Author Topic: Low On Virual Memory?  (Read 5658 times)

0 Members and 1 Guest are viewing this topic.

DCEPTCN

  • Guest
Low On Virual Memory?
« on: December 18 2008, 07:30:58 PM »
I'm getting notices from my computer that I'm low on virtual memory (with a post-defrag useable space rating at around 65%!?) and now it's taking a good 15 minutes for a lousy 3 or 4 minute video to load on youtube. I'm *assuming* these new developments are related...? How do I increase virtual memory *or* what do I need to clean out in order to free up this space?

Offline TSM Girl

  • Turbo Street Outlaw
  • *******
  • Posts: 3423
  • PSI: 0
    • View Profile
Re: Low On Virual Memory?
« Reply #1 on: December 18 2008, 08:19:26 PM »
How much hard drive space do you have? You may have programs taking up the vertual memory. Could be a number of things.
Donna

"Stupid people should NOT breed!"

Offline SuperSix

  • Administrator
  • Turbo Street Outlaw
  • *******
  • Posts: 5071
  • PSI: 234
    • View Profile
Re: Low On Virual Memory?
« Reply #2 on: December 19 2008, 08:05:46 AM »
How much RAM do you have?
How much available hard drive space?
When was the last time Windows was reinstalled?
What version of Windows? (XP, Vista, etc)
'87 GN, 60lb, TA49, THDP, FTP cam, T+ lots o' shit - SOLD
'07 Ford F150 Lariat 2WD, 5.4L 3v - 255k
'20 Kubota BX2380. FEL, 60" deck
'78 IH/Case 184 Lo-Boy
'99 Kawasaki Bayou 400 4x4

Offline Top Speed

  • Don't Tread on Me
  • Turbo Street Outlaw
  • *******
  • Posts: 2548
  • PSI: -2
    • View Profile
Low On Virual Memory?
« Reply #3 on: December 19 2008, 09:30:21 AM »
I think he is infected.  errr, the computer that is.
Champion Irons w/T&D roller rockers, TA-61 turbo, 206/206 Comp Cam,  57 lb/hr Siemens Injectors, 3000 stall PTC, PTE Plenum w/RJC Power Plate, 70 mm Accufab Throttle Body, RJC 325 Megacooler, TurboTweak 5.7/ Alky Control w/M1 methanol, 23 psig on the street, Puddn' Power engine, Borla Exhaust

Chris

DCEPTCN

  • Guest
Re: Low On Virual Memory?
« Reply #4 on: December 19 2008, 12:04:08 PM »
Quote from: "SuperSix @ Fri Dec 19, 2008 6:05 am"
How much RAM do you have?
How much available hard drive space?
When was the last time Windows was reinstalled?
What version of Windows? (XP, Vista, etc)
It's XP...and how does one reinstall?

Last night I swept out all the cookies, browser history and the like but it didn't seem to help any. If that damned Liz Vicious gave me the clap...

Offline Top Speed

  • Don't Tread on Me
  • Turbo Street Outlaw
  • *******
  • Posts: 2548
  • PSI: -2
    • View Profile
Re: Low On Virual Memory?
« Reply #5 on: December 19 2008, 12:38:47 PM »
Quote from: "DCEPTCN @ Fri Dec 19, 2008 1:04 pm"
If that damned Liz Vicious gave me the clap...


BINGO!!! :rofl;
Champion Irons w/T&D roller rockers, TA-61 turbo, 206/206 Comp Cam,  57 lb/hr Siemens Injectors, 3000 stall PTC, PTE Plenum w/RJC Power Plate, 70 mm Accufab Throttle Body, RJC 325 Megacooler, TurboTweak 5.7/ Alky Control w/M1 methanol, 23 psig on the street, Puddn' Power engine, Borla Exhaust

Chris

Offline SuperSix

  • Administrator
  • Turbo Street Outlaw
  • *******
  • Posts: 5071
  • PSI: 234
    • View Profile
Re: Low On Virual Memory?
« Reply #6 on: December 19 2008, 04:23:41 PM »
Quote from: "DCEPTCN @ Fri Dec 19, 2008 12:04 pm"
Quote from: "SuperSix @ Fri Dec 19, 2008 6:05 am"
How much RAM do you have?
How much available hard drive space?
When was the last time Windows was reinstalled?
What version of Windows? (XP, Vista, etc)
It's XP...and how does one reinstall?

