The domain www.freehdsportsappdl.com registered by Whois Privacy Corp. was initially registered in May of 2014 through INTERNET.BS CORP.. This domain has been known to host and distribute adware as well as other potentially unwanted software. The hosted servers are located in San Francisco, California within the United States which resides on the Amazon Technologies Inc. network. The domain uses the Amazon Web Services (AWS) cloud computing platform from the US West (Northern California) region datacenter.
Registrant:
Whois Privacy Corp.
Registrar:
INTERNET.BS CORP.
Server location:
California, United States (US)
Create date:
Sunday, May 11, 2014
Expires date:
Monday, May 11, 2015
Updated date:
Sunday, May 11, 2014
Scanner detections:
Detections (100% detected)
Scan engine
Details
Detections
Reason Heuristics
PUP.KantidaChanudrum.P, PUP.HARASANPRAPAPON.P, PUP.RungnapaFongkerd.P, PUP.CoolMirage.I, PUP.CoolMirage.O, PUP.HARASANPRAPAPON.I, PUP.CoolMirage.Installer (M), PUP.KanchanaKhiandee.Installer (M), PUP.CoolMirage.VASSANAKONGSOONGNERN.Installer (M), PUP.OneClickDownloader.KantidaChanudrum.Installer (M), PUP.OneClickDownloader.RungnapaFongkerd.Installer (M), PUP.OneClickDownloader.InstallLab (M), PUP.CHUTCHAIKIEWNOY.Installer (M), PUP.OneClickDownloader.SarinratSubindee.Installer (M), PUP.Crossrider.HARASANPRAPAPON.Installer (M), PUP.Crossrider.HARASANP.Installer (M), PUP.OneClickDownloader.KantidaC.Installer (M), PUP.CoolMirage.VASSANAK.Installer (M), PUP.Brightcircle.BertaBri.Installer (M), PUP.OneClickDownloader.InstallL (M), PUP.Kanchana.Installer (M), PUP.OneClickDownloader.Sarinrat.Installer (M)
100.00%
Malwarebytes
PUP.Optional.OneClickDownloader.A
24.00%
Dr.Web
Adware.Yontoo.21, Adware.Downware.6586, Threat.Undefined, Adware.Downware.8319, Adware.Downware.5516
18.00%
Qihoo 360 Security
Win32/Virus.Adware.47b, HEUR/Malware.QVM06.Gen
16.00%
AVG
Generic, Rungnapa, Could be an adware MultiBundle
16.00%
VIPRE Antivirus
Trojan.Win32.Generic, BubbleDock, Threat.4783938
14.00%
G Data
NSIS.Adware.OneClickDownloader, Gen:Application.Bundler.DefaultTab
14.00%
Trend Micro House Call
Suspicious_GEN.F47V0615, Suspicious_GEN.F47V0621, TROJ_GEN.F47V0607, Suspicious_GEN.F47V0806, Suspicious_GEN.F47V0626, Suspicious_GEN.F47V0807
12.00%
Sophos
Install Core, FT Downloader
10.00%
NANO AntiVirus
Riskware.Nsis.Downware.czyjkl, Trojan.Nsis.Yotoon.deckrr
10.00%
Avira AntiVirus
APPL/CoolMirage.Gen
10.00%
IKARUS anti.virus
PUA.AppBundler, AdWare.OneClickDownloader
8.00%
Panda Antivirus
PUP/MultiToolbar.A
8.00%
McAfee
Artemis!9CF3C97FE127, Artemis!50618C893CC4, Artemis!3FDD11ADCBCA
6.00%
Comodo Security
Application.Win32.CoolMirage.AS
6.00%
The domain www.freehdsportsappdl.com has been seen to resolve to the following 2 IP addresses.
ec2-54-241-246-64.us-west-1.compute.amazonaws.com
May 29, 2014
ec2-54-241-29-126.us-west-1.compute.amazonaws.com
May 29, 2014
File downloads found at URLs served by www.freehdsportsappdl.com.
URL:
http://www.freehdsportsappdl.com/
Network:
Amazon Web Services (AWS), running an EC2 instance
SSL certificate subject:
CN=www.freehdsportsappdl.com, OU=PositiveSSL, OU=Domain Control Validated
SSL certificate issuer:
CN=COMODO RSA Domain Validation Secure Server CA, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB
Web server:
Apache/2.2.20 (Ubuntu) (PHP/5.3.6-13ubuntu3.9)