TCP Report is showing that my information is being stolen PID 4512


  1. Posts : 2
    windows 10
       #1

    TCP Report is showing that my information is being stolen PID 4512


    I ran a report to see what has got a hold of my computer. I hope I attached the file properly. I also found a file in my temp folder named outlook logger. Could you please look at my tcp report and let me know what I need to do. How can I identify who this is? thank you
    Also, please, What do all of the listening states mean?
    TCP Report is showing that my information is being stolen PID 4512 Attached Files
    Last edited by ljmilam; 10 May 2018 at 06:45. Reason: additional questions
      My Computer


  2. Posts : 30,119
    Windows 11 Pro x64 Version 23H2
       #2

    Hi ljmilam. Welcome to the TenForums @ljmilam

    If you think you have an infection please download and run malwarebytes from https://www.malwarebytes.com/

    Use the free version. Repair / quarantine anything found. If it finds stuff, complete the repair, restart computer and run scan again.

    Do a complete scan of your entire machine.

    Listening means a port is awaiting a connection.
      My Computer


  3. Posts : 31,465
    10 Home x64 (22H2) (10 Pro on 2nd pc)
       #3

    Welcome to TenForums @ljmilam

    ljmilam said:
    What do all of the listening states mean?
    The How-To Geek explains that here...
    https://www.howtogeek.com/howto/2860...rt-in-windows/
      My Computers


  4. Posts : 9,765
    Mac OS Catalina
       #4

    Nothing is being stolen. Amazon AWS is related to their cloud service/servers (ie Cloudfront aka Prime video/audio). Adnexus serves up ad's. Akami is used by companies like Microsoft, etc.

    Listening just means that the port is in a state that at any time there is a TCP/UDP request under that socket/session/connection, the OS/Hardware will respond. See the following about how this magic works. Solved: Difference between session and connecti... - Cisco Support Community

    The short version. The terms session and connection are used to refer a communication between client and a server or two end points and they are used in same context. If you look at pure theory then:Connection:
    Client--------------->Server
    Client<------------->Server
    The bidirectional flow between client and server is a connection.
    Client Src IP(1.1.1.1) Client Port(12345) TCP ---------> Server Src IP(2.2.2.2) Server Port (80)
    Server Src IP(2.2.2.2) Server Port(80) TCP ---------->Client Src IP(1.1.1.1.) Client Port (12345)
    The above is a "Connection" when you consider both flows.
    When you consider a SINGLE flow:
    Client Src IP(1.1.1.1) Client Port(12345) TCP ---------> Server Src IP(2.2.2.2) Server Port (80)
    The above is "TCP SOCKET". It can be UDP as well.
    Session would be:
    The same birdirectional flow illustrated in first example but with different Client src ports so a client establishing many connections to the same server. So series of interactions between client and server will amount to a SESSION. A single bidirectional FLOW would be a CONNECTION and a SINGLE UNIDIRECTIONAL FLOW would be a SOCKET.
      My Computer


  5. Posts : 2
    windows 10
    Thread Starter
       #5

    Thank you so much for your help. I have a pcycho ex that is an electrical engineer. He has everything of mine bugged, my phone, my car, my house. I am certain he's got a key logger on my computer and access to my router. I am trying everything I can to safeguard but I dont know how to locate what has already been done.
      My Computer


  6. Posts : 30,119
    Windows 11 Pro x64 Version 23H2
       #6

    While I will be offline for a while if you rent your router / modem from a supplier ask them to reset it.

    If you own the router they instructions to do a reset will be online. This will have it default to its "as shipped" state which means it will use default SSID and password. Then change the password to one only you know.

    You may want to open a thread on the particular router and asks a few questions. Once you get into it it is not as bad as it sounds and you can explorer inside the router before you reset.

    As to your computer there are two options to "flush" the system. Either do a reset and do not keep files or do a clean install. You must back your data up prior to doing this. There is a reset that allows you to keep files, I think I would go the extra step of deleting. That said you must backup you personnel data. Either of these processes should return machine to a clean state.

    Not sure of your confidence level as all programs have to be re-installed / setup.

    There are lots of members who can walk you through things. Just do you homework before you pull the trigger. To keep things straight have a thread for subject to keep answers focused.
      My Computer


  7. Posts : 31,465
    10 Home x64 (22H2) (10 Pro on 2nd pc)
       #7

    Caledon Ken said:
    As to your computer there are two options to "flush" the system... Either of these processes should return machine to a clean state.
    Not sure of your confidence level as all programs have to be re-installed / setup.
    If you have the confidence level, the ultimate "flush" would be to wipe the hard drive and do a clean install from freshly downloaded install media. You'd certainly have to back up your files and reinstall all your software for that, making sure before you start that you had any software keys that you'd need to reinstall the 'paid for' software.

    On the other hand, instead of a "clean flush" the alternative would be a "search and destroy" for any hidden malware. There are lots of members that can walk you through that too.

    In fact, you may want to try that first to find out what (if any) keyloggers, etc were installed. You may find that nothing 'bad' had been done to you after all, or if it had you'll at least know the extent of it. Sometimes it's better to know so you can stop worrying about what else may have been there. You can always decide to do the "flush" later, depending on how bad it looked.
      My Computers


  8. Posts : 9,765
    Mac OS Catalina
       #8

    I highly doubt that he has anything bugged. If you want to make sure, contact your local police department. If there was a key logger on your computer, again contact the local authorities if you are unsure.
      My Computer


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 10 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 10" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 10:52.
Find Us




Windows 10 Forums