Search the Community
Showing results for tags 'bios'.
Found 3 results
I am running the FARBAR security scanner right now and will update the files when the scan is complete. I just want to ensure that no low-level viruses/malware/ransomware are on my workstation. Any and all help would be appreciated. Thank you! Addition.txt FRST.txt
I got botnetted on Discord, a user sent me a picture and I clicked on it to zoom in and then he had full control of my pc, I have reflashed my bios and fully reinstalled windows AND DELETED ALL MY PARTITIONS etc but the virus is STILL there what else can I do to get rid of it?
First off- using a vm machine, host OS is ubuntu linux- the logs attached are from Virtual Box of a Window 10 machine. I have to use a linux machine because; - can not reinstall any Windows without the infection hijacking the install, I've tried installing WinXP, 8.1, 7, 7 pro, WinUltimate, -during reinstall, at the cd/rom loads, then at a point the install instructions are taken over, and a similiar gui appears to complete install. -infects any device attached physical of network, usb will be formatted automatically (fake warning posted gui) -registry is infected -possible firmware exploited, usb and pci seem to be used as alternate devices, -system32 files are unusual -unable to flash bios -appears as hidden sector or directory, hijacks the mbr, -has the ability to replicate if deleted or core files, registry is changed -suspected WMI Shell running with TRUSTED INSTALLER -Possible ChipSec related? I think I've tried everthing as far as scans, rkhunter, Hirens Boot Cd, Process Monitor, msconfig, BIOS settings, hdd replacement. All my machines at home are down/infected. Only way to get back was Linux, and using VM to start Windows 10. This is from a enterprise PC Tech Level 2 working at home. FRST.txt Addition.txt mbt first scan.txt