v4downloadproo.biz

Fundacion Private Whois  (Proxy Registrant)

Domain Information

The domain v4downloadproo.biz is registered by proxy through INTERNET.BS CORP. and was originally registered in July of 2014. This domain has been known to host and distribute adware as well as other potentially unwanted software. The hosted servers are located in Phoenix, Arizona within the United States which resides on the CloudFlare, Inc. network. The domain uses the CloudFlare CDN, a distributed domain name server service which utilizes a number of reverse proxy IP Addresses (see below).
Registrar:
INTERNET.BS CORP.

Server location:
Arizona, United States (US)

Create date:
Tuesday, July 29, 2014

Expires date:
Tuesday, July 28, 2015

Updated date:
Tuesday, July 29, 2014

ASN:
AS13335 CLOUDFLARENET - CloudFlare, Inc.,US

Scanner detections:
Detections  (100% detected)

Scan engine
Details
Detections

Sophos
Generic PUA MK, Generic PUA FF, Generic PUA KK, Generic PUA ON, Generic PUA ED, Generic PUA GF, Generic PUA AK
100.00%

Avira AntiVirus
ADWARE/Adware.Gen2, Adware/Amonetize.cpo, Adware/Amonetize.tzw
100.00%

ESET NOD32
Win32/Amonetize.BK (variant), Win32/Amonetize.BM (variant), Win32/Amonetize.BN (variant)
100.00%

Kaspersky
not-a-virus:HEUR:AdWare.Win32.Amonetize, not-a-virus:AdWare.Win32.Amonetize, not-a-virus:HEUR:AdWare.Win32.Generic
87.50%

G Data
Win32.Application.Amonetize, Gen:Variant.Application.Bundler.Amonetize.11, Trojan.GenericKD.1819022, Gen:Variant.Application.Bundler.Amonetize.12
87.50%

Baidu Antivirus
Adware.Win32.Amonetize, Hacktool.Win32.Downloader
87.50%

McAfee
Artemis!561440428413, Artemis!0E6C88D44EA2, Artemis!046DD7E9C2E6, RDN/Generic PUP.x!cl3, Artemis!5E08F3CB6F71, Artemis!21F0E588CB01
87.50%

Panda Antivirus
Trj/Chgt.D, Trj/Chgt.B, Trj/Genetic.gen, Trj/Chgt.E, Trj/Chgt.F
87.50%

Reason Heuristics
Threat.Win.Reputation.IMP, PUP.Installer.Wilmaonline.f, PUP.Installer.Wilmaonline.c, PUP.Installer.Wilmaonline.k
75.00%

MicroWorld eScan
Gen:Variant.Application.Bundler.Amonetize.11, Trojan.GenericKD.1819022, Application.Bundler.Amonetize.T, Gen:Variant.Application.Bundler.Amonetize.12
75.00%

Trend Micro House Call
Suspicious_GEN.F47V0810, TROJ_GEN.R047H07HJ14, Suspicious_GEN.F47V0811, Suspicious_GEN.F47V0828, Suspicious_GEN.F47V0814
75.00%

Bitdefender
Gen:Variant.Application.Bundler.Amonetize.11, Trojan.GenericKD.1819022, Application.Bundler.Amonetize.T, Gen:Variant.Application.Bundler.Amonetize.12
75.00%

Lavasoft Ad-Aware
Gen:Variant.Application.Bundler.Amonetize.11, Trojan.GenericKD.1819022, Application.Bundler.Amonetize.T, Gen:Variant.Application.Bundler.Amonetize.12
75.00%

Fortinet FortiGate
Riskware/Amonetize, Adware/Amonetize
75.00%

Dr.Web
Adware.Downware.8012, Adware.Downware.8379
75.00%

The domain v4downloadproo.biz has been seen to resolve to the following 2 IP addresses.

August 13, 2014

August 13, 2014

File downloads found at URLs served by v4downloadproo.biz.

19 / 68    (Adware)
http://v4downloadproo.biz/download.php?id=xbox90&title=Free-Hack  (hackcheattoolinstaller__7934_il109256.exe)

25 / 68    (PUP)

21 / 68    (Adware)

15 / 68    (Adware)

8 / 68      (PUP)

URL:
http://v4downloadproo.biz/

SSL certificate subject:
CN=sni63857.cloudflaressl.com, OU=PositiveSSL Multi-Domain, OU=Domain Control Validated

SSL certificate issuer:
CN=COMODO ECC Domain Validation Secure Server CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Web server:
cloudflare-nginx