Solved

task manager

Posted on 2011-03-04
6
435 Views
Last Modified: 2012-06-27
What is Pass ThruServ.exe running in the task manager? I stop the service and it reappears.  I have scanned the workstation for malware and virus and nothing comes up.  If this is not a necessary service for remotes or a specific program I would like to remove it.
0
Comment
Question by:neumonicmike
6 Comments
 
LVL 17

Expert Comment

by:houssam_ballout
ID: 35035578

Go to start> run>msconfig
then go to start up & uncheck the entry ThruServ.exe
Restart & try
0
 

Author Comment

by:neumonicmike
ID: 35035656
no ThruServ.exe in startup

I am thinking it might be part of antivirus reporting back and updating.
0
 
LVL 17

Accepted Solution

by:
houssam_ballout earned 125 total points
ID: 35036127
0
Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

 
LVL 16

Assisted Solution

by:speshalyst
speshalyst earned 125 total points
ID: 35036154
This looks to be associated with HTC devices.
Did you happen to plug in a HTC device to your machine anytime ?

http://whatisthisexe.com/bbs/board.php?bo_table=exe_p&wr_id=203
0
 
LVL 23

Expert Comment

by:phototropic
ID: 35036171
Take a look for C:\Program Files\HTC\Internet Pass-Through\PassThruSvr.exe

If you have that, you can disable it using this procedure:

http://whatisthisexe.com/bbs/board.php?bo_table=exe_p&wr_id=203

It seems to be related to Sigmatel:

http://service.iamnotageek.com/srch-4557.html

0
 

Author Comment

by:neumonicmike
ID: 35036233
yeah I noticed that the only difference on the machines was the HTC sink. Thought it might be a contributor.
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Nessus scan 5 138
Different types of mobile security tests 3 113
Exe program is not a valid Win 32 application 15 110
Event ID: 7016 / Source: Microsoft-Windows-GroupPolicy 7 130
A brand new malware strain was recently discovered by security researchers at Palo Alto Networks dubbed “AceDeceiver.” This new strain of iOS malware can successfully infect non-jailbroken devices and jailbroken devices alike.
Transferring data across the virtual world became simpler but protecting it is becoming a real security challenge.  How to approach cyber security  in today's business world!
Two types of users will appreciate AOMEI Backupper Pro: 1 - Those with PCIe drives (and haven't found cloning software that works on them). 2 - Those who want a fast clone of their boot drive (no re-boots needed) and it can clone your drive wh…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

809 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question