Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

My computer was Hacked and remotely accessed. Crazy Ex girlfriend ) - :


  • This topic is locked This topic is locked
6 replies to this topic

#1 LeeOttawa

LeeOttawa

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:10:31 AM

Posted 15 July 2017 - 05:24 PM

I know who the hacker is.. My crazy ex girlfriend.. She used a keygen to hack me... She messed with my permission settings. Accessed my Kaspersky and blocked windows security and firewall. Stopped me from downloading any antivirus or firewall programs.. I got rid of her by logging in to safe mode and setting the kaspersky setting to default.. I also unblocked all the safe modals and blocked the not trusted ones. Did a Scan and deleted the Keygen she used to hack me.. My question now.. Is how do I find the I.P Address or any proof I can show authorities that it was in fact her that accessed my computer.. 


Edited by LeeOttawa, 15 July 2017 - 05:39 PM.
Moved from Intros to Gen Sec - Hamluis.


BC AdBot (Login to Remove)

 


#2 TsVk!

TsVk!

    penguin farmer


  • Members
  • 6,233 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:The Antipodes
  • Local time:12:31 AM

Posted 15 July 2017 - 06:30 PM

Is your ex-girlfriend really that good with computers? It takes quite a bit of knowledge to implement what you are talking about, this isn't something someone can just decide to do and then implement. It takes a lot of knowledge and experience.

 

Not saying that she didn't run the keygen (keygens are bad mmmkay?) but that the player at the other end of the keygen, the one who coded the thing, is in all likelihood not her.

 

A connected IP address proves nothing, and unless there is a tangible loss of data or money the police won't be interested.



#3 buddy215

buddy215

  • Moderator
  • 13,194 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:West Tennessee
  • Local time:09:31 AM

Posted 15 July 2017 - 07:04 PM

A keygen...key generator....is just that. Users get into trouble when they attempt to get a key for a software program from a p2p or other source to avoid

paying for the software. For more detailed info on what a keygen is....Keygen - Wikipedia

 

Whatever program you used...I assume Kaspersky....that removed the malware responsible for the changes, should be still in Kaspersky's

log. Post what Kaspersky found and removed.

 

Someone having access to your computer could of put a keylogger or a remote access program on your computer. That would be what

someone having physical access would do to monitor your activity.


“Every atom in your body came from a star that exploded and the atoms in your left hand probably came from a different star than your right hand. It really is the most poetic thing I know about physics...you are all stardust.”Lawrence M. Krauss
A 1792 U.S. penny, designed in part by Thomas Jefferson and George Washington, reads “Liberty Parent of Science & Industry.”

#4 TsVk!

TsVk!

    penguin farmer


  • Members
  • 6,233 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:The Antipodes
  • Local time:12:31 AM

Posted 15 July 2017 - 07:13 PM

Also to note, keygens commonly contain a malware element also even though they are not usually destructive in themselves.



#5 LeeOttawa

LeeOttawa
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:10:31 AM

Posted 15 July 2017 - 10:30 PM

Thank you BC Adviser.. It would not let me attach a screen shot of the spyware found as a reply.. But I just did another post with a screen shot attached this time.. This might help though.. The Detected object found was C:\Windows\Setup\Keygen.exe and the Object name is Hacktool.win32.KMSAuto.i   the object type: Malicious utility or packed object whose packing may be used to protect malicious code. 



#6 buddy215

buddy215

  • Moderator
  • 13,194 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:West Tennessee
  • Local time:09:31 AM

Posted 16 July 2017 - 05:01 AM

Usually when that KMSAuto is found it means that there is an illegal copy of Microsoft Office or other Microsoft product.

 

I see you have a topic in the malware removal forum. My Crazy narcissistic Ex Girlfriend Hacked My Computer using Remote Access. - Virus, Trojan, Spyware, and Malware Removal Logs

But you didn't include FRST logs per instructions for posting in that Forum.

You need to  edit your topic there to include the FRST logs.

 

Please follow the instructions in the Malware Removal and Log Section Preparation Guide starting at Step 6.

  • In Step 6 there are instructions for downloading and running FRST which will create two logs.

When you have done that, post your logs in your topic in the malware removal forum, NOT here, for assistance by the Malware Response Team.


Edited by buddy215, 16 July 2017 - 05:03 AM.

“Every atom in your body came from a star that exploded and the atoms in your left hand probably came from a different star than your right hand. It really is the most poetic thing I know about physics...you are all stardust.”Lawrence M. Krauss
A 1792 U.S. penny, designed in part by Thomas Jefferson and George Washington, reads “Liberty Parent of Science & Industry.”

#7 Chris Cosgrove

Chris Cosgrove

  • Moderator
  • 6,707 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Scotland
  • Local time:03:31 PM

Posted 16 July 2017 - 04:35 PM

Since a topic has been started in 'Virus, trojan, etc. logs.' this topic is now closed.

 

Chris Cosgrove






0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users