downloads.browsoftdl.com
REACTIVATION PERIOD
Domain Information
The domain downloads.browsoftdl.com registered by REACTIVATION PERIOD was initially registered in January of 2015 through ENOM, INC.. This domain has been known to host and distribute adware as well as other potentially unwanted software. The hosted servers are located in Sherman Oaks, California within the United States which resides on the Unitas Global LLC network.
Registrant:
REACTIVATION PERIOD
Server location:
California, United States (US)
Create date:
Tuesday, January 6, 2015
Expires date:
Wednesday, January 6, 2016
Updated date:
Thursday, February 18, 2016
ASN:
AS4436 AS-NLAYER - nLayer Communications, Inc.
Scanner detections:
Detections (100% detected)
Scan engine
Details
Detections
Zillya! Antivirus
Trojan.CoinMiner.Win32.389
100.00%
Reason Heuristics
PUP.Installer.DoubleOpt Media
100.00%
Trend Micro House Call
Suspicious_GEN.F47V1115
50.00%
Qihoo 360 Security
HEUR/QVM41.1.Malware.Gen
50.00%
The domain downloads.browsoftdl.com has been seen to resolve to the following IP address.
224-124-232-198.static.unitasglobal.net
March 7, 2015
File downloads found at URLs served by downloads.browsoftdl.com.
The following 25 files have been seen to comunicate with downloads.browsoftdl.com in live environments.
Related Domains