What is the "microsoft.virtualization.client.wizards.ni.dll" ? Variant 11968282

Our database contains 108 different files for filename microsoft.virtualization.client.wizards.ni.dll but this page contains information about single file with specific attributes. If you want to see general information about the microsoft.virtualization.client.wizards.ni.dll then visit General Information Page . You can also check most distributed file variants with name microsoft.virtualization.client.wizards.ni.dll. This file belongs to product Microsoft (R) Windows (R) Operating System and was developed by company Microsoft Corporation. This file has description Hyper-V Wizards. This file is Dynamic-link Library. This library can be loaded and executed in any running process.

microsoft.virtualization.client.wizards.ni.dll Library
Product:
Microsoft (R) Windows (R) Operating System
Company:
Microsoft Corporation
Description:
Hyper-V Wizards
Version:
6.1.7601.17514
MD5:
6bb31931443ed82643d71db892b92e59
SHA1:
af8ff97169c325fdfd81822900b2f39b6489a309
SHA256:
ef2b3f907b522a6a27869d988f7cf990b446f5a7ad5415d00932f89cf26d14f5
Size:
1425408
Directory:
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.Virtualiz#\8c06ec02da36fd9ea012627dbfe65807
Operating System:
Windows 7
Occurence:
Low oc0

Is the library "microsoft.virtualization.client.wizards.ni.dll" Safe or Threat ?

There is no review for "microsoft.virtualization.client.wizards.ni.dll" with defined attributes. If you want to check MD5 of this file via public VirusTotal database, then press
.
Our final rating for this file is Unknown. Final rating is based on file reviews, discovered date, users occurence and antivirus scan results.
Is this Library suspect for you? Is your computer running slow? Do you experiencing some suspicious behaviour in your computer? We recommends make free computer scan with our free award-winning tool .


User Reviews of the "microsoft.virtualization.client.wizards.ni.dll"

This file has no approved reviews! If you know this file, you can add own review .