Solved

Malware Scans

Posted on 2014-03-05
1
230 Views
Last Modified: 2014-03-31
Hi Experts,

I'm checking my system for malware.

I ran:
1. RogueKiller/TheKiller
2. MalwareBytes
3. TDSSKIller

The logs are attached.

My computer has recently been having issues with smart cards.  I've tried many other fixes, and decided to check where malware.

Do the logs look ok?

Thanks,
Brandon
mbam-log-2014-03-05--10-32-16-.txt
mbam-log-2014-03-05--10-52-30-.txt
RKreport-0--D-03052014-102911.txt
RKreport-0--DN-03052014-103015.txt
TDSSKiller-Log.txt
0
Comment
Question by:bdfallon
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 26

Accepted Solution

by:
Thomas Zucker-Scharff earned 500 total points
ID: 39907149
The logs look good (I didn't look at the TDSSKiller log as I don't feel expert enough to advise you on it).  I notice you are not running an alternate Hosts file - it is worth doing and easy enough to download from mvps -

http://www.mvps.org/winhelp2002/hosts.htm
0

Featured Post

2017 Webroot Threat Report

MSPs: Get the facts you need to protect your clients.
The 2017 Webroot Threat Report provides a uniquely insightful global view into the analysis and discoveries made by the Webroot® Threat Intelligence Platform to provide insights on key trends and risks as seen by our users.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you thought ransomware was bad, think again! Doxware has the potential to be even more damaging.
Today, still in the boom of Apple, PC's and products, nearly 50% of the computer users use Windows as graphical operating systems. If you are among those users who love windows, but are grappling to keep the system's hard drive optimized, then you s…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

732 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question