problems after trojan removal

Asustek computer inc. / K8n-e
July 12, 2009 at 13:15:13
Specs: XP Pro /SP3, A64 2.5GHz / 2GB
This is gonna be a lengthy one...

I got hit hard yesterday by trojans when googling for a movie torrent...obviously went to an infected site. The trojans prevented me from running AV, CCleaner, Anti-Malware, etc. I couldn't even boot into safe mode. I download Trojan Remover 6.7.9 on my other PC, copied to a thumbdrive drive, then installed & ran it on the infected PC. That got *most* of the nasties & allowed me to run my other anti-virus / anti-spy /CCleaner / regcleaner programs. I ran everything from Safe mode with my DSL modem switched off. It took a couple of times to finally get everything out but it *appears* to be clean. Subsequent checks have come up clean.

This system has been 100% stable for several years but now I'm experiencing explorer crashes. I tried resetting IE7 but that didn't help. I uninstalled/reinstalled flash, but that didn't help either. I tried running HiJackThis but didn't see anything that stood out so I posted the log in the came up clean. So I downloaded & ran RootkitRevealer. That showed a couple of suspicious entries which I was able to remove, but the problems continue.

I started looking thru some of the folders & doing a general cleanup but found three suspicious entries in C:\windows\temp that I couldn't delete. I have Unlocker installed so I right clicked on the files, unlocked them, then the processes that they're related to is displayed. Here's what is listed:

Process - services.exe
Path locked - C:\Windows\Temp\$67we.$
PID - 708
Handle - 1164
Process Path - C:\WINDOWS\system32\services.exe

Process - services.exe
Path locked - C:\Windows\Temp\$$$dq3e
PID - 708
Handle - 1660
Process Path - C:\WINDOWS\system32\services.exe

Process - services.exe
Path locked - C:\Windows\Temp\$$yt7.$$
PID - 708
Handle - 1608
Process Path - C:\WINDOWS\system32\services.exe

Once I unlock them, I can delete them, but they reappear on the next reboot. I tried googling those file names & ran across others with the same problem, but didn't find a definite solution.

Here are the current symptoms:

- random explorer crashes
- two BSOD (so far) - one for irql_not_less_or_equal, the other for bad_pool_caller
- HDD activity light blinks about every 5 seconds when system is idle.

Event viewer doesn't help much. Nothing at all listed under Security or IE, but there are some Errors & Warnings listed under Applications.

I'm trying to avoid a reformat/reinstall.

Any ideas or suggestion on what to try??


See More: problems after trojan removal

Report •

July 12, 2009 at 15:33:05
Download and run Kaspersky AVP tool:
Once you download and start the tool:
# Check below options:

    * Select all the objects/places to be scanned. 

# Click Scan
# Fix what it detects
# Zip/Rar Scan log/Summary and upload it to Post download link in your next message.

Illustrated tutorial:

If I'm helping you and I don't reply within 24 hours send me a PM.

Report •

July 12, 2009 at 17:47:58
Kaspersky won't even install. AVG Free found nothing...neither did MalwareBytes AntiMalware or SuperAntiSpyware Remover. I'm trying Trend Micro Housecall online scanner to see if it finds anything.

Report •

July 12, 2009 at 18:26:44

Report •

Related Solutions

July 12, 2009 at 19:30:53
Whatever has infected my system will not allow Kaspersky to install...not in normal mode or safe mode. HouseCall found a 1/2 dozen trojans & removed them, but I'm still having problems. Right now I'm running the Trinity Rescue Live CD.

Report •

July 12, 2009 at 19:33:21
Note: I can help you remove malware manually. Please avoid installing/uninstalling or updating any programs and attempting any unsupervised fixes or scans. This can make helping you impossible. First Track this topic. Then follow:

1) Can you please post your AVZ log:
Note: Run AVZ in windows normal mode. If avz.exe doesn't start, then try to rename the file avz.exe to something else and try to run it again. Make sure you have your web browser open in background before following the steps below.

i) To create the log file, download AVZ by clicking HERE. Please save this file to your desktop or "My Documents" folder.

ii) Next, unpack the file to a new folder using the Compressed (zipped) folders wizard built into Windows XP/Vista, or a zip utility of your choice.

iii) Once you have unpacked the contents of the zip archive, please launch the file AVZ.exe by double clicking on it or right clicking and selecting Open.
Note: If you are running Windows vista launch AVZ.exe by right clicking and selecting Run as Administrator.

