The domain dl.playfizz.com is registered by proxy through Moniker Online Services and was originally registered in March of 2012. This domain has been known to host and distribute adware as well as other potentially unwanted software. The hosted servers are located in Los Angeles, California within the United States which resides on the Peer 1 Dedicated Hosting network.
Moniker Online Services
California, United States (US)
Thursday, March 15, 2012
Tuesday, March 15, 2016
Friday, December 18, 2015
AS13768 PEER1 - Peer 1 Network (USA) Inc.,US
Detections (100% detected)
PUP.Installer.GPVEntertainment.S, PUP.Installer.GPVEntertainment.N, DownloadManager.Air Software, PUP.GPVEntertainment.Installer (M)
Win32/OpenCandy potentially unsafe application, Win32/Bundled.Toolbar.Ask.D potentially unsafe application, Win32/AirAdInstaller.A potentially unwanted application
Antiy Labs AVL
Trojan[Dropper]/Win32.Agent, Trojan[:HEUR]/Win32.AGeneric, GrayWare[AdWare:not-a-virus]/Win32.SearchProtect
Dropper.Agent.Win32.178117, Dropper.Agent.Win32.178423, Adware.AirAdInstaller.Win32.206
TR/Agent.1581424, ADWARE/Adware.Gen, TR/Agent.1581936, TR/Crypt.XPACK.Gen
Trend Micro House Call
Trojan-Dropper/W32.Agent.1581424, Trojan-Clicker/W32.AirAdInstaller.774056.C, Trojan-Dropper/W32.Agent.1313648
K7 Gateway Antivirus
a variant of 4214b172f4e1036be920cf7e7ca950dbee429b2e, a variant of 1e4e1ff1fda5a33adaa67f4dc6b324184206a30e
Qihoo 360 Security
The domain dl.playfizz.com has been seen to resolve to the following 2 IP addresses.
April 11, 2014
File downloads found at URLs served by dl.playfizz.com.
Latest 30 of 88 download URLs