You should be highly suspicious of it. Find out what process owns the
connection.
OK, I got more info. I checked my Webroot AV log, and found an old
virus "in quaranteen" (not yet deleted, but apparently inert, since
the Sophos engine that Webroot uses is known to produce a lot of false
positives). See below.
Now my question is: is it possible for a "rootkit-masked registry" to
get installed, attempt to dial out info, and get blocked by your
firewall? That might explain some weird stuff, but, on the other
hand, if it's in 'quaranteen' (inert), it should not be doing that.
So my hypothesis is that your suggestion that a site I visited
(probably porn) attempted to route my presence at that site (simply
for marketing purposes, nothing nefarious) via the browser(?), to
another web server--that explains perhaps the Polish and southern
Russia and Thai ports that are/were attempted to be accessed
(unsuccessfully, since the firewall blocked them).
RL
the virus under 'quaranteen' is here:
Profile - Potentially rootkit-masked registry
Name Potentially rootkit-masked registry
Unique Code EH8URCFZ
Type System Monitor
Severity Critical
Description Potentially rootkit-masked registry is a monitoring
program that secretly tracks all activities of computer users.
Characteristics Potentially rootkit-masked registry may monitor and
capture your computer activity, including recording all keystrokes, e-
mails, chat room dialogue, instant message dialogue, Web sites
visited, usernames, passwords, and programs run. This program may be
capable of taking screen shots of your desktop at scheduled intervals,
storing the information on your computer in an encrypted log file for
later retrieval. These log files may be e-mailed to a pre-defined e-
mail address. This program can run in the background, hiding its
presence.
Method of Infection Potentially rootkit-masked registry may be
installed via other threats, such as music downloads and Trojan
downloaders.
Consequences This system monitor may allow an unauthorized, third
party to view potentially sensitive information, such as passwords, e-
mail, and chat room conversation. Additional Comments: It is
recommended that you change all of your passwords after removing this
program. If you bank online, you might consider changing your credit
card and bank account numbers. You should also monitor your credit
card and bank statements carefully over the next several months for
signs of fraudulent activity.