malware trovi

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by Karenpenn, Nov 4, 2014.

  1. Karenpenn

    Karenpenn Private E-2

    We had lots of malware/adware popups on all browsers, with firefox not even working. Not sure when it started, they said it gradually built up - I'm a semi-novice helping out a collective of clueless computer users. They did install a "youtube accelerator" which seems to have been part of the problem...

    I ran your malware proceedure and here are the logs.
    A lot has cleared up, but this trovi search keeps intruding on chrome and ie. We uninstalled firefox prior to running your malware sequence, and we just downloaded and installed firefox and so far haven't seen trovi there...)
     

    Attached Files:

  2. dr.moriarty

    dr.moriarty Malware Super Sleuth Staff Member

    Welcome to MajorGeeks!

    You have one more requested log to attach - the TDSSKiller log.txt.
     
  3. Karenpenn

    Karenpenn Private E-2

    Sorry - I think I ran the TTSKiller before, but I don't see the log, so here is one from now, so it is in the wrong order. It didn't find anything this time.
     

    Attached Files:

  4. dr.moriarty

    dr.moriarty Malware Super Sleuth Staff Member

    Now shut down your protection software (antivirus, antispyware...etc) to avoid possible conflicts. *Re-enable them before physically reconnecting to your ISP.

    Run C:\MGtools\analyse.exe by double clicking on it (Note: if using Vista or Win 7, don't double click, use right click and select Run As Administrator). This is really HijackThis (select Do a system scan only) and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:
    • R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyServer = http=127.0.0.1:49167;https=127.0.0.1:49167
    • O2 - BHO: YTAHelperBHO - {FCE3FA8B-BA81-467C-81D8-E43C00D1BC71} - C:\ProgramData\YTAHelper\YTAHelper.dll
    • O4 - HKUS\S-1-5-21-2884062640-4158938998-57982180-1001\..\Run: [GOOBZOYouTubeAccelerator] "C:\Program Files\YouTube Accelerator\YouTubeAccelerator.exe" /startup (User 'BS Staff')
    • O23 - Service: YouTubeAcceleratorService - GOOBZO - C:\PROGRA~1\YOUTUB~1\YouTubeAcceleratorService.exe

    After clicking Fix, exit HJT.

    Using "Programs & Features" uninstall: (If you do not find it or it will not uninstall, just keep going.)
    YouTube Accelerator

    Please download OTM by Old Timer and save it to your Desktop.
    • Run OTM.exe by double clicking on it (Note: if using Vista, Win7 or Win8, don't double click, use right click and select Run As Administrator).
    • Copy the lines from the below codebox to the clipboard by highlighting ALL of them and pressing CTRL + C
      (or, after highlighting, right-click and choose Copy): Do not include the word Code: which is just a title line of
      the code box
    Code:
    :Services
    YouTubeAcceleratorService
    
    :Files
    C:\Program Files\YouTube Accelerator\YouTubeAccelerator.exe
    C:\Program Files\YouTube Accelerator\YouTubeAcceleratorService.exe
    C:\Program Files\YouTube Accelerator\ytalsp.dll
    C:\Program Files\YouTube Accelerator\YTAUninstall.exe
    C:\Program Files\YouTube Accelerator
    C:\ProgramData\YTAHelper
    C:\Program Files\YTAHelper
    C:\Users\BS Staff\Downloads\Setup (1).exe
    C:\Users\BS Staff\Downloads\Setup.exe
    C:\Users\RBPC\AppData\Roaming\Systweak
    C:\Users\RBPC\AppData\Roaming\VOPackage
    C:\Users\RBPC\Desktop\Sync Folder.lnk 
    C:\Users\RBPC\Documents\Optimizer Pro\CookiesException.txt 
    C:\Users\RBPC\Documents\Optimizer Pro
    C:\Windows\Reimage.ini 
    C:\Windows\system32\roboot.exe 
    C:\Windows\System32\Tasks\ReimageUpdater
    C:\ProgramData\Microsoft\Windows\Start Menu\Programs\YouTube Accelerator
    
