Search Results
(displaying 150 results)
(displaying 150 results)
Name | Filename | Description | Status |
MsWerr | ctfmon.dll | Added by the W32.Virut.CF VIRUT! Note: Located in \%WINDIR%\%System%\ | X |
SetUp | ctfmon.exe | Added by the Trojan.Win32.Pasta.fuw Note: Located in \%Program Files%\Windows NT\ | X |
Firewall | ctfmon.exe | Added by a variant of the IRCBOT Note: Located in \%WINDIR%\ Note: Use SDFix under supervision. Not to be confused by the original file in \%WINDIR%\%SYSTEM%\ folder. | X |
ctfmon | ctfmon.exe | Added by the Troj/SDBot-06 Trojan! which allows a remote user to access and control the computer via IRC channels. Note: Located in \%WINDIR%\ Note: Do not confuse with the MS Office file of the same name as described here | X |
ctfmon | ctfmon.exe | Adware responsible for tenmonkey.com popups Note: Located in \%WINDIR%\ Note: do not confuse with the MS Office file of the same name as described here | X |
CTFMon | ctfmon.exe | Added by the Family Kelogger program. Found at hxxp://www.spyarsenal.com/familykeylogger/ (DO NOT GO THERE). The program lets you record to a special file and then view all the keystrokes typed by everyone using your computer. Note: Remember if you did not put this on your computer then someone else did! Note: This Keylogging file is located in \%WINDIR%\%System%\CTF\ | X |
ctfmon.exe | ctfmon.exe | CTFMon is involved with the language/alternative input services in Office XP. CTFMON.exe will continue to put itself back into MSConfig when you run the Office XP apps as long as the Text Services and Speech applets in the Control Panel are enabled. Not required if you don't need these features. For more info on ctfmon See_Here ;en-us;282599 . CTFMON can be disabled from Control Panel, Text & Speech Services. Note: The file will always be located in the \%WINDIR%\System32\ folder. Note: If it is located elsewhere, it will likely be a worm or trojan! | U |
CTFMON.EXE | ctfmon.exe | Added by the Troj/Bckdr-QF TROJAN! Note: Located in \%WINDIR%\System\ Note: Do not confuse with the MS Office file of the same name as described here Note: Read the link, rootkit type stealth involved. | X |
ctfmon.exe | ctfmon.exe | Added by the Trojan.Satiloler.D TROJAN! Note: Located in \%WINDIR%\System\ Note: do not confuse with the MS Office file of the same name as described here Note: Read the link, rootkit type stealth involved. | X |
ctfnnon | ctfmon.exe | Identified as a variant of the Backdoor.Win32.Turkojan.ake malware. Note: located in \%WINDIR%\ Note: Use SDFix under supervision. Note: Please notethat C:\Windows\System32\ctfmon.exe is legitimate and should not be deleted. | X |
ctfmon | ctfmon.exe | Added by the Worm.Win32.AutoRun.ctz Note: Located in \%WINDIR%\ Note: Do not remove the legitimate ctfmon.exe file which is always found in \%WINDIR%\%System%\ | X |
Windows Live Messenger 8.12 | ctfmon.exe | Added by a W32/LiPark-A WORM! Note: Located in \%User%\ Note: Do not remove the legitimate program file in \%WINDIR%\%System%\ Note: The worm spread by copying itself into shared folders used by common Peer to Peer (P2P) filesharing applications. | X |
ctfmon.exe | ctfmon.exe eminem.exe | Added by the BHARAT.A WORM! Note: Located in \%WINDIR%\System32\ Note: do not confuse with the MS Office file of the same name as described here Note: Read the link. | X |
hack1x2 | C:\WINDOWS\system32:hlpnod32.exe | A variant of the Backdoor.Bifrose Note: Located in \%WINDIR%\system32:hlpnod32.exe Note: Please note that this infection is an Alternate Data Stream file attached to the legitimate C:\Windows\System32 folder. Do not delete the C:\Windows\System32 folder as Windows will not operate correctly without it. To delete the Alternate Data Stream you should read this tutorial. Note: Use SDFix under supervision. | X |
CTFMON | wscript.exe /E:vbs C:\WINDOWS\system32\winjpg.jpg | Added by the W32/Autorun-ALB ADWARE! Note: Located in \%WINDIR%\%System%\ Note: Spreads via removable media. | X |
Windows host service | Windows host service.exe | Added by the Windows host service Tojan Miner or BitCoin Miner. Note: Located in \%AppData%\Roaming\scwcknzrjf\ | X |
Windows Updates Service | Windows Updates Service.vbe | Added by the Windows Updates Service Virus.vbs.qexvmc.1. Note: Located in \%AppData%\Roaming\Windows Updates Files\ | X |
Windows Service Agent | Windows Service Agent | Added by the Net-Worm.Win32.Kolab.fqg TROJAN! Note: Located in \%WINDIR%\%System%\ | X |
Microsoft | local.exe | Added by an unidentified trojan. Note: Located in \%AppData%\Roaming\ | X |
intelemulator | local.exe | Added by the W32/Agent-SHV worm. Note: Located in \%AppData%\ | X |
BJ Status Monitor Canon PIXMA iP4000 | cnmss Canon PIXMA iP4000 (Local).exe | Related to Canon PIXMA iP4000 High quality Canon Photo Printer status monitor. Note: Located in \%Documents and Settings%\Users\ | U |
Vaganza-XPloit-[User Name]" | [user name].exe | Added by the W32.GAVGENT.A WORM! Note: Located in \%WINDIR%\Java\ | X |
RohosLogon | welcome-user.exe | Related to TESLINE-SERVICE S.R.L Rohos® Logon Key. Note: Located in \%Program Files%\Rohos\ | U |
Local-Settings-of-[User Name] | [User Name].exe | Added by the W32.Gavgent.A WORM! Note: Located in \%WINDIR%\Java\ | X |
asg984jgkfmgasi8ug98jgkfgfb | taskmgr.exe, user.exe, win.exe | Added by the Trojan-Downloader.Suurch TROJAN! Note: Located in \%Documents and Settings%\User name\Local settings\Temp\ Note: The filenames used are the same as some of the operating system files placed in a \Temp folder. Do not remove similar file located in the \%WINDIR%\ or in \%WINDIR%\%System%\ folders. | X |
user logon | user logon.exe | Added by the PAHATIA.A WORM! | X |
play ooze | user grim.exe | Added by and unidentified WORM or TROJAN! | X |
BbInstallUser | Bluebeam Admin User.exe | Related to Bluebeam Software PDF Revu Standard Edition is the ideal PDF solution for firms that need a smart, simple and affordable solution to create, view, markup, and edit PDF files. Note: Located in \%Program Files%\Common Files\Bluebeam Software\Pushbutton PDF\ | U |
WinShowUpdate | copy C:\WINDOWS\winshow.new C:\WINDOWS\winshow.dll | Winshow parasiate related - from the "RunOnce" keys it replaces "winshow.dll" with a new version | X |
Windows System32 Kernel | system32.exe | Added by the W32/SDBOT-AAT WORM! | X |
Microsofot x386 System Monitor | system32.exe | WORM_WOOTBOT.M | X |
screw | system32.exe | Identified by Sophos as Worm W32/VB-DWN Note: Located in \%WINDIR%\ | X |
Sygate Personal Firewall | system32.exe | Added by the RBOT.VI WORM! | X |
System Support | system32.exe | Added by the W32/RBOT-AHA WORM! | X |
System32 | System32.exe | Added by the MARI, SYSXXX and other VIRUSES! | X |
System32 | system32,1.exe | worm or trojan, as yet unidentified | X |
system32 | system32.exe | Added by the Troj/Bancban-JD TROJAN! Note: The executable is system32.exe located in the C:\Windows (95/95/ME/XP) or C:\WINNT (NT/2000) directory-- this is not the system32 folder! | X |
system32.exe | system32.exe | Added by the Backdoor.Graybird.P TROJAN! Note: This worm/trojan file is found in the Windows or Winnt folder. | X |
SystemSAS | System32.exe | Added by the KWBOT.C VIRUS! | X |
DriverPath | system32.exe | Added by the Troj/Prorat-S TROJAN! Note: This trojan file is found in the Windows or Winnt folder. | X |
Win32 | system32.vbs | Added by the VBS.SWERUN VIRUS! | X |
Windows Explorer | system32.exe | Added by the W32/Rbot-AJH WORM! | X |
Microsoft Update | system32.exe | Added by an unidentified TROJAN! of the Sdbot family. Note: This worm\trojan is located in C:\Windows\System (Win9x/Me), C:\%WINDIR%\System32 (XP/WinNT/2K) | X |
msn | system32.exe | Added by the KITRO.A VIRUS! | X |
