Jump to content

Removal instructions for BTclient


Recommended Posts

  • Staff

What is BTclient?

The Malwarebytes research team has determined that BTclient is adware. These adware applications display advertisements not originating from the sites you are browsing.

How do I know if my computer is affected by BTclient?

You may see this entry in your list of installed programs:

warning4.png

and these Scheduled Tasks:

warning3.png

How did BTclient get on my computer?

Adware applications use different methods for distributing themselves. This particular one was bundled with other software.

How do I remove BTclient?

Our program Malwarebytes Anti-Malware can detect and remove this potentially unwanted program.

  • Please download Malwarebytes Anti-Malware to your desktop.
  • Double-click mbam-setup-version.exe and follow the prompts to install the program.
  • At the end, be sure a check-mark is placed next to the following:
    • Enable free trial of Malwarebytes Anti-Malware Premium
    • Launch Malwarebytes Anti-Malware
  • Then click Finish.
  • If an update is found, you will be prompted to download and install the latest version.
  • Once the program has loaded, select Scan now. Or select the Threat Scan from the Scan menu.
  • When the scan is complete , make sure that everything is set to "Quarantine", and click Apply Actions.
  • Reboot your computer if prompted.
Is there anything else I need to do to get rid of BTclient?
  • No, Malwarebytes' Anti-Malware removes BTclient completely.
  • This PUP creates some scheduled tasks. You can read here how to remove Scheduled Tasks.
How would the full version of Malwarebytes Anti-Malware help protect me?

We hope our application and this guide have helped you eradicate this hijacker.

As you can see below the full version of Malwarebytes Anti-Malware would have protected you against the BTclient adware. �It would have warned you before the rogue could install itself, giving you a chance to stop it before it became too late.

protection1.png

Technical details for experts

You will see these signs in a HijackThis log:

O4 - HKCU\..\Run: [btclient] C:\Program Files\btclient\btclient\1.3.22.2\btclient.exe
Possible signs in FRST logs:

 (Pay By Ads LTD) C:\Program Files\btclient\btclient\1.3.22.2\btclient.exe HKCU\...\Run: [btclient] => C:\Program Files\btclient\btclient\1.3.22.2\btclient.exe [644888 2015-03-13] (Pay By Ads LTD) Task: {24FBD65F-4A9F-47E7-9875-AB86ED6BF4BD} - System32\Tasks\btclient Updater => C:\Program Files\btclient\btclient\1.3.22.2\btsetup.exe [2015-03-13] (Pay By Ads LTD) Task: {746D1707-3613-47D1-80EE-7AF55849BF5B} - System32\Tasks\btclient => C:\Program Files\btclient\btclient\1.3.22.2\btclient.exe [2015-03-13] (Pay By Ads LTD)
Alterations made by the installer:

File system details  ---------------------------------------------    Adds the folder C:\Program Files\btclient\btclient\1.3.22.2       Adds the file 2gmjecmm.dll"="3/13/2015 8:44 AM, 289280 bytes, A       Adds the file app.ini"="3/13/2015 8:44 AM, 508 bytes, A       Adds the file btclient.exe"="3/13/2015 8:44 AM, 644888 bytes, A       Adds the file btsetup.exe"="3/13/2015 8:44 AM, 448792 bytes, A       Adds the file chromext64.dll"="3/13/2015 8:44 AM, 341504 bytes, A       Adds the file hlpr64.exe"="3/13/2015 8:44 AM, 91648 bytes, A       Adds the file pilpkplh.dll"="3/13/2015 8:44 AM, 305152 bytes, A       Adds the file res.dll"="3/13/2015 8:44 AM, 203264 bytes, A    In the existing folder C:\Windows\System32\Tasks       Adds the file btclient"="3/13/2015 8:44 AM, 3466 bytes, A       Adds the file btclient Updater"="3/13/2015 8:44 AM, 3464 bytes, ARegistry details  ------------------------------------------    [HKEY_CURRENT_USER\Software\Classes\keepmysearch\instl\data]       "APPORDR"="REG_SZ", "E0C58B66CE55A0F0"       "country"="REG_SZ", ""       "lng"="REG_SZ", ""       "prm1"="REG_SZ", ""       "prm2"="REG_SZ", ""       "prm3"="REG_SZ", ""       "prm4"="REG_SZ", ""       "prm5"="REG_SZ", ""    [HKEY_CURRENT_USER\Software\Classes\keepmysearch\uninstl]       "btclient"="REG_SZ", "C:\Program Files\btclient\btclient\1.3.22.2\btsetup.exe"    [HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION]       "btclient.exe"="REG_DWORD", 19000       "btsetup.exe"="REG_DWORD", 19000    [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run]       "btclient"="REG_SZ", "C:\Program Files\btclient\btclient\1.3.22.2\btclient.exe"    [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\btclient]       "DisplayIcon"="REG_SZ", ""C:\Program Files\btclient\btclient\1.3.22.2\btsetup.exe""       "DisplayName"="REG_SZ", "btclient"       "NoModify"="REG_DWORD", 1       "NoRepair"="REG_DWORD", 1       "Publisher"="REG_SZ", "btclient"       "UninstallString"="REG_SZ", ""C:\Program Files\btclient\btclient\1.3.22.2\btsetup.exe" /uninstl"
Malwarebytes Anti-Malware log:

