Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

antimalware doctor and security suite infestation


  • This topic is locked This topic is locked
21 replies to this topic

#1 travis73005

travis73005

  • Members
  • 25 posts
  • OFFLINE
  •  
  • Local time:06:20 AM

Posted 21 August 2010 - 03:52 PM

Antimalware doctor and security suite piggy backed java application. Constant popups. Dowloaded rkill, iexplorer, and explorer. takes about 50 times trying to run the program before they can gain access. Virus shuts them down immediately. After receiving the message that they are finally successful and completing scan using malwarebytes computer is restarted and the virus is still there. malewarebytes found about 30 infected files and removed them the first time, but after that scans come back clean or there is only 2 infected files to remove. completed tdsskiller scanned and removed files. Tried before mentioned in safe mode to no avail. We were able to disconnet proxy server.

we tried rkill and malewarebytes again in safe mode and were able to get rid of the antimaleware doctor and security suite. Used autorun download to delete rundll file. Began to be transferred to other sites when on internet and now receiving alerts from Microsoft Security Essentials that firefox.exe is a trojan that needs to be removed. Ugh!! Can't seem to get rid of this thing. Using safe mode to post this.

EDIT: Posts merged ~BP

Attached Files


Edited by Budapest, 22 August 2010 - 12:19 AM.


BC AdBot (Login to Remove)

 


#2 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:10:20 AM

Posted 27 August 2010 - 08:09 PM

Hi,

Welcome to Bleeping Computer. My name is m0le and I will be helping you with your log.
  • Please subscribe to this topic, if you haven't already. You can subscribe by clicking the Options box to the right of your topic title and selecting Track This Topic.

  • Please avoid installing/uninstalling or updating any programs and attempting any unsupervised fixes or scans. This can make helping you impossible.

  • Please reply to this post so I know you are there.
The forum is busy and we need to have replies as soon as possible. If I haven't had a reply after 3 days I will bump the topic and if you do not reply by the following day after that then I will close the topic.

Once I receive a reply then I will return with your first instructions.

Thanks thumbup2.gif
Posted Image
m0le is a proud member of UNITE

#3 travis73005

travis73005
  • Topic Starter

  • Members
  • 25 posts
  • OFFLINE
  •  
  • Local time:06:20 AM

Posted 01 September 2010 - 08:10 AM

okay, what do u need me to do?

#4 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:10:20 AM

Posted 01 September 2010 - 06:15 PM

There's a rootkit still present so let's check that out first.

Please download MBRCheck to your desktop.

1. Double click MBRCheck.exe to run it (Right click and run as Administrator for Vista).
2. It will open a black window, please do not fix anything (if it gives you an option).
3. Exit that window and it will produce a log (MBRCheck_date_time).
4. Please post that log when you reply.
Posted Image
m0le is a proud member of UNITE

#5 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:10:20 AM

Posted 05 September 2010 - 05:03 AM

Hi,

I have not had a reply from you for 3 days. Can you please tell me if you still need help with your computer as I am unable to help other members with their problems while I have your topic still open. The time taken between posts can also change the situation with your PC making it more difficult to help you.

If you like you can PM me.

Thanks,


m0le
Posted Image
m0le is a proud member of UNITE

#6 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:10:20 AM

Posted 05 September 2010 - 07:22 PM

This topic has been closed.

If you're the topic starter, and need this topic reopened, please contact me via pm with the address of the thread.

Everyone else please begin a New Topic.
Posted Image
m0le is a proud member of UNITE

#7 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:10:20 AM

Posted 07 September 2010 - 08:14 AM

Reopened at user's request

-----------------------------------------

Please post the MBRCheck log. smile.gif
Posted Image
m0le is a proud member of UNITE

#8 travis73005

travis73005
  • Topic Starter

  • Members
  • 25 posts
  • OFFLINE
  •  
  • Local time:06:20 AM

Posted 07 September 2010 - 08:36 AM

I got notification this time. Maybe I was just overlooking them before.
attached info as requested

Attached Files



#9 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:10:20 AM

Posted 07 September 2010 - 08:41 AM

Now we are going to run Combofix to remove this rootkit. Please read the following carefully, Combofix is a powerful program.

Please download ComboFix from one of these locations:* IMPORTANT !!! Save ComboFix.exe to your Desktop making sure you rename it comfix.exe
  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. (Click on this link to see a list of programs that should be disabled. The list is not all inclusive.)
  • Double click on Comfix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.



Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:



Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.
Posted Image
m0le is a proud member of UNITE

#10 travis73005

travis73005
  • Topic Starter

  • Members
  • 25 posts
  • OFFLINE
  •  
  • Local time:06:20 AM

Posted 07 September 2010 - 09:49 AM

ran it twice. had my antivirus set to enable at startup. didn't realize combofix would require startup

Attached Files



#11 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:10:20 AM

Posted 07 September 2010 - 09:57 AM

Can I have the first log?

Please go to Start >Run > and copy/paste the following, then press Enter

C:\QooBox\ComboFix-quarantined-files.txt

A log file should open. Please post that in your next reply.
Posted Image
m0le is a proud member of UNITE

#12 travis73005

travis73005
  • Topic Starter

  • Members
  • 25 posts
  • OFFLINE
  •  
  • Local time:06:20 AM

Posted 07 September 2010 - 10:02 AM

do you prefer me to copy and paste the file or attach? Is that the file from the first run or something separate? If not, where do I find the first run file?

#13 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:10:20 AM

Posted 07 September 2010 - 10:08 AM

The log at ComboFix-quarantined-files.txt will be the first run log.

I prefer if you paste it rather than attach it. thumbup2.gif
Posted Image
m0le is a proud member of UNITE

#14 travis73005

travis73005
  • Topic Starter

  • Members
  • 25 posts
  • OFFLINE
  •  
  • Local time:06:20 AM

Posted 07 September 2010 - 10:09 AM

2010-09-07 14:40:22 . 2010-09-07 14:40:22 972 ----a-w- C:\Qoobox\Quarantine\Registry_backups\AddRemove-Search Toolbar.reg.dat
2010-09-07 14:40:13 . 2010-09-07 14:40:13 546 ----a-w- C:\Qoobox\Quarantine\Registry_backups\SafeBoot-klmdb.sys.reg.dat
2010-09-07 14:35:06 . 2010-09-07 14:35:06 146 ----a-w- C:\Qoobox\Quarantine\Registry_backups\HKLM-Run-Bciko.reg.dat
2010-09-07 14:35:04 . 2010-09-07 14:35:04 1,952 ----a-w- C:\Qoobox\Quarantine\Registry_backups\WebBrowser-{D4027C7F-154A-4066-A1AD-4243D8127440}.reg.dat
2010-09-07 14:35:04 . 2010-09-07 14:35:04 183 ----a-w- C:\Qoobox\Quarantine\Registry_backups\WebBrowser-{9D425283-D487-4337-BAB6-AB8354A81457}.reg.dat
2010-09-07 14:35:03 . 2010-09-07 14:35:03 132 ----a-w- C:\Qoobox\Quarantine\Registry_backups\Toolbar-{CCC7A320-B3CA-4199-B1A6-9F516DD69829}.reg.dat
2010-09-07 14:35:03 . 2010-09-07 14:35:03 1,897 ----a-w- C:\Qoobox\Quarantine\Registry_backups\Toolbar-{D4027C7F-154A-4066-A1AD-4243D8127440}.reg.dat
2010-09-07 14:35:03 . 2010-09-07 14:35:03 126 ----a-w- C:\Qoobox\Quarantine\Registry_backups\Toolbar-{9D425283-D487-4337-BAB6-AB8354A81457}.reg.dat
2010-09-07 14:35:02 . 2010-09-07 14:35:02 904 ----a-w- C:\Qoobox\Quarantine\Registry_backups\BHO-{D4027C7F-154A-4066-A1AD-4243D8127440}.reg.dat
2010-09-07 14:35:02 . 2010-09-07 14:35:02 470 ----a-w- C:\Qoobox\Quarantine\Registry_backups\URLSearchHooks-{00000000-6E41-4FD3-8538-502F5495E5FC}.reg.dat
2010-09-07 14:29:30 . 2010-09-07 14:29:30 1,522 ----a-w- C:\Qoobox\Quarantine\Registry_backups\Service_xyoohipr.reg.dat
2010-09-07 14:29:30 . 2010-09-07 14:29:30 1,334 ----a-w- C:\Qoobox\Quarantine\Registry_backups\Legacy_xyoohipr.reg.dat
2010-09-07 14:28:27 . 2010-09-07 14:44:08 9,450 ----a-w- C:\Qoobox\Quarantine\Registry_backups\tcpip.reg
2010-09-07 14:24:08 . 2010-09-07 14:41:43 102 ----a-w- C:\Qoobox\Quarantine\catchme.log
2010-08-21 02:21:16 . 2010-08-21 02:21:16 2,838 ----a-w- C:\Qoobox\Quarantine\C\WINDOWS\isuholuhuzi.dll.vir
2010-08-21 02:17:00 . 2010-08-21 02:17:00 2,838 ----a-w- C:\Qoobox\Quarantine\C\WINDOWS\usiciwiq.dll.vir
2010-08-21 01:15:33 . 2010-08-21 01:15:33 2,838 ----a-w- C:\Qoobox\Quarantine\C\WINDOWS\opucubucamot.dll.vir
2010-08-20 20:43:27 . 2010-08-21 02:37:51 302 ----a-w- C:\Qoobox\Quarantine\C\Documents and Settings\Administrator\Application Data\7B81F24973D6A0D587CC954F7344F796\lsrslt.ini.vir
2010-08-20 20:18:33 . 2010-08-20 20:18:33 2,838 ----a-w- C:\Qoobox\Quarantine\C\WINDOWS\evalasihikilu.dll.vir
2010-08-20 20:01:30 . 2010-08-20 20:01:30 764 ----a-w- C:\Qoobox\Quarantine\C\Documents and Settings\Administrator\Local Settings\Application Data\{D6753541-DDE1-4960-8047-209C2760F133}\install.rdf.vir
2010-08-20 20:01:30 . 2010-08-20 20:01:30 5,954 ----a-w- C:\Qoobox\Quarantine\C\Documents and Settings\Administrator\Local Settings\Application Data\{D6753541-DDE1-4960-8047-209C2760F133}\chrome\content\overlay.xul.vir
2010-08-20 20:01:30 . 2010-08-20 20:01:30 2,166 ----a-w- C:\Qoobox\Quarantine\C\Documents and Settings\Administrator\Local Settings\Application Data\{D6753541-DDE1-4960-8047-209C2760F133}\chrome\content\_cfg.js.vir
2010-08-20 20:01:30 . 2010-08-20 20:01:30 122 ----a-w- C:\Qoobox\Quarantine\C\Documents and Settings\Administrator\Local Settings\Application Data\{D6753541-DDE1-4960-8047-209C2760F133}\chrome.manifest.vir
2010-08-20 20:00:03 . 2010-08-22 01:45:10 0 ----a-w- C:\Qoobox\Quarantine\C\WINDOWS\system32\drivers\xyoohipr.sys.vir
2010-08-20 20:00:02 . 2010-08-20 20:00:02 28,842 ----a-w- C:\Qoobox\Quarantine\C\Documents and Settings\Administrator\Application Data\7B81F24973D6A0D587CC954F7344F796\enemies-names.txt.vir
2010-08-20 20:00:02 . 2010-08-20 20:00:02 26,602 ----a-w- C:\Qoobox\Quarantine\C\Documents and Settings\Administrator\Application Data\7B81F24973D6A0D587CC954F7344F796\local.ini.vir
2010-08-20 19:59:40 . 2010-08-20 19:59:40 38,566 ----a-w- C:\Qoobox\Quarantine\C\Documents and Settings\Administrator\Local Settings\Application Data\Windows Server\server.dat.vir
2010-08-20 18:49:11 . 2010-08-21 15:29:52 134 ----a-w- C:\Qoobox\Quarantine\C\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\in0qu449.default\extensions\{79c6ca3d-14a8-4c64-b8a0-026104e7f02e}\chrome.manifest.vir
2010-08-20 18:49:11 . 2010-08-21 15:29:52 771 ----a-w- C:\Qoobox\Quarantine\C\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\in0qu449.default\extensions\{79c6ca3d-14a8-4c64-b8a0-026104e7f02e}\install.rdf.vir
2010-08-20 18:49:11 . 2010-08-21 15:29:52 3,538 ----a-w- C:\Qoobox\Quarantine\C\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\in0qu449.default\extensions\{79c6ca3d-14a8-4c64-b8a0-026104e7f02e}\chrome\xulcache.jar.vir
2010-08-20 18:49:11 . 2010-08-21 15:29:52 255 ----a-w- C:\Qoobox\Quarantine\C\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\in0qu449.default\extensions\{79c6ca3d-14a8-4c64-b8a0-026104e7f02e}\defaults\preferences\xulcache.js.vir
2010-08-20 18:49:08 . 2010-08-21 15:28:54 51 ----a-w- C:\Qoobox\Quarantine\C\Documents and Settings\Administrator\Application Data\02000000685de181985C.manifest.vir
2010-08-20 18:49:08 . 2010-08-21 15:28:54 138 ----a-w- C:\Qoobox\Quarantine\C\Documents and Settings\Administrator\Application Data\02000000685de181985O.manifest.vir
2010-08-20 18:49:08 . 2010-08-21 15:30:04 3,636 ----a-w- C:\Qoobox\Quarantine\C\Documents and Settings\Administrator\Application Data\02000000685de181985P.manifest.vir
2010-08-20 18:49:08 . 2010-08-21 15:28:54 11 ----a-w- C:\Qoobox\Quarantine\C\Documents and Settings\Administrator\Application Data\02000000685de181985S.manifest.vir
2010-08-20 03:33:54 . 2010-04-08 14:52:20 45,744 ----a-w- C:\Qoobox\Quarantine\C\Program Files\Search Toolbar\SearchToolbarUpdater.exe.vir
2010-04-08 14:52:20 . 2010-04-08 14:52:20 110,376 ----a-w- C:\Qoobox\Quarantine\C\Program Files\Search Toolbar\SearchToolbarUninstall.exe.vir
2010-01-26 21:05:16 . 2010-01-26 21:05:16 25,214 ----a-w- C:\Qoobox\Quarantine\C\Program Files\Search Toolbar\icon.ico.vir


#15 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:10:20 AM

Posted 07 September 2010 - 10:14 AM

Thanks. I can now see what Combofix did first time around. thumbup2.gif


Just a few things to fix here.

1. Close any open browsers.

2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

3. Open notepad and copy/paste the text in the box below into it:

QUOTE
DDS::
uInternet Settings,ProxyServer = http=127.0.0.1:6522

RegLock::
[HKEY_USERS\S-1-5-21-1801674531-706699826-682003330-500\Software\Microsoft\Internet Explorer\User Preferences]


Save this as CFScript.txt, in the same location as Comfix.exe (called ComboFix.exe in the below graphic)




Refering to the picture above, drag CFScript into ComboFix.exe

If the program requests for you to update Combofix then click Yes.

When finished, it shall produce a log for you at C:\ComboFix.txt which I will require in your next reply.
Posted Image
m0le is a proud member of UNITE




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users