download.getlinksinaseconds.com

Premium Registration Service  (Proxy Registrant)

Domain Information

The domain download.getlinksinaseconds.com is registered by proxy through IP MIRROR PTE LTD. DBA IP MIRROR and was originally registered in January of 2014. This domain has been known to host and distribute adware as well as other potentially unwanted software. The hosted servers are located in New York City, New York within the United States which resides on the CloudFlare, Inc. network. The domain uses the CloudFlare CDN, a distributed domain name server service which utilizes a number of reverse proxy IP Addresses (see below).
Registrar:
IP MIRROR PTE LTD. DBA IP MIRROR

Server location:
New York, United States (US)

Create date:
Saturday, January 18, 2014

Expires date:
Wednesday, January 18, 2017

Updated date:
Wednesday, January 6, 2016

ASN:
AS13335 CLOUDFLARENET - CloudFlare, Inc.

Scanner detections:
Detections  (100% detected)

Scan engine
Details
Detections

Reason Heuristics
PUP.Installer.ShetefSolutionsConsulting1998.r, PUP.Installer.Amonetizeltd.?, PUP.Installer.Amonetizeltd.V, PUP.Installer.Amonetizeltd.j, PUP.Installer.ShetefSolutionsConsulting1998.q, Threat.Win.Reputation.IMP, (M), PUP.Amonetize.Bundler, Adware.Amonetize.Installer.Meta (M), Adware.Amonetize.Meta (M)
90.48%

Avira AntiVirus
ADWARE/Adware.Gen2, W32/Ramnit.C
80.95%

AhnLab V3 Security
PUP/Win32.Amonetiz, Win32/Ramnit.J
76.19%

Malwarebytes
PUP.Optional.InstallMonetizer, PUP.Optional.Amonetize, PUP.Optional.Amonetize.A, Virus.Ramnit
73.81%

McAfee
Artemis!4C74A1B1E4C3, Adware-Amonetize!75E6A6BEB316, Adware-Amonetize!D10282E7955B, Artemis!840C22594669, Adware-Amonetize!67C4C188D54D, Artemis!ED772E252D7D, Artemis!08D64DBFFD39, Artemis!B0A532E757C6, Artemis!099A6DA8018F, Artemis!3A889694EB1D, Artemis!DBB0C1568950, RDN/Generic PUP.x!bxh, Artemis!3E6E4C7DDD35, Artemis!19A4AAB76876, Artemis!D398895D0274, PUP-FBM!B33B775D7BCE, PUP-FBM!9402B657FEA1, PUP-FBM!28A121E0E10D, Artemis!72441581105A, Adware-Amonetize!AA2FDD8D837D
71.43%

Trend Micro House Call
TROJ_GEN.F47V0123, TROJ_GEN.F47V0128, TROJ_GEN.F47V0130, TROJ_GEN.F47V0121, TROJ_GEN.F47V0205, TROJ_GEN.F47V0218, TROJ_GEN.F47V0220
69.05%

ESET NOD32
Win32/Amonetize.AD (variant), Win32/Amonetize.AG (variant), Win32/Amonetize.AI (variant), Win32/Amonetize.AJ (variant), Win32/Amonetize.AO (variant)
69.05%

avast!
Win32:Amonetize-E [PUP], Win32:Amonetize-F [PUP], Win32:Adware-BJY [PUP], Win32:Amonetize-N [PUP], Win32:Amonetize-Y [PUP]
64.29%

VIPRE Antivirus
Amonetize, Trojan.Win32.Generic, Trojan-Downloader.Win32.Agent, Virus.Win32.Ramnit.b
64.29%

Sophos
Amonetize, W32/Ramnit-A
61.90%

Dr.Web
Adware.Downware.1575, Adware.Downware.1833, Adware.Downware.2083, Adware.Downware.1655, Adware.Downware.2467, Adware.Downware.3925
59.52%

Fortinet FortiGate
Riskware/Amonetize, W32/Ramnit.C, Adware/Amonetize
47.62%

Kaspersky
not-a-virus:HEUR:AdWare.Win32.Amonetize, not-a-virus:Downloader.Win32.Agent, Virus.Win32.Nimnul, not-a-virus:AdWare.Win32.Amonetize
42.86%

AVG
Generic_r, MalSign.Generic, MalSign.Wilmo, Win32/Zbot.G, BundleApp_r.R
35.71%

Baidu Antivirus
Adware.Win32.Amonetize, Virus.Win32.Nimnul.$a
35.71%

The domain download.getlinksinaseconds.com has been seen to resolve to the following 8 IP addresses.

July 31, 2014

July 31, 2014

cf-199-27-135-104.cloudflare.com
June 20, 2014

cf-199-27-134-104.cloudflare.com
June 20, 2014

cf-199-27-134-211.cloudflare.com
March 13, 2014

cf-199-27-135-211.cloudflare.com
March 13, 2014

January 24, 2014

January 24, 2014

File downloads found at URLs served by download.getlinksinaseconds.com.

19 / 68    (Adware)

5 / 68      (Adware)

24 / 68    (PUP)

1 / 68      (Malware)
http://download.getlinksinaseconds.com/.../get.php?q=Home Alone 4&ti1=1625000&ti2=0&ti3=2014-05-01T16:41:27.430755 00:00  (barbie the pearl princess 2014 brrip x264 ac3 titan.mkv__3515_i620125474_il10991689.exe)

9 / 68      (PUP)

5 / 68      (PUP)

15 / 68    (PUP)

14 / 68    (Adware)

 
Latest 30 of 180 download URLs

URL:
http://download.getlinksinaseconds.com/

SSL certificate subject:
CN=sni65186.cloudflaressl.com, OU=PositiveSSL Multi-Domain, OU=Domain Control Validated

SSL certificate issuer:
CN=COMODO ECC Domain Validation Secure Server CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Web server:
cloudflare-nginx