Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Combofix Problem/ Moved


  • Please log in to reply
9 replies to this topic

#1 mor2009

mor2009

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:10:02 PM

Posted 16 March 2009 - 08:38 PM

Had my computer turned off for a month while out of the country. When I returned and booted up, my security program (AVG Professional) and some Microsoft updates automatically updated. I am running Windows XP Home. My security program toolbar disappeared and I could not access the program to fix it. On the instruction of AVG tech support, I uninstalled AVG. When I tried to reinstall it, it would not install. After working with AVG tech support for a week, I contacted a local tech person, who also could not figure out why AVG would not reinstall. I purchased Norton Antivirus 2009 and it would not install either. I worked with Norton tech support and they could not assist me in getting the program to install.

I ran some "free" programs looking for virus or malware and could find none. During this process Malwarebytes and Combofix were run. I now realize that Combofix should not have been run without expert assistance, but that doesn't help me now. I now have a file call Qoobox which contains folders called "Quarantine" and "BackEnv". "BackEnv" contains files (appdata, favorites, cookies, local settings, etc) and my user profile files for these were "greyed out" and shown as hidden. I changed the properties to unhide them, but I no longer have a cookies folder in my user profile. Malwarebytes also created folders called MalwareRemovalBot and Malwarebytes and these both contain "quarantine" files. I have txt log files for combofix and for malwarebytes.

Some of these "free" programs were run with the tech support person present and I cannot say that Combofix was run with or without him present, but I must say, I did not see any warning to not run this without professional assistance. I will, however, take credit for all the problems.

Incidentally I did get a security system (Avast!) loaded. Most of my programs are working fine, but I do now get errors that Adobe Acrobat and Distiller won't load and I couldn't run my Turbotax program even though they are shown in my program files. As you can see, I am in way over my head. Are there any steps I can take to fix my user profiles and get rid of the quarantine mess without completely reinstalling my operating system? I don't understand why all these files were quarantined when it indicated that there was no virus found. I am averse to reinstalling my operating system because I have a satellite internet connection and local network which were not easy to install and that would all have to be redone. Am I just up a creek?

BC AdBot (Login to Remove)

 


#2 Orange Blossom

Orange Blossom

    OBleepin Investigator


  • Moderator
  • 37,011 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Bloomington, IN
  • Local time:01:02 AM

Posted 17 March 2009 - 12:02 AM

Hello mor2009 and welcome to BC :thumbsup:

As no logs have been posted, I am shifting this topic from the specialized HiJack This forum to the Am I Infected forum.

Please post the MalwareBytes log as a reply to this thread but DO NOT post the Combofix log.

I now realize that Combofix should not have been run without expert assistance


For the benefit of others reading this topic, please note that ComboFix is an extremely powerful tool which should only be used when instructed to do so by someone who has been properly trained. ComboFix is intended by its creator to be "used under the guidance and supervision of an expert." It is NOT for private use. Please read Combofix's Disclaimer. Using this tool incorrectly could lead to disastrous problems with your operating system such as preventing it from ever starting again.

Running ComboFix by yourself is like performing open heart surgery on yourself--the scalpel and other surgical tools that is ComboFix is meant to be wielded by a highly trained surgeon only in emergencies or dire circumstances. When the surgeon is thru s/he leaves the room. So combofix should be removed from a system once it has accomplished its job, unlike an AV that is there to protect you from future infections.

. . . CF does make some alterations to your system if you run it. Even if you had no malware removed and run the uninstall command, some things may be different now on your system. I can tell you that one thing is that all your restore points will be flushed out and a new one created. There is a good reason to do that when you have a severe infection--but if you aren't infected you might need those restore points.

Read and abide by the disclaimer people. It's there for a reason. Stick to running and protecting yourself with a good AV and firewall and an anti-malware scanner or two. If you feel you need a second opinion, try running online scans. If you feel you might need surgery, come here to BC and ask for help--that is what we're here for.


From: http://www.bleepingcomputer.com/forums/ind...t&p=1159014

Orange Blossom :flowers:
Help us help you. If HelpBot replies, you MUST follow step 1 in its reply so we know you need help.

Orange Blossom

An ounce of prevention is worth a pound of cure

SpywareBlaster, WinPatrol Plus, ESET Smart Security, Malwarebytes' Anti-Malware, NoScript Firefox ext., Norton noscript

#3 mor2009

mor2009
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:10:02 PM

Posted 19 March 2009 - 02:21 AM

Malwarebytes' Anti-Malware 1.32
Database version: 1621
Windows 5.1.2600 Service Pack 2

1/5/2009 6:31:14 PM
mbam-log-2009-01-05 (18-31-14).txt

Scan type: Quick Scan
Objects scanned: 55175
Time elapsed: 3 minute(s), 24 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 9
Registry Values Infected: 1
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 1

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CLASSES_ROOT\popcaploader.popcaploaderctrl2 (Adware.PopCap) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ModuleUsage\c:/windows/downloaded program files/popcaploader.dll (Adware.PopCap) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\TypeLib\{c9c5deaf-0a1f-4660-8279-9edfad6fefe1} (Adware.PopCap) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{e4e3e0f8-cd30-4380-8ce9-b96904bdefca} (Adware.PopCap) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{fe8a736f-4124-4d9c-b4b1-3b12381efabe} (Adware.PopCap) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{df780f87-ff2b-4df8-92d0-73db16a1543a} (Adware.PopCap) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{df780f87-ff2b-4df8-92d0-73db16a1543a} (Adware.PopCap) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{df780f87-ff2b-4df8-92d0-73db16a1543a} (Adware.PopCap) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\popcaploader.popcaploaderctrl2.1 (Adware.PopCap) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs\C:\WINDOWS\Downloaded Program Files\popcaploader.dll (Adware.PopCap) -> Quarantined and deleted successfully.

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\WINDOWS\Downloaded Program Files\popcaploader.dll (Adware.PopCap) -> Quarantined and deleted successfully.

#4 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,490 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:01:02 AM

Posted 19 March 2009 - 08:43 PM

Hello,looks like you are still infected. this file is comboFixes quarantine,I now have a file call Qoobox .

Let's do this.. You need to update MalwareBytes(MBAM).
Rerun MBAM like this.

Open MBAM in normal mode and click Update tab, select Check for Updates,when done
click Scanner tab,select Quick scan and scan.
After scan click Remove Selected, Post new scan log and Reboot into normal mode.


Next run ATF and SAS:
From your regular user account..
Download Attribune's ATF Cleaner and then SUPERAntiSpyware , Free Home Version. Save both to desktop ..
DO NOT run yet.
Open SUPER from icon and install and Update it
Under Scanner Options make sure the following are checked (leave all others unchecked):
Close browsers before scanning.
Scan for tracking cookies.
Terminate memory threats before quarantining
.
Click the "Close" button to leave the control center screen and exit the program. DO NOT run yet.

Now reboot into Safe Mode: How to enter safe mode(XP)
Using the F8 Method
Restart your computer.
When the machine first starts again it will generally list some equipment that is installed in your machine, amount of memory, hard drives installed etc. At this point you should gently tap the F8 key repeatedly until you are presented with a Windows XP Advanced Options menu.
Select the option for Safe Mode using the arrow keys.
Then press enter on your keyboard to boot into Safe Mode
.

Double-click ATF-Cleaner.exe to run the program.
Under Main "Select Files to Delete" choose: Select All.
Click the Empty Selected button.

If you use Firefox or Opera browser click that browser at the top and choose: Select All
Click the Empty Selected button.
If you would like to keep your saved passwords, please click No at the prompt.
Click Exit on the Main menu to close the program
.

NOW Scan with SUPER
Open from the desktop icon or the program Files list
On the left, make sure you check C:\Fixed Drive.
Perform a Complete scan. After scan,Verify they are all checked.
Click OK on the summary screen to quarantine all found items.
If asked if you want to reboot, click "Yes" and reboot normally.

To retrieve the removal information after reboot, launch SUPERAntispyware again.
Click Preferences, then click the Statistics/Logs tab.
Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
If there are several logs, click the current dated log and press View log.
A text file will open in your default text editor.
Please copy and paste the Scan Log results in your next reply.
Click Close to exit the program.


Please ask any needed questions,post 2 logs and Let us know how the PC is running now.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#5 mor2009

mor2009
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:10:02 PM

Posted 27 March 2009 - 12:48 PM

Malwarebytes' Anti-Malware 1.35
Database version: 1906
Windows 5.1.2600 Service Pack 2

3/27/2009 10:57:30 AM
mbam-log-2009-03-27 (10-57-30).txt

Scan type: Quick Scan
Objects scanned: 81674
Time elapsed: 6 minute(s), 34 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 9
Registry Values Infected: 1
Registry Data Items Infected: 2
Folders Infected: 3
Files Infected: 5

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CLASSES_ROOT\popcaploader.popcaploaderctrl2 (Adware.PopCap) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ModuleUsage\c:/windows/downloaded program files/popcaploader.dll (Adware.PopCap) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\TypeLib\{c9c5deaf-0a1f-4660-8279-9edfad6fefe1} (Adware.PopCap) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{e4e3e0f8-cd30-4380-8ce9-b96904bdefca} (Adware.PopCap) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{fe8a736f-4124-4d9c-b4b1-3b12381efabe} (Adware.PopCap) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{df780f87-ff2b-4df8-92d0-73db16a1543a} (Adware.PopCap) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{df780f87-ff2b-4df8-92d0-73db16a1543a} (Adware.PopCap) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{df780f87-ff2b-4df8-92d0-73db16a1543a} (Adware.PopCap) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\popcaploader.popcaploaderctrl2.1 (Adware.PopCap) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs\C:\WINDOWS\Downloaded Program Files\popcaploader.dll (Adware.PopCap) -> Quarantined and deleted successfully.

