Thank you for being a valued part of the CNET community. As of December 1, 2020, the forums are in read-only format. In early 2021, CNET Forums will no longer be available. We are grateful for the participation and advice you have provided to one another over the years.

Thanks,

CNET Support

General discussion

Explorer.exe using alot of bandwidth

May 7, 2015 1:43PM PDT

So um I just re-installed my system because of no internet connection for me and my ISP told me that my computer is the one that using 90% of the bandwidth. After the help from M.Poriff and others I was able to regain internet connection.
Still with fairly slow speed at 2mbps(normal is 15-20 mbps) , I decided to restore my system completely hoping to resolve to problem. But after 4 hours of restoring, the problem is still there--- extremely slow internet sometimes and Caspa showing over 7000 packets and sometimes 40000 sent/received.
After some research and figuring out, I found out that explorer.exe was using the most bandwidth(I did this by typing netstat -antb into the cmd. So if you guys know why is the user interface and menu(explorer.exe) is using so much bandwidth, please help. Thanks!

Here are the screen shots for Caspa and cmd.
http://postimg.org/gallery/p2iae1xy/6ece2b3f/

Discussion is locked

- Collapse -
So your'e cross posting?
May 7, 2015 1:48PM PDT
- Collapse -
Looks like you have installed more malware.
May 7, 2015 2:08PM PDT

Repeat the process we went over before.

- Collapse -
How?
May 7, 2015 10:37PM PDT

Is it really possible that I got more malware after a complete system wipe?

- Collapse -
I didn't install much
May 7, 2015 10:42PM PDT

All I installed was Norton 360. League of legends. World of warship&tanks, steam and capsa.

- Collapse -
Also
May 7, 2015 10:52PM PDT

also the nvidia experience and graphic card drivers

- Collapse -
All it takes is one.
May 8, 2015 1:40AM PDT

And the Capsa software I looked at looked totally unnecessary. Norton 360? Given your prior lists you still have that issue of the unidentifyable OS.

-> I didn't want to pry but when that happens, 100% of the time it's a cracked and likely pre-infected Windows.
Bob

- Collapse -
New system?
May 8, 2015 3:29AM PDT

i tried the steps like last time, but nothing was found. So is there anything else I can try other than buy a new system?

- Collapse -
Looks grim.
May 8, 2015 3:32AM PDT

You didn't rebut the pirate cracked issue so my bet is you are using a pre-infected OS.
Bob

- Collapse -
I just bought this pc.
May 8, 2015 3:50AM PDT

i just got this computer like 5 months ago at future shop. So I should buy a new system?

- Collapse -
I fear you're hosed.
May 8, 2015 3:52AM PDT

Given you didn't deny the OS is cracked, pirated I fear your best move is to Linux. It's free and hard to find an infected distro.
Bob

- Collapse -
Re: no need to buy a new PC
May 8, 2015 3:55AM PDT

Reinstall Windows from the original disks that came with the PC. Check if it's OK.
- If it isn't it's a warranty issue.
- If it is, make an image, install what you need and check again. If wrong now, it's something you installed yourself. Then back to the image and go step by step until you find what it was. Then go back again and don't install that particular thing.

Kees

- Collapse -
Linux
May 8, 2015 5:07AM PDT

Mint, Ubuntu, Zorin, all favorites.

osdisc.com and distrowatch.com to investigate

- Collapse -
I can see
May 8, 2015 5:36AM PDT

you have the "hacker port" 139 left wide open.

your computer is;

192.168.1.105 and port 139 is "listening". It allows NetBios connections for anyone who hits it. Needs to be shut down.
https://www.grc.com/port_139.htm

I see port 445 referenced, which is a Samba port. That's used for Linux and Unix computers to connect to windows shared systems or folders. If you don't have a Linux based computer on your LAN, then that is a worry.

Also looks like another 'hacker' port is open, port 135
https://www.grc.com/port_135.htm

I see port 5228, here's how it's used lately.

"Port 5228 is used by the Google Playstore (Android market). Google talk also uses ports 443, 5222 and 5228. Google Chrome user settings sync (facorites, history, passwords) uses port 5228."

untrusted site nr-data.net at IP address 50.31.164.173:443

calling home to windows on https://111.221.124.111/
"The certificate is only valid for *.wns.windows.com"
There's a couple more that look like call home to windows dot com site. If you are using pirated software, you're getting ratted on by it, LOL.

everything else is the http ports 80 and the secure https ports 443

- Collapse -
Seems to me ...
May 8, 2015 5:49AM PDT

after reading your post, that Bob might be right on this one regarding a crack.
Dafydd.

- Collapse -
What should I do?
May 8, 2015 6:09AM PDT

i don't think I have the Pirated version, I bought the PC with the system at future shop this January, so I don't think it is pirated. And I do I fix this problem? Thanks

- Collapse -
So this is in warranty?
May 8, 2015 6:17AM PDT

If so, get a refund or exchange. I wouldn't put up with this on a machine in warranty.
Dafydd.

- Collapse -
I think it still is.
May 8, 2015 6:52AM PDT

My warranty is still valid till December. But I did some hardware upgrade, Power Supply and the graphic card, so I'm not sure if that void the warranty.
But before I go through the trouble of bring my PC to the store and waiting, is there anyway I can fix the problem, like closing the ports James Denison was talking about?

- Collapse -
The Hijackthis log
May 8, 2015 6:28AM PDT

Is why I worry about the OS or those apps. You installed bad apps and now with a wipe it's still doing it.

- Collapse -
more
May 8, 2015 7:01AM PDT
- Collapse -
to capture command text outputs
May 8, 2015 8:43AM PDT

you run the command as usual, but put a space and then >c:/text.txt and find it in your windows root folder as a text file.

for instance, if I wanted an output of a "dir" on windows folder I would

dir c:/windows >c:\text.txt

the file name can be anything.

- Collapse -
uh, make all slashes backwards
May 8, 2015 8:52AM PDT

I use Linux and it uses front slash, but windows uses the backslash.

- Collapse -
I see livecomm
May 8, 2015 8:51AM PDT
http://www.tomshardware.com/answers/id-2433484/livecomm-exe-remove.html
https://messengergeek.wordpress.com/2012/02/29/how-to-stop-the-built-in-messenger-from-signing-in-on-windows-8-consumer-preview/

so, is this a copy of the consumer preview instead of RTM copy of windows?

map.exe
http://www.file.net/process/map.exe.html
http://www.solvusoft.com/en/files/error-virus-removal/exe/windows/microsoft/windows-nt-file-and-print-services-for-netware/map-exe/

Map.exe problems can be attributed to corrupt or missing files, invalid registry entries associated with Map.exe, or a virus / malware infection.
More specifically, these map.exe errors can be caused by:

Corrupt Windows registry keys associated with map.exe

a hacked copy of windows being used?
- Collapse -
I dont know
May 8, 2015 8:57AM PDT

That is actually the first time I see Map.exe. Its just been random programs, sometimes is LiveCommon, sometime is Explorer.exe or svhost.exe. And this time N360.exe

Active Connections

Proto Local Address Foreign Address State
TCP 0.0.0.0:135 0.0.0.0Shocked LISTENING
RpcSs
[svchost.exe]
TCP 0.0.0.0:445 0.0.0.0Shocked LISTENING
Can not obtain ownership information
TCP 0.0.0.0:554 0.0.0.0Shocked LISTENING
[wmpnetwk.exe]
TCP 0.0.0.0:2869 0.0.0.0Shocked LISTENING
Can not obtain ownership information
TCP 0.0.0.0:5357 0.0.0.0Shocked LISTENING
Can not obtain ownership information
TCP 0.0.0.0:10243 0.0.0.0Shocked LISTENING
Can not obtain ownership information
TCP 0.0.0.0:47984 0.0.0.0Shocked LISTENING
[NvStreamNetworkService.exe]
TCP 0.0.0.0:47989 0.0.0.0Shocked LISTENING
[NvStreamNetworkService.exe]
TCP 0.0.0.0:49152 0.0.0.0Shocked LISTENING
[wininit.exe]
TCP 0.0.0.0:49153 0.0.0.0Shocked LISTENING
EventLog
[svchost.exe]
TCP 0.0.0.0:49154 0.0.0.0Shocked LISTENING
[lsass.exe]
TCP 0.0.0.0:49155 0.0.0.0Shocked LISTENING
Schedule
[svchost.exe]
TCP 0.0.0.0:49156 0.0.0.0Shocked LISTENING
[spoolsv.exe]
TCP 0.0.0.0:49158 0.0.0.0Shocked LISTENING
Can not obtain ownership information
TCP 0.0.0.0:49165 0.0.0.0Shocked LISTENING
[N360.exe]
TCP 0.0.0.0:49166 0.0.0.0Shocked LISTENING
[N360.exe]
TCP 127.0.0.1:2869 127.0.0.1:53416 TIME_WAIT
TCP 127.0.0.1:2869 127.0.0.1:53417 TIME_WAIT
TCP 127.0.0.1:2869 127.0.0.1:53418 TIME_WAIT
TCP 127.0.0.1:2869 127.0.0.1:53419 TIME_WAIT
TCP 127.0.0.1:2869 127.0.0.1:53420 TIME_WAIT
TCP 127.0.0.1:2869 127.0.0.1:53421 TIME_WAIT
TCP 127.0.0.1:2869 127.0.0.1:53422 TIME_WAIT
TCP 127.0.0.1:2869 127.0.0.1:53423 TIME_WAIT
TCP 127.0.0.1:2869 127.0.0.1:53424 TIME_WAIT
TCP 127.0.0.1:2869 127.0.0.1:53440 TIME_WAIT
TCP 127.0.0.1:2869 127.0.0.1:53453 TIME_WAIT
TCP 127.0.0.1:2869 127.0.0.1:53454 TIME_WAIT
TCP 127.0.0.1:5354 0.0.0.0Shocked LISTENING
[mDNSResponder.exe]
TCP 127.0.0.1:9990 0.0.0.0Shocked LISTENING
[NvNetworkService.exe]
TCP 127.0.0.1:23402 0.0.0.0Shocked LISTENING
[NvBackend.exe]
TCP 127.0.0.1:52536 127.0.0.1:65001 ESTABLISHED
[NvStreamNetworkService.exe]
TCP 127.0.0.1:65000 0.0.0.0Shocked LISTENING
[nvstreamsvc.exe]
TCP 127.0.0.1:65001 0.0.0.0Shocked LISTENING
[NvStreamNetworkService.exe]
TCP 127.0.0.1:65001 127.0.0.1:52536 ESTABLISHED
[NvStreamNetworkService.exe]
TCP 192.168.100.105:51302 143.127.93.117:80 ESTABLISHED
[N360.exe]
TCP 192.168.100.106:139 0.0.0.0Shocked LISTENING