Malwarebytes Anti-Malwarewww.malwarebytes.orgScan Date: 3/13/2015Scan Time: 8:58:43 AMLogfile: mbamBTclient.txtAdministrator: YesVersion: 2.01.0.1004Malware Database: v2015.03.13.04Rootkit Database: v2015.02.25.01License: FreeMalware Protection: DisabledMalicious Website Protection: DisabledSelf-protection: DisabledOS: Windows 7 Service Pack 1CPU: x86File System: NTFSUser: MalwarebytesScan Type: Threat ScanResult: CompletedObjects Scanned: 294018Time Elapsed: 3 min, 45 secMemory: EnabledStartup: EnabledFilesystem: EnabledArchives: EnabledRootkits: DisabledHeuristics: EnabledPUP: EnabledPUM: EnabledProcesses: 1PUP.Optional.PayByAds.A, C:\Program Files\btclient\btclient\1.3.22.2\btclient.exe, 2756, Delete-on-Reboot, [54b498ad7d0db284689e8e8dd63015eb]Modules: 0(No malicious items detected)Registry Keys: 2PUP.Optional.BTClient.A, HKCU\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\BTCLIENT, Quarantined, [0cfc78cd8cfe3600bff52c7b1be807f9], PUP.Optional.KeepMySearch.A, HKCU_Classes\keepmysearch, Quarantined, [22e655f0ed9d999db8ace0da2cd77d83], Registry Values: 2PUP.Optional.PayByAds.A, HKCU\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|btclient, C:\Program Files\btclient\btclient\1.3.22.2\btclient.exe, Quarantined, [54b498ad7d0db284689e8e8dd63015eb]PUP.Optional.BTClient.A, HKCU\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\BTCLIENT|DisplayIcon, "C:\Program Files\btclient\btclient\1.3.22.2\btsetup.exe", Quarantined, [0cfc78cd8cfe3600bff52c7b1be807f9]Registry Data: 0(No malicious items detected)Folders: 2PUP.Optional.BTClient.A, C:\Program Files\btclient\btclient, Delete-on-Reboot, [b5534005b2d871c5ac8136719d66db25], PUP.Optional.BTClient.A, C:\Program Files\btclient\btclient\1.3.22.2, Delete-on-Reboot, [b5534005b2d871c5ac8136719d66db25], Files: 11PUP.Optional.PayByAds.A, C:\Program Files\btclient\btclient\1.3.22.2\btclient.exe, Delete-on-Reboot, [54b498ad7d0db284689e8e8dd63015eb], PUP.Optional.KeepMySearch.A, C:\Users\{username}\Desktop\BTclient.exe, Quarantined, [9e6a40053852290d8937c712fe07ee12], PUP.Optional.BTClient.A, C:\Windows\System32\Tasks\btclient Updater, Quarantined, [8e7acb7a1a70db5b9121dfc8ca3953ad], PUP.Optional.BTClient.A, C:\Windows\System32\Tasks\btclient, Quarantined, [5cac75d05832fd39387bcadd2bd8718f], PUP.Optional.BTClient.A, C:\Program Files\btclient\btclient\1.3.22.2\2gmjecmm.dll, Quarantined, [b5534005b2d871c5ac8136719d66db25], PUP.Optional.BTClient.A, C:\Program Files\btclient\btclient\1.3.22.2\app.ini, Quarantined, [b5534005b2d871c5ac8136719d66db25], PUP.Optional.BTClient.A, C:\Program Files\btclient\btclient\1.3.22.2\btsetup.exe, Quarantined, [b5534005b2d871c5ac8136719d66db25], PUP.Optional.BTClient.A, C:\Program Files\btclient\btclient\1.3.22.2\chromext64.dll, Quarantined, [b5534005b2d871c5ac8136719d66db25], PUP.Optional.BTClient.A, C:\Program Files\btclient\btclient\1.3.22.2\hlpr64.exe, Quarantined, [b5534005b2d871c5ac8136719d66db25], PUP.Optional.BTClient.A, C:\Program Files\btclient\btclient\1.3.22.2\pilpkplh.dll, Quarantined, [b5534005b2d871c5ac8136719d66db25], PUP.Optional.BTClient.A, C:\Program Files\btclient\btclient\1.3.22.2\res.dll, Quarantined, [b5534005b2d871c5ac8136719d66db25], Physical Sectors: 0(No malicious items detected)(end)
As mentioned before the full version of Malwarebytes Anti-Malware could have protected your computer against this threat.

We use different ways of protecting your computer(s):

  • Dynamically Blocks Malware Sites & Servers
  • Malware Execution Prevention
Save yourself the hassle and get protected.
Link to post
Share on other sites

  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.