d27bgrkrsz14kh.cloudfront.net

Amazon.com, Inc

Domain Information

The domain d27bgrkrsz14kh.cloudfront.net registered by Amazon.com, Inc was initially registered in April of 2008 through MARKMONITOR INC.. This domain has been known to host and distribute adware as well as other potentially unwanted software. The hosted servers are located in Dulles, Virginia within the United States which resides on the Amazon Technologies Inc. network. The domain uses the Amazon Cloudfront CDN service which utilizes a number of proxy IP Addresses (see below).
Registrar:
MARKMONITOR INC.

Server location:
Virginia, United States (US)

Create date:
Friday, April 25, 2008

Expires date:
Tuesday, April 25, 2017

Updated date:
Tuesday, February 25, 2014

ASN:
AS16509 AMAZON-02 - Amazon.com, Inc.,US

Root domain:

Scanner detections:
Detections  (94% detected)

Scan engine
Details
Detections

G Data
NSIS.Application.Crypted, Trojan.Generic.12534850, Gen:Variant.Zusy.168059, Gen:Trojan.Heur.JP.bu0@a0MkbybO, Gen:Variant.Graftor.259726
80.00%

Qihoo 360 Security
HEUR/QVM42.0.Malware.Gen, HEUR/Malware.QVM20.Gen, Win32/Virus.Downloader.310, HEUR/QVM20.1.Malware.Gen, HEUR/QVM10.1.Malware.Gen
64.00%

Dr.Web
infected with Trojan.Crossrider.38087, Trojan.MulDrop6.17304, Win32.Sector.12, Trojan.MulDrop6.34765
62.00%

Baidu Antivirus
Adware.Win32.SpeedBit, Hacktool.Win32.Downloader
50.00%

avast!
Win32:Malware-gen, Dropper-gen [Drp], Crossrider-Z [PUP], NSIS:Crossrider-Z [PUP], Win32:Dropper-gen [Drp], Win32:Kukacka
50.00%

ESET NOD32
Win32/SpeedBit.D potentially unwanted application, Win32/Sality.NAU virus, Win32/TrojanDownloader.Adload.NQW trojan, Win32/Sality.NBA virus
36.00%

Reason Heuristics
PUP.Bundler.Meta, PUP.BundledOffer.Meta (L), Threat.Win.Reputation.IMP, Adware.Jaik.Installer, Adware.Downloader.Meta (M), PUP.Bundled (M), PUP.Bundler.Meta (M)
32.00%

ESET NOD32
Win32/SpeedBit (variant)
26.00%

Kaspersky
not-a-virus:Downloader.NSIS.Agent, Trojan-Dropper.Win32.Agent.bjpuvm, Virus.Win32.Sality
24.00%

Trend Micro House Call
Suspicious_GEN.F47V1106, Suspicious_GEN.F47V1028, Suspicious_GEN.F47V1109, Suspicious_GEN.F47V1107, Suspicious_GEN.F47V1201, Suspicious_GEN.F47V1205
22.00%

Panda Antivirus
Generic Suspicious, Trj/Genetic.gen
18.00%

McAfee
Artemis!917CF062DF1A, Trojan.Artemis!A6DCCAFE1842, Artemis!ECB922DBB1B1, Artemis!78BAA0D3E10A, Artemis!C5EC0DEB645F, Trojan.Artemis!9496C9D40492
14.00%

Emsisoft Anti-Malware
Trojan.Generic.12534850, Gen:Variant.Zusy.168059, Gen:Trojan.Heur.JP.bu0@a0MkbybO, Gen:Variant.Graftor.259726, Win32.Sality.OG
12.00%

AegisLab AV Signature
Win.Adware.Agent, AdWare.NSIS.Agent
10.00%

Avira AntiVirus
Adware/SpeedBit.1249147, Adware/SpeedBit.1248911, TR/Agent.1200640.6, W32/Ramnit.A
8.00%

The domain d27bgrkrsz14kh.cloudfront.net has been seen to resolve to the following 193 IP addresses.

server-54-230-193-200.iad53.r.cloudfront.net
August 27, 2016

server-54-230-193-160.iad53.r.cloudfront.net
August 27, 2016

server-54-230-193-125.iad53.r.cloudfront.net
August 27, 2016

server-54-230-193-118.iad53.r.cloudfront.net
August 27, 2016

server-54-230-193-26.iad53.r.cloudfront.net
August 27, 2016

server-54-230-193-252.iad53.r.cloudfront.net
August 27, 2016

server-54-230-193-251.iad53.r.cloudfront.net
August 27, 2016

server-54-230-193-209.iad53.r.cloudfront.net
August 27, 2016

server-52-85-131-195.iad53.r.cloudfront.net
July 19, 2016

server-52-85-131-193.iad53.r.cloudfront.net
July 19, 2016

server-52-85-131-150.iad53.r.cloudfront.net
July 19, 2016

server-52-85-131-25.iad53.r.cloudfront.net
July 19, 2016

server-52-85-131-252.iad53.r.cloudfront.net
July 19, 2016

server-52-85-131-238.iad53.r.cloudfront.net
July 19, 2016

server-52-84-125-48.iad16.r.cloudfront.net
July 1, 2016

server-52-84-125-46.iad16.r.cloudfront.net
July 1, 2016

server-52-84-125-198.iad16.r.cloudfront.net
July 1, 2016

server-52-84-125-193.iad16.r.cloudfront.net
July 1, 2016

server-52-84-125-142.iad16.r.cloudfront.net
July 1, 2016

server-52-84-125-121.iad16.r.cloudfront.net
July 1, 2016

server-52-84-125-120.iad16.r.cloudfront.net
July 1, 2016

server-52-85-131-32.iad53.r.cloudfront.net
June 28, 2016

server-52-85-131-159.iad53.r.cloudfront.net
June 28, 2016

server-52-85-131-142.iad53.r.cloudfront.net
June 28, 2016

server-52-85-131-107.iad53.r.cloudfront.net
June 28, 2016

server-52-85-131-91.iad53.r.cloudfront.net
June 28, 2016

server-52-85-131-79.iad53.r.cloudfront.net
June 28, 2016

server-52-85-131-245.iad53.r.cloudfront.net
June 7, 2016

server-52-85-131-118.iad53.r.cloudfront.net
June 7, 2016

server-52-85-131-87.iad53.r.cloudfront.net
June 7, 2016

 
Showing 30 of 193 IP Addresses

File downloads found at URLs served by d27bgrkrsz14kh.cloudfront.net.

5 / 68      (PUP)

2 / 68      (Malware)

1 / 68      (Malware)

1 / 68      (PUP)

The following 69 files have been seen to comunicate with d27bgrkrsz14kh.cloudfront.net in live environments.

 
Latest 20 of 212 files

URL:
http://d27bgrkrsz14kh.cloudfront.net/

Network:
Amazon Cloudfront

SSL certificate subject:
CN=*.cloudfront.net, O="Amazon.com, Inc.", L=Seattle, S=Washington, C=US

SSL certificate issuer:
CN=Symantec Class 3 Secure Server CA - G4, OU=Symantec Trust Network, O=Symantec Corporation, C=US

Web server:
Microsoft-IIS/7.5 (ASP.NET)