Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

had my computer hacked..


  • Please log in to reply
19 replies to this topic

#1 itsjustme7

itsjustme7

  • Members
  • 33 posts
  • OFFLINE
  •  
  • Local time:08:48 PM

Posted 20 March 2012 - 06:52 PM

I'm wondering after a partition reformat on the HP laptop or any laptop for that matter can a hacker still remain a virus in the computer such as changing your BIOS or a Boot Sector Virus or something similar or is that impossible? and if so, how would I be able to check if I have a hacker/virus still in my computer?

Is there something I can run on my computer for you guys to check if my computer's OK? I ran a few antivirus scans on different programs and nothing is showing up there.

Edited by hamluis, 21 March 2012 - 04:58 AM.
Moved from Win 7 to Am I Infected.


BC AdBot (Login to Remove)

 


#2 Nephilim1955

Nephilim1955

  • Members
  • 100 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:US
  • Local time:06:48 PM

Posted 21 March 2012 - 02:55 AM

Not on an ordinary single partitioned hard drive. Everything is wiped off so the disc is like new.

However having said that, if you have a partitioned drive with the recovery OS on it.

When formatting a hard drive, that partition would not be formatted for obvious reasons because an OS cannot delete it's self.

So if you picked up a virus that targets only partitions, then it would still remain on the computer.

That's why it's always advisable to take a copy of the OS and put it on CD or DVD when you first get the computer. You can only do it once!

Edited by Nephilim1955, 21 March 2012 - 02:56 AM.


#3 itsjustme7

itsjustme7
  • Topic Starter

  • Members
  • 33 posts
  • OFFLINE
  •  
  • Local time:08:48 PM

Posted 21 March 2012 - 04:27 AM

what I did was reformat using the HP partition recovery thing, so doing that it's not a sure thing and I could have a virus that's undetectable by any type of antivirus program?

#4 Nephilim1955

Nephilim1955

  • Members
  • 100 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:US
  • Local time:06:48 PM

Posted 21 March 2012 - 05:48 AM

That would depend on the type of infection. I believe some types of Rootkits do. Rootkits are so bad. The only way to get rid of them for sure, is a system recovery. But, again as stated earlier, not with a recovery partition. They can infect in there, too. You'll need to use an install disc. Either, from the computers manufacturer, or from creating one when you first buy the computer. This way you get a clean install of both partitions. The main and backup partitions. Hope this helps!

Nephilim :thumbup2:

Edited by Nephilim1955, 21 March 2012 - 05:52 AM.


#5 itsjustme7

itsjustme7
  • Topic Starter

  • Members
  • 33 posts
  • OFFLINE
  •  
  • Local time:08:48 PM

Posted 21 March 2012 - 06:50 AM

thanks! anyone want to clarify on this just to be sure?

#6 itsjustme7

itsjustme7
  • Topic Starter

  • Members
  • 33 posts
  • OFFLINE
  •  
  • Local time:08:48 PM

Posted 21 March 2012 - 12:18 PM

anyone?

#7 Nephilim1955

Nephilim1955

  • Members
  • 100 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:US
  • Local time:06:48 PM

Posted 21 March 2012 - 03:47 PM

BUMP

#8 itsjustme7

itsjustme7
  • Topic Starter

  • Members
  • 33 posts
  • OFFLINE
  •  
  • Local time:08:48 PM

Posted 21 March 2012 - 06:58 PM

thx for the bump, absolutely no one has info on this? :(

#9 itsjustme7

itsjustme7
  • Topic Starter

  • Members
  • 33 posts
  • OFFLINE
  •  
  • Local time:08:48 PM

Posted 22 March 2012 - 06:42 AM

last bump.

#10 Nephilim1955

Nephilim1955

  • Members
  • 100 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:US
  • Local time:06:48 PM

Posted 22 March 2012 - 04:14 PM

What other information do you require? Other than a second opinion?

#11 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,040 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:09:48 PM

Posted 23 March 2012 - 08:58 PM

Hello. please run these next.

Please download MiniToolBox, save it to your desktop and run it.

