Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Malwarebytes blocking outbound to zzsqluwqmgjbjfjow.com at 185.48.58.8


  • This topic is locked This topic is locked
2 replies to this topic

#1 Perendinater

Perendinater

  • Members
  • 1 posts
  • OFFLINE
  •  
  • Local time:12:31 PM

Posted 22 October 2014 - 07:25 PM

For some reason I cannot reply to this thread:
 
 
But I had the same problem and just got it fixed.  In short, download Norton Power Eraser (NPE) from here:
 
 
Use the standard "Scan for Risks" and let it do its thing.  Hope it works as well for you as it did for me.
 
- John C.
 
 
Here's the longer version:
 
I was first alerted to the problem when I started getting a ton of Symantec.Cloud Alert emails notifying me that it was blocking multiple "High Risk Intrusion" "Web Attack" attempts on one of our computers. Symantec blocked each attack, which it identified variously as:
 
7 instances of: Exploit Toolkit Website 5
 
1 instance of: Angler Exploit Kit Website 6
 
2 instances of: Malicious File Download Request 27
 
2 instances of: Fake Browser Update 3
 
1 instance of: MSIE CVE-2013-2551
 
However, Symantec could not seem to find the offending source of these attacks. I installed MalwareBytes onto the PC and it immediately began blocking endless attempted communications to zzsqluwqmgjbjfjow.com at IP address 185.48.58.8
 
I highly recommend Malwarebytes as it consistently finds stuff most other antivirus software misses. It has a free trial which works great, but they've saved my tail so many times I pay them for it. It's well priced and worth every penny.
 
That being said, Malwarebytes couldn't find the source of the outgoing communications. RogueKiller came up blank, too. 
 
Finally Norton Power Eraser (NPE) found and killed the thing, but never identified the specific threat for me, other than telling me the file was: c:\programdata\{9a88e103-a20a-4ea5-8636-c73b709a5bf8}\ddrawex.dll
 
I hope this helps anyone else who gets hit with this same beastie.
 
- John C.
 
P.S.  In case it's of any value, here's the log NPE generated:
 
Norton Power Eraser Results
File Insight: ddrawex.dll
____________________________
File: c:\programdata\{9a88e103-a20a-4ea5-8636-c73b709a5bf8}\ddrawex.dll
Directory: c:\programdata\{9a88e103-a20a-4ea5-8636-c73b709a5bf8}
Registry Key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\""
Registry Key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\BFE\""
Registry Key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\BITS\""
Registry Key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\MpsSvc\""
Registry Key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\wscsvc\""
Registry Key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\wuauserv\""
Registry Key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SharedAccess\""
Registry Key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SharedAccess\Defaults\""
Registry Key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\"RemoteDesktop-In-TCP"
Registry Key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\"RemoteAssistance-Out-TCP-Active"
Registry Key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\"RemoteAssistance-SSDPSrv-In-TCP-Active"
Registry Key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\"RemoteAssistance-SSDPSrv-In-UDP-Active"
Registry Key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\"{0B7FB37E-8EF9-4AF3-8009-1ED580D2DB19},"
Registry Key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\"RemoteAssistance-PnrpSvc-UDP-OUT-Active"
Registry Key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\"RemoteAssistance-SSDPSrv-Out-TCP-Active"
Registry Key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\"RemoteAssistance-SSDPSrv-Out-UDP-Active"
Registry Key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\"RemoteAssistance-In-TCP-EdgeScope-Active"
Registry Key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\"RemoteAssistance-DCOM-In-TCP-NoScope-Active"
Registry Key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\"RemoteAssistance-RAServer-In-TCP-NoScope-Active"
Registry Key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\"RemoteAssistance-PnrpSvc-UDP-In-EdgeScope-Active"
Registry Key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\"RemoteAssistance-RAServer-Out-TCP-NoScope-Active"
Registry Key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\Logging\"LogDroppedPackets"
Registry Key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\Logging\"LogSuccessfulConnections"
Registry Key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\PublicProfile\Logging\"LogDroppedPackets"
Registry Key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\PublicProfile\Logging\"LogSuccessfulConnections"
Registry Key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\Logging\"LogDroppedPackets"
Registry Key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\Logging\"LogSuccessfulConnections"
Registry Key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\RestrictedServices\Static\System\"WindowsDefender-In"
Registry Key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\RestrictedServices\Static\System\"WindowsDefender-Out"
Registry Key: HKEY_USERS\S-1-5-21-2052396194-2875514640-3486444217-1107\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\"WpadOverride"
Registry Key: HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{F6BF8414-962C-40FE-90F1-B80A7E72DB9A}\InprocServer32\""
Registry Key: HKEY_USERS\S-1-5-21-2052396194-2875514640-3486444217-1107\Software\Classes\CLSID\{F6BF8414-962C-40FE-90F1-B80A7E72DB9A}\InprocServer32\""
Registry Key: HKEY_USERS\S-1-5-21-2052396194-2875514640-3486444217-1107\Software\Classes\CLSID\{F6BF8414-962C-40FE-90F1-B80A7E72DB9A}\InprocServer32
Registry Key: HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{F6BF8414-962C-40FE-90F1-B80A7E72DB9A}\InprocServer32
Registry Key: HKEY_USERS\S-1-5-21-2052396194-2875514640-3486444217-1107\Software\Classes\CLSID\{F6BF8414-962C-40FE-90F1-B80A7E72DB9A}
Registry Key: HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{F6BF8414-962C-40FE-90F1-B80A7E72DB9A}
____________________________
____________________________
File: c:\programdata\{9a88e103-a20a-4ea5-8636-c73b709a5bf8}\ddrawex.dll Directory: c:\programdata\{9a88e103-a20a-4ea5-8636-c73b709a5bf8} Registry Key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\"" Registry Key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\BFE\"" Registry Key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\BITS\"" Registry Key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\MpsSvc\"" Registry Key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\wscsvc\"" Registry Key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\wuauserv\"" Registry Key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SharedAccess\"" Registry Key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SharedAccess\Defaults\"" Registry Key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\"RemoteDesktop-In-TCP" Registry Key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\"RemoteAssistance-Out-TCP-Active" Registry Key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\"RemoteAssistance-SSDPSrv-In-TCP-Active" Registry Key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\"RemoteAssistance-SSDPSrv-In-UDP-Active" Registry Key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\"{0B7FB37E-8EF9-4AF3-8009-1ED580D2DB19}," Registry Key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\"RemoteAssistance-PnrpSvc-UDP-OUT-Active" Registry Key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\"RemoteAssistance-SSDPSrv-Out-TCP-Active" Registry Key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\"RemoteAssistance-SSDPSrv-Out-UDP-Active" Registry Key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\"RemoteAssistance-In-TCP-EdgeScope-Active" Registry Key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\"RemoteAssistance-DCOM-In-TCP-NoScope-Active" Registry Key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\"RemoteAssistance-RAServer-In-TCP-NoScope-Active" Registry Key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\"RemoteAssistance-PnrpSvc-UDP-In-EdgeScope-Active" Registry Key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\"RemoteAssistance-RAServer-Out-TCP-NoScope-Active" Registry Key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\Logging\"LogDroppedPackets" Registry Key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\Logging\"LogSuccessfulConnections" Registry Key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\PublicProfile\Logging\"LogDroppedPackets" Registry Key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\PublicProfile\Logging\"LogSuccessfulConnections" Registry Key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\Logging\"LogDroppedPackets" Registry Key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\Logging\"LogSuccessfulConnections" Registry Key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\RestrictedServices\Static\System\"WindowsDefender-In" Registry Key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\RestrictedServices\Static\System\"WindowsDefender-Out" Registry Key: HKEY_USERS\S-1-5-21-2052396194-2875514640-3486444217-1107\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\"WpadOverride" Registry Key: HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{F6BF8414-962C-40FE-90F1-B80A7E72DB9A}\InprocServer32\"" Registry Key: HKEY_USERS\S-1-5-21-2052396194-2875514640-3486444217-1107\Software\Classes\CLSID\{F6BF8414-962C-40FE-90F1-B80A7E72DB9A}\InprocServer32\"" Registry Key: HKEY_USERS\S-1-5-21-2052396194-2875514640-3486444217-1107\Software\Classes\CLSID\{F6BF8414-962C-40FE-90F1-B80A7E72DB9A}\InprocServer32 Registry Key: HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{F6BF8414-962C-40FE-90F1-B80A7E72DB9A}\InprocServer32 Registry Key: HKEY_USERS\S-1-5-21-2052396194-2875514640-3486444217-1107\Software\Classes\CLSID\{F6BF8414-962C-40FE-90F1-B80A7E72DB9A} Registry Key: HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{F6BF8414-962C-40FE-90F1-B80A7E72DB9A}
____________________________
 
File Thumbprint - SHA:
2EF79981413027222D4EB6A34ABFAE72856714D927D5566CF0D8A91A3A60BD31
 


BC AdBot (Login to Remove)

 


m

#2 HelpBot

HelpBot

    Bleepin' Binary Bot


  • Bots
  • 12,549 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:12:31 PM

Posted 27 October 2014 - 07:30 PM

Hello and welcome to Bleeping Computer!

I am HelpBot: an automated program designed to help the Bleeping Computer Staff better assist you! This message contains very important information, so please read through all of it before doing anything.

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

To help Bleeping Computer better assist you please perform the following steps:

***************************************************

step1.gif In order to continue receiving help at BleepingComputer.com, YOU MUST tell me if you still need help or if your issue has already been resolved on your own or through another resource! To tell me this, please click on the following link and follow the instructions there.

CLICK THIS LINK >>> http://www.bleepingcomputer.com/logreply/552963 <<< CLICK THIS LINK



If you no longer need help, then all you needed to do was the previous instructions of telling me so. You can skip the rest of this post. If you do need help please continue with Step 2 below.

***************************************************

step2.gifIf you still need help, I would like you to post a Reply to this topic (click the "Add Reply" button in the lower right hand of this page). In that reply, please include the following information:

  • If you have not done so already, include a clear description of the problems you're having, along with any steps you may have performed so far.
  • A new DDS log. For your convenience, you will find the instructions for generating these logs repeated at the bottom of this post.
    • Please do this even if you have previously posted logs for us.
    • If you were unable to produce the logs originally please try once more.
    • If you are unable to create a log please provide detailed information about your installed Windows Operating System including the Version, Edition and if it is a 32bit or a 64bit system.
    • If you are unsure about any of these characteristics just post what you can and we will guide you.
  • Please tell us if you have your original Windows CD/DVD available.
  • Upon completing the above steps and posting a reply, another staff member will review your topic and do their best to resolve your issues.

Thank you for your patience, and again sorry for the delay.

***************************************************

We need to see some information about what is happening in your machine. Please perform the following scan again:

  • Download DDS by sUBs from the following link if you no longer have it available and save it to your destop.

    DDS.com Download Link
  • Double click on the DDS icon, allow it to run.
  • A small box will open, with an explanation about the tool. No input is needed, the scan is running.
  • Notepad will open with the results.
  • Follow the instructions that pop up for posting the results.
  • Close the program window, and delete the program from your desktop.
Please note: You may have to disable any script protection running if the scan fails to run. After downloading the tool, disconnect from the internet and disable all antivirus protection. Run the scan, enable your A/V and reconnect to the internet.

Information on A/V control can be found HERE.

As I am just a silly little program running on the BleepingComputer.com servers, please do not send me private messages as I do not know how to read and reply to them! Thanks!

#3 HelpBot

HelpBot

    Bleepin' Binary Bot


  • Bots
  • 12,549 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:12:31 PM

Posted 01 November 2014 - 07:35 PM

Hello again!

I haven't heard from you in 5 days. Therefore, I am going to assume that you no longer need our help, and close this topic.

If you do still need help, please send a Private Message to any Moderator within the next five days. Be sure to include a link to your topic in your Private Message.

Thank you for using Bleeping Computer, and have a great day!




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users