F5F Stay Refreshed Software Operating Systems I've restored Windows 10 to four copies, yet the virus still returns!

I've restored Windows 10 to four copies, yet the virus still returns!

I've restored Windows 10 to four copies, yet the virus still returns!

Pages (2): Previous 1 2
R
Repertition
Member
186
12-04-2016, 03:45 PM
#11
If you have additional external drives connected, I would also attempt to disconnect them. It's conceivable these extra drives became infected and are simply recontaminating the system during each reinstallation. In another scenario, you might consider inserting a new drive if the issue stems from a firmware-level virus that can't be removed by deleting Windows.
R
Repertition
12-04-2016, 03:45 PM #11

If you have additional external drives connected, I would also attempt to disconnect them. It's conceivable these extra drives became infected and are simply recontaminating the system during each reinstallation. In another scenario, you might consider inserting a new drive if the issue stems from a firmware-level virus that can't be removed by deleting Windows.

C
catseecoo
Senior Member
662
12-04-2016, 05:46 PM
#12
C
catseecoo
12-04-2016, 05:46 PM #12

J
Jayhawk_Down
Senior Member
350
12-05-2016, 04:07 PM
#13
Initially, as you observe, simply reinstalling or performing a clean install isn't effective and these threats persist. It's better to concentrate on identifying and eliminating them rather than risking further damage. Ensure you confirm the presence of actual viruses, not just false alarms. Utilize VirusTotal to examine any infected files. If your email client seems unreliable, consider switching to alternatives like Great eM Client. Attachments typically don't run by themselves; however, some scripts within emails might trigger activation. I'm skeptical about this, though—your email client likely receives the same messages via IMAP, causing repeated virus downloads. Most importantly, verify your infection status. Your antivirus detecting a virus in a file is normal if it's infected, but it doesn't confirm your system is compromised. A virus, like any other program, needs some form of execution to harm your system. Antivirus tools monitor for active threats and alert you, not because they're inactive. I can hypothetically send you 200 malicious attachments, but you'd remain safe until you start running them. If you need further assistance, let me know.
J
Jayhawk_Down
12-05-2016, 04:07 PM #13

Initially, as you observe, simply reinstalling or performing a clean install isn't effective and these threats persist. It's better to concentrate on identifying and eliminating them rather than risking further damage. Ensure you confirm the presence of actual viruses, not just false alarms. Utilize VirusTotal to examine any infected files. If your email client seems unreliable, consider switching to alternatives like Great eM Client. Attachments typically don't run by themselves; however, some scripts within emails might trigger activation. I'm skeptical about this, though—your email client likely receives the same messages via IMAP, causing repeated virus downloads. Most importantly, verify your infection status. Your antivirus detecting a virus in a file is normal if it's infected, but it doesn't confirm your system is compromised. A virus, like any other program, needs some form of execution to harm your system. Antivirus tools monitor for active threats and alert you, not because they're inactive. I can hypothetically send you 200 malicious attachments, but you'd remain safe until you start running them. If you need further assistance, let me know.

A
alex_oo3
Member
249
12-06-2016, 09:17 PM
#14
The documents are located in System32 and highlight their presence as potential threats, indicating the virus was successfully installed.
A
alex_oo3
12-06-2016, 09:17 PM #14

The documents are located in System32 and highlight their presence as potential threats, indicating the virus was successfully installed.

Y
yolominer5
Member
71
12-07-2016, 08:50 AM
#15
Finding and eliminating such a challenge demands sophisticated software. From what I understand, some antivirus programs can identify it, which suggests it shouldn't be too tough. If they isolate it, it indicates the AV functions properly. HOWEVER, in my initial observation, the trojan interferes with other tools. FOR tackling difficult viruses, I suggest using a less reputable program—something underrated but highly effective. Many times, it catches issues that other solutions miss, even on VirusTotal platforms. SpyHunter is one such example. It may be frustrating and sometimes asks for payment, but for seasoned users, it offers excellent detection capabilities. It reveals all infected registry entries, files, etc., allowing you to pinpoint and remove them manually if you're skilled. Removing viruses often requires experience and additional tools—like methods to bypass protection, delete restricted registry keys, or terminate malicious processes. Occasionally, speed is crucial because some trojans survive by using just a few processes; the trick is eliminating them before they regroup. Recently, I encountered a trojan that operated with only a single process. When you attempted to terminate it or use other removal tools, it would crash. That was an intriguing case I resolved remotely, though it was quite challenging. Overall, it’s not necessary to wipe everything every time a virus appears; formatting your entire system is a drastic alternative, which usually doesn’t address the root problem.
Y
yolominer5
12-07-2016, 08:50 AM #15

