Did you read the discussion topic "How To Remove Your Norton Products
can be related to F-Secure Anti-virus. Is that what you're using now?
Anytime you come across a suspicious file or one that you do not recognize, search the name using Google or the following links:BC's File DatabaseBC's Startup Programs DatabaseFile Research CenterProcessLibrary.comThreatExpert Malware Search
Most of the processes in Task Manager will be legitimate as shown in these links.
• List of common system processes found in XP's Task Manager
• Common Processes found in XP's Task Manager
• How To Determine what Services are running in Windows XP
Determining whether a file is malware or a legitimate process sometimes depends on the location (path) it is running from. One of the ways that malware tries to hide is to give itself the same name as a critical system file. However, it then places itself in a different location on your computer. A file's properties may give a clue to identifying it. Right-click
on the file, Properties
and examine the General and Version tabs.
If you cannot find any information, the file has a legitimate name but is not located where it is supposed to be, or you want a second opinion, submit it to jotti's virusscan
. In the "File to upload & scan
" box, browse to the location of the suspicious file and submit (upload) it for scanning/analysis.
-- Then post back with the results of the file analysis.