Jump to content


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.

Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.


SVCHOST.EXE virus? Or not?

  • Please log in to reply
1 reply to this topic

#1 blaineo


  • Members
  • 1 posts
  • Local time:07:08 AM

Posted 17 August 2011 - 09:55 PM

Well, I've been looking for something on this topic the last couple nights, and have found lot's of info, though, none that might help. :( To start, I'm running Win XP Home, SP2 with Norton 360 2010. I've run scans, and found nothing, run Malwarebytes Anti-Malware, n' found 1 thing, but doesn't seem to help. My Problem? A night or two ago, I noticed my computer was kinda sluggish, and my drive light runnin' for a long time. I brought up Task Manager and noticed one of the SVCHOST.EXE's was running OVER 1,500,000k...yes, that's over 1.5 mil. bytes. I check TM regularly, and I didn't know what the deal was with it. I obviously know its a WINDOWS program, so I didn't attempt to shut it off. Finally after fighting with lag n' other issues, I just decided to restart, and noticed that the same SVCHOST.EXE was running at 65,000 right after bootup, and continued to climb to over 100,000. Right now as I'm typing this it's at 265,000k......and tonight when I got home after work, I noticed intrusion attempts being blocked by my Norton. LOT'S of them, from various sites and IP's. I surf, but don't do "porn" and stick to the same sites when it comes to networking and stuff, and never had a problem. And i've NEVER seen my SVCHOST.EXE programs in the Task Manager that high...even higher than 20-30k. Sometimes it get's so high, that windows actually shuts it down itself due to some error.
One of my history logs says this in Norton to give you an example of what I'm dealin' with, and they're popping up from different IP's all the time.....
"Network traffic from matches the signature of a known attack. The attack was resulted from \DEVICE\HARDDISKVOLUME3\WINDOWS\SYSTEM32\SVCHOST.EXE. To stop being notified for this type of traffic, in the Actions Panel, click Stop Notifying Me. Network traffic from a.teenshardcore.org/dl/dl.php?1 matches the signature of a known attack. The attack was resulted from \DEVICE\HARDDISKVOLUME3\WINDOWS\SYSTEM32\SVCHOST.EXE. To stop being notified for this type of traffic, in the Actions Panel, click Stop Notifying Me."
I've also recieved popups from my norton about somethin' of a blackhole toolkit, and a malicious toolkit variant 22..I tried lookin' for the exact things, but haven't found them in my Norton logs. :( I was going to rollback my system with sys. restore, but, to my surprise, "somehow" it was turned off, and I have no restore points, or at least it's not letting me roll back the calender. I also noticed that my Lynksis Router somehow got reset to it's factory settings, and I was without WAN Wireless Security on it for a while. Whether or not them two things have anything to do with it, I don't know. I'm hoping someone can give me a lil insight as to what I can do to solve this problem and stop someone from hacking into my computer, which I think someone is.....:(

Thanks in advance,

BC AdBot (Login to Remove)


#2 Broni


    The Coolest BC Computer

  • BC Advisor
  • 42,738 posts
  • Gender:Male
  • Location:Daly City, CA
  • Local time:06:08 AM

Posted 17 August 2011 - 11:28 PM

Welcome aboard Posted Image

Download Security Check from HERE, and save it to your Desktop.

* Double-click SecurityCheck.exe
* Follow the onscreen instructions inside of the black box.
* A Notepad document should open automatically called checkup.txt; please post the contents of that document.


Please download MiniToolBox and run it.

Checkmark following boxes:
  • Report IE Proxy Settings
  • Report FF Proxy Settings
  • List content of Hosts
  • List IP configuration
  • List last 10 Event Viewer log
  • List Installed Programs
  • List Users, Partitions and Memory size
Click Go and post the result.


Download Malwarebytes' Anti-Malware (aka MBAM): https://www.bleepingcomputer.com/download/malwarebytes-anti-malware/ to your desktop.

* Double-click mbam-setup.exe and follow the prompts to install the program.
* At the end, be sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
* If an update is found, it will download and install the latest version.
* Once the program has loaded, select Perform quick scan, then click Scan.
* When the scan is complete, click OK, then Show Results to view the results.
* Be sure that everything is checked, and click Remove Selected.
* When completed, a log will open in Notepad.
* Post the log back here.

Be sure to restart the computer.

The log can also be found here:
C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\log-date.txt
Or at C:\Program Files\Malwarebytes' Anti-Malware\Logs\log-date.txt


Please download GMER from one of the following locations and save it to your desktop:
  • Main Mirror
    This version will download a randomly named file (Recommended)
  • Zipped Mirror
    This version will download a zip file you will need to extract first. If you use this mirror, please extract the zip file to your desktop.
  • Disconnect from the Internet and close all running programs.
  • Temporarily disable any real-time active protection so your security programs will not conflict with gmer's driver.
  • Double-click on the randomly named GMER file (i.e. n7gmo46c.exe) and allow the gmer.sys driver to load if asked.
  • Note: If you downloaded the zipped version, extract the file to its own folder such as C:\gmer and then double-click on gmer.exe.

    Posted Image
  • GMER will open to the Rootkit/Malware tab and perform an automatic quick scan when first run. (do not use the computer while the scan is in progress)
  • If you receive a WARNING!!! about rootkit activity and are asked to fully scan your system...click NO.
  • Now click the Scan button. If you see a rootkit warning window, click OK.
  • When the scan is finished, click the Save... button to save the scan results to your Desktop. Save the file as gmer.log.
  • Click the Copy button and paste the results into your next reply.
  • Exit GMER and be sure to re-enable your anti-virus, Firewall and any other security programs you had disabled.

IMPORTANT! If for some reason GMER refuses to run, try again.
If it still fails, try to UN-check "Devices" in right pane.
If still no joy, try to run it from Safe Mode.

My Website

My help doesn't cost a penny, but if you'd like to consider a donation, click DONATE


0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users