Trovigo.com, Start.qone8.com, AVG search, yahoo search

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by igrushka7, Feb 19, 2014.

  1. igrushka7

    igrushka7 Private E-2

    Hi All.
    Since about 2 weeks ago, when I click on CHROME, I get 4 tags :Trovigo.com, Start.qone8.com, AVG search, yahoo search popping up in the address bar.
    I had a similar problem with CHROME & IE a while ago and with the help of chaslang & Kestrel13! the problem was solved, thanks. Then my shortcuts were infected.
    Now it looks different.
    I can get to chrome only if I open IE and then replace the address to www.google.com.au.
    Trying to open it from the chrome.exe gets me back to the 4 tags.
    I ran the READ & RUN, which did not help.
    I attach the results of suggested scans.
    Thanks guys.
     

    Attached Files:

  2. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Run C:\MGtools\analyse.exe by double clicking on it (Note: if using Vista or Win 7, don't double click, use right click and select Run As Administrator). This is really HijackThis (select Do a system scan only) and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:

    R3 - URLSearchHook: Vuze Remote Toolbar - {05478A66-EDB6-4A22-A870-A5987F80A7DA} - C:\Program Files (x86)\Vuze Remote Toolbar\IE\8.7\vuzeToolbarIE.dll
    O2 - BHO: Vuze Remote Toolbar - {05478A66-EDB6-4A22-A870-A5987F80A7DA} - C:\Program Files (x86)\Vuze Remote Toolbar\IE\8.7\vuzeToolbarIE.dll
    O3 - Toolbar: (no name) - {95B7759C-8C7F-4BF1-B163-73684A933233} - (no file)
    O3 - Toolbar: Vuze Remote Toolbar - {05478A66-EDB6-4A22-A870-A5987F80A7DA} - C:\Program Files (x86)\Vuze Remote Toolbar\IE\8.7\vuzeToolbarIE.dll
    O4 - HKLM\..\Run: [mobilegeni daemon] C:\Program Files (x86)\Mobogenie\DaemonProcess.exe
    O4 - HKLM\..\Run: [SearchSettings] "C:\Program Files (x86)\Common Files\Spigot\Search Settings\SearchSettings.exe"
    O4 - HKCU\..\Run: [BreakingNews] C:\Program Files\BreakingNews\BreakingNews\DesktopContainer.exe
    O4 - HKCU\..\Run: [2E7A720AC98A836BE2191F71BE4872E15151B251._service_run] "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=service

    After clicking Fix, exit HJT.

    Now uninstall the below programs. If you do not find them or they will not uninstall, just keep going.
    Vuze Remote Toolbar v8.7
    WS-Enabler
    WS-Supporter 1.80

    Please download OTM by Old Timer and save it to your Desktop.
    • Run OTM.exe by double clicking on it (Note: if using Vista, Win7 or Win8, don't double click, use right click and select Run As Administrator).
    • Copy the lines from the below codebox to the clipboard by highlighting ALL of them and pressing CTRL + C
      (or, after highlighting, right-click and choose Copy): Do not include the word Code: which is just a title line of
      the code box
    Code:
    :Processes
    explorer.exe
    
    :Services
    Application Updater
    gupdate
    gupdatem
     
    :Files
    C:\Program Files (x86)\Application Updater
    C:\Program Files (x86)\Common Files\Spigot
    C:\Program Files\BreakingNews
    C:\Program Files (x86)\Mobogenie
    C:\Users\Boris\AppData\Roaming\eIntaller
    C:\ProgramData\AVG SafeGuard toolbar
    C:\ProgramData\jhfoohedifnpcgllbofhlajnpekfiemd
    C:\ProgramData\TTubeeAdbiloecoker
    C:\Users\Boris\AppData\Local\Temp\*.*
    C:\Users\Boris\AppData\Roaming\Slick Savings
    C:\Users\Boris\AppData\Local\genienext
    C:\Users\Boris\AppData\Local\Temp\IHUD000.tmp.exe
    c:\programdata\setapp\ws-enabler
    C:\Windows\tasks\GoogleUpdateTaskMachineCore.job
    C:\Windows\tasks\GoogleUpdateTaskMachineUA.job
    C:\Windows\tasks\ISM-UpdateService-4e00205a-2ab1-4423-8f77-cc25b82cde1d-Logon.job
    C:\Windows\tasks\ISM-UpdateService-4e00205a-2ab1-4423-8f77-cc25b82cde1d.job
    C:\Windows\tasks\WS-Enabler-S-1404196680.job
    :Reg
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{AE07101B-46D4-4A98-AF68-0333EA26E113}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Record\{2009AF2F-5786-3067-8799-B97F7832FDD6}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Record\{425E7597-03A2-338D-B72A-0E51FFE77A7E}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Record\{915BB7D5-082E-3B91-B1E0-45B5FDE01F24}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Record\{FB2E65F4-5687-33EF-9BBF-4E3C9C98D3B9}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AE07101B-46D4-4A98-AF68-0333EA26E113}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar\{ae07101b-46d4-4a98-af68-0333ea26e113}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\3152E1F19977892449DC968802CE8964]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\649A52D257CA5DB4EAAE8BA9EB23E467]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\hdcode]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\{3A7D3E19-1B79-4E4E-BD96-5467DA2C4EF0}]
    [-HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\eventlog\Application\WsysSvc]
    [-HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\eventlog\Application\WsysSvc]
    [-HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\eventlog\Application\WsysSvc]
    [-HKEY_USERS\S-1-5-21-176368571-2772884433-3301626013-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\SnapDo.exe]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{05478A66-EDB6-4A22-A870-A5987F80A7DA}]
    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar]
    "{05478A66-EDB6-4A22-A870-A5987F80A7DA}"=-
    [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run]
    "BreakingNews"=-
    "2E7A720AC98A836BE2191F71BE4872E15151B251._service_run"=-
    [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentVersion\Run]
    "mobilegeni daemon"=-
    "SearchSettings"=-
    [HKEY_LOCAL_MACHINE\software\Wow6432Node\microsoft\windows\currentVersion\Run]
    "mobilegeni daemon"=-
    "SearchSettings"=-
    [HKEY_USERS\S-1-5-21-176368571-2772884433-3301626013-1000\Software\Microsoft\Windows\CurrentVersion\run]
    "BreakingNews"=-
    "2E7A720AC98A836BE2191F71BE4872E15151B251._service_run"=-
    :Commands
    [purity]
    [EmptyTemp]
    [start explorer]
    [Reboot]
    • Return to OTM, right click in the Paste List of Files/Folders to Move window (under the yellow bar
      ) and choose Paste.
    • Now click the large [​IMG] button.
    • If OTM asks to reboot your computer, allow it to do so. The report should appear in Notepad after the reboot.
    • Close OTM.
    Now navigate to the C:\_OTM\MovedFiles folder ( assuming your Windows drive is C). This is where your log will be
    saved in the form of Date and Time mmddyyyy_hhmmss.log. Just look for the most recent .log file. Attach
    this log file to your next message.

