The genuine g2tray.exe file is a software component of GoToMyPC by Citrix.
GoToMyPC is a remote access tool that enables access to remote computers hosted over a network or through the Internet. G2tray.exe runs the tray process for GoToMyPC. This is a safe process but may be removed if not required.
GoToMyPC was originally developed and launched by ExpertCity before being acquired by Citrix in 2004 to be spun-off as a standalone product. The program features a protocol for accessing remote computers using a web browser. It supports the Microsoft Windows platform.
Citrix Systems was started in 1989 by Ed Iacobucci, and a few of his colleagues while working at IBM. Their first project was the Citrix Multiuser, a port for OS/2, which used Independent Computing Architecture (ICA) that allowed multiple simultaneous users to access server applications. The company met financial success after Microsoft licensed Multiuser for its upcoming Windows 3.1 operating system. Citrix currently develops technology for networking, application and desktop virtualization, and servers. The company is headquartered in Fort Lauderdale, Florida, USA.
g2tray stands for Go[To]MyPC Tray
The .exe extension on a filename indicates an executable file. Executable files may, in some cases, harm your computer. Therefore, please read below to decide for yourself whether the g2tray.exe on your computer is a Trojan that you should remove, or whether it is a file belonging to the Windows operating system or to a trusted application.
Description: G2tray.exe is not essential for the Windows OS and causes relatively few problems. The g2tray.exe file is located in a subfolder of "C:\Program Files (x86)" (for instance C:\Program Files (x86)\Citrix\GoToMyPC\).
Known file sizes on Windows 10/8/7/XP are 1,955,696 bytes (33% of all occurrences), 2,995,568 bytes or 905,512 bytes.
G2tray.exe is digitally signed. G2tray.exe is not a Windows system file. It can change the behavior of other programs or manipulate other programs. The program has no visible window. The g2tray.exe file is a Verisign signed file. G2tray.exe is able to record keyboard and mouse inputs and monitor applications. Therefore the technical security rating is 36% dangerous, but you should also take into account the user reviews.
Recommended: Identify g2tray.exe related errors
Important: Some malware camouflages itself as g2tray.exe, particularly when located in the C:\Windows or C:\Windows\System32 folder. Therefore, you should check the g2tray.exe process on your PC to see if it is a threat. We recommend Security Task Manager for verifying your computer's security. This was one of the Top Download Picks of The Washington Post and PC World.
A clean and tidy computer is the key requirement for avoiding problems with g2tray. This means running a scan for malware, cleaning your hard drive using 1cleanmgr and 2sfc /scannow, 3uninstalling programs that you no longer need, checking for Autostart programs (using 4msconfig) and enabling Windows' 5Automatic Update. Always remember to perform periodic backups, or at least to set restore points.
Should you experience an actual problem, try to recall the last thing you did, or the last thing you installed before the problem appeared for the first time. Use the 6resmon command to identify the processes that are causing your problem. Even for serious problems, rather than reinstalling Windows, you are better off repairing of your installation or, for Windows 8 and later versions, executing the 7DISM.exe /Online /Cleanup-image /Restorehealth command. This allows you to repair the operating system without losing data.
To help you analyze the g2tray.exe process on your computer, the following programs have proven to be helpful: ASecurity Task Manager displays all running Windows tasks, including embedded hidden processes, such as keyboard and browser monitoring or Autostart entries. A unique security risk rating indicates the likelihood of the process being potential spyware, malware or a Trojan. BMalwarebytes Anti-Malware detects and removes sleeping spyware, adware, Trojans, keyloggers, malware and trackers from your hard drive.