I will copy the output of scr.com and that of RogueKiller below it. For instance can passwords stored by IE, Chrome and FF be read by a remote hacker? I presume he has been copying all files on my system. ![]() My problem and question is, am I now free of all backdoors AND how much damage will have been done by someone nosing around on my system. I tried Malwarebytes quick scan and it found three infections:īackdoor.agent file c:\windows\system32\cml.exe When I ran a full scan of Micro Essentials in safe mode over night I noticed it was terminated in the middle of the night and my event logger showed a successful login while I was sleeping! ![]() However I could see lots of network activity while nothing should be active. Microsoft Essentials and Trend Micro House Call didn´t notice anything. ![]() I suspected a virus as the computer was extremely slow. Endpoint Detection & Response for Servers
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |