Jump to content

Svchost.exe


Go to solution Solved by AdvancedSetup,

Recommended Posts

Hello.

I found lot of svchost.exe processes in Process Explorer. All of these processes are veryfied from Microsoft, with no VirusTotal detections and they are children of "Service.exe".

 

1.thumb.png.20cce7b37b7c0ecffaab9b615559c1d1.png

I have read every legitimate svchost process should have "0" in session, but I found some svchost with "2".  I think path of these processes is normal (C:\Windows\System32\svchost.exe). I scanned that file with VirusTotal and Malwarebytes, but nothing was detected. I also did full scan with Windows Defender, Malwarebytes and did some scans with adwcleaner. These processes doesn't use lot of CPU.

2.png.0f618a37f003b11917fb271b7652d807.png

(Translation: Connected devices platform user service_aee49)

 

Is this normal or should I be worried about that? I did clean Windows install and I think everything should be fine, but now I am not sure.

Link to post
Share on other sites

Edit: There are only 4 svchost.exe processes with session higher than "0". I didn't installed any pirated games or random software from internet, after reinstall I only installed few games from steam, google chrome, malwarebytes and programs from microsoft like process explorer.

Link to post
Share on other sites

  • Root Admin

There are a lot of them on all computers @PtrykPL that alone does not mean there is any infection on the system. Go ahead and run the steps below though and we'll see what we can find.

 

 

Please run the following steps and post back the logs as an attachment when ready.
Temporarily disable your antivirus or other security software first. Make sure to turn it back on once the scans are completed.
Temporarily disable Microsoft SmartScreen to download software below if needed. Make sure to turn it back on once the scans are completed.
If you still have trouble downloading the software please click on Reveal Hidden Contents below for examples of how to allow the download.

 

Spoiler
 
 
 
 
Spoiler

When downloading with some browsers you may see a different style of screens that may block FRST from downloading. The program is safe and used hundreds of times a week by many users.

Example of Microsoft Edge blocking the download

image.png

image.png

image.png

 



STEP 01

  • If you already have Malwarebytes installed then open Malwarebytes and click on the Scan button. It will automatically check for updates and run a Threat Scan.
  • If you don't have Malwarebytes installed yet please download it from here and install it.
  • Once installed then open Malwarebytes and select Scan and let it run.
  • Once the scan is completed make sure you have it quarantine any detections it finds.
  • If no detections were found click on the Save results drop-down, then the Export to TXT  button, and save the file as a Text file to your desktop or other location you can find and attach that log on your next reply.
  • If there were detections then once the quarantine has completed click on the View report button, Then click the Export drop-down, then the Export to TXT  button, and save the file as a Text file to your desktop or other location you can find and attach that log on your next reply.
  • If the computer restarted to quarantine you can access the logs from the Detection History, then the History tab. Highlight the most recent scan and double-click to open it. Then click the Export drop-down, then the Export to TXT  button, and save the file as a Text file to your desktop or other location you can find and attach that log on your next reply.
  • If Malwarebytes won't run then please skip to the next step and let me know in your next reply that the scanner would not run.

STEP 02

Please download AdwCleaner by Malwarebytes and save the file to your Desktop.

  • Double-click to run the program
  • Accept the End User License Agreement.
  • Wait until the database is updated.
  • Click Scan Now.
  • When finished, if items are found please click Quarantine.
  • Your PC should reboot now if any items were found.
  • After reboot, a log file will be opened. Attach or Copy its content into your next reply.

RESTART THE COMPUTER Before running Step 3

STEP 03
Please download the Farbar Recovery Scan Tool and save it to your desktop.

Note: You need to run the version compatible with your system. You can check here if you're not sure if your computer is 32-bit or 64-bit

  • Double-click to run it. When the tool opens, click Yes to disclaimer.
  • Press the Scan button.
  • It will make a log (FRST.txt) in the same directory the tool is run. Please attach it to your reply.
  • The first time the tool is run, it also makes another log (Addition.txt). If you've, run the tool before you need to place a check mark here each time
  • Please attach the Additions.txt log to your reply as well.
  • On your next reply, you should be attaching frst.txt and additions.txt to your post, every time.

 

Thanks

Link to post
Share on other sites

And something changed. Now there are not svchost.exe with session "2" but now it have "1" (I noticed this after I disabled "quick start" option). Path of these processes is still normal (system32). Every svchost process have same path. I scanned svchost.exe file with VirusTotal and there wasn't any detections and file had veryfied Microsoft signature. Yesterday I installed Kaspesky and run few scans. Also I scanned "svchost.exe" with this. Nothing was detected.

image.thumb.png.24d359c476c7d3b30bb8605be03572f9.png

These processes still doesn't use many CPU and I think PC works fine.

Link to post
Share on other sites

I forgot to say one thing.

I found something about forced system restart in logs (or something like that). This is because I accidentally killed lsass process in process explorer.

Also I found few errors with Windows Defender scans or sometching like this (i think in addition.txt). I don't know what happened, but I did more scans. I also did one full scan with Windows Defender, before asking for help here. These scans didn't found anything.

Link to post
Share on other sites

  • Root Admin
  • Solution

Kaspersky is a very good antivirus. It did not find anything. Malwarebytes and AdwCleaner did not find anything either.

How to determine what services are running under a SVCHOST.EXE process
https://www.bleepingcomputer.com/tutorials/list-services-running-under-svchostexe-process/

 

The Farbar logs don't show anything obvious as an issue

 

 

  • Thanks 1
Link to post
Share on other sites

  • Root Admin

Seems to be.

 

Let's go ahead and do some clean-up work and remove the tools and logs we've run.

Please download KpRm by kernel-panik and save it to your desktop.

  • right-click kprm_(version).exe and select Run as Administrator.
  • Read and accept the disclaimer.
  • When the tool opens, ensure all boxes under Actions are checked.
  • Under Delete Quarantines select Delete Now, then click Run.
  • Once complete, click OK.
  • A log will open in Notepad titled kprm-(date).txt.
  • Please attach that file to your next reply. (not compulsory)

 

  1. Recommend using a Password Manager for all websites, etc. that require a password. Never use the same password on more than one site.
    https://www.howtogeek.com/240255/password-managers-compared-lastpass-vs-keepass-vs-dashlane-vs-1password/
  2. Make sure you're backing up your files https://forums.malwarebytes.com/topic/136226-backup-software/
  3. Keep all software up to date - PatchMyPC - https://patchmypc.com/home-updater#download
  4. Keep your Operating System up to date and current at all times - https://support.microsoft.com/en-us/windows/windows-update-faq-8a903416-6f45-0718-f5c7-375e92dddeb2
  5. Further tips to help protect your computer data and improve your privacy: https://forums.malwarebytes.com/topic/258363-tips-to-help-protect-from-infection/ 
  6. Please consider installing the following Content Blockers for your Web browsers if you haven't done so already. This will help improve overall security

Malwarebytes Browser Guard

uBlock Origin

 

Further reading if you like to keep up on the malware threat scene: Malwarebytes Blog  https://blog.malwarebytes.com/

Hopefully, we've been able to assist you with correcting your system issues.

Thank you for using Malwarebytes

 

Link to post
Share on other sites

  • 3 weeks later...
  • Root Admin

Glad we could help.

If you need this topic reopened, please send a Private Message to any one of the moderating team members. Please include a link to this topic with your request.

This applies only to the originator of this thread. Other members who need assistance please start your own topic in a new thread.

Please review the following to help you better protect your computer and privacy Tips to help protect from infection

Thank you

 

 

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.