Sign in to follow this  
Followers 0
Metallica

Removal instructions for Trotux

1 post in this topic

What is Trotux?

The Malwarebytes research team has determined that Trotux is adware. These adware applications display advertisements not originating from the sites you are browsing.

How do I know if my computer is affected by Trotux?

You may see this entry in your list of installed programs:

warning4.png

this type of Scheduled Tasks (random names):

warning3.png

these changed search settings in the affected browsers:

search.png

searchff.png

and this startpage:

startpage.png

You may also notice a fake Firefox profiles as described here:
GsearchFinder hijackers add extra Firefox profile

How did Trotux get on my computer?

Adware applications use different methods for distributing themselves. This particular one was bundled with other software.

How do I remove Trotux?

Our program Malwarebytes can detect and remove this potentially unwanted program.
  • Please download Malwarebytes to your desktop.
  • Double-click mb3-setup-consumer-{version}.exe and follow the prompts to install the program.
  • Then click Finish.
  • Once the program has fully updated, select Scan Now on the Dashboard. Or select the Threat Scan from the Scan menu.
  • If another update of the definitions is available, it will be implemented before the rest of the scanning procedure.
  • When the scan is complete, make sure that all Threats are selected, and click Remove Selected.
  • Restart your computer when prompted to do so.
Is there anything else I need to do to get rid of Trotux?
  • No, Malwarebytes removes Trotux completely.
  • This PUP creates some scheduled tasks. You can read here how to check for and, if necessary, remove Scheduled Tasks.
  • If your browsers have been hijacked, you should read our Restore Browser page. You can read there how to fix additional browser redirect methods.
How would the full version of Malwarebytes help protect me?

We hope our application and this guide have helped you eradicate this adware.

As you can see below the full version of Malwarebytes would have protected you against the Trotux adware. It would have warned you before the adware could install itself, giving you a chance to stop it before it became too late.

 

protection1.png


The web protection module also blocks the origin of the installer:
 

protection2.png


Technical details for experts

Possible signs in FRST logs:
 
 HKLM\...\Policies\Explorer: [EnableShellExecuteHooks] 1
 ShellExecuteHooks:  - {58AF6728-ECD0-11E6-BFEA-64006A5CFC23} - C:\Users\{username}\AppData\Roaming\Climofabech\Gipphsaweght.dll [146944 2017-02-10] ()
 FF NewTab: hxxp://www.trotux.com/?z=1f52ad85c729d12e6f3c817gezfb7q5m9obo8bfc4c&from=wsy1&uid=ST500LT012-1DG142_S3PA6P09XXXXS3PA6P09&type=hp
 FF DefaultSearchEngine: trotux
 FF SelectedSearchEngine: trotux
 FF Homepage: hxxp://www.trotux.com/?z=1f52ad85c729d12e6f3c817gezfb7q5m9obo8bfc4c&from=wsy1&uid=ST500LT012-1DG142_S3PA6P09XXXXS3PA6P09&type=hp
 FF SearchPlugin: C:\Users\{username}\AppData\Roaming\Mozilla\Firefox\Profiles\mhc384j1.default\searchplugins\4qy3hwj4.xml [2017-02-10]
 CHR HomePage: ChromeDefaultData -> hxxp://www.trotux.com/?z=1f52ad85c729d12e6f3c817gezfb7q5m9obo8bfc4c&from=wsy1&uid=ST500LT012-1DG142_S3PA6P09XXXXS3PA6P09&type=hp
 CHR StartupUrls: ChromeDefaultData -> "hxxp://www.trotux.com/?z=1f52ad85c729d12e6f3c817gezfb7q5m9obo8bfc4c&from=wsy1&uid=ST500LT012-1DG142_S3PA6P09XXXXS3PA6P09&type=hp"
 CHR DefaultSearchURL: ChromeDefaultData -> hxxp://www.trotux.com/search/?q={searchTerms}&z=1f52ad85c729d12e6f3c817gezfb7q5m9obo8bfc4c&from=wsy1&uid=ST500LT012-1DG142_S3PA6P09XXXXS3PA6P09&type=sp
 CHR DefaultSearchKeyword: ChromeDefaultData -> trotux
 R2 Stuhoph; C:\Program Files (x86)\Grerhient\cgghtdeberkmnt.dll [149504 2017-02-10] () [File not signed]
 C:\WINDOWS\System32\Tasks\Drecaward Client
 C:\WINDOWS\System32\Tasks\Niiseclajuent
 C:\Users\{username}\AppData\Roaming\Climofabech
 C:\Users\{username}\AppData\Local\Ckekiry
 C:\Program Files (x86)\Drecaward Client
 C:\Program Files (x86)\Grerhient

