What is the "cronsvc.exe" ? Variant 8603450
Our database contains 8 different files for filename cronsvc.exe but this page contains information about single file with specific attributes. If you want to see general information about the cronsvc.exe then visit General Information Page . You can also check most distributed file variants with name cronsvc.exe. This file belongs to product PreyService and was developed by company Fork Ltd.. This file has description PreyService. Agregate rating is 5(5) stars - based on 2 reviews.This is executable file. You can find it running in Task Manager as the process cronsvc.exe.

- Product:
- PreyService
- Company:
- Fork Ltd.
- Description:
- PreyService
- Version:
- 1.0.0.0
- MD5:
- 63a7739ac9c1e38589b3edb1daeb9df5
- SHA1:
- 99346b700840a3240166c1d39936117f160bc4d2
- SHA256:
- ddc74d477af725f04c10cc56ef4e6cc3e68fe644d64ab2a76fdfabe4dfc14e67
- Size:
- 19968
- Directory:
- %SystemDiskRoot%\swsetup\Prey\platform\windows
- Operating System:
- Windows 7
- Occurence:
- High
System Explorer Community Antivirus Report
Antivirus Name | Latest Toleration |
---|---|
Bitdefender Antivirus | 2016-06-08 09:46:50 |
Avira Antivirus | 2016-04-18 00:51:49 |
Kaspersky Internet Security | 2016-04-09 09:35:24 |
Windows Defender | 2016-03-20 15:44:52 |
avast! Antivirus | 2016-02-27 13:22:31 |
Microsoft Security Essentials | 2016-01-31 02:31:23 |
McAfee Anti-Virus and Anti-Spyware | 2015-10-06 05:16:21 |
AVG AntiVirus Free Edition 2015 | 2015-07-08 15:30:11 |
AVG AntiVirus 2014 | 2015-06-22 13:12:43 |
AVG Internet Security 2015 | 2015-05-28 10:05:06 |
Is the Process "cronsvc.exe" Safe or Threat ?
User Reviews of the "cronsvc.exe"
-
SAFErating from user MikeOne for file %SystemDiskRoot%\Users\Bubba\Prey\platform\windows\cronsvc.exe (Variant: 18292096)
This executable is part of the PreyService - an open source project for application that can help in tracking of any laptop, phone and tablet devices if stolen. From Wikipedia source :
"Prey is a freemium Web service that allows remote tracking and monitoring of laptops, smartphones, and other electronic devices. A software agent is installed on the client device and connects in the background to Prey’s host computer. If requested by the host, the agent sends it information such as the device’s location and can trigger various actions."
- check more on http://en.wikipedia.org/wiki/Prey_(software)
The main pages of the project are located on http://preyproject.com/ -
SAFErating from user miguelsantos for file C:\Windows\Prey\platform\windows\cronsvc.exe (Variant: 656492)
Prey service responsible for running the program routines at scheduled time.