www.freehdsportsappdl.com

Whois Privacy Corp.

Domain Information

The domain www.freehdsportsappdl.com registered by Whois Privacy Corp. was initially registered in May of 2014 through INTERNET.BS CORP.. This domain has been known to host and distribute adware as well as other potentially unwanted software. The hosted servers are located in San Francisco, California within the United States which resides on the Amazon Technologies Inc. network. The domain uses the Amazon Web Services (AWS) cloud computing platform from the US West (Northern California) region datacenter.
Remove Malware from www.freehdsportsappdl.com - Powered by Reason Core Security
Registrar:
INTERNET.BS CORP.

Server location:
California, United States (US)

Create date:
Sunday, May 11, 2014

Expires date:
Monday, May 11, 2015

Updated date:
Sunday, May 11, 2014

Scanner detections:
Detections  (95% detected)

Scan engine
Details
Detections

Reason Heuristics
PUP.HARASANPRAPAPON.P, PUP.CoolMirage.P, PUP.CoolMirage.V, PUP.CoolMirage.R, PUP.CoolMirage.O, PUP.KantidaChanudrum.R, PUP.SarinratSubindee.V, PUP.BertaBridEco.R, PUP.KantidaChanudrum.O, PUP.CHUTCHAIKIEWNOY.P, PUP.CHUTCHAIKIEWNOY.Installer (M), PUP.OneClickDownloader.KantidaChanudrum.Installer (M)
92.31%

Malwarebytes
PUP.Optional.OneClickDownloader.A
79.49%

Qihoo 360 Security
Win32/Virus.Adware.47b, Malware.QVM06.Gen, HEUR/Malware.QVM06.Gen, HEUR/QVM42.0.Malware.Gen
64.10%

Dr.Web
Adware.Yontoo.21, Adware.Downware.1263, Adware.Downware.5516, Adware.Downware.8319, Threat.Undefined, Trojan.Yontoo.30, Adware.Yontoo.11
58.97%

G Data
Gen:Application.Bundler.DefaultTab, NSIS.Adware.OneClickDownloader
53.85%

VIPRE Antivirus
Threat.4791953, BubbleDock, Trojan.Win32.Generic, Threat.4783938, CoolMirage Ltd, Adware.SweetIM
51.28%

NANO AntiVirus
Riskware.Nsis.Downware.czyjkl, Trojan.Nsis.Yotoon.deckrr
51.28%

Avira AntiVirus
APPL/CoolMirage.Gen, ADWARE/Adware.Gen, Adware/Yontoo.455896
46.15%

Kingsoft AntiVirus
Win32.Troj.Generic.a.(kcloud), Test.Win32.Heur.KVML200064.a.(kcloud)
41.03%

Sophos
CoolMirage, Install Core, FT Downloader, Generic PUA HN, PUA 'CoolMirage', PUA 'Install Core'
41.03%

AVG
Generic, Could be an adware MultiBundle
38.46%

Comodo Security
Application.Win32.CoolMirage.AS
33.33%

Panda Antivirus
PUP/MultiToolbar.A, Trj/CI.A
25.64%

avast!
Adware-gen [Adw], Oneclick-AK [PUP], Oneclick-AN [PUP], Win32:Adware-gen [Adw], NSIS:Oneclick-AK [PUP]
23.08%

Trend Micro House Call
Suspicious_GEN.F47V0612, Suspicious_GEN.F47V0613, TROJ_GEN.F47V0518, Suspicious_GEN.F47V0616, TROJ_GEN.F47V0603, Suspicious_GEN.F47V1121
23.08%

The domain www.freehdsportsappdl.com has been seen to resolve to the following 2 IP addresses.

ec2-54-241-246-64.us-west-1.compute.amazonaws.com
May 29, 2014

ec2-54-241-29-126.us-west-1.compute.amazonaws.com
May 29, 2014

File downloads found at URLs served by www.freehdsportsappdl.com.

1 / 68      (Adware)
https://www.freehdsportsappdl.com/.../vipbox_download.exe  (791521660e2f8531a8c86271c992da1b)

1 / 68      (Adware)

18 / 68    (Adware)

6 / 68      (PUP)
https://www.freehdsportsappdl.com/loaderall.php  (vipboxsportsapp_setup_ch.exe)

10 / 68    (Adware)
http://www.freehdsportsappdl.com/loader9.php  (premierleagueliveapp_setup.exe)

16 / 68    (Adware)
https://www.freehdsportsappdl.com/.../atdhd_download.exe  (f0d0394e6ba5670d8ea083f2d32d745d)

1 / 68      (Adware)

15 / 68    (Adware)
https://www.freehdsportsappdl.com/.../f2all_download.exe  (97d4eaed742cc29f8c96ce7518e06309)

URL:
http://www.freehdsportsappdl.com/

Title:
“Free HD Sport TV”

Network:
Amazon Web Services (AWS), running an EC2 instance

SSL certificate subject:
CN=www.freehdsportsappdl.com, OU=PositiveSSL, OU=Domain Control Validated

SSL certificate issuer:
CN=COMODO RSA Domain Validation Secure Server CA, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Web server:
Apache/2.2.20 (Ubuntu) (PHP/5.3.6-13ubuntu3.9)

Remove Malware from www.freehdsportsappdl.com - Powered by Reason Core Security