What is VDoctor?
The Malwarebytes research team has determined that VDoctor is a fake anti-malware application. These so-called "rogues" use intentional false positives to convince users that their systems have been compromised. Then they try to sell you their software, claiming it will remove these threats. In extreme cases the false threats are actually the very trojans that advertise or even directly install the rogue. You are strongly advised to follow our removal instructions below.
How do I know if I am infected with VDoctor?
This is how the main screen of the rogue application looks:

You will find these icons on your desktop and in your taskbar:

And see these warnings:


How did VDoctor get on my computer?
Rogue programs use different methods for spreading themselves. This particular one was downloaded from their site.
How do I remove VDoctor?
Our program Malwarebytes' Anti-Malware can detect and remove this rogue application.
- Please download Malwarebytes' Anti-Malware to your desktop.
- Double-click mbam-setup.exe and follow the prompts to install the program.
- At the end, be sure a check-mark is placed next to the following:
- Update Malwarebytes' Anti-Malware
- Launch Malwarebytes' Anti-Malware
- Then click Finish.
- If an update is found, it will download and install the latest version.
- Once the program has loaded, select Perform quick scan, then click Scan.
- When the scan is complete, click OK, then Show Results to view the results.
- Be sure that everything is checked, and click Remove Selected. Reboot your computer if prompted.
- When completed, a log will open in Notepad. The rogue application should now be gone.
Is there anything else I need to do to get rid of VDoctor?
- No, Malwarebytes' Anti-Malware removes VDoctor completely.
How would the full version of Malwarebytes' Anti-Malware help protect me?
We hope our application has helped you eradicate this malicious software. If your current security solution let this infection through, you might please consider purchasing the FULL version of Malwarebytes' Anti-Malware for additional protection.
As you can see below the full version of Malwarebytes' Anti-Malware would have protected you against the VDoctor rogue. It would have warned you before the rogue could install itself, giving you a chance to stop it before it became too late.
Signs in a HijackThis log:
C:\Program Files\VDoctor\vdoctor.exe C:\Program Files\VDoctor\vdoctors.exe O4 - HKCU\..\Run: [VDoctor] C:\Program Files\VDoctor\vdoctorp.exe
Alterations made by the installer:
File System =============== In the existing folder C:\Documents and Settings\All Users\Desktop Adds the file ???????.lnk"="14:01 03/07/10 681 bytes Adds the folder C:\Documents and Settings\All Users\Start Menu\Programs\??????? Adds the file ??????? ????.lnk"="14:01 03/07/10 687 bytes Adds the file ??????? ????.lnk"="14:01 03/07/10 693 bytes Adds the folder C:\Program Files\VDoctor Adds the file vh.dat"="14:03 03/07/10 683 bytes Adds the file vdoctoru.exe"="17:47 22/06/10 264440 bytes Adds the file vdoctors.exe"="17:40 22/06/10 348408 bytes Adds the file vdoctorr.exe"="17:47 22/06/10 238840 bytes Adds the file vdoctorp.exe"="17:47 22/06/10 386296 bytes Adds the file vdoctorl.exe"="17:47 22/06/10 108792 bytes Adds the file vdoctorc.dll"="17:47 22/06/10 52472 bytes Adds the file vdoctor.exe"="17:40 22/06/10 891640 bytes Adds the file vd12.vdb"="17:47 22/06/10 204288 bytes Adds the file vd11.vdb"="17:47 22/06/10 204512 bytes Adds the file vd10.vdb"="17:47 22/06/10 201824 bytes Adds the file vd09.vdb"="17:47 22/06/10 204160 bytes Adds the file vd08.vdb"="17:47 22/06/10 203904 bytes Adds the file vd07.vdb"="17:47 22/06/10 204160 bytes Adds the file vd06.vdb"="17:47 22/06/10 204128 bytes Adds the file vd05.vdb"="17:47 22/06/10 204352 bytes Adds the file vd04.vdb"="17:47 22/06/10 204736 bytes Adds the file vd03.vdb"="17:47 22/06/10 203648 bytes Adds the file vd02.vdb"="17:47 22/06/10 138880 bytes Adds the file vd01.vdb"="17:47 22/06/10 202464 bytes Adds the file vd.dat"="17:51 22/06/10 610 bytes In the existing folder C:\WINDOWS\system32 Adds the file vdoctor.not"="17:57 10/06/10 1 bytes Registry =============== [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\???????_is1] "DisplayVersion"="'ver 1.0'" "NoRepair"="1" "NoModify"="1" "URLUpdateInfo"="'http://www.vdoctor.co.kr'" "HelpLink"="'http://www.vdoctor.co.kr'" "URLInfoAbout"="'http://www.vdoctor.co.kr'" "Publisher"="'Copyright (C)2009 VDoctor All Right Reserved.'" "UninstallString"="'C:\Program Files\VDoctor\vdoctoru.exe'" "DisplayName"="'PC??????? ???????'" "Inno Setup: User"="'{username}'" "Inno Setup: Icon Group"="'???????'" "InstallLocation"="'C:\Program Files\VDoctor\'" "Inno Setup: App Path"="'C:\Program Files\VDoctor'" "Inno Setup: Setup Version"="'5.0.8'" [HKEY_CURRENT_USER\Software\VDoctor] "ldate"="'2010.7.3'" "eng"="'2010.06.22.1'" "RST"="1" "ASH"="1" "com"="'vdsite'" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run] "VDoctor"="'C:\Program Files\VDoctor\vdoctorp.exe'"
