Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

svchost.exe using way too much ram


  • This topic is locked This topic is locked
45 replies to this topic

#1 xavierq

xavierq

  • Members
  • 26 posts
  • OFFLINE
  •  
  • Local time:12:21 PM

Posted 07 January 2012 - 12:08 PM

So a few days ago I noticed one of my instances of svchost.exe taking 1.7 gigs of ram. That's outrageous, obviously. I got a copy of Process Explorer to check it out. I didn't see anything that stood out to me, though admittedly it was a lot of information and much of it didn't mean anything to me.

So I rebooted, thinking that might make it go away. Shortly there after, it became very clear that I had a Windows Recovery Virus. Hid my desktop items, tons of fake HDD/cpu/ram errors, a bs scanner running on my system, and it closed task manager and I couldn't reopen it. I ran spybot, and it seemed to get rid of it. I rebooted and everything seemed ok. Until my task manager closed itself again. So I downloaded malware bytes instead, thinking maybe it does a better job. It seemed to. It figured out that the virus had set itself up in the system restore directory (Which is odd, since I disabled that). But it deleted those files too and I've not seen it come back since.

Except I'm at 1.5 gigs of ram used on the svchost.exe again. I ran combofix and it deleted some files that didn't seem to have anything to do with the virus, but didn't solve the memory issue.

I'm attaching the DDS and GMER logs, as well as the Combofix log. I don't know where Malware Bytes and Spybot keep their logs, I can probably track them down if you need them as well.

Attached Files



BC AdBot (Login to Remove)

 


#2 HelpBot

HelpBot

    Bleepin' Binary Bot


  • Bots
  • 12,730 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:01:21 PM

Posted 13 January 2012 - 12:10 PM

Hello and welcome to Bleeping Computer!

I am HelpBot: an automated program designed to help the Bleeping Computer Staff better assist you! This message contains very important information, so please read through all of it before doing anything.

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

To help Bleeping Computer better assist you please perform the following steps:

***************************************************

Posted Image In order to continue receiving help at BleepingComputer.com, YOU MUST tell me if you still need help or if your issue has already been resolved on your own or through another resource! To tell me this, please click on the following link and follow the instructions there.

CLICK THIS LINK >>> http://www.bleepingcomputer.com/logreply/436785 <<< CLICK THIS LINK



If you no longer need help, then all you needed to do was the previous instructions of telling me so. You can skip the rest of this post. If you do need help please continue with Step 2 below.

***************************************************

Posted Image If you still need help, I would like you to post a Reply to this topic (click the "Add Reply" button in the lower right hand of this page). In that reply, please include the following information:

  • If you have not done so already, include a clear description of the problems you're having, along with any steps you may have performed so far.
  • A new DDS and GMER log. For your convenience, you will find the instructions for generating these logs repeated at the bottom of this post.
    • Please do this even if you have previously posted logs for us.
    • If you were unable to produce the logs originally please try once more.
    • If you are unable to create a log please provide detailed information about your installed Windows Operating System including the Version, Edition and if it is a 32bit or a 64bit system.
    • If you are unsure about any of these characteristics just post what you can and we will guide you.
  • Please tell us if you have your original Windows CD/DVD available.
  • Upon completing the above steps and posting a reply, another staff member will review your topic and do their best to resolve your issues.

Thank you for your patience, and again sorry for the delay.

***************************************************

We need to see some information about what is happening in your machine. Please perform the following scan again:

  • Download DDS by sUBs from one of the following links if you no longer have it available. Save it to your desktop.
  • Double click on the DDS icon, allow it to run.
  • A small box will open, with an explanation about the tool. No input is needed, the scan is running.
  • Notepad will open with the results.
  • Follow the instructions that pop up for posting the results.
  • Close the program window, and delete the program from your desktop.
Please note: You may have to disable any script protection running if the scan fails to run. After downloading the tool, disconnect from the internet and disable all antivirus protection. Run the scan, enable your A/V and reconnect to the internet.

Information on A/V control HERE


We also need a new log from the GMER anti-rootkit Scanner.

Please note that if you are running a 64-bit version of Windows you will not be able to run GMER and you may skip this step.

Please first disable any CD emulation programs using the steps found in this topic:

Why we request you disable CD Emulation when receiving Malware Removal Advice


Then create another GMER log and post it as an attachment to the reply where you post your new DDS log. Instructions on how to properly create a GMER log can be found here:

How to create a GMER log


As I am just a silly little program running on the BleepingComputer.com servers, please do not send me private messages as I do not know how to read and reply to them! Thanks!

