The domain cdn.download2desktop.com registered by OutBrowse LTD was initially registered in July of 2013 through GODADDY.COM, LLC. This domain has been known to host and distribute adware as well as other potentially unwanted software. The hosted servers are located in Sherman Oaks, California within the United States which resides on the Unitas Global LLC network.
Registrar:
GODADDY.COM, LLC
Server location:
California, United States (US)
Create date:
Monday, July 15, 2013
Expires date:
Friday, July 15, 2016
Updated date:
Thursday, July 16, 2015
ASN:
AS4436 AS-GTT-4436 - nLayer Communications, Inc.,US
Google Safe Browsing:
unwanted
Scanner detections:
Detections (88% detected)
Scan engine
Details
Detections
Reason Heuristics
PUP.Installer.Linkury.J, PUP.Installer.SIENSA.M, PUP.OutBrowse.N, PUP.OutBrowse.J, PUP.Somoto.U, PUP.Linkury.J, PUP.Installer.SIENSA.H, PUP.Bundler.PCFaster.Meta, Adware.CMI.ClickMeInLimited.J, PUP.Installer.Applon.X, PUP.OutBrowse.L, PUP.InfoSpace.FastBrowser.Installer.Meta (M), PUP.Outbrowse.SearchProtect.Bundler (M), PUP.Bundler.PCFaster.Meta (M), PUP.Resoft.MYPOPSHO.Installer (M), PUP.Downloader.Installer (M), PUP.Search.Bundler.Meta (M), PUP.PCFaster.Optional.Installer.Meta (M), PUP.installCore (M)
78.72%
Malwarebytes
PUP.Optional.SmartBar.A, PUP.Optional.Iminent.A, PUP.Optional.Conduit.A, PUP.Optional.Babylon.A, PUP.Optional.Somoto.A, PUP.Optional.Linkury.A, PUP.Optional.InstallIQ, PUP.Optional.LuckyLeap.A, PUP.Optional.Aartemis.A, PUP.Optional.BubbleDock.A
51.06%
Dr.Web
Adware.Downware.1460, Adware.Downware.1336, Adware.Somoto.4, Adware.Downware.1560, Adware.Conduit.6, Adware.Shopper.363
48.94%
Trend Micro House Call
TROJ_GEN.F47V0916, TROJ_GEN.F47V0718, TROJ_GEN.R0CBH01H213, TROJ_GEN.F47V1122, TROJ_GEN.F47V0222, TROJ_GEN.F47V1221, TROJ_GEN.F47V1125, TROJ_GEN.R0CBOH0AG14
44.68%
VIPRE Antivirus
Adware.Linkury, Iminent, Conduit, Adware.SaveSense, Trojan.Win32.Generic, BubbleDock, OutBrowse, Adware.Adpeak
36.17%
ESET NOD32
Win32/Toolbar.Babylon, Win32/Toolbar.Linkury (variant), Win32/Speedchecker (variant), Win32/Toolbar.Conduit, Win32/DealPly (variant)
36.17%
McAfee
Artemis!3FEE41D17793, RDN/Generic.tfr!dn, Artemis!DE89D8867F1E, Artemis!2C787809BF20, Artemis!9A8A90D314EC, Artemis!1A6A786C6DAE, Artemis!AF5C23B62DF4, RDN/Generic PUP.x!brf
27.66%
AVG
MalSign.Generic, AdInject.Resoft.dropper, MalSign.Outobox, MalSign.OutBrowse, MalSign.Adpeak
17.02%
avast!
Win32:Somoto-J [PUP], Win32:SmartBar-A [PUP], Win32:Malware-gen, Win32:Eorezo-CB [PUP]
17.02%
G Data
Win32.Application.ConduitBrothersoftTB, Gen:Variant.Kazy.323103, Win32.Trojan.Agent.G6KMW5, Win32.Application.SearchProtect
17.02%
Baidu Antivirus
Adware.Win32.Conduit, Adware.Win32.DealPly, Trojan.Win32.Genome, Trojan.Win32.Hijacker, Trojan.Win32.Dropper, Trojan.Win32.Toolbar
17.02%
Boost by Reason
Adware.Installer.Linkury.J, Optional.SIENSA.M, Trojan.Adw.OutBrowse.N, Trojan.Adw.OutBrowse.J, Trojan.Adw.Somoto.U, PUP.Linkury.J
14.89%
Bkav FE
W32.Clod19d.Trojan, W32.Clod091.Trojan, W32.Clod31a.Trojan, W32.Clode05.Trojan, W32.Clod155.Trojan, W32.Clodad5.Trojan
14.89%
K7 AntiVirus
Trojan , Unwanted-Program , Riskware
14.89%
Panda Antivirus
Suspicious file, Adware/Conduit, Trj/CI.A, PUP/PlusHD
14.89%
The domain cdn.download2desktop.com has been seen to resolve to the following IP address.
192-124-232-198.static.unitasglobal.net
January 3, 2016
File downloads found at URLs served by cdn.download2desktop.com.
Latest 30 of 65 download URLs
The following 41 files have been seen to comunicate with cdn.download2desktop.com in live environments.
URL:
http://cdn.download2desktop.com/
Web server:
NetDNA-cache/2.2
Related Domains