Solved

ddcvt.exe

Posted on 2006-11-11
2
294 Views
Last Modified: 2013-12-04
My System details are Compaq Presario P4, 256 MB RAM, XP-SP2 (patched uptodate), ZoneAlarm Free 6.5, AVG Free 7, Ewido Anti-spyware 4.0, DiamondCS ProcessGuard Free 3.405.  I have just observed the presence of "C:\Windows\System32\ddcvt.exe" both in ZA's Program Control and ProcessGuard's Security tab.  A google search provides no information.

What is this ddcvt.exe please?

0
Comment
Question by:abanerji
2 Comments
 
LVL 97

Accepted Solution

by:
war1 earned 125 total points
ID: 17921502
Greetings, abanerji !

ddcv.exe seems to be an unknown process at this time.
http://www.spywaredata.com/spyware/malware/ddcvt.exe.php

If it is not causing you any problem, you can leave it alone.

If you want to remove it, rename the file to ddcvt.bak, and restart the computer. See if the change any program.

Best wishes!
0
 

Author Comment

by:abanerji
ID: 17924556
Thank you for your comment.

Meanwhile, I had posted at castlecops too and this is what they say
(http://www.castlecops.com/t171534-ddcvt_exe_file.html). It's apparently part of GPL
Ghostscript, which I remember came with my pdf creator.

I have also since done online scan of the file at VirusTotal, Jotti, and Norman Sandbox, and
all engines say the file is clean.

Anyway, in today's cyberworld, one has to be paranoid I feel :-)

0

Featured Post

Free Tool: Site Down Detector

Helpful to verify reports of your own downtime, or to double check a downed website you are trying to access.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Advantages and dis-advantages of UAC 27 100
Excel file "Document not saved" 8 130
Login to computer through Admin Priviligies 9 102
Sweet32 Vulnerability in Microsoft IIS7.5 6 920
Recently, a new law in my state forced us to get a top-to-bottom analysis of all of our contract client's networks. While we have documentation, it was spotty at best for some - and in any event it needed to be checked against reality. That was m…
The term "Bad USB" is a buzz word that is usually used when talking about attacks on computer systems that involve USB devices. In this article, I will show what possibilities modern windows systems (win8.x and win10) offer to fight these attacks wi…
Finds all prime numbers in a range requested and places them in a public primes() array. I've demostrated a template size of 30 (2 * 3 * 5) but larger templates can be built such 210  (2 * 3 * 5 * 7) or 2310  (2 * 3 * 5 * 7 * 11). The larger templa…

809 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question