Install Steam
login
|
language
简体中文 (Simplified Chinese)
繁體中文 (Traditional Chinese)
日本語 (Japanese)
한국어 (Korean)
ไทย (Thai)
Български (Bulgarian)
Čeština (Czech)
Dansk (Danish)
Deutsch (German)
Español - España (Spanish - Spain)
Español - Latinoamérica (Spanish - Latin America)
Ελληνικά (Greek)
Français (French)
Italiano (Italian)
Bahasa Indonesia (Indonesian)
Magyar (Hungarian)
Nederlands (Dutch)
Norsk (Norwegian)
Polski (Polish)
Português (Portuguese - Portugal)
Português - Brasil (Portuguese - Brazil)
Română (Romanian)
Русский (Russian)
Suomi (Finnish)
Svenska (Swedish)
Türkçe (Turkish)
Tiếng Việt (Vietnamese)
Українська (Ukrainian)
Report a translation problem
Just did. Will update tomorrow with their reply. I hope I gave them enough info to figure it out.
Every time I update the server list, Malwarebytes catches that IP again. This time it's catching it through port 57991.
I apparently got a reply from MalwareBytes almost two weeks ago but didn't see it because gmail hid it in between my original message to them and the auto-reply from them. They asked me to download and run FarBar. Some kind of tool that scans a few areas of the computer. I kind of think they don't exactly know what Steam.exe is. lol
The final verdict was that something was trying to mess up my computer from a Steam server, basically. They had me fix my registry. Well, this is what I'm guessing from what I emailed them and they emailed to me. Probably best to stay away from the Steam servers. They're P2P and that's never a good thing to use, if you don't want malware.
I'm helping investigate something right now that would be easy to get people to download and install but would totally fubar the system. It's far more likely something similar happened to you than anything coming from Steam.
I know no part of Steam itself that uses P2P. Some games, maybe... not Steam itself.
Which is:
NFOSERVERS (Game Hosting Server Provider)
Nuclearfallout Enterprises, Inc.
United States San Jose
Internap Network Services Corporation
Quite possibly being used as a server host for Counter-Strike: Global Offensive and other online games.
Virus Total IP Snoop:
https://www.virustotal.com/en/ip-address/74.91.118.239/information/
Malware site detected under IP domain control:
https://www.virustotal.com/en/url/fd47ea5e3874e48cfa729a6823e6cb9aaf6fb9b789ede2f7375de1a0e53adda5/analysis/1429832262/
Blackhole exploit kit 2.0 detected in the past.
Website with that malware/exploit has been suspended in the past however, just still probably blacklisted under Malwarebytes. You need to ask them to recheck and update their database.