Support Forum Articles File Help Startup DB Tips Service DB Hijack This! Analyzer

 

KEY:

  • L = Legit, O = Open to Debate, X = Malware/Bad

Name Process Details
Xaol software (Aol Software)smss.exeAdded by the W32/Tilebot-FM WORM! Note: This is not the legitimate Windows process (Which is always
XCard Adapter (NETDown)smss.exeAdded by an unidentified TROJAN! of the Sdbot family. Note: This is not the legitimate Windows Proce
XSMSS (SMSS)smss.exeAdded by the W32/Tilebot-V WORM! Note: This worm file is found in the Windows or Winnt folder.
Xsql-smsssql-smss.exeAdded by the W32/Tilebot-GI WORM! Note: This worm rojan is located in C:%WINDIR% folder.
XssmsSMSS.EXEAdded by the SPYBOT.ADJ WORM! Note: This is not the legitimate Windows process SMSS.EXE (Which is al
XSystem Server (System Server)smss.exeAdded by the Troj/Feutel-T TROJAN! Note: This is not the legitimate Windows Process smss.exe. (Which
XWindows Management Updater (WinManUpdater)smss.exeAdded by the Troj/Kaos-E TROJAN! Note: This worm rojan is located in C:%WINDIR%
LWindows NT Session Managersmss.exeMicrosoft Windows NT Session Manager
XWindows NT Session Manager (SMSS)smss.exeAdded by the Backdoor.IRCBot.rh as identified by ewido. Note: This worm rojan is located in C:%WINDI
XWindows NT Session Managerssmss.exeAdded by the W32/Sdbot-CPN WORM! Note: This worm rojan is located in C:%WINDIR% Note: not to be conf
XWindows Object Managersmss.exeW32.Banish.A@mm - Symantec Description: Randomly copied characteristics of an already existing servi