The genuine vapm.exe file is a software component of Kaspersky Security Center Network Agent by Kaspersky Lab.
“VAPM.exe” is the Vulnerability Assessment and Patch Management component of two products by Kaspersky Labs North America: Kaspersky Security Center (KSC), which runs on Windows Server, and Kaspersky Endpoint Security (KES), both for enterprise networks. It first appeared in Version 10. It works with “klnagent.exe”, the Kaspersky Network Agent, to detect and allow pushing of patches or bug fixes to applications. It installs in a subfolder of “C:\Program Files” and use of the Control Panel “Uninstall” applet to remove “klnagent.exe” will remove it. In 2013, the combined CPU consumption of “VAPM.exe” and “klnagent.exe” often approached 99% and drastically slowed computers across installations. It is not clear whether this was corrected. Kaspersky Lab North America, founded in 2004 by CEO Eugene Kaspersky and others already working with him in pioneer anti-virus research, is the world’s largest privately-owned cybersecurity company and one of the fastest-growing, based in Massachusetts, USA with offices in 32 countries.
VAPM stands for Vulnerability Assessment & Patch Management Component
The .exe extension on a filename indicates an executable file. Executable files may, in some cases, harm your computer. Therefore, please read below to decide for yourself whether the vapm.exe on your computer is a Trojan that you should remove, or whether it is a file belonging to the Windows operating system or to a trusted application.
The process known as Kaspersky Security Center Vulnerability Assessment & Patch Management Component belongs to software Kaspersky Security Center Network Agent or Kaspersky Security Center (version 10 Network) by Kaspersky Lab ZAO (www.kaspersky.com) or AO Kaspersky Lab.
Description: Vapm.exe is not essential for the Windows OS and causes relatively few problems. The vapm.exe file is located in a subfolder of "C:\Program Files".
Known file sizes on Windows 10/8/7/XP are 654,816 bytes (50% of all occurrences), 677,280 bytes or 680,296 bytes.
The program is not visible. The file is digitally signed. It is not a Windows core file. Therefore the technical security rating is 19% dangerous.
Recommended: Identify vapm.exe related errors
Important: Some malware camouflages itself as vapm.exe, particularly when located in the C:\Windows or C:\Windows\System32 folder. Therefore, you should check the vapm.exe process on your PC to see if it is a threat. We recommend Security Task Manager for verifying your computer's security. This was one of the Top Download Picks of The Washington Post and PC World.
A clean and tidy computer is the key requirement for avoiding problems with vapm. This means running a scan for malware, cleaning your hard drive using 1cleanmgr and 2sfc /scannow, 3uninstalling programs that you no longer need, checking for Autostart programs (using 4msconfig) and enabling Windows' 5Automatic Update. Always remember to perform periodic backups, or at least to set restore points.
Should you experience an actual problem, try to recall the last thing you did, or the last thing you installed before the problem appeared for the first time. Use the 6resmon command to identify the processes that are causing your problem. Even for serious problems, rather than reinstalling Windows, you are better off repairing of your installation or, for Windows 8 and later versions, executing the 7DISM.exe /Online /Cleanup-image /Restorehealth command. This allows you to repair the operating system without losing data.
To help you analyze the vapm.exe process on your computer, the following programs have proven to be helpful: ASecurity Task Manager displays all running Windows tasks, including embedded hidden processes, such as keyboard and browser monitoring or Autostart entries. A unique security risk rating indicates the likelihood of the process being potential spyware, malware or a Trojan. BMalwarebytes Anti-Malware detects and removes sleeping spyware, adware, Trojans, keyloggers, malware and trackers from your hard drive.