The .exe extension on a filename indicates an executable file. Executable files may, in some cases, harm your computer. Therefore, please read below to decide for yourself whether the checker.exe on your computer is a Trojan that you should remove, or whether it is a file belonging to the Windows operating system or to a trusted application.
The process known as Innovative checker or Innovative Solutions - Checker belongs to software Advanced Uninstaller PRO (version 11, 12) or Advanced Uninstaller PRO - Version by Innovative Solutions Grup SRL.
Description: Checker.exe is not essential for Windows and will often cause problems. Checker.exe is located in a subfolder of "C:\Program Files".
Known file sizes on Windows 10/8/7/XP are 847,360 bytes (28% of all occurrences), 1,591,872 bytes and 8 more variants.
There is no information about the author of the file. Checker.exe is not a Windows system file. The program is not visible. It is digitally signed. Checker.exe is able to connect to the Internet, record keyboard and mouse inputs and monitor applications. Therefore the technical security rating is 45% dangerous, however you should also read the user reviews.
Recommended: Identify checker.exe related errors
If checker.exe is located in a subfolder of Windows folder for temporary files, the security rating is 58% dangerous. The file size is 1,412,424 bytes (50% of all occurrences) or 1,591,848 bytes. There is no file information. The program has no visible window. The checker.exe file is not a Windows core file. Checker.exe is able to connect to the Internet, record keyboard and mouse inputs and monitor applications.
External information from Paul Collins:
Important: Some malware camouflages itself as checker.exe, particularly when located in the C:\Windows or C:\Windows\System32 folder, for example Trojan.Gen.2 or WS.Reputation.1 (detected by Symantec), and Win32:PUP-gen [PUP] (detected by Avast). Therefore, you should check the checker.exe process on your PC to see if it is a threat. We recommend Security Task Manager for verifying your computer's security. This was one of the Top Download Picks of The Washington Post and PC World.
A clean and tidy computer is the key requirement for avoiding problems with checker. This means running a scan for malware, cleaning your hard drive using 1cleanmgr and 2sfc /scannow, 3uninstalling programs that you no longer need, checking for Autostart programs (using 4msconfig) and enabling Windows' 5Automatic Update. Always remember to perform periodic backups, or at least to set restore points.
Should you experience an actual problem, try to recall the last thing you did, or the last thing you installed before the problem appeared for the first time. Use the 6resmon command to identify the processes that are causing your problem. Even for serious problems, rather than reinstalling Windows, you are better off repairing of your installation or, for Windows 8 and later versions, executing the 7DISM.exe /Online /Cleanup-image /Restorehealth command. This allows you to repair the operating system without losing data.
To help you analyze the checker.exe process on your computer, the following programs have proven to be helpful: ASecurity Task Manager displays all running Windows tasks, including embedded hidden processes, such as keyboard and browser monitoring or Autostart entries. A unique security risk rating indicates the likelihood of the process being potential spyware, malware or a Trojan. BMalwarebytes Anti-Malware detects and removes sleeping spyware, adware, Trojans, keyloggers, malware and trackers from your hard drive.