Processes > WINWORD.EXE
Download Glary Utilities for free to end/block Windows processes to improve your computer's performance *100% Clean & Safe

WINWORD.EXE

File Name: WINWORD.EXE
Usefulness Rating:
The WINWORD.EXE process is an executable file of Microsoft Word, which comes with the Microsoft Office suite and is the most common professional level document reading and writing application.
Recommendation:
The WINWORD.EXE process is not a system critical file. It is recommended not to be disabled/removed/deleted.  
Users Opinions:
scartzy
0 0 Report Abuse
winword.exe is the main executable for Microsoft Word, a word processing application which is bundled with the Microsoft Office Suite. Note: winword.exe is a process which is registered as a trojan. This Trojan allows attackers to access your computer from remote locations, stealing passwords, Internet banking and personal data. This process is a security risk and should be removed from your system. Determining whether winword.exe is a virus or a legitimate Windows process depends on the directory location it executes or runs from.
BALDO
0 0 Report Abuse
So what is the legitimate directory location of win.exe SCARTZY? thanks for your reply.
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other
First Previous 1 2 ... 38 39 40 41 42 43 44 ... 50 51 Next Last
WinZipSmartMonitor.exe Win_SCAN.exe WSResDownloader.exe
WirelessKB850NotificationService.exe Windows.WARP.JITService.exe WConnectUpdateApp.exe
WOWReg32.exe WDM_R274.exe Windscribe
WavesSvc.exe WinZipCompressionSmartMonitor.exe WlanAniControl64_intel.exe
Watchdog wrapper.exe) AND (SELECT 3680 FROM(SELECT COUNT(*),CONCAT(0x716b7a7071,(SELECT (ELT(3680=3680,1))),0 wrapper.exe)) AND (SELECT 3680 FROM(SELECT COUNT(*),CONCAT(0x716b7a7071,(SELECT (ELT(3680=3680,1))),
wrapper.exe AND (SELECT 3680 FROM(SELECT COUNT(*),CONCAT(0x716b7a7071,(SELECT (ELT(3680=3680,1))),0x wrapper.exe") AND (SELECT 3680 FROM(SELECT COUNT(*),CONCAT(0x716b7a7071,(SELECT (ELT(3680=3680,1))), wrapper.exe" AND (SELECT 3680 FROM(SELECT COUNT(*),CONCAT(0x716b7a7071,(SELECT (ELT(3680=3680,1))),0
0 wrapper.exe AND (SELECT 3680 FROM(SELECT COUNT(*),CONCAT(0x716b7a7071,(SELECT (ELT(3680=3680,1))),0x wrapper.exe) OR (SELECT 6256 FROM(SELECT COUNT(*),CONCAT(0x716b7a7071,(SELECT (ELT(6256=6256,1))),0x
wrapper.exe)) OR (SELECT 6256 FROM(SELECT COUNT(*),CONCAT(0x716b7a7071,(SELECT (ELT(6256=6256,1))),0 wrapper.exe OR (SELECT 6256 FROM(SELECT COUNT(*),CONCAT(0x716b7a7071,(SELECT (ELT(6256=6256,1))),0x7 wrapper.exe") OR (SELECT 6256 FROM(SELECT COUNT(*),CONCAT(0x716b7a7071,(SELECT (ELT(6256=6256,1))),0
wrapper.exe" OR (SELECT 6256 FROM(SELECT COUNT(*),CONCAT(0x716b7a7071,(SELECT (ELT(6256=6256,1))),0x wrapper.exe OR (SELECT 6256 FROM(SELECT COUNT(*),CONCAT(0x716b7a7071,(SELECT (ELT(6256=6256,1))),0x7 wrapper.exe) AND EXTRACTVALUE(7022,CONCAT(0x5c,0x716b7a7071,(SELECT (ELT(7022=7022,1))),0x7162716a71
wrapper.exe)) AND EXTRACTVALUE(7022,CONCAT(0x5c,0x716b7a7071,(SELECT (ELT(7022=7022,1))),0x7162716a7 wrapper.exe AND EXTRACTVALUE(7022,CONCAT(0x5c,0x716b7a7071,(SELECT (ELT(7022=7022,1))),0x7162716a71) wrapper.exe") AND EXTRACTVALUE(7022,CONCAT(0x5c,0x716b7a7071,(SELECT (ELT(7022=7022,1))),0x7162716a7
wrapper.exe" AND EXTRACTVALUE(7022,CONCAT(0x5c,0x716b7a7071,(SELECT (ELT(7022=7022,1))),0x7162716a71 wrapper.exe AND EXTRACTVALUE(7022,CONCAT(0x5c,0x716b7a7071,(SELECT (ELT(7022=7022,1))),0x7162716a71) wrapper.exe) OR EXTRACTVALUE(7577,CONCAT(0x5c,0x716b7a7071,(SELECT (ELT(7577=7577,1))),0x7162716a71)
wrapper.exe)) OR EXTRACTVALUE(7577,CONCAT(0x5c,0x716b7a7071,(SELECT (ELT(7577=7577,1))),0x7162716a71 wrapper.exe OR EXTRACTVALUE(7577,CONCAT(0x5c,0x716b7a7071,(SELECT (ELT(7577=7577,1))),0x7162716a71)) wrapper.exe") OR EXTRACTVALUE(7577,CONCAT(0x5c,0x716b7a7071,(SELECT (ELT(7577=7577,1))),0x7162716a71
Please click to rate it.

Not useful Useful

The link is not a valid url.

Glarysoft uses cookies to improve content and ensure you get the best experience on our website. By continuing to use this website, you agree to our privacy policy.

Got it