Jump to content

ChefKen

Members
  • Posts

    4
  • Joined

  • Last visited

Reputation

0 Neutral
  1. Cheers mate! Lemme know if I could donate to get ya a beer or something. Again, thank you for your help.
  2. Here's the MBAM log, didn't seem to pick up anything else, but the folders and a few files were still there in local folder, so I opted to manually delete them as I now have access to them. MBAM.txt
  3. Hello Ron and thank you for your help. Attached here is the FRST log and I will attach the MBAM log once the scan finishes. FRST.txt
  4. A while ago, it seems I got a smartservice infection by accidentally running a setup file that was not the intended setup. Looks like it primarily just runs a false program(Windows Process Manager) that probably mines virtual currency. There is also a persistent rootkit. MBAM & hitmanpro doesn't get rid of it. Main suspects are 3 folders located in the Appdata>Local folder that have restricted access. Attached are the FRST log and Addition text file. Addition.txt FRST.txt
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.