version 6 update 17). This one is located in %System%No
JavaXJusched.exeDetected by Malwarebytes as IPH.Trojan.Zbot.REPS. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name which is usually located in %ProgramFiles%\Java\version number\bin (up to version 6 update 16) or %CommonFiles%\Java\Java Update (from version 6 update 17). This one is located in %AppData%\Java\JavaUpdateNo
UpdateXjusched.exeDetected by Kaspersky as Trojan-Downloader.Win32.VB.amx and by Malwarebytes as Trojan.Agent.VB. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name which is usually located in %ProgramFiles%\Java\version number\bin (up to version 6 update 16) or %CommonFiles%\Java\Java Update (from version 6 update 17). This one is located in %System%No
Java (TM) Platform SE Auto Updater 2.1Xjusched.exeDetected by Sophos as Troj/Mdrop-EPP and by Malwarebytes as Backdoor.Agent. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name which is usually located in %ProgramFiles%\Java\version number\bin (up to version 6 update 16) or %CommonFiles%\Java\Java Update (from version 6 update 17). This one is located in %System%\CerberusNo
Java developer Script BrowseXjusched.exeDetected by Sophos as Troj/VB-ESK and by Malwarebytes as Trojan.Agent. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name which is usually located in %ProgramFiles%\Java\version number\bin (up to version 6 update 16) or %CommonFiles%\Java\Java Update (from version 6 update 17). This one is located in %Windir%No
FJSDRKTXjusched.exeDetected by Intel Security/McAfee as RDN/Generic.bfr and by Malwarebytes as Trojan.Agent. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name which is usually located in %ProgramFiles%\Java\version number\bin (up to version 6 update 16) or %CommonFiles%\Java\Java Update (from version 6 update 17). This one is located in %AppData%No
Java Platform SE Auto UpdaterXjusched.exeDetected by Malwarebytes as Trojan.Injector.AutoIt. Note - this entry either replaces or loads the legitimate Oracle (was Sun Microsystems) file which is located in %CommonFiles%\Java\Java Update (from version 6 update 17 onwards). Which is the case is unknown at this timeNo
Java Platform SE Auto UpdaterXjusched.exeDetected by Malwarebytes as Trojan.Agent. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name which is usually located in %ProgramFiles%\Java\version number\bin (up to version 6 update 16) or %CommonFiles%\Java\Java Update (from version 6 update 17). This one is located in %Windir%No
Java Platform UpdaterXjusched.exeDetected by Sophos as Troj/Trackr-AB and by Malwarebytes as Trojan.FakeJava. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name which is usually located in %ProgramFiles%\Java\version number\bin (up to version 6 update 16) or %CommonFiles%\Java\Java Update (from version 6 update 17). This one is located in %AppData%\Java SE Platform UpdaterNo
Windows DefenderXjusched.exeDetected by Malwarebytes as Trojan.Injector.AutoIt. Note - this entry either replaces or loads the legitimate Oracle (was Sun Microsystems) file which is located in %CommonFiles%\Java\Java Update (from version 6 update 17 onwards). Which is the case is unknown at this timeNo
Java SE Platform UpdaterXjusched.exeDetected by Dr.Web as Trojan.DownLoader10.26900 and by Malwarebytes as Trojan.Agent.JVGenNo
vUj81HXjusched.exeDetected by Malwarebytes as Trojan.Agent.AI. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name which is usually located in %ProgramFiles%\Java\version number\bin (up to version 6 update 16) or %CommonFiles%\Java\Java Update (from version 6 update 17). This one is located in %UserProfile%\lPy43GNo
winupdateXjusched.exeDetected by Sophos as Troj/DwnLdr-FUX and by Malwarebytes as Trojan.Agent. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name which is usually located in %ProgramFiles%\Java\version number\bin (up to version 6 update 16) or %CommonFiles%\Java\Java Update (from version 6 update 17). This one is located in %Windir%No
Java Update ManagerXjusched.exeDetected by Sophos as CXmal/FkFldr-C and by Malwarebytes as Trojan.Agent. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name which is usually located in %ProgramFiles%\Java\version number\bin (up to version 6 update 16) or %CommonFiles%\Java\Java Update (from version 6 update 17). This one is located in %AppData%\HEX-5823-6893-6818No
Sun Java Update.exeXjusched.exeDetected by Dr.Web as Trojan.PWS.Lineage.9630. Note - this entry either replaces or loads the legitimate Oracle (was Sun Microsystems) file which is located in %CommonFiles%\Java\Java Update (from version 6 update 17 onwards). Which is the case is unknown at this timeNo
juschedXjusched.exeDetected by Dr.Web as Trojan.DownLoad2.45152 and by Malwarebytes as Trojan.Agent. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name which is usually located in %ProgramFiles%\Java\version number\bin (up to version 6 update 16) or %CommonFiles%\Java\Java Update (from version 6 update 17). This one is located in %AppData%No
juschedXjusched.exeDetected by Intel Security/McAfee as Generic BackDoor. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name which is usually located in %ProgramFiles%\Java\version number\bin (up to version 6 update 16) or %CommonFiles%\Java\Java Update (from version 6 update 17). This one is located in %AppData%\juschedNo
juschedYjusched.exeChecks with Oracle's (was Sun Microsystems) Java updates site to see if newer Java versions are available. Recommended that you leave this enabled due to potential Java vulnerabilities and exploits that may be used by malware writers. Note - this entry loads from the HKLM\Run key and the file is usually located in %ProgramFiles%\Java\jre[version]\bin (up to version 6 update 16) or %CommonFiles%\Java\Java Update (from version 6 update 17)Yes
juschedXjusched.exeDetected by Sophos as Troj/Banker-BOV. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name which is usually located in %ProgramFiles%\Java\version number\bin (up to version 6 update 16) or %CommonFiles%\Java\Java Update (from version 6 update 17). This one is located in %System%No
juschedXjusched.exeDetected by Sophos as Troj/Mdrop-EPP and by Malwarebytes as Backdoor.Agent. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name which is usually located in %ProgramFiles%\Java\version number\bin (up to version 6 update 16) or %CommonFiles%\Java\Java Update (from version 6 update 17). This one is located in %System%\CerberusNo
juschedXjusched.exeDetected by Intel Security/McAfee as RDN/Generic.bfr and by Malwarebytes as Trojan.Banker.Gen. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name which is usually located in %ProgramFiles%\Java\version number\bin (up to version 6 update 16) or %CommonFiles%\Java\Java Update (from version 6 update 17). This one is located in %Temp%\juschedNo
jusched.exeXjusched.exeDetected by Malwarebytes as Backdoor.Agent.E. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name which is usually located in %ProgramFiles%\Java\version number\bin (up to version 6 update 16) or %CommonFiles%\Java\Java Update (from version 6 update 17). This one is located in %AppData%\AppOne\Meta\Tags\UpdateNo
jusched.exeXjusched.exeDetected by Dr.Web as Trojan.DownLoader3.27090 and by Malwarebytes as Trojan.Agent. Note that this is not the legitimate Oracle (was Sun Microsystems) file (of the same name) which is usually located in %Program Files%\Java\version number\bin. This one is located in %AppData%\JavaVMNo
jusched.exeXjusched.exeDetected by Malwarebytes as Trojan.Agent. Note - this is not the legitimate Oracle (was Sun Microsystems) file of the same name which is usually located in %ProgramFiles%\Java\version number\bin (up to version 6 update 16) or %CommonFiles%\Java\Java Update (from version 6 update 17). This one is located in %Windir%No
juschedXjusched16.exeDetected by Intel Security/McAfee as RDN/Generic.bfr!he and by Malwarebytes as Backdoor.Agent.JSNo
JavaUpdateSchedXjusched32.exeDetected by Sophos as Troj/Bckdr-CKBNo
WINTASK DLLXjusched32.exeAdded by the MYTOB.AI WORM!No
PoliciesXjusched32.exeDetected by Intel Security/McAfee as RDN/Generic.bfr and by Malwarebytes as Backdoor.Agent.PGenNo
HCRXjusched32.exeDetected by Intel Security/McAfee as RDN/Generic.bfr and by Malwarebytes as Backdoor.Agent.ENo
HRVXjusched32.exeDetected by Intel Security/McAfee as RDN/Generic.bfr and by Malwarebytes as Backdoor.Agent.ENo
A7675373-85EC-453E-B7CF-3CD09AFEFE-1421009279Xjuschedg.exeDetected by Dr.Web as Trojan.DownLoader8.24522 and by Malwarebytes as Trojan.AgentNo
WININITSTXjuschedi.exeDetected by Intel Security/McAfee as Generic Downloader.x!glh and by Malwarebytes as Trojan.AgentNo
jushedXjushed.exeDetected by Malwarebytes as Trojan.Agent. The file is located in %CommonAppData%No
Java(TM) Platform SE Auto UpdaterXjushed.exeDetected by Intel Security/McAfee as RDN/Autorun.worm.gen and by Malwarebytes as Trojan.FakeJavaNo
Java(TM) Platform SE Auto UpdaterXjushed.exeDetected by Malwarebytes as Backdoor.Agent.DCE. The file is located in %Windir%\Microsoft - see hereNo
SunJavaUpdateSched v2Xjushed.exeDetected by Symantec as W32.Ackantta.B@mm and by Malwarebytes as Trojan.Agent. The file is located in %System%No
SunJavaUpdateSched v3.3Xjushed.exeDetected by Kaspersky as Trojan.Win32.Buzus.asuu and by Malwarebytes as Trojan.Agent. The file is located in %System%No
SunJavaUpdateSched10Xjushed.exeDetected by Symantec as W32.Ackantta.F@mm and by Malwarebytes as Trojan.DownloaderNo
JavaXjushed.exeDetected by Malwarebytes as Trojan.MSIL. The file is located in %AppData%No
JavaXjushed.exeDetected by Malwarebytes as Trojan.Agent. The file is located in %AppData%\MicrosoftNo
PoliciesXjushed.exeDetected by Malwarebytes as Backdoor.Agent.PGen. The file is located in %Windir%No
ShellXjushed.exe,explorer.exeDetected by Malwarebytes as Trojan.FakeAlert. Note - this entry adds an illegal HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon "Shell" entry. The value data points to "explorer.exe" (which is a legitimate file located in %Windir% and shouldn't be deleted) and "jushed.exe" (which is located in %Windir%\Microsoft), see hereNo
ShellXjushed.exe,explorer.exeDetected by Intel Security/McAfee as RDN/Autorun.worm.gen and by Malwarebytes as Trojan.FakeAlert. Note - this entry adds an illegal HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon "Shell" entry. The value data points to "explorer.exe" (which is a legitimate file located in %Windir% and shouldn't be deleted) and "jushed.exe" (which is located in %AppData%\Microsoft)No
jushed32.exeXjushed32.exeCoolWebSearch parasite variant - also detected as the BIZTEN-L TROJAN!No
pnvifjXjusodl.exeDetected by Sophos as W32/QQRob-ADNNo
spc_wNjuspc.exeJuno Search Enhancements related by United Online, IncNo
JussDropUtilityUJussDrop.exeRelated to DropShots Inc. A subscription based service for family to connect, converse and share photos and videosNo
just.exeXjust.exeDetected by Malwarebytes as Trojan.Banker.Gen. Note - the file is located in %UserStartup% and its presence there ensures it runs when Windows starts - see hereNo
JustCloudUJustCloud.exeJustCloud online backup solution by Just Develop It - "will automatically backup and protect your photos, documents and more to our Google powered cloud." Detected by Malwarebytes as PUP.Optional.JustCloud. Note - this entry loads from the Windows Startup folder and the file is located in %ProgramFiles%\JustCloud. If bundled with another installer or not installed by choice then remove it, removal instructions hereNo
Just GesturesUJustGestures.exeJust Gestures by Miroslav Dzurenko - "is an easy and elegant way to enhance your mouse with endless possibilities. The main idea is to get maximum efficiency out of your mouse and use the keyboard as little as possible. The program allows you to create mouse gestures with user-defined actions; you can use mouse movements and click combinations. Just Gestures will recognize gestures you perform and invoke the appropriate actions"No
JustinsControlXJustinsComputerHelper.exeDetected by Malwarebytes as Trojan.Agent.E.Generic. The file is located in %AppData%\JustinsComputer HelperNo
JustUrlsNjusturls.exeJustUrls by Eastern Digital Software - "is a Web Page launching program. So useful, you will wonder how you ever got by without it! The program is designed to get you to your favorite URL's easily and quickly without any fuss"No
