Want To Read This Computer Code

Discussion in 'Software' started by faster, Mar 4, 2018.

  1. faster

    faster Private E-2

    I need to read what several suspicious files say. In Wordpad, it shows mostly symbols, with a variety of file names and tree paths in English. The words are often displayed with a space between each letter. These are names of folders and programs I have used recently.

    Is there someone who can translate them? I would think there ought to be a way of doing that, without having to be taught these programming languages.

    If nobody can read the computer code, can someone at least tell me what the code's name is? Or refer me to a decent hacker?

    I want to know what they're saying. It's important.

    Thanks.
     
  2. Eldon

    Eldon Major Geek Extraordinaire

  3. faster

    faster Private E-2

    This is the file name of a very recent one:
    e4c8d7fa425e0bd1.customDestinations-ms

    Point well made! There are gazillions of languages. Somewhere, somehow, somebody IS able to read these files. Like the hackers. It might take a "reformed" hacker to track them down. This is, beyond doubt, being done to me by someone at the PhD level of programming. Very likely, it's of a political nature. They've chewed my browsers into dogmeat.

    I don't want to send you any of these files now, because they are used in an attack on my system. I'm NOT imagining this. My own expert can't help, but he knows the attack is real, and heavy. These files are put on my system by a VERY sophisticated hacker. By accident, I found that they are sending these files somewhere - probably to the hacker - because the Destinations folders contain messages to be sent via mobile equipment. I have none, but I do have an aerial. These folders should always be empty. Yet, online I watch the folders at all times, and files like these are put on one or the other folder (usually Custom) about every 2-3 minutes. When I see one, I cut/paste it into a folder I created to hold them.

    Thank you, but I am past needing your help to find the attack. This attack runs through my whole system - too many ways to explain them all. It can even use trusted files to do t heir bidding - it can learn and adapt new strategies. I can't even boot to Windows; I'm on Safe Mode with networking. They've manipulated ZoneAlarm. Sometimes it is sending when I think all access is closed. It seems to have more control of my system than I do, so I'll be formatting C: very soon, but I want to have these files translated first.

    They are products of a hack, calling home. So I want to know what they are sending, and to whom. I'd like to send the files (all 1070 of them) to someone who can research them - by translating them and tracking down the recipients.

    It's kind of you to want to put my mind at ease, but it's far too late for that now. I don't expect the people at Major Geeks to have training at this sophisticated level. It would be unfair to you. I'll send you the info on the above file, in .wpd if you think it would be safe to receive it.

    Since these files are addressed to the hacker, I'd think many people would like to help track them down. These files have to be addressed somewhere. I want to submit them for analysis before I format C.

    I want to know what info they are sending about me, but even more, I also want to catch the hackers. These files MUST have an address to send them to. I want them tracked down. I'll send them to anyone who can receive them without it hacking THEIR computer too.

    I'd appreciate knowing how to find someone with this kind of specialized knowledge who can analyze them. Maybe you can instruct me how to contact appropriate law enforcement? It really IS that bad.

    I know they'll go after me after I format. I'd appreciate knowing the best way I can become invisible to them. Changing my IP will come first, of course, but they'll soon find me there, too. Router? VPN? Proxy? Or all of the above?

    Thanks for all the help Major Geeks and you have given me. Please help me learn what they're doing in the files, and help me track them down.

    Again, thanks.
     
  4. dr.moriarty

    dr.moriarty Malware Super Sleuth Staff Member

  5. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    A CUSTOMDESTINATIONS-MS file is a Jump List file used by Windows 7, a Microsoft Windows operating system (OS). It contains timestamps, applications used that are pinned on a user's taskbar, and paths to items (documents, audio or video files, webpages, etc.) recently accessed by a program pinned on a user's taskbar.

    The CUSTOMDESTINATIONS-MS file is created when you use a program pinned to your taskbar.
     
  6. faster

    faster Private E-2

    Thanks, but it isn't only dealing with pinned items. If these folders are NOT sending these files somewhere, what does "Destinations" mean? I'm sure you're not saying these files aren't being sent anywhere. They're in the Roaming category, too, and I do no roaming from my wheelchair! Don't use mobile.

    Nor do I see any reason for the use of coded computer language. I will check at Microsoft about that. If these can't be files being sent somewhere, I'll be glad to know that. Do you know what possible purpose these files could have in W7? How can I know what destinations are for? The normal function of these folders could also have been changed. My W7 is VERY sick.

