I was wondering if Avast or anything else (such as drivers) could be proactively making this call on boot.
It seems like an application is attempted to get my public IP address by calling the said API.
I have scanned the system with MBAM and haven’t found a single piece of malware. I also checked the msconfig for good measure to see if there was any strange/abnormal boot scripts and finally i checked the services to see if there was any new/strange services.
Before we start running the diags (sorry was a pretty hectric day yesturday) I noticed that one of the anaylsts is using an uninstall utlity. Will this be required after running the new Farbar Utility? Previously i recall analysts using OTL and uninstalling it by removing the exectuable. Does Farbar install more traces on the system side things.
The FarBar Utility was sandboxed as it entered my network. (checked the logs it seems the file is an unsigned executable.) Cyren (GlobalView) is currently claiming FarBar is a trojen.
The IP address lookup URL? I located the URL after watching the active scans on Avast’s web shield service, the local one is fine but the ipinfo.io/ip lookup is rather strange.
As for the bad sectors
I have noticed the HDD has been pretty loud during boot (grinding noises). (I did run seatools and WD Lifeguard to no avail and no error messages.) Does the utility mention which hard drive is currently providing bad boot sectors?
I look forward to hearing back from you, Will we be using the uninstaller tool?
If you click the link you will come out with an IP address
In my case it was 2.223.249.227
If I then go to that address by pasting it into IE my router page opens… Try it
I think this may be Avast just checking the availability of your router, but I could be wrong
You can manually delete FRST from the desktop and the folder created on the C drive
The bad sectors are on the C drive so a chkdsk /r should clear them