Windows-System | System32.exe | Added by the LOGPOLE.C VIRUS! | X |
Torrent Management Service | system32.exe | Added by a variant of the IRCBOT TROJAN! See here | X |
ioroxxo microsoft sux | system32.exe | Added by a variant of the Rbot family of worms and IRC backdoor Trojans. Note: Located in \%WINDIR%\System32\ | X |
Winsock2 driver | SYSTEM32.EXE | Added by the W32/Spybot-EG WORM! | X |
ruin | system32.exe | Added by the TROJ/DELF-JM TROJAN! | X |
Winsock32 driver | system32.exe | Troj/IRCBot-VT Note: Read the link, allows remote access | X |
svehost | system32:svehost.exe | Identified as a Backdoor:Win32/Poison.M by Microsoft. Note: This is an alternate data streams. Note: Located in \%WINDIR%\%System%\ | X |
svchosts | system32:svchosts.exe | Identified as a variant of the Trojan.Win32.VB.dqk Note: Located in \%WINDIR%\System32\ Note: ADS infection [note]Use SDFix under supervision. | X |
svchost | system32:svchost.exe | Identified as a variant of the Backdoor.Win32.Poison malware. This infection is a Alternate Data Stream file which requires certain tools to remove. Get help from a malware removal forum. Note: Use SDFix under supervision. | X |
Poison.Ivy | system32:Poison Ivy.exe | A variant of the Backdoor.Win32.Poison.cpb Backdoor:W32/PoisonIvy is a family of backdoors that give a remote user extensive access to an infected computer. Note: Please note that this infection is an Alternate Data Stream file attached to the legitimate C:\Windows\system32 folder. Do not delete the C:\Windows\system32 folder as Windows will not operate correctly without it. Note: Use SDFix under supervision. | X |
xp v7.exe | system32:winxp7.exe | Added by the Backdoor:Win32/Poisonivy.H Note: Located in \%WINDIR%\%System%\ Note: This is an ADS - Alternate Data Streams DO NOT REMOVE the %System%\ folder. | X |
Windows modez Verifier | Windows-.exe | Added by the W32/Rbot-DIO WORM! Note: Located in \%WINDIR%\System32 Note: Use SDFix under supervision. | X |
Microsoft IT Update | windows.exe | Added by the W32/Rbot-JM WORM! Note: Located in \%WINDIR%\System32\ | X |
Windows Security Service | windows.pif | Added by the W32/Rbot-AMG WORM! Note: Located in \%WINDIR%\System32 Note: Use SDFix under supervision. | X |
Windows mod Verifier | Windows-mod.exe | Added by a variant of the IRCBOT Note: Located in \%WINDIR%\System32\ Note: Use SDFix under supervision. | X |
Windows Services | windows.exe | Added by a variant of the IRCBOT Note: Located in \%WINDIR%\ Note: Use SDFix under supervision. | X |
Windows Load | windows.com | Note: ?? | ? |
Windows Update | windows.exe | Added by the W32/RBOT-RB WORM! Note: Located in \%WINDIR%\System32\ | X |
Application | windows.exe | Added by the Trojan/Python.a Note: Located in \%Root%\Users\Public\Documents\ | X |
WINDOWS | \windows.exe | Added by the Troj/Monbot-A TROJAN! Note: Located in \%WINDIR%\System32\ | X |
WRMVan | Windows.exe | Added by the W32/AutoRun-BGD WORM! Note: Located in \%Program Files%\ Note: Spreads via removable media. | X |
WINDOWS SYSTEM | windows.exe | Added by the Worm:Win32/Gaobot] Note: Located in \%WINDIR%\%System%\ Note: The Hosts file may have been modified. | X |
windowspis | windows.exe | Added by the Trojan-Downloader.Win32.Genome.akll Note: Located in \%WINDIR%\%System%\ | X |
InternetExplorer2 | windows.exe | Added by the W32/Sdbot-CZP WORM! Note: Located in \%WINDIR%\System32\ Note: Use SDFix under supervision. | X |
Rundll32 | Windows.exe | Added by the Trojan.PWS.QQPass.E VIRUS! Note: Located in \%Program Files%\ | X |
Start | windows.vbs | Homepage hijacker | X |
NDIS Adapter | windows.exe | Added by the W32/FORBOT-BR WORM! Note: Located in \%WINDIR%\System32\ | X |
WIN | windows.exe | Added by the W32.Reatle.C@mm WORM! Note: Located in \%WINDIR%\System32\ | X |
Microsoft Windows Updata | windows.exe | Added by an unidentified TROJAN! of the Sdbot family. Note: Located in \%WINDIR%\System32 Note: Use SDFix under supervision. | X |
Windows | Windows.exe | Added by the KAZMOR, BOBBINS& ALADINZ.D VIRUSES! | X |
Docker for Windows | Docker for Windows.exe | Related to Docker Inc aN integrated container security for legacy and cloud-native applications. Note: Located in \%Program Files%\Docker\Docker\ | U |
Windows 32 Update | Windows-Update.exe | Added by a variant of the Win32/Rbot Note: Located in \%WINDIR%\System32\ | X |
LiveUpdate | [Windows username]05.exe | Added by the LINEAGE TROJAN! | X |
Internet Explorer | WINDOWS.crypted.exe | Added by the Backdoor.Win32.Poison.pg Note: Located in \%ROOT%\ | X |
Microsoft Windows | Microsoft Windows.hta | HTA file which creates an executable on the hard drive which subsequently proceeds to download files from a malware site! | X |
iseeu.exe | WINDOWS:iseeu.exe | A variant of the Backdoor:W32/PoisonIvy Backdoor:W32/PoisonIvy is a family of backdoors that give a remote user extensive access to an infected computer. Note: Please note that this infection is an Alternate Data Stream file attached to the legitimate C:\Windows folder. Do not delete the C:\Windows\ folder as Windows will not operate correctly without it. Note: Use SDFix under supervision. | X |
Windows XP SP2 KeyGen | Windows XP SP2 KeyGen.exe | Added by the W32/Tibick-C WORM! Note: Located in \%WINDIR%\MSVIEW\ | X |
Windows spyware remover | Windows-spyware.exe | Added by a variant of the IRCBOT Note: Located in \%WINDIR%\System32\ Note: Use SDFix under supervision. | X |
WINDOWS HOST | Windows Host.exe | Added by the Windows Host.exe Malware. Note: Located in \%ProgramData%\Windows Host\ | X |
Windows Anti Verifier | Windows-Anti.exe | Added by the Win32/Rbot.ETT WORM! Note: Located in \%WINDIR%\System32\ | X |
Explorer | Windows Explorer.exe | Added by the W32/SillyFDC-I WORM! Note: This trojan is located in C:\%WINDIR%\ Note: copies itself to: (User)\Documents\Top Pictures.exe and (User)\My Documents\New Folder.exe. May also copy itself to drives A: and B:. | X |
Windows Clean-Up Pro | WINDOWS CLEAN-UP PRO.Exe | WINDOWS CLEAN-UP PRO Rogue anti-spyware program. | X |
Windows Genuine Check | Windows Genuine Check.exe | Added by a variant of the RBot Note: Located in \%WINDIR%\System32\ Note: Use SDFix under supervision. | X |
DocFetcher-Daemon | docfetcher-daemon-windows.exe | Related to DocFetcher, an Open sourve program. It allows you to search the contents of files on your computer.. Note: Located in \%Program Files%\DocFetcher\ | U |
system34 | Windows External Security Update.exe | Detected as IM-Worm.Win32.VB.ev. WORM! Note: Located in \%WINDIR%\SoftwareProtection\ | X |
WinUpdate | :Microsoft Office Update for Windows XP.sys | Identified by Sophos as VBS/AutoRun-UC Note: Located in \%WINDIR%\ | X |
BootRacer | BootRacer measures your Windows boot timebootrace.exe | Related to Greatis Software BootRacer measures your Windows boot time. Note: Located in \%Program Files%\BootRacer measures your Windows boot time. | N |
Microsoft Service | service.exe | Added by a variant of the Backdoor.IRC.Bot TROJAN! | X |
Windows Services | service.exe | Added by the W32.Randex.R WORM! Note: Located in \%WINDIR%\system32\ | X |
pcreg | service.exe | Added by the pcreg Optional.Service.InfoSpaceSales.L Note: Located in \%Program Files%\pcreg\ | X |
Win32 Svr | service.exe | Added by the AdTool.Win32.VB.a Note: Located in \%Program Files%\Common Files\Win32 Svr\ | X |
Windows Taskmanager | service.exe | Added by the Backdoor.Win32.Rbot.sad Note: Located in \%WINDIR%\%System%\ | X |
service.exe | service.exe | Added by a variant of the SDBBOT Note: Located in \%WINDIR%\System32\drivers\ Note: Use SDFix under supervision. | X |