Checkmark the following checkboxes:
  • Flush DNS
  • Report IE Proxy Settings
  • Reset IE Proxy Settings
  • Report FF Proxy Settings
  • Reset FF Proxy Settings
  • List content of Hosts
  • List IP configuration
  • List Winsock Entries
  • List last 10 Event Viewer log
  • List Installed Programs
  • List Users, Partitions and Memory size.
Click Go and post the result (Result.txt). A copy of Result.txt will be saved in the same directory the tool is run.

Note: When using "Reset FF Proxy Settings" option Firefox should be closed.




Please download TDSSKiller.zip and and extract it.
  • Run TDSSKiller.exe.
  • Click Start scan.
  • When it is finished the utility outputs a list of detected objects with description.
    The utility automatically selects an action (Cure or Delete) for malicious objects.
    The utility prompts the user to select an action to apply to suspicious objects (Skip, by default). Let the options as it is and click Continue
  • Let reboot if needed and tell me if the tool needed a reboot.
  • Click on Report and post the contents of the text file that will open.

    Note: By default, the utility outputs the log into system disk (it is usually the disk with installed operating system, C:\) root folder. The Log has a name like: TDSSKiller.Version_Date_Time_log.txt.



If TDSSKiller does not run, try renaming it. To do this, right-click on TDSSKiller.exe, select Rename and give it a random name with the .com file extension (i.e. 123abc.com). If you do not see the file extension, please refer to these[/color] instructions. In some cases it may be necessary to redownload TDSSKiller and randomly rename it before downloading and saving to the computer.


Next run MBAM (MalwareBytes):

Please download Malwarebytes Anti-Malware Posted Image and save it to your desktop.
  • Important!! When you save the mbam-setup file, rename it to something random (such as 123abc.exe) before beginning the download.
Malwarebytes may "make changes to your registry" as part of its disinfection routine. If using other security programs that detect registry changes (ie Spybot's Teatimer), they may interfere or alert you. Temporarily disable such programs or permit them to allow the changes.

  • Make sure you are connected to the Internet and double-click on the renamed file to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • Malwarebytes will automatically start and you will be asked to update the program before performing a scan.
  • If an update is found, the program will automatically update itself. Press the OK button and continue.
  • If you cannot update Malwarebytes or use the Internet to download any files to the infected computer, manually update the database by following the instructions in FAQ Section A: 4. Issues.
  • Under the Scanner tab, make sure the "Perform Quick Scan" option is selected.
  • Click on the Scan button.
  • When finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box, then click the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked and then click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab.
  • Copy and paste the contents of that report in your next reply. Be sure to post the complete log to include the top portion which shows the database version and your operating system.
  • Exit Malwarebytes when done.
Note: If Malwarebytes encounters a file that is difficult to remove, you will be asked to reboot your computer so it can proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot normally will prevent Malwarebytes from removing all the malware.

-- Some types of malware will target Malwarebytes and other security tools to keep them from running properly. If that's the case, go to Start > All Programs > Malwarebytes Anti-Malware folder > Tools > click on Malwarebytes Chameleon and follow the onscreen instructions. The Chameleon folder can be accessed by opening the program folder for Malwarebytes Anti-Malware (normally C:\Program Files\Malwarebytes' Anti-Malware or C:\Program Files (x86)\Malwarebytes' Anti-Malware).



Please download aswMBR ( 511KB ) to your desktop.
  • Double click the aswMBR.exe icon to run it
  • Click the Scan button to start the scan
  • On completion of the scan, click the [COLOR="Red"]save log button, save it to your desktop and post it in your next reply.

How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#12 Nephilim1955

Nephilim1955

  • Members
  • 100 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:US
  • Local time:06:48 PM

Posted 23 March 2012 - 11:15 PM

What happened to OTL?

Edited by boopme, 24 March 2012 - 09:40 AM.


#13 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,040 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:09:48 PM

Posted 24 March 2012 - 09:40 AM

What do you mean ? I never mentioned OTL?
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#14 Nephilim1955

Nephilim1955

  • Members
  • 100 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:US
  • Local time:06:48 PM

Posted 24 March 2012 - 05:27 PM

What do you mean ? I never mentioned OTL?


Just that I usually seen the malware forums include OTL.

I know your experienced.

I was just wondering why not.

Thanks!

Nephilim

#15 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,040 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:09:48 PM

Posted 24 March 2012 - 06:28 PM

Oh, OK... well if I don't see what I want here,I'll ask for it or DDS and we'll move you.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users