Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Support
Windows Malware Removal Help & Support
Remove malware from data files on USB?
Message
<blockquote data-quote="puffball" data-source="post: 361377" data-attributes="member: 34928"><p>So here's the question: my father has Family Treemaker files on that USB that we really need to recover.</p><p></p><p>Because of the speed of the reinfection (none of the data files were opened after I copied them back on the the PC), I'm going to guess that the malware traveled on the USB, either in the folder structure or the firmware. (As a side question, can this USB be cleaned and safely used again?)</p><p></p><p>If the data files themselves are not infected, I thought about possibly copying them up to an online Dropbox or other account to strip off the malware (copying just the files, not the folders), then downloading them to a PC running Ubuntu (not Windows)...then transferring them to a fresh (never used) USB and back to the original (reformatted again) Windows PC. Or is there a way I could try to clean the data files themselves?</p><p></p><p>These files are not encrypted (no cryptolocker or ransomware), and they had their original creation dates when I copied them onto the USB, though that may not mean much.</p></blockquote><p></p>
[QUOTE="puffball, post: 361377, member: 34928"] So here's the question: my father has Family Treemaker files on that USB that we really need to recover. Because of the speed of the reinfection (none of the data files were opened after I copied them back on the the PC), I'm going to guess that the malware traveled on the USB, either in the folder structure or the firmware. (As a side question, can this USB be cleaned and safely used again?) If the data files themselves are not infected, I thought about possibly copying them up to an online Dropbox or other account to strip off the malware (copying just the files, not the folders), then downloading them to a PC running Ubuntu (not Windows)...then transferring them to a fresh (never used) USB and back to the original (reformatted again) Windows PC. Or is there a way I could try to clean the data files themselves? These files are not encrypted (no cryptolocker or ransomware), and they had their original creation dates when I copied them onto the USB, though that may not mean much. [/QUOTE]
Insert quotes…
Verification
Post reply
Top