C:\SVCHOST.EXE

R

Randy

Had a bear of a time with this one. Spyware installer
running in root as SVCHOST.EXE. Adaware, Spysweeper and
MS AntiSpyware missed it. My eyes missed it in the
hijackthis scan MANY times.

In safe mode. I disabled startup with Highjack this and
the deleted contents of file in notepad. rebooted and
deleted file.


Since search is disabled on this site hopefully I did not
duplicate this info.

Randy
 
J

JohnF.

I just cleaned this off a machine two days ago - these spyware authors are
busy! I wish I had the time they seem to have.

One of the MS people might want the file itself if you still have it. I was
so glad to be able to nuke it I forgot to save a copy!
 
R

Randy

I thought of saving just after I nuked it. It took me so
long to find that I was just glad to get rid of it.

Randy
 
J

JohnF.

Yes, we understand that, BUT:

It is not that file when it is running from C:\svchost.exe

which coincidently is the theme of this thread!
 
C

Chris Ard [MSFT]

Correct. The only valid instance of svchost is from
Windows\system32\svchost.exe. Any other instance of svchost that is
running is malware.
In some cases, the spyware may create a service that runs using some
semi-legitimate name like IP/TCP Services so just looking at svchost won't
be enough because the instance of svchost is legitimate, but the service
running under it is not.

Chris Ard
Security Support
Microsoft Corporation

This posting is provided "AS IS" with no warranties, and confers no rights.
 
B

Bill Sanderson

I had the highly educational experience of listening to Lee Yan on the
subject of root kits the other day--thanks very much for chiming in here.
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top