    :Reg
    [HKEY_USERS\S-1-5-21-2884062640-4158938998-57982180-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
    "ProxyEnable"=dword:00000000
    "ProxyServer"=- 
    [-HKLM\SOFTWARE\Classes\CLSID\{1AA60054-57D9-4F99-9A55-D0FBFBE7ECD3}]
    [-HKLM\SOFTWARE\Classes\AppID\REI_AxControl.DLL]
    [-HKLM\SOFTWARE\Classes\AppID\{28FF42B8-A0DA-4BE5-9B81-E26DD59B350A}]
    [-HKLM\SOFTWARE\Classes\AppID\{58FDA6AF-67D8-4198-B7CD-94B17532C8D5}]
    [-HKLM\SOFTWARE\Classes\CLSID\{10ECCE17-29B5-4880-A8F5-EAD298611484}]
    [-HKLM\SOFTWARE\Classes\CLSID\{459DD0F7-0D55-D3DC-67BC-E6BE37E9D762}]
    [-HKLM\SOFTWARE\Classes\CLSID\{801B440B-1EE3-49B0-B05D-2AB076D4E8CB}]
    [-HKLM\SOFTWARE\Classes\Interface\{9BB31AD8-5DB2-459E-A901-DEA536F23BA4}]
    [-HKLM\SOFTWARE\Classes\Interface\{BD51A48E-EB5F-4454-8774-EF962DF64546}]
    [-HKLM\SOFTWARE\Classes\REI_AxControl.ReiEngine.1]
    [-HKLM\SOFTWARE\Classes\REI_AxControl.ReiEngine]
    [-HKLM\SOFTWARE\Classes\TypeLib\{8FB1A663-2820-468B-95C4-5060A4C5F413}]
    [-HKLM\SOFTWARE\Classes\TypeLib\{FA6468D2-FAA4-4951-A53B-2A5CF9CC0A36}]
    [-HKLM\SOFTWARE\Microsoft\Tracing\AdvancedSystemProtector_RASAPI32]
    [-HKLM\SOFTWARE\Microsoft\Tracing\AdvancedSystemProtector_RASMANCS]
    [-HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\ReimageUpdater]
    [-HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\MyPC Backup]
    [-HKLM\SOFTWARE\Reimage]
    [-HKLM\SOFTWARE\SearchModule]
    [-HKLM\SOFTWARE\Systweak]
    [-HKLM\SOFTWARE\WOW6432Node\SearchModule]
    [-HKLM\SOFTWARE\{1146AC44-2F03-4431-B4FD-889BC837521F}]
    [-HKLM\SOFTWARE\{3A7D3E19-1B79-4E4E-BD96-5467DA2C4EF0}]
    [-HKLM\SOFTWARE\{6791A2F3-FC80-475C-A002-C014AF797E9C}]
    [-HKLM\SYSTEM\ControlSet001\Control\Class\{0C95ABFE-4FB6-49DB-B22F-0E1F5FC4BEEC}]
    [-HKLM\SYSTEM\ControlSet001\Control\Class\{EEEFACB3-729F-4484-B66D-E7A7917BBFC1}]
    [-HKLM\SYSTEM\ControlSet001\Enum\Root\LEGACY_SMUPDD]
    [-HKLM\SYSTEM\ControlSet001\services\ReimageRealTimeProtector]
    [-HKLM\SYSTEM\ControlSet002\Control\Class\{0C95ABFE-4FB6-49DB-B22F-0E1F5FC4BEEC}]
    [-HKLM\SYSTEM\ControlSet002\Control\Class\{EEEFACB3-729F-4484-B66D-E7A7917BBFC1}]
    [-HKLM\SYSTEM\ControlSet002\Enum\Root\LEGACY_SMUPDD]
    [-HKLM\SYSTEM\ControlSet002\services\ReimageRealTimeProtector]
    [-HKLM\SYSTEM\CurrentControlSet\Control\Class\{0C95ABFE-4FB6-49DB-B22F-0E1F5FC4BEEC}]
    [-HKLM\SYSTEM\CurrentControlSet\Control\Class\{EEEFACB3-729F-4484-B66D-E7A7917BBFC1}]
    [-HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_SMUPDD]
    [-HKLM\SYSTEM\CurrentControlSet\services\ReimageRealTimeProtector]
    [-HKU\.DEFAULT\Software\AppDataLow\{1146AC44-2F03-4431-B4FD-889BC837521F}]
    [-HKU\S-1-5-18\Software\AppDataLow\{1146AC44-2F03-4431-B4FD-889BC837521F}]
    [-HKU\S-1-5-21-2884062640-4158938998-57982180-1000\Software\AppDataLow\{1146AC44-2F03-4431-B4FD-889BC837521F}]
    [-HKU\S-1-5-21-2884062640-4158938998-57982180-1000\Software\Local AppWizard-Generated Applications\Reimage - Windows Problem Relief.]
    [-HKU\S-1-5-21-2884062640-4158938998-57982180-1000\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{10ECCE17-29B5-4880-A8F5-EAD298611484}]
    [-HKU\S-1-5-21-2884062640-4158938998-57982180-1000\Software\Optimizer Pro]
    [-HKU\S-1-5-21-2884062640-4158938998-57982180-1000\Software\Reimage]
    [-HKU\S-1-5-21-2884062640-4158938998-57982180-1000\Software\Systweak]
    
    :Commands
    [purity]
    [EmptyTemp]
    [start explorer]
    [Reboot]
    • Return to OTM, right click in the Paste List of Files/Folders to Move window (under the yellow bar) and choose Paste.
    • Now click the large [​IMG] button.
    • If OTM asks to reboot your computer, allow it to do so. The report should appear in Notepad after the reboot.
    • Close OTM.
    Now navigate to the C:\_OTM\MovedFiles folder ( assuming your Windows drive is C). This is where your log will be
    saved in the form of Date and Time mmddyyyy_hhmmss.log. Just look for the most recent .log file. Attach
    this log file to your next message.

    Now please download Junkware Removal Tool to your desktop.
    • Make sure to shut down your protection software now to avoid potential conflicts.
    • Run the tool by double-clicking it. If you are using Windows Vista or Seven, right-mouse click it and select Run as Administrator.
    • The tool will open and start scanning your system.
    • Note: That JRT may reset your home page to a google default so you will need to restore your home page setting if this happens.
    • Please be patient as this can take a while to complete depending on your system's specifications.
    • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
    • Attach JRT.txt to your next message.

    Next download AdwCleaner by Xplode and save to your Desktop.
    • Double click on AdwCleaner.exe to run the tool.
      Vista/Windows 7/8 users right-click and select Run As Administrator
    • Click on the Scan button.
    • AdwCleaner will begin...be patient as the scan may take some time to complete.
    • When it's done you'll see: Pending: Please uncheck elements you don't want removed.
    • Now click on the Report button...a logfile (AdwCleaner[R#].txt) will open in Notepad for review (where the largest value of # represents the most recent report).
    • Look over the log especially under Files/Folders for any program you want to save.
    • If there's a program you may want to save, just uncheck it from AdwCleaner.
    • If you're not sure, post the log for review. (all items found are either adware/spyware/foistware)
    • If you're ready to clean it all up.....click the Clean button.
    • After rebooting, a logfile report (AdwCleaner[S0].txt) will open automatically.
    • Attach that logfile to your next reply.
    • A copy of all logfiles are saved in the C:\AdwCleaner folder which are created when running the tool.

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista, Win7 or Win8, don't double click, use right click and select "Run As Administrator").

    Then attach the below logs:
    • the C:\_OTM\MovedFiles log
    • the JRT.TXT log
    • C:\MGlogs.zip
    • AdwCleaner[S#].txt
    Make sure you tell me how things are working now!
     
  5. Karenpenn

    Karenpenn Private E-2

    Looks like this removed lots of stuff. so, the administrator profile seems to be clear. I can open ie, chrome and firefox w/o trovi.
    However, when I log into the limited user account I try to get others to use, both the chrome and ie keep changing back to trovi home page. I tried manually deleting using settings within these browsers. Firfox seems ok.

    Is there something I need to run on this other profile (I assume not everything...) or should I uninstall those 2 browsers and reinstall them?

    (there are multiple users and if I try to delete these browsers entirely, I can guarantee someone else will reinstall it!)
     

    Attached Files:

  6. dr.moriarty

    dr.moriarty Malware Super Sleuth Staff Member

    Hi!

    Try resetting those browsers to their default settings in the limited user account.

    Reset Chrome to Defaults

    Reset Internet Explorer 9, 10, and 11 to Defaults

    NOTE: You may have to elevate the limited user account to Admin on the machine, restart, make the necessary changes, apply and save the changes (test make sure it works), then remove the granted Admin privileges and perform another restart.
     
  7. Karenpenn

    Karenpenn Private E-2

    This didn't make any difference at all. I ran out of time for further experimentation, but I'm thinking of just uninstalling both browsers and then downloading fresh and re-installing. I just haven't had the time since accomplishing the main cleanout with your help.

    However, my question is, is the trovi search program somewhere else on the computer from which to insert itself into these browsers? If it is just latched into the browser program files on this computer, then my solution should solve it.

    (It seems to have solved it for firefox)

    I have somewhat limited access to the computer, and since it is mainly working ok, it's getting lots of use in the meantime.... (by the same "non-tech" people. I've stressed not downloading anything more!)
     
  8. dr.moriarty

    dr.moriarty Malware Super Sleuth Staff Member

    I've found no other references to it in your logs.

