Home > Help > Help ! HJT Log & Unauthorized Access To My Computer

Help ! HJT Log & Unauthorized Access To My Computer

Here is the one that always comes up as HIGH and I have about 10 of them.QuoteDate/Time :2007-07-28 22:04:33Severity :HighReporter :Application MonitorDescription: Suspicious Behaviour (iexplore.exe)Application: C:\Program Files\Internet Explorer\iexplore.exeParent: C:\Program Files\Internet Explorer\iexplore.exeProtocol: You can postpone the total-recall of that machine to the days where your daughter starts to take after her mum's excellent security attitudes, and I hope that day will come soon.On This, I hope, should enable you to post the Network Monitor image.Don't worry, you do not sound stupid. Completely blowing it all away is the only sure method to get your machine back to being 100% safe. http://inc1.net/help/help-old-computer-was-buggered-up.html

There's no excuse for not backing up your computer, and you should be doing it anyway. Keep your OS locked with a strong password if you must leave your machine unattended, but only do so in an environment where someone can't steal your computer. Try to contact this nice Belgian Malware Fighter, the lady is Microsoft-MPV, and she might like to welcome you and train you,http://miekiemoes.blogspot.com/ & http://support.bluemedicine.be/mybb/user-1.htmlpolonus (malware-fighter)Coming from you, polonus, this is as But, you will not see the image type of BMP.

Sorry it took so long. In addition, you can also always post here & ask for advice (posting some Log examples will help), there are plenty of people here that will happily help.Thanks for this advice. They should be changed by using a different computer and not the infected one. Are these programs that have tried to acces my computer and Comodo has blocked?

Also in security I clicked Define a New Trusted Network, and followed the prompts. And if it pops up again I will come here for help. Download a Firewall- If you haven't already got a firewall, it is Very important that you download one. It seems OK now.

Not sure if you know of this program or not. (the icon will be green if the site you are on is safe, it will turn yellow and you know to CFP always blocks unauthorised inbound communications & will block anything that you (your system) did not ask for (also called "unsolicited" requests). It is recommended that you have both, because one will pick up entries that the other misses. Is this okay??? « Last Edit: August 04, 2007, 10:41:13 AM by yjsk2100 » Logged Married 34 years and still in like kail Randomly Appearing Global Moderator Comodo's Hero Posts: 11358

Avast community forum Home Help Search Login Register Avast WEBforum » Other » Viruses and worms (Moderators: Pavel, Maxx_original, misak) » [SOLVED?] please help with malware infestation, If you're not sure you have the basics covered well enough, check out our online security checklist.Be wary of public Wi-Fi. Advertisement For less obvious intrusions you'll need to do a little detective work to find the gateway. I will be trying out PC Tools firewall first, based on what I have read as well as the opinions of a few people I know who are using it.My daughter

Do you think I have too many installed or do I need more since I keep getting high security events? great post to read I am using Windows XP Professional SP2, IE7, Comodo Firewall, AVG Anti-virus, Spywareblaster, Windows Defender, Tuneup2007, Ad-aware 2007, McAfee Site Advisor, ID-Spyad and WinPatrol. Date/Time :2007-08-16 12:02:34Severity :HighReporter :Application MonitorDescription: Suspicious Behaviour (iexplore.exe)Application: C:\Program Files\Internet Explorer\iexplore.exeParent: C:\Documents and Settings\Administrator\Local Settings\Temp\SiteAdv.exeProtocol: TCP OutDestination: 63.240.76.72::http(80)Details: C:\Program Files\Internet Explorer\iexplore.exe is an invisible application There are more but I And most of them had to do with Site Advisor.

That being the case you do not need a Trusted Zone. http://inc1.net/help/help-numerous-viruses-on-my-computer.html Mail Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exeO23 - Service: avast! Visit Windows Update Pay a visit to Windows Update and scan for and download ALL Critical Updates and Service Packs. Logged Pentium Dual-Core 2.5 GHz, 250GB HDD, 2 GB RAM, WinXP Pro SP3, reasonable caution/adequate paranoia, Mozy, Firefox, IE8, CCleaner, Avast!

Sign out of every email session, social media session, and whatever else you were logged into. I do know when I update a program an alert comes up and because it has to do with the update I allow. Learn More. http://inc1.net/help/help-my-computer-won-t-turn-on.html There are some weak points that almost everyone is vulnerable to, so get familiar with them.

lifehackerDeadspinGizmodoJalopnikJezebelKotakuLifehackerThe RootVideoindexSkilletTwo CentsVitalsApp directoryGearWhat to Do When Someone Gets Unauthorized Access to Your ComputerPatrick Allan6/16/14 8:01amFiled to: securityprivacypc securitymalwarevirusantivirusanti-malwarepassword securityweb security6612EditPromoteShare to KinjaToggle Conversation toolsGo to permalink We don't like to Help with Prosearching removal - HJT log Discussion in 'Spyware, Adware, Viruses and Malware Removal' started by tiggergabe, Sep 7, 2004. Member Posts: 248 huh?

Once it's running, check that it's doing its job properly.

I went back and read the logs I had saved, found one that read high and then just saved it on the previous post. Having Universal Plug and Play (UPnP) enabled on your router can leave it vulnerable for certain types of attack, and be sure to turn off Wi-Fi Protected Setup (WPS) on your When you see CPU usage and memory usage spike, you have a better chance of identifying when something is wrong.Additionally, look at your network traffic. Take a close look at all of the little things you've downloaded and installed, and remove anything that looks suspicious.Change your passwords after an incident like this.

We are seriously considering wiping the drive clean, formatting and re-installing XP. Still getting use to Comodo and as I run across something I don't understand at least I know where I can come to get some help. And last of all, please remember, that common sense is your greatest tool. http://inc1.net/help/help-how-to-remove-tudouva-exe-from-my-computer.html Avast Evangelists.Use NoScript, a limited user account and a virtual machine and be safe(r)!

Search - file:///C:\Program Files\Yahoo!\Common/ycsrch.htmO8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MI1933~1\OFFICE11\EXCEL.EXE/3000O8 - Extra context menu item: Yahoo! &Dictionary - file:///C:\Program Files\Yahoo!\Common/ycdict.htmO8 - Extra context menu item: Yahoo! I have learnt many things from watching her in action Logged t l s Sr. How to Get Rid of a Virus (Even When Your Computer Won't Boot) How to Get Rid of a Virus (Even When Your Computer Won't Boot) How to Get Rid of Internet Security polonus Avast Überevangelist Maybe Bot Posts: 28549 malware fighter Re: please help with malware infestation, hjt log « Reply #17 on: October 24, 2008, 03:56:35 PM » Hi t

Think for now I have some of my questions answered. yjsk2100 Newbie Posts: 22 Re: Comodo Firewall 2.14.18.184 question « Reply #4 on: July 29, 2007, 10:30:10 AM » Quote40000? The scan amount just needs increasing a little to avoid this.Suspicious Behavior (iexplore.exe): Yep, that is OK.. Thankfully, they didn't appear to do much—besides post silly pictures of Jack Nicholson on Lifehacker—but it could have very easily been disastrous, and it got me thinking about what would have

I'd get the point on the first one. When the unthinkable happens, here's how to pick up the pieces. The alerts.. Malicious attackers try to be as discreet as possible, so Blake emphasizes the importance of knowing your machine.

Re: please help with malware infestation, hjt log « Reply #18 on: October 25, 2008, 12:18:38 AM » Thanks, Polonus. CFP pays very careful attention to not only the programs themselves, but also their relationships (what calls what & how). Most malware does not attach itself to personal document folders, but Blake cautions that reintroducing any file from the old system could possibly reintroduce the malware.Prevention Is Your Best Defense It We are working to restore service.

Sorry if I sound so stupid but I really want to know this program and how to use it correctly. I am sure I have more questions but for now I just need to know how to do the printscreen to make the network monitor picture be posted here. Thanks. When you created the Trusted Zone that would have created 2 rules in CFPs Network Monitor that mention "zones".