getyoutubedownloader.com

HOW Inc.

Domain Information

The domain getyoutubedownloader.com registered by HOW Inc. was initially registered in July of 2010 through REALTIME REGISTER BV. This domain has been known to host and distribute adware as well as other potentially unwanted software. The hosted servers are located in Nuremberg, Bayern within Germany which resides on the RIPE Network Coordination Centre network.
Remove Malware from getyoutubedownloader.com - Powered by Reason Core Security
Registrar:
REALTIME REGISTER BV

Server location:
Bayern, Germany (DE)

Create date:
Sunday, July 04, 2010

Expires date:
Monday, July 04, 2016

Updated date:
Saturday, July 04, 2015

ASN:
AS24940 HETZNER-AS Hetzner Online AG

Scanner detections:
Detections  (80% detected)

Scan engine
Details
Detections

ESET NOD32
Win32/InstallCore.CF (variant), Win32/OpenCandy, Win32/InstallCore.PC (variant), Win32/OpenCandy (variant), Win32/OpenCandy.A potentially unsafe (variant)
100.00%

VIPRE Antivirus
InstallCore, Trojan.Win32.Generic, DownloadAdmin, Opencandy
80.00%

Reason Heuristics
PUP.ISfreemium.a, PUP.SoftInstall.X, PUP.Tightrope, PUP.Installer.BonjoySoftware.X, Threat.Installer.BonjoySoftware, PUP.BonjoySoftware.Installer (M)
80.00%

Dr.Web
Adware.InstallCore.124, Trojan.Packed.25266, Adware.OpenCandy.72, Adware.OpenCandy.139, Adware.OpenCandy.161, Adware.OpenCandy.171
70.00%

Fortinet FortiGate
Riskware/InstallCore, W32/Virut.CE.gen, Riskware/OpenCandy
50.00%

Avira AntiVirus
ADWARE/InstallCore.Gen7, ADWARE/InstallCore.Gen9, ADWARE/Adware.Gen, W32/Virut.Gen
40.00%

K7 Gateway Antivirus
Unwanted-Program
40.00%

Trend Micro House Call
TROJ_GEN.F47V0523, Suspicious_GEN.F47V0108, Suspicious_GEN.F47V0305, TROJ_GEN.R0C1H07DH15
40.00%

AVG
Generic
40.00%

McAfee
Artemis!B9F049D7247C, Artemis!61CC5EB8581F, Artemis!E8C3BC80F1D0, Artemis!9AD99FED4AEB
40.00%

Bkav FE
W32.Clod930.Trojan, W32.HfsAdware
30.00%

Vba32 AntiVirus
Downware.InstallCore, Virus.Virut.06
30.00%

K7 AntiVirus
Unwanted-Program
30.00%

Sophos
Install Core Click run software, Generic PUA NB
30.00%

G Data
Win32.Application.DownloadAdmin, Win32.Virtob.Gen.12, Win32.Trojan.Agent.95WKEY
30.00%

The domain getyoutubedownloader.com has been seen to resolve to the following 7 IP addresses.

January 5, 2016

January 5, 2016

July 23, 2015

July 23, 2015

May 4, 2015

May 4, 2015

dc-63567025.softcdn.com
February 3, 2014

File downloads found at URLs served by getyoutubedownloader.com.

19 / 68    (Adware)

10 / 68    (Adware)

9 / 68      (Adware)

19 / 68    (Adware)

19 / 68    (Adware)

19 / 68    (Adware)
http://getyoutubedownloader.com/  (freeyoutubedownloaderoc.exe)

11 / 68    (Adware)

4 / 68      (Adware)
http://getyoutubedownloader.com/  (freeyoutubedownloaderoc.exe)

19 / 68    (Adware)

17 / 68    (Adware)
http://getyoutubedownloader.com/  (freeyoutubedownloaderic.exe)

11 / 68    (Adware)

4 / 68      (Adware)

1 / 68      (inconclusive)

1 / 68      (inconclusive)
http://getyoutubedownloader.com/  (2372820_setup.exe)

12 / 68    (Adware)
http://getyoutubedownloader.com/  (freeyoutubedownloaderinstalleric.exe)

12 / 68    (Adware)

2 / 68      (inconclusive)
http://getyoutubedownloader.com/  (554836_setup.exe)

2 / 68      (inconclusive)

URL:
http://getyoutubedownloader.com/

Google Analytics:
UA-19260618

Title:
“Downloading Free YouTube Downloader!”

SSL certificate subject:
CN=ssl276651.cloudflaressl.com, OU=PositiveSSL Multi-Domain, OU=Domain Control Validated

SSL certificate issuer:
CN=COMODO Domain Validation Secure Server CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Web server:
cloudflare-nginx (PHP/5.6.4)

Remove Malware from getyoutubedownloader.com - Powered by Reason Core Security