?
Solved

How can I inspect a Windows 7 machine for hidden spying software?

Posted on 2015-01-05
2
Medium Priority
?
126 Views
Last Modified: 2015-01-09
I have a client who suspect an ex-spouse installed some sort of keylogging/spying software on their laptop.  other than Rogue Killer, Malwarebytes, etc, is there any way to see if there is something installed?  Worse case we can just reload the machine but discovery would be much easier.  Thanks in advance.
0
Comment
Question by:1namyln
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 17

Accepted Solution

by:
Ivan earned 1000 total points
ID: 40532523
Hi,

I usually use ComboFix. Start computer from safe mode, and just follow 3-4 steps. After that if something is still fishy I use Eset online scanner, from safe mode as well.

ComboFix: http://www.bleepingcomputer.com/download/combofix/

Regards,
0
 
LVL 14

Assisted Solution

by:Michael Dyer
Michael Dyer earned 1000 total points
ID: 40532548
A general scan with Malwarebytes might be a good place to start, and it is free.  

http://www.malwarebytes.org/mbam.php

Check this out also:

Keylogger Detector - http://download.cnet.com/Keylogger-Detector/3000-2162_4-75744701.html

Of course, there are hardware keyloggers too so if this is  a desktop, look for anything unusual attached to the computer.
0

Featured Post

When ransomware hits your clients, what do you do?

MSPs: Endpoint security isn’t enough to prevent ransomware.
As the impact and severity of crypto ransomware attacks has grown, Webroot fought back, not just by building a next-gen endpoint solution capable of preventing ransomware attacks but also by being a thought leader.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this post we will be converting StringData saved within a text file into a hash table. This can be further used in a PowerShell script for replacing settings that are dynamic in nature from environment to environment.
In this modest contribution, I want to share with the IT community (especially system administrators, IT Support Engineers and IT Help Desks) about Windows crashes/hangs and how to deal with these particular problems.
This is used to tweak the memory usage for your computer, it is used for servers more so than workstations but just be careful editing registry settings as it may cause irreversible results. I hold no responsibility for anything you do to the regist…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question