Search the Community

Showing results for tags 'pup.optional.fakeffprofile'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Announcements
    • Malwarebytes News
    • Beta Testing Program
  • Malware Removal Help
    • Malware Removal for Windows
    • Malware Removal for Mac
    • Malware Removal for Mobile
    • Malware Removal Self-Help Guides
  • Malwarebytes for Home Support
    • Malwarebytes 3
    • Malwarebytes Anti-Malware for Mac
    • Malwarebytes Anti-Malware Mobile
    • False Positives
    • Translator Lounge
    • Comments and Suggestions
  • Malwarebytes for Business Support
    • Malwarebytes Endpoint Protection
    • Malwarebytes Incident Response (includes Breach Remediation)
    • Malwarebytes Endpoint Security
    • Malwarebytes Business Products Comments and Suggestions
  • Malwarebytes Tools and Other Products
    • Malwarebytes AdwCleaner
    • Malwarebytes Junkware Removal Tool Support
    • Malwarebytes Anti-Rootkit BETA Support
    • Malwarebytes Techbench USB (Legacy)
    • Malwarebytes Secure Backup discontinued
    • Other Tools
    • Malwarebytes Tools Comments and Suggestions
  • General Computer Help and Security Updates
    • BSOD, Crashes, Kernel Debugging
    • General Windows PC Help
  • Research Center
    • Newest Rogue-Ransomware Threats
    • Newest Malware Threats
    • Newest Mobile Threats
    • Newest IP or URL Threats
    • Newest Mac Threats
  • General
    • General Chat
    • Forums Announcements & Feedback

Found 2 results

  1. What is Youndoo? The Malwarebytes research team has determined that Youndoo is a browser hijacker. These so-called "hijackers" manipulate your browser(s), for example to change your startpage or searchscopes, so that the affected browser visits their site or one of their choice. This one also displays advertisements. This version of the Youndoo search hijacker adds an extra Firefox profile and uses a Scheduled Task to re-infect or update the infection. How do I know if my computer is affected by Youndoo? You may see this entry in your list of installed software: this new startpage in the affected browsers: ] these Scheduled Tasks: and you may see this type of advertisements: How did Youndoo get on my computer? Browser hijackers use different methods for distributing themselves. This particular one was bundled with other software. How do I remove Youndoo? Our program Malwarebytes can detect and remove this potentially unwanted program. Please download Malwarebytes to your desktop. Double-click mb3-setup-consumer-{version}.exe and follow the prompts to install the program. Then click Finish. Once the program has fully updated, select Scan Now on the Dashboard. Or select the Threat Scan from the Scan menu. If another update of the definitions is available, it will be implemented before the rest of the scanning procedure. When the scan is complete, make sure that all Threats are selected, and click Remove Selected. Restart your computer when prompted to do so. Is there anything else I need to do to get rid of Youndoo? This adware creates some scheduled tasks. You can read here how to check for and, if necessary, remove Scheduled Tasks. Follow the instructions posted here to remove the fake Firefox profile. How would the full version of Malwarebytes help protect me? We hope our application and this guide have helped you eradicate this hijacker. As you can see below the full version of Malwarebytes would have protected you against the Youndoo hijacker. It would have warned you before the application could install itself, giving you a chance to stop it before it became too late. and we block access to some of their domains: Technical details for experts Possible signs in FRST logs: HKLM\...