Hi. Please has anyone any answers to the following
Netstat run from command prompt tells me Avast is connecting to Jumpingcrab.com. I have this domain blocked by redirecting the request to my local host. What is jumpingcrab.com and why would Avast want to communicate with it?
Thanks.
jumpingcrab.com is being shared via Free DNS, a dynamic DNS domain sharing project where members can setup, and administrate their dns entries on their own remote internet connected systems in real time.
To create a free subdomain from any shared domain, you can visit the shared domain list.
For any dns related inquiries, questions, support, comments, or misuse contact dnsadmin@afraid.org for a quick response.
Free DNS is serving 90,000+ domains, 3.7 million subdomains, and processing 2,000+ dns queries per second.
Oh, oh, oh. What a mess! I’ve never seen such a bad example of an analysis. You guys need to read what’s been written by the OP and not make assumptions about what it might be.
The domain in the message is sendmsg.jumpingcrab.com which is located in China with IP 60.10.1.118. Nothing to do with jumpingcrab.comwhich has IP 70.39.97.226 Even a cursory Google search would have revealed that. But nobody appears to have bothered doing that.
The OP didn’t have a ‘bad firefox extension’ (shame on you for suggesting such a thing Essexboy), but a very sophisticated trojan installed which AVAST hasn’t yet been able to detect. It’s called Trojan.Upclicker and it hides its routines by linking them to a left mouse click. Since AV in general doesn’t monitor the mouse, its activities are likely to remain undetected.
Even in the highly unlikely event that this was the case, you don’t need a third party tool to remove a Firefox extension. It has it’s own tools for doing that.
You guys are supposed to be the experts and users rely on you to get it right.
I tell you, if you came to my company looking for a job, I wouldn’t even let you loose in the kitchen with a mop!
Yes, of course it’s disguised. but malware writers aren’t going to make it easy for you and the “sendmsg” aspect makes it look like it’s jumpingcrab sending a message using a Firefox. That’s why I said that you can’t apply the one-size-fits-all solution and have to treat every incident as a unique case.
Trust me I know there is not a universal panacea for this, the malware if it is not an extension will then be hiding in the system either under a BHO or run key
And how does the OP uninstall a hidden firefox extension ?