Jump to content

is my computer clean now?


Recommended Posts

Quite a few months ago, PC was hacked.  Had an extra comp, and been using it since.  Last night it quit.  Didn't see any other options but to try to clean the hacked one. I did a factory reset/reinstall, but have seen conflicting info on whether this fixes the problem-  can an expert tell me? 

 

That's the main question, but also:

1.  I read viruses etc. can return to comp. when you return data from backup device-  I don't know what a backup device is.  If it means external hard drive, CD, etc., I don't use any of those things.

2.  I also ran into info awhile back that said some things like 'keylogging' and others cannot be detected and cannot be removed. 

 

So what are the chances that the comp is clean/safe now? 

After the reset/reinstall completed, I needed to reenter product key, set up new account, and it said 'first time use.'  I then ran MalwareBytes and their AdwareCleaner. 

Edited by Sunkist
spelling error
Link to post
Share on other sites

  • Staff

***This is an automated reply***

Hi,

Thanks for posting in the Malware Removal for Windows Help forum. Being infected is not fun and can be very frustrating to resolve, but don't worry because we have a team of experts here help you!!

Note: Please be patient. When the site is busy it can take up to 48 hours before a malware removal helper can assist you. If no one has replied to your new topic after 48 hours please contact an Administrator to let them know.

First, if you haven't done so, please run a Threat Scan with the latest version of Malwarebytes. This may resolve your malware infection issue without the need for additional support. Click "Reveal Hidden Contents" below for details:

Spoiler

Malwarebytes can detect and remove most malware with no further actions required for free.

If you do not have Malwarebytes, please download it here and install. Be sure to post back the log as shown below.

  1. Open Malwarebytes for Windows
  2. To the left, click Scan > Scan Types.

    auto-reply-scan-types2.jpg.86e24e955a95d
     
  3. Select Threat Scan. Threat Scan is the most thorough and recommended scan method available.

    auto-reply-scan-types1.jpg.f4eee0e0c9375
     
  4. Click Start Scan
     

Next, if you're still experiencing issues after running Malwarebytes, then technical logs will be required to assist you. Click "Reveal Hidden Contents" below and follow the instructions to run the Farbar Recovery Scan Tool:

Spoiler

Don't use any temporary file cleaners unless requested - this can cause data loss and make a recovery difficult.

Please download the Farbar Recovery Scan Tool here and save it to your desktop. Note: You need to run the version compatible with your system. You can check here if you're not sure if your computer is 32-bit or 64-bit

  1. Double-click to run it. When the tool opens click Yes to the disclaimer.
  2. Press the Scan button.

    _frst_scan.jpg.d79beccbb6e66628e557f6c28
     
  3. It will make a log (FRST.txt) in the same directory the tool is run. Please attach or copy and paste it to your reply.
  4. The first time the tool is run, it also makes another log (Addition.txt). If you've run it before it may not and you may need to select it manually.
     

Finally, attach the Malwarebytes Threat Scan, FRST.txt and Additional.txt logs to your reply. Before submitting your reply, be sure to enable "Notify me of replies" like so:   notify me.jpeg
 

Click "Reveal Hidden Contents" below for details on how to add attachments to your post.
Note: If you are unable to attach files, please copy and past the contents of the requested files in your Reply instead. 

Spoiler

To save attachments, please click the link as shown below. You can click and drag the files to this bar or you can click the choose files, then browse to where your files are located, select them and click the Open button.

mb_attach.jpg.220985d559e943927cbe3c078b
 

Please Note the Following:

  • One of our expert helpers will give you one-on-one assistance when one becomes available.
  • Refrain from making any further changes to your computer (such as Install/Uninstall programs, using special fix tools, delete files, edit the registry, etc...) unless advised by a malware removal helper. Doing so can result in system changes which may hinder the attempts by a helper to clean your machine.
  • Do not 'bump' or add a reply to your topic once it is started. Topics which appear to have replies are considered to have a helper assisting them and may be overlooked, resulting in a longer waiting period for help
  • If you're using Peer 2 Peer software such as uTorrent or similar, please completely disable it from running while being assisted here.

Troubleshooting Tips

 

 

Link to post
Share on other sites

Hi Sunkist :)

If you did a format and reinstall of Windows (formatted the whole drive, then reinstalled Windows on it), then chances that the infection survived are pretty null. I, personally, have never seen an infection that survived a full nuke and pave. What logs gave you the entries with the words "keylogging", or the conflicting information?

Link to post
Share on other sites

Hi,

 

Thank you for replying!!

I only heard about keylogging and some other system that I can't recall from reading about them on websites. 

 

Re: the conflicting info on reset/reinstall:  people who were responding to someone else's similar questions on the Microsoft support forums.  One person said reset/reinstall cleans everything, but another person said some viruses can sneak through and also be reintroduced 'through your data on backup device.' 

Link to post
Share on other sites

It's possible, but it depends on what kind of malware you were infected with on the first place. Let's say you were infected with a fake installer for a game, and you had it backed up on your back up drive. Of course, if you launch that installer again on the fresh Windows install, you'll get infected again. Of if your back up drive (USB, drive, etc.) was infected with a worm, you could get infected again (assuming you have autorun enabled). But in order to be infected through a back up device, that back up device needs to be infected, or contain an infected installer, dropper, downloader, etc. first.

Link to post
Share on other sites

Due to the lack of feedback, this topic is closed to prevent others from posting here.

If you need this topic reopened, please send a Private Message to any one of the moderating team members. Please include a link to this topic with your request.

This applies only to the originator of this topic. Other members who need assistance please start your own topic in a new thread.

Thanks

 

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.