Programs which do not fit the other categories. There is no sign of their installation until after the installation is completed and the program is present in the system. This category includes items looked for in the Hosts file as a part of a redirected Hosts file hijack.
Found on http://www.encyclo.co.uk/local/20577