WiredWX Hobby Weather ToolsLog in

 


if this is BankerFox.a, how to get rid without internet?

2 posters

descriptionif this is BankerFox.a, how to get rid without internet? - Page 2 EmptyRe: if this is BankerFox.a, how to get rid without internet?

more_horiz
roger that! going back to the office and will do this from the infected computer. i will have to click off on the virus popups in order to do this. just in case, i'm copying these instructions and taking them with me on the thumbdrive. be back in a bit... - reeko

descriptionif this is BankerFox.a, how to get rid without internet? - Page 2 EmptyRe: if this is BankerFox.a, how to get rid without internet?

more_horiz
Post the logs from the infected machine and we can finish this off quicker than you going back and forth. 😉

descriptionif this is BankerFox.a, how to get rid without internet? - Page 2 EmptyRe: if this is BankerFox.a, how to get rid without internet?

more_horiz
i see Belahzur is not online.... dammit. i couldn't post here from the infected computer because the infection will NOT allow me to stay on the geekpolice site more than a few seconds. it KNOWS who u guys are!!!

here is the latest avenger file that you wanted. i also did NOT run the Malwarebytes removal. plz let me know when i can do that:

Logfile of The Avenger Version 2.0, (c) by Swandog46
http://swandog46.geekstogo.com

Platform: Windows XP

*******************

Script file opened successfully.
Script file read successfully.

Backups directory opened successfully at C:\Avenger

*******************

Beginning to process script file:

Rootkit scan active.
No rootkits found!

Driver "UACd.sys" deleted successfully.
File "C:\WINDOWS\system32\drivers\UACixllrvxm.sys" deleted successfully.

Completed script processing.

*******************

Finished! Terminate.

descriptionif this is BankerFox.a, how to get rid without internet? - Page 2 EmptyRe: if this is BankerFox.a, how to get rid without internet?

more_horiz
from what i've read about BankerFox.a, it just steals data right? then how could this one that looks like it - with all the same popups - be evolved to know that it is under attack and tries to protect itself? it KNOWS the geekpolice website apparently, as well as any other fix site. how does it do that? is this malware that evolves?

descriptionif this is BankerFox.a, how to get rid without internet? - Page 2 EmptyRe: if this is BankerFox.a, how to get rid without internet?

more_horiz
Back online.
May malware block websites to stop users from getting it. We weren't blocked as far as I knew because were still only small, but lately we have attracted attention from some good guys and the bad guys from the looks of it.

UACd.sys is a varaint of a rootkit known as TDSS, it has awesome powers to be able to hide deep down in the system, there's only a few tools that are able to take it down. The avenger being one is very powerful, but the bad guys haven't figured this out yet.

Don't give up on me, were winning this fight.

We can use MBAM now.

Double Click mbam-setup.exe to install the application.

  • Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select "Perform Quick Scan", then click Scan.
  • The scan may take some time to finish,so please be patient.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Make sure that everything is checked, and click Remove Selected.
  • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart. (See Note)
  • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
Note:
If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts.
Click OK to either and let MBAM proceed with the disinfection process.
If asked to restart the computer, please do so immediately.


Post the contents of the MBAM Log.

descriptionif this is BankerFox.a, how to get rid without internet? - Page 2 EmptyRe: if this is BankerFox.a, how to get rid without internet?

more_horiz
roger that. printed out the instructions and will go now with the Malwarebytes on my thumbdrive. be back later - hopefully on the infected computer (if successful) and if not, then back over here. reeko

descriptionif this is BankerFox.a, how to get rid without internet? - Page 2 EmptyRe: if this is BankerFox.a, how to get rid without internet?

more_horiz
limited success! i am posting this from the infected computer - however, there was a popup immediately prior to this saying "Internet Explorer cannot open the internet site http://www.geekpolice......... etc..." and it shut off and went to the windows error msg. i then hit the "refresh" button and it came back here. i am writing this now and sending it.... now

descriptionif this is BankerFox.a, how to get rid without internet? - Page 2 EmptyRe: if this is BankerFox.a, how to get rid without internet?

more_horiz
Told you were making progress.
You can see how powerful and annoying this rootkit can be.

Any MBAM log yet?

descriptionif this is BankerFox.a, how to get rid without internet? - Page 2 EmptyRe: if this is BankerFox.a, how to get rid without internet?

more_horiz
seems to be working, but that popup isn't right.

congratulations! u guys are being noticed by the hackers who build these stupid malwares! LOL

here comes the mbam log. this thing was HUGE. it found 32 infected files. i also am in the habit of always running Windows Task Manager to monitor how many processes and CPU time is running while i work. normal is 32 processes. during the malware attack it was 41 processes. it is now back closer to normal = 34 processes. so i think we done good... but not sure yet. here is the log:

Malwarebytes' Anti-Malware 1.35
Database version: 1916
Windows 5.1.2600 Service Pack 3

3/29/2009 7:19:10 PM
mbam-log-2009-03-29 (19-19-09).txt

Scan type: Quick Scan
Objects scanned: 88834
Time elapsed: 15 minute(s), 10 second(s)

Memory Processes Infected: 2
Memory Modules Infected: 0
Registry Keys Infected: 7
Registry Values Infected: 3
Registry Data Items Infected: 1
Folders Infected: 1
Files Infected: 18

Memory Processes Infected:
C:\WINDOWS\sysguard.exe (Trojan.Agent) -> Unloaded process

successfully.
C:\WINDOWS\svcho.exe (Trojan.Agent) -> Unloaded process successfully.

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\B

rowser Helper Objects\{92108c26-f8bc-4a12-bae9-2ef17bead0ee}

(Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows

NT\CurrentVersion\Winlogon\Notify\pkyhmnmp (Trojan.Vundo.H) ->

Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{92108c26-f8bc-4a12-bae9-2ef17bead0ee}

(Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\B

rowser Helper Objects\{abd42510-9b22-41cd-9dcd-8182a2d07c63}

(Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{abd42510-9b22-41cd-9dcd-8182a2d07c63}

(Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\UAC (Rootkit.Trace) -> Quarantined and

deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\AvScan (Malware.Trace) -> Quarantined and

deleted successfully.

Registry Values Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ex

plorer\Run\svcho (Trojan.Agent) -> Quarantined and deleted

successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\system

tool (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows

NT\CurrentVersion\Network\UID (Malware.Trace) -> Quarantined and

deleted successfully.

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows

NT\CurrentVersion\Winlogon\Userinit (Hijack.UserInit) -> Bad:

(C:\WINDOWS\SYSTEM32\Userinit.exe,C:\WINDOWS\system32\sdra64.exe,)

Good: (userinit.exe) -> Quarantined and deleted successfully.

Folders Infected:
C:\WINDOWS\SYSTEM32\lowsec (Spyware.StolenData) -> Quarantined and

deleted successfully.

Files Infected:
c:\windows\system32\csrwecy.dll (Trojan.Vundo.H) -> Quarantined and

deleted successfully.
C:\WINDOWS\SYSTEM32\iehelper.dll (Trojan.Vundo.H) -> Quarantined and

deleted successfully.
C:\WINDOWS\SYSTEM32\UACjkxihflo.dll (Trojan.TDSS) -> Quarantined and

deleted successfully.
C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary

Directory 1 for avenger.zip\avenger.exe (Malware.Tool) -> Quarantined

and deleted successfully.
C:\Documents and Settings\Bev\Local Settings\Temp\UAC57a7.tmp

(Rootkit.TDSS) -> Quarantined and deleted successfully.
C:\Documents and Settings\Bev\Local Settings\Temp\Temporary Directory 1

for avenger.zip\avenger.exe (Malware.Tool) -> Quarantined and deleted

successfully.
C:\WINDOWS\SYSTEM32\lowsec\local.ds (Spyware.StolenData) -> Quarantined

and deleted successfully.
C:\WINDOWS\SYSTEM32\lowsec\user.ds (Spyware.StolenData) -> Quarantined

and deleted successfully.
C:\WINDOWS\SYSTEM32\lowsec\user.ds.lll (Spyware.StolenData) ->

Quarantined and deleted successfully.
C:\WINDOWS\svcho.exe (Trojan.Agent) -> Quarantined and deleted

successfully.
C:\WINDOWS\sysguard.exe (Trojan.Agent) -> Quarantined and deleted

successfully.
C:\WINDOWS\SYSTEM32\uacinit.dll (Trojan.Agent) -> Quarantined and

deleted successfully.
C:\WINDOWS\SYSTEM32\UAChowmfxwb.dll (Trojan.Agent) -> Quarantined and

deleted successfully.
C:\WINDOWS\SYSTEM32\UAChypecymr.log (Trojan.Agent) -> Quarantined and

deleted successfully.
C:\WINDOWS\SYSTEM32\UACiqxnmjsl.dll (Trojan.Agent) -> Quarantined and

deleted successfully.
C:\WINDOWS\SYSTEM32\UACknoashbn.dll (Trojan.Agent) -> Quarantined and

deleted successfully.
C:\WINDOWS\SYSTEM32\UACmtalktlw.dat (Trojan.Agent) -> Quarantined and

deleted successfully.
C:\WINDOWS\SYSTEM32\UACvrbgtycb.log (Trojan.Agent) -> Quarantined and

deleted successfully.

descriptionif this is BankerFox.a, how to get rid without internet? - Page 2 EmptyRe: if this is BankerFox.a, how to get rid without internet?

more_horiz
just noticed that these are all still in Quarantine - mbam did NOT remove them. there are 28 objects in Quarantine, including the rootkit TDSS.
shouldn't i delete all of these?

descriptionif this is BankerFox.a, how to get rid without internet? - Page 2 EmptyRe: if this is BankerFox.a, how to get rid without internet?

more_horiz
i have to leave the office and go back to the other computer. anything else i need to do can probably wait. if it can't, let me know asap, and i will get back over here.

i've put the word out about u guys to my mil and intel blogs. some of those guys are superduty geeks. the kind that can actually say they "invented" the internet... LOL ciao yall. Wink reeko

descriptionif this is BankerFox.a, how to get rid without internet? - Page 2 EmptyRe: if this is BankerFox.a, how to get rid without internet?

more_horiz
I really should tell them MBAM guys about the false positive on the avenger. LMBO or ROFL

One lasts scan to make sure it's gone.
Run DDS please.

Two logs will open, one is called DDS.txt, the other is called attach.txt.
Post DDS.txt please.

descriptionif this is BankerFox.a, how to get rid without internet? - Page 2 EmptyRe: if this is BankerFox.a, how to get rid without internet?

more_horiz
Belahzur, i might have misunderstood your last instructions, but i ran MBAB again - full scan - and it found nothing. BUT when i go to geekpolice.net the Windows warning pops up that tells me that it can't go there. i did a screensave of that prompt. then like yesterday, i then do a refresh and here i am. ???

anyway, the MBAM quarantine is still full of the crap from yesterday. i haven't hit the "delete all" button yet. is there a reason i should NOT get rid of them?
here is the latest mbam log. i can't find the dds.txt that u asked for... is this it?

Malwarebytes' Anti-Malware 1.35
Database version: 1916
Windows 5.1.2600 Service Pack 3

3/30/2009 11:15:44 AM
mbam-log-2009-03-30 (11-15-44).txt

Scan type: Full Scan (C:\|)
Objects scanned: 144085
Time elapsed: 1 hour(s), 3 minute(s), 23 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

descriptionif this is BankerFox.a, how to get rid without internet? - Page 2 EmptyRe: if this is BankerFox.a, how to get rid without internet?

more_horiz
Hello.
The first MBAM scan found a lot of items and you quarantined them, so it's fine.
The second scan found nothing.

Items in quarantine are harmless, they are dead now.

DDS is DDS.scr I had you download when you downloaded the installer for MBAM also.

descriptionif this is BankerFox.a, how to get rid without internet? - Page 2 EmptyRe: if this is BankerFox.a, how to get rid without internet?

more_horiz
ok. just ran dds. here is that file:


DDS (Ver_09-03-16.01) - NTFSx86
Run by Bev at 11:53:55.60 on Mon 03/30/2009
Internet Explorer: 7.0.5730.13
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.254.46 [GMT -5:00]

AV: McAfee VirusScan *On-access scanning enabled* (Updated)
FW: McAfee Personal Firewall *enabled*

============== Running Processes ===============

C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
svchost.exe
svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\McAfee\SiteAdvisor\McSACore.exe
C:\PROGRA~1\McAfee\MSC\mcmscsvc.exe
c:\PROGRA~1\COMMON~1\mcafee\mna\mcnasvc.exe
c:\PROGRA~1\COMMON~1\mcafee\mcproxy\mcproxy.exe
C:\PROGRA~1\McAfee\VIRUSS~1\mcshield.exe
C:\Program Files\McAfee\MPF\MPFSrv.exe
C:\WINDOWS\System32\svchost.exe -k imgsvc
c:\PROGRA~1\mcafee.com\agent\mcagent.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Dell\Media Experience\PCMService.exe
C:\Program Files\Common Files\Dell\EUSW\Support.exe
C:\PROGRA~1\SBCSEL~1\SMARTB~1\MotiveSB.exe
C:\WINDOWS\System32\igfxpers.exe
C:\WINDOWS\system32\ctfmon.exe
c:\Program Files\Dell\Support\Alert\bin\NotifyAlert.exe
C:\Program Files\Digital Line Detect\DLG.exe
C:\Program Files\Microsoft Office\Office\OSA.EXE
C:\PROGRA~1\McAfee\VIRUSS~1\mcsysmon.exe
C:\WINDOWS\system32\taskmgr.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Documents and Settings\Bev\Desktop\antivirus tools\dds.scr

============== Pseudo HJT Report ===============

uStart Page = hxxp://www.rr.com/
uSearch Page = hxxp://red.clientapps.yahoo.com/customize/ie/defaults/sp/sbcydsl/*http://www.yahoo.com
uDefault_Page_URL = hxxp://www.dell4me.com/myway
uSearch Bar = hxxp://red.clientapps.yahoo.com/customize/ie/defaults/sb/sbcydsl/*http://www.yahoo.com/search/ie.html
uSearchMigratedDefaultURL = hxxp://search.yahoo.com/search?p={searchTerms}&ei=utf-8&fr=b1ie7
uInternet Connection Wizard,ShellNext = iexplore
uURLSearchHooks: Yahoo! Toolbar: {ef99bd32-c1fb-11d2-892f-0090271d4f88} -
BHO: AcroIEHlprObj Class: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program files\adobe\acrobat

7.0\activex\AcroIEHelper.dll
BHO: scriptproxy: {7db2d5a0-7241-4e79-b68d-6309f01c5231} - c:\program files\mcafee\virusscan\scriptsn.dll
BHO: McAfee SiteAdvisor BHO: {b164e929-a1b6-4a06-b104-2cd0e90a88ff} - c:\progra~1\mcafee\sitead~1\mcieplg.dll
BHO: Java(tm) Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program

files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
TB: McAfee SiteAdvisor Toolbar: {0ebbbe48-bad4-4b4c-8e5a-516abecae064} - c:\progra~1\mcafee\sitead~1\mcieplg.dll
TB: Yahoo! Toolbar: {ef99bd32-c1fb-11d2-892f-0090271d4f88} -
EB: {32683183-48a0-441b-a342-7c2a440a9478} - No File
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
uRun: [MSMSGS] "c:\program files\messenger\msmsgs.exe" /background
mRun: [PCMService] "c:\program files\dell\media experience\PCMService.exe"
mRun: [QuickTime Task] "c:\program files\quicktime\qttask.exe" -atboottime
mRun: [DwlClient] c:\program files\common files\dell\eusw\Support.exe
mRun: [Motive SmartBridge] c:\progra~1\sbcsel~1\smartb~1\MotiveSB.exe
mRun: [igfxtray] c:\windows\system32\igfxtray.exe
mRun: [igfxhkcmd] c:\windows\system32\hkcmd.exe
mRun: [igfxpers] c:\windows\system32\igfxpers.exe
mRun: [SunJavaUpdateSched] "c:\program files\java\jre6\bin\jusched.exe"
mRun: [mcagent_exe] "c:\program files\mcafee.com\agent\mcagent.exe" /runkey
StartupFolder: c:\docume~1\bev\startm~1\programs\startup\micros~1.lnk - c:\program files\microsoft office\office\FINDFAST.EXE
StartupFolder: c:\docume~1\bev\startm~1\programs\startup\office~1.lnk - c:\program files\microsoft office\office\OSA.EXE
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\adober~1.lnk - c:\program files\adobe\acrobat

7.0\reader\reader_sl.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\at&tse~1.lnk - c:\program files\sbc self support

tool\bin\matcli.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\digita~1.lnk - c:\program files\digital line detect\DLG.exe
IE: &Search
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
DPF: Microsoft XML Parser for Java - file:///C:/WINDOWS/Java/classes/xmldso.cab
DPF: {05CA9FB0-3E3E-4B36-BF41-0E3A5CAA8CD8} -

hxxp://download.microsoft.com/download/e/4/9/e494c802-dd90-4c6b-a074-469358f075a6/OGAControl.cab
DPF: {0742B9EF-8C83-41CA-BFBA-830A59E23533} - hxxps://support.microsoft.com/OAS/ActiveX/MSDcode.cab
DPF: {5AE58FCF-6F6A-49B2-B064-02492C66E3F4} -

hxxp://catalog.update.microsoft.com/v7/site/ClientControl/en/x86/MuCatalogWebControl.cab?1237859460078
DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} -

hxxp://www.update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1196511141156
DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} -

hxxp://www.update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1212987016562
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_12-windows-i586.cab
DPF: {BD8667B7-38D8-4C77-B580-18C3E146372C} - hxxp://ak.imgag.com/imgag/cp/install/Crusher.cab
DPF: {CAFEEFAC-0014-0002-0003-ABCDEFFEDCBA} - hxxp://java.sun.com/products/plugin/autodl/jinstall-142-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0003-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_03-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0004-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_04-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0005-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_05-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0007-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_07-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0012-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_12-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_12-windows-i586.cab
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
Handler: sacore - {5513F07E-936B-4E52-9B00-067394E91CC5} - c:\progra~1\mcafee\sitead~1\McIEPlg.dll
Notify: igfxcui - igfxdev.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll

============= SERVICES / DRIVERS ===============

R1 mfehidk;McAfee Inc. mfehidk;c:\windows\system32\drivers\mfehidk.sys [2009-1-16 213640]
R2 McAfee SiteAdvisor Service;McAfee SiteAdvisor Service;c:\program files\mcafee\siteadvisor\McSACore.exe [2009-3-23 210216]
R2 McProxy;McAfee Proxy Service;c:\progra~1\common~1\mcafee\mcproxy\mcproxy.exe [2009-3-23 359952]
R2 McShield;McAfee Real-time Scanner;c:\progra~1\mcafee\viruss~1\mcshield.exe [2009-3-23 144704]
R3 McSysmon;McAfee SystemGuards;c:\progra~1\mcafee\viruss~1\mcsysmon.exe [2009-3-23 606736]
R3 mfeavfk;McAfee Inc. mfeavfk;c:\windows\system32\drivers\mfeavfk.sys [2009-3-23 79304]
R3 mfebopk;McAfee Inc. mfebopk;c:\windows\system32\drivers\mfebopk.sys [2009-3-23 35272]
R3 mfesmfk;McAfee Inc. mfesmfk;c:\windows\system32\drivers\mfesmfk.sys [2009-3-23 40552]
S2 clcdcnot;Remote Access PPPOE Helper;c:\windows\system32\svchost.exe -k netsvcs [2002-8-29 14336]
S3 mferkdk;McAfee Inc. mferkdk;c:\windows\system32\drivers\mferkdk.sys [2009-3-23 34216]

=============== Created Last 30 ================

2009-03-29 18:59 15,504 ac------ c:\windows\system32\drivers\mbam.sys
2009-03-29 18:59 38,496 ac------ c:\windows\system32\drivers\mbamswissarmy.sys
2009-03-29 17:12 259 ac------ C:\avexport.bat
2009-03-29 13:19 -cd----- c:\program files\Trend Micro
2009-03-28 17:46 61,440 ac------ c:\windows\system32\drivers\pwozri.sys
2009-03-27 19:37 1,071,088 ac------ c:\windows\system32\MSCOMCTL.OCX
2009-03-27 19:37 118,784 ac------ c:\windows\system32\MSSTDFMT.DLL
2009-03-27 19:25 16,896 ac------ c:\windows\syssvc.exe
2009-03-24 12:12 -cd----- c:\program files\Malwarebytes' Anti-Malware
2009-03-23 19:15 6,349 ac------ c:\windows\system32\Config.MPF
2009-03-23 19:09 40,552 ac------ c:\windows\system32\drivers\mfesmfk.sys
2009-03-23 19:09 79,304 ac------ c:\windows\system32\drivers\mfeavfk.sys
2009-03-23 19:09 35,272 ac------ c:\windows\system32\drivers\mfebopk.sys
2009-03-23 19:09 120,136 ac------ c:\windows\system32\drivers\Mpfp.sys
2009-03-23 19:08 -cd----- c:\program files\common files\McAfee
2009-03-23 19:08 -cd----- c:\program files\McAfee.com
2009-03-23 19:07 -cd----- c:\program files\McAfee
2009-03-23 19:00 34,216 ac------ c:\windows\system32\drivers\mferkdk.sys
2009-03-22 17:58 73,728 ac------ c:\windows\system32\javacpl.cpl

==================== Find3M ====================

2009-03-22 18:01 410,984 ac------ c:\windows\system32\deploytk.dll
2009-02-09 06:13 1,846,784 ac------ c:\windows\system32\win32k.sys
2007-02-15 19:32 848 ac-sh--- c:\windows\system32\KGyGaAvL.sys
2008-06-09 01:14 32,768 ac-sh--- c:\windows\system32\config\systemprofile\local

settings\history\history.ie5\mshist012008060920080610\index.dat

============= FINISH: 11:55:02.57 ===============

descriptionif this is BankerFox.a, how to get rid without internet? - Page 2 EmptyRe: if this is BankerFox.a, how to get rid without internet?

more_horiz
privacy_tip Permissions in this forum:
You cannot reply to topics in this forum