Jump to content

Removal instructions for Adware.Yelloader

Recommended Posts

  • Staff
What is Adware.Yelloader?

The Malwarebytes research team has determined that Adware.Yelloader is adware. These adware applications display advertisements not originating from the sites you are browsing.

How do I know if my computer is affected by Adware.Yelloader?

This adware is installed as a rootkit, so you may notice no other signs besides the unexplainable advertisements. This one also disables a long list of security programs.

Doctor Web Ltd.
Check Point Software Technologies Ltd.
Beijing Kingsoft Security software Co., Ltd
Qihoo 360 Software(Beijing) Company Limited
Doctor Web
System Healer Tech Sp.Zo.o.
Safer Networking Ltd.
BrightFort LLC
Enigma Software Group USA, LLC
Gridinsoft, LLC
Auslogics Labs Pty Ltd
Datpol Janusz Siemienowicz
Zemana Ltd.
Piriform Ltd
IObit Information Technology
Check Point
Blue Coat
Computer Associates International
Shanghai 2345 Network
Beijing Kingsoft Security
Beijing Rising Information
Qihoo 360 Software

How did Adware.Yelloader get on my computer?

Adware applications use different methods for distributing themselves. This particular one was bundled with other software.

How do I remove Adware.Yelloader?

Our program Malwarebytes can detect and remove this potentially unwanted program.
  • Please download Malwarebytes to your desktop.
  • Double-click mb3-setup-consumer-{version}.exe and follow the prompts to install the program.
  • Then click Finish.
  • Once the program has fully updated, make sure that you enable the Scan for rootkits option on the Protection tab under Scan Options.
  • Then select Scan Now on the Dashboard. Or select the Threat Scan from the Scan menu.
  • If another update of the definitions is available, it will be implemented before the rest of the scanning procedure.
  • When the scan is complete, make sure that all Threats are selected, and click Remove Selected.
  • Restart your computer when prompted to do so.
  • Is there anything else I need to do to get rid of Adware.Yelloader?
    • No, Malwarebytes removes Adware.Yelloader completely.
    How would the full version of Malwarebytes help protect me?

    We hope our application and this guide have helped you eradicate this adware.

    As you can see below the full version of Malwarebytes would have protected you against the Adware.Yelloader adware. It would have warned you before the adware could install itself, giving you a chance to stop it before it became too late.


    Technical details for experts

    Possible signs in FRST logs:
     (ct Corp.) C:\Users\{username}\AppData\Local\Temp\20170313\ct.exe
     R2 windowsmanagementservice; C:\Users\{username}\AppData\Local\Temp\20170313\ct.exe [724480 2017-02-22] (ct Corp.) [File not signed]
    Visible alterations made by the installer:
    Registry details [View: All details] (Selection)
           "DelayedAutostart"="REG_DWORD", 1
           "Description"="REG_SZ", "Provide management service for system."
           "DisplayName"="REG_SZ", "Windows Management Service"
           "ErrorControl"="REG_DWORD", 1
           "ImagePath"="REG_EXPAND_SZ, "C:\Users\{username}1\AppData\Local\Temp\20170313\ct.exe"
           "ObjectName"="REG_SZ", "LocalSystem"
           "Start"="REG_DWORD", 2
           "Type"="REG_DWORD", 16
           "WOW64"="REG_DWORD", 1
    Malwarebytes log:
    -Log Details-
    Scan Date: 3/13/17
    Scan Time: 2:35 PM
    Logfile: mbamAdwareRootkit.txt
    Administrator: Yes
    -Software Information-
    Components Version: 1.0.75
    Update Package Version: 1.0.1490
    License: Trial
    -System Information-
    OS: Windows 7 Service Pack 1
    CPU: x64
    File System: NTFS
    User: {computername}\{username}
    -Scan Summary-
    Scan Type: Threat Scan
    Result: Completed
    Objects Scanned: 321362
    Time Elapsed: 2 min, 27 sec
    -Scan Options-
    Memory: Enabled
    Startup: Enabled
    Filesystem: Enabled
    Archives: Enabled
    Rootkits: Enabled
    Heuristics: Enabled
    PUP: Enabled
    PUM: Enabled
    -Scan Details-
    Process: 0
    (No malicious items detected)
    Module: 0
    (No malicious items detected)
    Registry Key: 1
    Adware.Yelloader, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\windowsmanagementservice, Delete-on-Reboot, [4873], [377105],1.0.1490
    Registry Value: 1
    Registry Data: 0
    (No malicious items detected)
    Data Stream: 0
    (No malicious items detected)
    Folder: 1
    Trojan.Clicker, C:\USERS\{username}\APPDATA\LOCAL\TEMP\20170313, Delete-on-Reboot, [43], [377133],1.0.1490
    File: 7
    Adware.Yelloader, C:\USERS\{username}\APPDATA\LOCAL\TEMP\20170313\CT.EXE, Delete-on-Reboot, [4873], [377105],1.0.1490
    Adware.Yelloader, C:\USERS\{username}\APPDATA\LOCAL\TEMP\20170313\CT.EXE, Delete-on-Reboot, [4873], [377105],1.0.1490
    Adware.Yelloader, C:\USERS\{username}\DESKTOP\S5-20150702.EXE, Delete-on-Reboot, [4873], [377100],1.0.1490
    Rootkit.Agent.PUA, C:\USERS\{username}\APPDATA\LOCAL\TEMP\20170313\DRMKPRO64.SYS, Delete-on-Reboot, [8263], [375178],1.0.1490
    Adware.Yelloader, C:\USERS\{username}\APPDATA\LOCAL\TEMP\20170313\NVVSVC.EXE, Delete-on-Reboot, [4873], [377104],1.0.1490
    Trojan.Clicker, C:\USERS\{username}\APPDATA\LOCAL\TEMP\20170313\CT.ZIP, Delete-on-Reboot, [43], [377133],1.0.1490
    Adware.Yelloader, C:\USERS\{username}\DESKTOP\ROOTKIT\S5-20150702.ZIP, Delete-on-Reboot, [4873], [377100],1.0.1490
    Physical Sector: 0
    (No malicious items detected)
    As mentioned before the full version of Malwarebytes could have protected your computer against this threat.
    We use different ways of protecting your computer(s):
    • Dynamically Blocks Malware Sites & Servers
    • Malware Execution Prevention
    Save yourself the hassle and get protected.
Edited by Metallica
Link to post
Share on other sites

  • Staff
The rootkit described above behaves even more aggressive if your IP address is from the US (there may be others where it behaves this way).

You can recognize this more effectful approach by this warning when you try to run Malwarebytes.


To get rid of this rootkit you will have to follow the procedure outlined below:
  • Download the standalone Malwarebytes Anti-Rootkit BETA
  • Run the installer and choose a destination folder.
  • Once the installation is complete click "Next" to proceed.
  • Then click "Update" to get the latest definitions.
  • Once the database has been updated click "Next".
  • Then click "Scan" to start scanning the infected system.
  • This is the main target of this scan.
  • Once the scan is finished click "Cleanup" to remove the rootkit and the asssociated files.
  • When removal is complete, you will be prompted to reboot the system. Click "Yes" to confirm or reboot manually.
  • After the reboot try running Malwarebytes to confirm that it works properly again and run a "Threat Scan" to get any leftovers.
Link to post
Share on other sites

  • 3 weeks later...
  • Staff


This adware has been adapted several times to counter the removal instructions above.

So if you get the notification "The requested Resource is in use" when trying to run Malwarebytes or another security program, follow the instructions posted here: 


Link to post
Share on other sites

  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.