    *Are you starting these browsers from a shortcut link or quicklaunch icon?
    • If yes then right click on the shortcut and look at the Properties to see if anything unwanted has been forced to load during the execution of the browser.
    If you choose to cleanly uninstall Chrome (and Google Update Helper), you must also delete these folders and re-boot afterwards.
     
  9. Karenpenn

    Karenpenn Private E-2

    Thanks so much for your help. I forgot I can't uninstall internet explorer!
    worked for chrome - it is now clean.

    I guess we have to live with the trovi on internet explorer, which we rarely use. It seems to be connected to msn?

    This is what comes up in the address bar:

    http:xxx.trovi.com/?ctid=CT3332563&searchsource=55&UM=6
     
    Last edited by a moderator: Nov 8, 2014
  10. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Good morning.


    [​IMG] Fix items using RogueKiller.

    Double-click RogueKiller.exe to run. (Vista/7/8 right-click and select Run as Administrator)
    When it opens, press the Scan button
    Now click the Registry tab and locate these detections: (Some may show, some may not)

    • [PUP] HKEY_CLASSES_ROOT\CLSID\{02A96331-0CA6-40E2-A87D-C224601985EB} -> Found
    • [PUP] HKEY_CLASSES_ROOT\CLSID\{1AA60054-57D9-4F99-9A55-D0FBFBE7ECD3} -> Found
    • [PUP] HKEY_CLASSES_ROOT\CLSID\{3278F5CF-48F3-4253-A6BB-004CE84AF492} -> Found
    • [PUP] HKEY_CLASSES_ROOT\CLSID\{3B5702BA-7F4C-4D1A-B026-1E9A01D43978} -> Found
    • [PUP] HKEY_CLASSES_ROOT\CLSID\{41829420-151B-4920-B8A5-16BE4601B42A} -> Found
    • [PUP] HKEY_CLASSES_ROOT\CLSID\{4AA46D49-459F-4358-B4D1-169048547C23} -> Found
    • [PUP] HKEY_CLASSES_ROOT\CLSID\{4FD3B33A-372C-439E-BB87-017365EC693C} -> Found
    • [PUP] HKEY_CLASSES_ROOT\CLSID\{5645E0E7-FC12-43BF-A6E4-F9751942B298} -> Found
    • [PUP] HKEY_CLASSES_ROOT\CLSID\{577975B8-C40E-43E6-B0DE-4C6B44088B52} -> Found
    • [PUP] HKEY_CLASSES_ROOT\CLSID\{5E89ACE9-E16B-499A-87B4-0DBF742404C1} -> Found
    • [PUP] HKEY_CLASSES_ROOT\CLSID\{69F256DF-BA98-45E9-86EA-FC3CFECF9D30} -> Found
    • [PUP] HKEY_CLASSES_ROOT\CLSID\{6D4506CE-F855-4657-AA38-DB6B1F733982} -> Found
    • [PUP] HKEY_CLASSES_ROOT\CLSID\{6E87FC94-9866-49B9-8E93-5736D6DE3DD7} -> Found
    • [PUP] HKEY_CLASSES_ROOT\CLSID\{7E49F793-B3CD-4BF7-8419-B34B8BD30E61} -> Found
    • [PUP] HKEY_CLASSES_ROOT\CLSID\{834469E3-CA2B-4F21-A5CA-4F6F4DBCDE87} -> Found
    • [PUP] HKEY_CLASSES_ROOT\CLSID\{8529FAA3-5BFD-43C1-AB35-B53C4B96C6E5} -> Found
    • [PUP] HKEY_CLASSES_ROOT\CLSID\{ADBC39BE-3D20-4333-8D99-E91EB1B62474} -> Found
    • [PUP] HKEY_CLASSES_ROOT\CLSID\{C7BF8F4B-7BC7-4F42-B944-3D28A3A86D8A} -> Found
    • [PUP] HKEY_CLASSES_ROOT\CLSID\{CFC47BB5-5FB5-4AD0-8427-6AA04334A3FC} -> Found
    • [PUP] HKEY_CLASSES_ROOT\CLSID\{E06CA7F5-BA34-4FF6-8D24-B1BDC594D91F} -> Found
    • [PUP] HKEY_CLASSES_ROOT\CLSID\{E0ADB535-D7B5-4D8B-B15D-578BDD20D76A} -> Found
    • [PUP] HKEY_CLASSES_ROOT\CLSID\{F6421EE5-A5BE-4D31-81D5-C16B7BF48E4C} -> Found
    • [PUP] HKEY_CLASSES_ROOT\CLSID\{FCE3FA8B-BA81-467C-81D8-E43C00D1BC71} -> Found
    • [PUP] HKEY_CLASSES_ROOT\CLSID\{FD8E81D0-F5FE-4CB1-9AEA-1E163D2BAB78} -> Found
    • [PUP] HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{4FD3B33A-372C-439E-BB87-017365EC693C} -> Found
    • [PUP] HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{FCE3FA8B-BA81-467C-81D8-E43C00D1BC71} -> Found
    • [PUP] HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\globalUpdate (C:\Program Files\globalUpdate\Update\GoogleUpdate.exe /svc) -> Found