Can not obtain ownership information
TCP 192.168.100.106:52558 111.221.72.90:443 ESTABLISHED
[Explorer.EXE]
TCP 192.168.100.106:52648 143.127.93.106:80 ESTABLISHED
[N360.exe]
TCP 192.168.100.106:52968 216.123.55.116:443 TIME_WAIT
TCP 192.168.100.106:52979 64.233.181.188:5228 TIME_WAIT
TCP 192.168.100.106:53018 216.58.216.236:443 TIME_WAIT
TCP 192.168.100.106:53350 216.123.55.18:443 TIME_WAIT
TCP 192.168.100.106:53354 216.58.216.226:443 TIME_WAIT
TCP 192.168.100.106:53360 98.139.199.205:443 TIME_WAIT
TCP 192.168.100.106:53370 8.39.37.25:80 TIME_WAIT
TCP 192.168.100.106:53371 23.74.75.228:80 TIME_WAIT
TCP 192.168.100.106:53372 23.74.75.228:80 TIME_WAIT
TCP 192.168.100.106:53425 216.58.216.227:443 TIME_WAIT
TCP 192.168.100.106:53426 205.200.78.96:80 TIME_WAIT
TCP 192.168.100.106:53432 216.115.96.174:443 TIME_WAIT
TCP 192.168.100.106:53435 69.172.216.111:443 TIME_WAIT
TCP 192.168.100.106:53447 64.30.224.91:443 TIME_WAIT
TCP [:Happy:135 [:HappyShocked LISTENING
RpcSs
[svchost.exe]
TCP [:Happy:445 [:HappyShocked LISTENING
Can not obtain ownership information
TCP [:Happy:554 [:HappyShocked LISTENING
[wmpnetwk.exe]
TCP [:Happy:2869 [:HappyShocked LISTENING
Can not obtain ownership information
TCP [:Happy:3587 [:HappyShocked LISTENING
p2psvc
[svchost.exe]
TCP [:Happy:5357 [:HappyShocked LISTENING
Can not obtain ownership information
TCP [:Happy:10243 [:HappyShocked LISTENING
Can not obtain ownership information
TCP [:Happy:49152 [:HappyShocked LISTENING
[wininit.exe]
TCP [:Happy:49153 [:HappyShocked LISTENING
EventLog
[svchost.exe]
TCP [:Happy:49154 [:HappyShocked LISTENING
[lsass.exe]
TCP [:Happy:49155 [:HappyShocked LISTENING
Schedule
[svchost.exe]
TCP [:Happy:49156 [:HappyShocked LISTENING
[spoolsv.exe]
TCP [:Happy:49158 [:HappyShocked LISTENING
Can not obtain ownership information
TCP [:Happy:49166 [:HappyShocked LISTENING
[N360.exe]
UDP 0.0.0.0:500 *:*
IKEEXT
[svchost.exe]
UDP 0.0.0.0:3544 *:*
iphlpsvc
[svchost.exe]
UDP 0.0.0.0:3702 *:*
FDResPub
[svchost.exe]
UDP 0.0.0.0:3702 *:*
EventSystem
[svchost.exe]
UDP 0.0.0.0:3702 *:*
FDResPub
[svchost.exe]
UDP 0.0.0.0:3702 *:*
EventSystem
[svchost.exe]
UDP 0.0.0.0:3702 *:*
[dashost.exe]
UDP 0.0.0.0:3702 *:*
[dashost.exe]
UDP 0.0.0.0:4500 *:*
IKEEXT
[svchost.exe]
UDP 0.0.0.0:5004 *:*
[wmpnetwk.exe]
UDP 0.0.0.0:5005 *:*
[wmpnetwk.exe]
UDP 0.0.0.0:5355 *:*
Dnscache
[svchost.exe]
UDP 0.0.0.0:59517 *:*
[NvStreamNetworkService.exe]
UDP 0.0.0.0:60336 *:*
[mDNSResponder.exe]
UDP 0.0.0.0:61403 *:*
FDResPub
[svchost.exe]
UDP 0.0.0.0:61663 *:*
EventSystem
[svchost.exe]
UDP 0.0.0.0:64157 *:*
[dashost.exe]
UDP 127.0.0.1:1900 *:*
SSDPSRV
[svchost.exe]
UDP 127.0.0.1:48300 *:*
[NvBackend.exe]
UDP 127.0.0.1:48301 *:*
[nvstreamsvc.exe]
UDP 127.0.0.1:48302 *:*
[nvtray.exe]
UDP 127.0.0.1:51737 *:*
[nvstreamsvc.exe]
UDP 127.0.0.1:59512 *:*
[NvStreamNetworkService.exe]
UDP 127.0.0.1:59513 *:*
[NvStreamNetworkService.exe]
UDP 127.0.0.1:59514 *:*
[nvstreamsvc.exe]
UDP 127.0.0.1:59515 *:*
[nvstreamsvc.exe]
UDP 127.0.0.1:59516 *:*
[nvstreamsvc.exe]
UDP 127.0.0.1:61667 *:*
SSDPSRV
[svchost.exe]
UDP 127.0.0.1:61974 *:*
[nvstreamsvc.exe]
UDP 127.0.0.1:65000 *:*
[nvstreamsvc.exe]
UDP 192.168.100.106:137 *:*
Can not obtain ownership information
UDP 192.168.100.106:138 *:*
Can not obtain ownership information
UDP 192.168.100.106:1900 *:*
SSDPSRV
[svchost.exe]
UDP 192.168.100.106:5353 *:*
[mDNSResponder.exe]
UDP 192.168.100.106:5353 *:*
[NvStreamNetworkService.exe]
UDP 192.168.100.106:61665 *:*
SSDPSRV
[svchost.exe]
UDP 192.168.100.106:62606 *:*
iphlpsvc
[svchost.exe]
UDP [:Happy:500 *:*
IKEEXT
[svchost.exe]
UDP [:Happy:3540 *:*
PNRPsvc
[svchost.exe]
UDP [:Happy:3702 *:*
EventSystem
[svchost.exe]
UDP [:Happy:3702 *:*
FDResPub
[svchost.exe]
UDP [:Happy:3702 *:*
[dashost.exe]
UDP [:Happy:3702 *:*
FDResPub
[svchost.exe]
UDP [:Happy:3702 *:*
EventSystem
[svchost.exe]
UDP [:Happy:3702 *:*
[dashost.exe]
UDP [:Happy:4500 *:*
IKEEXT
[svchost.exe]
UDP [:Happy:5004 *:*
[wmpnetwk.exe]
UDP [:Happy:5005 *:*
[wmpnetwk.exe]
UDP [:Happy:5355 *:*
Dnscache
[svchost.exe]
UDP [:Happy:59518 *:*
[NvStreamNetworkService.exe]
UDP [:Happy:60337 *:*
[mDNSResponder.exe]
UDP [:Happy:61404 *:*
FDResPub
[svchost.exe]
UDP [:Happy:61666 *:*
EventSystem
[svchost.exe]
UDP [:Happy:64158 *:*
[dashost.exe]
UDP [::1]:1900 *:*
SSDPSRV
[svchost.exe]
UDP [::1]:5353 *:*
[mDNSResponder.exe]
UDP [::1]:5353 *:*
[NvStreamNetworkService.exe]
UDP [::1]:61664 *:*
SSDPSRV
[svchost.exe]
UDP [fe80::117d:c7aa:49ca:af48%4]:1900 *:*
SSDPSRV
[svchost.exe]
UDP [fe80::117d:c7aa:49ca:af48%4]:61662 *:*
SSDPSRV
[svchost.exe]

- Collapse -
Im going to get a new copy of windows
May 8, 2015 8:59AM PDT

I am going to get a legal replacement copy of windows 8.1 if that is the best way to solve this problem

- Collapse -
So this was a cracked copy.
May 8, 2015 9:08AM PDT

Explains so much.

- Collapse -
Bingo!
May 9, 2015 6:51AM PDT

I thought as much Bob.
Dafydd.

- Collapse -
good idea
May 8, 2015 9:40AM PDT

In the interim, think of installing and using Linux. Mint, Ubuntu, Zorin, Kubuntu, or whatever you see and like on Youtube videos. Look there for videos by Spatry, Nixie Pixel, TOStoday, Infinitely Galactic. You may not even want windows after using one of those. I actually abandoned XP a year before it lost support to Kubuntu, then switched over to Mint.

- Collapse -
The OS is highly suspect.
May 8, 2015 7:13AM PDT
- Collapse -
This is definitely cracked.
May 8, 2015 9:10AM PDT

He needs to come from the "darkside". This is cracked! No more input on this.
Dafydd.

- Collapse -
This is what I got
May 8, 2015 12:34PM PDT

This is what I got after the reinstall using the replacement

Active Connections

Proto Local Address Foreign Address State
TCP 0.0.0.0:135 0.0.0.0Shocked LISTENING
RpcSs
[svchost.exe]
TCP 0.0.0.0:445 0.0.0.0Shocked LISTENING
Can not obtain ownership information
TCP 0.0.0.0:554 0.0.0.0Shocked LISTENING
[wmpnetwk.exe]
TCP 0.0.0.0:2869 0.0.0.0Shocked LISTENING
Can not obtain ownership information
TCP 0.0.0.0:5357 0.0.0.0Shocked LISTENING
Can not obtain ownership information
TCP 0.0.0.0:10243 0.0.0.0Shocked LISTENING
Can not obtain ownership information
TCP 0.0.0.0:49152 0.0.0.0Shocked LISTENING
[wininit.exe]
TCP 0.0.0.0:49153 0.0.0.0Shocked LISTENING
[lsass.exe]
TCP 0.0.0.0:49154 0.0.0.0Shocked LISTENING
Schedule
[svchost.exe]
TCP 0.0.0.0:49155 0.0.0.0Shocked LISTENING
EventLog
[svchost.exe]
TCP 0.0.0.0:49156 0.0.0.0Shocked LISTENING
[spoolsv.exe]
TCP 0.0.0.0:49157 0.0.0.0Shocked LISTENING
Can not obtain ownership information
TCP 169.254.108.237:139 0.0.0.0Shocked LISTENING
Can not obtain ownership information
TCP 192.168.1.105:139 0.0.0.0Shocked LISTENING
Can not obtain ownership information
TCP 192.168.1.105:2869 192.168.1.1:45797 TIME_WAIT
TCP 192.168.1.105:2869 192.168.1.1:45798 TIME_WAIT
TCP 192.168.1.105:2869 192.168.1.1:45801 TIME_WAIT
TCP 192.168.1.105:2869 192.168.1.1:45802 TIME_WAIT
TCP 192.168.1.105:49438 68.67.152.219:80 LAST_ACK
[System]
TCP 192.168.1.105:49674 208.81.7.153:80 LAST_ACK
[System]
TCP 192.168.1.105:49692 104.244.244.226:8080 TIME_WAIT
TCP 192.168.1.105:49693 104.244.244.226:8080 TIME_WAIT
TCP 192.168.1.105:49694 104.244.244.226:8080 TIME_WAIT
TCP 192.168.1.105:49705 204.79.197.200:80 TIME_WAIT
TCP 192.168.1.105:49714 66.119.144.189:443 TIME_WAIT
TCP 192.168.1.105:49731 205.200.78.77:80 TIME_WAIT
TCP 192.168.1.105:49732 205.200.78.77:80 TIME_WAIT
TCP 192.168.1.105:49741 66.119.144.189:443 TIME_WAIT
TCP 192.168.1.105:49937 192.168.1.1:49152 TIME_WAIT
TCP 192.168.1.105:49962 192.168.1.1:49152 TIME_WAIT
TCP 192.168.1.105:49973 69.171.26.70:80 TIME_WAIT
TCP 192.168.1.105:49981 162.248.19.136:80 TIME_WAIT
TCP 192.168.1.105:49982 162.248.19.136:80 TIME_WAIT
TCP 192.168.1.105:50049 204.79.197.200:443 ESTABLISHED
