Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

smss.exe and services.exe virus in system volume information cannot kill it


  • Please log in to reply
4 replies to this topic

#1 miwitte

miwitte

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:02:45 AM

Posted 09 July 2010 - 06:38 PM

Neighbors computer had this come up on malewarebytes scan and I cannot remove it using malewarebytes or Mcaffe antivirus. They both find it but it wont remove on reboot. Tried using pskill to kill the process before having malewarbytes try and fix it but the process just comes back.

Memory Processes Infected:
C:\System Volume Information\Microsoft\services.exe (Trojan.Cycler) -> Failed to unload process.
C:\System Volume Information\Microsoft\smss.exe (Trojan.Cycler) -> Failed to unload process.


Files Infected:
C:\System volume information\Microsoft\services.exe (Trojan.Cycler) -> Delete on reboot.
C:\System volume information\Microsoft\smss.exe (Trojan.Cycler) -> Delete on reboot.

BC AdBot (Login to Remove)

 


#2 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,490 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:02:45 AM

Posted 09 July 2010 - 09:04 PM

Hello, this looks like a new piece of malware called Bootkit Whistler. This is a piece of malware that alters the Master Boot Record of your Harddisk. Once done that it can facilitate all kinds of malware, as in your case the two processes running from the System Restore directory.

To confirm this, do the following:

In case you don't have an archive extracter installed already:
Please download 7zip and install the program on your computer (we need this program in order to be able to unzip the tool that can delete Bootkit Whistler).

When 7zip is succesfully installed, please download bootkit_remover.rar and save the file to your desktop.

Right click on the file and select "extract/unzip here".

This will create two readme files and remover.exe on your desktop.
Double click on remover.exe; a command window will open. Please copy/paste the text under "MBR Status" and post that in your next reply.
~~Thanks elise
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#3 miwitte

miwitte
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:02:45 AM

Posted 10 July 2010 - 10:33 AM

Bootkit Remover version 1.0.0.1
© 2009 eSage Lab
www.esagelab.com

\\.\C: -> \\.\PhysicalDrive0
MD5: 8b87f2bb63266bdba1b08696e31154d9

Size Device Name MBR Status
--------------------------------------------
74 GB \\.\PhysicalDrive0 Unknown boot code

Unknown boot code has been found on some of your physical disks.
To inspect the boot code manually, dump the master boot sector:
remover.exe dump <device_name> [output_file]
To disinfect the master boot sector, use the following command:
remover.exe fix <device_name>


Press any key to quit...

#4 miwitte

miwitte
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:02:45 AM

Posted 12 July 2010 - 09:19 PM

that fixed it thanks this is closed.

#5 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,490 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:02:45 AM

Posted 12 July 2010 - 10:52 PM

Great!! Now you should Create a New Restore Point to prevent possible reinfection from an old one. Some of the malware you picked up could have been backed up, renamed and saved in System Restore. Since this is a protected directory your tools cannot access to delete these files, they sometimes can reinfect your system if you accidentally use an old restore point. Setting a new restore point AFTER cleaning your system will help prevent this and enable your computer to "roll-back" to a clean working state.

The easiest and safest way to do this is:
  • Go to Start > Programs > Accessories > System Tools and click "System Restore".
  • Choose the radio button marked "Create a Restore Point" on the first screen then click "Next". Give the R.P. a name, then click "Create". The new point will be stamped with the current date and time. Keep a log of this so you can find it easily should you need to use System Restore.
  • Then use Disk Cleanup to remove all but the most recently created Restore Point.
  • Go to Start > Run and type: Cleanmgr
  • Click "Ok". Disk Cleanup will scan your files for several minutes, then open.
  • Click the "More Options" tab, then click the "Clean up" button under System Restore.
  • Click Ok. You will be prompted with "Are you sure you want to delete all but the most recent restore point?"
  • Click Yes, then click Ok.
  • Click Yes again when prompted with "Are you sure you want to perform these actions?"
  • Disk Cleanup will remove the files and close automatically.
Vista and Windows 7 users can refer to these links: Create a New Restore Point in Vista or Windows 7 and Disk Cleanup in Vista.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users