The domain dl.superpcdownload.net is registered by proxy through GODADDY.COM, LLC and was originally registered in March of 2014. This domain has been known to host and distribute adware as well as other potentially unwanted software. The hosted servers are located in Phoenix, Arizona within the United States which resides on the SingleHop, Inc. network.
Registrant:
Domains By Proxy, LLC
Registrar:
GODADDY.COM, LLC
Server location:
Arizona, United States (US)
Create date:
Friday, March 7, 2014
Expires date:
Tuesday, March 7, 2017
Updated date:
Tuesday, December 29, 2015
ASN:
AS32475 SINGLEHOP-INC - SingleHop,US
Google Safe Browsing:
unwanted
Scanner detections:
Detections (96% detected)
Scan engine
Details
Detections
Reason Heuristics
PUP.Installer.SuperPCToolsltd.T, PUP.Installer.SuperPCToolsLimited.T, PUP.SuperPCToolsLimited.O, PUP.PC Utilities.SuperPCTools, PUP.PC Utilities.SuperPCTools (M), PUP.PC Utilities.SuperPCTools.Installer (M), PUP.PC Utilities.SuperPCT (M), PUP.PC Utilities.SuperPCT.Installer (M)
100.00%
VIPRE Antivirus
Threat.4371328, Threat.4150696, Trojan.Win32.Generic
43.75%
Dr.Web
Trojan.NtRootKit.17808, Trojan.NtRootKit.17863, riskware program Program.Unwanted.134, Trojan.NtRootKit.17923, riskware program Program.Unwanted.274
43.75%
NANO AntiVirus
Trojan.Win32.TrojObfusc.czxwjn, Riskware.Win32.Agent.ddulcx, Riskware.Win32.OptimizerPro.dioyqs, Riskware.Win32.OptimizerPro.digrit
43.75%
Agnitum Outpost
Riskware.Agent, Riskware.OptimizerPro, Riskware.Unwanted, PUA.SpeedingUpMyPC
43.75%
G Data
Gen:Variant.Strictor.62009, Win32.Application.OptimizerPro, Gen:Variant.Adware.Mikey.11354, Adware.Agent.POI, Win32.Application.SuperPCTools
43.75%
Panda Antivirus
Trj/Genetic.gen, PUP/OptimizerPro
43.75%
AVG
OptimizerPro, Adware Generic5.CKWY, Win.Threat.High, Win32/DH{gRKBE4EOICIlABM1gQw}, Generic6, Optimizer.K, SuperPCTools
43.75%
avast!
Win32:Adware-gen [Adw], GenMaliciousA-III [PUP], Win32:OptimizerPro-F [PUP], Win32:GenMaliciousA-III [PUP], Win32:MultiPlug-ZL [PUP]
43.75%
McAfee
Artemis!861F50D379C0, Artemis!730985F79AB4, Artemis!74A2F97A1AD8, Artemis!B46F4F2E14C0, Artemis!7A4FAABA4E4E, Artemis!DB8F5267629E
41.67%
IKARUS anti.virus
not-a-virus:RiskTool.Agent, Win32.SuspectCrc, PUA.SpeedingUpMyPC
39.58%
Emsisoft Anti-Malware
Gen:Variant.Strictor.62009, Gen:Variant.Adware.Mikey.11354, Adware.Agent.POI
37.50%
MicroWorld eScan
Gen:Variant.Strictor.62009, Application.Generic.1026423, Gen:Variant.Adware.Mikey.11354, Adware.Agent.POI, Gen:Variant.Application.Graftor.169998
37.50%
Bitdefender
Gen:Variant.Strictor.62009, Application.Generic.1026423, Gen:Variant.Adware.Mikey.11354, Adware.Agent.POI, Gen:Variant.Application.Graftor.169998
37.50%
Trend Micro House Call
Suspicious_GEN.F47V0826, TROJ_GEN.R08NC0OA815, Suspicious_GEN.F47V0413, Suspicious_GEN.F47V0430, TROJ_GEN.R08NC0EEE15, Suspicious_GEN.F47V0216
33.33%
The domain dl.superpcdownload.net has been seen to resolve to the following 4 IP addresses.
st-sh-us-dc3-002.s.dss.vg
June 18, 2015
st-sh-us-dc1-002.s.dss.vg
June 18, 2015
st-sh-us-dc1-001.s.dss.vg
June 18, 2015
st-sh-us-dc3-001.s.dss.vg
June 18, 2015
File downloads found at URLs served by dl.superpcdownload.net.
The following 2 files have been seen to comunicate with dl.superpcdownload.net in live environments.
URL:
http://dl.superpcdownload.net/