The domain download.rebateblast.com is registered by proxy through GODADDY.COM, LLC and was originally registered in April of 2012. This domain has been known to host and distribute adware as well as other potentially unwanted software. The hosted servers are located in Fort Lauderdale, Florida within the United States which resides on the BroadbandONE, Inc. network.
Registrant:
Domains By Proxy, LLC
Registrar:
GODADDY.COM, LLC
Server location:
Florida, United States (US)
Create date:
Thursday, April 5, 2012
Expires date:
Wednesday, April 5, 2017
Updated date:
Thursday, January 28, 2016
ASN:
AS13645 BROADBANDONE - BroadbandONE, Inc.
Scanner detections:
Detections (100% detected)
Scan engine
Details
Detections
Reason Heuristics
PUP.Installer.Inbox.T, PUP.Optional.Installer.T, PUP.Installer.ValionGroup.T, Win32.Generic.Xacti.Installer.Meta, PUP.ValionGroup.Installer (M), PUP.Inbox.Installer (M), PUP.ValionGr.Installer (M)
100.00%
ESET NOD32
Win32/Toolbar.Inbox (variant), Win32/Toolbar.Inbox.I potentially unwanted (variant)
72.97%
Trend Micro House Call
TROJ_GEN.F47V1210, TROJ_GEN.F47V1016, TROJ_GEN.F47V1116, TROJ_GEN.F47V0220, TROJ_GEN.R0CBC0EHN14, TROJ_GEN.R0CBH07G914, TROJ_GEN.R047H07KN14
54.05%
Clam AntiVirus
Win.Adware.PCFixSpeed
54.05%
K7 AntiVirus
Trojan , Unwanted-Program , Adware
37.84%
Fortinet FortiGate
Riskware/Agent, Riskware/Inbox, Riskware/Generic
32.43%
Malwarebytes
PUP.Optional.RebateInformer.A
29.73%
Bkav FE
W32.Clod1d6.Trojan, W32.HfsAdware
29.73%
McAfee
Artemis!B7DCD239CB48, Artemis!BF7E2E08D5A0, Artemis!2CCF2B4DE920, Artemis!1C81A7B012C2, Artemis!84B669D9B1EF, Artemis!81A43384B8C3, Artemis!910BB049FD90
29.73%
Kaspersky
not-a-virus:WebToolbar.Win32.Agent, not-a-virus:HEUR:WebToolbar.Win32.Generic
29.73%
Sophos
Generic PUA OE, Generic PUA CB, Generic PUA PE, Generic PUA ME (PUA), Generic PUA IJ (PUA), Generic PUA GF (PUA), Generic PUA JB
29.73%
G Data
Win32.Trojan.Agent.8CP77D, Win32.Application.Agent.W2YRHY, Win32.Application.Agent.X3Z1GP, Win32.Application.Agent.XAUZJM
29.73%
Panda Antivirus
Trj/Chgt.B, Trj/Chgt.L, Generic Suspicious
29.73%
Baidu Antivirus
Adware.Win32.Toolbar, PUA.Win32.Inbox
29.73%
The domain download.rebateblast.com has been seen to resolve to the following IP address.
File downloads found at URLs served by download.rebateblast.com.
The following 33 files have been seen to comunicate with download.rebateblast.com in live environments.
URL:
http://download.rebateblast.com/
Google Analytics:
UA-10427277
Web server:
Microsoft-IIS/7.0 (ASP.NET) (Version: 2.0.50727)
Related Domains