    It can take the name of ANY program I access, and make ZoneAlarm produce a popup telling me it is malware, when it's NOT on the list. If I try to add it to the list to give it permission, it doesn't happen. ZA sometimes runs even when I've turned it off. So I guess they own ZoneAlarm too.

    The hacker even infected Avast, that I downloaded from their own site. I'm sure Avast didn't do that . Now I have files and folders from Avast that I can't delete - permission denied. That goes for lots of its Registry entries. Permission denied. By whom?

    There has been an "Unknown Network" on my system for months, but one of my efforts let me use my real network name again. Before that, Windows wouldn't let me change it in any way. Until then, somebody else's network was controlling my internet access.

    I'm sure you don' t need any more grisly details. But it also deleted some drivers, so I can't boot into Windows. I'm sure you can see that this is industrial strength malware.

    Is there some reason you can't recommend something that could make me invisible online? Even just that would help a lot.

    Thanks.
     
  7. dr.moriarty

    dr.moriarty Malware Super Sleuth Staff Member

  8. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    If that is the case, how are you posting here? Do you have a second computer? We would like to help you, but you need to stay calm and follow thru with directions, such as the thread you started with Dr. Moriarty.
     
  9. Trex™

    Trex™ Private First Class

    At the risk of sounding rude... I'm a bit skeptical about your situation. I've come across a few other people with claims very similar to this, none of which I was able to definitively verify; whether I had physical access or remote access to their system. I think it's more likely that... for whatever reason... you began delving into the inner workings of your system, and have discovered unfamiliar, "suspicious" content. Of course, I know this isn't an acceptable possibility for you, but please... allow me to provide an example or two.

    Have you ever taken a gander at the 'Security' log in the Event Viewer? If you have, it could seem like tons of recorded logins from unauthorized users. This simply isn't the case. Here's another example... hold on to your tin foil hats! Don't freak out! While you're going through countless files on your system, check under 'Properties' then 'Security' on some of them. I'm not entirely sure if this is the case with Windows 7, but on Windows 10, some files and folders have an 'Unknown User S-1-15-3-1024-1502825166' listed with full control permissions. This may have already been corrected, but to anyone that neglects to use Google, this would look extremely suspicious. The fact is... its all legitimate.

    Again, please forgive my rudeness, and understand that I am fully aware that what you are suggesting is 100% real and possible... particularly when politics are involved. However, if you take the time to do some research, use Google, and look into some of the questionable material you encounter... I think you'll find a lot of the things that appear very suspicious are actually legitimate. Though I'm almost sure, without doubt, that you will insist your claims are valid... in which case, I do have a suggested approach.

    Take a look at Microsoft's SysInternals which I will provide in URL form below to accommodate your paranoia. These programs are a powerful set of tools that will allow you to record, collect, and analyze almost every aspect of your system's inner workings. It will take some time to learn how to use the programs, but with the proper motivation and with enough effort, you'll have control of the most powerful tools in anti-hacking you can get without actually being a hacker.

    Hope this helps, but if it doesn't, I suggest a couple of Tylenol PM's and at least a good 12 hours of sleep. :)

    SysInternals: https://docs.microsoft.com/en-us/sysinternals/
     
  10. faster

    faster Private E-2

    It used to belong to someone else 3 yrs ago. It has worked well until I got this crippling infestation. I never saw a need to preserve files - until now!

    Dr. Moriarty : did you say I can use Kaspersky not only to disinfect, but that I should ALSO use it to move my videos and important files to the thumb drive? Will the K file tell me how to do that? I was going to use it to disinfect, then, I'd HAVE to boot to safe mode in order to access the files I want to copy. Or can K let me select these files without going into safe mode? If so, that'd be great. I can access the tutorial K video, but - no sound in safe mode. Are you SURE Kaspersky will let me save my files WITHOUT having to use Safe Mode to select them?

    You found my other post. Good. I hadn't checked it for a while. I have the Kaspersky file, but it's an . xml, not an .iso. Does that matter? I WILL reformat and reinstall W7, but have to save my videos and important files first. My expert is helping me do that .

    Don't worry about me getting my knickers in a knot! I'm not fearful. The damage is already done. I've been incensed now for several months. Used to it by now! I'm getting a stick, 250G, and a new hard drive - maybe a new motherboard, too. I was ready for them before this - good thing, too.

    What I needed from you is advice on these files . Maybe Windows has a benign use for them, but still, I'm fairly sure the hacker is using them for their own purposes. They've done it to programs and files all over my system.

    I do know how to use BIOS to change the boot disk to the thumb drive. Hey hey.

    Either way, I've been royally hacked. And will be again if I can't make myself totally invisible to them. How should I go about doing that?

    THAT is probably the most important question.

    TimW: It's easy to network in safe mode. This is my only PC. I'm an old retired disabled lady, which means I've had time to investigate this hack. I don't know that the bootable Kaspersky file will do much, but unless K lets me select and save the files to the stick, I'd prefer to save them first. Then I'd let it go to town. I thought to save the files BEFORE USING Kaspersky because I don't know what it will do to my system. If there are deleted drivers, I doubt Kaspersky will get me into Windows. I have no W7 disk - the original owner still has that.

    My expert is good, but maybe not as good as you guys are. So I'm running some things by you in case you can think of things he doesn't know about. You Geekers have helped me before.

    My cleaning lady lives next door. She's quite a dynamo - school and work, both full time, and a single mom raising her son. And she helps a lot, but not with programming. For me, she's a godsend, and she's probably a lot smarter than I am!

    Oh, can you recommend a program that zeroes out the whole HD before I reformat? I'm sure a normal format (which leaves some registry entries behind) won't be enough. I'd bet a rusty nickel that the hack can re-establish itself from those Registry entries. So what's the best Disk wiper?

    Again, thanks!
     
  11. dr.moriarty

    dr.moriarty Malware Super Sleuth Staff Member

    You most definitely need to return to your other thread(see my link in post#7) and r-e-a-d! There are links there that take you directly to an .ISO download of the Kaspersky Rescue Disk (post#3), a link to a tutorial for using it (post#17) and also here ==> https://support.kaspersky.com/8092#block2 . I am CERTAIN that you can save your documents using it... OUTSIDE of using Windows at all!
    Then the questions about the customDestinations-ms files (since you won't accept what TimW has posted) are neither "here-nor-there". Your 'expert" and or your "computer engineering student/cleaning lady" should know how to stealth your ports using your firewall. *Why aren't you following the instructions already given to you more than 2 weeks ago?????
    http://www.majorgeeks.com/files/details/dariks_boot_and_nuke.html
     
  12. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Just so I understand clearly, you can boot into safe mode with networking but not into normal mode.

    If so, please download MalwareBytes from MajorGeeks and have it do a deep scan. When done, it will produce a log. Attach that to your next reply.
     
  13. faster

    faster Private E-2

    Thanks, Trex, for the input. If I were paranoid, I wouldn't seek out help here. I'm seeking it because I WANT advice, information and guidance about things that are truly suspicious. I HAVE checked properties and security on many items in my system. Often. I've used administrative tools, checked some items out at the command prompt, and much more. Moreover, I've learned, more than once, that a suspicious item was not bad. Idon't mind being wrong.

    It is NOT paranoia that my browsers malfunction in a huge way, cutting off from logging in or commenting on certain sites. When Firefox is being compromised, I go to Chrome , and it works there, but only temporarily. Then both browsers have it. That's not an attitude, but a fact, as is the fact that something is preventing Windows from loading, and the fact that there is an unknown network that either overrides my real net work, or tells me I have "Multiple networks", when I KNOW I have only one real one. Recently, a new wireless network appeared that wasn't there before. This rogue network cannot be deleted, too. I guess I'm paranoid to think that is not benign?

    My system also seems to think there are other users, when it's only me. Am I just imagining it when ZA will load certain pages when it is turned off? Or that ZA gives me warnings that a certain program is malware when it isn't , and when I try to put that program on the list and then approve it, nothing happens?

    If all this happened to you, and it was presumed to be your imagination by people who seem to be there to help you, how would you feel about being so easily dismissed? At this moment, the Network and Sharing app shows my real network, but it shows up as not connected. But I AM online, and reach URLs with no problem. If you can't understand it, that's okay, just say so.

    I hope you're not telling me that all the above problems are just in my imagination, and there are no bad guys at all. Am I just imagining it when I am really IN Windows, but think it is safe mode?

    If you have no guidance or information about my problems, I AM big enough to accept it with good grace. Nobody can know everything.

    My local expert sees the problems clearly, and tells me some things are beyond his training, but he has no doubt that my system is in dire shape, and that it was a hack. Is he imagining things, too?

    He will help me fix this situation, but I can't help being the kind of person who wants to UNDERSTAND WHAT HAPPENED. It might help me avoid having it happen again.

    Thanks anyway.
     
  14. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    You seem to have an excess of complaints, but no desire to follow anyone's suggestion. You haven't run any anti-virus scans or posted in the Malware forum with results from doing the Read and Run First instructions. Why are you here?
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds