Jump to content


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.

Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.


Suspicious (System) Network Connections - Local & Remote Adresses to Ad Agency.

  • Please log in to reply
1 reply to this topic

#1 solvedidentity


  • Members
  • 1 posts
  • Local time:04:30 PM

Posted 24 December 2015 - 11:50 AM

Greetings to you lovely and helpful technophiles,

  First off, I am new to diagnosing & troubleshooting network leaks or what seem to me like highly suspicious network activity. Although I have a decent tech history, so if need be I should be able to follow any advice without much difficulty.
  So the problem seems to be coming from multiple connections through to my network. I am able to view this suspicious activity using COMODO Killswitch, which allows me to monitor several connections at once. I created a small log of the suspicious connections. I have pasted that info below and I also included a link to the a google doc spreadsheet which is much easier to view.


Edit:(sorry, but the format for the copy-paste did not work out so well but I am including it anyways)


2015-12-24 07:11:53 Thursday                                

Network Connections (81) View:                                
Protocol    Local Address    Local Port    Remote Address    Remote Port    State    Sent Traffic    Received Traffic    Owner
svchost.exe(532)                        0    0    
TCP    ads.e-go.gr    135    ads.e-go.gr        Listen            RpcSs
TCP6    JoeDirt-PC    135    JoeDirt-PC        Listen            RpcSs
System(4)                        165.22 KB    137.10 KB    
TCP    JoeDirt-PC    139    ads.e-go.gr        Listen            
TCP    ads.e-go.gr    1723    ads.e-go.gr        Listen            
TCP    ads.e-go.gr    443    ads.e-go.gr        Listen            
TCP    ads.e-go.gr    445    ads.e-go.gr        Listen            
TCP6    JoeDirt-PC    443    JoeDirt-PC        Listen            
TCP6    JoeDirt-PC    445    JoeDirt-PC        Listen            
UDP    JoeDirt-PC    137                        
UDP    JoeDirt-PC    138                        
TCP    JoeDirt-PC    139    ads.e-go.gr        Listen            
UDP    JoeDirt-PC    137                        
UDP    JoeDirt-PC    138                        
wininit.exe(752)                        0    0    
TCP    ads.e-go.gr    5000    ads.e-go.gr        Listen            
TCP6    JoeDirt-PC    5000    JoeDirt-PC        Listen            
svchost.exe(1208)                        50.13 KB    28.15 KB    
TCP    ads.e-go.gr    5001    ads.e-go.gr        Listen            eventlog
TCP6    JoeDirt-PC    5001    JoeDirt-PC        Listen            eventlog
svchost.exe(1308)                        66 B    0    
TCP    ads.e-go.gr    5002    ads.e-go.gr        Listen            Schedule
TCP6    JoeDirt-PC    5002    JoeDirt-PC        Listen            Schedule
UDP    ads.e-go.gr    500                        IKEEXT
UDP    ads.e-go.gr    4500                        IKEEXT
UDP    ads.e-go.gr    64399                        RemoteAccess
UDP6    JoeDirt-PC    500                        IKEEXT
UDP6    JoeDirt-PC    4500                        IKEEXT
UDP6    JoeDirt-PC    53986                        RemoteAccess
UDP6    JoeDirt-PC    53987                        RemoteAccess
services.exe(812)                        0    0    
TCP    ads.e-go.gr    5003    ads.e-go.gr        Listen            
TCP6    JoeDirt-PC    5003    JoeDirt-PC        Listen            
lsass.exe(848)                        0    0    
TCP    ads.e-go.gr    5004    ads.e-go.gr        Listen            
TCP6    JoeDirt-PC    5004    JoeDirt-PC        Listen            
MediaMonkey.exe(6260)                        178.19 KB    0    
TCP    ads.e-go.gr    58378    ads.e-go.gr        Listen            
UDP    ads.e-go.gr    1065                        
UDP    ads.e-go.gr    1900                        
svchost.exe(7708)                        88 B    0    
UDP    JoeDirt-PC    427                        HPSLPSVC
UDP    ads.e-go.gr    427                        HPSLPSVC
UDP    JoeDirt-PC    427                        HPSLPSVC
svchost.exe(1300)                        7.62 KB    106.99 KB    
UDP    JoeDirt-PC    1900                        SSDPSRV
UDP    JoeDirt-PC    1900                        SSDPSRV
UDP6    JoeDirt-PC    1900                        SSDPSRV
UDP6    JoeDirt-PC    1900                        SSDPSRV
UDP    JoeDirt-PC    1900                        SSDPSRV
UDP    JoeDirt-PC    51760                        SSDPSRV
UDP    JoeDirt-PC    51761                        SSDPSRV
UDP    JoeDirt-PC    51762                        SSDPSRV
UDP6    JoeDirt-PC    1900                        SSDPSRV
UDP6    JoeDirt-PC    51757                        SSDPSRV
UDP6    JoeDirt-PC    51758                        SSDPSRV
UDP6    JoeDirt-PC    51759                        SSDPSRV
svchost.exe(1132)                        194.36 KB    476.05 KB    
UDP    ads.e-go.gr    5355                        Dnscache
UDP6    JoeDirt-PC    5355                        Dnscache
ScpService.exe(1932)                        0    0    
UDP    JoeDirt-PC    26760                        Ds3Service


As you can see, it is rather suspicious that my computer is connecting multiple system files to ads.e-go.gr I did some research into this company and website and found it to be a Greek Ad and Marketing company, called Adman by a group called Phaistos Networks.

