The domain download.expresdownload.com is registered by proxy through GODADDY.COM, LLC and was originally registered in October of 2013. This domain has been known to host and distribute adware as well as other potentially unwanted software. The hosted servers are located in Tel Aviv, Tel Aviv within Israel which resides on the RIPE Network Coordination Centre network.
Tel Aviv, Israel (IL)
Wednesday, October 09, 2013
Monday, October 09, 2017
Wednesday, September 09, 2015
AS6461 MFNX MFN - Metromedia Fiber Network
Detections (100% detected)
PUP.Optional.Installer.BandooMedia.V, PUP.Optional.Installer.V, PUP.Optional.Installer.W, PUP.Optional.Installer.EE, PUP.Bandoo.BandooMedia.Installer (M), Win32.Generic, PUP.ILivid.WebBar (M), PUP.Bandoo (M)
iLivid, Threat.5059975, Trojan.Win32.Generic
McAfee Web Gateway
Artemis!9556A78BB7AC, Artemis!C242B5A5B592, Artemis!B6A829DFA975, Artemis!875998794E2E, Artemis!Trojan, BehavesLike.Win32.Downloader.tc
Artemis!9556A78BB7AC, Artemis!C242B5A5B592, Artemis!B6A829DFA975, Artemis!875998794E2E, Artemis!430BA1894F53, Artemis!F461DB6FE8FE, Artemis!D0475DE2AB77, Artemis!7EFD1599C665, Artemis!7953344719D5, Artemis!919DBB95C7A3
Adware.Bandoo.13, Adware.Bandoo.19, Adware.Bandoo.168
Riskware/ILivid, Riskware/Win64_SearchSuite, Riskware/SearchSuite
PUA.Bandoo, PUA.SearchSuite, PUA.iLivid
Trend Micro House Call
TROJ_GEN.F47V0219, Suspicious_GEN.F47V0617, Suspicious_GEN.F47V0717, Suspicious_GEN.F47V0723, Suspicious_GEN.F47V0731, Suspicious_GEN.F47V1028
The domain download.expresdownload.com has been seen to resolve to the following IP address.
May 23, 2014
File downloads found at URLs served by download.expresdownload.com.
The following 9 files have been seen to comunicate with download.expresdownload.com in live environments.
“Torch Web Browser - Your All in One Internet Browser”
“Get more from the web with Torch Browser. Learn more about this unique browser here.”