Should I block it?

No, this file is 100% safe to run.

Relationships

Parent process
Child process
Related files

PE structurePE file structure

Show functions
Import table
advapi32.dll
RegOpenKeyExA, RegSetValueExA, RegDisablePredefinedCache, ImpersonateLoggedOnUser, RevertToSelf, QueryServiceStatus, CreateServiceA, QueryServiceConfigA, OpenServiceA, StartServiceA, ControlService, SetEntriesInAclA, SetServiceStatus, RegDeleteKeyA, RegOpenKeyA, RegQueryValueExA, SetKernelObjectSecurity, GetTokenInformation, GetKernelObjectSecurity, RegCloseKey, CreateProcessAsUserA, FreeSid, DuplicateTokenEx, SetSecurityDescriptorDacl, CloseServiceHandle, AdjustTokenPrivileges, AllocateAndInitializeSid, RegDeleteValueA, SetTokenInformation, OpenSCManagerA, RegCreateKeyExA, ChangeServiceConfigA, RegisterServiceCtrlHandlerA, StartServiceCtrlDispatcherA, OpenProcessToken, DeleteService, EqualSid, InitializeSecurityDescriptor
kernel32.dll
ReadProcessMemory, FlushFileBuffers, GetStdHandle, HeapFree, GetCurrentProcessId, OpenProcess, GetCommandLineA, ExitProcess, GetLocalTime, DeleteFileA, CreateProcessA, GetModuleFileNameA, SetFileAttributesA, ExitThread, TerminateProcess, GetEnvironmentVariableA, SetFilePointer, GetFileAttributesExA, lstrcmpiA, CopyFileA, MoveFileA, ClearCommError, GetTempFileNameA, LocalAlloc, CreateThread, GetVersion, VirtualAllocEx, SetStdHandle, LeaveCriticalSection, WriteProcessMemory, LoadLibraryA, GetExitCodeThread, GetCurrentThreadId, CreateFileA, MapViewOfFile, WaitForMultipleObjects, CreateFileMappingA, WaitCommEvent, VirtualFreeEx, UnmapViewOfFile, WaitForSingleObject, RaiseException, lstrcpyA, FreeLibrary, GetProcAddress, GetOverlappedResult, SetEvent, Sleep, CreateEventA, SetThreadPriority, ReadFile, GetProcessHeap, GetModuleHandleA, SetCommTimeouts, GetLastError, GetCommState, GetSystemDirectoryA, CloseHandle, ResetEvent, PurgeComm, SetCommMask, SetupComm, SetCommState, InitializeCriticalSection, EnterCriticalSection, WriteFile, SetErrorMode, HeapAlloc, LocalFree, FindFirstFileA, lstrlenA, GetComputerNameA, GetCurrentProcess, TerminateThread, ResumeThread, BackupRead, BackupWrite, SetFileTime, GetVersionExA, lstrcmpA, LoadLibraryExA, GetWindowsDirectoryA, lstrcatA, BackupSeek, FindClose, RtlUnwind, GetBinaryTypeA, GetCommProperties, CreateRemoteThread, DeleteCriticalSection
netapi32.dll
Netbios
shlwapi.dll
AssocQueryStringA
tapi32.dll
lineGetCallStatus, lineGetDevConfig, lineGetID, lineClose, lineSetStatusMessages, lineShutdown, lineSetDevConfig, lineMakeCall, lineGetDevCaps, lineDeallocateCall, lineOpen, lineDrop, lineInitialize
user32.dll
SendMessageA, PostMessageA, MsgWaitForMultipleObjects, DispatchMessageA, TranslateMessage, GetMessageA, PeekMessageA, PostThreadMessageA, PostQuitMessage, KillTimer, DefWindowProcA, RegisterClassA, wsprintfA, CreateWindowExA, SetTimer
userenv.dll
CreateEnvironmentBlock, DestroyEnvironmentBlock

rpcnet.exe

Installation/Management Application by Absolute Software Corp. (Signed)

Remove rpcnet.exe
Version:   8.0.910.0
MD5:   6684437f3628ef237c354f77d33426d1
SHA1:   725d4e91b01968267b4925aaca17dbacd99d3442
SHA256:   abfcb62e688303373e3898ed479271f4f1133a64ed58868969ce314b7d871bc9

About rpcnet.exe (from Absolute Software Corp.)

Our Theft Recovery Team has proven capabilities with internet investigations, computer forensics and cyber crime. They are featured speakers at public engagements on topics ranging from regulatory mat

Overview

rpcnet.exe runs as a service under the name Remote Procedure Call (RPC) Net (rpcnet) with extensive SYSTEM privileges (full administrator access). The file is digitally signed by Absolute Software Corp. which was issued by the VeriSign certificate authority (CA).

DetailsDetails

File name:rpcnet.exe
Publisher:Absolute Software Corp.
Product name:Installation/Management Application
Description:rpcnet
Typical file path:C:\windows\syswow64\rpcnet.exe
Original name:rpcnet.dll
File version:8.0.910.0
Size:56.92 KB (58,288 bytes)
Certificate
Issued to:Absolute Software Corp.
Authority (CA):VeriSign
Effective date:Friday, September 11, 2009
Expiration date:Thursday, November 8, 2012
Digital DNA
File packed:No
.NET CLR:No
More details

BehaviorsBehaviors

Services
Runs under 'SYSTEM\CurrentControlSet\Services' by the Service Controller (services.exe)
  • 'rpcnet' (Remote Procedure Call (RPC) Net)
  • rpcnet

ResourcesResource utilization

(Note: statistics below are averages based on a minimum sample size of 200 unique participants)
Averages
 
CPU
Total CPU:0.00048745%
0.028634%
Kernel CPU:0.00034149%
0.013761%
User CPU:0.00014596%
0.014873%
Kernel CPU time:490,398 ms/min
100,923,805ms/min
CPU cycles:2,861/sec
17,470,203/sec
Memory
Private memory:2.27 MB
21.59 MB
Private (maximum):4.27 MB
Private (minimum):2.26 MB
Non-paged memory:2.27 MB
21.59 MB
Virtual memory:57.56 MB
140.96 MB
Virtual memory (peak):61.63 MB
169.69 MB
Working set:2.41 MB
18.61 MB
Working set (peak):6.3 MB
37.95 MB
Page faults:5,777/min
2,039/min
I/O
I/O read transfer:620 Bytes/sec
1.02 MB/min
I/O read operations:1/sec
343/min
I/O write transfer:45 Bytes/sec
274.99 KB/min
I/O write operations:1/sec
227/min
I/O other transfer:151 Bytes/sec
448.09 KB/min
I/O other operations:1/sec
1,671/min
Resource allocations
Threads:5
12
Handles:126
600

BehaviorsProcess properties

Integrety level:System
Platform:64-bit
Command lines:
  • C:\windows\syswow64\rpcnet.exe
  • C:\Windows\System32\rpcnet.exe
Owner:SYSTEM
Windows Service
Service name:rpcnet
Display name:Remote Procedure Call (RPC) Net
Type:Win32OwnProcess
Parent process:services.exe (Services and Controller app by Microsoft)

Windows OS versionsDistribution by Windows OS

OS versiondistribution
Windows 7 Home Premium 46.15%
Windows 7 Ultimate 30.77%
Windows 8 Pro with Media Center 15.38%
Windows 7 Professional 7.69%

Distribution by countryDistribution by country

United States installs about 30.77% of Installation/Management Application.

OEM distributionDistribution by PC manufacturer

PC Manufacturerdistribution
Toshiba 100.00%
Should I remove It? Clean your PC of unwanted adware, toolbars and bloatware.

Download it for FREE