clk1005.com

INTANGO

Domain Information

The domain clk1005.com registered by INTANGO was initially registered in December of 2014 through ENOM, INC.. This domain has been known to host and distribute adware as well as other potentially unwanted software. The hosted servers are located in Dallas, Texas within the United States which resides on the SoftLayer Technologies Inc. network.
Registrar:
ENOM, INC.

Server location:
Texas, United States (US)

Create date:
Monday, December 8, 2014

Expires date:
Thursday, December 8, 2016

Updated date:
Thursday, November 26, 2015

ASN:
AS36351 SOFTLAYER - SoftLayer Technologies Inc.,US

Scanner detections:
Detections  (100% detected)

Scan engine
Details
Detections

Reason Heuristics
PUP.Installer.CodeTechno, PUP.Tightrope.Bundler, PUP.InstallCore.Installer.Installer (M), PUP.Outbrowse.MARiMara.Bundler (M), PUP.DownloadAdmin.CodeTech.Installer (M), PUP.InstallCore.FC.Installer (M), PUP.Outbrowse.TiKiTaKa.Bundler (M), PUP.Outbrowse.BESTAPP.Bundler (M), PUP.Outbrowse.BestApp.Bundler (M), PUP.Outbrowse.MAXTEK.Bundler (M), PUP.Outbrowse (M), PUP.ProfitServis (M), PUP.Air Software (M), PUP.DownloadAdmin (M), PUP.DownloadAdmin.Bundler (M)
100.00%

K7 AntiVirus
Unwanted-Program
16.00%

Clam AntiVirus
Win.Adware.Downloadadmin, Win.Adware.Installcore-651, Win.Trojan.Installcore-411
16.00%

NANO AntiVirus
Riskware.Win32.Downware.djahkt, Riskware.Win32.InstallCore.dnajwn, Riskware.Win32.InstallCore.dnazrt
16.00%

Comodo Security
Application.Win32.DownloadAdmin.ANGL, Application.Win32.FriedCookie.CIRK, Application.Win32.InstallCore.AKZ, Application.Win32.InstallCore.PK
16.00%

Dr.Web
Trojan.Vittalia.2, Trojan.Vittalia.14, Trojan.InstallCore.49, Trojan.InstallCore.15
16.00%

VIPRE Antivirus
Threat.4150696, Trojan.Win32.Generic
16.00%

Avira AntiVirus
ADWARE/Adware.Gen, PUA/InstallCore.II, ADWARE/InstallCore.Gen7, Adware/InstallCo.zlz
16.00%

G Data
Win32.Application.DownloadAdmin, Application.Bundler.KJ, Win32.Application.InstallCore.DI
16.00%

AVG
Generic
16.00%

McAfee
Artemis!F7A491205D20, Artemis!A6F8ECD1ACDB, Artemis!9BA457EE6E51, Artemis!AA44A3B04733, Trojan.Artemis!9254CE713DDB
14.00%

Sophos
DownloadAdmin, Install Core, PUA 'Install Core Click run software', PUA 'Install Core'
14.00%

Qihoo 360 Security
Win32/Virus.Downloader.d33, Win32/Virus.Adware.94c
14.00%

Malwarebytes
PUP.Optional.DownloadAdmin, PUP.Optional.InstallCore.C
12.00%

Agnitum Outpost
Riskware.Agent, PUA.InstallCore
12.00%

The domain clk1005.com has been seen to resolve to the following IP address.

173.192.117.80-static.reverse.softlayer.com
July 1, 2015

File downloads found at URLs served by clk1005.com.

1 / 68      (Adware)

27 / 68    (Adware)
http://clk1005.com/.../sa?cid=KINOXPOPS&pid=  (niet bevestigd 850864.crdownload)

1 / 68      (Adware)
http://clk1005.com/.../sa?cid=KINOXPOPS&pid=&q=Pretty Little Liars  (installer_adobe_flash_player_english.exe)

The following 90 files have been seen to comunicate with clk1005.com in live environments.

 
Latest 20 of 126 files

URL:
http://clk1005.com/

Title:
“Contact Us”

Web server:
nginx