clkdeals.com

INTANGO

Domain Information

The domain clkdeals.com registered by INTANGO was initially registered in November of 2014 through ENOM, INC.. This domain has been known to host and distribute adware as well as other potentially unwanted software. The hosted servers are located in Dallas, Texas within the United States which resides on the SoftLayer Technologies Inc. network.
Registrar:
ENOM, INC.

Server location:
Texas, United States (US)

Create date:
Thursday, November 20, 2014

Expires date:
Sunday, November 20, 2016

Updated date:
Thursday, November 5, 2015

ASN:
AS36351 SOFTLAYER - SoftLayer Technologies Inc.,US

Scanner detections:
Detections  (100% detected)

Scan engine
Details
Detections

Reason Heuristics
PUP.Tightrope.Bundler, PUP.AstroDeliveryFriedCookie.e, PUP.FreeSoftware.e, PUP.CodeTechno.e, PUP.Installer.FreeSoftware, PUP.DownloadAdmin.Bundler, PUP.DownloadAdmin.CodeTechno.Installer (M), PUP.Tightrope.Sanflex.Bundler (M), PUP.Softpulse.PluginUpdate.Bundler (M), PUP.Outbrowse.ClickYes.Bundler (M), PUP.Outbrowse.StArtPLaying.Bundler (M), PUP.Softpulse.PluginUp.Bundler (M), PUP.DownloadAdmin.Bundler.Meta (M), PUP.Air Software.Installe.Installer (M), PUP.Outbrowse.StArtPLa.Bundler (M), Win16.Generic, PUP.Outbrowse (M), PUP.installCore (M)
100.00%

VIPRE Antivirus
DownloadAdmin, InstallCore, Trojan.Win32.Generic, Vittalia Installer
29.55%

AVG
Generic
29.55%

ESET NOD32
Win32/DownloadAdmin (variant), Win32/InstallCore.QW (variant), Win32/InstallCore.RZ (variant), Win32/InstallCore.SC (variant)
27.27%

Dr.Web
Adware.Downware.2220, Trojan.InstallCore.15, Trojan.DownLoad3.35287
25.00%

Malwarebytes
PUP.Optional.DownloadAdmin, PUP.Optional.BundleInstaller
22.73%

Avira AntiVirus
ADWARE/Adware.Gen, ADWARE/InstallCore.Gen9, PUA/InstallCore.Gen
22.73%

McAfee
Artemis!1A455B562FF2, Artemis!0BDCA05876D1, Artemis!B4C52E5A26CA, Artemis!8E7BD5598570, Artemis!CBB23CE25B92, Artemis!277182093948
20.45%

K7 AntiVirus
Unwanted-Program , Trojan
20.45%

NANO AntiVirus
Riskware.Win32.Downware.djahkt, Riskware.Win32.InstallCore.dnqbyw
20.45%

Trend Micro House Call
TROJ_GEN.F0C2H00KM14, Suspicious_GEN.F47V1126, Suspicious_GEN.F47V1204, Suspicious_GEN.F47V1201, Suspicious_GEN.F47V1128
18.18%

Clam AntiVirus
Win.Adware.Downloadadmin
18.18%

Agnitum Outpost
Riskware.Agent
18.18%

Sophos
Generic PUA ML, Generic PUA DB, Generic PUA KE, Generic PUA DD, Generic PUA NH, Generic PUA KI, Generic PUA HM, Generic PUA BK
18.18%

AhnLab V3 Security
PUP/Win32.Downware
18.18%

The domain clkdeals.com has been seen to resolve to the following IP address.

173.192.117.128-static.reverse.softlayer.com
May 3, 2015

File downloads found at URLs served by clkdeals.com.

1 / 68      (PUP)

 
Latest 30 of 77 download URLs

The following 10 files have been seen to comunicate with clkdeals.com in live environments.

URL:
http://clkdeals.com/

Title:
“Contact Us”

SSL certificate subject:
CN=www.clkdeals.com

SSL certificate issuer:
CN=RapidSSL SHA256 CA - G3, O=GeoTrust Inc., C=US

Web server:
nginx

Facebook:
Shares:  2

Statistics above are for the previous month of October 2024.