1421fe76517f4f84980c005277ac35cc.setuping-onlinedrive.com

Client Connect Ltd.

Domain Information

The domain 1421fe76517f4f84980c005277ac35cc.setuping-onlinedrive.com registered by Client Connect Ltd. was initially registered in May of 2013 through GODADDY.COM, LLC. This domain has been known to host and distribute adware as well as other potentially unwanted software. The hosted servers are located in San Mateo, California within the United States which resides on the Conduit USA, Inc. network.
Registrar:
GODADDY.COM, LLC

Server location:
California, United States (US)

Create date:
Sunday, May 5, 2013

Expires date:
Sunday, January 1, 2017

Updated date:
Monday, May 4, 2015

ASN:
AS56473 CONDUIT-NL Conduit Connect B.V.

Google Safe Browsing:
unwanted

Scanner detections:
Detections  (100% detected)

Scan engine
Details
Detections

Reason Heuristics
PUP.ClientConnect.U, PUP.Bundler.Perion.Conduit, PUP.Conduit.Installer, PUP.Perion.Bundler.Conduit (M), PUP.Perion.Bundler (M)
100.00%

Dr.Web
Adware.Conduit.87
50.00%

VIPRE Antivirus
Threat.4786236, Conduit
50.00%

avast!
Adware-BRM [PUP], Win32:Adware-BRM [PUP]
50.00%

Kaspersky
not-a-virus:WebToolbar.Win32.Agent
50.00%

K7 AntiVirus
Trojan , Unwanted-Program
50.00%

NANO AntiVirus
Trojan.Win32.ClientConnect.deinfe
50.00%

AVG
Generic
50.00%

Qihoo 360 Security
Win32/Virus.WebToolbar.8f1, HEUR/QVM30.1.Malware.Gen, HEUR/QVM42.0.Malware.Gen
50.00%

Malwarebytes
PUP.Optional.ClientConnect
48.00%

Trend Micro House Call
Suspici.D2131122, Suspici.8C7FCC2E, Suspicious_GEN.F47V1210, Suspici.05DBE0FE, Suspici.D88B743E, Suspicious_GEN.F47V0118
38.00%

ESET NOD32
Win32/ClientConnect (variant), Win32/ClientConnect.A potentially unwanted (variant)
38.00%

Zillya! Antivirus
Adware.Agent.Win32.31586, Adware.Agent.Win32.38459, Adware.Agent.Win32.38040, Adware.Agent.Win32.43243
24.00%

Fortinet FortiGate
Riskware/Agent, Riskware/ClientConnect
24.00%

McAfee
Artemis!1AEF45991245, Artemis!B03F25AC814C, Artemis!3758D978BF6E, Artemis!51522CC6D8C7, Artemis!E5334D02A4A8, Artemis!E00935E7D5C5, Artemis!DADD95B9D577, Artemis!8D55E9AB1328
22.00%

The domain 1421fe76517f4f84980c005277ac35cc.setuping-onlinedrive.com has been seen to resolve to the following IP address.

January 14, 2015

File downloads found at URLs served by 1421fe76517f4f84980c005277ac35cc.setuping-onlinedrive.com.

 
Latest 30 of 50 download URLs

URL:
http://1421fe76517f4f84980c005277ac35cc.setuping-onlinedrive.com/

Web server:
Microsoft-IIS/7.5 (ASP.NET)