trotux - Uninstall (HKLM-x32\...\{8230A356-F879-4B82-AF04-032A578692C0}) (Version:  - )
Task: {1B965CA1-35D0-4C1D-B92A-FE8677ECA306} - System32\Tasks\Drecaward Client => C:\Program Files (x86)\Grerhient\dozuent.exe [2017-02-10] (Glarysoft Ltd)
Task: {D766AA6E-86D0-4DF0-BCC5-BCACB56D5FE6} - System32\Tasks\Niiseclajuent => /i hxxp://d2buh1bf1g584w.cloudfront.net/msi/rel.php?u=ST500LT012-1DG142_S3PA6P09XXXXS3PA6P09&v=2017210 /q
() C:\Users\{username}\AppData\Roaming\Climofabech\Gipphsaweght.dll
() C:\Program Files (x86)\Drecaward Client\local64spl.dll
() c:\program files (x86)\grerhient\cgghtdeberkmnt.dll
Alterations made by the installer:
File system details [View: All details] (Selection)
---------------------------------------------------
    Adds the folder C:\Program Files (x86)\Drecaward Client
       Adds the file local64spl.dll"="2/10/2017 11:34 AM, 309760 bytes, A
       Adds the file local64spl.dll.ini"="2/10/2017 11:34 AM, 20 bytes, A
    Adds the folder C:\Program Files (x86)\Grerhient
       Adds the file cgghtdeberkmnt.dll"="2/10/2017 11:34 AM, 149504 bytes, A
       Adds the file CrashReport.dll"="2/10/2017 11:34 AM, 121344 bytes, A
       Adds the file dozuent.exe"="2/10/2017 11:34 AM, 1026216 bytes, A
    In the existing folder C:\Windows\System32\Tasks
       Adds the file Drecaward Client"="2/10/2017 11:34 AM, 6082 bytes, A
       Adds the file Niiseclajuent"="2/10/2017 11:34 AM, 3780 bytes, A

