Jump to content

Recommended Posts

Hello, I'm new here!

So I was playing CSGO two days ago and Avast, my primary AV gave a silent notification about blocking something saying; "We have safely aborted the connection to udp:/ since it was infected with Botnet:Blacklist". I didn't notice the notification until the day after (yesterday). I tried to ignore it but downloaded Malwarebytes to do a scan of the computer, as a second opinion. Everything was clean, from all scans. Defender, Avast and Malwarebytes.

Then yesterday after the scans I started playing CSGO again. I think I was on a private server practicing against bots, but might have just played on community server, or just browsed the community servers list, I do not remember. I had been on community servers the day before anyway, and pretty sure earlier that same day.

When I'm in the private server with bots I get two notifications from Malwarebytes (Premium Trial with the active protection), one following closely after the other, saying that it had blocked two different websites (IP's). Malwarebytes says that the file was: csgo.exe and one IP blocked was marked as "Trojan" and the other as "Compromised".

This is scary since it has never happened to me before, and I've played since the beginning of CSGO. Is it a false positive or could this actually be something in CSGO that is trying to infect me? Nothing was effecting the game, I didn't get disconnected or anything, if it wasn't for the popups I would have never noticed it blocking something.

I tried googling it a bit but found little to nothing, the IP's looks to be CSGO servers but I do not recall connecting to them, not recently at least. One IP was flagged on virustotal.com however.

I found an older thread here earlier about a similar issue https://forums.malwarebytes.com/topic/233108-website-blocked-csgo-server/?tab=comments#comment-1256662 , not sure if it can be applied to my situation though?

I'll post the IP's here for anyone who is interested, Avast didn't provide me with the IP it blocked however, but the two IP's that Malwarebytes blocked are:

217.24.160.92 and 185.141.63.38

 

Should I worry about a virus or should I be calm and this is just some misunderstanding from the AV's?

Thanks in advance!

P.S. Please take in consideration I'm not an expert at computers!

Edited by AdvancedSetup
corrected font issue
Link to post
Share on other sites

  • Root Admin

Hello @elito

Not sure why the blocks but it's possible that your game is using Peer2Peer connections which can at times place data connections on a known bad network circuit.

Here is the information about those IP addresses.

 

217.24.160.92

canonical name     160-92.dialup.alkar.net.
aliases     
addresses     217.24.160.92

Domain Name: ALKAR.NET
Registry Domain ID: 137184
Registrar WHOIS Server: whois.ukrnames.com
Registrar URL: http://www.ukrnames.com

Redirects to: https://towercraft.me (which appears to be offline)

canonical name     towercraft.me.
aliases     
addresses     104.21.16.134
172.67.212.116
2606:4700:3033::6815:1086
2606:4700:3031::ac43:d474

Updated Date: 2020-07-01T21:15:44Z
Creation Date: 2020-05-02T14:25:53Z
Registry Expiry Date: 2021-05-02T14:25:53Z

Registrant Organization:
Registrant State/Province: Kiev
Registrant Country: RU
Name Server: ANIRBAN.NS.CLOUDFLARE.COM
Name Server: KIKI.NS.CLOUDFLARE.COM

 


185.141.63.38

lookup failed     185.141.63.38
Could not find a domain name corresponding to this IP address.


The IP range appears to be owned by Redcluster LTD in CYPRUS
Cyprus, is an island nation in the eastern Mediterranean

Comodo Valkyrie Verdict and Kaspersky also block this IP for malware

 

 

We can go ahead and do some scans of your system though to check and make sure all is okay.

 

Please run the following steps and post back the logs as an attachment when ready.
Temporarily disable your antivirus or other security software first. Make sure to turn it back on once the scans are completed.
Temporarily disable Microsoft SmartScreen to download software below if needed. Make sure to turn it back on once the scans are completed.
If you still have trouble downloading the software please click on Reveal Hidden Contents below for examples of how to allow the download.

 

Spoiler
 
 
 
 

 

 

 

 

 

 

 

Spoiler

 

 

 

 

 

 

 

When downloading with some browsers you may see a different style of screens that may block FRST from downloading. The program is safe and used hundreds of times a week by many users.

Example of Microsoft Edge blocking the download

image.png

image.png

image.png

 

 

 

 

 

 

 

 



STEP 01

  • If you already have Malwarebytes installed then open Malwarebytes and click on the Scan button. It will automatically check for updates and run a Threat Scan.
  • If you don't have Malwarebytes installed yet please download it from here and install it.
  • Once installed then open Malwarebytes and select Scan and let it run.
  • Once the scan is completed make sure you have it quarantine any detections it finds.
  • If no detections were found click on the Save results drop-down, then the Export to TXT  button, and save the file as a Text file to your desktop or other location you can find and attach that log on your next reply.
  • If there were detections then once the quarantine has completed click on the View report button, Then click the Export drop-down, then the Export to TXT  button, and save the file as a Text file to your desktop or other location you can find and attach that log on your next reply.
  • If the computer restarted to quarantine you can access the logs from the Detection History, then the History tab. Highlight the most recent scan and double-click to open it. Then click the Export drop-down, then the Export to TXT  button, and save the file as a Text file to your desktop or other location you can find and attach that log on your next reply.
  • If Malwarebytes won't run then please skip to the next step and let me know in your next reply that the scanner would not run.

STEP 02

Please download AdwCleaner by Malwarebytes and save the file to your Desktop.

  • Double-click to run the program
  • Accept the End User License Agreement.
  • Wait until the database is updated.
  • Click Scan Now.
  • When finished, if items are found please click Quarantine.
  • Your PC should reboot now if any items were found.
  • After reboot, a log file will be opened. Attach or Copy its content into your next reply.

RESTART THE COMPUTER Before running Step 3

STEP 03
Please download the Farbar Recovery Scan Tool and save it to your desktop.

Note: You need to run the version compatible with your system. You can check here if you're not sure if your computer is 32-bit or 64-bit

  • Double-click to run it. When the tool opens, click Yes to disclaimer.
  • Press the Scan button.
  • It will make a log (FRST.txt) in the same directory the tool is run. Please attach it to your reply.
  • The first time the tool is run, it also makes another log (Addition.txt). If you've, run the tool before you need to place a check mark here each time
  • Please attach the Additions.txt log to your reply as well.
  • On your next reply, you should be attaching frst.txt and additions.txt to your post, every time.

 

Thanks

Edited by AdvancedSetup
updated information
Link to post
Share on other sites

  • 2 months later...
  • Root Admin

Due to the lack of feedback, this topic is closed to prevent others from posting here.

If you need this topic reopened, please send a Private Message to any one of the moderating team members. Please include a link to this topic with your request.

This applies only to the originator of this topic. Other members who need assistance please start your own topic in a new thread.

Tips to help protect from infection

Thanks

 

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.