www.flash-playing.com

ironSource Technologies Ltd / Install Core

Domain Information

The domain www.flash-playing.com registered by ironSource Technologies Ltd / Install Core was initially registered in March of 2014 through PDR LTD. D/B/A PUBLICDOMAINREGISTRY.COM. This domain has been known to host and distribute adware as well as other potentially unwanted software. The hosted servers are located in Belfast, Northern Ireland within United Kingdom which resides on the RIPE Network Coordination Centre network.
Remove Malware from www.flash-playing.com - Powered by Reason Core Security
Registrar:
PDR LTD. D/B/A PUBLICDOMAINREGISTRY.COM

Server location:
Northern Ireland, United Kingdom (GB)

Create date:
Sunday, March 02, 2014

Expires date:
Wednesday, March 02, 2016

Updated date:
Tuesday, February 24, 2015

Root domain:

Scanner detections:
Detections  (100% detected)

Scan engine
Details
Detections

Reason Heuristics
PUP.SuperCoolApplications.Q, PUP.ironSource, PUP.installCore.SuperCoolApplications (M)
95.83%

VIPRE Antivirus
InstallCore.b, Trojan.Win32.Generic, Threat.4150696, Threat.4788237
95.83%

AVG
MalSign.Max Setup, InstallCore
91.67%

Malwarebytes
PUP.Optional.SuperCool, PUP.Optional.InstallCore, PUP.Optional.SuperCoolApps, PUP.Optional.Supercool, PUP.Optional.InstallCore.A
87.50%

Dr.Web
Trojan.MulDrop5.10078
87.50%

K7 AntiVirus
Unwanted-Program , Virus
79.17%

Sophos
Install Core Click run software, PUA 'Install Core Click run software'
79.17%

K7 Gateway Antivirus
Unwanted-Program
75.00%

Avira AntiVirus
ADWARE/InstallCore.Gen7, PUA/InstallCore.Gen7, ADWARE/InstallCore.Gen9, Adware/InstallCore.A.834, Adware/InstallCore.JO, BDS/Hupigon.Gen
70.83%

ESET NOD32
Win32/InstallCore.LU (variant), Win32/InstallCore.JO (variant), Win32/InstallCore.OG (variant), Win32/InstallCore.OY (variant)
54.17%

ESET NOD32
Win32/InstallCore.BY potentially unwanted application, Win32/InstallCore.OG potentially unwanted application, Win32/InstallCore.OY potentially unwanted application
41.67%

Antiy Labs AVL
Trojan/Win32.TSGeneric
37.50%

Agnitum Outpost
PUA.InstallCore
37.50%

Vba32 AntiVirus
Downware.InstallCore
37.50%

McAfee Web Gateway
CryptInno!D6EF872F7EE9, Artemis!80F5975BEA57, BehavesLike.Win32.CryptInno.bc
29.17%

The domain www.flash-playing.com has been seen to resolve to the following 10 IP addresses.

ec2-54-213-25-156.us-west-2.compute.amazonaws.com
February 11, 2016

ec2-54-69-189-98.us-west-2.compute.amazonaws.com
February 11, 2016

ec2-52-10-193-58.us-west-2.compute.amazonaws.com
February 11, 2016

unallocated.barefruit.co.uk
August 7, 2014

ec2-54-186-198-136.us-west-2.compute.amazonaws.com
June 20, 2014

ec2-54-186-46-235.us-west-2.compute.amazonaws.com
June 20, 2014

ec2-54-201-15-32.us-west-2.compute.amazonaws.com
June 20, 2014

ec2-54-213-175-151.us-west-2.compute.amazonaws.com
April 6, 2014

ec2-54-200-119-244.us-west-2.compute.amazonaws.com
April 6, 2014

ec2-54-213-231-162.us-west-2.compute.amazonaws.com
April 6, 2014

File downloads found at URLs served by www.flash-playing.com.

The following 137 files have been seen to comunicate with www.flash-playing.com in live environments.

 
Latest 20 of 137 files

URL:
http://www.flash-playing.com/

Web server:
nginx/1.4.3 (PHP/5.3.28)

Facebook:
Shares:  11

Statistics are for the previous month.

Remove Malware from www.flash-playing.com - Powered by Reason Core Security