    • [PUP] HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\globalUpdatem (C:\Program Files\globalUpdate\Update\GoogleUpdate.exe /medsvc) -> Found
    • [PUP] HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\SMUpdd (\??\C:\Program Files\Common Files\Goobzo\GBUpdate\smw.sys) -> Found
    • [PUP] HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\SPPD (\??\C:\Windows\system32\drivers\SPPD.sys) -> Found
    • [PUP] HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\YouTubeAcceleratorService (C:\PROGRA~1\YOUTUB~1\YouTubeAcceleratorService.exe -start -scm) -> Found
    • [PUP] HKEY_LOCAL_MACHINE\System\ControlSet001\Services\globalUpdate (C:\Program Files\globalUpdate\Update\GoogleUpdate.exe /svc) -> Found
    • [PUP] HKEY_LOCAL_MACHINE\System\ControlSet001\Services\globalUpdatem (C:\Program Files\globalUpdate\Update\GoogleUpdate.exe /medsvc) -> Found
    • [PUP] HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SMUpdd (\??\C:\Program Files\Common Files\Goobzo\GBUpdate\smw.sys) -> Found
    • [PUP] HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SPPD (\??\C:\Windows\system32\drivers\SPPD.sys) -> Found
    • [PUP] HKEY_LOCAL_MACHINE\System\ControlSet001\Services\YouTubeAcceleratorService (C:\PROGRA~1\YOUTUB~1\YouTubeAcceleratorService.exe -start -scm) -> Found
    • [PUP] HKEY_LOCAL_MACHINE\System\ControlSet002\Services\globalUpdate (C:\Program Files\globalUpdate\Update\GoogleUpdate.exe /svc) -> Found
    • [PUP] HKEY_LOCAL_MACHINE\System\ControlSet002\Services\globalUpdatem (C:\Program Files\globalUpdate\Update\GoogleUpdate.exe /medsvc) -> Found
    • [PUP] HKEY_LOCAL_MACHINE\System\ControlSet002\Services\SMUpdd (\??\C:\Program Files\Common Files\Goobzo\GBUpdate\smw.sys) -> Found
    • [PUP] HKEY_LOCAL_MACHINE\System\ControlSet002\Services\SPPD (\??\C:\Windows\system32\drivers\SPPD.sys) -> Found
    • [PUP] HKEY_LOCAL_MACHINE\System\ControlSet002\Services\YouTubeAcceleratorService (C:\PROGRA~1\YOUTUB~1\YouTubeAcceleratorService.exe -start -scm) -> Found
    • [PUM.Proxy] HKEY_USERS\S-1-5-21-2884062640-4158938998-57982180-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings | ProxyEnable : 1 -> Found
    • [PUM.Proxy] HKEY_USERS\S-1-5-21-2884062640-4158938998-57982180-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings | ProxyServer : http=127.0.0.1:49167;https=127.0.0.1:49167 -> Found

    Place a checkmark next to each of these items, leave the others unchecked.
    Now press the Delete button.
    When it is finished, there will be a log on your desktop called: RKreport[2].txt
    Attach RKreport[2].txt to your next message. (How to attach)
    Reboot the machine.



    Next, I'd like for you to re run Hitman Pro please and attach the log.



    Now please download OTL by OldTimer.
    • Save it to your desktop.
    • Double-click on the OTL icon on your desktopto run it. (Note: if using Vista, Win7 or Win8 use right-click and select Run as Administrator)
    • Check the "Scan All Users" checkbox.
    • Check the "Standard Output".
    • Change the setting of "Drivers" and "Services" to "All"
    • Copy the text in the code box below and paste it into the [​IMG] text-field.
      Code:
      activex
      netsvcs
      drives
      
    • Now click the [​IMG] button.
    • One report will be created:
      • OTL.txt <-- Will be opened
    • Attach OTL.txt to your next message. (How to attach)


    Explain how things are running.
     
    Last edited: Nov 9, 2014

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds