How to remove Browser Assistant Trojan Virus

Trojan.BrowserAssistant.PS is Malwarebytes’ detection name for a Trojan that injects javascript code in targeted browsers (Edge and Firefox). The BrowserAssistant installer is signed by Realistic Media Inc. and aimed at Windows systems.

Browser Assistant Symptoms

Users of affected systems may see this entry in their list of installed Programs and Features:

BrowserAssistant installed

and these items in the Windows Startup folder:

startup entries

Type and source of infection

Trojan.BrowserAssistant.PS is a Trojan that allows the threat actor to show advertisements in the affected browsers.
Trojan.BrowserAssistant.PS is installed as part of bundlers.

installing BrowserAssistant

Browser Assistant Protection

Malwarebytes protects users from Trojan.BrowserAssistant.PS by using real-time protection.

block BrowserAssistant

Malwarebytes blocks Trojan.BrowserAssistant.PS

Browser Assistant Detection and Removal

Malwarebytes can detect and remove Trojan.BrowserAssistant.PS without further user interaction.

  1. Please download Malwarebytes to your desktop.
  2. Double-click MBSetup.exe and follow the prompts to install the program.
  3. When your Malwarebytes for Windows installation completes, the program opens to the Welcome to Malwarebytes screen.
  4. Click on the Get started button.
  5. Click Scan to start a Threat Scan.
  6. Click Quarantine to remove the found threats.
  7. Reboot the system if prompted to complete the removal process.

Business remediation

How to remove Trojan.BrowserAssistant.PS with the Malwarebytes Nebula console

You can use the Malwarebytes Anti-Malware Nebula console to scan endpoints.

endpoint menu Nebula endpoint tasks menu

Choose the Scan + Quarantine option. Afterwards you can check the Detections page to see which threats were found.

Nebula detections

On the Quarantine page you can see which threats were quarantined and restore them if necessary.

Nebula Quarantaine

Malwarebytes removal log

A Malwarebytes log of removal will be huge but should contain these entries:


-Log Details-
Scan Date: 7/25/19
Scan Time: 1:16 PM
Log File: a687e548-aecd-11e9-ad51-00ffdcc6fdfc.json

-Software Information-
Components Version: 1.0.586
Update Package Version: 1.0.11712
License: Premium

-System Information-
OS: Windows 7 Service Pack 1
CPU: x64
File System: NTFS
User: {computername}\{username}

-Scan Summary-
Scan Type: Threat Scan
Scan Initiated By: Manual
Result: Completed
Objects Scanned: 237392
Threats Detected: 2255
Threats Quarantined: 2255
Time Elapsed: 48 min, 59 sec

-Scan Options-
Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Enabled
Heuristics: Enabled
PUP: Detect
PUM: Detect

-Scan Details-
Process: 0
(No malicious items detected)

Module: 0
(No malicious items detected)

Registry Key: 1
Trojan.BrowserAssistant.Powershell, HKCU\SOFTWARE\REALISTIC MEDIA INC.\Browser Assistant, Quarantined, [3839], [661357],1.0.11712
Registry Value: 1
PUP.Optional.QXSearch, HKCU\SOFTWARE\GOOGLE\CHROME\PREFERENCEMACS\Default\extensions.settings|pidepfbnmnemhcencgnfhhfnfiebdgjk, Quarantined, [352], [676735],1.0.11712

Registry Data: 0
(No malicious items detected)

Data Stream: 0
(No malicious items detected)

Folder: 148
Trojan.BrowserAssistant.PS, C:\Users\{username}\AppData\Roaming\Browser Assistant\node_modules\@cliqz-oss\firefox-client\test, Quarantined, [3840], [710827],1.0.11712
Trojan.BrowserAssistant.PS, C:\Users\{username}\AppData\Roaming\Browser Assistant\extension\js, Quarantined, [3840], [710827],1.0.11712
Trojan.BrowserAssistant.PS, C:\Users\{username}\AppData\Roaming\Browser Assistant\node_modules, Quarantined, [3840], [710827],1.0.11712
Trojan.BrowserAssistant.PS, C:\Users\{username}\AppData\Roaming\Browser Assistant\WebDrivers, Quarantined, [3840], [710827],1.0.11712
Trojan.BrowserAssistant.PS, C:\Users\{username}\AppData\Roaming\Browser Assistant\extension, Quarantined, [3840], [710827],1.0.11712
Trojan.BrowserAssistant.PS, C:\Users\{username}\AppData\Roaming\Browser Assistant\edge\x86, Quarantined, [3840], [710827],1.0.11712
Trojan.BrowserAssistant.PS, C:\Users\{username}\AppData\Roaming\Browser Assistant\engine, Quarantined, [3840], [710827],1.0.11712
Trojan.BrowserAssistant.PS, C:\Users\{username}\AppData\Roaming\Browser Assistant\edge, Quarantined, [3840], [710827],1.0.11712
Trojan.BrowserAssistant.PS, C:\Users\{username}\AppData\Roaming\Browser Assistant\api, Quarantined, [3840], [710827],1.0.11712
Trojan.BrowserAssistant.PS, C:\USERS\{username}\APPDATA\ROAMING\BROWSER ASSISTANT, Quarantined, [3840], [710827],1.0.11712
Trojan.BrowserAssistant.Powershell, C:\USERS\{username}\APPDATA\ROAMING\MICROSOFT\WINDOWS\START MENU\PROGRAMS\STARTUP\UPDATER.LNK, Quarantined, [3839], [652810],1.0.11712

Physical Sector: 0
(No malicious items detected)

WMI: 0
(No malicious items detected)



You may see these entries in FRST logs:

Startup: C:\Users\{username}\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\BrowserAssistant.lnk [2019-07-25]
ShortcutTarget: BrowserAssistant.lnk -> C:\Users\{username}\AppData\Roaming\Browser Assistant\BrowserAssistant.exe (Realistic Media Inc. -> )
Startup: C:\Users\{username}\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\updater.lnk [2019-07-25]
ShortcutAndArgument: updater.lnk -> C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe => -noninteractive -ExecutionPolicy bypass -c “try{$w=”$env:APPDATA”+’\Browser Assistant\’;[Reflection.Assembly]::Load([System.IO.File]::ReadAllBytes($w+’Updater.dll’));$i=new-object u.U;$i.R()}catch{}”

C:\Users\{username}\AppData\Roaming\Browser Assistant

Browser Assistant (HKLM-x32\…\{367D5074-5E48-40AF-B009-7D3839DAE5E4}) (Version: 1.21.6922.27430 – Realistic Media Inc.)

Select your language