44fc4fe91d3f48a09ba0a268bfbc9829.branch-pathdrivek.com
Client Connect Ltd.
Domain Information
The domain 44fc4fe91d3f48a09ba0a268bfbc9829.branch-pathdrivek.com registered by Client Connect Ltd. was initially registered in May of 2013 through GODADDY.COM, LLC. This domain has been known to host and distribute adware as well as other potentially unwanted software. The hosted servers are located in San Mateo, California within the United States which resides on the Conduit USA, Inc. network.
Registrant:
Client Connect Ltd.
Registrar:
GODADDY.COM, LLC
Server location:
California, United States (US)
Create date:
Sunday, May 5, 2013
Expires date:
Thursday, May 5, 2016
Updated date:
Wednesday, January 1, 2014
ASN:
AS56473 CONDUIT-NL Conduit Connect B.V.
Scanner detections:
Detections (100% detected)
Scan engine
Details
Detections
VIPRE Antivirus
Conduit
100.00%
Trend Micro House Call
TROJ_GEN.F47V0508, TROJ_GEN.F47V0427, Suspicious_GEN.F47V0723, Suspicious_GEN.F47V0707
100.00%
Dr.Web
Adware.Conduit.87
100.00%
ESET NOD32
Win32/Toolbar.Conduit.AE, Win32/ClientConnect (variant)
100.00%
Fortinet FortiGate
Riskware/Toolbar_Conduit, Riskware/ClientConnect
100.00%
Reason Heuristics
PUP.ClientConnect.W, PUP.ClientConnect.V
100.00%
McAfee
Artemis!8FC258BC26CE, Artemis!5D8A307FDBF1, Artemis!AEFFE4433DE7
75.00%
avast!
Win32:Adware-gen [Adw], Win32:Adware-BRM [PUP]
75.00%
Malwarebytes
PUP.Optional.Conduit
50.00%
IKARUS anti.virus
PUA.ClientConnect, PUA.Toolbar.Conduit
50.00%
Baidu Antivirus
PUA.Win32.ClientConnect, Adware.Win32.Conduit
50.00%
Rising Antivirus
PE:Trojan.Win32.Generic.171AAD6C!387624300
25.00%
The domain 44fc4fe91d3f48a09ba0a268bfbc9829.branch-pathdrivek.com has been seen to resolve to the following IP address.
File downloads found at URLs served by 44fc4fe91d3f48a09ba0a268bfbc9829.branch-pathdrivek.com.
URL:
http://44fc4fe91d3f48a09ba0a268bfbc9829.branch-pathdrivek.com/
Web server:
Microsoft-IIS/7.5 (ASP.NET)
Related Domains