SVWHOST.EXE - Dangerous
%WINDIR%\SYSTEM\SVWHOST.EXE
Manual removal instructions:
Antivirus Report of %WINDIR%\SYSTEM\SVWHOST.EXE:
%windir%\system\svwhost.exe
We suggest you to remove SVWHOST.EXE from your computer as soon as possible.
SVWHOST.EXE is known as: Backdoor.Shellbot, W32.Agent.JBK, BKDR_SHELLBOT.AE, Win32:Trojano-1320, Trojan.Agent-134, Backdoor.Agent.IW0, Trojan.Inject.202, BDS.Agent.IW, Trojan.Agent.bery, Trojan.Agent, Trojan.Malagent, Win-Trojan.Agent.12288.EU, BehavesLike.Malware (v), Backdoor.Agent.iw, BackDoor.Agent.10.AF, Trj.Downloader.MDW.
MD5 of SVWHOST.EXE = 47cc0503eee9fd19ccaba982cc813ca0
SVWHOST.EXE size is 12288 bytes.
Full path on a computer: %WINDIR%\SYSTEM\SVWHOST.EXE
Related Files:
%WinDir%\system\svwhost.dll
%WinDir%\system\svwhost.exe
%WINDIR%\SYSTEM\SVWHOST.EXE | Backdoor.Shellbot, W32.Agent.JBK, BKDR_SHELLBOT.AE, Win32:Trojano-1320, Trojan.Agent-134, Backdoor.Agent.IW0, Trojan.Inject.202, BDS.Agent.IW, Trojan.Agent.bery, Trojan.Agent, Trojan.Malagent, Win-Trojan.Agent.12288.EU, BehavesLike.Malware (v), Backdoor.Agent.iw, BackDoor.Agent.10.AF, Trj.Downloader.MDW. |
%WINDIR%\SYSTEM\SVWHOST.EXE | Dangerous |
%WINDIR%\SYSTEM\SVWHOST.EXE | High Risk |
SVWHOST.EXE is known as: Backdoor.Shellbot, W32.Agent.JBK, BKDR_SHELLBOT.AE, Win32:Trojano-1320, Trojan.Agent-134, Backdoor.Agent.IW0, Trojan.Inject.202, BDS.Agent.IW, Trojan.Agent.bery, Trojan.Agent, Trojan.Malagent, Win-Trojan.Agent.12288.EU, BehavesLike.Malware (v), Backdoor.Agent.iw, BackDoor.Agent.10.AF, Trj.Downloader.MDW.
MD5 of SVWHOST.EXE = 47cc0503eee9fd19ccaba982cc813ca0
SVWHOST.EXE size is 12288 bytes.
Full path on a computer: %WINDIR%\SYSTEM\SVWHOST.EXE
Related Files:
%WinDir%\system\svwhost.dll
%WinDir%\system\svwhost.exe
Dmitry Sokolov:
I created UnHackMe in 2006 to fix the problem that antivioruses did not fix: detecting rootkits.
Since that time I work every day to fix the issues that antiviruses cannot.
If your antivirus have not helped you solve the problem, you should try UnHackMe.
We are a small company and you can ask me directly, if you have any questions.