\Policies\Explorer: [EnableShellExecuteHooks] 1 ShellExecuteHooks: - {5AD340E8-F445-11E6-B566-64006A5CFC23} - C:\Program Files (x86)\Thuluch\Reuqutain.dll [146432 2017-02-20] () FF NewTab: hxxp://www.youndoo.com/?z={z1}&from=wak&uid={uid1}&type=hp FF DefaultSearchEngine: youndoo FF SelectedSearchEngine: youndoo FF Homepage: hxxp://www.youndoo.com/?z={z1}&from=wak&uid={uid1}&type=hp FF SearchPlugin: C:\Users\{username}\AppData\Roaming\Mozilla\Firefox\Profiles\mhc384j1.default\searchplugins\jebnkuvk.xml [2017-02-20] CHR HomePage: ChromeDefaultData2 -> hxxp://www.youndoo.com/?z={z1}&from=wak&uid={uid1}&type=hp CHR StartupUrls: ChromeDefaultData2 -> "hxxp://www.youndoo.com/?z={z1}&from=wak&uid={uid1}&type=hp" CHR DefaultSearchURL: ChromeDefaultData2 -> hxxp://www.youndoo.com/search/?q={searchTerms}&z={z1}&from=wak&uid={uid1}&type=sp CHR DefaultSearchKeyword: ChromeDefaultData2 -> youndoo C:\Users\{username}\AppData\Local\Gunelejahidom C:\Program Files (x86)\Thuluch C:\WINDOWS\System32\Tasks\Nimasy Engine C:\WINDOWS\System32\Tasks\Gfakdutoing C:\Program Files (x86)\Nimasy Engine youndoo - Uninstall (HKLM-x32\...\{92C91B86-B20E-474B-A1D9-6B7D5AC229C4}) (Version: - ) Task: {17E1E42D-FDE0-4335-977B-6DFA92F053ED} - System32\Tasks\Gfakdutoing => /i hxxp://d2buh1bf1g584w.cloudfront.net/msi/rel.php?u={uid1}&v=2017220 /q Task: {40A77D42-8C8A-4FA2-8C4E-51FBC532FD30} - System32\Tasks\Nimasy Engine => C:\Program Files (x86)\Thuluch\plejither.exe [2017-02-20] (Glarysoft Ltd) Alterations made by the installer: File system details [View: All details] (Selection) --------------------------------------------------- Adds the folder C:\Program Files (x86)\Nimasy Engine Adds the folder C:\Program Files (x86)\Thuluch Adds the file ClearData.exe"="2/20/2017 1:42 PM, 169664 bytes, A Adds the file CrashReport.dll"="2/20/2017 1:42 PM, 121344 bytes, A Adds the file mglobal.dll"="2/20/2017 1:42 PM, 112128 bytes, A Adds the file plejither.exe"="2/20/2017 1:42 PM, 1027000 bytes, A Adds the file Reuqutain.dll"="2/20/2017 1:42 PM, 146432 bytes, A In the existing folder C:\Windows\System32\Tasks Adds the file Gfakdutoing"="2/20/2017 1:42 PM, 5128 bytes, A Adds the file Nimasy Engine"="2/20/2017 1:42 PM, 6030 bytes, A Registry details [View: All details] (Selection) ------------------------------------------------ [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{5AD340E8-F445-11E6-B566-64006A5CFC23}\InProcServer32] "(Default)"="REG_SZ", "C:\Program Files (x86)\Thuluch\Reuqutain.dll" "ThreadingModel"="REG_SZ", "Apartment" [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft] "help"="REG_SZ", "http://www.youndoo.com/?z={z1}&from=wak&uid={uid1}&type=hp" [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks] "{5AD340E8-F445-11E6-B566-64006A5CFC23}"="REG_SZ", "" [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer] "EnableShellExecuteHooks"="REG_DWORD", 1 [HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\{84416237-6490-494D-9AD6-4994DD978971}] "chd"="REG_SZ", "C:\Users\{username}\AppData\Local\Gunelejahidom" "ffd"="REG_SZ", "C:\Users\{username}\AppData\Roaming\Profiles\Gherluwardcoozeied.default" [HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Cherlaghphaige] [HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Gouwardguzele] [HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{92C91B86-B20E-474B-A1D9-6B7D5AC229C4}] "DisplayName"="REG_SZ", "youndoo - Uninstall" "UninstallString"="REG_SZ", "C:\Program Files (x86)\Thuluch\plejither.exe 29be9ce7-f8b2-42b3-b0a4-32c68378402a "/k={92C91B86-B20E-474B-A1D9-6B7D5AC229C4}"" [HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\msServer] "(Default)"="REG_DWORD", 1 [HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\plejither.exe] "(Default)"="REG_SZ", "2017220" [HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\TaskInj] "(Default)"="REG_DWORD", 1 [HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\xvb`lj] "day"="REG_SZ", "20170220" "upday"="REG_SZ", "20170220" [HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\youndooSoftware\youndoohp] "oem"="REG_SZ", "wak" "Time"="REG_DWORD", 1487594583 [HKEY_LOCAL_MACHINE\SOFTWARE\xvb`lj] "day"="REG_SZ", "20170220" "upday"="REG_SZ", "20170220" [HKEY_USERS\.DEFAULT\Software\xvb`lj] "day"="REG_SZ", "20170220" "upday"="REG_SZ", "20170220" Malwarebytes log: {computername} www.{computername}.com -Log Details- Scan Date: 2/20/17 Scan Time: 2:10 PM Logfile: mbamYoundoo.txt Administrator: Yes -Software Information- Version: 3.0.6.1469 Components Version: 1.0.50 Update Package Version: 1.0.1307 License: Premium -System Information- OS: Windows 10 CPU: x64 File System: NTFS User: {computername}\{username} -Scan Summary- Scan Type: Threat Scan Result: Completed Objects Scanned: 420585 Time Elapsed: 8 min, 58 sec -Scan Options- Memory: Enabled Startup: Enabled Filesystem: Enabled Archives: Enabled Rootkits: Disabled Heuristics: Enabled PUP: Enabled PUM: Enabled -Scan Details- Process: 0 (No malicious items detected) Module: 0 (No malicious items detected) Registry Key: 4 Adware.Elex.Generic, HKLM\SOFTWARE\CLASSES\CLSID\{5AD340E8-F445-11E6-B566-64006A5CFC23}, Delete-on-Reboot, [2155], [356410],1.0.1307 Adware.Elex.Generic, HKLM\SOFTWARE\CLASSES\CLSID\{5AD340E8-F445-11E6-B566-64006A5CFC23}\InprocServer32, Delete-on-Reboot, [2155], [356410],1.0.1307 PUP.Optional.Youndoo, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{92C91B86-B20E-474B-A1D9-6B7D5AC229C4}, Delete-on-Reboot, [767], [182916],1.0.1307 PUP.Optional.Youndoo, HKLM\SOFTWARE\WOW6432NODE\youndooSoftware, Delete-on-Reboot, [767], [182849],1.0.1307 Registry Value: 4 Adware.Elex.Generic, HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\SHELLEXECUTEHOOKS|{5AD340E8-F445-11E6-B566-64006A5CFC23}, Delete-on-Reboot, [2155], [356410],1.0.1307 Adware.Elex.SHHKRST, HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER|ENABLESHELLEXECUTEHOOKS, Delete-on-Reboot, [357], [-1],0.0.0 Adware.Elex.SHHKRST, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER|ENABLESHELLEXECUTEHOOKS, Delete-on-Reboot, [357], [-1],0.0.0 PUP.Optional.Youndoo, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{92C91B86-B20E-474B-A1D9-6B7D5AC229C4}|DISPLAYNAME, Delete-on-Reboot, [767], [182916],1.0.1307 Registry Data: 0 (No malicious items detected) Data Stream: 0 (No malicious items detected) Folder: 3 PUP.Optional.FakeFFProfile, C:\Users\{username}\AppData\Roaming\Mozilla\Firefox\naweriweentcofise\Profiles\mhc384j1.default, Delete-on-Reboot, [2786], [363173],1.0.1307 PUP.Optional.FakeFFProfile, C:\Users\{username}\AppData\Roaming\Mozilla\Firefox\naweriweentcofise\Profiles, Delete-on-Reboot, [2786], [363173],1.0.1307 PUP.Optional.FakeFFProfile, C:\USERS\{username}\APPDATA\ROAMING\Mozilla\Firefox\naweriweentcofise, Delete-on-Reboot, [2786], [363173],1.0.1307 File: 22 PUP.Optional.FakeFFProfile, C:\Users\{username}\AppData\Roaming\Mozilla\Firefox\naweriweentcofise\Profiles\mhc384j1.default\prefs.js, Delete-on-Reboot, [2786], [363173],1.0.1307 PUP.Optional.FakeFFProfile, C:\Users\{username}\AppData\Roaming\Mozilla\Firefox\naweriweentcofise\Profiles\mhc384j1.default\profiles.ini, Delete-on-Reboot, [2786], [363173],1.0.1307 PUP.Optional.FakeFFProfile, C:\Users\{username}\AppData\Roaming\Mozilla\Firefox\naweriweentcofise\Profiles\mhc384j1.default\search-metadata.json, Delete-on-Reboot, [2786], [363173],1.0.1307 PUP.Optional.FakeFFProfile, C:\Users\{username}\AppData\Roaming\Mozilla\Firefox\naweriweentcofise\Profiles\mhc384j1.default\search.json.mozlz4, Delete-on-Reboot, [2786], [363173],1.0.1307 