Should I block it?

No, this file is 100% safe to run.

Relationships


PE structurePE file structure

Show functions
Import table
advapi32.dll
DeleteAce, RegCreateKeyExA, GetAclInformation, AddAccessDeniedAce, GetSidIdentifierAuthority, GetSidSubAuthorityCount, GetSidSubAuthority, LookupAccountSidA, QueryServiceConfigA, ChangeServiceConfigA, OpenSCManagerA, ControlService, OpenServiceA, StartServiceA, QueryServiceStatus, CloseServiceHandle, CopySid, RegLoadKeyA, RegUnLoadKeyA, GetTokenInformation, ReportEventA, AllocateAndInitializeSid, InitializeSecurityDescriptor, IsValidSid, GetLengthSid, InitializeAcl, AddAccessAllowedAce, GetAce, SetSecurityDescriptorDacl, IsValidSecurityDescriptor, SetFileSecurityA, FreeSid, RegQueryInfoKeyA, RegDeleteKeyA, DeregisterEventSource, RegisterEventSourceA, RegEnumValueA, RegDeleteValueA, OpenProcessToken, OpenThreadToken, LookupPrivilegeValueA, AdjustTokenPrivileges, RegQueryValueExA, GetUserNameA, RegEnumKeyA, RegSetValueExA, RegCreateKeyA, RegOpenKeyExA, RegEnumKeyExA, RevertToSelf, RegOpenKeyA, RegCloseKey
comctl32.dll
ImageList_LoadImageA
kernel32.dll
lstrcatA, LoadLibraryExA, GetProcAddress, InterlockedIncrement, GetModuleFileNameW, GetModuleFileNameA, GetTickCount, GetCurrentProcessId, OutputDebugStringA, WriteConsoleA, GetSystemDirectoryA, LoadLibraryA, SetCurrentDirectoryA, GetCurrentDirectoryA, GetStdHandle, AllocConsole, GetCurrentThreadId, SetProcessAffinityMask, GetProcessAffinityMask, GetCurrentProcess, GetSystemInfo, GetComputerNameA, SetLastError, GetOEMCP, LeaveCriticalSection, EnterCriticalSection, GetLongPathNameA, GetShortPathNameA, AreFileApisANSI, GetLongPathNameW, GetShortPathNameW, HeapFree, GetProcessHeap, HeapAlloc, GetFullPathNameA, GetVolumeInformationA, QueryDosDeviceA, GetDriveTypeA, SetErrorMode, SetFileTime, GetModuleHandleA, ResetEvent, CreateEventA, DefineDosDeviceA, RemoveDirectoryA, FindFirstFileW, FindNextFileW, FindClose, GetFileType, CreateFileW, GetFileAttributesW, GetCurrentThread, WriteFile, ReadFile, FindFirstFileA, DeleteFileA, GetTempPathA, SetEndOfFile, GetSystemTimeAsFileTime, lstrcpyA, FindNextFileA, QueryPerformanceFrequency, QueryPerformanceCounter, lstrcpynA, GlobalFree, GlobalAlloc, UnmapViewOfFile, MapViewOfFile, OpenFileMappingA, InterlockedExchangeAdd, TlsSetValue, TlsGetValue, TlsAlloc, GetDiskFreeSpaceA, WaitForMultipleObjects, HeapSize, HeapReAlloc, LocalFree, lstrcmpA, LocalAlloc, GetExitCodeThread, TerminateThread, GetTempFileNameA, SetThreadPriority, SetPriorityClass, DuplicateHandle, FormatMessageA, GetSystemPowerStatus, GetThreadPriority, GetPriorityClass, GetFileTime, QueryDosDeviceW, OpenMutexA, SizeofResource, LockResource, LoadResource, FindResourceA, FindResourceExA, GetLocalTime, VirtualFree, VirtualAlloc, SetFilePointer, CreateFileA, HeapDestroy, ExitProcess, CloseHandle, GetFileSize, WaitForSingleObject, CreateMutexA, ReleaseMutex, GetLastError, TerminateProcess, OpenProcess, IsDBCSLeadByte, FileTimeToSystemTime, FileTimeToLocalFileTime, ReleaseSemaphore, Sleep, CreateSemaphoreA, MoveFileExA, CreateDirectoryA, GetTimeFormatA, GetDateFormatA, GetUserDefaultLCID, InterlockedDecrement, SetFileAttributesA, GetFileAttributesA, MultiByteToWideChar, CopyFileA, FreeLibrary, InterlockedExchange, GetACP, GetLocaleInfoA, GetThreadLocale, GetVersionExA, WideCharToMultiByte, lstrlenA, lstrlenW, GetVersion, DeleteCriticalSection, InitializeCriticalSection, RaiseException, TlsFree
mpr.dll
WNetGetConnectionA
msvcp71.dll
DllMain
msvcr71.dll
DllMain
ole32.dll
CoTaskMemAlloc, StringFromGUID2, CoCreateGuid, CoCreateInstance, StringFromCLSID, CoTaskMemFree, CoTaskMemRealloc
rpcrt4.dll
UuidCreate, RpcStringFreeA, UuidToStringA
shell32.dll
SHGetMalloc, SHGetSpecialFolderLocation, SHGetFileInfoA, SHGetSpecialFolderPathA, SHGetPathFromIDListA, SHGetDesktopFolder
shlwapi.dll
PathAddBackslashA
user32.dll
GetMessageA, IsWindowUnicode, DispatchMessageA, MsgWaitForMultipleObjectsEx, wsprintfA, PostMessageA, LoadStringA, CharNextW, FindWindowA, MessageBoxA, GetSystemMetrics, CharPrevA, DispatchMessageW, GetMessageW, CharNextA, TranslateMessage, CharUpperA, PeekMessageA
Export table
ActOnInfection
CreateCopyOfEvent
CreateEventFromLogLine
DestroyCopyOfEvent
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
GenerateLogLine
GetCurrentVEHandle
GetScanStatus
GlobalLog
ManualScanDir
ManualScanOneFile
QueryDriveList
ScanOneFile
StartScan
StartScanEngine
StopScan
StopScanEngine

cliscan.dll

Symantec AntiVirus by Symantec Corporation (Signed)

Remove cliscan.dll
Version:   10.1.6.6000
MD5:   d622a7ad176d9ac6b64f384681a83baa
SHA1:   a2ab1cbe3e1df5177f708526638ad5808042fa75
SHA256:   30f03fe091de6eed9d2ced7dbe2a07159b3ef84daade34474de5ff4a335bd9be

Overview

cliscan.dll is loaded as dynamic link library that runs in the context of a process. It is installed with a couple of know programs including Symantec AntiVirus published by Symantec Corporation and Symantec Client Security published by Symantec Corporation. The file is digitally signed by Symantec Corporation which was issued by the VeriSign certificate authority (CA). This particular version is usually found on Microsoft Windows XP (5.1.2600.196608).

DetailsDetails

File name:cliscan.dll
Publisher:Symantec Corporation
Product name:Symantec AntiVirus
Typical file path:C:\Program Files\symantec antivirus\cliscan.dll
File version:10.1.6.6000
Size:688.69 KB (705,216 bytes)
Certificate
Issued to:Symantec Corporation
Authority (CA):VeriSign
Effective date:Thursday, November 9, 2006
Digital DNA
PE subsystem:Windows GUI
File packed:No
Code language:Microsoft Visual C++ 7.1
.NET CLR:No
More details

ResourcesPrograms

The following programs will install this file
Symantec Corporation
9% remove
Symantec AntiVirus Corporate Edition was the previous offering from Symantec in this market. Symantec Endpoint Protection, developed by Symantec Corporation, is an antivirus and personal firewall product leveled at centrally managed corporate environments security for servers and workstations.
Symantec Corporation
11% remove
Antivirus protection alone is not a sufficient defense against today's complex Internet security threats. One breed of threats blend characteristics of viruses, worms,Trojan horses, and malicious code with server and Internet vulnerabilities. By using multiple methods and techniques, blended threats such as CodeRed, Bugbear, and Opaserv can rapidly initiate, transmit, and spread, causing widespread damage.The newest breed of security ri...

Windows OS versionsDistribution by Windows OS

OS versiondistribution
Microsoft Windows XP 100.00%

OEM distributionDistribution by PC manufacturer

PC Manufacturerdistribution
Hewlett-Packard 100.00%
Should I remove It? Clean your PC of unwanted adware, toolbars and bloatware.

Download it for FREE