The domain secure.letigerfastcdn.com is registered by proxy through GODADDY.COM, LLC and was originally registered in December of 2013. This domain has been known to host and distribute adware as well as other potentially unwanted software. The hosted servers are located in San Jose, California within the United States which resides on the CDNetworks Inc. network.
Registrant:
Domains By Proxy, LLC
Registrar:
GODADDY.COM, LLC
Server location:
California, United States (US)
Create date:
Wednesday, December 4, 2013
Expires date:
Thursday, December 4, 2014
Updated date:
Wednesday, December 4, 2013
ASN:
AS36408 CDNETWORKSUS-02 - CDNetworks Inc.,US
Scanner detections:
Detections (97% detected)
Scan engine
Details
Detections
Rising Antivirus
PE:Trojan.Win32.Generic.13FF7F71!335511409, NS:PUF.SilenceInstaller!1.9DDF, PE:Trojan.Win32.Generic.16F9B8E1!385464545
76.92%
McAfee
Artemis!C6CB73697362, OneInstaller, Artemis!D941EF050346, Artemis!07363E8279EC, RDN/Generic PUP.x!chk, RDN/Generic PUP.z!ec, Artemis!787D8A30B176, Artemis!9A3C28A2966B, Artemis!C37003A04EA8, Artemis!96078ABFD661, Artemis!A7153AED0050, Adware-Monetizer, Artemis!BD30980654C7, RDN/Downloader.a!ry, Artemis!A08A49C4ACBD
74.36%
Dr.Web
Adware.Downware.1243, Trojan.MulDrop4.22250, Program.Unwanted.40, Adware.Downware.918, Threat.Undefined, Adware.Downware.4473
66.67%
ESET NOD32
Win32/InstallMonetizer.AG, MSIL/AdvancedSystemProtector (variant), Win32/InstallMonetizer.AZ, Win32/InstallMonetizer.BB
66.67%
Trend Micro House Call
Suspicious_GEN.F47V0610, Suspicious_GEN.F47V0625, TROJ_GEN.R047H06G314, TROJ_GEN.R047H06G214, TROJ_GEN.R0CBH06G414, TROJ_GEN.R047H06G914
66.67%
Malwarebytes
PUP.Optional.InstallMonetizer.NS, PUP.Optional.SilenceInstaller.A, PUP.Optional.Installcore
64.10%
avast!
NSIS:Downloader-ZK [PUP], Win32:Malware-gen, Win32:Adware-gen [Adw], InstMonetizer-BC [PUP], NSIS:Adware-OI [PUP], NSIS:InstMonetizer-BC [PUP]
53.85%
Baidu Antivirus
Trojan.MSIL.AdvancedSystemProtector, Adware.Win32.InstallMonetizer, Adware.Win32.InstallCore, PUA.Win32.VMDetector
51.28%
NANO AntiVirus
Trojan.Win32.MulDrop4.cfecrq, Trojan.Nsis.OneInstaller.dbpzbw, Riskware.Win32.MLW.ddylkr
46.15%
VIPRE Antivirus
InstallMonetizer, Trojan.Win32.Generic, Threat.4150696, Adware.Monetizer
46.15%
IKARUS anti.virus
AdWare.Win32.InstallMonetizer
43.59%
Reason Heuristics
PUP.Installer.BrowserDistributionServices.V, PUP.Installer.Applon.Y, PUP.Yawtix.G, PUP.StartInstall., PUP.StartInstall.Y, PUP.InstallManager.Meta (M), PUP.GameVicio.Installer.Meta (M)
41.03%
Sophos
Generic Bundleware, Generic PUA DP, Generic PUA PN, Generic PUA AM, Generic PUA FG, Generic PUA LM, AppMonetizer Installer
28.21%
AVG
MultiBundle.D, Generic, AdInstaller
23.08%
Avira AntiVirus
TR/Mitglieder.1440907, APPL/Downloader.Gen
15.38%
The domain secure.letigerfastcdn.com has been seen to resolve to the following 9 IP addresses.
File downloads found at URLs served by secure.letigerfastcdn.com.
The following 37 files have been seen to comunicate with secure.letigerfastcdn.com in live environments.
URL:
http://secure.letigerfastcdn.com/