Avatar of ruud00000
ruud00000

asked on 

please review hjt, combofix, sdfix logs

please review hjt, combofix, sdfix logs and recommend further action.

I have a message popping up after reboot showing 'this OS is not supported', looks new. Having to do anything with spyware?
ComboFix-log.txt
hijackthis-log.txt
SDFix-Log.txt.txt
Anti-Virus AppsAnti-Spyware

Avatar of undefined
Last Comment
rpggamergirl
ASKER CERTIFIED SOLUTION
Avatar of rpggamergirl
rpggamergirl
Flag of Australia image

Blurred text
THIS SOLUTION IS ONLY AVAILABLE TO MEMBERS.
View this solution by signing up for a free trial.
Members can start a 7-Day free trial and enjoy unlimited access to the platform.
See Pricing Options
Start Free Trial
SOLUTION
Avatar of David-Howard
David-Howard

Blurred text
THIS SOLUTION IS ONLY AVAILABLE TO MEMBERS.
View this solution by signing up for a free trial.
Members can start a 7-Day free trial and enjoy unlimited access to the platform.
Avatar of ruud00000
ruud00000

ASKER

Thanks, so far, I'll close the question / assign points once I had a chance to visit the customer again to finalize this.
Avatar of rpggamergirl
rpggamergirl
Flag of Australia image

>>>Combofix in Safe Mode may fix the above entries as suggested.<<<
Combofix is optimized to run in normal mode, and it will remove what's on the script so long as they exist in the system.
Running combofix in safe mode is only necessary if the pc can't boot normally or if for some reason CF encounters a problem running in that mode.

We would like to see the latest CF log to make sure it's clean.
Anti-Virus Apps
Anti-Virus Apps

Anti-virus software was originally developed to detect and remove computer viruses. However, with the proliferation of other kinds of malware, antivirus software started to provide protection from other computer threats. In particular, modern antivirus software can protect from malicious browser helper objects (BHOs), browser hijackers, ransomware, keyloggers, backdoors, rootkits, trojan horses, worms, malicious layered service providers (LSPs), dialers, fraud tools, adware and spyware. Some products also include protection from other computer threats, such as infected and malicious URLs, spam, scam and phishing attacks, online identity theft (privacy), online banking attacks, social engineering techniques, Advanced Persistent Threat (APT), botnets and DDoS attacks.

23K
Questions
--
Followers
--
Top Experts
Get a personalized solution from industry experts
Ask the experts
Read over 600 more reviews

TRUSTED BY

IBM logoIntel logoMicrosoft logoUbisoft logoSAP logo
Qualcomm logoCitrix Systems logoWorkday logoErnst & Young logo
High performer badgeUsers love us badge
LinkedIn logoFacebook logoX logoInstagram logoTikTok logoYouTube logo