What is Mad.exe

Motive Chorus Daemon - Motive System - Motive Communications, Inc.

File description

Mad.exe with description Motive Chorus Daemon is a process file from company Motive Communications, Inc. belonging to product Motive System.
The file is digitally signed from Microsoft Corporation - Microsoft Time-Stamp Service
We do not recommend removing digitally signed files from Microsoft Corporation

What is mad.exe?
There are two processes with this name. The first is the Microsoft Exchange System Attendant Service, which does various tasks, including but not limited to loading DLLs for Exchange. The other one is a tool installed by some DSL providers.

Neither process is not critical to the operation of the system; however, you should not terminate the Microsoft Exchange one if you are using Exchange, as it would render it unusable.

Dangers of mad
As this is a relatively common executable with a simple name, it is common for virus writers and spyware vendors to disguise their malware as the genuine one.

Some malicious files may have the same name but be stored somewhere other than in a subdirectory of %ProgramFiles%. Other malware may use a name that appears similar to it but with slight differences in spelling or with appended digits. The following malware is known to disguise itself as mad.exe:
  • W32/Gallory (Various pre-existing subdirectories of %ProgramFiles% or anywhere where there is a setup.exe)
    • This is a worm that copies itself to many locations on your hard drive and tries to spread to any floppy disks you insert.
  • Troj/Zapchas (%SystemRoot%\System32\drivers)
    • This is a Trojan that provides an IRC server that allows a remote attacker to take over your computer.
There will typically be no more than one instance of this process running at any given time. The presence of multiple instances may be indicative of a malware infection. Furthermore, if you do not have Microsoft Exchange or any software installed by your ISP, the presence of this executable is a likely sign of infection.

Common problems
  • The Exchange Server version of this process uses excessive memory or CPU time
    • This is known to occur when Norton AntiVirus is installed. Try removing or disabling it.
    • Excessive CPU usage is also known to occur when the latest service pack is not installed. Be sure you have the most recent service pack.

Automatic startup locations

001 Running Processes
002 Autorun registry entries local machine
003 Autorun registry entries Current User
010 Installed services
035 Active Setup Installed Components

Digital signatures found for this file

    Certificate 
2 Microsoft Corporation - Microsoft Time-Stamp Service
1 Microsoft Corporation - Microsoft Timestamping Service

MD5 security rating in our database

23 files (Not yet rated and not signed)
1 files (Not yet rated and digitally signed)
4 files (Safe and digitally signed)
Some versions of this filename have not yet been checked for safety.
Warning: Some malware might rename itself to mad.exe. Always make sure that your file is from a verified publisher.

User ratings for this file

File rating: Average rating of mad.exe: by 28 files and users.

Application errors

Fix mad.exe application error:  Run a FREE registry scan

User comments

There are no user comments yet for this file.


Please add your comments if you have more information about this file or if you know how to solve mad.exe application errors.


File safety :

File security rating :

Are you human? How much is 16+24:


Like this page?

Please support this free service by giving us a Google+1


Browse files by letter

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

More system processes

mad600u.sys MADataManager.dll madclient.exe
MADesktop.exe madfu.sys MADFU003.sys
MADFU006.sys madfu008.sys madfu804.sys
MADFUXP.sys madmacs.exe madocc.dll

Lansweeper computer inventory From the creator of Runscanner:

Lansweeper
is an automated IT asset management tool. It can quickly scan your computers and has over 250 default reports available.

There is no need to install any agents on the scanned computers, all hardware and software inventory scanning is done by standard build-in functionality.