Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

PRxAgent.exe - ttWMIPerf.exe

Posted on 2006-07-18
3
Medium Priority
?
770 Views
Last Modified: 2008-01-09
I am curious is anyone has ever heard of these processes?

PRxAgent.exe
ttWmiPerf.exe

I found them running on my file server today.

It is connected to an EVA 5000 SAN, in case that helps.

I have checked Google - all it returns is a page in a languauge I don't speak.

In addition I have been to the McAfee, Symantec and TrendMicro websites.

Any help would be appreciated.
0
Comment
Question by:Hudson-Advisors
  • 2
3 Comments
 

Author Comment

by:Hudson-Advisors
ID: 17132317
I found the answer.  Tek-Tools Profiler Rx Agent.

0
 

Author Comment

by:Hudson-Advisors
ID: 17132321
Still now sure about the ttWmiPerf.exe
0
 
LVL 32

Accepted Solution

by:
r-k earned 2000 total points
ID: 17134173
You can locate that file on your hard drive. The location and date may give you a clue.

Next, right-click on the file, select Properties -> Version and it may tell you who created the file.

Next, submit that file at this web site: http://www.virustotal.com/en/indexf.html (use the Browse and Send buttons at the upper-right) and they will scan against about 20 AV engines.
0

Featured Post

Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Ransomware, the malware that locks down its victim’s files until they pay up, has always been a frustrating issue to deal with. However, a recent mobile ransomware will make the issue a little more personal… by sharing the victim’s mobile browsing h…
Your business may be under attack from a silent enemy that is hard to detect. It works stealthily in the shadows to access and exploit your critical business information, sensitive confidential data and intellectual property, for commercial gain. T…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…

927 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question