Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

How to hide a process from TaskManager/Processes?is possible?

Posted on 2016-09-16
9
Medium Priority
?
1,213 Views
Last Modified: 2016-09-21
How to hide a process from TaskManager/Processes?is possible?
thanks
0
Comment
Question by:john lambert
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
  • 2
  • +2
9 Comments
 
LVL 98

Expert Comment

by:John Hurst
ID: 41801692
Not really, because you can always unhide the processes.  Then you can always run Process Explorer (Microsoft SysInternals) and see all.
0
 
LVL 14

Expert Comment

by:Schnell Solutions
ID: 41801702
Hello.

The list of processes that you get from the system are controlled by the OS kernel. And the list of processes returns specifically the process that are listed at different states. You cannot hide something from that list, the only processes that are not shown are the ones that are not specified if your do not have permissions to list them (like when you see the processes from a normal account, and not an administrative account). Despite of it you cannot.

There are cases of viruses that they try using different names (similar to normal processes) or they run as childs of a parent process. But even these malicious processes they cannot hide at all if they are processes. Unless there is a Kernel modification of the system, that could be something very deep.
0
 
LVL 83

Accepted Solution

by:
David Johnson, CD, MVP earned 2000 total points
ID: 41801704
you can obfuscate it but not really have it not show
1
NFR key for Veeam Agent for Linux

Veeam is happy to provide a free NFR license for one year.  It allows for the non‑production use and valid for five workstations and two servers. Veeam Agent for Linux is a simple backup tool for your Linux installations, both on‑premises and in the public cloud.

 
LVL 36

Expert Comment

by:Kimputer
ID: 41801734
Rootkits have successfully hidden from the Taskmanager (and Windows as a whole, so that includes Antivirus as well). If you program something similar, you'll successfully hide your process. However, I don't want to be you if you are ever caught red handed for distributing these kind of software (see Sony fiasco).
1
 

Author Comment

by:john lambert
ID: 41801740
giv em a link Kimputer
0
 
LVL 36

Expert Comment

by:Kimputer
ID: 41801748
Sorry, rootkits are malware. There's no way I will post malware links here. Slightly concerned that you don't mind making illegal software and distributing to your friends/customers/co-workers.
1
 
LVL 98

Expert Comment

by:John Hurst
ID: 41801755
If the author is trying to create viruses and malware, that is also against the posting rules.

If the question is truly legitimate, you can run, but not hide.
0
 
LVL 14

Expert Comment

by:Schnell Solutions
ID: 41801772
Hello,

If it is a process, it is shown on the process list of the system. Sometimes malware uses familiar names that we will not look through them. On other occasions they run within an infected different process. But it it is a process it appears there unless the OS kernel has been modified or special 'systems call' is passed to it (controlled by the kernel).

Some cases of malware do not appear as processes, because they are not processes at all, or because they are not running at that moment. They may be activated with different conditions or successes in the system, but not necessarily running at that moment.
1
 

Author Closing Comment

by:john lambert
ID: 41810095
thank you very much!!!!!!
0

Featured Post

Free Tool: IP Lookup

Get more info about an IP address or domain name, such as organization, abuse contacts and geolocation.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The following article is intended as a guide to using PowerShell as a more versatile and reliable form of application detection in SCCM.
The Nano Server Image Builder helps you create a custom Nano Server image and bootable USB media with the aid of a graphical interface. Based on the inputs you provide, it generates images for deployment and creates reusable PowerShell scripts that …
Exchange organizations may use the Journaling Agent of the Transport Service to archive messages going through Exchange. However, if the Transport Service is integrated with some email content management application (such as an antispam), the admini…
This tutorial will teach you the special effect of super speed similar to the fictional character Wally West aka "The Flash" After Shake : http://www.videocopilot.net/presets/after_shake/ All lightning effects with instructions : http://www.mediaf…

704 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question