Pop Up Threat Warnings

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by pbmax, Nov 7, 2014.

  1. pbmax

    pbmax Private E-2

    Occur in Google Chrome but only for one user. Admin account seems unaffected.

    Mostly opens new tab with window that attempt to not let itself be closed. Occasionally, it opens a new window.

    First sign of infection was roughly 6 weeks ago. Has gotten worse, but is not unusable. Internet connection still working.

    Before doing READ AND RUN FIRST, tried the browser redirection fixes. Logs for that enclosed as well.
     

    Attached Files:

  2. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Other than waht was already removed, there is not muc more to do.



    Please download OTM by Old Timer and save it to your Desktop.
    • Run OTM.exe by double clicking on it (Note: if using Vista, Win7 or Win8, don't double click, use right click and select Run As Administrator).
    • Copy the lines from the below codebox to the clipboard by highlighting ALL of them and pressing CTRL + C
      (or, after highlighting, right-click and choose Copy): Do not include the word Code: which is just a title line of
      the code box
    Code:
    :Processes
    explorer.exe
     
    :Files
    C:\Users\digi_admin\Downloads\MGtools.exe
    C:\ProgramData\3dd42bf884f64c93
    C:\Users\digi_admin\AppData\Local\Temp\"*.*
     
    :Reg
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{5C255C8A-E604-49b4-9D64-90988571CECB}]
    [-HKEY_CLASSES_ROOT\CLSID\{1AA60054-57D9-4F99-9A55-D0FBFBE7ECD3}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\{BAB04997-93AD-4C13-805A-0409199700BB}]
    :Commands
    [purity]
    [EmptyTemp]
    [start explorer]
    
    [Reboot]
    • Return to OTM, right click in the Paste List of Files/Folders to Move window (under the yellow bar
      ) and choose Paste.
    • Now click the large [​IMG] button.
    • If OTM asks to reboot your computer, allow it to do so. The report should appear in Notepad after the reboot.
    • Close OTM.
    Now navigate to the C:\_OTM\MovedFiles folder ( assuming your Windows drive is C). This is where your log will be
    saved in the form of Date and Time mmddyyyy_hhmmss.log. Just look for the most recent .log file. Attach
    this log file to your next message.


    Now please download Junkware Removal Tool to your desktop.
    • Shut down your protection software now to avoid potential conflicts.
    • Run the tool by double-clicking it. If you are using Windows Vista or Seven, right-mouse click it and select Run as Administrator.
    • The tool will open and start scanning your system.
    • Note: That JRT may reset your home page to a google default so you will need to restore your home page setting if this happens.
    • Please be patient as this can take a while to complete depending on your system's specifications.
    • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
    • Attach JRT.txt to your next message.
    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista, Win7 or Win8, don't double click, use right click and select Run As Administrator).


    Then attach the below logs:
    • the C:\_OTM\MovedFiles log
    • the JRT.TXT log
    • C:\MGlogs.zip
    Make sure you tell me how things are working now!

    If still having problems, which browser are they occurring with?
     
  3. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Also a question: Why isn't there any protection software installed on this PC?
     
  4. pbmax

    pbmax Private E-2

    Complete oversight. Missed it during install. Once clean, will get installed.
     
  5. pbmax

    pbmax Private E-2

    Still having new tabs pop up under user originally infected.

    Included screen shot of tab, happens on ANY click of even legit web pages displayed in Firefox. Does not seem to affect Internet Explorer.

    Tried to uninstall and reinstall Firefox, no help.

    Other user still unaffected. To be clear, using admin account to scan, have not scanned from infected user logon.
     

    Attached Files:

  6. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Please don't make your own ZIP files double layering the attachments. Just attach them as request and put any other items that you need to show us in their own attachments.

    If you have problems with a different user account that you need to login to that user account and run all the scans on that user account and attach the new logs for that user.

    The logs that you attached previously were for a user named Digi_Admin which does not even appear in your user name list. Only the below appear
    Code:
    ******************************************************************************
                                    USER INFORMATION     
    ******************************************************************************
     
    Users on this computer:
    Is Admin? | Username
    ------------------
       Yes    | Administrator (Disabled)
              | Guest (Disabled)
       Yes    | localadmin
    But then in another scan using a different way to access user info, I can see the below users:
    Code:
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\profilelist\S-1-5-21-3688850151-1615140167-2744523396-500
       ProfileImagePath REG_EXPAND_SZ   C:\Users\digi_admin
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\profilelist\S-1-5-21-3688850151-1615140167-2744523396-500\fdeploy
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\profilelist\S-1-5-21-3688850151-1615140167-2744523396-5623
       ProfileImagePath REG_EXPAND_SZ   C:\Users\chris.berndt
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\profilelist\S-1-5-21-3688850151-1615140167-2744523396-5623\fdeploy
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\profilelist\S-1-5-21-961437335-3242813746-838420719-1001
       ProfileImagePath REG_EXPAND_SZ   C:\Users\localadmin
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\profilelist\S-1-5-82-1036420768-1044797643-1061213386-2937092688-4282445334
       ProfileImagePath REG_EXPAND_SZ   C:\Users\Classic .NET AppPool
     
  7. pbmax

    pbmax Private E-2

    OK, logged in as user c****.b***** and re-ran scans. They are attached. This is user that had the persistent problem.

    Firefox does not now seem to be opening new tabs on every click on any page.

    However the Rogue Killer scan finished with a webapge warning of an IAT hook.
     

    Attached Files:

  8. pbmax

    pbmax Private E-2

    Last scan report on cb logon.
     

    Attached Files:

    • JRT.txt
      File size:
      726 bytes
      Views:
      2
  9. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    There is nothing in the RogueKiller log of concern.

    You can delete the below folder if it still exists. But it may be gone. You ran things out of order so it showed in MGlogs.zip buy JRT may have removed it now.

    C:\Users\chris.berndt\AppData\Roaming\BabSolution


    Other than that, your logs are clean.
     
  10. pbmax

    pbmax Private E-2

    OK then. Thank you very much for your help.
     
  11. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome.


    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep Malwarebytes Anti-Malware for scanning/removal of malware.
    2. Renable your Disk Emulation software with Defogger if you had disabled it in step 4 of the READ & RUN ME.
    3. Go to add/remove programs and uninstall HijackThis. If you don't see it or it will not uninstall, don't worry about it. Just move on to the next step.
    4. If running Vista, Win 7 or Win 8, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    5. Now goto the C:\MGtools folder and find the MGclean.bat file. Double click ( if running Vista, Win7, or Win 8 Right Click and Run As Administrator ) on this file to run this cleanup program that will remove files and folders related to MGtools and some other items from our cleaning procedures.
    6. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    7. If you are running Win 8, Win 7, Vista, Windows XP or Windows ME, do the below to flush restore points:
      • Refer to the instructions for your WIndows version in this link: Disable And Enable System Restore
      • What we want you to do is to first disable System Restore to flush restore points some of which could be infected.
      • Then we want you to Enable System Restore to create a new clean Restore Point.
    8. After doing the above, you should work thru the below link:
     
  12. pbmax

    pbmax Private E-2

    We are good to go. Thanks again.
     
  13. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome. Surf safely!
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds