Unknown file: Continue Live Installation & trovi

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by dolphinocean, Dec 6, 2014.

  1. dolphinocean

    dolphinocean Private E-2

    Yesterday (Friday, 12-5-2014) as I was reading some news article online, a pop-up box with the usual red Flash Player rectangular logo and a message that says I need to urgently update my Flash Player. I clicked the "Update" button and subsequently got infected with many unwanted programs. My google chrome browser was hijacked and replaced with a search engine from trovi.com.

    I tried to delete the malware programs through the Uninstall tool section of the CCleaner program but they won't go away. Then I ran the Malwarebytes program that showed 616 detected objects listed mostly as PUP and various others. All were quaranteed and subsequently deleted/removed.

    After that most of the malwares were gone except there is this somewhat blank icon appearing on the desktop that says "Continue Live Installation" that, according to the property section, was created on the same day of infection. It won't allow me to delete it saying that I need permission from PC-PC/PC to make changes to this file.

    Also, I could not get connected to the internet because it was switched to another so-called proxy provider or something like it. I got help from google chrome instruction to have that removed and was able to get back into internet connection and back to my google chrome but another browser, the trovi.com search page, always also opens up.

    I came here for help and performed the malware cleaning/removing procedure as instructed in the Read Me First thread. Here attached are 5 logs. The Malwarebyte logs might not show any infection because I had a day earlier ran it and removed them before I realized I needed to seek help from this forum.

    Thanks you for your help.
     

    Attached Files:

  2. dr.moriarty

    dr.moriarty Malware Super Sleuth Staff Member

    Hello, dolphinocean

    Please re-run RogueKiller and run a scan. After it finishes the scan, select the Registry tab and then select any of the below that exist and then click the Delete button. Do the same under the Tasks tab
    Code:
    ¤¤¤ Registry : ¤¤¤
    [PUP] HKEY_CLASSES_ROOT\CLSID\{02A96331-0CA6-40E2-A87D-C224601985EB} -> Found
    [PUP] HKEY_CLASSES_ROOT\CLSID\{1AA60054-57D9-4F99-9A55-D0FBFBE7ECD3} -> Found
    [PUP] HKEY_CLASSES_ROOT\CLSID\{3278F5CF-48F3-4253-A6BB-004CE84AF492} -> Found
    [PUP] HKEY_CLASSES_ROOT\CLSID\{3B5702BA-7F4C-4D1A-B026-1E9A01D43978} -> Found
    [PUP] HKEY_CLASSES_ROOT\CLSID\{577975B8-C40E-43E6-B0DE-4C6B44088B52} -> Found
    [PUP] HKEY_CLASSES_ROOT\CLSID\{7E49F793-B3CD-4BF7-8419-B34B8BD30E61} -> Found
    [PUM.Proxy] HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings | ProxyServer : http=127.0.0.1:55101;https=127.0.0.1:55101  -> Found
    [PUM.Dns] HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters | DhcpNameServer : 10.0.1.1 [(Private Address) (XX)]  -> Found
    [PUM.Dns] HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters | DhcpNameServer : 10.0.1.1 [(Private Address) (XX)]  -> Found
    [PUM.Dns] HKEY_LOCAL_MACHINE\System\ControlSet002\Services\Tcpip\Parameters | DhcpNameServer : 10.0.1.1 [(Private Address) (XX)]  -> Found
    [PUM.Dns] HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{8E866EF2-1BE0-4C13-9C26-9CCF6E2675B9} | DhcpNameServer : 10.0.1.1 [(Private Address) (XX)]  -> Found
    [PUM.Dns] HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters\Interfaces\{8E866EF2-1BE0-4C13-9C26-9CCF6E2675B9} | DhcpNameServer : 10.0.1.1 [(Private Address) (XX)]  -> Found
    [PUM.Dns] HKEY_LOCAL_MACHINE\System\ControlSet002\Services\Tcpip\Parameters\Interfaces\{8E866EF2-1BE0-4C13-9C26-9CCF6E2675B9} | DhcpNameServer : 10.0.1.1 [(Private Address) (XX)]  -> Found
    
    ¤¤¤ Tasks : 4 ¤¤¤
    [Suspicious.Path] DE.job -- C:\Users\PC\AppData\Roaming\DE.exe (/infocmdline=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) -> Found
    [Suspicious.Path] XQWGX.job -- C:\Users\PC\AppData\Roaming\XQWGX.exe (/infocmdline=EcDaZPuEQi1s6IxOs2vkhN8l6VBIK15ZJc4rErvg9pLyD373kOmkDEbx5ANtIfxoWpKqXGXchr9uFisMsz7f2s68qinRB0PPyvg98l5V05kRxXe9VXRI6UOO6J2WZI051g5eUY/AHtP+5sXQjSAC5vZgaGiV65cLNvvnoI/9uLc5cVQ2KoweujlagQluF4U5tktvAnPJTulT/iK6TxkywhS6EIWspDqhEVjjfMpfKTSZcQB6hlqVR7oOOvE4bKRtLm//y7fC9J1JvwEXEdtlXS1+Z8mI9OMYCj0W19xgD/BsakQHwWWtXVJitet3Bsz1BLJuGkmLzhLb6KdK1eXM2mXXLAE6VVA6SlgZ5a0n3blnOrjPtE6qYjgaWy0M/OZe+FcmgiDuI46B6U/2KRz7/K4kzR7jfej/FQQg13n+Dun8fLRnOxFBUx6fj/sHhrPB/mKWZNYb8S9ZnoDcfDqj/mVjNh3lam1F+6uPMh/0Us1Tf/uSAGEkmz5DdT1Ejbcg) -> Found
    [Suspicious.Path] \\DE -- C:\Users\PC\AppData\Roaming\DE.exe (/infocmdline=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) -> Found
    [Suspicious.Path] \\XQWGX -- C:\Users\PC\AppData\Roaming\XQWGX.exe (/infocmdline=EcDaZPuEQi1s6IxOs2vkhN8l6VBIK15ZJc4rErvg9pLyD373kOmkDEbx5ANtIfxoWpKqXGXchr9uFisMsz7f2s68qinRB0PPyvg98l5V05kRxXe9VXRI6UOO6J2WZI051g5eUY/AHtP+5sXQjSAC5vZgaGiV65cLNvvnoI/9uLc5cVQ2KoweujlagQluF4U5tktvAnPJTulT/iK6TxkywhS6EIWspDqhEVjjfMpfKTSZcQB6hlqVR7oOOvE4bKRtLm//y7fC9J1JvwEXEdtlXS1+Z8mI9OMYCj0W19xgD/BsakQHwWWtXVJitet3Bsz1BLJuGkmLzhLb6KdK1eXM2mXXLAE6VVA6SlgZ5a0n3blnOrjPtE6qYjgaWy0M/OZe+FcmgiDuI46B6U/2KRz7/K4kzR7jfej/FQQg13n+Dun8fLRnOxFBUx6fj/sHhrPB/mKWZNYb8S9ZnoDcfDqj/mVjNh3lam1F+6uPMh/0Us1Tf/uSAGEkmz5DdT1Ejbcg) -> Found
    
    Then immediately reboot your PC.

    After reboot, run a new scan with RogueKiller and save a log as in the original instructions and attach the new log.

    Now please download Junkware Removal Tool to your desktop.
    • Make sure to shut down your protection software now to avoid potential conflicts.
    • Run the tool by double-clicking it. If you are using Windows Vista or Seven, right-mouse click it and select Run as Administrator.
    • The tool will open and start scanning your system.
    • Note: That JRT may reset your home page to a google default so you will need to restore your home page setting if this happens.
    • Please be patient as this can take a while to complete depending on your system's specifications.
    • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
    • Attach JRT.txt to your next message.