Malwarebytes' Anti-Malware log:
Malwarebytes' Anti-Malware 1.46 www.malwarebytes.org Database version: 4269 Windows 5.1.2600 Service Pack 3 Internet Explorer 6.0.2900.5512 7/3/2010 2:11:08 PM mbam-log-2010-07-03 (14-11-08).txt Scan type: Quick scan Objects scanned: 112798 Time elapsed: 3 minute(s), 45 second(s) Memory Processes Infected: 2 Memory Modules Infected: 0 Registry Keys Infected: 2 Registry Values Infected: 1 Registry Data Items Infected: 3 Folders Infected: 1 Files Infected: 25 Memory Processes Infected: C:\Program Files\VDoctor\vdoctor.exe (Rogue.VDoctor) -> Unloaded process successfully. C:\Program Files\VDoctor\vdoctors.exe (Rogue.VDoctor) -> Unloaded process successfully. Memory Modules Infected: (No malicious items detected) Registry Keys Infected: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\???????_is1 (Rogue.VDoctor) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\Software\VDoctor (Rogue.VDoctor) -> Quarantined and deleted successfully. Registry Values Infected: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vdoctor (Rogue.VDoctor) -> Quarantined and deleted successfully. Registry Data Items Infected: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\AntiVirusDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\FirewallDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\UpdatesDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully. Folders Infected: C:\Program Files\VDoctor (Rogue.VDoctor) -> Quarantined and deleted successfully. Files Infected: C:\Program Files\VDoctor\vdoctor.exe (Rogue.VDoctor) -> Quarantined and deleted successfully. C:\Program Files\VDoctor\vdoctors.exe (Rogue.VDoctor) -> Quarantined and deleted successfully. C:\Program Files\VDoctor\vd.dat (Rogue.VDoctor) -> Quarantined and deleted successfully. C:\Program Files\VDoctor\vd01.vdb (Rogue.VDoctor) -> Quarantined and deleted successfully. C:\Program Files\VDoctor\vd02.vdb (Rogue.VDoctor) -> Quarantined and deleted successfully. C:\Program Files\VDoctor\vd03.vdb (Rogue.VDoctor) -> Quarantined and deleted successfully. C:\Program Files\VDoctor\vd04.vdb (Rogue.VDoctor) -> Quarantined and deleted successfully. C:\Program Files\VDoctor\vd05.vdb (Rogue.VDoctor) -> Quarantined and deleted successfully. C:\Program Files\VDoctor\vd06.vdb (Rogue.VDoctor) -> Quarantined and deleted successfully. C:\Program Files\VDoctor\vd07.vdb (Rogue.VDoctor) -> Quarantined and deleted successfully. C:\Program Files\VDoctor\vd08.vdb (Rogue.VDoctor) -> Quarantined and deleted successfully. C:\Program Files\VDoctor\vd09.vdb (Rogue.VDoctor) -> Quarantined and deleted successfully. C:\Program Files\VDoctor\vd10.vdb (Rogue.VDoctor) -> Quarantined and deleted successfully. C:\Program Files\VDoctor\vd11.vdb (Rogue.VDoctor) -> Quarantined and deleted successfully. C:\Program Files\VDoctor\vd12.vdb (Rogue.VDoctor) -> Quarantined and deleted successfully. C:\Program Files\VDoctor\vdoctorc.dll (Rogue.VDoctor) -> Quarantined and deleted successfully. C:\Program Files\VDoctor\vdoctorl.exe (Rogue.VDoctor) -> Quarantined and deleted successfully. C:\Program Files\VDoctor\vdoctorp.exe (Rogue.VDoctor) -> Quarantined and deleted successfully. C:\Program Files\VDoctor\vdoctorr.exe (Rogue.VDoctor) -> Quarantined and deleted successfully. C:\Program Files\VDoctor\vdoctoru.exe (Rogue.VDoctor) -> Quarantined and deleted successfully. C:\Program Files\VDoctor\vh.dat (Rogue.VDoctor) -> Quarantined and deleted successfully. C:\Documents and Settings\All Users\Desktop\???????.lnk (Rogue.VDoctor) -> Quarantined and deleted successfully. C:\Documents and Settings\All Users\Start Menu\Programs\???????\??????? ????.lnk (Rogue.VDoctor) -> Quarantined and deleted successfully. C:\Documents and Settings\All Users\Start Menu\Programs\???????\??????? ????.lnk (Rogue.VDoctor) -> Quarantined and deleted successfully. C:\WINDOWS\system32\vdoctor.not (Rogue.Trace) -> Quarantined and deleted successfully.
As mentioned before the full version of Malwarebytes' Anti-Malware could have protected your computer against this threat.
We use different ways of protecting your computer(s):
- Dynamically Blocks Malware Sites & Servers
- Malware Execution Prevention