More information about trojan malware and how to be sure it's solved

hamza bouhaha 0 Reputation points
2023-01-27T01:28:36.7666667+00:00

a week ago i got a trojan malware that got access to all my private information (hacked my gmail,facebook,instagram...) and all my work luckily i stopped it the momeent i executed the program from task manager so my files didn't get encrypted but only a txt file was added saying i need to pay a ransom... now after checking my cbs.log in safemode i found that more than 1000 lines are added at the exact second i run the malware like: appl : detectparent, package: microsoft-windows.... appl:detectparent : parent-found microsoft-windows-client... , state : installed appl : evaluating package applicability for package microsoft-windows- applicable state :installed and those lines kept repeating i run my free antivirus and microsoft defender full scan multiple times but am afraid that when connecting to wifi the virus will encrypt my files or continue to exist any idea how to solve this ?

Microsoft Defender for Cloud
Microsoft Defender for Cloud
An Azure service that provides threat protection for workloads running in Azure, on-premises, and in other clouds. Previously known as Azure Security Center and Azure Defender.
1,118 questions
Microsoft Configuration Manager Updates
Microsoft Configuration Manager Updates
Microsoft Configuration Manager: An integrated solution for for managing large groups of personal computers and servers.Updates: Broadly released fixes addressing specific issue(s) or related bug(s). Updates may also include new or modified features (i.e. changing default behavior).
923 questions
0 comments No comments
{count} votes

1 answer

Sort by: Most helpful
  1. AlexZhu-MSFT 5,236 Reputation points Microsoft Vendor
    2023-01-27T08:05:14.07+00:00

    Hi,

    For the virus affected scenarios, unfortunately, it is not supported by Microsoft. Per my personal experience, if a computer is ever affected, for safer choice, it is strongly suggested to re-image the computer immediately after moving or keeping the data to safe and clean location, since the current OS is not trusted and may be harmful to the data is we continue to use it.

    Hope the above helps.

    Alex Zhu

    0 comments No comments