Jump to content

Valor

Members
  • Posts

    38
  • Joined

  • Last visited

Everything posted by Valor

  1. Hello! I scanned with Roguekiller just out of paranoia and it found eight PUM detections in my registry. Malwarebytes has found nothing, so I figure it might just be Roguekiller being overly-protective. Nonetheless, I attached logs from Roguekiller and FRST. If nothing is detected(F/Ps), please tell me. I've never used P2P software, and have never pirated anything. Cheers! roguekillerReport.txt FRST.txt Addition.txt
  2. Sorry for the late response, I ended up fixing it by running a command prompt as an administrator and using the del command to get rid of it. Is there any reason why it would only get stuck on this version? It used to work perfectly. Edit: I'm running Windows 8.1
  3. I had Malwarebytes Anti-Rootkit and it would scan perfectly fine. I then got a notice to update my program, so I did. The new version that I have does not scan correctly, and get's stuck all time. After it gets stuck, I can't close it, and I must restart my computer just to close it. I, also, can't delete the folder that the program auto-generated, "mbar". I go to delete it, with the error message: "You need permission to perform this action. You require permission from J-PC/J to make changes to this folder." I am using an administrator account, so there should be no problem. Thanks in advance.
  4. Hopefully I get a response quickly. Cheers, have a great day.
  5. Yes, it is the same computer. The only reason I asked here as well was if I should continue to be anxious about something that isn't worth getting nervous over. I've noticed that both have to do with UPnP, would it be better to just disable it on my computer or my router?
  6. Hello! I'm wondering if this is something I should be scared about, because I have been freaking out over it the past day. svchost.exe. Detection, 2/21/2015 3:52:58 PM, SYSTEM, J-PC, Protection, Malicious Website Protection, IP, 93.174.93.20, 1900, Inbound, C:\Windows\System32\svchost.exe, Detection, 2/21/2015 3:52:59 PM, SYSTEM, J-PC, Protection, Malicious Website Protection, IP, 93.174.93.20, 1900, Inbound, C:\Windows\System32\svchost.exe Port 1900 is for UPnP. I've scanned with many different programs(MBAM, Avast!, RogueKiller, TDSSKiller, AdwCleaner, ect), but all have come back clean. Am I freaking out over nothing?
  7. Hello! I'm making this new topic to get some help with my PC. I just got a popup from MBAM Premium saying that an inbound connection was blocked from svchost.exe. Detection, 2/21/2015 3:52:58 PM, SYSTEM, J-PC, Protection, Malicious Website Protection, IP, 93.174.93.20, 1900, Inbound, C:\Windows\System32\svchost.exe, Detection, 2/21/2015 3:52:59 PM, SYSTEM, J-PC, Protection, Malicious Website Protection, IP, 93.174.93.20, 1900, Inbound, C:\Windows\System32\svchost.exe, Please help whenever possible. Thank you in advance.
  8. I have two instances of rundll32.exe on my computer, I am aware that rundll32.exe is an essential Windows component, but the location is not. One of the rundll32.exe's is in C:\Windows\SysWOW64 Another is in C:\Windows\System32 Another is in C:\Windows\WinSxS\x86_microsoft-windows-rundll32_31bf3856ad364e35_6.3.9600.16384_none_6ca51616c6842822 The last one is in C:\Windows\WinSxS\amd64_microsoft-windows-rundll32_31bf3856ad364e35_6.3.9600.16384_none_c8c3b19a7ee19958 Keep in mind I am running Windows 8.1, I am very scared this is a possible infection. I checked my Task Manager the other day and saw two instances of rundll32.exe, both running NVidia software, so I figured it was not a problem until I opened the file location. I have been taught that rundll32.exe is only under System32, I could be wrong. I've scanned with many programs(Avira, Malwarebytes, MBAR, McAfee Anti-Rootkit) and no detections, please respond quickly so my mind can be at peace, cheers!
  9. Great as usual, haven't gotten any popups of blocked IPs since the first one. I will get back to you if there is any more trouble, I can't thank you enough. I'd also like to specify, I was on a VPN, was on a TeamSpeak server, and had Skype open at the time of the popup, could this be a potential factor?
  10. The system restarted after the scan was finished; here are the logs you wanted: Fixlog.txt
  11. type="Malicious Website Protection" direction="Inbound" domain="" ip="121.10.240.203" malwaretype="IP" port="1900" I have already run many scans, backed up registry, and am hoping to get rid of whatever is on my PC. Please help and respond ASAP with fixes, I can reply with if I have already run the scan or if I am currently running the scan.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.