

System directories in Windows 7 are all well protected by default, so any malware will have to use a temporary directory outside of the system area.

Some very old software, like Microsoft Office 2000, has no signature to check, which will lead to an 'Unable to verify' message. It's likely that the manufacturer isn't a verified signer of images. If verifying the image of a seemingly legitimate process produces the message 'Unable to verify', don't panic. When verifying images, pay particular attention to processes that have no entry in the 'Company name' column, those whose description is blank or meaningless, and those whose name is a jumble of letters. If they match, it changes the text to read 'Verified'. Process Explorer uses the running process to generate its own signature and compares the two. Clicking the 'Verify' button verifies the image against a stored signature. Next to the process's icon are the words 'Not verified'. You can verify that the process hasn't been tampered with or infected by malware by selecting the 'Image' tab. To get more details of any process, double-click it. I got the idea about this solution from this link.To make it easier to spot such files, you can click the 'Process' column heading until you get an alphabetical listing. I never post on forums but saw a bunch of questions about this and on good solutions so I thought I had to post. I didn't find any other solutiosn to this problem on the web so please let others know if this works for you. Somehow some virus probably put this key in the registyr but since it is a valid key, it is hard for malware detectors to find this. On my computer the key was present in current user but not in local machine. I deleted the key all together and the problem went away. If there is a batch file in this key then figure out what that batch file is doing and if you want it there. On my computer the key was there but empty. The current user entry mixes in with the local machine entry so if the key exists in the current user registry then it will try to execute the listed batch file. If the problem is user specific, check HKCU\Software\Microsoft\Command Prompt for this key. You can try to skip this execution to test the solution using RUN cmd.exe /d If there is an "Autorun" key, this key causes the batch file entry in this key to run at the beginning of the command prompt execution. Investigate registry entry HKLM\Software\Microsoft\Command Processor I had this problem and found something to try that solved my problem. Hope these symptoms and my answer will help someone in future McAfee showed some activity lat week and I've noticed it last Friday. Have no idea what kind of thing set that key up.
#Win7 process monitor code#
That one also explains why exit code was 0x0. This can be fixed by using Autoruns, where you need to disable command prompt startup registries on Logon/Startup tab. In some cases, the Command prompt is also opening on Startup, which is when the above solution is applied hangs the system on Command prompt when you logon.
