Search Results
(displaying 85 results)
(displaying 85 results)
Name | Filename | Description | Status |
DAEMON Tools | daemon.exe | Related to Daemon Tools - used to map an image-file (.iso, .bin etc) to a virtual CD/DVD-drive. Note: Located in \%Program Files%\DAEMON Tools\ | U |
Daemon Tools | windaemon.exe | Identified by Trend as WORM_AGENT.AESF Note: Located in \%WINDIR%\system32\ | X |
DAEMON Tools Pro Agent | DTProAgent.exe | Related to DAEMON_Tools_Pro CD & DVD emulation software which allows users to make CD/DVD disc images, create a virtual CD / DVD drives and play CDs & DVDs without the need for the physical disc. Note: Located in \%Program Files%\DAEMON Tools Pro\ | U |
DAEMON Tools Lite | daemon.exe | Related to Daemon Tools Lite - used to map an image-file (.iso, .bin etc) to a virtual CD/DVD-drive. Note: Located in \%Program Files%\DAEMON Tools Lite\ | U |
DAEMON Tools-1033 | Daemon.exe | Related to Daemon Tools - used to map an image-file (.iso, .bin etc) to a virtual CD/DVD-drive. Note: Located in \%Program Files%\D-Tools\ | U |
DAEMON Tools Lite | DTLite.exe | DTLite.exe is part of Daemon Tools, a virtual cd/dvd-rom emulator. The application mounts ISO images to a virtual drive without having to burn them to a CD. The application is valid but it is not necessary to run at start up. Note: Located in %ProgramFiles%\DAEMON Tools Lite | N |
Daemon Tools ATAPI driver | daemontools.exe | Added by the Troj/Agent-OTX TROJAN! Note: Located in \%WINDIR%\ | X |
@Hoc Toolbar | AtHoc.exe | One-click activated browsing toolbar used by various web-sites. See here for more info | N |
MSN Toolbar | mswinext.exe | Related to MSN Toolbar Reported to cause high CPU usage. Note: Located in \%Program Files%\msn toolbar\platform\version no.\ | U |
Y'z Toolbar | YzToolBar.exe | " Y'z Toolbar ""allows the user to change the toolbar icons in Explorer and Internet Explorer.The user can also create and add their own themes""" | U |
Switchboard.com Toolbar | AtHoc.exe | Toolbar for the on-line version of Yellow Pages in the US - Switchboard.com | N |
MicroSoft Toolbar | key.exe | Added by the W32/Rbot-AEW Worm! | X |
Authentic-ID Toolbar | wintmr.exe | System Tray access to Child Control parental control software by Salfield | Y |
MicroedSoft Toolbar | Smoked.exe | Added by the W32/RBOT-ALN WORM! | X |
I&F Viewer toolbar | phototoolkitmem.exe | Related to Photo_Toolkit image editing tools. Note: Located in \%Program Files%\Photo Toolkit\ivbar\ | U |
google toolbar | ggtb32.exe | Added by the W32/AGOBOT-RR WORM! | X |
Games toolbar | rundll32.exe [path] tbGame.dll" DllShowTB | Topconverting.com/180Search "Games Toolbar" adware | X |
eBay Toolbar | EBAYTBAR.EXE | eBay Toolbar - reportes as spyware as it "phones home" | X |
EarthLink ToolBar 5.0 | etoolbar.exe | EarthLink Toolbar is a tool to help you get to all of the resources of the internet. EarthLink 5.0 Setup adds a few basic buttons to the Toolbar, but you can delete these or add more buttons any time | N |
Authentic-ID Toolbar | ToolbarATL.dll | Authentic-ID Toolbar | Y |
BigPond Toolbar | bpumTray.exe | Telstra BigPond Toolbar - "Introducing the free and easy to use BigPond Toolbar that is designed to make your internet experience and managing your Telstra internet account a whole lot easier" | U |
IE Menu Extension toolbar | rundll32.exe [path] tbextn.dll DllShowTB | Topconverting.com/180Search "IEMenuExtension" toolbar | X |
Acronis Toolbar Helper | dskclean.dll | Added by the Troj/DskClean-A TROJAN! Note: Located in \%Documents and Settings%\HP_Owner\Local Settings\Application Data\Desktop Cleanup Wizard\ | X |
Panda Security Toolbar Antiphishing | panda2_0dn.exe | Related to Panda Software Antiphishing protection. Note: Located in \%AppData%\panda security toolbar antiphishing\ | Y |
\TOOLS.exe | tools.exe | Lycos SideSearch/Fastfind.org adware | X |
XP Tools | xptools.exe | Related to XPTools_Software integrated suite of powerful PC Utilities to fix, speed up, maintain and protect your computer. Note: located in C:\Program Files\XP Tools\ Note: No longer in service. | U |
OEM Tools 32 | tres32.exe | Added by a RBOT.QB worm infection | X |
VMware Tools | Xplorer.exe | Identified as a malicious trojan horse or bot that may represent security risk for the compromised system and/or its network environment. Information at Threat Expert Note: Located in \%Windir%\ | X |
Windows OEM Tools | winres32.exe | Added by a SPYBOT.FD worm infection | X |
3dfx Tools | 3dfxCmn.dll | Updates the registry with information that can't be held for Voodoo 3/4/5 series graphics cards. Important for owners of these cards | Y |
PSD Tools Channel | ChannelUp.exe | BuddyLinks adware | X |
OEM32 Tools | sres32.exe | W32.SpyBot worm variant | X |
HughesNet Tools | matcli.exe | "matcli.exe is a motive Assistant Command line interface that gathers information about your system's identity like your name email address, city, county, etc and gets written to a log file". HughesNet Help is required to run with the Help and Support program. If you uncheck HughesNet Help and and then run Help and Support it will add another HughesNet Help in the startup menu. If you remove the HughesNet Help in the add/remove program some help menus in help and support will not be available. You decide. Note: Located in \%Program Files%\HughesNet Tools\bin\ | U |
Selection Tools | Selection Tools.exe | Added by the Selection Tools PUA.BubbleDock. Note: Located in \%AppData%\Roaming\WTools\Selection Tools\ | X |
SMART Board Tools | SMARTBoardTools.exe | Related to SMART Technologies SMART Board - Electronic Flip charts. Note: Located in \%Program Files%\SMART Technologies Inc\SMART Board Software\ | U |
Parallels Tools Center | prl_cc.exe | Related to Parallels Software to run Windows programs right on the Mac desktop. Note: Located in \%Program Files%\Parallels\Parallels Tools\ | U |
Disk Essensial Tools | detsvc.exe | A variant of the IRCBot family of worms and IRC backdoor Trojans. Note: Located in \%WINDIR%\System32\ Note: Use SDFix under supervision. | X |
Windows Debugging Tools | updatecfg.exe | Added by the W32/Rbot-AXU WORM! Note: This worm\trojan file is found in the System (95/98/ME) or System32 (NT/2000/XP) folder. | X |
SMART Tray Tools | SMARTSystemMenu.exe | Related to SMART Technologies ULC SMART System Menu. Note: Located in \%Program Files%\SMART Technologies\SMART Product Drivers\ | N |
Free WebSite Tools | ThirtyDayTimer.exe | Related to CoffeeCup Software HTML Editor. Note: Located in \%Program Files%\CoffeeCup Software\CoffeeCup Free DHTML Menu Builder\ | U |
[SMART Floating Tools | FloatingTools.exe | Related to SMART Technologies The Floating Tools toolbar enables you to quickly access frequently used tools and features. Note: Located in \%Program Files%\SMART Technologies\Education Software\ | U |
My Web Search Community Tools | m3IMPipe.exe | Added by MyWay An IE Browser Helper Object used by adware WeSearch to add an IE toolbar to provide search features, and hijack browser search requests to its controlling servers run by MyWay. Note: Located in \%Program Files%\MyWebSearch\bar\1.bin\ | X |
Guardian PC Security Tools | Pfft.exe | Related to PeerGuardian PC Security Tools. An Open Source Program. Note: located in C:\Program Files\Boomerang Software\Guardian PC Security Tools\ | U |
ADSL Diagnostic Tools | mapiicon.exe | System tray access to ADSL modem diagnostic tools. Note: Located in \%WINDIR%\%System%\ | N |
Uplook.Agent.Tools.Assistan t | Uplook.Agent.Tools.Assistant.exe | Related to media-press.tv AG supplying TV and radio programme information to media companies. Note: Located in \%Program Files%\A plus C Systems\uplook\Agent\ | U |
Windows System Update Tools | upds.exe | Added by an unidentified TROJAN! of the Sdbot family. Note: This worm\trojan is located in \%WINDIR%\System (Win9x/Me), \%WINDIR%\System32 (XP/WinNT/2K) | X |
Advanced Tools Check or ADVCHK | ADVCHK.EXE | Checks when you install a new version of a Norton product that you have uninstalled all previous versions. Serves as a reminder if you forget | N |
Shellwin Time Service Tools | winskvc32.exe | Added by a variant of the IRCBOT Note: Located in \%WINDIR%\System32\ Note: Use SDFix under supervision. | X |
PMX Daemon | ico.exe | The ico.exe process provides a system tray icon that you can use to view and change various settings for your mouse. It has been reported to cause problems with some DirectX based games. Disabling it, can cause a loss of some mouse wheel features. Note: Located in \%WINDIR%\System32\ | N |
ESS Daemon | Essd.exe | Related to an ESS based soundacard. Note: Is it required? | ? |
Hot Key Kbd Daemon | SKDAEMON.EXE | Multi-function keyboard driver. Allows the use of programmable keys on mulimedia keyboards. Required if you use the additional keys. Note: Located in \%WINDIR%\%System%\ | U |
LT DAEMON | ltdaemon.exe | Acts as a data spooler for the DSL modem (similar to a cache). Do not uncheck if the DSL modem is being used | Y |
Daemon | DAEMON32.EXE | Pre-loads game profiles for MS Sidewinder game controllers prior to release 2.0 of the software. Recommend upgrade. Available via Start -> Programs | N |
Daemon | daemon.exe c daemon2.exe | Added by the W32.Selotima.A WORM! Note: Located in \%WINDIR%\ | X |
Vista Fax Daemon | Vstdaemon.exe | Related to ImageMAKER Development Inc. Document Management, and other imaging applications. Note: Located in \%Program Files%\Common Files\ImageMAKER\ | U |
DocFetcher-Daemon | docfetcher-daemon-windows.exe | Related to DocFetcher, an Open sourve program. It allows you to search the contents of files on your computer.. Note: Located in \%Program Files%\DocFetcher\ | U |
Sideloadly Daemon | sideloadlydaemon.exe | Related to Sideloadly best way to sideload your favorite games and apps to your iOS device. Note: Located in \%Root%\Sideloadly\ | U |
mobilegeni daemon | DaemonProcess.exe | Added by the mobilegeni PUP (Potentially unwanted program) OpenCandy, Quick Downloader, Conduit and various other monetization programs to bundle with third party installers. Note: Located in \%Program Files%\ | X |
FancyStart daemon | _A1DDD39913A1970387B7B3.exe | Related to ASUSTeK Computer Inc. You should keep FancyStart daemon.lnk in startup if you want to keep the asus logo when your computer starts up or want to change it to another picture or pictures. Note: Located in \%Windir%\Installer\{xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx}\ Note: The filename is random also. | N |
FancyStart daemon | _94E3CE3704FE82FBF49A6A.exe | Related to ASUSTeK Computer Inc. You should keep FancyStart daemon.lnk in startup if you want to keep the asus logo when your computer starts up or want to change it to another picture or pictures. Note: Located in \%Windir%\Installer\{xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx}\ Note: The filename is random also. | N |
Compaq PK Daemon | cpqkl.exe | For Compaq laptops for programming user configurable keys. Not required unless you use them | U |
Windows DNS Daemon | windnsd.exe | Added by the WOOTBOT.AS WORM! | X |
Hot Key Kbd 2690 Daemon | SK9910DM.exe | Multimedia keyboard manager - required if you use any special keys | U |
LSASS Daemon | LSASSd.exe | Added by a variant of the AGOBOT/GAOBOT WORM! | X |
Hot Key Kbd 9910 Daemon | SK9910DM.EXE | Multi-function keyboard driver. Allows the use of programmable keys on mulimedia keyboards. Required if you use the additional keys | U |
com.apple.dav.bookmarks.dae mon | BookmarkDAV_client.exe | Related to Apple Inc used to Sync Internet Explorer\'s or Firefox\'s Bookmark with your iCloud-enabled iPhones, iPads and iPods. Note: Located in \%Program Files%\\Apple\Internet Services\ | Y |
Client Access API Daemon | cwbappcd.exe | IBM iSeries Client Access, see here | U |
Shadow Defender Daemon | DefenderDaemon.exe | Related to SHADOWDEFENDER.COM Shadow Defender can run your system in a virtual environment. Note: Located in \%Program Files%\Shadow Defender\ | U |
Hot Key Keybd 9910 Daemon | SK9910DM.exe | Multimedia keyboard manager - required if you use any special keys | U |
Instant Buzz Daemon | IBDaemon.exe | Instant_Buzz adware | X |
kernel system daemon | ACTIVAT0R.exe | Added by the RANDEX.AW VIRUS! | X |
Keyboard Suite Daemon | PELKBD.EXE | Related to Primax Electronics Ltd. Keyboard Suite Daemon software. Note: Located in \%Windir%\%System%\xManager\ | U |
FANCYS~1, FancyStart daemon | _C4A2FC3E3722966204FDD8.exe | Related to ASUS allows users to change the startup image that appears before Windows loads. More Note: Located in \%Windir%\Installer\{2B81872B-A054-48DA-BE3B-FA5C164C303A}\ | N |
MicrosoftNetwork Daemon for Win32 | NETD32.EXE | Added by the RANDEX.F VIRUS! | X |
Mouse Suite 98 Daemon | pelmiced.exe | Mouse driver. Appears to cause a behaviour where the desktop suddenly flips back up when playing DirectX associated games. Note: Located in \%WINDIR%\%System%\ | N |
Mouse Suite 98 Daemon | ICO.EXE | Found on a Sony Vaio laptop and seems to be related to Mouse Suite 98 Daemon according to the properties. Appears to cause a behaviour where the desktop suddenly flips back up when playing DirectX associated games | N |
Nvidia Control Daemon | nksvc32.exe | Added by the W32/AGOBOT-OV WORM! | X |
Share-to-Web Namespace Daemon | hpgs2wnd.exe | Related to "HP's exclusive Share-to-Web software makes it easy to share content with others through our affiliate Internet websites." In other words an application that allows users to upload scanned images to their personal webpages if desired. Note: Located in \%Program Files%\Hewlett-Packard\HP Share-to-Web\ | N |
Spool Server Daemon | SPOOLSVD32.EXE | Win32.Rbot worm variant | X |
Windows Desktop Daemon | winpadg.exe | Added by a variant of the W32.SPYBOT WORM! | X |
Windows JavaScript Daemon | Winjsd.exe | Added by a WOOTBOT.AF worm infection | X |
Microsoft Network Daemon for Win32 | Netd32.exe | Added by the SDBOT.R WORM! | X |
Microsft Remote Procedure Daemon | msrpcd.exe | Added by a variant of the IRCBOT Note: Located in \%WINDIR%\System32\ Note: Use SDFix under supervision. | X |
Server Daemon Host Manager | sdhost.exe | Added by a variant of the W32/IRCbot.BGA.worm family of worms and IRC backdoor Trojans. Note: Located in \%WINDIR%\System32\inetsrv\ | X |
Windows Print Monitor Daemon | (Random Name).exe | Added by an unidentified TROJAN! of the Sdbot family. Note: This worm\trojan is located in C:\Windows\System (Win9x/Me), C:\%WINDIR%\System32 (XP/WinNT/2K) | X |