Last night I swept out all the cookies, browser history and the like but it didn't seem to help any. If that damned Liz Vicious gave me the clap...


You haven't answered my questions.

And I doubt you got the clap from her - You cant get it fapping to pics on the internet.
'87 GN, 60lb, TA49, THDP, FTP cam, T+ lots o' shit - SOLD
'07 Ford F150 Lariat 2WD, 5.4L 3v - 255k
'20 Kubota BX2380. FEL, 60" deck
'78 IH/Case 184 Lo-Boy
'99 Kawasaki Bayou 400 4x4

Offline 87natty

  • Turbo Street Outlaw
  • *******
  • Posts: 3616
  • PSI: 0
    • View Profile
    • http://www.wix.com/lynch455/science
Re: Low On Virual Memory?
« Reply #7 on: December 19 2008, 06:59:08 PM »
Quote from: "DCEPTCN @ Fri Dec 19, 2008 9:04 am"
If that damned Liz Vicious gave me the clap...


I've heard of Nintendo thumb, but Nintendo palm?
My 1958 Mamiya can beat up whatever camera you just wasted your money on.

Offline TSM Girl

  • Turbo Street Outlaw
  • *******
  • Posts: 3423
  • PSI: 0
    • View Profile
Re: Low On Virual Memory?
« Reply #8 on: December 19 2008, 10:35:12 PM »
Hello??? Didn't I ask the same fucking question???? That's ok, it's only me..  :rofl;
Donna

"Stupid people should NOT breed!"

Offline Recklessrob

  • Turbo Street Outlaw
  • *******
  • Posts: 5112
  • PSI: 3
    • View Profile
Re: Low On Virual Memory?
« Reply #9 on: December 20 2008, 09:55:45 AM »
Quote from: "TSM Girl @ Fri Dec 19, 2008 10:35 pm"
Hello??? Didn't I ask the same fucking question???? That's ok, it's only me..
Rob

Offline Recklessrob

  • Turbo Street Outlaw
  • *******
  • Posts: 5112
  • PSI: 3
    • View Profile
Re: Low On Virual Memory?
« Reply #10 on: December 20 2008, 02:45:01 PM »
I just found a trojan called vundo on my computer that fits what you are describing.
Quote
Trojan.Vundo is a component of an adware program that downloads and displays pop-up advertisements . It is known to be installed by visiting a Web site link contained in a spammed email.

Trojan.Vundo consists of the following components:

HTML code that exploits the Microsoft Internet Explorer Malformed IFRAME Remote Buffer Overflow Vulnerability (BID 11515)
A downloader component
Adware
A DLL module that is installed by the adware


The HTML code exploits the Microsoft Internet Explorer Malformed IFRAME Remote Buffer Overflow Vulnerability (BID 11515) and attempts to download and execute the file C:\bla.exe, from the following domain:
[http://]83.149.86.132/mins[REMOVED]

The above file is the downloader component of the Trojan.

Virtual memory may be degraded when the Microsoft Internet Explorer Malformed IFRAME Remote Buffer Overflow Vulnerability (BID 11515) is being exploited.

