Posts Tagged ‘shellexecutehook’
The term “shell execute hook” may be a familiar one to computer techs and geeks (said nicely and with admiration), but for the rest of us common folks, it sounds like something a boxer might use in the ring. However, that’s not at all what a shell execute hook is. Without sounding techie, a shell is computer lingo for a basic computer function that is supported by most Windows versions. Shells are part of the computer’s brain coding that make it do its thing, without you having to know what it is or how to control it.
A shell execute and Shell Execute Hook are used by Windows to start most operations and functions within Windows Explorer. If something gets messed up at that point, you’re going to see problems. Basically, everything that you do through the shell, or function within Windows, is completed through the shell execute hook.
A shell execute hook is a way for Windows to add what are called hooks to message handling systems within Windows. When used legitimately and legally, they help your computer do what it’s supposed to do. When a shell execute hook is used as a method for attack against your computer, you’ll have to try to isolate it and dispose of it as soon as possible. Such hooks are able to intercept messages in a desktop and are used in conjunction with what are called DLL extensions.
To keep it simple, suffice it to say that any spyware that invades your Registry system, which is the inner brain of the computer. Various spyware and viruses and even Trojans can have different effects on the registry files in your computer so it’s best not to allow them any opportunities to get in there in the first place. This type of infection can alter your computer behavior, cause crashes, redirecting your browser to something else, sluggish transitions and a multitude of pop up windows, but such behavior will depend on the type of virus or spyware that has gotten in.
The problem with this is that spyware has managed to piggy back into many computers through a Trojan that disguises itself as a necessary shell execute hook function. The name for this little bug is Ljack.ShellExecuteHook, but it can be known as a different type of Trojan or by another name, but basically, they work the same way, by invading through a warning that your computer has been compromised and that you need to install this to make it all better.
This type of shell execute hook Trojan attack was popular a year or so ago and occurred through infection of what was called the Klez worm. If you know something about your program files, you may be able to spot a Shell Execute Hook spyware, but if not, it’s best to purchase an anti spyware or anti virus program to try to clean out your files. In severe cases of infections or invasions, you may have to give your computer a complete lobotomy and start fresh. That’s why you should always make backups of your system files and your working files. Flash drives make this procedure much easier than it used to be, and doing so will help to save the bulk of your computer files in the case of an attack.