![]() ![]() ![]() Note: the valid process is normally located at \Windows\System32\rundll32.exe, but sometimes spyware uses the same filename and runs from a different directory in order to disguise itself. This executable is a valid part of Windows, and normally shouldn’t be a threat. Since there’s no way to directly launch a DLL file, the rundll32.exe application is simply used to launch functionality stored in shared. If you’ve been around Windows for any amount of time, you’ve seen the zillions of *.dll (Dynamic Link Library) files in every application folder, which are used to store common pieces of application logic that can be accessed from multiple applications.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |