File Search: 

ThreatExpert's awareness of the file "service.exe":

Across all ThreatExpert reports, the file "service.exe" was mostly identified as a threat.
File "service.exe" has the following statistics:
Total number of reports analysed611,932
Number of cases that involved the file "service.exe"546
Number of incidents when this file was found to be a threat459
Statistical volume of cases when "service.exe" was a threat84%
Please enable javascript to display the chart.
Notes:
  • Please note that the name of the file should NOT be used to define if it is legitimate or not. Such determination can only be made by observing its dynamic behaviour.
  • In order to check a file, please submit it to ThreatExpert.
  • For a comprehensive pro-active protection against threats, please consider ThreatFire - our behavioral antivirus solution.
The file "service.exe" is known to be created under the following filenames:
%AllUsersProfile%\cncdown.exe
%AllUsersProfile%\menu iniciar\programas\inicializar\nc.exe
%AppData%\1.exe
%AppData%\blaah.exe
%AppData%\calc.exe
%AppData%\codecsetup.exe
%AppData%\codecsetup3788.exe
%AppData%\codecsetup4127.exe
%AppData%\codecsetup6400.exe
%AppData%\codecsetup8536.exe
%AppData%\cp_setup_assist.exe
%AppData%\cuda.exe
%AppData%\dealassistant\dauninstall.exe
%AppData%\digifast\dfuninstall.exe
%AppData%\hose.exe
%AppData%\ijango_toolbar_installer.exe
%AppData%\ldr.exe
%AppData%\microsoft\dtsc\t.exe
%AppData%\microsoft\office71\vhchk.exe
%AppData%\microsoft\windows\ernsjyi.exe
%AppData%\microsoft\windows\jjcmdrj.exe
%AppData%\microsoft\windows\nheste.exe
%AppData%\microsoft\windows\nxmwp.exe
%AppData%\microsoft\windows\rwmgh.exe
%AppData%\microsoft\windows\security\user0.exe
%AppData%\microsoft\windows\tbljxjk.exe
%AppData%\microsoft\windows\vohth.exe
%AppData%\microsoft\windows\vvpmyvaw.exe
%AppData%\mxplay\temp\mxplay_installer.exe
%AppData%\ntcom.dll
%AppData%\nthead.dll
%AppData%\pak-5593.exe
%AppData%\pak-5594.exe
%AppData%\pak-5595.exe
%AppData%\pak-5596.exe
%AppData%\pak-5597.exe
%AppData%\pak-5598.exe
%AppData%\pak-5599.exe
%AppData%\pak-5600.exe
%AppData%\pak-5601.exe
%AppData%\pak-5602.exe
%AppData%\pak-5603.exe
%AppData%\rundll.exe
%AppData%\salehoo\auctionalert\_tmp\aa.exe
%AppData%\salehoo\salehooalert\_tmp\aa.exe
%AppData%\scvhost.exe
%AppData%\service.exe
%AppData%\silverlight\silverlight.exe
%AppData%\skynet\muonline\_cw0srv.exe
%AppData%\skynet\muonline\234672.exe
%AppData%\skynet\muonline\239874.exe
%AppData%\skynet\muonline\293874.exe
%AppData%\skynet\muonline\345674.exe
%AppData%\skynet\muonline\345676.exe
%AppData%\skynet\muonline\435627.exe
%AppData%\skynet\muonline\543978.exe
%AppData%\skynet\muonline\546783.exe
%AppData%\speedrunner\sruninstall.exe