JustVoipNJustVoip.exeJustVoip - free internet telephony utility using the VoIP (Voice over Internet Protocol). Call online friends for free and regular phones either for free (limited use) or low rates. One of a number provided by Betamax - the others generally have different rate plans. Similar to the more popular SkypeYes
Java Update ManagerXjutched.exeDetected by Trend Micro as WORM_PUSHBOT.TAF and by Malwarebytes as Trojan.AgentNo
jutsuXjutsu.exeDetected by Sophos as W32/Rbot-LSNo
juzchedXjuzched.exeDetected by Sophos as Troj/Zlob-ATO and by Malwarebytes as Trojan.BankerNo
Jv16pt Network ResidentUjv16pt_network.exejv16 PowerTools network resident program. Only needed if you are using the program's network featuresNo
HKLMXjva1.exeDetected by Malwarebytes as Backdoor.HMCPol.Gen. The file is located in %System%\System32No
HKCUXjva1.exeDetected by Malwarebytes as Backdoor.HMCPol.Gen. The file is located in %System%\System32No
PLUGIN OPERATORSXjvcrsss.exeDetected by Intel Security/McAfee as RDN/Generic BackDoor and by Malwarebytes as Backdoor.Messa.ENo
javasunXjvcsun.exeDetected by Malwarebytes as Trojan.Agent. The file is located in %System%No
JvcHostXjvcsvc32.exeDetected by Sophos as W32/Agobot-AIUNo
Microsoft CorporationXjview.exeDetected by Sophos as W32/Rbot-AOD and by Malwarebytes as Backdoor.AgentNo
Rundll32Xjviwe.exeDetected by Malwarebytes as Trojan.Agent. The file is located in %Windir%No
JVM0XJVM0.exeDetected by Avira as TR/Dldr.Delf.awl. Note - this entry loads from the HKLM\Run kay and the file is located in %System%No
JVM0.exeXJVM0.exeDetected by Avira as TR/Dldr.Delf.awl. Note - the file is located in %AllUsersStartup% and its presence there ensures it runs when Windows startsNo
jvms.exeXjvms.exeAdded by the ORCU.B TROJAN!No
Adobe FontsXjvschd.exeDetected by Malwarebytes as Trojan.Downloader. The file is located in %Windir% - see hereNo
SunJavaUpdateSched16Xjvshed.exeDetected by Symantec as W32.Ackantta.G@mm and by Malwarebytes as Trojan.DownloaderNo
[random]Ujvsystem32.exeDetected by Malwarebytes as PUP.Optional.JavaLive. The file is located in %ProgramFiles%\JavaLive! Manager. If bundled with another installer or not installed by choice then remove it. Also detected by Microsoft as Trojan:Win32/Tivmonk.BNo
AXjvupdtr32.exeDetected by Intel Security/McAfee as RDN/Generic BackDoor and by Malwarebytes as Backdoor.Agent.DCGenNo
jvsoftXjvvo.exeDetected by Trend Micro as WORM_AUTORUN.ATQ and by Malwarebytes as Spyware.OnlineGamesNo
MDRCKKXJvWsGU.exeDetected by Intel Security/McAfee as RDN/Generic PWS.y!ut and by Malwarebytes as Backdoor.XTRat.ENo
jwXjwbrowser.exeDetected by Dr.Web as Trojan.Siggen6.4877 and by Malwarebytes as Trojan.Downloader.ENo
wintask32XJwintask.comDetected by Sophos as W32/Nafbot-A and by Malwarebytes as Worm.P2PNo
JW ManagerXjwmngr.exeDetected by Sophos as W32/Delbot-GNo
Microsoft Driver SetupXJwrb.exeDetected by Sophos as W32/AutoRun-AOB and by Malwarebytes as Worm.PalevoNo
jxef1104Xjxef1104.exeDetected by Sophos as W32/Xipi-ANo
JXL RadioXjxl.exeDetected by Sophos as W32/Rbot-EBENo
JufualtXjxx2.exeDetected by Trend Micro as WORM_SDBOT.BTG and by Malwarebytes as Backdoor.BotNo
jyczozeszexaXjyczozeszexa.exeDetected by Intel Security/McAfee as BackDoor-FAGP!486358B665D3 and by Malwarebytes as Trojan.Agent.USNo
jyfzanicogobXjyfzanicogob.exeDetected by Intel Security/McAfee as RDN/Generic Dropper!qi and by Malwarebytes as Trojan.Agent.USNo
jypozimqeapeXjypozimqeape.exeDetected by Malwarebytes as Trojan.Agent.US. The file is located in %UserProfile% - see hereNo
ba2dXjywoktpy.exeDetected by Malwarebytes as Malware.Packer.T. The file is located in %System%No
jyzqajyjynalXjyzqajyjynal.exeDetected by Intel Security/McAfee as RDN/Downloader.a!qh and by Malwarebytes as Trojan.Agent.USNo
jzvfvsqpcXjzvfvsqpc.exeDetected by Sophos as Troj/Agent-GWPNo
TaskmanXjzwmgw.exeDetected by Malwarebytes as Worm.Palevo. Note - this entry adds a HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon "Taskman" entry which loads the file "jzwmgw.exe" (which is located in %AppData%)No
[random]Xj[6 random characters].exeDetected by Sophos as W32/Brontok-AINo