You should now see the main window of the AVZ utility. Please navigate to File->Custom Scripts. Copy the script below by using the keyboard shortcut CTRL+C or the corresponding option via right click.

ExecuteAVUpdateEx( '', 1, '','','');

Paste the script into the execution window by using CTRL+V keyboard shortcut, or the "paste" option via the right click menu. Click on Run to run the script, the PC will reboot. After the reboot the LOG subfolder is created in the folder with AVZ, with a file called inside. Upload that file to and paste the link here.

Image Tutorial

2) Download and Run DDS which will create a Pseudo HJT Report as part of its log: DDS Tool Download Link. When done, DDS will open two (2) logs

   1. DDS.txt
   2. Attach.txt

Upload the logs to and paste download link in your next reply.
Note: Disable any script-blocking programs and then double-click on the DDS.scr icon to start the program. If you did not disable a script-blocker that may be part of your antimalware program, you may receive a warning from your antimalware product asking if you would like DDS.scr to run. Please allow it to do so.

If I'm helping you and I don't reply within 24 hours send me a PM.

Report •

July 13, 2009 at 09:36:31
Unfortunately, I made several changes before reading your response. Here's the files as requested:

Report •

July 14, 2009 at 14:13:50
Booted off the XP CD, pressed "R" for the recovery console, typed FIXMBR & hit enter. I received a warning about having a non-standard MBR & that the partitions may not be accessable if I continue, but I went ahead with it anyway. I rebooted into Windows with no problem. There's been no more IE crashing the the .$$ files haven't returned. Hopefully I slayed the beast.

Report •

July 14, 2009 at 14:22:55
Doesn't look like malware problem.. Try running chkdsk and registry cleaner.

If I'm helping you and I don't reply within 24 hours send me a PM.

Report •

July 15, 2009 at 06:14:54
I believe it was a rootkit planted in the boot sector.

Report •

July 15, 2009 at 06:46:31
Run full scan with kaspersky to see if its still there.

If I'm helping you and I don't reply within 24 hours send me a PM.

Report •

July 16, 2009 at 08:23:20
Kaspersky still will not run. It does install to a folder on the desktop but I immediately get an error when it attempts to auto-start. If close the error message & try running it by clicking on the Start icon in the folder, the program opens but as soon as I click Scan, the error message returns. If I leave the program open without clicking Scan, the error will pop up on it's own in about 10 seconds.

Report •

July 16, 2009 at 08:32:42
Follow these steps in order numbered:

1) Download GMER:
[This version will download a randomly named file (Recommended).]

2) Disconnect from the Internet and close all running programs.

3) Temporarily disable any real-time active protection so your security programs will not conflict with gmer's driver.

4) Double-click on the randomly named GMER file (i.e. n7gmo46c.exe) and allow the gmer.sys driver to load if asked.

5) GMER will open to the Rootkit/Malware tab and perform an automatic quick scan when first run. (do not use the computer while the scan is in progress)

6) If you receive a WARNING!!! about rootkit activity and are asked to fully scan your NO.

7) Now click the Scan button. If you see a rootkit warning window, click OK.

8) When the scan is finished, click the Save... button to save the scan results to your Desktop. Save the file as gmer.log and upload it Post the download link to the uploaded file in your post.

9) Exit GMER and re-enable all active protection when done.

Note: Please give me the exact name of the file you downloaded in step 1 + post your log from step 8 in your next post.

If I'm helping you and I don't reply within 24 hours send me a PM.

Report •

July 17, 2009 at 13:24:21
The file I downloaded was xy3d20hj.exe

I followed your steps & as far as I can tell, it looks good:

Report •

Ask Question