Finding and eliminating such a challenge demands sophisticated software. From what I understand, some antivirus programs can identify it, which suggests it shouldn't be too tough. If they isolate it, it indicates the AV functions properly. HOWEVER, in my initial observation, the trojan interferes with other tools. FOR tackling difficult viruses, I suggest using a less reputable program—something underrated but highly effective. Many times, it catches issues that other solutions miss, even on VirusTotal platforms. SpyHunter is one such example. It may be frustrating and sometimes asks for payment, but for seasoned users, it offers excellent detection capabilities. It reveals all infected registry entries, files, etc., allowing you to pinpoint and remove them manually if you're skilled. Removing viruses often requires experience and additional tools—like methods to bypass protection, delete restricted registry keys, or terminate malicious processes. Occasionally, speed is crucial because some trojans survive by using just a few processes; the trick is eliminating them before they regroup. Recently, I encountered a trojan that operated with only a single process. When you attempted to terminate it or use other removal tools, it would crash. That was an intriguing case I resolved remotely, though it was quite challenging. Overall, it’s not necessary to wipe everything every time a virus appears; formatting your entire system is a drastic alternative, which usually doesn’t address the root problem.

G
gamingninja18
Junior Member
22
12-07-2016, 03:25 PM
#16
You need a fresh ISO from the official Microsoft site and then reinstall it.
G
gamingninja18
12-07-2016, 03:25 PM #16

You need a fresh ISO from the official Microsoft site and then reinstall it.

W
WF_Catt
Posting Freak
761
12-09-2016, 10:30 PM
#17
I restored my system using a fresh Windows 10 installation from Microsoft, bringing back all legitimate applications and recovering my files and settings. I ran another virus scan to ensure everything was clean before proceeding. To create a backup, I cloned the OS and began testing the remaining programs one by one. Each time I reinstalled something, I booted it, closed it, and set the date two weeks ahead before restarting—hoping to trigger the malware. After several attempts, only one program displayed unusual activity. Once I followed the steps carefully, my computer rebooted automatically after the previous one. When Windows Defender, updates, and antivirus software vanished, I realized the threat had shifted focus toward cryptocurrency mining rather than file theft. This experience deepened my awareness of cyber-security, even if the solution felt extreme for everyday use. I’m grateful for your thoughtful feedback!
W
WF_Catt
12-09-2016, 10:30 PM #17

I restored my system using a fresh Windows 10 installation from Microsoft, bringing back all legitimate applications and recovering my files and settings. I ran another virus scan to ensure everything was clean before proceeding. To create a backup, I cloned the OS and began testing the remaining programs one by one. Each time I reinstalled something, I booted it, closed it, and set the date two weeks ahead before restarting—hoping to trigger the malware. After several attempts, only one program displayed unusual activity. Once I followed the steps carefully, my computer rebooted automatically after the previous one. When Windows Defender, updates, and antivirus software vanished, I realized the threat had shifted focus toward cryptocurrency mining rather than file theft. This experience deepened my awareness of cyber-security, even if the solution felt extreme for everyday use. I’m grateful for your thoughtful feedback!

T
totimen23
Junior Member
47
12-13-2016, 01:23 PM
#18
I used a specific program, which you can find at the official website. Let me know if you need more details!
T
totimen23
12-13-2016, 01:23 PM #18

I used a specific program, which you can find at the official website. Let me know if you need more details!

_
_LilacSoul
Member
183
12-13-2016, 02:44 PM
#19
I'm not revealing details about the program I downloaded; it's a well-known tool for media creation. Be aware that this version doesn't have comments and comes from an unverified source, even with a high seed count. Keep that in mind if you're dealing with similar issues. YARR!
_
_LilacSoul
12-13-2016, 02:44 PM #19

I'm not revealing details about the program I downloaded; it's a well-known tool for media creation. Be aware that this version doesn't have comments and comes from an unverified source, even with a high seed count. Keep that in mind if you're dealing with similar issues. YARR!

T
tsnyder01
Member
171
12-29-2016, 10:19 PM
#20
Consider joining a private tracker if you plan to download. They’re easy to access and offer much better performance than the popular public options.
T
tsnyder01
12-29-2016, 10:19 PM #20

Consider joining a private tracker if you plan to download. They’re easy to access and offer much better performance than the popular public options.

Pages (2): Previous 1 2