Jump to content

dllhost.exe*32 and other processes slowing down computer

Recommended Posts

1. dllhost.exe*32,iexplore.exe*32, saUI.exe*32, rundll32.exe and other processes are running multiple versions of themselves using up CPU and Physical Memory.


2. Internet sites are showing up in the Applications tab of Windows Task Manager which I did not open. The sites and Internet Explorer don't show up on my desktop but the sites are running because I can hear ads and audio from the sites through my speakers. "End Task" won't close them.


3. I tried to download Farbar Recovery Scan Tool from bleedingcomputer.com to get a scan for you but I get a popup that says "Your current security settings do not allow this to be downloaded."


I've never had issues downloading things before. Malwarebytes quarantined a couple of files today but this didn't help any of the issues.


Any help would be appreciated. Thanks.

Link to post
Share on other sites

Hello Patrick23, welcome to Malwarebytes' Malware Removal forum!
My username is LiquidTension, but you can call me Adam. I will be assisting you with your malware-related problems.
If you would allow me to call you by your first name I would prefer that. xsmile.png.pagespeed.ic.CwSpBGGvqN.png
General P2P/Piracy Notice: 

If you are using Peer to Peer (P2P) filesharing software such as uTorrent, BitTorrent or similar you must either fully uninstall or completely disable the programme(s) from running whilst receiving assistance at this forum. 
Failure to remove or disable such software will result in your topic being closed and no further assistance being provided.
If you have illegal/cracked/keygen or similar software on the computer, please remove/uninstall the software now and read the policy on Piracy. Failure to do so will also result in your topic being closed.

Please read through the points below to ensure this process moves as quickly and efficiently as possible.

  • Please read through my instructions thoroughly, and ensure you carry out each step in the order specified.
  • Please do not post logs using the CODEQUOTE or ATTACHMENT format. Logs should be posted directly in plain text. If you receive an error whilst posting, please break the log in half and use multiple posts.
  • Please do not run any tools or take any steps other than those I provide for you. Independent efforts may make matters worse, and will affect my ability in ascertaining the current situation & providing the best set of instructions for you.
  • Please backup important documents before proceeding with my instructions.
  • If you come across any issues whilst following my instructions, please stop and inform me of the issue in as much detail as possible. Please do not hesitate to ask before you run anything.
  • Topics are locked if no response is made after 4 days. Please inform me if you will require additional time to complete my instructions.
  • Ensure you are following this topic. Click xetYzdbu.png.pagespeed.ic.U7AjmRUewW.png at the top of the page. 

Please consider the following warning, and let me know how you wish to proceed.



One or more of the identified infections is known to use a backdoor, that allows attackers to remotely control your computer, download/execute files and steal critical system, financial and personal information.

Please disconnect your computer from the internet immediately. If your computer was used for online banking, has credit card information or other sensitive data, using a non-infected computer/device you should immediately change all account information (including those used for banking, email, eBay, paypal, online forums, etc). Consider these accounts already compromised.

If you have used a router, you will need to reset it with a strong logon/password to ensure the malware cannot gain control before connecting again. Banking and credit card institutions should be notified of the possible security breach immediately. Please read the following for more information: How Do I Handle Possible Identify Theft, Internet Fraud and CC Fraud?

Whilst the identified infection(s) can be removed, there is no way to guarantee that your computer will be trustworthy again. This is due to the nature of the infection, which allows the attacker complete control over the computer. Many experts in the security community believe that once infected with this type of malware, the best course of action is to reformat the hard drive and reinstall the Operating System. Please read the following articles for more information.

Please let me know how you wish to proceed, and if you have any questions.
Link to post
Share on other sites

I will attempt a re-format. I recently(two weeks ago) had the computer brought into a "Professional". I had backed up all my documents and family photos at that time so I'm not losing anything by re-formatting. They told me they found 1 virus and the system was clean but I've had worse problems ever since.

Link to post
Share on other sites

Unfortunately, that isn't the case. The machine is infected with Poweliks, and remnants of ZeroAccess. Both infections open a backdoor on the compromised machine.


HKU\S-1-5-21-719308860-1238165665-3886761147-1000\...A8F59079A8D5}\localserver32: rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";eval("epdvnfou/xsjuf)(=tdsjqu!mbohvbhf>ktds (the data entry has 239 more characters). <==== Poweliks!

ATTENTION: ====> ZeroAccess. Use DeleteJunctionsIndirectory: C:\Program Files\Windows Defender


Do you require additional assistance now that you have decided to reformat?

Link to post
Share on other sites

This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.