[Explorer.EXE]
TCP 192.168.1.105:50050 204.79.197.200:443 ESTABLISHED
[Explorer.EXE]
TCP 192.168.1.105:50060 192.168.1.1:49152 TIME_WAIT
TCP 192.168.1.105:50064 192.168.1.1:49152 TIME_WAIT
TCP 192.168.1.105:50074 192.168.1.1:49152 TIME_WAIT
TCP 192.168.1.105:50075 192.168.1.1:49152 TIME_WAIT
TCP 192.168.1.105:50100 205.200.78.72:80 ESTABLISHED
wuauserv
[svchost.exe]
TCP [:Happy:135 [:HappyShocked LISTENING
RpcSs
[svchost.exe]
TCP [:Happy:445 [:HappyShocked LISTENING
Can not obtain ownership information
TCP [:Happy:554 [:HappyShocked LISTENING
[wmpnetwk.exe]
TCP [:Happy:2869 [:HappyShocked LISTENING
Can not obtain ownership information
TCP [:Happy:3587 [:HappyShocked LISTENING
p2psvc
[svchost.exe]
TCP [:Happy:5357 [:HappyShocked LISTENING
Can not obtain ownership information
TCP [:Happy:10243 [:HappyShocked LISTENING
Can not obtain ownership information
TCP [:Happy:49152 [:HappyShocked LISTENING
[wininit.exe]
TCP [:Happy:49153 [:HappyShocked LISTENING
[lsass.exe]
TCP [:Happy:49154 [:HappyShocked LISTENING
Schedule
[svchost.exe]
TCP [:Happy:49155 [:HappyShocked LISTENING
EventLog
[svchost.exe]
TCP [:Happy:49156 [:HappyShocked LISTENING
[spoolsv.exe]
TCP [:Happy:49157 [:HappyShocked LISTENING
Can not obtain ownership information
UDP 0.0.0.0:68 *:*
Dhcp
[svchost.exe]
UDP 0.0.0.0:3702 *:*
netprofm
[svchost.exe]
UDP 0.0.0.0:3702 *:*
FDResPub
[svchost.exe]
UDP 0.0.0.0:3702 *:*
[dashost.exe]
UDP 0.0.0.0:3702 *:*
[dashost.exe]
UDP 0.0.0.0:3702 *:*
netprofm
[svchost.exe]
UDP 0.0.0.0:3702 *:*
FDResPub
[svchost.exe]
UDP 0.0.0.0:5004 *:*
[wmpnetwk.exe]
UDP 0.0.0.0:5005 *:*
[wmpnetwk.exe]
UDP 0.0.0.0:5355 *:*
Dnscache
[svchost.exe]
UDP 0.0.0.0:49429 *:*
netprofm
[svchost.exe]
UDP 0.0.0.0:59150 *:*
[dashost.exe]
UDP 0.0.0.0:61213 *:*
FDResPub
[svchost.exe]
UDP 127.0.0.1:1900 *:*
SSDPSRV
[svchost.exe]
UDP 127.0.0.1:51325 *:*
SSDPSRV
[svchost.exe]
UDP 169.254.108.237:137 *:*
Can not obtain ownership information
UDP 169.254.108.237:138 *:*
Can not obtain ownership information
UDP 169.254.108.237:1900 *:*
SSDPSRV
[svchost.exe]
UDP 192.168.1.105:137 *:*
Can not obtain ownership information
UDP 192.168.1.105:138 *:*
Can not obtain ownership information
UDP 192.168.1.105:1900 *:*
SSDPSRV
[svchost.exe]
UDP 192.168.1.105:51324 *:*
SSDPSRV
[svchost.exe]
UDP [:Happy:3540 *:*
PNRPsvc
[svchost.exe]
UDP [:Happy:3702 *:*
[dashost.exe]
UDP [:Happy:3702 *:*
netprofm
[svchost.exe]
UDP [:Happy:3702 *:*
FDResPub
[svchost.exe]
UDP [:Happy:3702 *:*
netprofm
[svchost.exe]
UDP [:Happy:3702 *:*
[dashost.exe]
UDP [:Happy:3702 *:*
FDResPub
[svchost.exe]
UDP [:Happy:5004 *:*
[wmpnetwk.exe]
UDP [:Happy:5005 *:*
[wmpnetwk.exe]
UDP [:Happy:5355 *:*
Dnscache
[svchost.exe]
UDP [:Happy:49430 *:*
netprofm
[svchost.exe]
UDP [:Happy:59151 *:*
[dashost.exe]
UDP [:Happy:61214 *:*
FDResPub
[svchost.exe]
UDP [::1]:1900 *:*
SSDPSRV
[svchost.exe]
UDP [::1]:51323 *:*
SSDPSRV
[svchost.exe]
UDP [fe80::88d2:9c10:9485:bb2f%4]:546 *:*
Dhcp
[svchost.exe]
UDP [fe80::88d2:9c10:9485:bb2f%4]:1900 *:*
SSDPSRV
[svchost.exe]
UDP [fe80::88d2:9c10:9485:bb2f%4]:51322 *:*
SSDPSRV
[svchost.exe]
UDP [fe80::f596:b115:6508:6ced%3]:1900 *:*
SSDPSRV
[svchost.exe]