    Now please download Junkware Removal Tool to your desktop.
    • Shut down your protection software now to avoid potential conflicts.
    • Run the tool by double-clicking it. If you are using Windows Vista or Seven, right-mouse click it and select Run as Administrator.
    • The tool will open and start scanning your system.
    • Note: That JRT may reset your home page to a google default so you will need to restore your home page setting if this happens.
    • Please be patient as this can take a while to complete depending on your system's specifications.
    • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
    • Attach JRT.txt to your next message.
    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista, Win7 or Win8, don't double click, use right click and select Run As Administrator).

    Then attach the below logs:
    • the C:\_OTM\MovedFiles log
    • the JRT.TXTlog
    • C:\MGlogs.zip
    Make sure you tell me how things are working now!
     
  3. igrushka7

    igrushka7 Private E-2

    Hi chaslang.
    Thanks for prompt reply.
    Done all as you suggested , but found no changes.
    Here are the files, you requested.
    Also, could not uninstall WS-Supporter.
    Best regards.
    Boris.
     

    Attached Files:

  4. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome. Looks much better.


    Try the below:
    • Click the Customize and Control Google Chrome button ( the 3 parallel lines down below the X button used to close the window ).
    • Then on the pop down form select Settings.
    • Now under the Search heading, click the Manage Search Engines button
      • Look in here for anything related to Trovigo or qone8 or Conduit and select it and delete it by clicking the X button to the far right side.
      • Make sure that you look in both the Default Search Engines and Other Search Engines areas and delete any Trovigo or qone8 or Conduit junk.
      • Select the default search engine you want ( like Google ) and click the Make Default button.
      • When finished, click the Done button
    • Now back on the Settings page to the top left you should see an Extensions selection, click on it to bring up the installed extensions.
    • Look for any undesired extension ( like Trovigo or qone8 or Conduit or anything else you did not install ) and if found, click the Trash Can icon to delete the extension.
    • Now close the Extensions/Setting tab to get back to normal view
    • Exit Chrome and reopen.
    • Are you still having a problem with Trovigo or qone8 or Conduit?
     
  5. igrushka7

    igrushka7 Private E-2

    Hi chaslang.
    This thing is really stubborn.
    Everything is as it was. Nothing changed.
    Any more suggestions?
    Best regards.
    Boris.:confused
     
  6. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Edit or remove your shortcuts links to Chrome to remove any traces of this being hooked in via the shortcut.

    Is the problem only with Chrome? And exactly what problems remain.

    Follow my previous instructions again for Chrome and look for any of the below and remove them too:

    SearchNewTab, Trovigo, Trovigo Toolbar, Yontoo, BookmarkTube
     
  7. igrushka7

    igrushka7 Private E-2

    Hi chaslang.
    Well, the problem is fixed.
    So far everything is ok.
    As you suggested, I went back and had a look at CHROME-SETTINGS-STARTUP- and then I checked out OPEN A SPECIFIC PAGE OR SET OF PAGES see attachments. There they all were sitting all of them. I've just deleted them.
    That did the trick. I hope it is done, but it happen before.
    OK chaslang,
    Thank a big lot.
    Best,
    Boris.
     

    Attached Files:

  8. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome.


    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep Malwarebytes Anti-Malware for scanning/removal of malware.
    2. Renable your Disk Emulation software with Defogger if you had disabled it in step 4 of the READ & RUN ME.
    3. Go to add/remove programs and uninstall HijackThis. If you don't see it or it will not uninstall, don't worry about it. Just move on to the next step.
    4. If running Vista, Win 7 or Win 8, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    5. Now goto the C:\MGtools folder and find the MGclean.bat file. Double click ( if running Vista, Win7, or Win 8 Right Click and Run As Administrator ) on this file to run this cleanup program that will remove files and folders related to MGtools and some other items from our cleaning procedures.
    6. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    7. If you are running Win 8, Win 7, Vista, Windows XP or Windows ME, do the below to flush restore points:
      • Refer to the instructions for your WIndows version in this link: Disable And Enable System Restore
      • What we want you to do is to first disable System Restore to flush restore points some of which could be infected.
      • Then we want you to Enable System Restore to create a new clean Restore Point.
    8. After doing the above, you should work thru the below link:
     
  9. igrushka7

    igrushka7 Private E-2

    Hi chaslang.
    Thanks again.
    Done everything you suggested.
    So far so good.
    Best regards,
    Boris:-D
     
  10. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome. Surf safely!
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds