Jump to content

Nervous about my pc having a rootkit or any kind of virus.


Recommended Posts

As I mentioned in the title, I am afraid that there is a rootkit on my computer. Let me tell you what I experienced from the beginning.

About 3-4 days ago, unfortunately, I ran a setup file and nothing happened on my computer at first. I suspected from this and scanned directly with Hitmanpro and it found a virus and I manually deleted this virus. Then I scanned with the free versions of Malwarebytes and Kaspersky and nothing was found. The next day, I saw in my steam account that my items were sold without any notification, even though I had a steam guard. I had my computer checked on virustotal, and I still couldn't find anything bad. The next day, I did not even receive a login notification from my Instagram account, and even Instagram was not logged in from another IP address or device (at least as far as I could see). The situation started to worry me and I decided to format my computer locally. After formatting, I changed the passwords of my accounts that I thought might be affected. I canceled my bank cards. But I still have a question in my mind. I don't feel comfortable thinking that it is somehow stored somewhere on my computer even after formatting. This time, they make me think that I was saved because I formatted it, and in the meantime, I still think that they are silently stealing my information.

How can I clarify that if they are still stealing my information?

Link to post
Share on other sites

  • Root Admin

Hello @katel and :welcome:

 

 

Let's go ahead and run a couple of scans and get some updated logs from your system. Please read the entire post below before starting so that you're more familiar with the process

Then follow each step in the order provided. Unless otherwise asked, please attach all logs

 

Please make the following system changes:

  • If you have not done so already - Enable System Protection and create a NEW System Restore Point
  • Temporarily disable your antivirus real-time protection or other security software first only if it blocks or interferes with the scans or downloads.. Make sure to turn it back on once the scans are completed
  • Temporarily disable Microsoft SmartScreen to download software below only if needed. Make sure to turn it back on once the downloads are completed
  • Disable-Fast-Startup
  • Show-Hidden-Folders-Files-Extensions

Please run the following scans:

  1. Click the following link and run a  Scan with AdwCleaner
  2. Click the following link and run a  Scan with Malwarebytes 
       RESTART the computer
  3. Click the following link and run a  Scan with Farbar Recovery Scan Tool 
     

Example image of where to click to attach files when posting your reply

image.thumb.png.e208c182ff570799c53bcf57

 

Thank you

 

Link to post
Share on other sites

  • Root Admin

The logs did not indicate any obvious infection. If you've formatted the drive and reinstalled Windows, then please go ahead and get me a new set of logs and I can review.

 

Scan with SecurityCheck by glax24
https://forums.malwarebytes.com/topic/307301-scan-with-securitycheck-by-glax24/

 

Scan with FSS Farbar Service Scanner
https://forums.malwarebytes.com/topic/306736-scan-with-fss-farbar-service-scanner/

 

Scan with Farbar Recovery Scan Tool
https://forums.malwarebytes.com/topic/306601-scan-with-farbar-recovery-scan-tool/

 

 

Thank you

 

Link to post
Share on other sites

  • Root Admin

All good. The current logs do not indicate any obvious signs of infection.

Update Kaspersky and do another full system scan with that.

Check for Windows Updates and all should be okay

We can do another scan if you like though. Please temporarily disable Kaspersky real-time protection and run the following

 

 

Dr.Web CureIt!

Please download the Dr.Web CureIt! anti-virus utility
https://free.drweb.com/

 

You will need to send them an email to obtain a link to download the scanner, please do so

  • The downloaded file will normally have a unique name such as:  q7a9tr4p.exe
  • Close all open applications and locate the downloaded file and double-click to run it
  • The program will take a moment to launch and bring up the License and Update screen
  • Place a check mark to agree to the terms and then click on the Continue button
  • Click the underlined link Select objects for scanning
  • On the top left click the Scanning objects that should automatically check all objects
  • Click the small wrench and make sure there is a check on Automatically apply actions to threats
  • Then click the large button on bottom right Start scanning
  • Once the scan has completed there will be a link named Open report click that and a log named cureit.log should open in Notepad
  • The log is saved in the folder named Doctor Web in the top of your user profile folders
  • Please attach that log on your next reply

 

 

 

Link to post
Share on other sites

Dr.Web CureIt! I can run it too, no problem. but I feel like we won't find anything with antiviruses. The main question in my mind is what exactly is the type of this virus (rat, rootkit, malware?), and what kind of information has it stolen from me? Additionally, as far as I have researched on the internet, such viruses can be transmitted through BIOS/UEFI, hardware, etc., making it almost impossible to detect. This is my main suspicion and how can I find out if this is the case?

Link to post
Share on other sites

  • Root Admin

There has been only 2 new viruses now in over a decade of computing. The majority of infections today are Trojans. The system shows no signs of either of those viruses.

Without forensic analysis there is no way to easily determine if something was taken or not. In order to do forensic analysis one would have needed to image the system exactly at the time of discovery.

Running tools to detect and remove threats also obscures and in many cases removes forensic data needed for such discovery. I'm also not aware of anyone that does that type of work for free. Generally speaking it can cost well over a thousand dollars.

 

We only provide detection and removal assistance not forensics of who/what/where/when/why/etc.

If you're truly bothered you can do a CLEAN install of Windows. That won't tell you what "might" have happened but it will ensure the system is clean.

 

Clean Install Windows 10 & 11 (2023)
https://answers.microsoft.com/en-us/windows/forum/all/clean-install-windows-10-11-2023/1c426bdf-79b1-4d42-be93-17378d93e587

Also, please review the following topic

Bypass Microsoft Online Account Creation during installation of Windows 11
https://forums.malwarebytes.com/topic/296613-bypass-microsoft-online-account-creation-during-installation-of-windows-11/

 

 

Link to post
Share on other sites

I understand. As a last question, is there much difference between the local format and the clean format? Because, as I said, I have already formatted it locally. Also, you didn't mention it directly, but in case of a rootkit in the bios, what is the exact solution to that situation?

Link to post
Share on other sites

  • Root Admin

If you have a BIOS / UEFI rootkit (extremely rare) you would install the latest BIOS/UEFI firmware update from your manufacturer website. If it prevents such update then basically throw the motherboard away and buy a new one.

A CLEAN install removes ALL partitions and you typically don't format yourself you let the Windows installer do it for you.

 

Excellent, glad to hear all is well again. I'll go ahead and close your topic now and wish you well.

Please follow the directions below to remove the logs and tools we've used. If any are still left after that you can manually uninstall or delete them.

Take care and stay safe out there. Try to follow as much of the advise below as you can as well.

 

Let's go ahead and do some clean-up work and remove the tools and logs we've run.

Please download KpRm by kernel-panik and save it to your desktop.

  • right-click kprm_(version).exe and select Run as Administrator.
  • Read and accept the disclaimer.
  • When the tool opens, ensure all boxes under Actions are checked.
  • Under Delete Quarantines select Delete Now, then click Run.
  • Once complete, click OK.
  • A log will open in Notepad titled kprm-(date).txt. You can close it.

 

We're glad that we were able to assist you.

 

The following information will help you to keep your computer and data safer as well as improve your overall privacy

  1. Recommend using a Password Manager for all websites, etc. that require a password. Never use the same password on more than one site.
    https://www.howtogeek.com/780233/best-password-manager/
  2. Make sure you're backing up your files https://forums.malwarebytes.com/topic/136226-backup-software/
  3. Keep all software up to date - PatchMyPC - https://patchmypc.com/home-updater#download     https://patchmypc.com/about-us
  4. Keep your Operating System up to date and current at all times - https://support.microsoft.com/en-us/windows/windows-update-faq-8a903416-6f45-0718-f5c7-375e92dddeb2
  5. Further tips to help protect your computer data and improve your privacy: https://forums.malwarebytes.com/topic/258363-tips-to-help-protect-from-infection/ 
  6. Please consider installing the following Content Blockers for your Web browsers if you haven't done so already. This will help improve overall security

Malwarebytes Browser Guard

uBlock Origin

 

Cybersecurity basics & protection
Everything you need to know about cybercrime
https://www.malwarebytes.com/cybersecurity

 

Further reading if you'd like to keep up on the malware threat scene: Malwarebytes Blog  https://blog.malwarebytes.com/

Hopefully, we've been able to assist you with correcting your system issues.

Thank you for using Malwarebytes. Please tell your friends and family if they too need assistance with malware removal

 

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.