%AppData%\temp.dll
%AppData%\truesword4.exe
%AppData%\wefisetup.exe
%AppData%\winbutler\winbuninstaller.exe
%AppData%\winbutler\winbutler.exe
%AppData%\windows.exe
%AppData%\windowsservice\service.exe
%AppData%\windowsservice\starter.exe
%AppData%\wintouch\wintouch.exe
%AppData%\wintouch\wtuninstaller.exe
%AppData%\wrar380d.exe
%AppData%\yeah\yeah374809.exe
%CommonAppData%\38001914.exe
%CommonAppData%\3810eef8.exe
%CommonAppData%\381751d0.exe
%CommonAppData%\388f0900.exe
%CommonAppData%\38d3ff69.exe
%CommonAppData%\aol downloads\aoltoolbar\setuptoolbar.exe
%CommonAppData%\av1\av1.exe
%CommonAppData%\av1\av1i.exe
%CommonAppData%\av1\av1i2.exe
%CommonAppData%\av1\av1two.exe
%CommonAppData%\av1\qwprotect.dll
%CommonAppData%\av1\svchost.exe
%CommonAppData%\av2010\av2010.exe
%CommonAppData%\av2010\iedefender.dll
%CommonAppData%\av2010\svchost.exe
%CommonAppData%\dyned\eng_loc.exe
%CommonAppData%\e4a12b7\extraav.exe
%CommonAppData%\e4a12b7\ua2009.exe
%CommonAppData%\e4a12b7\valarm.exe
%CommonAppData%\e4a12b7\vmelt.exe
%CommonAppData%\e4a12b7\vsweep.exe
%CommonAppData%\fetion\fetionupdate.exe
%CommonAppData%\gav\sgav.exe
%CommonAppData%\n1\n1.exe
%CommonAppData%\n1\n1i.exe
%CommonAppData%\n1\n1two.exe
%CommonAppData%\n1\qwprotect.dll
%CommonAppData%\n1\svchost.exe
%CommonAppData%\nexon\ngm\ngmdll.dll
%CommonAppData%\qw2010\qw2010.exe
Notes:
  • %AllUsersProfile% is a variable that specifies the all users' profile folder. By default, this is C:\Documents and Settings\All Users (Windows NT/2000/XP).
  • %AppData% is a variable that refers to the file system directory that serves as a common repository for application-specific data. A typical path is C:\Documents and Settings\[UserName]\Application Data.
  • %CommonAppData% is a variable that refers to the file system directory containing application data for all users. A typical path is C:\Documents and Settings\All Users\Application Data.

The file "service.exe" has the following possible countries of origin:
OriginNumber of Incidents
China38
Israel10
Sweden9
Portugal8
Canada7
Russian Federation4
Brazil2
Saudi Arabia2
Spain2
Germany1
Netherlands1
Turkey1

The following threats are known to be associated with the file "service.exe":
Threat AliasNumber of Incidents
Email-Worm.Win32.Agent.bx [Kaspersky Lab]681
Mal/Basine-C [Sophos]681
Trojan.Pandex [Symantec]632
Spy-Agent.bv [McAfee]625
Win32/Agent.worm.62464 [AhnLab]588
Email-Worm.Win32.Agent.bx [Ikarus]433
I-Worm.Wigon.Gen [PC Tools]429
Spammer:Win32/Talwadig.A [Microsoft]301
Spammer:Win32/Cutwail.gen!B [Microsoft]233
W32.Lunalight@mm [Symantec]125
WORM_MOONLIGHT.C [Trend Micro]101
Email-Worm.Win32.VB.cp [Kaspersky Lab]96
W32/MoonLight.worm [McAfee]88
W32.Sality.X [Symantec]81