Adware.Elex.Generic, C:\PROGRAM FILES (X86)\THULUCH\REUQUTAIN.DLL, Delete-on-Reboot, [2155], [356410],1.0.1307 PUP.Optional.Youndoo, C:\USERS\{username}\APPDATA\ROAMING\PROFILES\GHERLUWARDCOOZEIED.DEFAULT\PREFS.JS, Replaced, [767], [324487],1.0.1307 PUP.Optional.Youndoo, C:\USERS\{username}\APPDATA\ROAMING\PROFILES\GHERLUWARDCOOZEIED.DEFAULT\PREFS.JS, Replaced, [767], [324487],1.0.1307 PUP.Optional.Youndoo, C:\USERS\{username}\APPDATA\ROAMING\PROFILES\GHERLUWARDCOOZEIED.DEFAULT\PREFS.JS, Replaced, [767], [324487],1.0.1307 PUP.Optional.Youndoo, C:\USERS\{username}\APPDATA\ROAMING\PROFILES\GHERLUWARDCOOZEIED.DEFAULT\PREFS.JS, Replaced, [767], [324487],1.0.1307 PUP.Optional.Youndoo, C:\USERS\{username}\APPDATA\ROAMING\PROFILES\GHERLUWARDCOOZEIED.DEFAULT\PREFS.JS, Replaced, [767], [324487],1.0.1307 PUP.Optional.Youndoo, C:\USERS\{username}\APPDATA\ROAMING\PROFILES\GHERLUWARDCOOZEIED.DEFAULT\PREFS.JS, Replaced, [767], [324487],1.0.1307 PUP.Optional.Youndoo, C:\USERS\{username}\APPDATA\ROAMING\PROFILES\GHERLUWARDCOOZEIED.DEFAULT\PREFS.JS, Replaced, [767], [324487],1.0.1307 PUP.Optional.Youndoo, C:\USERS\{username}\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\MHC384J1.DEFAULT\PREFS.JS, Replaced, [767], [302817],1.0.1307 PUP.Optional.Youndoo, C:\USERS\{username}\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\MHC384J1.DEFAULT\PREFS.JS, Replaced, [767], [302817],1.0.1307 PUP.Optional.Youndoo, C:\USERS\{username}\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\MHC384J1.DEFAULT\PREFS.JS, Replaced, [767], [302817],1.0.1307 PUP.Optional.Youndoo, C:\USERS\{username}\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\MHC384J1.DEFAULT\PREFS.JS, Replaced, [767], [302817],1.0.1307 PUP.Optional.Youndoo, C:\USERS\{username}\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\MHC384J1.DEFAULT\PREFS.JS, Replaced, [767], [302817],1.0.1307 Adware.Elex, C:\USERS\{username}\DESKTOP\WAK_MY.EXE, Delete-on-Reboot, [305], [363419],1.0.1307 PUP.Optional.Youndoo, C:\USERS\{username}\APPDATA\ROAMING\PROFILES\GHERLUWARDCOOZEIED.DEFAULT\SEARCHPLUGINS\JEBNKUVK.XML, Delete-on-Reboot, [767], [324489],1.0.1307 Adware.Elex.SHHKRST, C:\PROGRAM FILES (X86)\THULUCH\CRASHREPORT.DLL, Delete-on-Reboot, [357], [372356],1.0.1307 Adware.Elex.SHHKRST, C:\WINDOWS\SYSTEM32\TASKS\Gfakdutoing, Delete-on-Reboot, [357], [-1],0.0.0 PUP.Optional.Youndoo, C:\USERS\{username}\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\MHC384J1.DEFAULT\SEARCHPLUGINS\JEBNKUVK.XML, Delete-on-Reboot, [767], [302734],1.0.1307 Physical Sector: 0 (No malicious items detected) (end) As mentioned before the full version of Malwarebytes could have protected your computer against this threat. We use different ways of protecting your computer(s): Dynamically Blocks Malware Sites & Servers Malware Execution Prevention Save yourself the hassle and get protected.
  2. What is Trotux? The Malwarebytes research team has determined that Trotux is adware. These adware applications display advertisements not originating from the sites you are browsing. How do I know if my computer is affected by Trotux? You may see this entry in your list of installed programs: this type of Scheduled Tasks (random names): these changed search settings in the affected browsers: and this startpage: You may also notice a fake Firefox profiles as described here: GsearchFinder hijackers add extra Firefox profile How did Trotux get on my computer? Adware applications use different methods for distributing themselves. This particular one was bundled with other software. How do I remove Trotux? Our program Malwarebytes can detect and remove this potentially unwanted program. Please download Malwarebytes to your desktop. Double-click mb3-setup-consumer-{version}.exe and follow the prompts to install the program. Then click Finish. Once the program has fully updated, select Scan Now on the Dashboard. Or select the Threat Scan from the Scan menu. If another update of the definitions is available, it will be implemented before the rest of the scanning procedure. When the scan is complete, make sure that all Threats are selected, and click Remove Selected. Restart your computer when prompted to do so. Is there anything else I need to do to get rid of Trotux? No, Malwarebytes removes Trotux completely. This PUP creates some scheduled tasks. You can read here how to check for and, if necessary, remove Scheduled Tasks. If your browsers have been hijacked, you should read our Restore Browser page. You can read there how to fix additional browser redirect methods. How would the full version of Malwarebytes help protect me? We hope our application and this guide have helped you eradicate this adware. As you can see below the full version of Malwarebytes would have protected you against the Trotux adware. It would have warned you before the adware could install itself, giving you a chance to stop it before it became too late. The web protection module also blocks the origin of the installer: Technical details for experts Possible signs in FRST logs: HKLM\...\Policies\Explorer: [EnableShellExecuteHooks] 1 ShellExecuteHooks: - {58AF6728-ECD0-11E6-BFEA-64006A5CFC23} - C:\Users\{username}\AppData\Roaming\Climofabech\Gipphsaweght.dll [146944 2017-02-10] () FF NewTab: hxxp://www.trotux.com/?z=1f52ad85c729d12e6f3c817gezfb7q5m9obo8bfc4c&from=wsy1&uid=ST500LT012-1DG142_S3PA6P09XXXXS3PA6P09&type=hp FF DefaultSearchEngine: trotux FF SelectedSearchEngine: trotux FF Homepage: hxxp://www.trotux.com/?z=1f52ad85c729d12e6f3c817gezfb7q5m9obo8bfc4c&from=wsy1&uid=ST500LT012-1DG142_S3PA6P09XXXXS3PA6P09&type=hp FF SearchPlugin: C:\Users\{username}\AppData\Roaming\Mozilla\Firefox\Profiles\mhc384j1.default\searchplugins\4qy3hwj4.xml [2017-02-10] CHR HomePage: ChromeDefaultData -> hxxp://www.trotux.com/?z=1f52ad85c729d12e6f3c817gezfb7q5m9obo8bfc4c&from=wsy1&uid=ST500LT012-1DG142_S3PA6P09XXXXS3PA6P09&type=hp CHR StartupUrls: ChromeDefaultData -> "hxxp://www.trotux.com/?z=1f52ad85c729d12e6f3c817gezfb7q5m9obo8bfc4c&from=wsy1&uid=ST500LT012-1DG142_S3PA6P09XXXXS3PA6P09&type=hp" CHR DefaultSearchURL: ChromeDefaultData -> hxxp://www.trotux.com/search/?q={searchTerms}&z=1f52ad85c729d12e6f3c817gezfb7q5m9obo8bfc4c&from=wsy1&uid=ST500LT012-1DG142_S3PA6P09XXXXS3PA6P09&type=sp CHR DefaultSearchKeyword: ChromeDefaultData -> trotux R2 Stuhoph; C:\Program Files (x86)\Grerhient\cgghtdeberkmnt.dll [149504 2017-02-10] () [File not signed] C:\WINDOWS\System32\Tasks\Drecaward Client C:\WINDOWS\System32\Tasks\Niiseclajuent C:\Users\{username}\AppData\Roaming\Climofabech C:\Users\{username}\AppData\Local\Ckekiry C:\Program Files (x86)\Drecaward Client C:\Program Files (x86)\Grerhient trotux - Uninstall (HKLM-x32\...\{8230A356-F879-4B82-AF04-032A578692C0}) (Version: - ) Task: {1B965CA1-35D0-4C1D-B92A-FE8677ECA306} - System32\Tasks\Drecaward Client => C:\Program Files (x86)\Grerhient\dozuent.exe [2017-02-10] (Glarysoft Ltd) Task: {D766AA6E-86D0-4DF0-BCC5-BCACB56D5FE6} - System32\Tasks\Niiseclajuent => /i hxxp://d2buh1bf1g584w.cloudfront.net/msi/rel.php?u=ST500LT012-1DG142_S3PA6P09XXXXS3PA6P09&v=2017210 /q () C:\Users\{username}\AppData\Roaming\Climofabech\Gipphsaweght.dll () C:\Program Files (x86)\Drecaward Client\local64spl.dll () c:\program files (x86)\grerhient\cgghtdeberkmnt.dll Alterations made by the installer: File system details [View: All details] (Selection) --------------------------------------------------- Adds the folder C:\Program Files (x86)\Drecaward Client Adds the file local64spl.dll"="2/10/2017 