Jump to content

Apparent IP Attack. 185.48.58.8


Recommended Posts

Hello. 

 

I have MB Premium and yesterday I began getting Blocked (Malicious) Website popups for 185.48.58.8, rk5-joint8.biz.  These pop-ups typically begin shortly after I turn on my PC, and continue to pop up about every 20 seconds, each time advancing the Port number.  After a while, the popups will stop, but will then resume after another 10-15 minutes or so.   I've made certain that MB has the latest database and have run a full threat scan, but the results indicate that no malicious items were detected.  

 

I suppose the good news is that MB is blocking the site, but I'm guessing the bad news is that my system is infected.  I know how to disable the popups, but that would seem to be only fixing the symptom and not the problem. 

 

Any advice?

 

Thanks.

 

 

 

 

ProtectionLog.txt

Link to post
Share on other sites

Hello and post-32477-1261866970.gif

 

P2P/Piracy Warning:

 

If you're using Peer 2 Peer software such as uTorrent, BitTorrent or similar you must either fully uninstall them or completely disable them from running while being assisted here.Failure to remove or disable such software will result in your topic being closed and no further assistance being provided.If you have illegal/cracked software, cracks, keygens etc. on the system, please remove or uninstall them now and read the policy on Piracy.

 

Next,

 

Download Farbar Recovery Scan Tool and save it to your desktop.

 

Note: You need to run the version compatible with your system (32 bit or 64 bit). If you are not sure which version applies to your system download both of them and try to run them. Only one of them will run on your system, that will be the right version.


Double-click to run it. When the tool opens click Yes to disclaimer.
Press Scan button.
It will make a log (FRST.txt) in the same directory the tool is run. Please copy and paste it to your reply.
The first time the tool is run, it makes also another log (Addition.txt). Please attach it to your reply.

 

Next,

 

Please download RogueKiller and save it to your desktop from the following link: http://www.bleepingcomputer.com/download/roguekiller/

 


Quit all running programs.
For Windows XP, double-click to start.
For Vista,Windows 7/8, Right-click on the program and select Run as Administrator to start and when prompted allow it to run.
Read and accept the EULA (End User Licene Agreement)
Click Scan to scan the system.
When the scan completes select "Report", log will open. Close the program > Don't Fix anything!
Post back the report which should also be located here:

 

C:\Programdata\RogueKiller\Logs <-------- W7/8

C:\Documents and Settings\All Users\Application Data\RogueKiller\Logs <-------XP

 

Let me see those logs in your next reply...

 

Kevin

Link to post
Share on other sites

Hi Kevin.

 

Thanks for the reply.  Attached are the three logs that you requested.

 

However, it's probably worth mentioning that since I posted the problem a short while ago, I've managed to get the popups to stop.  After posting my message, I found a post on another site that referenced the same IP address, albeit with a different domain name.  In that post, the op mentioned that through other software, he/she had managed to identify the offending file as being in "C:\ProgramData\{9a88e103-a20a-4ea5-8636-c73b709a5bf8}\" .   On a whim, I searched my program data directory and sure enough, found a new folder of exactly that UID name that was created just about at the time that I started noticing the pop-ups.    There were three files inside, all of which were locked due to being in use.  So, although I normally don't take chances, I do have numerous backups of that drive and thus decided to use a file deletion tool to remove those files (and the folder) upon re-boot.  I then used a registry cleaner to make certain all references to that folder were removed.  It's now been about an hour and I've seen no popups. 

 

Regardless, I'm responding with the logs, just in case the malware has not truly been removed.  Note that these logs were created *after* I removed the files noted above whereas that operation was performed before you responded.

 

Thanks.

 

 

Addition.txt

FRST.txt

RKreport_SCN_10252014_120153.log

Link to post
Share on other sites

Have you XXXXX out the user name or is that correct name:

 

 

If you have made that change I cannot give a fix to remove problem entries from your system

Yes, sorry.  Whereas these logs appear to be publicly viewable, I substituted my user name for the XXXXX.  If that is required, I can certain re-run the utilities and generated new, unedited logs.  

Link to post
Share on other sites

Download attached fixlist.txt file (end of reply) and save it to the Desktop, or the folder you saved FRST into.

NOTE. It's important that both FRST and fixlist.txt are in the same location or the fix will not work.

 

Run FRST and press the Fix button just once and wait.

The tool will make a log on the Desktop (Fixlog.txt) or the folder it was ran from. Please post it to your reply.

 

Next,

 

Open Malwarebytes Anti-Malware, from the Dashboard please Check for Updates by clicking the Update Now... link

When the update completes select > Settings > Detection and Protection > Enable Scan for rootkit and Under Non Malware Protection set both PUP and PUM to Treat detections as malware.

 

 

Click on the SCAN button and run a Threat Scan with Malwarebytes Anti-Malware by clicking the Scan Now>> button.

 

When the scan is complete, if there have been detections, click Apply Actions to allow MBAM to clean what was detected.

 

 

In most cases, a restart will be required.

 

 

Wait for the prompt to restart the computer to appear, then click on Yes.

 

 

Once completed please click on the History > Application Logs and find your scan log and open it and then click on the "copy to clipboard" button and post back the results on your next reply.

 

Next,

 

Download AdwCleaner by Xplode onto your Desktop.


Double click on Adwcleaner.exe to run the tool.
Click on Scan
Once the scan is done, click on the Clean button.
You will get a prompt asking to close all programs. Click OK.
Click OK again to reboot your computer.
A text file will open after the restart. Please post the content of that logfile in your reply.
You can also find the logfile at C:\AdwCleaner[sn].txt. Where n in the scan reference number

 

Next,

 

thisisujrt.gif Please download Junkware Removal Tool to your desktop.


Shut down your protection software now to avoid potential conflicts. (re-enable when done)
Run the tool by double-clicking it. If you are using Windows Vista, 7, or 8; instead of double-clicking, right-mouse click JRT.exe and select "Run as Administrator".
The tool will open and start scanning your system.
Please be patient as this can take a while to complete depending on your system's specifications.
On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
Post the contents of JRT.txt into your next message.

 

Next,

 

Download Microsoft's " Malicious Software Removal Tool" and save direct to the desktop

Ensure to get the correct version for your system....

32 Bit version:

https://www.microsoft.com/downloads/en/confirmation.aspx?FamilyId=AD724AE0-E72D-4F54-9AB3-75B8EB148356&displaylang=en

64 Bit version:

https://www.microsoft.com/downloads/en/confirmation.aspx?FamilyId=585D2BDE-367F-495E-94E7-6349F4EFFC74&displaylang=en'>https://www.microsoft.com/downloads/en/confirmation.aspx?FamilyId=585D2BDE-367F-495E-94E7-6349F4EFFC74&displaylang=en

 

Right click on the Tool, select “Run as Administrator” the tool will expand to the options Window

In the "Scan Type" window, select Quick Scan

Perform a scan and  Click Finish when the scan is done.

Retrieve the MSRT log as follows, and post it in your next reply:

 

1) Select the Windows key and R key together to open the "Run" function

2) Type or Copy/Paste the following command to the "Run Line" and Press Enter:

 

notepad c:\windows\debug\mrt.log

 

let me see those logs in your next reply, also give an update on any remaining issues or concerns...

 

Thanks,

 

Kevin...

 

 

 

Fixlist.txt

Link to post
Share on other sites

Hi Kevin.  Thanks again for you assistance.   I followed your instructions and ran the various utilities.  The logs from each are attached.  I noticed that MB and the Windows Malicious Software removal tool both came up clean, but I've included those logs anyway.  

 

The only concern I have is that upon running FRST (with your provided fixlist file in the same folder), it immediately launched and starting writing a log however it seemed to stall after that.   After about 45 minutes, it was still saying "Fixing", but there had been no disk activity for quite a while, and the log file had not been appended or updated in any way since the application was first started. I eventually terminated the process however, the log seems to indicate that it actually did was it supposed to .. it just didn't shut down properly at the end.  Should I be concerned?  

 

Other than that, everything else seems to be fine and I haven't seen any more pop-ups since earlier today.

 

Thanks. 

AdwCleanerS0.txt

Fixlog.txt

JRT.txt

MBAM Scan Log.txt

mrt.log

Link to post
Share on other sites

The issue you mention with FRST has repeated in a couple of other threads i`ve worked today. I`ll mention this issue to the developer, as it produces a log and follows the script I would not be concerned...

 

Run the following to clean up:

 

Download "Delfix by Xplode" and save it to your desktop.

 

Or use the following if first link is down:

 

"Delfix link mirror"

 

Double Click to start the program. If you are using Vista or higher, please right-click and choose run as administrator

 

Make Sure the following items are checked:

 


    Activate UAC
    Remove disinfection tools
    Create registry backup
    Purge System Restore
    Reset system settings

 

Now click on "Run" and wait patiently until the tool has completed.

 

The tool will create a log when it has completed. We don't need you to post this.

 

Part of the routine will be to create a registry back up with ERUNT,  the back up will be created here:

 

C:\Windows\ERUNT

 

When all is known to be well with your system you can delete that back up folder if you consider it as not needed...

Any remnant files/logs from tools we have used can be deleted…

 

Next,

 

Read the following link to fully understand PC security and best practices, you may find it useful....

 

http://www.bleepingcomputer.com/forums/t/407147/answers-to-common-security-questions-best-practices/#entry2316629

 

Let me know if you still need assistance, if not are we ok to close out...

 

Kevin....

Link to post
Share on other sites

  • Root Admin

Glad we could help. :)

If you need this topic reopened, please send a Private Message to any one of the moderating team members. Please include a link to this thread with your request. This applies only to the originator of this thread.

Other members who need assistance please start your own topic in a new thread. Thanks!

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.