Here are the associated websites.

So I am really hoping you guys can help me out with this. The only way I can see to terminate these connections is to also terminate the various critical system files that are running under various programs, svchost, and other essential services.

I also find it strange that these connections are also included in some personal programs such as media monkey and my VPN services, but not my internet browsers.

I really do appreciate your help in this. I really don't know where or how to start cleaning up this problem with my network. Now I am assuming it truly is a problem, if you know otherwise I would appreciate an explanation on how this is not a security issue.


Edited by solvedidentity, 24 December 2015 - 04:36 PM.

BC AdBot (Login to Remove)


#2 buddy215


  • Moderator
  • 13,496 posts
  • Gender:Male
  • Location:West Tennessee
  • Local time:06:30 PM

Posted 24 December 2015 - 12:28 PM

You can scan your computer for adware and malware using the programs below. Other than that you can block

ad / tracking cookies from installing in your browsers and if you have Adobe Flash you can change the settings for it to block saving content and ad/ tracking cookies.


Use CCleaner to remove Temporary files, program caches, cookies, logs, etc. Use the Default settings. No need to use the

Registry Cleaning Tool...risky. Pay close attention while installing and UNcheck offers of toolbars....especially Google.

After install, open CCleaner and run by clicking on the Run Cleaner button in the bottom right corner.

CCleaner - PC Optimization and Cleaning - Free Download


Download Malwarebytes' Anti-Malware from Here

Double-click mbam-setup-2.X.X.XXXX.exe to install the application (X's are the current version number).

  • Make sure a checkmark is placed next to Launch Malwarebytes' Anti-Malware, then click Finish.
  • Once MBAM opens, when it says Your databases are out of date, click the Fix Now button.
  • Click the Settings tab at the top, and then in the left column, select Detections and Protections, and if not already checked place a checkmark in the selection box for Scan for rootkits.
  • Click the Scan tab at the top of the program window, select Threat Scan and click the Scan Now button.
  • If you receive a message that updates are available, click the Update Now button (the update will be downloaded, installed, and the scan will start).
  • When MBAM is finished scanning it will display a screen that displays any malware that it has detected.
  • Click the Remove Selected button.
  • MBAM will now delete all of the files and registry keys and add them to the programs quarantine. When removing the files, MBAM may require a reboot in order to remove some of them. If it displays a message stating that it needs to reboot, please allow it to do so.
  • While still on the Scan tab, click the link for View detailed log, and in the window that opens click the Export button, select Text file (*.txt), and save the log to your Desktop.
  • The log is automatically saved by MBAM and can also be viewed by clicking the History tab and then selecting Application Logs.



Download AdwCleaner by Xplode onto your desktop.

  • Close all open programs and internet browsers.
  • Double click on adwcleaner.exe to run the tool.
  • Click on Scan button.
  • When the scan has finished click on Clean button.
  • Your computer will be rebooted automatically. A text file will open after the restart.
  • Please post the contents of that logfile with your next reply.
  • You can find the logfile at C:\AdwCleaner[S1].txt as well.
  • download Junkware Removal Tool to your desktop.
  • Shut down your protection software now to avoid potential conflicts.
  • Run the tool by double-clicking it. If you are using Windows Vista, 7, or 8; instead of double-clicking, right-mouse click JRT.exe and select "Run as Administrator".
  • The tool will open and start scanning your system.
  • Please be patient as this can take a while to complete depending on your system's specifications.
  • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
  • Post the contents of JRT.txt into your next message
  • Hold down Control and click on this link to open ESET OnlineScan in a new window.
  • Click the esetonlinebtn.png button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
  • Click on esetsmartinstaller_enu.exe to download the ESET Smart Installer. Save it to your desktop.
  • Double click on the esetsmartinstaller_enu.png icon on your desktop.
  • Check "YES, I accept the Terms of Use."
  • Click the Start button.
  • Accept any security warnings from your browser.
  • Under scan settings, check "Scan Archives" and "Remove found threats"
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, click List Threats
  • Click Export, and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  • Click the Back button.
  • Click the Finish button.
  • NOTE:Sometimes if ESET finds no infections it will not create a log.

“Every atom in your body came from a star that exploded and the atoms in your left hand probably came from a different star than your right hand. It really is the most poetic thing I know about physics...you are all stardust.”Lawrence M. Krauss
A 1792 U.S. penny, designed in part by Thomas Jefferson and George Washington, reads “Liberty Parent of Science & Industry.”

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users