www.freehdsportsappdl.com

Whois Privacy Corp.

Domain Information

The domain www.freehdsportsappdl.com registered by Whois Privacy Corp. was initially registered in May of 2014 through INTERNET.BS CORP.. This domain has been known to host and distribute adware as well as other potentially unwanted software. The hosted servers are located in San Francisco, California within the United States which resides on the Amazon Technologies Inc. network. The domain uses the Amazon Web Services (AWS) cloud computing platform from the US West (Northern California) region datacenter.
Registrar:
INTERNET.BS CORP.

Server location:
California, United States (US)

Create date:
Sunday, May 11, 2014

Expires date:
Monday, May 11, 2015

Updated date:
Sunday, May 11, 2014

Scanner detections:
Detections  (100% detected)

Scan engine
Details
Detections

Reason Heuristics
PUP.KantidaChanudrum.P, PUP.HARASANPRAPAPON.P, PUP.RungnapaFongkerd.P, PUP.CoolMirage.I, PUP.CoolMirage.O, PUP.HARASANPRAPAPON.I, PUP.CoolMirage.Installer (M), PUP.KanchanaKhiandee.Installer (M), PUP.CoolMirage.VASSANAKONGSOONGNERN.Installer (M), PUP.OneClickDownloader.KantidaChanudrum.Installer (M), PUP.OneClickDownloader.RungnapaFongkerd.Installer (M), PUP.OneClickDownloader.InstallLab (M), PUP.CHUTCHAIKIEWNOY.Installer (M), PUP.OneClickDownloader.SarinratSubindee.Installer (M), PUP.Crossrider.HARASANPRAPAPON.Installer (M), PUP.Crossrider.HARASANP.Installer (M), PUP.OneClickDownloader.KantidaC.Installer (M), PUP.CoolMirage.VASSANAK.Installer (M), PUP.Brightcircle.BertaBri.Installer (M), PUP.OneClickDownloader.InstallL (M), PUP.Kanchana.Installer (M), PUP.OneClickDownloader.Sarinrat.Installer (M)
100.00%

Malwarebytes
PUP.Optional.OneClickDownloader.A
24.00%

Dr.Web
Adware.Yontoo.21, Adware.Downware.6586, Threat.Undefined, Adware.Downware.8319, Adware.Downware.5516
18.00%

Qihoo 360 Security
Win32/Virus.Adware.47b, HEUR/Malware.QVM06.Gen
16.00%

AVG
Generic, Rungnapa, Could be an adware MultiBundle
16.00%

VIPRE Antivirus
Trojan.Win32.Generic, BubbleDock, Threat.4783938
14.00%

G Data
NSIS.Adware.OneClickDownloader, Gen:Application.Bundler.DefaultTab
14.00%

Trend Micro House Call
Suspicious_GEN.F47V0615, Suspicious_GEN.F47V0621, TROJ_GEN.F47V0607, Suspicious_GEN.F47V0806, Suspicious_GEN.F47V0626, Suspicious_GEN.F47V0807
12.00%

Sophos
Install Core, FT Downloader
10.00%

NANO AntiVirus
Riskware.Nsis.Downware.czyjkl, Trojan.Nsis.Yotoon.deckrr
10.00%

Avira AntiVirus
APPL/CoolMirage.Gen
10.00%

IKARUS anti.virus
PUA.AppBundler, AdWare.OneClickDownloader
8.00%

Panda Antivirus
PUP/MultiToolbar.A
8.00%

McAfee
Artemis!9CF3C97FE127, Artemis!50618C893CC4, Artemis!3FDD11ADCBCA
6.00%

Comodo Security
Application.Win32.CoolMirage.AS
6.00%

The domain www.freehdsportsappdl.com has been seen to resolve to the following 2 IP addresses.

ec2-54-241-246-64.us-west-1.compute.amazonaws.com
May 29, 2014

ec2-54-241-29-126.us-west-1.compute.amazonaws.com
May 29, 2014

File downloads found at URLs served by www.freehdsportsappdl.com.

1 / 68      (Adware)
https://www.freehdsportsappdl.com/.../vipbox_download.exe  (d8883e3a8bb44855b380d95eb1d8812e)

1 / 68      (Adware)
https://www.freehdsportsappdl.com/.../atdhd_download.exe  (ae20ca2734dd72a053df52c124c76f4c)

1 / 68      (Adware)

1 / 68      (Adware)
https://www.freehdsportsappdl.com/.../f2all_download.exe  (3c0580f1d73e402ee5c44b02f3a85da8)

1 / 68      (Adware)

1 / 68      (Adware)

URL:
http://www.freehdsportsappdl.com/

Title:
“Free HD Sport TV”

Network:
Amazon Web Services (AWS), running an EC2 instance

SSL certificate subject:
CN=www.freehdsportsappdl.com, OU=PositiveSSL, OU=Domain Control Validated

SSL certificate issuer:
CN=COMODO RSA Domain Validation Secure Server CA, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Web server:
Apache/2.2.20 (Ubuntu) (PHP/5.3.6-13ubuntu3.9)