Dear all,
I have run this question by several forums so far, with darn near no response. I would like to think that SNB users have a good bead on these issues, and can at least help clarify the issue I'm experiencing, even if a conclusive diagnosis is elusive.
I have run a full spectrum of anti-malware scans and have come up negative. It doesn't mean nothing's there, but I'm wondering if anyone can hypothesize alternate explanations. This started after trying to establish an adhoc network with a friend's laptop. His machine could be infected, but it might be a residual glitch in networking settings. I originally tried to use WiFi, and then gave up and used Ethernet. My OS (WS2008 x64) was considered the server in the adhoc arrangement.
I have a svchost shell kicking into action on boot that eats 50% of a dual-core CPU. It is blocking internet access. When I use Task Manager to kill it, IE8 immediately returns results. Like many such processes, it kicks into gear again after a moderate delay -- three times -- before it seems to give up. It seems to run at boot, but will also try to run as soon as I turn the WiFi radio on after it's been off, and as soon as I launch IE8.
According to Task Manager, the services running under this svchost shell all appear to be MS networking services:
1. Windows Remote Management (WinRM)
2. Terminal Services (TermService)
3. Network Location Awareness (NlaSvc)
4. KtmRm for Distributed Transaction Coordinator (KtmRm)
5. DNS Client (Dnscache)
6. Cryptographic Services (CryptSvc)
Any leads?
Incidentally, this is a basic question: Has anyone seen a newbie-friendly tutorial on the net for making use of network & drive I/O monitoring tools in this situation? I need to start very basic for now. The tutorials I've come across so far are for utilities that tell me registry info being accessed, when really the most useful utility for me right now would be one that starts off by telling me what apps / services are accessing the net and my drive.
Many thanks for your guesses and insights.
Regards,
a.k.a.
I have run this question by several forums so far, with darn near no response. I would like to think that SNB users have a good bead on these issues, and can at least help clarify the issue I'm experiencing, even if a conclusive diagnosis is elusive.
I have run a full spectrum of anti-malware scans and have come up negative. It doesn't mean nothing's there, but I'm wondering if anyone can hypothesize alternate explanations. This started after trying to establish an adhoc network with a friend's laptop. His machine could be infected, but it might be a residual glitch in networking settings. I originally tried to use WiFi, and then gave up and used Ethernet. My OS (WS2008 x64) was considered the server in the adhoc arrangement.
I have a svchost shell kicking into action on boot that eats 50% of a dual-core CPU. It is blocking internet access. When I use Task Manager to kill it, IE8 immediately returns results. Like many such processes, it kicks into gear again after a moderate delay -- three times -- before it seems to give up. It seems to run at boot, but will also try to run as soon as I turn the WiFi radio on after it's been off, and as soon as I launch IE8.
According to Task Manager, the services running under this svchost shell all appear to be MS networking services:
1. Windows Remote Management (WinRM)
2. Terminal Services (TermService)
3. Network Location Awareness (NlaSvc)
4. KtmRm for Distributed Transaction Coordinator (KtmRm)
5. DNS Client (Dnscache)
6. Cryptographic Services (CryptSvc)
Any leads?
Incidentally, this is a basic question: Has anyone seen a newbie-friendly tutorial on the net for making use of network & drive I/O monitoring tools in this situation? I need to start very basic for now. The tutorials I've come across so far are for utilities that tell me registry info being accessed, when really the most useful utility for me right now would be one that starts off by telling me what apps / services are accessing the net and my drive.
Many thanks for your guesses and insights.
Regards,
a.k.a.