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\AntiVirusDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\FirewallDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

Folders Infected:
C:\Documents and Settings\Michelle\Application Data\MalwareRemovalBot (Rogue.MalwareRemovalBot) -> Quarantined and deleted successfully.
C:\Documents and Settings\Michelle\Application Data\MalwareRemovalBot\Log (Rogue.MalwareRemovalBot) -> Quarantined and deleted successfully.
C:\Documents and Settings\Michelle\Application Data\MalwareRemovalBot\Settings (Rogue.MalwareRemovalBot) -> Quarantined and deleted successfully.

Files Infected:
C:\WINDOWS\Downloaded Program Files\popcaploader.dll (Adware.PopCap) -> Quarantined and deleted successfully.
C:\Documents and Settings\Michelle\Application Data\MalwareRemovalBot\rs.dat (Rogue.MalwareRemovalBot) -> Quarantined and deleted successfully.
C:\Documents and Settings\Michelle\Application Data\MalwareRemovalBot\Log\2009 Jan 05 - 06_42_44 PM_171.log (Rogue.MalwareRemovalBot) -> Quarantined and deleted successfully.
C:\Documents and Settings\Michelle\Application Data\MalwareRemovalBot\Settings\ScanResults.pie (Rogue.MalwareRemovalBot) -> Quarantined and deleted successfully.
C:\WINDOWS\Tasks\MalwareRemovalBot Scheduled Scan.job (Rogue.MalwareRemovalBot) -> Quarantined and deleted successfully.

#6 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,490 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:01:02 AM

Posted 27 March 2009 - 01:22 PM

Ok that was good. Do the AFT and SAS and let's see what else is left. Tell me how it's running after those,.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#7 mor2009

mor2009
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:10:02 PM

Posted 27 March 2009 - 01:37 PM

I ran ATF, althoughthere was no prompt that came up to allow be to keep my saved passwords, which is a drag.

I then tried to run SuperAntispyware, but had the following problems:

1) when I tried to run the update, I got an error that it could not retrieve update definitions and to make sure that my firewall was not blocking the SuperAntispyware. I went into Windows Firewall and added that program to my exceptions list and got the same error.

2) I went ahead and tried to run Super without updating and got an error that Windows Installer could not be accessed in Safe Mode.

Since the instructions were to run it in Safe Mode, I stopped there.

#8 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,490 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:01:02 AM

Posted 27 March 2009 - 02:13 PM

Ok you can run it in normal ,it's just not as strong. It seems you Windows instaleer may be damaged to cause those 2 issues.
So either Reregister or re Intstall the Windows Installer see the 2 methods here.
http://support.microsoft.com/kb/315346
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#9 mor2009

mor2009
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:10:02 PM

Posted 27 March 2009 - 06:56 PM

Here is the scan log. It took a long time to run because it kept stopping and required me to hit "ok" numerous times to quarantine the files. Are you supposed to remove all these files? I see one is from "Bleeping Computers".



SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 03/27/2009 at 04:59 PM

Application Version : 4.26.1000

Core Rules Database Version : 3816
Trace Rules Database Version: 1770

Scan type : Complete Scan
Total Scan Time : 03:10:31

Memory items scanned : 734
Memory threats detected : 0
Registry items scanned : 5491
Registry threats detected : 0
File items scanned : 157498
File threats detected : 12

Adware.Tracking Cookie
C:\Documents and Settings\Michelle\Cookies\michelle@specificmedia[2].txt
C:\Documents and Settings\Michelle\Cookies\michelle@adrevolver[1].txt
C:\Documents and Settings\Michelle\Cookies\michelle@advertising[2].txt
C:\Documents and Settings\Michelle\Cookies\michelle@ads.bleepingcomputer[1].txt
C:\Documents and Settings\Michelle\Cookies\michelle@yieldmanager[1].txt
C:\Documents and Settings\Michelle\Cookies\michelle@atdmt[1].txt
C:\Documents and Settings\Michelle\Cookies\michelle@media6degrees[2].txt
C:\Documents and Settings\Michelle\Cookies\michelle@specificclick[1].txt
C:\Documents and Settings\Michelle\Cookies\michelle@media.adrevolver[1].txt
C:\Documents and Settings\Michelle\Cookies\michelle@ad.yieldmanager[1].txt
C:\Documents and Settings\Michelle\Cookies\michelle@trafficmp[1].txt
C:\Documents and Settings\Michelle\Cookies\michelle@dynamic.media.adrevolver[2].txt

#10 DaChew

DaChew

    Visiting Alien


  • Members
  • 10,317 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:millenium falcon and rockytop
  • Local time:01:02 AM

Posted 28 March 2009 - 12:22 AM

Those are just harmless cookies, SAS should be installed and updated in normal mode, not safe.

Rerun MBAM with a full scan of all drives but CD/DVD
Chewy

No. Try not. Do... or do not. There is no try.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users