Solved

Non-logged in user is running a process on another PC

Posted on 2011-09-22
3
227 Views
Last Modified: 2012-05-12
When I bring up the Task Manager on a logged in PC by user 1 another user is shown to be running a process. This is not authorized and I’m having problems determining exactly what is going on.

It shows up in Task Manager as dllhost.exe and not run by “user1”, System, or Network service but “user2” on user1’s PC.

Any help is appreciated.
0
Comment
Question by:bmilne1957
  • 2
3 Comments
 
LVL 11

Expert Comment

by:packetguy
ID: 36582098
Dllhost.exe normally is running for each user on a PC. It;s the Windows DCOM DLL Host Process, and the file is located in the folder C:\Windows\System32. There are, however, virus counterfeits of this program; if you're finding it in a location other than the one above, then you likely have an infected system.

The original Microsoft file comes with the DCOM software and is required part of the OS, so don't delete it. Don't terminate it from Windows Task Manager either.

The real Dllhost.exe file is not spyware, it has nothing to do with adware or popups, it is not considered to be malicious and it is not to be removed.

The virus counterfeit Dllhost.exe is dangerous malware/spyware and constitutes a serious security threat. The best fix is to reinstall the OS, but a high-quality anti virus removal tool (or two or more to be sure) could eradicate it.
0
 

Accepted Solution

by:
bmilne1957 earned 0 total points
ID: 36896795
The file Dllhost.exe verified as MS issued but we are still having the same problem of another domain user running a process on a domain PC that is not their own.

Any ideas?
0
 

Author Closing Comment

by:bmilne1957
ID: 36960807
Question not answered
0

Featured Post

Free Tool: Site Down Detector

Helpful to verify reports of your own downtime, or to double check a downed website you are trying to access.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
Envision that you are chipping away at another e-business site with a team of pundit developers and designers. Everything seems, by all accounts, to be going easily.
Although Jacob Bernoulli (1654-1705) has been credited as the creator of "Binomial Distribution Table", Gottfried Leibniz (1646-1716) did his dissertation on the subject in 1666; Leibniz you may recall is the co-inventor of "Calculus" and beat Isaac…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

733 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question