Win32.Sality.AA [PC Tools]81
Virus.Win32.Sality.s [Kaspersky Lab]77
I-Worm.Moonlight.C [PC Tools]69
W32/Sality.ac [McAfee]62
WORM_SALITY.BL [Trend Micro]61
Adware.Mirar.M [PC Tools]49
W32.Rontokbro@mm [Symantec]46
Worm.Win32.VB.cz [Kaspersky Lab]42
W32.SillyFDC [Symantec]33
W32/Sdbot.worm.gen.a [McAfee]32
Trojan Horse [Symantec]30
W32.Spybot.Worm [Symantec]30
Worm:Win32/Pushbot.gen [Microsoft]29
W32.IRCBot.Gen [Symantec]28
Mal/Generic-A [Sophos]27
Worm.VB.WKJ [PC Tools]26
WORM_MOONLIGHT.B [Trend Micro]25
Adware.Mirar [PC Tools]21
Adware-Mirar [McAfee]21
Backdoor.Win32.Rbot.gen [Kaspersky Lab]21
Packed.Win32.Tdss.m [Kaspersky Lab]20
PE_SALITY.AL-1 [Trend Micro]19
W32/Autorun.worm.ct [McAfee]19
Backdoor.Rbot [Ikarus]17
VirTool.Win32.CeeInject [Ikarus]17
W32.Randex.gen [Symantec]16
W32/Rbot-Fam, W32/Rbot-Fam, Mal/TinyDL-T, Mal/Packer, Mal/Behav-024, Mal/AVKill-B [Sophos]16
W32/Sdbot.worm.gen.t [McAfee]16
VirTool:Win32/CeeInject.gen!J [Microsoft]15
WORM_MOONLIGHT.D [Trend Micro]15
WORM_RBOT.GEN-1 [Trend Micro]14
Mal/IRCBot-J [Sophos]13
Downloader [Symantec]12
Trojan:Win32/Ilomo.gen!A [Microsoft]12
PE_SALITY.AS [Trend Micro]11
Virus.Win32.Sality.q [Kaspersky Lab]11
W32/Shahrokh-A [Sophos]11
Backdoor.Win32.IRCBot.gen [Kaspersky Lab]10
Virus.Win32.Virut.q [Kaspersky Lab]10
W32.Sality.U [Symantec]10
Win32.Sality.X [PC Tools]10
Backdoor.Win32.SdBot.feq [Kaspersky Lab]9
FakeAlert-SpywareGuard.gen.b [McAfee]9
Packed/FSG [PC Tools]9
Trojan.Crypt [Ikarus]9
Trojan.Win32.Tdss.aiil [Kaspersky Lab]9
Trojan:Win32/Alureon.gen!J [Microsoft]9
Virus:Win32/Sality.AM [Microsoft]9
W32/Sality-AM [Sophos]9
Worm.Win32.AutoRun.cxl [Kaspersky Lab]9
Worm.Win32.VB.cz [Ikarus]9
Backdoor.Trojan [Symantec]8
Email-Worm.Win32.Brontok.N [Ikarus]8
Generic.dx [McAfee]8
W32.Koobface.A [Symantec]8
W32.Sality.AE [Symantec]8
W32/Bobandy-D [Sophos]8
W32/Spybot.worm.gen [McAfee]8
Win32/IRCBot.worm.variant [AhnLab]8
Worm.VB!sd5 [PC Tools]8
Worm.Win32.AutoRun [Ikarus]8
Worm:Win32/Rokhshah.A [Microsoft]8
Adware.Mirar [Symantec]7
Adware:Win32/Mirar [Microsoft]7
Keylog-Z0mbie [McAfee]7
New Malware.b [McAfee]7
not-a-virus:AdWare.Win32.Mirar.ac [Ikarus]7
not-a-virus:AdWare.Win32.Mirar.ac [Kaspersky Lab]7
not-a-virus:RemoteAdmin.Win32.NetCat.jd [Kaspersky Lab]7
PE_VIRUT.XO [Trend Micro]7
W32/Virut.gen [McAfee]7
Backdoor.IRCBot [PC Tools]6
Backdoor.Sdbot [Symantec]6
Backdoor.Win32.IRCBot.gnv [Kaspersky Lab]6
BKDR_IRCFLOOD.EM [Trend Micro]6
Generic Dropper.av [McAfee]6
Hacktool [Symantec]6
IRC/Client [McAfee]6
Net-Worm.Win32.Koobface [Ikarus]6
TROJ_VESLORN.ES [Trend Micro]6
W32.IRCBot [Symantec]6
W32/Inject-DE [Sophos]6
W32/Sdbot.worm [McAfee]6
Win32.Virut.Gen.5 [PC Tools]6
Worm.RBot.Gen.16 [PC Tools]6
Backdoor.IRCBot!sd6 [PC Tools]5