Hbkernel32.sys, aliimz.sys, system.exe, koauolte.exe, cho22.tmp, etc. 1
Original endurer
1st
A friend said that his computer was automatically canceled after login. Please help me with the repair.
First try the security mode, and the fault persists.
This happens when userinit.exe is maliciously replaced.
Therefore, use the win peoptical disk to start and use fileinfoto check userinit.exe:
File Description: C:/Windows/system32/userinit.exeAttribu
cards inserted into smart card readers. (System Service)Snmp.exe contains a proxy program that can monitor activities of network devices and report to the Network Console workstation. (System Service)Snmptrap.exe Receives trap messages generated by local or remote SNMP agents, and then transmits the messages to the SNMP manager running on this computer.. (System Service)UtilMan.exe starts and configures the auxiliary tool from a window. (System Service)Msiexec.exe installs, repairs, and deletes
Many friends are not familiar with the svchost process, sometimes in the task Manager once see a number of this process (the following figure has 6), they think their computer in the virus or trojan, in fact, not so! Under normal circumstances, You can have multiple Svchost.exe processes running at the same time in Windows, such as Windows 2000 with at least 2 svchost processes, more than 4 in Windows XP, a
)
Grovel.exe scans the duplicate files on the 0 backup storage (SIS) volume and points the duplicate files to a data storage point to save disk space. (System Services)
SCardSvr.exe manages and accesses the smart card inserted into the computer's smart card reader. (System Services)
Snmp.exe contains agents that can monitor the activity of network devices and report to the network console workstation. (System Services)
Snmptrap.exe receives trap messages generated by local or remote SNMP agents,
Virus features: The sxs.exe and autorun. inf files are automatically generated under each root directory, and the svohost.exe or sxs.exe files are also generated under windows \ System32. the file attributes are hidden attributes. Disable anti-virus software automatically.
Delete sxs.exe virus manually
Ctrl + Alt + Del Task Manager, search for sxs or SVOHOST in the process (not SVCHOST, with a different l
virus characteristics: Sxs.exe,autorun.inf files are automatically generated in each packing directory, and some are generated SVOHOST.exe or sxs.exe under Windows\System32, and the file attributes are implied attributes. Disable antivirus software automatically.
Sxs.exe Virus Manual Removal method
Ctrl + Alt + Del Task Manager, look in the process for SxS or svohost (not svchost, one letter), and then
from the dynamic Connection Library. The svhost.exe file is located in the % SystemRoot % system32 folder of the system. At the startup time, svchost.exe checks the location in the Registry to build the list of services to be loaded. This will allow multiple svchost.exe to run at the same time. Each session of svchost.execontains a set of services, so that the unique service depends on how and where svchost.exe is started. This makes it easier to con
Rootkit. win32.kernelbot, rootkit. win32.mnless, Trojan. win32.patched, backdoor. win32.rwx, etc. 1EndurerOriginal2008-07-141VersionA friend recently experienced a slow computer response. When using QQ, he always asked for activation. he suspected that he had hacked Trojans in the computer. Please help me with the repair.Download pe_xscan and run it. Use the task manager to stop the assumer.exe process, scan logs, and analyze the logs. The following suspicious items are found:Pe_xscan 08-07-01 b
Virus Specific analysis
File:SFF.exe
size:36864 bytes
File version:2.00.0003
md5:248c496dafc1cc85207d9ade77327f8b
sha1:b32191d44382ed926716671398809f88de9a9992
Crc32:8c51aaab
Writing language: Microsoft Visual Basic 5.0/6.0
The virus generates the following files
%system32%\svchost.com
Add under HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Add key value Svchost point to%
1. Advantages and Disadvantages of multiple services sharing a svchost.exe ProcessWindows system services are divided into two types: independent processes and shared processes. In windows nt, only the Server Manager scm(services.exe) has multiple shared services. As the number of built-in services increases, msworks to share many services in windows and is started by svchost.exe. Windows 2000 generally has two svchost processes. One is the RPCSS (Rem
concludes that this is a Trojan server file (Figure 2). See the Trojan using thread insertion technology and inserting the system's svchost process.
After the successful process of finding the Trojan, Dr. Zhang began to look for the launch of the Trojan Horse. Run System Repair Engineer (SRE), and click the "Start Project → service →win32 Service Application" button in turn.
When you select the "Hide Microsoft Services" option in the pop-up window,
There are many on the internet on the SVCHOST.exe CPU occupancy rate of the article, basically said the vast majority of users of the situation and give a solution, I quote a random search on the internet about this svchost article to see, if you have similar problems can refer to.
However, today X-force encountered problems, it seems that the text mentioned in the matter ... Because of my verification and elimination, I found that the problem is not
svchost to load backdoors. Zxshell also uses thisMethod. The main issue for this type of registration is unstable. You can change the registration table's sensitive key valueUnknown module appears in the loaded module. Of course, if you replace the original DLL with the same name as the original trojan dll, you can avoidThe above problems, but there will be new problems, that is, how to bypass Windows System File Protection and administrator routineS
svchost-> 135 tcp c: \ winnt \ system32 \ svchost. EXE is it clear at a glance. Now, what programs are opened on each port is under your eyes. If you find a suspicious program opens a Suspicious Port, don't worry about it. Maybe it's a tricky Trojan! fport is 2.0 in the latest version. In many websites provide download, but for the sake of safety, of course, i
with the system.
One way to replace the necessary programs started by the system is to write a cleanpwd, which clears the administrator password. The usage is as follows:(2). Usage1) Use a dual system, a boot disk, or a mounted disk to another system. If it is an NTFS partition, another system or boot disk should be able to read and write the NTFS partition, and set system32 \ drivers under the Windows installation directory.
2) Start the system and
Item of the Trojan.
This is not the case for clearing Trojans.
In the process monitoring tab of the Trojan helper finder, find the Svchost process used by the trojan program using the PID value and select it, click "Terminate selected process" to terminate the process. Select the "Background Service Management" option in the "startup Item Management" tab, find the trojan startup item in the service list, and select the "delete service" button.
Open
I have one more MDM under the Windows root directory on drive C. EXE file, which is automatically generated after each deletion and generates a process named SVCHOST. Since the process is in progress, all my folders are invisible, even if you select "show all files and folders" in the settings, turning off "Hide protected system files" is useless. what's going on?
I fell victim to this virus yesterday! Finally, the problem is solved (not formatting t
service dependent on it cannot be started. "
For more information about SC commands, see help SC
(Back up the registry before modification ),
Svchost shared service special: you may need to go to the Registry location after restart: [HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ svchost], View "C: \ windows \ system32 \ svchost.exe
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.