11:34 AM, 309760 bytes, A Adds the file local64spl.dll.ini"="2/10/2017 11:34 AM, 20 bytes, A Adds the folder C:\Program Files (x86)\Grerhient Adds the file cgghtdeberkmnt.dll"="2/10/2017 11:34 AM, 149504 bytes, A Adds the file CrashReport.dll"="2/10/2017 11:34 AM, 121344 bytes, A Adds the file dozuent.exe"="2/10/2017 11:34 AM, 1026216 bytes, A In the existing folder C:\Windows\System32\Tasks Adds the file Drecaward Client"="2/10/2017 11:34 AM, 6082 bytes, A Adds the file Niiseclajuent"="2/10/2017 11:34 AM, 3780 bytes, A Registry details [View: All details] (Selection) ------------------------------------------------ [HKEY_LOCAL_MACHINE\SOFTWARE\0B3C7EB2C2FC8FF89E16DF9C80C0327A] "(Default)"="REG_SZ"", "{EFD519A3-DC49-498A-8DD4-AD1DA8F97FCD}" "{EFD519A3-DC49-498A-8DD4-AD1DA8F97FCD}"="REG_BINARY, ............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................ [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{58AF6728-ECD0-11E6-BFEA-64006A5CFC23}\InProcServer32] "(Default)"="REG_SZ"", "C:\Users\{username}\AppData\Roaming\Climofabech\Gipphsaweght.dll" "ThreadingModel"="REG_SZ"", "Apartment" [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft] "help"="REG_SZ"", "http://www.trotux.com/?z=1f52ad85c729d12e6f3c817gezfb7q5m9obo8bfc4c&from=wsy1&uid=ST500LT012-1DG142_S3PA6P09XXXXS3PA6P09&type=hp" [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks] "{58AF6728-ECD0-11E6-BFEA-64006A5CFC23}"="REG_SZ"", "" [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer] "EnableShellExecuteHooks"="REG_DWORD"", 1 [HKEY_LOCAL_MACHINE\SOFTWARE\Mvasephermuy] [HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\{84416237-6490-494D-9AD6-4994DD978971}] "chd"="REG_SZ"", "C:\Users\{username}\AppData\Local\Ckekiry" "ffd"="REG_SZ"", "C:\Users\{username}\AppData\Roaming\Profiles\Grerkaghgerdiing.default" [HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\0B3C7EB2C2FC8FF89E16DF9C80C0327A] "(Default)"="REG_SZ"", "{EFD519A3-DC49-498A-8DD4-AD1DA8F97FCD}" "{EFD519A3-DC49-498A-8DD4-AD1DA8F97FCD}"="REG_BINARY, ............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................ [HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Ckafoyanerqeent] [HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\dozuent.exe] "(Default)"="REG_SZ"", "2017210" [HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{8230A356-F879-4B82-AF04-032A578692C0}] "DisplayName"="REG_SZ"", "trotux - Uninstall" "UninstallString"="REG_SZ"", "C:\Program Files (x86)\Grerhient\dozuent.exe ef869dec-feed-46e1-a4fe-427f47f37b77 "/k={8230A356-F879-4B82-AF04-032A578692C0}"" [HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Svchost] "Stuhoph"="REG_MULTI_SZ, "Stuhoph" [HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Suvosh] [HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\trotuxSoftware\trotuxhp] "oem"="REG_SZ"", "wsy1" "Time"="REG_DWORD"", 1486722892 [HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\xvtrzx] "day"="REG_SZ"", "20170210" "upday"="REG_SZ"", "20170210" [HKEY_LOCAL_MACHINE\SOFTWARE\xvtrzx] "day"="REG_SZ"", "20170210" "upday"="REG_SZ"", "20170210" [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Print\Providers] "order" = REG_MULTI_SZ, "LanMan Print Services Internet Print Provider 4qy3hwj4 " [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Print\Providers\4qy3hwj4] "DisplayName"="REG_SZ"", "zvgbuz" "Name"="REG_SZ"", "C:\Program Files (x86)\Drecaward Client\local64spl.dll" [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Stuhoph] "Description"="REG_SZ"", "Provides global functions for other parts of Chislereuction." "DisplayName"="REG_SZ"", "Stuhoph" "ErrorControl"="REG_DWORD"", 1 "FailureActions"="REG_BINARY, ...................... "ImagePath"="REG_EXPAND_SZ, "%SystemRoot%\system32\svchost.exe -k Stuhoph" "ObjectName"="REG_SZ"", "LocalSystem" "Start"="REG_DWORD"", 2 "Type"="REG_DWORD"", 272 "WOW64"="REG_DWORD"", 1 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Stuhoph\Parameters] "ServiceDll"="REG_EXPAND_SZ, "C:\Program Files (x86)\Grerhient\cgghtdeberkmnt.dll" "ServiceMain"="REG_SZ"", "Clanochphoderk" [HKEY_USERS\.DEFAULT\Software\xvtrzx] "day"="REG_SZ"", "20170210" "upday"="REG_SZ"", "20170210" Malwarebytes log: Malwarebytes www.malwarebytes.com -Log Details- Scan Date: 2/10/17 Scan Time: 12:14 PM Logfile: mbamTrotux.txt Administrator: Yes -Software Information- Version: 3.0.6.1469 Components Version: 1.0.50 Update Package Version: 1.0.1225 License: Premium -System Information- OS: Windows 10 CPU: x64 File System: NTFS User: {computername}\{username} -Scan Summary- Scan Type: Threat Scan Result: Completed Objects Scanned: 384454 Time Elapsed: 9 min, 6 sec -Scan Options- Memory: Enabled Startup: Enabled Filesystem: Enabled Archives: Enabled Rootkits: Disabled Heuristics: Enabled PUP: Enabled PUM: Enabled -Scan Details- Process: 0 (No malicious items detected) Module: 4 Adware.Elex.SHHKRST, C:\USERS\{username}\APPDATA\ROAMING\CLIMOFABECH\GIPPHSAWEGHT.DLL, Quarantined, [1238], [362727],1.0.1225 Adware.Elex.SHHKRST, C:\USERS\{username}\APPDATA\ROAMING\CLIMOFABECH\GIPPHSAWEGHT.DLL, Quarantined, [1238], [362727],1.0.1225 Adware.Elex.Generic, C:\PROGRAM FILES (X86)\GRERHIENT\CGGHTDEBERKMNT.DLL, Quarantined, [2145], [366971],1.0.1225 Adware.Elex.Generic, C:\Program Files (x86)\Drecaward Client\local64spl.dll, Quarantined, [2145], [358303],1.0.1225 Registry Key: 5 Adware.Elex.SHHKRST, HKLM\SOFTWARE\CLASSES\CLSID\{58AF6728-ECD0-11E6-BFEA-64006A5CFC23}, Delete-on-Reboot, [1238], [362727],1.0.1225 Adware.Elex.SHHKRST, HKLM\SOFTWARE\CLASSES\CLSID\{58AF6728-ECD0-11E6-BFEA-64006A5CFC23}\InprocServer32, Delete-on-Reboot, [1238], [362727],1.0.1225 PUP.Optional.Trotux, HKLM\SOFTWARE\WOW6432NODE\trotuxSoftware, Delete-on-Reboot, [418], [182848],1.0.1225 Adware.Sasquor.SPL, HKLM\SYSTEM\CURRENTCONTROLSET\CONTROL\PRINT\PROVIDERS\4qy3hwj4, Delete-on-Reboot, [2086], [339986],1.0.1225 PUP.Optional.Trotux, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{8230A356-F879-4B82-AF04-032A578692C0}, Delete-on-Reboot, [418], [182846],1.0.1225 Registry Value: 5 Adware.Elex.SHHKRST, HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\SHELLEXECUTEHOOKS|{58AF6728-ECD0-11E6-BFEA-64006A5CFC23}, Delete-on-Reboot, [1238], [362727],1.0.1225 Adware.Elex.SHHKRST, HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER|ENABLESHELLEXECUTEHOOKS, Delete-on-Reboot, [1238], [-1],0.0.0 Adware.Elex.SHHKRST, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER|ENABLESHELLEXECUTEHOOKS, Delete-on-Reboot, [1238], [-1],0.0.0 Adware.Sasquor.SPL, HKLM\SYSTEM\CURRENTCONTROLSET\CONTROL\PRINT\PROVIDERS\4qy3hwj4|NAME, Delete-on-Reboot, [2086], [339986],1.0.1225 PUP.Optional.Trotux, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{8230A356-F879-4B82-AF04-032A578692C0}|DISPLAYNAME, Delete-on-Reboot, [418], [182846],1.0.1225 Registry Data: 0 (No malicious items detected) Data Stream: 0 (No malicious items detected) Folder: 4 PUP.Optional.FakeFFProfile, C:\Users\{username}\AppData\Roaming\Mozilla\Firefox\naweriweentcofise\Profiles\mhc384j1.default, Delete-on-Reboot, [2773], [363173],1.0.1225 PUP.Optional.FakeFFProfile, C:\Users\{username}\AppData\Roaming\Mozilla\Firefox\naweriweentcofise\Profiles, Delete-on-Reboot, [2773], [363173],1.0.1225 PUP.Optional.FakeFFProfile, C:\USERS\{username}\APPDATA\ROAMING\Mozilla\Firefox\naweriweentcofise, Delete-on-Reboot, [2773], [363173],1.0.1225 Adware.Elex.Generic, C:\PROGRAM FILES (X86)\DRECAWARD CLIENT, Delete-on-Reboot, [2145], [358303],1.0.1225 File: 23 Adware.Elex.SHHKRST, C:\USERS\{username}\APPDATA\ROAMING\CLIMOFABECH\GIPPHSAWEGHT.DLL, Delete-on-Reboot, [1238], [362727],1.0.1225 PUP.Optional.FakeFFProfile, C:\Users\{username}\AppData\Roaming\Mozilla\Firefox\naweriweentcofise\Profiles\mhc384j1.default\prefs.js, Delete-on-Reboot, [2773], [363173],1.0.1225 PUP.Optional.FakeFFProfile, C:\Users\{username}\AppData\Roaming\Mozilla\Firefox\naweriweentcofise\Profiles\mhc384j1.default\profiles.ini, Delete-on-Reboot, [2773], [363173],1.0.1225 PUP.Optional.FakeFFProfile, C:\Users\{username}\AppData\Roaming\Mozilla\Firefox\naweriweentcofise\Profiles\mhc384j1.default\search.json, Delete-on-Reboot, [2773], [363173],1.0.1225 PUP.Optional.FakeFFProfile, C:\Users\{username}\AppData\Roaming\Mozilla\Firefox\naweriweentcofise\Profiles\mhc384j1.default\search.json.mozlz4, Delete-on-Reboot, [2773], [363173],1.0.1225 Adware.Elex.Generic, C:\PROGRAM FILES (X86)\GRERHIENT\CGGHTDEBERKMNT.DLL, Delete-on-Reboot, [2145], [366971],1.0.1225 PUP.Optional.Trotux, C:\USERS\{username}\APPDATA\ROAMING\PROFILES\GRERKAGHGERDIING.DEFAULT\SEARCHPLUGINS\4QY3HWJ4.XML, Delete-on-Reboot, [418], [324483],1.0.1225 PUP.Optional.Elex, C:\USERS\{username}\DESKTOP\WSY1_AY.EXE, Delete-on-Reboot, [15], [315776],1.0.1225 Adware.Elex.Generic, C:\PROGRAM FILES (X86)\DRECAWARD CLIENT\LOCAL64SPL.DLL.INI, Delete-on-Reboot, [2145], [358303],1.0.1225 Adware.Elex.Generic, C:\Program Files (x86)\Drecaward Client\local64spl.dll, Delete-on-Reboot, [2145], [358303],1.0.1225 PUP.Optional.Trotux, C:\USERS\{username}\APPDATA\ROAMING\PROFILES\GRERKAGHGERDIING.DEFAULT\PREFS.JS, Replaced, [418], [324486],1.0.1225 PUP.Optional.Trotux, C:\USERS\{username}\APPDATA\ROAMING\PROFILES\GRERKAGHGERDIING.DEFAULT\PREFS.JS, Replaced, [418], [324486],1.0.1225 PUP.Optional.Trotux, C:\USERS\{username}\APPDATA\ROAMING\PROFILES\GRERKAGHGERDIING.DEFAULT\PREFS.JS, Replaced, [418], [324486],1.0.1225 PUP.Optional.Trotux, C:\USERS\{username}\APPDATA\ROAMING\PROFILES\GRERKAGHGERDIING.DEFAULT\PREFS.JS, Replaced, [418], [324486],1.0.1225 PUP.Optional.Trotux, C:\USERS\{username}\APPDATA\ROAMING\PROFILES\GRERKAGHGERDIING.DEFAULT\PREFS.JS, Replaced, [418], [324486],1.0.1225 PUP.Optional.Trotux, C:\USERS\{username}\APPDATA\ROAMING\PROFILES\GRERKAGHGERDIING.DEFAULT\PREFS.JS, Replaced, [418], [324486],1.0.1225 PUP.Optional.Trotux, C:\USERS\{username}\APPDATA\ROAMING\PROFILES\GRERKAGHGERDIING.DEFAULT\PREFS.JS, Replaced, [418], [324486],1.0.1225 PUP.Optional.Trotux, C:\USERS\{username}\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\MHC384J1.DEFAULT\PREFS.JS, Replaced, [418], [302758],1.0.1225 PUP.Optional.Trotux, C:\USERS\{username}\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\MHC384J1.DEFAULT\PREFS.JS, Replaced, [418], [302758],1.0.1225 PUP.Optional.Trotux, C:\USERS\{username}\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\MHC384J1.DEFAULT\PREFS.JS, Replaced, [418], [302758],1.0.1225 PUP.Optional.Trotux, C:\USERS\{username}\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\MHC384J1.DEFAULT\PREFS.JS, Replaced, [418], [302758],1.0.1225 PUP.Optional.Trotux, C:\USERS\{username}\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\MHC384J1.DEFAULT\PREFS.JS, Replaced, [418], [302758],1.0.1225 PUP.Optional.Trotux, C:\USERS\{username}\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\MHC384J1.DEFAULT\SEARCHPLUGINS\4QY3HWJ4.XML, Delete-on-Reboot, [418], [302745],1.0.1225 Physical Sector: 0 (No malicious items detected) (end) As mentioned before the full version of Malwarebytes could have protected your computer against this threat. We use different ways of protecting your computer(s): Dynamically Blocks Malware Sites & Servers Malware Execution Prevention Save yourself the hassle and get protected.