downloads.browsoftdl.com

REACTIVATION PERIOD

Domain Information

The domain downloads.browsoftdl.com registered by REACTIVATION PERIOD was initially registered in January of 2015 through ENOM, INC.. This domain has been known to host and distribute adware as well as other potentially unwanted software. The hosted servers are located in Sherman Oaks, California within the United States which resides on the Unitas Global LLC network.
Registrar:
ENOM, INC.

Server location:
California, United States (US)

Create date:
Tuesday, January 6, 2015

Expires date:
Wednesday, January 6, 2016

Updated date:
Thursday, February 18, 2016

ASN:
AS4436 AS-NLAYER - nLayer Communications, Inc.

Root domain:

Scanner detections:
Detections  (100% detected)

Scan engine
Details
Detections

Zillya! Antivirus
Trojan.CoinMiner.Win32.389
100.00%

Reason Heuristics
PUP.Installer.DoubleOpt Media
100.00%

Trend Micro House Call
Suspicious_GEN.F47V1115
50.00%

Qihoo 360 Security
HEUR/QVM41.1.Malware.Gen
50.00%

The domain downloads.browsoftdl.com has been seen to resolve to the following IP address.

224-124-232-198.static.unitasglobal.net
March 7, 2015

File downloads found at URLs served by downloads.browsoftdl.com.

2 / 68      (Adware)
http://downloads.browsoftdl.com/install_update.exe  (781ca8b43d6f33567135f4810d77c785)

4 / 68      (Adware)
http://downloads.browsoftdl.com/update_installer.exe  (697225399a3e1e4184711dd57782e880)

The following 25 files have been seen to comunicate with downloads.browsoftdl.com in live environments.

 
Latest 20 of 27 files