Login or sign up Lost password?
Login or sign up
If bundled with another installer or not installed by choice then remove it Universal Media Server is a DLNA-compliant UPn P Media Server. If bundled with another installer or not installed by choice then remove it Unfriend Alert by Fun Technology - lets you know who unfriended you on Facebook. Note - do not confuse with the legitimate entry associated with automatic virus definition and software updates/upgrades for older versions of Mc Afee Virus Scan - whose filename is "Mc Update.exe"Updater for the Windows Essentials Codec Pack by Media Codec. (2) Part of the ASUS Update Windows based BIOS update utility included with some ASUS motherboards. If bundled with another installer or not installed by choice then remove it Update checker for Squeaky Chocolate products. Browser - which "is designed to maximize your enjoyment with the Rogers Yahoo! Note - this entry modifies the legitimate HKLM\Software\Microsoft\Windows NT\Current Version\Winlogon "Userinit" value data to append the file "explrer.exe" (which is located in %Windir%\Help\Corporate) to the default "userinit.exe" (which is located in %System% and shouldn't be deleted)Detected by Intel Security/Mc Afee as RDN/and by Malwarebytes as Hijack. Note - this entry modifies the legitimate HKLM\Software\Microsoft\Windows NT\Current Version\Winlogon "Userinit" value data to append the file "exproler.exe" (which is located in %Windir%) to the default "userinit.exe" (which is located in %System% and shouldn't be deleted)Detected by Intel Security/Mc Afee as RDN/Generic Back Door and by Malwarebytes as Hijack. Note - this entry modifies the legitimate HKLM\Software\Microsoft\Windows NT\Current Version\Winlogon "Userinit" value data to append the file "FACEBOOK.exe" (which is located in %Common Favorites%\FACEBOOL) to the default "userinit.exe" (which is located in %System% and shouldn't be deleted)Detected by Intel Security/Mc Afee as RDN/and by Malwarebytes as Hijack. Note - this entry modifies the legitimate HKLM\Software\Microsoft\Windows NT\Current Version\Winlogon "Userinit" value data to append the file "file.exe" (which is located in %Common App Data%\Microsoft\Windows\Start Menu (10/8/7/Vista) or %All Users Profile%\Start Menu (XP)) to the default "userinit.exe" (which is located in %System% and shouldn't be deleted)Detected by Malwarebytes as Hijack. Note - this entry modifies the legitimate HKLM\Software\Microsoft\Windows NT\Current Version\Winlogon "Userinit" value data to append the file "flash.exe" (which is located in %User Temp%) to the default "userinit.exe" (which is located in %System% and shouldn't be deleted)Detected by Malwarebytes as Hijack. Note - this entry modifies the legitimate HKLM\Software\Microsoft\Windows NT\Current Version\Winlogon "Userinit" value data to append the file "Flash Player.exe" (which is located in %My Documents%\Flash) to the default "userinit.exe" (which is located in %System% and shouldn't be deleted)Detected by Intel Security/Mc Afee as RDN/Generic.bfr!