IE popup malware / sound mute

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by Wolfslice, Jul 12, 2010.

  1. Wolfslice

    Wolfslice Private E-2

    Hi, it looks like I have whatever is going around right now (loads of other users with same symptoms).

    Running 32 bit win xp sp3.

    Attached are the required logs. Thanks in advance for your help!
     

    Attached Files:

  2. Wolfslice

    Wolfslice Private E-2

    some additional info based on what i've read in other threads:


    BOOTKIT log

    Bootkit Remover version 1.0.0.1
    (c) 2009 eSage Lab
    www.esagelab.com

    \\.\C: -> \\.\PhysicalDrive0
    MD5: 8cedfa5de235f2c6eceb00dafafd92fd
    \\.\E: -> \\.\PhysicalDrive1
    MD5: 8cedfa5de235f2c6eceb00dafafd92fd

    Size Device Name MBR Status
    --------------------------------------------
    931 GB \\.\PhysicalDrive0 Unknown boot code
    931 GB \\.\PhysicalDrive1 Unknown boot code

    Unknown boot code has been found on some of your physical disks.
    To inspect the boot code manually, dump the master boot sector:
    remover.exe dump <device_name> [output_file]
    To disinfect the master boot sector, use the following command:
    remover.exe fix <device_name>


    Press any key to quit...

    additional info:

    1. Do you have any drives that has a non-windows installation on them
    Nope. I have two hard drives, windows installed on one of them. The other drive is purely storage (no os installed)

    2. Are all drives NTFS formatted
    Yeah

    3. Do you have any non-standard or special MBRs which can occur from companies like Dell or HP who frequently install additional partitions used for recovery partitions in lieu of giving CD/DVDs.
    No, the PC is custom built

    4. Is any program like Grub ( see:http://www.gnu.org/software/grub/ ) being used
    Nope

    5. Is drive-encryption being used?
    Nope

    6. Are any drives external USB pen drives or external hard drives being used?

    Nope

    7. VERY IMPORTANT: Do you have all important data backed up? You really should do this before continuing since we will need to rewrite your MBR to fix this and while most times this can be done without any problem, these infections can react badly and that could result in a PC not being bootable. You really don't have much choice though since these infections are too dangerous to your security to leave on a PC.
    Yeah I'm pretty well backed up
     
  3. Wolfslice

    Wolfslice Private E-2

    I have also completed the following step

    Now - please do the following:

    * Click Start, Run then copy and paste the below into the Run box and click OK.


    "%userprofile%\Desktop\remover.exe" fix \\.\PhysicalDrive0

    * Now reboot your PC and after reboot continue with the below instructions.
    * Disable System Restore on all drives.
    * Look for the below folder and if if it sill exists, delete it.
    o C:\System Volume Information\Microsoft

    * Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Win7, don't double click, use right click and select Run As Administrator).

    Then attach the below logs:
    o C:\MGlogs.zip


    log attached. I could not delete my system volume information/microsoft folder. When I open the folder, it says access is denied. Iexplorer is still launching upon boot.
     
  4. Wolfslice

    Wolfslice Private E-2

    sorry i think i forgot to post the log after all. here it is:
     

    Attached Files:

  5. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Welcome to Major Geeks!




    Let's see if your Master Boot Record (MBR) infection has been removed for sure by repeating a scan with remover.exe
    • Double click the remover.exe file to run the program.
    • Attach or post inline here, the output from remover.exe
    NOTE: The Command Prompt window text can be copied to the clip board by right clicking on the top bar of the window and using the Edit commands to Mark, Copy, and Paste.

    Also are you having any more problems?
     
  6. Wolfslice

    Wolfslice Private E-2

    *EDIT UPDATE* IE has once again launched itself and is up to it's tricks again.

    Thanks so much for taking time out of your life to help others.

    I haven't noticed any new problems... at the moment iexplorer is actually not a running process which could be a good sign, however before this it was still launching after repeated restarts following the run: "%userprofile%\Desktop\remover.exe" fix \\.\PhysicalDrive0 step. I've made no changes in between restarts.

    system volume information remains inaccessible (system restore still off).

    here's a fresh scan

    Bootkit Remover version 1.0.0.1
    (c) 2009 eSage Lab
    www.esagelab.com

    \\.\C: -> \\.\PhysicalDrive0
    MD5: 6def5ffcbcdbdb4082f1015625e597bd
    \\.\E: -> \\.\PhysicalDrive1
    MD5: 8cedfa5de235f2c6eceb00dafafd92fd

    Size Device Name MBR Status
    --------------------------------------------
    931 GB \\.\PhysicalDrive0 OK (DOS/Win32 Boot code found)
    931 GB \\.\PhysicalDrive1 Unknown boot code

    Unknown boot code has been found on some of your physical disks.
    To inspect the boot code manually, dump the master boot sector:
    remover.exe dump <device_name> [output_file]
    To disinfect the master boot sector, use the following command:
    remover.exe fix <device_name>


    Press any key to quit...
     
    Last edited: Jul 13, 2010
  7. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Please repeat the below again so we can see if it returned. It may have come back from your E drive.
    Also please run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Win7, don't double click, use right click and select Run As Administrator).

    Then attach the below logs:
    • C:\MGlogs.zip
     
  8. Wolfslice

    Wolfslice Private E-2

    I believe the problem is solved! I went to start menu and ran: "%userprofile%\Desktop\remover.exe" fix \\.\PhysicalDrive1 (previously had only done 0) and now both drives are clean, no IE popups in sight.

    Chaslang and other mods: I want to express sincere thanks for what it is you do here. I hope the universe finds a way to properly reward your good nature. All the best.

    Word of warning to anyone else: I beleive I contracted this virus while looking for a song (autechre- clnchr japan bonus track) from rapidshare link sites. I am not positive about this, but it seems most likely. Be careful.
     
  9. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Ah so my suspicion of it returning from your other partition was correct! ;)

    You're welcome.


    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep SUPERAntiSpyware and Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no protection. They do not use any significant amount of resources ( except a little disk space ) until you run a scan.
    2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /uninstall
        • Notes: The space between the combofix" and the /uninstall, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.
    3. Go back to step 6 oof the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    4. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    5. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    6. If running Vista, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    7. Go to add/remove programs and uninstall HijackThis.
    8. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders
      related to MGtools and some other items from our cleaning procedures.
    9. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 7 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    10. After doing the above, you should work thru the below link:
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds