Results 1 to 10 of 10

Thread: Loader.exe and smss.exe

  1. #1
    Junior Member
    Join Date
    Jun 2010
    Posts
    8

    Default Loader.exe and smss.exe

    Today, my comp kept loading iexplorer (Internet Explorer) in the background. I also noticed that 'File Loader' asked for access to the internet.
    Under local settings>temp, I found the two exe files and deleted them.

    When either of them were running under the name 'file loader', ie would load in the background. By right clicking the files, they said they came from 'Black Internet' Inc.

    Also, my ie history showed ad sites in the history.

    Neither spybot nor avast detected anything, which was a little concerning.

    Hope this helps.

    -blargg
    Last edited by tashi; 2010-06-21 at 16:40. Reason: Topic moved from Spybot-S&D support

  2. #2
    Junior Member
    Join Date
    Jun 2010
    Posts
    8

    Default Virus Problem

    I had a loader.exe and smss.exe in my temp folder, opening up IE in the background. I deleted the files, but ie still loads on startup. I checked both msconfig and the HKLM/software/microsoft/windows/currentversion/run directory, but nowhere does it show iexplore.exe. I can't figure out how to stop it! Any ideas?
    Last edited by tashi; 2010-06-21 at 07:23. Reason: Merged two topics

  3. #3
    Junior Member
    Join Date
    Jun 2010
    Posts
    4

    Default

    The same two files surfaced on my Windows XP Pro workstation last night.

    I never use IE, only the last version of Firefox.

    There are a few instances of IE always running in the background. Ending the processes in task mgr does not help as they restart.

    Rogue process SMSS.exe also will not close, only loader.exe could be ended through task mgr. Both files show the company as 'Black Internet'.

    I was running S&D last night when the computer rebooted by itself. This was likely by design.

    Unfortunately a rootkit was installed in the master boot record. S&D, MBAM, Hitman Pro, and Symantec AV is unable to find any malicious files, but I have confirmed the presence of a rootkit using GMER and the MBR rootkit detector tool.

    Although I renamed the two files before the OS was randomly rebooted, the rogue SMSS.exe (file location: /temp/) restarted upon reboot in safe mode!

    NOTE: There is another instance of SMSS.exe which appears to be an authentic MS Windows process. It only uses a kb of memory, while the rogue SMSS.exe uses a few MBs.

    I will attempt to fix the MBR later today, but it is very likely I will need to do a clean install of the OS. From what I understand Windows XP is very vulnerable to these types of attacks. Windows Vista and 7 are likely more protected.
    Last edited by sharp; 2010-06-21 at 14:15.

  4. #4
    Junior Member
    Join Date
    Jun 2010
    Posts
    8

    Default

    After attempting multiple system restores which failed for some reason, now my comp is telling me windows is not genuine and doing weird things.... I guess I'll restore an image from a few months ago.

    Geez, what a hassle.

    System Restore-please leave it on until advised
    Last edited by tashi; 2010-06-21 at 18:32. Reason: Added link as FYI :-)

  5. #5
    Junior Member
    Join Date
    Jun 2010
    Posts
    4

    Default

    Quote Originally Posted by blargg View Post
    After attempting multiple system restores which failed for some reason, now my comp is telling me windows is not genuine and doing weird things.... I guess I'll restore an image from a few months ago.

    Geez, what a hassle.
    What operating system were you running?

    My Win XP workstation was running up to date security definitions, all recent MS updates, and routinely was scanned using multiple programs.

    I'm very surprised of how easily this malware took control over the OS. I can only suspect at this point that some sort of exploit was run while browsing the web (using only Firefox!). No plug-ins or executable files were run within the last few days.
    Last edited by sharp; 2010-06-21 at 14:27.

  6. #6
    Junior Member
    Join Date
    Jun 2010
    Posts
    4

    Default

    If the computer is infected with a rootkit, restoring Windows using a past image will likely not remove the rootkit. The hook starts first before the OS loads!

    You can attempt using the fixmbr command in the Recovery Console. If that is not sucessful you may need to completely format the drive on which the OS boots from.

    Hopefully others will chime in later today with their experiences.

  7. #7
    Junior Member
    Join Date
    Jun 2010
    Posts
    8

    Default

    Quote Originally Posted by sharp View Post
    If the computer is infected with a rootkit, restoring Windows using a past image will likely not remove the rootkit. The hook starts first before the OS loads!

    You can attempt using the fixmbr command in the Recovery Console. If that is not sucessful you may need to completely format the drive on which the OS boots from.

    Hopefully others will chime in later today with their experiences.
    Holy Crap, you were right. It didn't work! I also use firefox btw.
    Well, I'll try that fixmbr thing now.

  8. #8
    Junior Member
    Join Date
    Jun 2010
    Posts
    8

    Default

    Well, I used bootrec.exe /fixmbr from the W7 boot cd. All seems okay for now. Thanks for the help, sharp. I have no idea how I got this crap on my computer...

  9. #9
    Junior Member
    Join Date
    Jun 2010
    Posts
    4

    Default

    To verify if the rootkit has been removed, you can use the GMER application. It is a very thorough scanner that runs in Windows.


    Last edited by sharp; 2010-06-21 at 15:57.

  10. #10
    Member of Team Spybot tashi's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    30,970

    Default

    Hello and

    Please see this post: http://forums.spybot.info/showpost.p...05&postcount=2

    If you would like someone to take a look at the system please see the FAQ to post a preliminary DDS log: "BEFORE you POST"(READ this Procedure BEFORE Requesting Assistance)

    Then start a new topic in the Malware Removal Forum and copy paste the log into it, an analyst will advise you as soon as available.

    From the Malware forum FAQ:
    Please do NOT turn off System Restore trying to remove an infection. Doing so would only serve to destroy a known restore point (dirty or not) and won't remove the malware. Let your helper advise you as to when a System Restore flush is called for.
    Best regards.
    Microsoft MVP Reconnect 2018-
    Windows Insider MVP 2016-2018
    Microsoft Consumer Security MVP 2006-2016

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •