Solved

CPU Usage is frequently at 100%

Posted on 2004-09-23
6
316 Views
Last Modified: 2013-12-04
Hi and thank you for reading this.  My computer is often at 100% usage and I think it is in due to the processes running.  I have opted for a selective startup and keep the processes that run on startup to a minimum, and I have used spyhunter to delete dangerous looking files, but there seem to be some that I can't get rid of.  One of which seems to be svurl.exe-- every time I 'end' this process, it starts right back up.  

Is there any way I can delete all unwanted processes and keep them from coming back in the future?  Any and all help is greatly appreciated.  Thanks again,

PJ
0
Comment
Question by:perryja32
6 Comments
 
LVL 49

Accepted Solution

by:
sunray_2003 earned 500 total points
ID: 12140399
PJ,

Try doing this

a) Start --> run --> Type in "msconfig" and press "Enter"
goto Startup tab
Disable all the applications there except anti-virus.Reboot the machine and check if the process still runs.
If not, then enable one at a time in the same startup tab and find the application or process that might cause this
at startup

b) If the above doesnot solve then your next option would be to scan for virus and spywares to see those tools remove that process

Some of the experts here have helped in compiling all the important spyware tools and they are listed in this thread
http://www.experts-exchange.com/Web/Browser_Issues/Q_20975384.html

My recommendation would be to start with spybot ,ad-ware ,CWshredder and get the log from Hijackthis and save the log and paste it here http://hijackthis.de/index.php?langselect=english to analyze it  
If the analyser cannot provide enough information , post the log here.

After installing these spyware tools, First Update them and then run.

c) Virus scanners:

http://vil.nai.com/vil/stinger/

http://housecall.trendmicro.com/ 


Post back how it goes

SR
0
 
LVL 12

Expert Comment

by:rossfingal
ID: 12141149
Hi!

Just some information on SpyHunter:
http://www.spywarewarrior.com/rogue_anti-spyware.htm

Go to the following:
http://www.subratam.org/?page=removal
download HijackThis, run it and submit the log file to:
http://www.hijackthis.de/index.php?langselect=english
Your log will be analyzed automatically.
If you have any questions or problems with what it shows, post them here
and someone will address them.

RF
0
 
LVL 29

Expert Comment

by:blue_zee
ID: 12141723

You may want to use Process Explorer:

http://www.sysinternals.com/ntw2k/freeware/procexp.shtml

And take a look at what's running and eating up your CPU usage.

Zee
0
Three Reasons Why Backup is Strategic

Backup is strategic to your business because your data is strategic to your business. Without backup, your business will fail. This white paper explains why it is vital for you to design and immediately execute a backup strategy to protect 100 percent of your data.

 
LVL 17

Expert Comment

by:Lobo042399
ID: 12146639
Process Explorer is a great tool! It provides a lot more info than good ole Task Manager. My recommendation would be that, if there's anything suspicious being reported by Process Explorer, to post here the info; it may give us a better picture of what's going on in the machine and provide a more accurate solution.

Good Vibes!

Lobo
0
 
LVL 24

Expert Comment

by:SunBow
ID: 12148111
> My computer is often at 100% usage

first, 100% is good, nothing wrong in that at all. I means you are using it.  But you are correct in that, most times we see it, something is awry.  I can get that with simple IE for example, or excel or wrod, just normal tools.  In my case it can clear by starting over some applications, or rebooting, and yoou are correct, you've another animal cheating on you.

> Is there any way I can delete all unwanted processes and keep them from coming back in the future?

There is only one, sorry.  Erase the drive and rebuild from scratch.   Many purported tool helpers can also drop off such problems on you, up to and including spyware.  Good, or very good - task manager is a great way to start, if it isn't buggered up.  You can eliminate some known problems, by closing windows, erasing programs, stopping antivirus, at least the realtime ones and any that continue to hide attempts to get upgrades it knows you want.

But when one gets to point of numerous unknown bugs, or malwares, even where many are erased, one knows that some remain but not known for sure how many, the best one can do IMO is to start the build over.  As sure an eraser there ever was, format/u.

To keep them from returning, what has to be done is ensure that you do not reload them. After securing the system, just exercise better care, in all that you do. It is the best that any of us can do.
0
 
LVL 24

Expert Comment

by:SunBow
ID: 12148208
> some that I can't get rid of.  One of which seems to be svurl.exe

There is nothing intrinsically evil to the name (svurl), as used in web access such as with PHP or sample below.

http://www.webthang.co.uk/tuts/tuts_ud4/mark_udev1/uemark1_1.asp

Rather than minimize startup, eliminate it all. (after backup). Check systray, bottom right. Kill them all as well, you need none.  Search registry for all that run at startup. Search (explorer) for and delete all instances of filename.  Once machine is running well, then add back the ones you want, as desired, one at a time, and when you find a misbehavior, you've probably identified another culprit.

Still easier, IMO, for the startover process if you go from scratch.  An a btw, I also ever recommend a two disk system.  They keep getting cheaper. And one can be contingency for other, while also offering more flexible storage. Get new one, build to boot, then add one product or application at a time, pause between each and watch.  Since this way (2 hd) doesn't format your prior work, there's much less concern for backing anything up before messing around with the guts of the operating system.
0

Featured Post

Simplifying Server Workload Migrations

This use case outlines the migration challenges that organizations face and how the Acronis AnyData Engine supports physical-to-physical (P2P), physical-to-virtual (P2V), virtual to physical (V2P), and cross-virtual (V2V) migration scenarios to address these challenges.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

SHARE your personal details only on a NEED to basis. Take CHARGE and SECURE your IDENTITY. How do I then PROTECT myself and stay in charge of my own Personal details (and) - MY own WAY...
Security measures require Windows be logged in using Standard User login (not Administrator).  Yet, sometimes an application has to be run “As Administrator” from a Standard User login.  This paper describes how to create a shortcut icon to launch a…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Although Jacob Bernoulli (1654-1705) has been credited as the creator of "Binomial Distribution Table", Gottfried Leibniz (1646-1716) did his dissertation on the subject in 1666; Leibniz you may recall is the co-inventor of "Calculus" and beat Isaac…

816 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

8 Experts available now in Live!

Get 1:1 Help Now