#3 xavierq

xavierq
  • Topic Starter

  • Members
  • 26 posts
  • OFFLINE
  •  
  • Local time:12:21 PM

Posted 14 January 2012 - 01:43 PM

Yeah, still looking for assistance. Clicked the link and such. I see no reason to run those scans again and upload all those logs again when no one's looked at the first ones, though.

#4 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:05:21 PM

Posted 14 January 2012 - 08:55 PM

Hi,

Welcome to Bleeping Computer. My name is m0le and I will be helping you with your log.
  • Please subscribe to this topic, if you haven't already. Click the Watch This Topic button at the top on the right.

  • Please avoid installing/uninstalling or updating any programs and attempting any unsupervised fixes or scans. This can make helping you impossible.

  • Please reply to this post so I know you are there.
The forum is busy and we need to have replies as soon as possible. If I haven't had a reply after 3 days I will bump the topic and if you do not reply by the following day after that then I will close the topic.

----------------------------------------------

I see no reason to run those scans again and upload all those logs again when no one's looked at the first ones, though


Considering we only ask for two logs and tell people repeatedly not to use Combofix without assistance, you shouldn't be rerunning all those scans again anyway.

Regardless, Gmer has the info I needed


Please download aswMBR ( 511KB ) to your desktop.
  • Double click the aswMBR.exe icon to run it
  • Click the Scan button to start the scan
  • On completion of the scan, click the save log button, save it to your desktop and post it in your next reply.

Then MBRCheck

Please download MBRCheck to your desktop.

1. Double click MBRCheck.exe to run it (Right click and run as Administrator for Vista).
2. It will open a black window, please do not fix anything (if it gives you an option).
3. Exit that window and it will produce a log (MBRCheck_date_time).
4. Please post that log when you reply.
Posted Image
m0le is a proud member of UNITE

#5 xavierq

xavierq
  • Topic Starter

  • Members
  • 26 posts
  • OFFLINE
  •  
  • Local time:12:21 PM

Posted 16 January 2012 - 04:17 PM

It seems the memory use problem only happens with an active internet connection. aswMBR crashed the first time I ran it, I tried running it with no internet thinking maybe it was competing for resources, but it also won't run without internet.

The second time it ran correctly, I've attached that log.

MBR ran fine, I've attached that log.

Attached Files



#6 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:05:21 PM

Posted 16 January 2012 - 04:51 PM

Please run TDSSKiller, let's see if that can remove the rootkit

  • Download TDSSKiller and save it to your Desktop.

  • Extract its contents to your desktop and make sure TDSSKiller.exe (the contents of the zipped file) is on the Desktop itself, not within a folder on the desktop.

  • Go to Start > Run (Or you can hold down your Windows key and press R) and copy and paste the following into the text field. (make sure you include the quote marks) Then press OK.

    "%userprofile%\Desktop\TDSSKiller.exe" -l report.txt

  • Now click Start Scan.
  • If Malicious objects are found, ensure Cure is selected then click Continue > Reboot now.
  • Click Close
  • Finally press Report and copy and paste the contents into your next reply. If you've rebooted then the log will be found at C:\

Posted Image
m0le is a proud member of UNITE

#7 xavierq

xavierq
  • Topic Starter

  • Members
  • 26 posts
  • OFFLINE
  •  
  • Local time:12:21 PM

Posted 18 January 2012 - 01:06 AM

I got a windows xp security 2012 message today... Ran the program you asked me to, it found two problems. Both said cure, so I let out do it's thing, and rebooted when it prompted me to. Except it never came back up. When I try to turn the computer on, I hear the hardware come up, but nothing happens. No video, no post, no beeping, nothing. My computer is now a doorstop.

#8 xavierq

xavierq
  • Topic Starter

  • Members
  • 26 posts
  • OFFLINE
  •  
  • Local time:12:21 PM

Posted 18 January 2012 - 01:38 AM

After a few tries it posted, saying the cpu was changed or unworkable. It only seems to boot every few tries now. XP Home Security 2012 is killing many programs I run, including firefox, but is still letting me use IE for now. I've attached the log from TDSSKiller. I don't see scvhost.exe using all my ram and cpu as I did before, but this XP 2012 thing is equally annoying.

Attached Files



#9 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:05:21 PM

Posted 18 January 2012 - 06:47 PM

XP Home Security is part of the TDSS rootkit, the actual variant is called TDL4. We need to get a log from outside of Windows by booting a Linux disk as this messes with partitions.

Try this please. You will also need a USB drive.