Registry details [View: All details] (Selection)
------------------------------------------------
    [HKEY_LOCAL_MACHINE\SOFTWARE\0B3C7EB2C2FC8FF89E16DF9C80C0327A]
       "(Default)"="REG_SZ"", "{EFD519A3-DC49-498A-8DD4-AD1DA8F97FCD}"
       "{EFD519A3-DC49-498A-8DD4-AD1DA8F97FCD}"="REG_BINARY, ............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{58AF6728-ECD0-11E6-BFEA-64006A5CFC23}\InProcServer32]
       "(Default)"="REG_SZ"", "C:\Users\{username}\AppData\Roaming\Climofabech\Gipphsaweght.dll"
       "ThreadingModel"="REG_SZ"", "Apartment"
    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft]
       "help"="REG_SZ"", "http://www.trotux.com/?z=1f52ad85c729d12e6f3c817gezfb7q5m9obo8bfc4c&from=wsy1&uid=ST500LT012-1DG142_S3PA6P09XXXXS3PA6P09&type=hp"
    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks]
       "{58AF6728-ECD0-11E6-BFEA-64006A5CFC23}"="REG_SZ"", ""
    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer]
       "EnableShellExecuteHooks"="REG_DWORD"", 1
    [HKEY_LOCAL_MACHINE\SOFTWARE\Mvasephermuy]
    [HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\{84416237-6490-494D-9AD6-4994DD978971}]
       "chd"="REG_SZ"", "C:\Users\{username}\AppData\Local\Ckekiry"
       "ffd"="REG_SZ"", "C:\Users\{username}\AppData\Roaming\Profiles\Grerkaghgerdiing.default"
    [HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\0B3C7EB2C2FC8FF89E16DF9C80C0327A]
       "(Default)"="REG_SZ"", "{EFD519A3-DC49-498A-8DD4-AD1DA8F97FCD}"
       "{EFD519A3-DC49-498A-8DD4-AD1DA8F97FCD}"="REG_BINARY, ............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    [HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Ckafoyanerqeent]
    [HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\dozuent.exe]
       "(Default)"="REG_SZ"", "2017210"
    [HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{8230A356-F879-4B82-AF04-032A578692C0}]
       "DisplayName"="REG_SZ"", "trotux - Uninstall"
       "UninstallString"="REG_SZ"", "C:\Program Files (x86)\Grerhient\dozuent.exe ef869dec-feed-46e1-a4fe-427f47f37b77 "/k={8230A356-F879-4B82-AF04-032A578692C0}""
    [HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Svchost]
       "Stuhoph"="REG_MULTI_SZ, "Stuhoph"
    [HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Suvosh]
    [HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\trotuxSoftware\trotuxhp]
       "oem"="REG_SZ"", "wsy1"
       "Time"="REG_DWORD"", 1486722892
    [HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\xvtrzx]
       "day"="REG_SZ"", "20170210"
       "upday"="REG_SZ"", "20170210"
    [HKEY_LOCAL_MACHINE\SOFTWARE\xvtrzx]
       "day"="REG_SZ"", "20170210"
       "upday"="REG_SZ"", "20170210"
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Print\Providers]
       "order" = REG_MULTI_SZ, "LanMan Print Services Internet Print Provider 4qy3hwj4 "
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Print\Providers\4qy3hwj4]
       "DisplayName"="REG_SZ"", "zvgbuz"
       "Name"="REG_SZ"", "C:\Program Files (x86)\Drecaward Client\local64spl.dll"
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Stuhoph]
       "Description"="REG_SZ"", "Provides global functions for other parts of Chislereuction."
       "DisplayName"="REG_SZ"", "Stuhoph"
       "ErrorControl"="REG_DWORD"", 1
       "FailureActions"="REG_BINARY, ......................
       "ImagePath"="REG_EXPAND_SZ, "%SystemRoot%\system32\svchost.exe -k Stuhoph"
       "ObjectName"="REG_SZ"", "LocalSystem"
       "Start"="REG_DWORD"", 2
       "Type"="REG_DWORD"", 272
       "WOW64"="REG_DWORD"", 1
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Stuhoph\Parameters]
       "ServiceDll"="REG_EXPAND_SZ, "C:\Program Files (x86)\Grerhient\cgghtdeberkmnt.dll"
       "ServiceMain"="REG_SZ"", "Clanochphoderk"
    [HKEY_USERS\.DEFAULT\Software\xvtrzx]
       "day"="REG_SZ"", "20170210"
       "upday"="REG_SZ"", "20170210"
Malwarebytes log:
Malwarebytes
www.malwarebytes.com

-Log Details-
Scan Date: 2/10/17
Scan Time: 12:14 PM
Logfile: mbamTrotux.txt
Administrator: Yes

-Software Information-
Version: 3.0.6.1469
Components Version: 1.0.50
Update Package Version: 1.0.1225
License: Premium

-System Information-
OS: Windows 10
CPU: x64
File System: NTFS
User: {computername}\{username}

-Scan Summary-
Scan Type: Threat Scan
Result: Completed
Objects Scanned: 384454
Time Elapsed: 9 min, 6 sec

-Scan Options-
Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Disabled
Heuristics: Enabled
PUP: Enabled
PUM: Enabled

-Scan Details-
Process: 0
(No malicious items detected)

Module: 4
Adware.Elex.SHHKRST, C:\USERS\{username}\APPDATA\ROAMING\CLIMOFABECH\GIPPHSAWEGHT.DLL, Quarantined, [1238], [362727],1.0.1225
Adware.Elex.SHHKRST, C:\USERS\{username}\APPDATA\ROAMING\CLIMOFABECH\GIPPHSAWEGHT.DLL, Quarantined, [1238], [362727],1.0.1225
Adware.Elex.Generic, C:\PROGRAM FILES (X86)\GRERHIENT\CGGHTDEBERKMNT.DLL, Quarantined, [2145], [366971],1.0.1225
Adware.Elex.Generic, C:\Program Files (x86)\Drecaward Client\local64spl.dll, Quarantined, [2145], [358303],1.0.1225

Registry Key: 5
Adware.Elex.SHHKRST, HKLM\SOFTWARE\CLASSES\CLSID\{58AF6728-ECD0-11E6-BFEA-64006A5CFC23}, Delete-on-Reboot, [1238], [362727],1.0.1225
Adware.Elex.SHHKRST, HKLM\SOFTWARE\CLASSES\CLSID\{58AF6728-ECD0-11E6-BFEA-64006A5CFC23}\InprocServer32, Delete-on-Reboot, [1238], [362727],1.0.1225
PUP.Optional.Trotux, HKLM\SOFTWARE\WOW6432NODE\trotuxSoftware, Delete-on-Reboot, [418], [182848],1.0.1225
Adware.Sasquor.SPL, HKLM\SYSTEM\CURRENTCONTROLSET\CONTROL\PRINT\PROVIDERS\4qy3hwj4, Delete-on-Reboot, [2086], [339986],1.0.1225
PUP.Optional.Trotux, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{8230A356-F879-4B82-AF04-032A578692C0}, Delete-on-Reboot, [418], [182846],1.0.1225

Registry Value: 5
Adware.Elex.SHHKRST, HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\SHELLEXECUTEHOOKS|{58AF6728-ECD0-11E6-BFEA-64006A5CFC23}, Delete-on-Reboot, [1238], [362727],1.0.1225
Adware.Elex.SHHKRST, HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER|ENABLESHELLEXECUTEHOOKS, Delete-on-Reboot, [1238], [-1],0.0.0
Adware.Elex.SHHKRST, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER|ENABLESHELLEXECUTEHOOKS, Delete-on-Reboot, [1238], [-1],0.0.0
Adware.Sasquor.SPL, HKLM\SYSTEM\CURRENTCONTROLSET\CONTROL\PRINT\PROVIDERS\4qy3hwj4|NAME, Delete-on-Reboot, [2086], [339986],1.0.1225
PUP.Optional.Trotux, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{8230A356-F879-4B82-AF04-032A578692C0}|DISPLAYNAME, Delete-on-Reboot, [418], [182846],1.0.1225

Registry Data: 0
(No malicious items detected)

Data Stream: 0
(No malicious items detected)

Folder: 4
PUP.Optional.FakeFFProfile, C:\Users\{username}\AppData\Roaming\Mozilla\Firefox\naweriweentcofise\Profiles\mhc384j1.default, Delete-on-Reboot, [2773], [363173],1.0.1225
PUP.Optional.FakeFFProfile, C:\Users\{username}\AppData\Roaming\Mozilla\Firefox\naweriweentcofise\Profiles, Delete-on-Reboot, [2773], [363173],1.0.1225
PUP.Optional.FakeFFProfile, C:\USERS\{username}\APPDATA\ROAMING\Mozilla\Firefox\naweriweentcofise, Delete-on-Reboot, [2773], [363173],1.0.1225
Adware.Elex.Generic, C:\PROGRAM FILES (X86)\DRECAWARD CLIENT, Delete-on-Reboot, [2145], [358303],1.0.1225

File: 23
Adware.Elex.SHHKRST, C:\USERS\{username}\APPDATA\ROAMING\CLIMOFABECH\GIPPHSAWEGHT.DLL, Delete-on-Reboot, [1238], [362727],1.0.1225
PUP.Optional.FakeFFProfile, C:\Users\{username}\AppData\Roaming\Mozilla\Firefox\naweriweentcofise\Profiles\mhc384j1.default\prefs.js, Delete-on-Reboot, [2773], [363173],1.0.1225
PUP.Optional.FakeFFProfile, C:\Users\{username}\AppData\Roaming\Mozilla\Firefox\naweriweentcofise\Profiles\mhc384j1.default\profiles.ini, Delete-on-Reboot, [2773], [363173],1.0.1225
PUP.Optional.FakeFFProfile, C:\Users\{username}\AppData\Roaming\Mozilla\Firefox\naweriweentcofise\Profiles\mhc384j1.default\search.json, Delete-on-Reboot, [2773], [363173],1.0.1225
PUP.Optional.FakeFFProfile, C:\Users\{username}\AppData\Roaming\Mozilla\Firefox\naweriweentcofise\Profiles\mhc384j1.default\search.json.mozlz4, Delete-on-Reboot, [2773], [363173],1.0.1225
Adware.Elex.Generic, C:\PROGRAM FILES (X86)\GRERHIENT\CGGHTDEBERKMNT.DLL, Delete-on-Reboot, [2145], [366971],1.0.1225
PUP.Optional.Trotux, C:\USERS\{username}\APPDATA\ROAMING\PROFILES\GRERKAGHGERDIING.DEFAULT\SEARCHPLUGINS\4QY3HWJ4.XML, Delete-on-Reboot, [418], [324483],1.0.1225
PUP.Optional.Elex, C:\USERS\{username}\DESKTOP\WSY1_AY.EXE, Delete-on-Reboot, [15], [315776],1.0.1225
Adware.Elex.Generic, C:\PROGRAM FILES (X86)\DRECAWARD CLIENT\LOCAL64SPL.DLL.INI, Delete-on-Reboot, [2145], [358303],1.0.1225
Adware.Elex.Generic, C:\Program Files (x86)\Drecaward Client\local64spl.dll, Delete-on-Reboot, [2145], [358303],1.0.1225
PUP.Optional.Trotux, C:\USERS\{username}\APPDATA\ROAMING\PROFILES\GRERKAGHGERDIING.DEFAULT\PREFS.JS, Replaced, [418], [324486],1.0.1225
PUP.Optional.Trotux, C:\USERS\{username}\APPDATA\ROAMING\PROFILES\GRERKAGHGERDIING.DEFAULT\PREFS.JS, Replaced, [418], [324486],1.0.1225
PUP.Optional.Trotux, C:\USERS\{username}\APPDATA\ROAMING\PROFILES\GRERKAGHGERDIING.DEFAULT\PREFS.JS, Replaced, [418], [324486],1.0.1225
PUP.Optional.Trotux, C:\USERS\{username}\APPDATA\ROAMING\PROFILES\GRERKAGHGERDIING.DEFAULT\PREFS.JS, Replaced, [418], [324486],1.0.1225
PUP.Optional.Trotux, C:\USERS\{username}\APPDATA\ROAMING\PROFILES\GRERKAGHGERDIING.DEFAULT\PREFS.JS, Replaced, [418], [324486],1.0.1225
PUP.Optional.Trotux, C:\USERS\{username}\APPDATA\ROAMING\PROFILES\GRERKAGHGERDIING.DEFAULT\PREFS.JS, Replaced, [418], [324486],1.0.1225
PUP.Optional.Trotux, C:\USERS\{username}\APPDATA\ROAMING\PROFILES\GRERKAGHGERDIING.DEFAULT\PREFS.JS, Replaced, [418], [324486],1.0.1225
PUP.Optional.Trotux, C:\USERS\{username}\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\MHC384J1.DEFAULT\PREFS.JS, Replaced, [418], [302758],1.0.1225
PUP.Optional.Trotux, C:\USERS\{username}\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\MHC384J1.DEFAULT\PREFS.JS, Replaced, [418], [302758],1.0.1225
PUP.Optional.Trotux, C:\USERS\{username}\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\MHC384J1.DEFAULT\PREFS.JS, Replaced, [418], [302758],1.0.1225
PUP.Optional.Trotux, C:\USERS\{username}\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\MHC384J1.DEFAULT\PREFS.JS, Replaced, [418], [302758],1.0.1225
PUP.Optional.Trotux, C:\USERS\{username}\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\MHC384J1.DEFAULT\PREFS.JS, Replaced, [418], [302758],1.0.1225
PUP.Optional.Trotux, C:\USERS\{username}\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\MHC384J1.DEFAULT\SEARCHPLUGINS\4QY3HWJ4.XML, Delete-on-Reboot, [418], [302745],1.0.1225

Physical Sector: 0
(No malicious items detected)


(end)
As mentioned before the full version of Malwarebytes could have protected your computer against this threat.
We use different ways of protecting your computer(s):
  • Dynamically Blocks Malware Sites & Servers
  • Malware Execution Prevention
Save yourself the hassle and get protected.

Share this post


Link to post
Share on other sites
Sign in to follow this  
Followers 0

  • Recently Browsing   0 members

    No registered users viewing this page.