download.casinorewards.com

Escrow Services Overseas Limited

Domain Information

The domain download.casinorewards.com registered by Escrow Services Overseas Limited was initially registered in March of 2000 through INSTRA CORPORATION PTY, LTD.. This domain has been known to host and distribute adware as well as other potentially unwanted software. The hosted servers are located in Toronto, Ontario within Canada which resides on the Peer 1 Dedicated Hosting network.
Remove Malware from download.casinorewards.com - Powered by Reason Core Security
Registrar:
INSTRA CORPORATION PTY, LTD.

Server location:
Ontario, Canada (CA)

Create date:
Thursday, March 16, 2000

Expires date:
Wednesday, March 16, 2016

Updated date:
Thursday, February 27, 2014

ASN:
AS13768 PEER1 - Peer 1 Network (USA) Inc.

Root domain:

Scanner detections:
Detections  (100% detected)

Scan engine
Details
Detections

F-Prot
W32/Casino.P.gen
98.00%

Bkav FE
W32.HfsAdware
98.00%

McAfee Web Gateway
BehavesLike.Win32.Suspicious.dh, BehavesLike.Win32.Dropper.ch, Artemis, BehavesLike.Win32.Suspicious.ch, BehavesLike.Win32.Dropper.dc
98.00%

Avira AntiVirus
GAME/Casino.Gen
98.00%

Fortinet FortiGate
Riskware/Generic.AC.3447, Riskware/Generic.AC.501, W32/Generic.AC.377, W32/Generic.AC.501
98.00%

K7 Gateway Antivirus
Unwanted-Program
88.00%

K7 AntiVirus
Unwanted-Program
88.00%

AhnLab V3 Security
PUP/Win32.PrimeCasino, Win-AppCare/Casino.943440
88.00%

G Data
Win32.Application.Primecasino
86.00%

Reason Heuristics
Threat.Win.Reputation.IMP
82.00%

IKARUS anti.virus
PUA.PrimeCasino
82.00%

Trend Micro House Call
Suspicious_GEN.F47V1115, Suspicious_GEN.F47V0908, TROJ_GEN.F47V0105, TROJ_GEN.F47V0217, Suspicious_GEN.F47V0822, Suspicious_GEN.F47V0406
80.00%

McAfee
Artemis!7F1423235C10, Artemis!762433698143, Artemis!FC5CC5209AB2, Artemis!BE0B67CC10EB, Artemis!014C0F1D8D13, Artemis!D62E12AD1D38, Artemis!E370CE11D34F
72.00%

SUPERAntiSpyware
PUP.Casino, Adware.Casino
70.00%

Zillya! Antivirus
Adware.BrowseFox.Win32.117679, Trojan.Bladabindi.Win32.58785, Backdoor.Klon.Win32.2703, Backdoor.PePatch.Win32.90590
58.00%

The domain download.casinorewards.com has been seen to resolve to the following IP address.

February 19, 2014

File downloads found at URLs served by download.casinorewards.com.

 
Latest 30 of 324 download URLs

URL:
http://download.casinorewards.com/

SSL certificate subject:
CN=*.casinorewards.com, OU=Domain Control Validated - RapidSSL(R), OU=See www.rapidssl.com/resources/cps (c)13, OU=GT88977087

SSL certificate issuer:
CN=RapidSSL SHA256 CA - G3, O=GeoTrust Inc., C=US

Web server:
Microsoft-IIS/8.5

Remove Malware from download.casinorewards.com - Powered by Reason Core Security