This is an alert i started getting today. It appears as soon as Avast starts up whether i’m connected to the internet or not. It’s not an exaggeration for me to say that i have no idea where to even begin to start solving this issue… For my own sake, let’s proceed with the assumption that i am no good with computers or the internet.
Again, this alert appears seemingly on its own without my input. It seems svchost.exe is infected with a worm or something? Neither Avast nor AVG can detect anything, and i haven’t had any luck with internet searches. How do i resolve this? How much danger is my system in? Thank you for your time.
Same issue, already tried Malwarebytes, HitmanPro, ADWCleaner, RKill, and Windows Command to Scan svchost.exe. Still comes back after every start up.
Seeing some of you are using Steam, did you have bought anything online and paid for it with a credit card for the past 48 hours? Might check in with Valve if there’s something similar, this things keeps coming back.
TLS Recommendations
HTTPS version of this website is not accessible: 404 Not Found. Please consider setting up HTTPS to avoid the “Not Secure” browser warning.
Even although website is being whitelisted, we find:
No redirect from HTTP to HTTPS found. You should redirect your website visitors to the HTTPS version to avoid the “Not Secure” browser warning.
Got the exact same triggered notification from Avast word for word.
Couldn’t figure out what caused it, kept popping up even after restarting my PC before opening anything, but managed to make it stop by using Avast to block the URL.
For me the strange thing is the initiating executable file, whilst there occasions that svchost.exe legitimately connects to the internet. I find it hard to see why it would do so in this instance. Typically this is related to Windows Updates (and some other windows functions), which doesn’t appear to be the case here
The problem is we see connections to digicert dot com being whitelisted by AbuseIPDB & others.
But also sub-domain, crl4 dot digicert dot com, has been whitelisted having IP 93.184.220.29.
This according to AbuseIPDB.
So is EdgeCast NetBLk being abused, while officials state this cannot be, stats as denial of obvious facts?
Now we have to wait for some specifics from those that flagged this abuse in the first place.
I get this inside developers console on the browser
Access to fetch at ‘hxtps://s-install.avcdn.net/aos/assets/prod/translations/Locale-en-US.json’ from origin ‘htxp://crl4.digicert.com’ has been blocked by CORS policy: No ‘Access-Control-Allow-Origin’ header is present on the requested resource. If an opaque response serves your needs, set the request’s mode to ‘no-cors’ to fetch the resource with CORS disabled.