Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

<non-existent> processes shown in TCPview / sysinternals.com

Posted on 2004-09-30
5
Medium Priority
?
3,103 Views
Last Modified: 2013-12-04
OS: XP Pro MCE SP1
CPU: Intel P4 3.0G HT

What is a "non-existent" process and why are there so many sitting idle?  I've seen this once before with a tricky trojan that I could only detect with a german freeware antivirus program whose name I cannot recal in an .INS while running in safe mode

http://img35.exs.cx/img35/3721/EE_040930_nonexistentprocesshuh.png

I've used a variety of the online scanners despite my Internet explorer loathing, run spybot and adaware, and run a full system scan with NAV2004 with no results.   None of my programs are configured to use ports:  548, 952 or 2388, nor does the router allow traffic in on those ports.  At no time was an event triggered in the software firewall on this machine.

Nothing tricky seems to be running according to both HiJackThis and RegSeeker


help?

0
Comment
Question by:paradoxloss
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
5 Comments
 

Author Comment

by:paradoxloss
ID: 12188201
It occurs to me I should mention that there is no actual established connection to anywhere:

http://img35.exs.cx/img35/2141/EE_040930_nonexistentprocesslisten.png

0
 
LVL 11

Assisted Solution

by:ghana
ghana earned 1500 total points
ID: 12193345
ActivePorts is a freeware that will show which port is opened by which program (similar to TCPview). I would hope this software will be able to identify the corresponding executable. If you know the name of the executable this will give a hint whether it is a normal or malware process.

ActivePorts: http://www.protect-me.com/freeware.html
0
 
LVL 11

Assisted Solution

by:ghana
ghana earned 1500 total points
ID: 12193367
By the way: Were you logged in with local administrative rights when starting TCPview?
0
 

Author Comment

by:paradoxloss
ID: 12466908
@ghana

Active ports returned the same vague informatin as did process explorer from sysinterals (the screenshot).   Yes, that account has admin rights

{puzzled}
0
 
LVL 11

Accepted Solution

by:
ghana earned 1500 total points
ID: 12476936
Some time ago I found somewhere an explanation about those processes: They claimed that these processes are inactive and marked for termination but not already terminated. Although this information might be true it's still the question why this behaviour does not occure on more computers.
0

Featured Post

Threat Trends for MSPs to Watch

See the findings.
Despite its humble beginnings, phishing has come a long way since those first crudely constructed emails. Today, phishing sites can appear and disappear in the length of a coffee break, and it takes more than a little know-how to keep your clients secure.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many of us in IT utilize a combination of roaming profiles and folder redirection to ensure user information carries over from one workstation to another; in my environment, it was to enable virtualization without needing a separate desktop for each…
Our Group Policy work started with Small Business Server in 2000. Microsoft gave us an excellent OU and GPO model in subsequent SBS editions that utilized WMI filters, OU linking, and VBS scripts. These are some of experiences plus our spending a lo…
Are you ready to place your question in front of subject-matter experts for more timely responses? With the release of Priority Question, Premium Members, Team Accounts and Qualified Experts can now identify the emergent level of their issue, signal…
Is your data getting by on basic protection measures? In today’s climate of debilitating malware and ransomware—like WannaCry—that may not be enough. You need to establish more than basics, like a recovery plan that protects both data and endpoints.…
Suggested Courses

610 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question