Jump to content

Lots of RTP detections followed by partial network outage


MaxLebled
 Share

Go to solution Solved by BjelakovicL,

Recommended Posts

Hello everyone. This is less of a malware removal help request, and more of a question.

I was hit with something strange an hour ago. MalwareBytes started reporting a ton of "RTP detections" from chrome.exe, all with the same IP, 104.194.10.57. (I don't believe I was actively browsing at the time.)

Additionally, the first "RTP detection" logged is categorized as "Trojan" under the "Event details" column, while all subsequent ones are categorized as "Malware." All "Actions" were "Blocked website."

There were two RTP detections logged per minute between 15:05 and 15:21. At some point during that time, my Internet connectivity went down, but in an unusual way. I was connected to an online multiplayer game, but it kept working without a hitch — perhaps because it was using some direct IP connection instead of relying on DNS? But everything else stopped working. I couldn't load websites, even my router admin interface on my local network, and the system tray's network icon displayed as the little globe that indicates no connectivity (as opposed to the outline of a screen with a cable next to it) Out of curiosity, I tried the Windows troubleshooter, and the only thing it could suggest was to perform a network reset, which I didn't do.

Here are some bits from the Windows Event Viewer that may be relevant:

  • (15:06:00) DNS Client Events: Name resolution for the name telemetry.malwarebytes.com timed out after none of the configured DNS servers responded
  • (15:06:02) Tcpip: TCP/IP failed to establish an outgoing connection because the selected local endpoint was recently used to connect to the same remote endpoint. This error typically occurs when outgoing connections are opened and closed at a high rate, causing all available local ports to be used and forcing TCP/IP to reuse a local port for an outgoing connection. (...)
  • (15:16:45) DNS Client Events: Name resolution for the name heartbeat.dm.origin.com timed out after none of the configured DNS servers responded.
  • (15:16:48) AFD: Closing a TCP socket with local port number 50767 in process 21288 is taking longer than expected. The local port number may not be available until the close operation is completed. This happens typically due to misbehaving network drivers

After rebooting my computer, everything was back to normal. There have been no further "RTP detection" events logged in Malwarebytes.

Malwarebytes scans have not reported anything detected so far, and neither has MSERT.exe.

Did I stumble onto a MB bug that caused this weird issue? Should I be worried of an actual infection on my computer?

Let me know if I can provide logs or any additional details regarding this.

Link to post
Share on other sites

  • Staff

***This is an automated reply***

Hi,

Thanks for posting in the Malwarebytes for Windows Help forum.

If you are having technical issues with our Windows product, please do the following:

Malwarebytes Support Tool - Advanced Options

This feature is designed for the following reasons:

  • For use when you are on the forums and need to provide logs for assistance
  • For use when you don't need or want to create a ticket with Malwarebytes
  • For use when you want to perform local troubleshooting on your own

How to use the Advanced Options:

Spoiler
  1. Download Malwarebytes Support Tool
  2. Double-click mb-support-X.X.X.XXXX.exe to run the program
    • You may be prompted by User Account Control (UAC) to allow changes to be made to your computer. Click Yes to consent.
  3. Place a checkmark next to Accept License Agreement and click Next
  4. Navigate to the Advanced tab
  5. The Advanced menu page contains four categories:
    • Gather Logs: Collects troubleshooting information from the computer. As part of this process, Farbar Recovery Scan Tool (FRST) is run to perform a complete diagnosis. The information is saved to a file on the Desktop named mbst-grab-results.zip and can be added as an email attachment or uploaded to a forum post to assist with troubleshooting the issue at hand.
    • Clean: Performs an automated uninstallation of all Malwarebytes products installed to the computer and prompts to install the latest version of Malwarebytes for Windows afterwards. The Premium license key is backed up and reinstated. All user configurations and other data are removed. This process requires a reboot.
    •  Repair System: Includes various system-related repairs in case a Windows service is not functioning correctly that Malwarebytes for Windows is dependent on. It is not recommended to use any Repair System options unless instructed by a Malwarebytes Support agent.
    • Anonymously help the community by providing usage and threat statistics: Unchecking this option will prevent Malwarebytes Support Tool from sending anonymous telemetry data on usage of the program.
  6. To provide logs for review click the Gather Logs button
  7. Upon completion, click OK
  8. A file named mbst-grab-results.zip will be saved to your Desktop
  9. Please attach the file in your next reply.
  10. To uninstall all Malwarebytes Products, click the Clean button.
  11. Click the Yes button to proceed. 
  12. Save all your work and click OK when you are ready to reboot.
  13. After the reboot, you will have the option to re-install the latest version of Malwarebytes for Windows.
  14. Select Yes to install Malwarebytes.
  15. Malwarebytes for Windows will open once the installation completes successfully.

Screenshots:

Spoiler
 
 
 
 
Spoiler

 

 

01.png

02.png

03.png

04.png

05.png

06.png

 

 

If you are having licensing issues, please do the following: 

Spoiler

For any of these issues:

  • Renewals
  • Refunds (including double billing)
  • Cancellations
  • Update Billing Info
  • Multiple Transactions
  • Consumer Purchases
  • Transaction Receipt

Please contact our support team at https://support.malwarebytes.com/hc/en-us/requests/new to get help

If you need help looking up your license details, please head here: Find my premium license key

 

 

Thanks in advance for your patience.

-The Malwarebytes Forum Team

Link to post
Share on other sites

Cross-checked with my browser history and it seems very likely that it's this web page (opened at 15:06, but left in the background) that was responsible: https://gamebanana.com/members/1238771

Warnings from Malwarebytes about 104.194.10.57 are popping up again while I visit it, despite adblockers being enabled. Maybe there's a malicious ad somewhere.

So that seems most likely to be the root cause, but as to how and why it could bring my internet connectivity down... hopefully the logs will help someone shine light on what happened?

Link to post
Share on other sites

2 hours ago, MaxLebled said:

I was hit with something strange an hour ago. MalwareBytes started reporting a ton of "RTP detections" from chrome.exe, all with the same IP, 104.194.10.57. (I don't believe I was actively browsing at the time.)

Were they incoming or outgoing?

Link to post
Share on other sites

2 hours ago, Porthos said:

Were they incoming or outgoing?

The detections were outgoing. I was able to reproduce them by visiting the webpage I mentioned in my previous post, so the source is known. What I couldn't reproduce was my Internet connectivity going down after a while; because there's a possibility this might have been a Malwarebytes bug, I figured posting the logs would be helpful.

(I've hit strange MB bugs before, like the one that caused my PC to BSOD if a RTSP stream was accessed over LAN...! 😀)

Link to post
Share on other sites

1 minute ago, MaxLebled said:

I was able to reproduce them by visiting the webpage I mentioned in my previous post

I am not getting blocks on that page.

 

2 minutes ago, MaxLebled said:

The detections were outgoing.

I really suggest you do the following just to be safe.

Please follow the instructions in this topic then create a new topic in our malware removal area by clicking here and a malware removal specialist will guide you in checking and cleaning your system of any threats.  They will be able to help you to determine whether your system is truly clean or not.

Link to post
Share on other sites

I'm not getting them anymore either, which is why I'm inclined to think it was an ad that was connecting to a blacklisted IP — failing, and trying over and over. Further searches have led me to a forum post that mentions this specific IP related to ads as well. This page claims there is a link between the IP and the gamebanana domain name as well.

I will run this tool and create a thread just in case, though—better safe than sorry! (I just want to write everything down in case that helps someone later down the line...)

Link to post
Share on other sites

  • 5 weeks later...

Hi,

We are the owner of the IP. It is a simple file caching server, identical to several others, that just serves JS and CSS files for a website. That is its only function. I have run a rootkit scanner on the server to check for trojans, and I could not find any. The server is relatively new, we set it up a couple of month ago. All I can think of is the IP's previous owner was malicious.

If this issue keeps occurring, we are open to reloading the OS and software on the server to ensure everything is clean.

Sincerely,
GameBanana

Screenshot_2022-05-27_15-38-40.png

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
 Share

  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.