What is the "microsoft.virtualization.client.wizards.ni.dll" ? Variant 14728702

Our database contains 108 different files for filename microsoft.virtualization.client.wizards.ni.dll but this page contains information about single file with specific attributes. If you want to see general information about the microsoft.virtualization.client.wizards.ni.dll then visit General Information Page . You can also check most distributed file variants with name microsoft.virtualization.client.wizards.ni.dll. This file belongs to product Microsoft (R) Windows (R) Operating System and was developed by company Microsoft Corporation. This file has description Hyper-V Wizards. This file is Dynamic-link Library. This library can be loaded and executed in any running process.

microsoft.virtualization.client.wizards.ni.dll Library
Product:
Microsoft (R) Windows (R) Operating System
Company:
Microsoft Corporation
Description:
Hyper-V Wizards
Version:
6.1.7601.17514
MD5:
619b289270a5eb0b51503cf7d4832888
SHA1:
1e84e8b3d77d434001ba74729033d01a5bc930a9
SHA256:
ef64cc94c784cc6f710a6d385465c9a3985239275e604c4515642da90527ffd7
Size:
1425408
Directory:
C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.Virtualiz#\36cf04115201bb884d90fd982bc3c784
Operating System:
Windows 7
Occurence:
Low oc0

Is the library "microsoft.virtualization.client.wizards.ni.dll" Safe or Threat ?

There is no review for "microsoft.virtualization.client.wizards.ni.dll" with defined attributes. If you want to check MD5 of this file via public VirusTotal database, then press
.
Our final rating for this file is Unknown. Final rating is based on file reviews, discovered date, users occurence and antivirus scan results.
Is this Library suspect for you? Is your computer running slow? Do you experiencing some suspicious behaviour in your computer? We recommends make free computer scan with our free award-winning tool .


User Reviews of the "microsoft.virtualization.client.wizards.ni.dll"

This file has no approved reviews! If you know this file, you can add own review .