smss.exe
File Name: | smss.exe | ||
Usefulness Rating: | |||
Smss.exe is the execution file Session Management Subsystem, which is a part of the Windows Operating system and is responsible for starting and handling the user session, lauching the Winlogon and Win32(Csrss.exe) process, as well as setting system variables. After it has launched these processes, it waits for either Winlogon or Csrss to end. If this happens normally, the system shuts down; if it happens unexpectedly, Smss.exe causes the system to stop responding (hang). Smss.exe is an essential part of windows and is very important for the stable and secure running of computer. The smss.exe file is located in the folder C:\Windows\System32. In other cases, smss.exe is a virus, spyware, trojan or worm. | |||
Other instance of smss.exe: | |||
Many malware programs try to look like legitimate computer processes and the smss.exe trojan is one of them. Many times malware in the form of smss.exe is a trojan called Flood.F. Flood.F is considered to be a serious security risk. Like most trojans, Flood.F can steal or reveal sensitive data or documents. Many computer users that are infiltrated by a trojan horse can be subjected to their personal and financial information being stolen and used for credit card fraud or identity theft. |
|||
Recommendation: | |||
smss.exe is an essential part of Windows and required for Windows to work properly. It should never be disabled. But if he smss.exe file is not located in the folder C:\Windows\System32, it must be a virus, spyware or trojan and you should remove it immediately. |
|||
Users Opinions: | |||
Amber Mcartur | 0 0 Report Abuse | ||
it's okay | |||
Mocosoft | 0 1 Report Abuse | ||
El archivo "smss.exe" es el cliente de IRC que se conecta a un servidor por el puerto 6667. Los demás son archivos usados por el troyano, pero no poseen código malicioso, y por lo tanto no suelen ser detectados por los antivirus. El troyano crea la siguiente entrada en el registro para autoejecutarse en próximos reinicios de Windows: HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Run SMSS = c:\\windows\\system32\\catroot\\msa\\smss.exe Una vez en memoria, el troyano realiza las siguientes acciones: 1. Intenta conectarse a un servidor de IRC por el puerto 6667 y queda a la espera de comandos. 2. Intenta lanzar el archivo "vlxd.exe" en forma remota a través de recursos compartidos en red. Se utiliza para ello una herramienta legÃÂtima, "psexec.exe". Esta herramienta es conocida como "PsExec". Antes, el archivo "smss.exe" es copiado en la computadora remota. El troyano intenta una combinación de nombres de usuarios y contraseñas para acceder a las máquinas remotas. More information | |||
Matt | 0 0 Report Abuse | ||
people on this forum in general need to start giving info other than good/bad - is it possible, for instance, to change the priority? provided you don't mind waiting a bit longer when your computer hangs - putting this proess on "low" should be fine. | |||
aa26668 | 0 0 Report Abuse | ||
This is a component of the Microsoft Windows NT operating system. Refer to Wikipedia for definition and description of "smss.exe". More information | |||
clebert dos santos | 0 1 Report Abuse | ||
essencial para o windons | |||
Moacir Júnior | 0 1 Report Abuse | ||
Essencial para o funcionamento do windows | |||
no user | 0 0 Report Abuse | ||
confiavel | |||
Setanta | 2 0 Report Abuse | ||
my ssms.exe shows up via Glary Utilities as file type 0e*@* IS THIS A VIRUS...Help appreciated. | |||
Han Solo | 1 0 Report Abuse | ||
Don't know if it's Microsoft | |||
Franklyn | 0 0 Report Abuse | ||
How to down or close this socket More information | |||
First Previous 1 2 3 4 5 6 Next Last |