Svchost Process Analyzer : Test your machine

Status
Not open for further replies.

Rishi

Level 19
Thread author
Verified
Honorary Member
Top Poster
Well-known
Dec 3, 2015
938
When it comes to malware, untrained eyes may struggle to figure out whether a file is malicious or not. The svchost.exe virus, in particular, falls under this umbrella of ambiguity — while the virus attached to this file is obviously bad, the svchost.exe by itself is really a core Windows file.So many times we hear about svchost being a suspicious file in the Malware Reporting Forum, and there is a reason for that.
The authentic svchost.exe file is located in C:\Windows\System32, but numerous viruses and trojans use the same file and process name to hide their activities.
How to check svchost status quickly? The free Svchost Process Analyzer makes it easy by listing all svchost instances and checks the services they contain.This makes it easy to uncover Svchost worms like the infamous Conficker worm.
  • 100% freeware
  • doesn't require runtimes
  • doesn't require installation
  • doesn't write to the registry
  • doesn't modify files outside of its own directories
On a side note : Experts at MT will be digging into their advanced task managers, etc, but, this small utility isn't meant to compete with paid/free ones like process hacker and process explorer.Just a fun, quick way to scan svchost. I am posting my results here, let's see yours .;)

upload_2016-1-2_19-57-59.png

upload_2016-1-2_19-58-36.png

All clean;)
 

Attachments

  • upload_2016-1-2_19-58-21.png
    upload_2016-1-2_19-58-21.png
    58.7 KB · Views: 420
Status
Not open for further replies.

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top