Once executed, the Trojan creates an .exe file with a file name that it is constructed from the following strings:

abr
av
anti
ac
acc
ad
ap
as
bin
bas
bak
cab
cat
cmd
com
cr
c
drv
db
disk
dll
dns
dos
doc
dvd
eula
exp
fax
font
ftp
hard
iis
img
inet
info
ip
java
kb
key
lib
log
main
ms
mc
mfc
mp3
msvc
net
nut
odbc
ole
pc
ps
play
ras
reg
run
sys
srv
svr
svc
s
tapi
tcp
task
un
url
util
vb
vga
vss
xml
wave
web
w
win
wms


The Trojan may then save and execute the above file in any of the following folders:

%Windir%\addins
%Windir%\AppPatch
%Windir%\assembly
%Windir%\Config
%Windir%\Cursors
%Windir%\Driver Cache
%Windir%\Drivers
%Windir%\Fonts
%Windir%\Help
%Windir%\inf
%Windir%\java
%Windir%\Microsoft.NET
%Windir%\msagent
%Windir%\Registration
%Windir%\repair
%Windir%\security
%Windir%\ServicePackFiles
%Windir%\Speech
%Windir%\system
%Windir%\system32
%Windir%\Tasks
%Windir%\Web
%Windir%\Windows Update Setup Files
%Windir%\Microsoft


The Trojan then deletes the following registry entry:
HKEY_CURRENT_U SER\Software\Microsoft\Windows\CurrentVersion\Runonce\"*MS Setup"

Next, the Trojan creates the following registry entries:

HKEY_CURRENT_U SER\Software\Microsoft\Windows\CurrentVersion\Runonce\"*WinLogon" = "[TROJAN FULL PATH FILE NAME] ren time:[RANDOM NUMBER]"
HKEY_LOCAL_MAC HINE\SOFTWARE\Classes\ATLEvents.ATLEvents\CLSID\"[DEFAULT VALUE]" = "{02F96FB7-8AF6-439B-B7BA-2F952F9E4800}"
HKEY_LOCAL_MAC HINE\SOFTWARE\Classes\ATLEvents.ATLEvents.1\CLSID\"[DEFAULT VALUE]" = "{02F96FB7-8AF6-439B-B7BA-2F952F9E4800}"
HKEY_LOCAL_MAC HINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\"*[TROJAN FILE NAME]" = "[TROJAN FULL PATH FILE NAME] rerun"


The Trojan then creates the following registry subkeys:

HKEY_CURRENT_U SER\Software\Microsoft\Internet Explorer\Main\Active State
HKEY_LOCAL_MAC HINE\SOFTWARE\Classes\CLSID\{02F96FB7-8AF6-439B-B7BA-2F952F9E4800}
HKEY_LOCAL_MAC HINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{02F96FB7-8AF6-439B-B7BA-2F952F9E4800}
HKEY_LOCAL_MAC HINE\SOFTWARE\Classes\CLSID\{22E85F2A-4A67-4835-B2C3-C575FE4EC322}
HKEY_LOCAL_MAC HINE\SOFTWARE\Classes\ADOUsefulNet.ADOUsefulNet
HKEY_LOCAL_MAC HINE\SOFTWARE\Classes\ADOUsefulNet.ADOUsefulNet.1
HKEY_LOCAL_MAC HINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{22E85F2A-4A67-4835-B2C3-C575FE4EC322}
HKEY_CLASSES_R OOT\CLSID\{DE8BDE42-16D9-4CCC-9F4F-1C3167B82F60}
HKEY_LOCAL_MAC HINE\SOFTWARE\Classes\DPCUpdater.DPCUpdater
HKEY_LOCAL_MAC HINE\SOFTWARE\Classes\DPCUpdater.DPCUpdater.1
HKEY_LOCAL_MAC HINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{DE8BDE42-16D9-4CCC-9F4F-1C3167B82F60}


The Trojan creates the following registry entries only if it is executed with "rerun" parameters and the system was started in Normal mode:

HKEY_LOCAL_MAC HINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\"*[TROJAN FILE NAME]" = "[TROJAN FULL PATH FILE NAME]"
HKEY_LOCAL_MAC HINE\SOFTWARE\Classes\CLSID\{0612F71E-934B-4D92-B8E8-2E29EA78EB03}
HKEY_LOCAL_MAC HINE\SOFTWARE\Classes\IEpl.IEpl
HKEY_LOCAL_MAC HINE\SOFTWARE\Classes\IEpl.IEPl.1\CLSID
HKEY_LOCAL_MAC HINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{0612F71E-934B-4D92-B8E8-2E29EA78EB03}
HKEY_LOCAL_MAC HINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\service
HKEY_USERS\S-1-5-21-1328679652-1783376204-1452689933-500\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{0612F71E-934B-4D92-B8E8-2E29EA78EB03}


If the system was started in Safe mode, the Trojan ends itself and then restarts itself without any parameters.