Windows Update | service.exe | Identified by Microsoft as Trojan:Win32/Ircbrute. Information at Threat Expert Note: Located in %ProgramFiles%\Common Files\System | X |
MSN | service.exe | Added by a variant of the IRCBOT Note: Located in \%WINDIR%\ Note: Use SDFix under supervision. | X |
WinDLL (service.exe) | service.exe | Identified as a variant of the Spammer:Win32/Cutwail.gen!B malware. Note: Located in \%WINDIR%\ Note: Use SDFix under supervision. | X |
Myapp | service.exe | Homepage hijacker | X |
Service.exe | Service.exe | Added by the Servedby.Advertising.com SPYWARE! | X |
service manager | service.exe | Added by the TROJ_DONBOMB.A TROJAN! Note: Located in \%WINDIR%\ | X |
Service Controller | service.exe | Added by the Trojan.Prevert TROJAN! Note: Located in \%WINDIR%\System32\ | X |
Service | Service.pif | Added by the W32/Assiral-C TROJAN! Note: Located in \%WINDIR%\System32\ | X |
Service | service.exe | Added by the Backdoor.IRC.Aladinz.H TROJAN! Note: Located in \%WINDIR%\System32\cab\ | X |
Windows Helper | service.exe | Added by a variant of the IRCBOT Note: Located in \%WINDIR%\System32\ Note: Use SDFix under supervision. | X |
r_server | service.exe | Added by the Troj/Multidr-CP TROJAN! Note: Located in \%WINDIR%\System32\ | X |
Registry Value Name | service.exe | Added by the W32/Rbot-AHT WORM! Note: Located in \%WINDIR%\System32\ | X |
Service Process | service.exe | Added by the Troj/Dcmbot-C TROJAN! Note: Located in \%WINDIR%\system32\Config\ | X |
MSN BETA | service.exe | Added by the WORM_RBOT.AUU TROJAN! Note: Located in \%WINDIR%\System32\ | X |
Config | service.exe | Added by the W32.Israz.B@mm WORM! Note: Located in \%WINDIR%\System32\ | X |
Configuration Loader | Service.exe | Added by the W32.HLLW.Gaobot.AO WORM! Note: Located in \%WINDIR%\System32\ | X |
Microsoft Update | service.exe | Added by a variant of the Worm.Rbot.ACDG family of IRC Backdoor trojan. Note: Located in \%WINDIR%\System32\ Note: Use SDFix under supervision. | X |
Microsoft Security Monitor Process | service.exe | Added by a variant of the IRCBOT Note: Located in \%WINDIR%\ Note: Use SDFix under supervision. | X |
MDNS | service.exe | Identified by Symantec antivirus as a variant of the Adware.Mirar malware. This infection should not be confused with the legitimate C:\Windows\System32\services.exe file. The bad file is service.exe NO "S" in service. Note: Use SDFix under supervision. | X |
foxwudy9912 | service.exe | Added by the Troj/Bancos-BT TROJAN! Note: Located in \%WINDIR%\System32\ Note: Read the link, keylogger/password stealing trojan(s) involved. | X |
SYS_CLEAN | Service.exe | Added by the W32.HLLW.Flopcopy WORM! Note: Located in \%WINDIR%\System32 | X |
Windows smss service | service.exe | Added by the Troj/Agent-FPY TROJAN! Note: Located in \%WINDIR%\system32\dllcache\ | X |
Windows Services | service.exe | Added by a variant of the IRCBOT Note: Located in \%WINDIR%\ Note: Use SDFix under supervision. | X |
Windows svchost | service.exe | Added by a variant of the IRCBOT Note: Located in \%WINDIR%\ Note: Use SDFix under supervision. | X |
Clean up | service.exe | Added by the Troj/Agent-FPY TROJAN! Note: Located in \%WINDIR%\System32\drivers\etc\ | X |
Windows Screensaver | Service.exe | Added by the W32.Kelvir.P or W32/Kelvir-L WORMS! Note: Located in \%WINDIR%\ | X |
service.exe | service.exe | Added by a variant of the Trojan.Win32.Buzus.fjx TROJAN! Note: Located in \%WINDIR%\System32\ Note: Use SDFix under supervision. | X |
Windows Net Cfg | service.exe | Added by an unidentified TROJAN!Win32/Rbot Family Note: Located in \%WINDIR%\System32 | X |
Win32 USB2.0 Driver | service.exe | Added by the W32/Sdbot-QF WORM! Note: Located in \%WINDIR%\System32 | X |
systr2 | SERVICE.exe | Added by the W32/VB-DQY WORM! Note: Located in \%WINDIR%\System32 | X |
Sygate Personal Firewall | service.exe | Added by the Win32/Rbot WORM! Note: Located in \%WINDIR%\System32 | X |
servicemng | service.exe | Added by the W32/Tame-C WORM! Note: Located in \%WINDIR%\System32 | X |
Windows_Serivce | SERVICE.exe | Added by the WORM_WOOTBOT.AH WORM! Note: Located in \%WINDIR%\system32\ | X |
Microsoft Updates | service.exe | Identified as a variant of the Backdoor.Win32.Poison.hpt Note: Located in \%WINDIR%\System32\ Note: Use SDFix under supervision. | X |
PMCS | PMC.Service.Main.exe | Related to Media_Center_Service from Pinnacle Systems. Note: Located in \%Program Files%\Pinnacle\Shared Files\Programs\MediaCenterService\ | U |
Act.Outlook.Service | Act.Outlook.Service.exe | Related to Act for Windows fax software from j2 Global Communications. When this process is active, each time a users send a message, a copy of it is created in C:\Documents and Settings\\Application Data\ACT\ACT for Windows 9\HistoryQueue as well as a identical file with an XML extension. Note: Located in \%Program Files%\ACT\Act for Windows\ | U |
desk-top-service | desk-top-service.exe | Note: ?? | ? |
Act.Outlook64.Service | Act.Outlook64.Service.exe | Related to Sage Software Act for Windows. Note: Located in \%Program Files%\ACT\Act for Windows\ | U |
Services | back32.exe ...service.exe | Added by an unidentified VIRUS! Back32.exe is the baddie whose purpose is to HIDE the MIRC32 server in service.exe | X |
WindowsNT Service | WindowsNT Service.exe | Added by IRCBot Note: Located in \%AppData%\ | X |
Audio Service.exe | Audio Service.exe | Identified by Kaspersky as Worm.Win32.AutoRun.gtw. Information at Threat Expert Note: Located in %AppData%\Microsoft\ | X |
Bentley License Service | Bentley.Licensing.Service.exe | Related to Bentley Systems, Inc. Bentley Clien License Service. Note: Located in \%Program Files%\Common Files\Bentley Shared\CONNECTION Client\LicService\ | U |
Compaq Computer Security | Rundll32.exe SECURE32.CPL, Service | Note: ?? | ? |
Articulate 360 Desktop Service | Articulate 360 Desktop Service.exe | Related to Articulate Global, Inc. e‑learning authoring tool for every project. Note: Located in \%Program Files%\Articulate\360\Desktop Service\ | U |
Windstream Service Agent.exe | Windstream Service Agent.exe | Related to Windstream Communications Internet Service diagnostic tool. Note: Located in \%Program Files%\windstream\service agent\ | N |
ACTSyncServiceUI | Act.Framework.Synchronization.Servi ce.UI.exe | Related to SWIFTPAGE ACT! LLC ACTSyncServiceUI. Note: Located in \%Program Files%\ACT\ACT for Windows\ACT Network Sync\ | U |
Recording Server Manager | VideoOS.Recorder.Service.TrayContro ller.exe | Related to Milestone systems surveillance system. Note: Located in \%Program Files%\Milestone\XProtect Event Server\ | U |
LicCtrl | rundll32.exe [path] MMFS.DLL,Service | Part of the eLicense Copy Protection scheme employed by some software and games. When this service is not running, the eLicense wrapper is unable to extract and execute the program | U |
Management Server Manager | VideoOS.Server.Service.TrayControll er.exe | Related to Milestone systems surveillance system. Note: Located in \%Program Files%\Milestone\XProtect Event Server\ | U |
SmsDiscount | VoIP telephone call service.SmsDiscount.exe | Related to SMS Discount VoIP telephone call service. Note: Located in \%Program Files%\VoIP telephone call service. | N |
MMSystem | "%\Windows%\rundll32.exe "%System%\mmsystem.dll"", RunDll32" | Added by a FUNNER.A worm infection | X |
HLBackupScheduler | V CAST Backup Scheduler.exe, Backup Assistant Plus Service.exe | Related to Verizon Media Manager for pictures and videos files. Note: Located in \%Program Files%\Verizon V CAST Media Manager\ | U |
Docker Desktop | Docker Desktop.exe , com.docker.service | Related to Docker Inc reliable way to develop Docker apps on Windows. Note: Located in \%Program Files%\Docker\Docker\ | U |