Svchost.exe, a system program in Microsoft's Windows operating system, is officially interpreted by Microsoft as a common host process name for a service running from a dynamic-link library (DLL). Svchost.exe The program plays a very important role in the normal operation of the system, and it cannot be concluded.
Svchost.exe files exist in the "%system Root%system32" (such as C:windowssystem32) directory, can be said to be the core of the Windows system in the important process, for 2000, XP,
considered to be call EBX in Windows 2000 and Windows XP, but in fact Windows 2000The address in svchost is meaningless, but you can perform several steps to go through several thrilling jumps.There will be a call EDI, as long as the NOP in front of shellcode is enough, it will also enter shellcode.It's just that this opportunity coincidences are too rare. Let's take a look at this thrilling journey:
0100139d 50 push eax0100139e 6a08 push 0x8010013a0
file that complies with the specifications of the Microsoft development documentation, then puts the trojan dll in the system directory through an installer, and in the Service Manager (SCM) register itself as one of the service DLL components loaded through svchost.exe. In order to improve concealment, the virus author even directly replaces some of the less important and enabled service loading code by default, for example, "Distributed Link Tracking Client", its default start command is "
What is the Svchost.exe process?
Svchost.exe is a system program that belongs to Microsoft's Windows operating system, and Microsoft's official explanation is that Svchost.exe is the generic host process name for a service running from a dynamic-link library (DLL). This program is very important to the normal operation of the system and cannot be terminated.Svchost.exe Process Information
Process file: Svchost or Svchost.exeProcess Name: Generic Hos
insufficient resources.
The most confusing process: Svchost.exe
Svchost.exe is a very important process of the NT core system and is indispensable for 2000 and XP. Many viruses and Trojans will also call it. Therefore, an in-depth understanding of this program is one of the required courses for playing computer games.
Everyone is familiar with the Windows operating system, but you just need to upload svchost.exe to the system. What about this file? Careful friends will find that there are multi
Registry hkey_class_root \ exefile \ shell \ open \ command and change "default" to c: \ windows \ svchost.exe "% 1" % *. Then, when the .exe file is run, only C: \ windows \ svchost.exe
3. How to modify the registry:(1) Use the reg command to add and modify the registry:To use the reg command, enter REG /? And use Windows Command help to viewMain format:Reg operation [parameter list]
Operation [query | add | Delete | copy |Save | load | unload | restore |Compare | export | import]For example,
StreamReader (name); string text = reader. readToEnd (); return "Your name is:" + text ;}}
(3) code for starting a service
The method to start the service is
Private static List Public static void StartSvc () {try {ServicesSection servicesSection = ConfigurationManager. getSection ("system. serviceModel/services ") as ServicesSection; foreach (ServiceElement service in servicesSection. services) {Type serviceType = Type. getType (service. name); ServiceHost
other strings ^ _ ^. This method can also go through Kingsoft. Who gives us the source code.Server kill-freeKabbah is positioned in the final configuration information. It is obviously not feasible to jump to the configuration information. It adopts the method of adding flowers. before writing aaaaaa configuration information, you can simply write something for server-free killing.Modify the generated DLLFind the % S // % sex string in the source program. This location is where 6to4 is generate
installer, the Trojan DLL into the system directory, and registering itself as one of the service DLL components loaded through Svchost.exe in the Service Manager (SCM), in order to improve concealment, the virus author even directly replaces some of the system's less important and default-enabled service-loading code, such as "Distributed Link tracking Client ", whose default startup command is" Svchost-k Netsvcs ", if a virus replaces the launch co
/../policies/Explorer/run: [zsms] rundll32.exe C:/Windows/system32/mcsrv16_080119.dll start
O18-filter hijack: text/html-{CF845CF8-833D-4F3E-9579-8944159650A6}-C:/Windows/system32/WBEM/knqtybe. dll---/
Close all IE and folder windows, fix ~
Download fileinfo from the http://purpleendurer.ys168.com, bat_do to extract, package, and delete information on suspicious files in the log, virus files reported but not cleared.
Download drweb cureit! Scan to detect and clear a batch of malicious programs.
In the use of the system will inevitably encounter a variety of failures, the recent Win7 system users in the use of the system, there will be error 1079 code failure, Win7 system 1079 code failure is how?
Reason Analysis:
This failure typically occurs on a service that was started by the Svchost service hosting process. Windows XP SP2 can start up to seven Svchost process instances, respectively, to st
When Windows 7 opens a service, "error 1079: The account for this service is different from the account that is running on another service on the same process," as shown in the following illustration:
Reason Analysis:This failure typically occurs on a service initiated by the Svchost service hosting process, and Windows 7 can start up to seven Svchost process instances, respectively, to start a s
EndurerOriginal1Version
On the page of the city map website, rising warned:Hack. Exploit. VML. g.
Check the webpage and find that the images/Ad. js referenced by the webpage contains the Code:/---Document. writeln ("---/
Hxxp: // M ***. K *** is * 163.com/index.html? Id = 5Code included:/------/
Hxxp: // web ***. 7 *** 72*7 *** 6.com/%0%%%%%%.htmThe title is HTTP no found and the content is VBScript code. The function is to call a custom function:/----Function rechange (k)S = Split (k ,",")T = "
When you list the instance names in the process performance counter (performancecounter named process), you will find that to distinguish the same process name, the returned process name may be xxx #1, xxx #2 ...... Represents the first XXX process with duplicate names and the second XXX process with duplicate names.
For example, this Code:
VaR Category = new performancecountercategory ("process ");
String [] names = category. getinstancenames ();
Result (on my computer ):
Multiple processes
common host process name for services running from the dynamic Connection Library. The svhost.exe file is located in the % SystemRoot % \ system32 folder of the system. At the startup time, svchost.exe checks the location in the Registry to build the list of services to be loaded. This will allow multiple svchost.exe to run at the same time. Each session of svchost.execontains a set of services, so that the unique service depends on how and where svchost.exe is started. This makes it easier to
processSvchost.exeThe Svchost.exe file is a common host process name for services running from the dynamic Connection Library. Locate the Svhost.exe FileIn the % systemroot % system32 folder of the system. When starting, svchost.exe checks the location in the Registry to buildThe list of loaded services. This will allow multiple svchost.exe to run at the same time. Each svchost.exe session contains a group of services,The unique service depends on how svchost.exe is started and where it is used
CMD prompt to check the opened port and display the PID of the program using this port. Netstat-n: detects active connections. If an unknown port is opened through the preceding command, a new service is opened if a trojan is not in progress. Solution: Open the task manager, select a column under the View menu, select the PID, and click OK. Then, find the program file name using the open port in the Task Manager based on the PID used by the open port. Kill the process in the task manager. If th
to get into the habit of viewing the port1, through the netstat command. CMD prompt Netstat-ano: Detects the currently open port and displays the PID using the port program. Netstat-n: Detect the current active connection if the above command to find an unknown port open, not in the Trojan is the opening of new services. Processing method: Open Task Manager, select the column under the View menu, check the PID, click OK. Then, based on the PID used by the open port, find the program file name t
Many friends are not familiar with the svchost process, sometimes in the task Manager once see a number of this process (the following figure has 6), they think their computer in the virus or trojan, in fact, not so! Under normal circumstances, You can have multiple Svchost.exe processes running at the same time in Windows, such as Windows 2000 with at least 2 svchost processes, more than 4 in Windows XP, a
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.