Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Hacked Need Help Me And My Gf Desperate


  • Please log in to reply
4 replies to this topic

#1 iamnottelling

iamnottelling

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:03:33 AM

Posted 15 July 2006 - 09:10 PM

About two weeks ago my computer found a nasty program and due to the stress level I cannot remember name. It was used to take over my yahoo account. After downloading Black Ice and gettign hammered and findign more nice spyware, etc. I bascially trashed the computer. Well now my gf is getting HIT BAD.

I had her download hijackthis. She sent me the inital results but to be honest i have no idea what to fix or how. Shes running win 98 se, she's on a dial up modem, and everyday it's getting worse. Shes had a multitude of symptoms, representign dialers, and black ice is still hammering her. Now it's to the point she cannot get online. We need help.

I think they got to her through me. How can u guys help me and what info do you need?

She runs AVG everyday, and also uses search n destroy.

However her system resources are diminishing and her hardrive is nearly full from whatever, we dont' know shes not installing them.

BC AdBot (Login to Remove)

 


#2 tg1911

tg1911

    Lord Spam Magnet


  • Members
  • 19,274 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:SW Louisiana
  • Local time:01:33 AM

Posted 15 July 2006 - 09:42 PM

You should never attempt to fix anything using HijackThis, until someone who is experienced at reading the log outputs, has a chance to review it.
Fixing the wrong items can make a computer unbootable.

It is not a removal tool.
It will indeed remove the entries listed, but that does not cure the underlying problem.
The problem must be properly identified first, and cured, prior to removing the entries with HJT.
Otherwise you leave the infection, and remove the keys which are needed to identify and remove it.

I suggest you post a HijackThis log for examination.
A member of the HijackThis Team will walk you through, step by step, how to disinfect your computer.
Once you post your log, don't make any changes to your system, as that could change the results of the posted log, making it difficult to properly clean your system.

Read Preparation Guide for use before posting a HijackThis Log.
Please read, and follow, all directions carefully!!!

Then, run a log, and post it in the HijackThis forum, at this link. Do not, fix anything, yet.
A member, of the HJT Team, will help you out.
It may take a while to get a response, because the HJT Team are very busy. Please, be patient, as these people are volunteers. They will help you out, as soon as possible.

NOTE:
Once you have made the post, please, DO NOT make another post in the HJT forum, until it has been responded to by a member of the HJT Team. The first thing they look for, when looking for logs to reply to, is 0 replies. If you make another post, there will be 1 reply. The team member, glancing over the replies, might assume someone is already helping you out, and will not respond. So, just make your post, and let it sit there, until a team member responds. This way you will be taken care of, in the most timely manner.
MOBO: GIGABYTE GA-MA790X-UD4P, CPU: Phenom II X4 955 Deneb BE, HS/F: CoolerMaster V8, RAM: 2 x 1G Kingston HyperX DDR2 800, VGA: ECS GeForce Black GTX 560, PSU: Antec TruePower Modular 750W, Soundcard: Asus Xonar D1, Case: CoolerMaster COSMOS 1000, Storage: Internal - 2 x Seagate 250GB SATA, 2 x WD 1TB SATA; External - Seagate 500GB USB, WD 640GB eSATA, 3 x WD 1TB eSATA

Become a BleepingComputer fan: Facebook

#3 iamnottelling

iamnottelling
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:03:33 AM

Posted 16 July 2006 - 06:16 PM

Thank you for that which is exactly why I am not messing with it. :thumbsup:


I didnt' know if i should post this anywhere else but I have a 2nd question, actually i have at least 40 but I will keep it short.

Are any IM programs safe? I can't seem to find anythign about them here. I know yahoo isn't as that is how i first learned of my eavesdropper. Suggestions?

#4 ComputerMan23

ComputerMan23

  • Members
  • 309 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:03:33 AM

Posted 18 July 2006 - 03:23 PM

Thank you for that which is exactly why I am not messing with it. :thumbsup:


I didnt' know if i should post this anywhere else but I have a 2nd question, actually i have at least 40 but I will keep it short.

Are any IM programs safe? I can't seem to find anythign about them here. I know yahoo isn't as that is how i first learned of my eavesdropper. Suggestions?



No IM programs are 100% safe. but get AIM. and then go to AIMencrypt.com and download the certificate.

any questions ask me.

#5 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,470 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:03:33 AM

Posted 18 July 2006 - 06:30 PM

I didnt' know if i should post this anywhere else but I have a 2nd question, actually i have at least 40

Posting your questions here is fine.

However, after posting a log you should not make further changes to your computer (install/uninstall programs, use special fix tools, delete files on your own, etc.) unless advised by a HJT Team member. Doing so can result in system changes which may not show it the log you already posted. Any modifications you make may complicate the malware removal process and could lead to your system being damaged further.

So while waiting for instructions on dealing with you log, feel free ask questions.

As for information on the dangers of IM programs read some of the links I have posted here.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users