What Is Microsoft Windows Host Process Rundll32?

Written by eleanor evans
  • Share
  • Tweet
  • Share
  • Pin
  • Email
What Is Microsoft Windows Host Process Rundll32?
Rundll.exe is a necessary operation in Microsoft Windows operating systems. (monitor with padlock image by patrimonio designs from Fotolia.com)

Rundll32.exe is a program run by Microsoft required to run Dynamic Link Library (DLL) files. It is a necessary file from Microsoft, but spyware developers have also figured out how to run virus programs under the same name.

Other People Are Reading

Purpose of Rundll.exe

Dynamic Link Libraries store information for every application in Windows. Microsoft's RunDll32.exe runs to launch functionalities in DLL files. However, spyware developers have discovered ways to run malicious programs as RunDll32.exe to disguise themselves. The best way to combat malicious software is to check for duplicates of the RunDll32.exe file.

Determining If RunDll32.exe Is Legitimate or Malicious

Search all drives in Windows for any duplicates of RunDll32.exe. The legitimate copy of RunDll32.exe can be found in \Windows\System32\rundll32.exe. Any other copies should be deleted. The Windows Task Manager can also determine any malicious copies of the file; press ctrl-alt-del to run the task manager, click the "processes" tab and hover the mouse over all instances of RunDll32.exe. The true identity of all malicious copies will show up.

Running Malware Scans

Malware-detection software is the safest way to browse your computer for malware and to protect it against future attacks. Check reliable sites such as CNET.com for rated spyware and malware-detection and removal programs, and read reviews of any applications before downloading and installing any new files.

Don't Miss

Filter:
  • All types
  • Articles
  • Slideshows
  • Videos
Sort:
  • Most relevant
  • Most popular
  • Most recent

No articles available

No slideshows available

No videos available

By using the eHow.co.uk site, you consent to the use of cookies. For more information, please see our Cookie policy.