Processes > smss.exe
Download Glary Utilities for free to end/block Windows processes to improve your computer's performance *100% Clean & Safe

smss.exe

File Name: smss.exe
Usefulness Rating:
Smss.exe is the execution file Session Management Subsystem, which is a part of the Windows Operating system and is responsible for starting and handling the user session, lauching the Winlogon and Win32(Csrss.exe) process, as well as setting system variables. After it has launched these processes, it waits for either Winlogon or Csrss to end. If this happens normally, the system shuts down; if it happens unexpectedly, Smss.exe causes the system to stop responding (hang). Smss.exe is an essential part of windows and is very important for the stable and secure running of computer. The smss.exe file is located in the folder C:\Windows\System32. In other cases, smss.exe is a virus, spyware, trojan or worm.
Other instance of smss.exe:
Many malware programs try to look like legitimate computer processes and the smss.exe trojan is one of them.
Many times malware in the form of smss.exe is a trojan called Flood.F. Flood.F is considered to be a serious security risk. Like most trojans, Flood.F can steal or reveal sensitive data or documents. Many computer users that are infiltrated by a trojan horse can be subjected to their personal and financial information being stolen and used for credit card fraud or identity theft.
Recommendation:
smss.exe is an essential part of Windows and required for Windows to work properly. It should never be disabled. But if he smss.exe file is not located in the folder C:\Windows\System32, it must be a virus, spyware or trojan and you should remove it immediately.
Users Opinions:
Amber Mcartur
0 0 Report Abuse
it's okay
Mocosoft
0 1 Report Abuse
El archivo "smss.exe" es el cliente de IRC que se conecta a un servidor por el puerto 6667. Los demás son archivos usados por el troyano, pero no poseen código malicioso, y por lo tanto no suelen ser detectados por los antivirus. El troyano crea la siguiente entrada en el registro para autoejecutarse en próximos reinicios de Windows: HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Run SMSS = c:\\windows\\system32\\catroot\\msa\\smss.exe Una vez en memoria, el troyano realiza las siguientes acciones: 1. Intenta conectarse a un servidor de IRC por el puerto 6667 y queda a la espera de comandos. 2. Intenta lanzar el archivo "vlxd.exe" en forma remota a través de recursos compartidos en red. Se utiliza para ello una herramienta legítima, "psexec.exe". Esta herramienta es conocida como "PsExec". Antes, el archivo "smss.exe" es copiado en la computadora remota. El troyano intenta una combinación de nombres de usuarios y contraseñas para acceder a las máquinas remotas. More information
Matt
0 0 Report Abuse
people on this forum in general need to start giving info other than good/bad - is it possible, for instance, to change the priority? provided you don't mind waiting a bit longer when your computer hangs - putting this proess on "low" should be fine.
aa26668
0 0 Report Abuse
This is a component of the Microsoft Windows NT operating system. Refer to Wikipedia for definition and description of "smss.exe". More information
clebert dos santos
0 1 Report Abuse
essencial para o windons
Moacir Júnior
0 1 Report Abuse
Essencial para o funcionamento do windows
no user
0 0 Report Abuse
confiavel
Setanta
2 0 Report Abuse
my ssms.exe shows up via Glary Utilities as file type 0e*@* IS THIS A VIRUS...Help appreciated.
Han Solo
1 0 Report Abuse
Don't know if it's Microsoft
Franklyn
0 0 Report Abuse
How to down or close this socket More information
First Previous 1 2 3 4 5 6 Next Last
Please click to rate it.

Not useful Useful

The link is not a valid url.

Glarysoft uses cookies to improve content and ensure you get the best experience on our website. By continuing to use this website, you agree to our privacy policy.

Got it