Solved

Non-logged in user is running a process on another PC

Posted on 2011-09-22
3
225 Views
Last Modified: 2012-05-12
When I bring up the Task Manager on a logged in PC by user 1 another user is shown to be running a process. This is not authorized and I’m having problems determining exactly what is going on.

It shows up in Task Manager as dllhost.exe and not run by “user1”, System, or Network service but “user2” on user1’s PC.

Any help is appreciated.
0
Comment
Question by:bmilne1957
  • 2
3 Comments
 
LVL 11

Expert Comment

by:packetguy
ID: 36582098
Dllhost.exe normally is running for each user on a PC. It;s the Windows DCOM DLL Host Process, and the file is located in the folder C:\Windows\System32. There are, however, virus counterfeits of this program; if you're finding it in a location other than the one above, then you likely have an infected system.

The original Microsoft file comes with the DCOM software and is required part of the OS, so don't delete it. Don't terminate it from Windows Task Manager either.

The real Dllhost.exe file is not spyware, it has nothing to do with adware or popups, it is not considered to be malicious and it is not to be removed.

The virus counterfeit Dllhost.exe is dangerous malware/spyware and constitutes a serious security threat. The best fix is to reinstall the OS, but a high-quality anti virus removal tool (or two or more to be sure) could eradicate it.
0
 

Accepted Solution

by:
bmilne1957 earned 0 total points
ID: 36896795
The file Dllhost.exe verified as MS issued but we are still having the same problem of another domain user running a process on a domain PC that is not their own.

Any ideas?
0
 

Author Closing Comment

by:bmilne1957
ID: 36960807
Question not answered
0

Featured Post

Netscaler Common Configuration How To guides

If you use NetScaler you will want to see these guides. The NetScaler How To Guides show administrators how to get NetScaler up and configured by providing instructions for common scenarios and some not so common ones.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Transferring data across the virtual world became simpler but protecting it is becoming a real security challenge.  How to approach cyber security  in today's business world!
I've been an avid user and supporter of Malwarebytes Premium Version 2.x for years. It's an excellent product that runs alongside just about any Anti-Virus application without issues. It seems to have an uncanny ability to pick up many things that A…
This tutorial gives a high-level tour of the interface of Marketo (a marketing automation tool to help businesses track and engage prospective customers and drive them to purchase). You will see the main areas including Marketing Activities, Design …
Although Jacob Bernoulli (1654-1705) has been credited as the creator of "Binomial Distribution Table", Gottfried Leibniz (1646-1716) did his dissertation on the subject in 1666; Leibniz you may recall is the co-inventor of "Calculus" and beat Isaac…

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question