files-download-59.com

Domains By Proxy, LLC  (Proxy Registrant)

Domain Information

The domain files-download-59.com is registered by proxy through GODADDY.COM, LLC and was originally registered in October of 2014. This domain has been known to host and distribute adware as well as other potentially unwanted software. The hosted servers are located in West McLean, Virginia within the United States which resides on the CloudFlare, Inc. network. The domain uses the CloudFlare CDN, a distributed domain name server service which utilizes a number of reverse proxy IP Addresses (see below).
Registrar:
GODADDY.COM, LLC

Server location:
Virginia, United States (US)

Create date:
Tuesday, October 14, 2014

Expires date:
Wednesday, October 14, 2015

Updated date:
Tuesday, October 14, 2014

ASN:
AS13335 CLOUDFLARENET - CloudFlare, Inc.,US

Scanner detections:
Detections  (91% detected)

Scan engine
Details
Detections

Reason Heuristics
Threat.New IT Limited.Maxiget, PUP.New IT Limited.Maxiget (M), Adware.Maxiget.CVital.Meta (M), PUP.New IT Limited.Maxiget.Bundler (M), PUP.New IT Limited (M), Adware.Maxiget (M)
90.91%

F-Secure
Application:W32/Generic.70053c248f!Online, Gen:Variant.Kazy.540149
18.18%

VIPRE Antivirus
Threat.4150696
18.18%

Dr.Web
Adware.Downware.10748, Adware.Downware.10005, Adware.Downware.1751, Adware.Downware.10005
18.18%

McAfee
Program.4shared
18.18%

avast!
Win32:PUP-gen [PUP]
18.18%

ESET NOD32
Win32/4Shared.AL potentially unwanted application, Win32/4Shared.AI potentially unwanted application
18.18%

Sophos
PUA 'Downloader'
18.18%

Zillya! Antivirus
Backdoor.CPEX.Win32.30446, Backdoor.CPEX.Win32.30311
18.18%

K7 AntiVirus
Trojan , Unwanted-Program
18.18%

NANO AntiVirus
Riskware.Win32.Downware.dpedyt, Trojan.Win32.4Shared.dmovte
18.18%

Agnitum Outpost
PUA.4Shared
18.18%

Comodo Security
Application.Win32.4shared.GSP
18.18%

G Data
Win32.Application.4shared, Gen:Variant.Kazy.522321
18.18%

Vba32 AntiVirus
suspected of Trojan.Downloader.gen.h
18.18%

The domain files-download-59.com has been seen to resolve to the following 2 IP addresses.

November 17, 2014

November 17, 2014

File downloads found at URLs served by files-download-59.com.

1 / 68      (PUP)

1 / 68      (Adware)

1 / 68      (Adware)

1 / 68      (PUP)

1 / 68      (PUP)

31 / 68    (Adware)

2 / 68      (false positives)

1 / 68      (Adware)

1 / 68      (Adware)

1 / 68      (Adware)

17 / 68    (Adware)

November 17, 2014

URL:
http://files-download-59.com/

Google Analytics:
UA-41200419

Title:
“GetPortal CDN Network”

SSL certificate subject:
CN=ssl4319.cloudflare.com, O="CloudFlare, Inc.", L=San Francisco, S=CA, C=US

SSL certificate issuer:
CN=GlobalSign Organization Validation CA - G2, O=GlobalSign nv-sa, C=BE

Web server:
cloudflare-nginx

30 of 31 related domains