    Next download AdwCleaner by Xplode and save to your Desktop.
    • Double click on AdwCleaner.exe to run the tool.
      Vista/Windows 7/8 users right-click and select Run As Administrator
    • Click on the Scan button.
    • AdwCleaner will begin...be patient as the scan may take some time to complete.
    • When it's done you'll see: Pending: Please uncheck elements you don't want removed.
    • Now click on the Report button...a logfile (AdwCleaner[R#].txt) will open in Notepad for review (where the largest value of # represents the most recent report).
    • Look over the log especially under Files/Folders for any program you want to save.
    • If there's a program you may want to save, just uncheck it from AdwCleaner.
    • If you're not sure, post the log for review. (all items found are either adware/spyware/foistware)
    • If you're ready to clean it all up.....click the Clean button.
    • After rebooting, a logfile report (AdwCleaner[S0].txt) will open automatically.
    • Attach that logfile to your next reply.
    • A copy of all logfiles are saved in the C:\AdwCleaner folder which are created when running the tool.

    Now Copy the bold text below to notepad. (Do not include any space above the word "REGEDIT4")Save it as fixME.reg to your desktop. Be sure the "Save as" type is set to "all files" . Once you have saved it double click it and allow it to merge with the registry.
    Make sure that you tell me whether or not you receive a success message about adding the above to the registry. If you do not get a success message, it definitely did not work.

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista, Win7 or Win8, don't double click, use right click and select "Run As Administrator").

    Then attach the below logs:
    • updated RKreport_SCN
    • the JRT.TXT log
    • C:\MGlogs.zip
    • AdwCleaner[S#].txt
    Make sure you tell me how things are working now!
     
    Last edited: Dec 7, 2014
  3. dolphinocean

    dolphinocean Private E-2

    Thank you dr. moriarty for helping me.

    I re-ran RogueKiller and deleted the selected items in the Registry and Tasks tabs according to the items listed in your code box. After the delete the Registry showed "Replaced" on the left column of each selected item whereas the Tasks tab showed "Removed". Other than that it seems ok. After procedure I rebooted. The log is attached below.

    I downloaded JRT and scanned as instructed. The log is attached below.

    I also downloaded the AdwCleaner and ran a scan. I unchecked nothing and cleaned all the items in the pending box. I followed your instruction for the fixME.reg and it was successful.

    I ran the C:\MGtools\GetLogs.bat file and the log is attached below.

    Now, the trovi.com search engine page is no longer appearing when I start my google chrome browser. But, the icon "Continue Live Installation" still is present on my desktop. I didn't try to delete until instructed so by you. Other than that things seems to be running ok now.

    Awaiting for further instruction. Thanks.
     

    Attached Files:

  4. dolphinocean

    dolphinocean Private E-2

    Well. the trovi search engine came back again when I closed the browser and re-open it again. It always comes together side by side with my google chrome page.
     
  5. dr.moriarty

    dr.moriarty Malware Super Sleuth Staff Member

    You're welcome.

    What info can you get about it from right-clicking the icon and looking at Properties > Shortcut? Or is this from something stalled?

    Please attach the updated RKreport_SCN.
     
  6. dolphinocean

    dolphinocean Private E-2

    In the Properties, type of file: Shortcut (link). It was created Fri. December 05, 2014 2:29:19 PM. The same time my computer got infected.
     

    Attached Files:

  7. dr.moriarty

    dr.moriarty Malware Super Sleuth Staff Member

    What is shown in the "Target" pane under the Shortcut tab?
     
  8. dolphinocean

    dolphinocean Private E-2

    There is no "Target" pane or Shortcut tab I could find anywhere in the Properties.
     
  9. dr.moriarty

    dr.moriarty Malware Super Sleuth Staff Member

    Ok - delete the icon then.

    Ready for the final cleanup steps?
     
  10. dolphinocean

    dolphinocean Private E-2

    As before, it won't let me. It says I need permission to perform this action. Previously before I sought help here I did click on the Security tab and the advanced button to change the permissions for SYSTEM from Allow to Deny for Full Control, Modify, Read & Execute, Read, Write and Special permission. But, that was after several attempts to delete it failed.

    I'm ready for the final step or whatever helps.
     
  11. dr.moriarty

    dr.moriarty Malware Super Sleuth Staff Member

    Have you tried changing the permissions back to "Allow", re-booting, then using Windows Explorer to navigate to your desktop folder for the deletion?
     
  12. dolphinocean

    dolphinocean Private E-2

    I'll try that now...:)
     
  13. dolphinocean

    dolphinocean Private E-2

    Yes, that suggestion works!!! Finally the icon on my desktop is gone.

    But, when I open my google chrome browser, two pages again open up side by side, one being the google page and the other the trovi.com search page.

    Then I remembered before I sought help here, I had read from an article about removing the added browser extension from the google browser Customize/Control -->More Tools -->Extensions to delete the unwanted browser extensions that were added by this malware. To remove, all I need to do is click on the trashcan icon on the far right of the highlighted extension.

    Then I again click on the Customize/Control, then --->Settings, then scroll down to Search. Under search I clicked on Manage search engines and looked for Trovi.com search engine and right click on it and select delete or click on the "X" on the extreme right. When that was done, the trovi search page just disappeared.

    I hope it won't come back again. I'll give it a few more days just to be sure. Meantime, thanks for your help!
     
  14. dr.moriarty

    dr.moriarty Malware Super Sleuth Staff Member

    You're welcome!

    I'm glad things are looking good, now.

    There are final cleanup steps that I need to give you when you're ready.
     
  15. dolphinocean

    dolphinocean Private E-2

    If there are still final cleanup steps need to be done, yes I am ready for them.
     
  16. dr.moriarty

    dr.moriarty Malware Super Sleuth Staff Member

    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase it, it provide no protection. It do not use any significant amount of resources ( except a little disk space ) until you run a scan.
    2. Go back to step 6 of the READ ME and re-enable your Disk Emulation software with Defogger if you had disabled it.
    3. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    4. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    5. If running Vista, Win 7/8 - it is time to make sure you have re-enabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    6. Go to add/remove programs and uninstall HijackThis.
    7. Go to the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders related to MGtools and some other items from our cleaning procedures.
    8. If you are running Win 7/8, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 7 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    9. After doing the above, you should work through the below link:
    Safe surfing! [​IMG]
     
  17. dolphinocean

    dolphinocean Private E-2

    <snip> Forum clutter removed

    How do I uninstall the tools and registry patches fixWLK.reg? They are not in the Control Panel.
     
    Last edited by a moderator: Dec 10, 2014
  18. dr.moriarty

    dr.moriarty Malware Super Sleuth Staff Member

    Just right-click and delete the executables for the programs that don't show in Programs and Features, and the fixME.reg.
     
  19. dolphinocean

    dolphinocean Private E-2

    Well. the malware still hidden somewhere. Just a while ago when I ran the malwarebyte scan there was one PUP item defected and quarantined.

    The malwarebyte scan log is attached.
     

    Attached Files:

  20. dr.moriarty

    dr.moriarty Malware Super Sleuth Staff Member

    Your logs were clean 3 days ago, and there is no mention or trace of "DonutLeads" or "donutleadsServiceCore" in any of them.

    If you have become re-infected, you need to run the READ & RUN ME FIRST Malware Removal Guide again and start a new thread.
     
  21. dolphinocean

    dolphinocean Private E-2

    OK, I'll do that.
     
  22. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    I would simply start by letting Malwarebytes fix that one item. And if nothing else shows up on another rescan and you are not having problems, I would not worry about starting over.
     
  23. dolphinocean

    dolphinocean Private E-2

    Thanks chaslang. I've started another thread awhile back and Krestrel13! is helping me with it now. I think most of the traces are pretty much gone now with OTM.
     
    Last edited: Dec 10, 2014

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds