Is this an HP computer? If not, do you have an HP printer installed with your system? The reason I asked is that HP computers use the following files which can be a known source of some phantom processes:Hpcmpmgr.exe
is installed on most computers to support HP products, such as the HP Photosmart, Deskjet, and All-In-One printers. Hpcmpmgr.exe is the main process belonging to the HP Component Manager and is related to their multimedia products. This program installs as a startup but is non-essential process to the running of the system but it appears to call upon two other programs: hptskmgr.exe and HPOSM.exeHPOSM.exe
is the HP Solution Manager Module that is part of the HP CORE Technolgy system and is installed with various HP products. To stop hposm.exe from running, you have to disable HPOSM.exe which should be listed in msconfig.Hptskmgr.exe
is a process associated with the HP Task Management Component included in the CORE Technolgy software from HP and is located in C:\Program Files\HP\hpcoretech\comp\. This program is non-essential process to the running of the system and can be removed using the control panel Add\Remove programs applet.HPQWMI.exe
is a process installed with the drivers for HP hardware and provides additional diagnostics functionality for their products. It provides WMI Interface that allows your system to collect hardware information either locally or remotely.
I have encountered users who have reported an unknown phantom process
(no name) related to a flashing white icon or blue box with a small white square that briefly appears in the Taskbar. The icon first appears during startup, then reappears every 15 minutes for one or two seconds and will show up one last time when the computer is shutting down. This phantom process was traced to HP-related processes like hpcmpmgr.exe and hptskmgr.exe. Disabling/unchecking hpcmpmgr.exe from the system startup list kept the icon flash from appearing again.
If you don't use any HP products, you may need to investigate and monitor the processes running on your system until you track down the responsible one. These are tools that can be used to do that: