You are viewing our Forum Archives. To view or take place in current topics click here.
#31. Posted:
Andrewva
  • Challenger
Status: Offline
Joined: Apr 21, 201113Year Member
Posts: 105
Reputation Power: 4
Status: Offline
Joined: Apr 21, 201113Year Member
Posts: 105
Reputation Power: 4
I have a MOM.exe file What do i do?!? I looked at the file location and the last date it was modified was april 09 so it's been there for about 3 years. Never had any accounts hacked in that time though. Any advice?
#32. Posted:
-Hobbz-
  • Challenger
Status: Offline
Joined: Nov 03, 201212Year Member
Posts: 162
Reputation Power: 8
Status: Offline
Joined: Nov 03, 201212Year Member
Posts: 162
Reputation Power: 8
thanks for this helped good info
#33. Posted:
vokal
  • TTG Addict
Status: Offline
Joined: Dec 05, 201014Year Member
Posts: 2,130
Reputation Power: 103
Status: Offline
Joined: Dec 05, 201014Year Member
Posts: 2,130
Reputation Power: 103
rickshaw wrote
ANY ATTEMPTS AT PROMOTING ANY KIND OF HACKING IN ANYWAY WILL RESULT IN AN IMMEDIATE BAN

This thread was made for educational purposes only, Due to the fact that I see so many of you guy's goofin up daily! I will admit that I am not the greatest with this stuff, but I do know enough to keep my self safe, and I hope this will help keep you guy's a bit safer aswell.

Ok guys, I have wanted to do this for a while.. Mainly because not many of you understand what you are doing. The internet, is a terrible, cruel, unforgiving place, it will hurt you if you give it the option. Hopefully i can help clear some thing's up below.

-When people post something that is to good to be true, it most likely is.

-When it is a .rar or .zip, it can have anything hidden inside of it, and can activate itself the second you unzip it!

-When you extract a .Rar or .Zip it can have hidden files like 'Keyloggers'.

-Once you have been infected your information will most likely be at high risk,
the only defense really is to format/reinstall your OS on your computer, and get ALL of your Passwords/Personal information changed very quickly.

-It is always a good idea to check your processes on your computer, To do so Ctrl+Alt+Delete-->click the tab that says proceesses
*Picture*
[ Register or Signin to view external links. ]


-Reading the description will usually give you an idea what that process is doing, If it says something stupid like MOM.EXE or CANDY.EXE (Full capitals or something not PC related are usually giveaways)

*Picture*- Notice how all these are associated with a program that is well known, If you have no idea what the Process is, use google! Thats why it is there!
[ Register or Signin to view external links. ]


-A good Anti-Virus usually helps aswell,Something like Norton is not always the best.(It is still good though ) Norton is so well known it is usually a target, people will try and make whatever they are making so Norton can't detect it. My personal choice, from pictures above, is AVG.

-Also, if you think you may ever had someone viewing your personal information, check your email account's. Go in there and make sure that there are no email forwarders.

-Unless you manually want to dig into your computer and remove any spyware, loggers, or bots the best/easiest way to remove them is a complete OS Install. A logger can hide itself anywhere, and you may never find it all and get rid of it.

-Once you have been added into the person's 'BotNet' he will then use your connection/computer for either Host booting, or just help himself to your personal information, such as emails, youtubes, paypals, xbox accounts.

-Like i said before, if it seems to good to be true, it most likely is, Ever hear of a 'Point Generator' ? Do you really think Microsoft would let something like that happen!? It is either just a simple troll, or has a fisher in it and will email your details to the creator!

-Another thing to make sure of is check the file size. If you know your downloading something like photoshop, and the file is 200KB, you might have a small issue.

-While we're talking about stuff like photoshop, Keygenerators often come up *Not promoted by Me or TTG in anyway!* a keygenerator is a .exe, When you run a homemade .exe make sure you know where it comes from! It is rather simple for them to put a keylogger in it. Always, Always, Always run virus scan's on the file's and programs, and keep asking questions. Try your best to Not except any programs or file's from people you don't know, and especially off of youtube!

I hope this will help you guy's a bit, Any questions you may have, I will try and answer so feel free to P.M or post about it


*Any other info i can think of later will be added*
seems like a helpful thread for internet beginners,though i will point out you can make a virus show up as any process you want, the smart people inject into a system dependent process like csrss.exe which cant be killed while the system is running nor debugged while running because of the permissions needed to access it while the system is loaded are not available to the user.this is a very very tiny tip of the malware iceberg.
here is a demo video of website cloning and victim hijacking that is nearly undetectable by anti virus or the user. makes you rethink about using public networks.
#34. Posted:
ibeKlumbers
  • Junior Member
Status: Offline
Joined: Dec 15, 201212Year Member
Posts: 65
Reputation Power: 2
Status: Offline
Joined: Dec 15, 201212Year Member
Posts: 65
Reputation Power: 2
Your sort of false alerting people here rickshaw.

'When it is a .rar or .zip, it can have anything hidden inside of it, and can activate itself the second you unzip it!'

This is incorrect, a virus needs to be executed. It won't be hidden in the actual .RAR or .ZIP but it will be hidden within the files which are being extracted, they could bind any virus with any program nearly. Although what you gave as information off the plate, is incorrect.

Password stealers and RATs are also a lot more common then keyloggers, for example, password stealers will remove the saved passwords from all your browsers, the majority of the things you use and have passwords saved on, this can go from Minecraft to MSN and it will take them instantly, so formatting won't change anything. You inform people as if keyloggers are the most used thing in today's modern age, RATs are used 10 times as much and you are more then likely to be infected with a RAT then a keylogger, a RAT can control anything you can control except for physical items within your computer itself, it can control things you cannot even control, it can hide processes so you can't see them in your processors tab, it can hide the process as soon as you execute it so it won't be traceable, they can also be binded to anything and making the RAT fud could make it bypass your antivirus which makes it useless, that's the reason I don't use antivirus software. They can also easily have icons, so don't think that anything with a actual icon is safe, because I know a lot of people who think this. The first thing I would do when I get a RAT would be to re-install windows, I wouldn't even risk the person behind the RAT to gain any information from my computer which they could easily do if you spend time looking for it as you said to do within the original post. I have gone 4 years without receiving a virus, it's all about knowing what you are doing, antivirus software is useless into today's age.

Just helping some users out also, if you do download any 'dodgy' file, you should always scan it on [ Register or Signin to view external links. ] because they send reports to antivirus companies which would make the file detectable by the software's, although 1 character change within the code of a STUB (used to fud things) could easily make it undetectable again.
#35. Posted:
XiX_Eb0y_XiX
  • New Member
Status: Offline
Joined: Jan 01, 201311Year Member
Posts: 19
Reputation Power: 0
Status: Offline
Joined: Jan 01, 201311Year Member
Posts: 19
Reputation Power: 0
You can hide the process from task manager rendering "Process" on task manager useless you can unpack/extract a .zip/.rar file but if you open the .EXE or any other type of file extension you don't trust the file you can either scan it but it could be FUD (Fully un-detectable) or you can disassemble the program and take a look for yourself (Not going to get into that)
#36. Posted:
Hobbz
  • Powerhouse
Status: Offline
Joined: May 26, 201113Year Member
Posts: 448
Reputation Power: 19
Status: Offline
Joined: May 26, 201113Year Member
Posts: 448
Reputation Power: 19
nice post very helpful
#37. Posted:
Bust
  • TTG Senior
Status: Offline
Joined: May 14, 201212Year Member
Posts: 1,611
Reputation Power: 70
Status: Offline
Joined: May 14, 201212Year Member
Posts: 1,611
Reputation Power: 70
Since your trying to make this professional you might want to get your 'to' and 'too' sorted
#38. Posted:
clapper
  • Wise One
Status: Offline
Joined: Aug 07, 201311Year Member
Posts: 505
Reputation Power: 26
Status: Offline
Joined: Aug 07, 201311Year Member
Posts: 505
Reputation Power: 26
yea i can agree with this hacking.. on a modding site :/ makes no sense at all
#39. Posted:
Aftermarket
  • Rising Star
Status: Offline
Joined: Nov 15, 201311Year Member
Posts: 704
Reputation Power: 24
Status: Offline
Joined: Nov 15, 201311Year Member
Posts: 704
Reputation Power: 24
good post, probably helped out a lot of people. a word of advice from me is to have both an anti-malware and an anti-virus as they pick up different things
#40. Posted:
AGuyUDontNo
  • Junior Member
Status: Offline
Joined: Nov 10, 201311Year Member
Posts: 53
Reputation Power: 2
Status: Offline
Joined: Nov 10, 201311Year Member
Posts: 53
Reputation Power: 2
in my process it says MOM.exe is this a problem
Jump to:
You are viewing our Forum Archives. To view or take place in current topics click here.