Jump to content

Website Blocking continuous Port: 62229 IP: (same)


Raf1190
 Share

Recommended Posts

Been getting relentless notifications from Malwarebytes with the following report copied from latest log.... any help would be appreciated

"Malwarebytes
www.malwarebytes.com

-Log Details-
Protection Event Date: 10/16/17
Protection Event Time: 1:30 PM
Log File: 005b3b86-b21a-11e7-b84a-bc5ff4fb9827.json
Administrator: Yes

-Software Information-
Version: 3.2.2.2029
Components Version: 1.0.212
Update Package Version: 1.0.3019
License: Premium

-System Information-
OS: Windows 10 (Build 15063.674)
CPU: x64
File System: NTFS
User: System

-Blocked Website Details-
Malicious Website: 1
, , Blocked, [-1], [-1],0.0.0

-Website Data-
Domain: 
IP Address: 95.79.40.49
Port: [62229]
Type: Inbound
File: C:\Windows\System32\svchost.exe

(end)"

Link to post
Share on other sites

  • Root Admin

Hello @Raf1190 and :welcome:

 

Please run the following steps and post back the logs as an attachment when ready.

STEP 01

  • If you're already running Malwarebytes 3 then open Malwarebytes and check for updates. Then click on the Scan tab and select Threat Scan and click on Start Scan button.
  • If you don't have Malwarebytes 3 installed yet please download it from here and install it.
  • Once installed then open Malwarebytes and check for updates. Then click on the Scan tab and select Threat Scan and click on Start Scan button.
  • Once the scan is completed click on the Export Summary button and save the file as a Text file to your desktop or other location you can find, and attach that log on your next reply.
  • If Malwarebytes won't run then please skip to the next step and let me know on your next reply.

STEP 02

Please download AdwCleaner by Malwarebytes and save the file to your Desktop.

  • Right-click on the program and select RunAsAdmin.jpg Run as Administrator to start the tool.
  • Accept the Terms of use.
  • Wait until the database is updated.
  • Click Scan.
  • When finished, please click Clean.
  • Your PC should reboot now if any items were found.
  • After reboot, a log file will be opened. Copy its content into your next reply.

STEP 03
Please download the Farbar Recovery Scan Tool and save it to your desktop.

Note: You need to run the version compatible with your system. You can check here if you're not sure if your computer is 32-bit or 64-bit

  • Double-click to run it. When the tool opens, click Yes to disclaimer.
  • Press the Scan button.
  • It will make a log (FRST.txt) in the same directory the tool is run. Please attach it to your reply.
  • The first time the tool is run, it also makes another log (Addition.txt). If you've, run the tool before you need to place a check mark here.
  • Please attach the Additions.txt log to your reply as well.

 

Thanks

Ron

 

Link to post
Share on other sites

  • Root Admin

The computer does not look to be infected. The issue appears to just be that you're using Vuze which is P2P - Peer 2 Peer software that connects to many known infected networks from time to time as part of it's normal process of sharing files.

As I'm sure you're aware, the vast majority of P2P file sharing is illegal in most Countries and it a good way to get your computer infected. I would highly recommend against it's continued use, but it's your computer and your potential risk to be caught by authorities. So, you're decision to use or not.

Due to how Vuze works I'm not sure if adding the program to exclusions will stop the blocks or not. You can try adding the program to exclusions though and see if it works.

Thank you

Ron

 

Edited by AdvancedSetup
Link to post
Share on other sites

Guest
This topic is now closed to further replies.
 Share

  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.