Download GETxPUD.exe to the desktop of your clean computer
  • Run GETxPUD.exe
  • A new folder will appear on the desktop.
  • Open the GETxPUD folder and click on the get&burn.bat
  • The program will download xpud_0.9.2.iso, and upon finished will open BurnCDCC ready to burn the image.
  • Click on Start and follow the prompts to burn the image to a CD.
  • Next download dumpit to your USB
  • Remove the USB & CD and insert it in the sick computer
  • Boot the Sick computer with the CD you just burned
  • The computer must be set to boot from the CD
  • Gently tap F12 and choose to boot from the CD
  • Follow the prompts
  • A Welcome to xPUD screen will appear
  • Press File
  • Expand mnt
  • Click on sdb1 (sdb1 represents the USB drive).
  • Double click on the dumpit file.
  • A black window will pop-up and it will dump and zip the MBR to your USB drive.
  • Press Enter to exit the black window.
  • Click on HOME tab and choose Power Off to turn off xPUD.
  • Remove the USB drive and insert it back on your working computer.
  • Locate the mbr.zip file in your USB drive and attach it when you reply.

Posted Image
m0le is a proud member of UNITE

#10 xavierq

xavierq
  • Topic Starter

  • Members
  • 26 posts
  • OFFLINE
  •  
  • Local time:12:21 PM

Posted 19 January 2012 - 08:34 PM

completed.

Attached Files

  • Attached File  mbr.zip   1.9KB   2 downloads


#11 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:05:21 PM

Posted 19 January 2012 - 08:39 PM

That's okay. Please run Combofix at this stage

Please download ComboFix from one of these locations:* IMPORTANT !!! Save ComboFix.exe to your Desktop making sure you rename it comfix.exe
  • Disable your AntiVirus and AntiSpyware applications including Firewalls, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. (Click on this link to see a list of programs that should be disabled. The list is not all inclusive.)
  • Double click on Comfix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

Posted Image


Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

Posted Image


Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.
Posted Image
m0le is a proud member of UNITE

#12 xavierq

xavierq
  • Topic Starter

  • Members
  • 26 posts
  • OFFLINE
  •  
  • Local time:12:21 PM

Posted 19 January 2012 - 11:27 PM

I get an XP security 2012 warning that comfix.exe is infected with a virus and will be shut down. A few seconds later, the screens went black and I could do nothing.

#13 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:05:21 PM

Posted 21 January 2012 - 04:20 AM

Hmm, please run Rkill and MBAM

Download and Run RKill

Please download RKill by Grinler from one of the 4 links below and save it to your desktop.

Link 1
Link 2
Link 3
Link 4

  • Before we begin, you should disable your anti-malware softwares you have installed so they do not interfere RKill running as some anti-malware softwares detect RKill as malicious. Please refer to this page if you are not sure how.
  • Double-click on Rkill on your desktop to run it. (If you are using Windows Vista, please right-click on it and select Run As Administrator)
  • A black screen will appear and then disappear. Please do not worry, that is normal. This means that the tool has been successfully executed.
  • Please post the resulting log in your next reply.

Now MBAM


Please download Posted Image Malwarebytes Anti-Malware and save it to your desktop.
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application or, if you are using Vista, right-click and select Run As Administrator on mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
  • MBAM will automatically start and you will be asked to update the program before performing a scan. If an update is found, the program will automatically update itself. Press the OK button to close that box and continue.
    If MBAM won't update then download and update MBAM on a clean computer then save the rules.ref folder to a memory stick. This file is found here: 'C:\Documents and Settings\All Users\Application Data\Malwarebytes\Malwarebytes' Anti-Malware' then transfer it across to the infected computer.
  • On the Scanner tab:
    • Make sure the "Perform Full Scan" option is selected.
    • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
  • Back at the main Scanner screen, click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply and exit MBAM.
Note: If MBAM encounters a file that is difficult to remove, you may be asked to reboot your computer so it can proceed with the disinfection process. Regardless if prompted to restart the computer or not, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware. MBAM may make changes to your registry as part of its disinfection routine. If you're using other security programs that detect registry changes, they may alert you after scanning with MBAM. Please permit the program to allow the changes.

Edited by m0le, 21 January 2012 - 04:23 AM.

Posted Image
m0le is a proud member of UNITE

#14 xavierq

xavierq
  • Topic Starter

  • Members
  • 26 posts
  • OFFLINE
  •  
  • Local time:12:21 PM

Posted 21 January 2012 - 03:41 PM

The computer now starts in 640x480 in 16 color mode. Task manager is immediately closed it I try to open it, and all websites are blocked by XP Security 2012. I am completely unable to download the programs you asked or even access this site from that computer.

#15 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:05:21 PM

Posted 21 January 2012 - 07:42 PM

Do you have a clean computer and a flashdrive which you can use to transfer programs onto the infected machine?

If so, download RKill and MBAM and transfer them onto a flashdrive. Plud the drive into the infected machine and run from the flashdrive folder.
Posted Image
m0le is a proud member of UNITE




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users