What is the "jswpsapi.exe" ? Variant 2417133

Our database contains 25 different files for filename jswpsapi.exe but this page contains information about single file with specific attributes. If you want to see general information about the jswpsapi.exe then visit General Information Page . You can also check most distributed file variants with name jswpsapi.exe. This file belongs to product JumpStart and was developed by company Atheros Communications, Inc.. This file has description Jumpstart for Wireless API. This is executable file. You can find it running in Task Manager as the process jswpsapi.exe.

jswpsapi.exe Process
Product:
JumpStart
Company:
Atheros Communications, Inc.
Description:
Jumpstart for Wireless API
Version:
2.1.0.18
MD5:
e8dc67ba8d13d07d9ec5ac60643a85a8
SHA1:
e43496b69bba28e4011dfb577204f0b8d5d90601
SHA256:
62a4f6231eb0d4df3054aa07825922e93d5737368a9d9e5cefb6376182710a77
Size:
356433
Directory:
%PROGRAMFILES%\D-Link\DWA-547 revA
Operating System:
Windows XP
Occurence:
Low oc0

System Explorer Community Antivirus Report

This file was checked and tolerated by following antivirus shields :
Antivirus NameLatest Toleration
avast! Antivirus2014-12-28 03:14:24
Dr.Web Anti-virus2014-11-01 18:27:22
Antivirus shields were enabled and have latest antivirus database.

Is the Process "jswpsapi.exe" Safe or Threat ?

There is no review for "jswpsapi.exe" with defined attributes. If you want to check MD5 of this file via public VirusTotal database, then press
.
Our final rating for this file is Unknown. Final rating is based on file reviews, discovered date, users occurence and antivirus scan results.
Is this Process suspect for you? Is your computer running slow? Do you experiencing some suspicious behaviour in your computer? We recommends make free computer scan with our free award-winning tool .


100% of reviewed files with different MD5 located in different directory are marked as Safe .

User Reviews of the "jswpsapi.exe"

This file has no approved reviews! If you know this file, you can add own review .