Notes & Warnings

If you can help identify new entries and verify/identify those entries with a "?" status (especially hardware specific - such as laptops and motherboards) then please E-mail us (startups_at_pacs-portal_dot_co_dot_uk).

"Status" key:

Variables:

DISCLAIMER: It is assumed that users are familiar with the operating system they are using and comfortable with making the suggested changes. We will not be held responsible if changes you make cause a system failure.

WARNING: This is NOT a list of tasks/processes taken from the Task Manager (CTRL+SHIFT+ESC) "Processes" tab. This displays some startup programs AND other background tasks and "Services". These pages are concerned with startup programs from the common startup locations shown above ONLY. Please do not submit entries collected from this method as they will not be used. For a list of tasks/processes you should try the list at PC Pitstop, the Process Library from Uniblue or one of the many others now available.

Therefore, before ending a task/process via CTRL+SHIFT+ESC just because it has an "X" recommendation, please check whether it's in the registry or common startup locations first. An example would be "svchost.exe" - which doesn't appear in either under normal conditions but does via CTRL+SHIFT+ESC. If in doubt, don't do anything.

To avoid the database becoming too large, all malware entries are only shown using the registry version which is common to all Windows versions. Otherwise there would be multiple entries for popular filenames that viruses often use - such as "svchost.exe" above for example. Multiple malware can also use the same start-up entries, in this case only those with significant differences (such as file location) are repeated in this database.

As more than 25K entries in this database related to malware you should use a quality internet security package. Which ever you choose, keep it updated and get the latest version at least every two years.

There are a number of virus and malware entries listed in this database where specific removal instructions haven't been given. If this is the case then you could try ComboFix, a program written by sUBs that can remove many different types of Trojans and Worms. See here for a tutorial on how to use the program.

NOTE: A number of entries are repeated due to the way that different operating systems display startup items. For example, WinMe lists "POPROXY.EXE" as "Norton eMail Protect" in both MSCONFIG and the registry whereas WinXP lists it as "Poproxy" in MSCONFIG and "Norton eMail Protect" in the registry.

SERVICES: "Services" from the Windows 8/7/Vista/XP/2K/NT operating systems are not included. We fully understand that some programs with these OS's use "Services" as an alternative to load their component parts at startup but these are handled in a different way. We recommend you try BlackViper for information on services for the relevant operating systems.

Copyright

Presentation, format & comments Copyright © 2001 - 2017 Pacman's Portal
Portions Copyright © Peter Forrest, Denny Denham, Sylvain Prevost, Tony Klein, CastleCops & Bleeping Computer
Powered by Malwarebytes
All rights reserved

Valid XHTML 1.0 Transitional

Privacy Policy Site Map Home