The Trojan then attempts to download and execute a file from the following domain:
[http://]62.4.84.41/mmdo[REMOVED]

The above file is an adware module with an embedded DLL component.

Next, the Trojan drops the embedded DLL as the following file:
%Temp%\[REVERSED TROJAN FILE NAME].dat

The Trojan injects the embedded DLL into the address space of several running processes.

The Trojan also creates the following temporary files:

[REVERSED TROJAN FILE NAME].bak1
[REVERSED TROJAN FILE NAME].bak2
[REVERSED TROJAN FILE NAME].ini


The Trojan displays advertisements on the compromised computer.

The Trojan will restart the adware component if it detects that the adware has stopped running.

The Trojan will recreate the original file with system and hidden attributes, if the Trojan file name is changed.

The Trojan appears to store the following URL list and may attempt to send HTTP requests to one of the following IP addresses:

62.4.84.53
62.4.84.56


The Trojan may also drop the following file:
%ProgramFiles%\system32\vundo.dllRecommendationsSymantec Security Response encourages all users and administrators to adhere to the following basic security "best practices":

Use a firewall to block all incoming connections from the Internet to services that should not be publicly available. By default, you should deny all incoming connections and only allow services you explicitly want to offer to the outside world.
Enforce a password policy. Complex passwords make it difficult to crack password files on compromised computers. This helps to prevent or limit damage when a computer is compromised.
Ensure that programs and users of the computer use the lowest level of privileges necessary to complete a task. When prompted for a root or UAC password, ensure that the program asking for administration-level access is a legitimate application.
Disable AutoPlay to prevent the automatic launching of executable files on network and removable drives, and disconnect the drives when not required. If write access is not required, enable read-only mode if the option is available.
Turn off file sharing if not needed. If file sharing is required, use ACLs and password protection to limit access. Disable anonymous access to shared folders. Grant access only to user accounts with strong passwords to folders that must be shared.
Turn off and remove unnecessary services. By default, many operating systems install auxiliary services that are not critical. These services are avenues of attack. If they are removed, threats have less avenues of attack.
If a threat exploits one or more network services, disable, or block access to, those services until a patch is applied.
Always keep your patch levels up-to-date, especially on computers that host public services and are accessible through the firewall, such as HTTP, FTP, mail, and DNS services.
Configure your email server to block or remove email that contains file attachments that are commonly used to spread threats, such as .vbs, .bat, .exe, .pif and .scr files.
Isolate compromised computers quickly to prevent threats from spreading further. Perform a forensic analysis and restore the computers using trusted media.
Train employees not to open attachments unless they are expecting them. Also, do not execute software that is downloaded from the Internet unless it has been scanned for viruses. Simply visiting a compromised Web site can cause infection if certain browser vulnerabilitie s are not patched.
If Bluetooth is not required for mobile devices, it should be turned off. If you require its use, ensure that the device's visibility is set to "Hidden" so that it cannot be scanned by other Bluetooth devices. If device pairing must be used, ensure that all devices are set to "Unauthorized", requiring authorization for each connection request. Do not accept applications that are unsigned or sent from unknown sources.
For further information on the terms used in this document, please refer to the Security Response glossary.

Writeup By: David Curran


If this is your problem, you can get all the info including removal instructions here: http://securityresponse.symantec.com/security_response/writeup.jsp?docid=2004-112111-3912-99&tabid=3
Rob

 

SimplePortal 2.3.7 © 2008-2024, SimplePortal