This IP connected to Cryptolocker attacks - website with info-stealer?

See a generic Clean-MX detection for seekings dot ipower dot com
https://www.virustotal.com/en/url/b16119547a46f2937b4cfa56e437d0e23b0e528fe991bf25377d77a807c3b99a/analysis/1426433033/
Dropper IP is mentioned here: http://raistlin.soup.io/tag/cryptolocker
article author = Stefano Zanero
Quttera flags three suspicious files that are detected as reference to suspicious blacklisted domain
-server.iad.liveperson.net is a cookie that can abuse your privacy!
Server.iad.Liveperson prevents access from programs to websites of several companies related with security tools (antivirus programs, firewalls, etc.).

  1. Server.iad.Liveperson redirects attempts to access web pages of certain banks to spoofed pages, with the aim of logging information entered by the user in these pages.
  2. Server.iad.Liveperson redirects attempts to access several web pages to a specific IP address.
  3. Server.iad.Liveperson does not spread automatically using its own means. It needs an attacking user’s intervention in order to reach the affected computer. The means of transmission used include, among others, floppy disks, CD-ROMs, email messages with attached files, Internet downloads, FTP, IRC channels, peer-to-peer (P2P) file sharing networks, etc.

Sucuri does not flag.

pol