dl2.v39installer.com
REACTIVATION PERIOD
Domain Information
The domain dl2.v39installer.com registered by REACTIVATION PERIOD was initially registered in October of 2013 through ENOM, INC.. This domain has been known to host and distribute adware as well as other potentially unwanted software. The hosted servers are located in New York City, New York within the United States which resides on the Limelight Networks, Inc. network. The domain is part of a DNS service that utilizes a number of reverse proxy IP Addresses (see below).
Registrant:
REACTIVATION PERIOD
Server location:
New York, United States (US)
Create date:
Tuesday, October 8, 2013
Expires date:
Wednesday, October 8, 2014
Updated date:
Thursday, November 20, 2014
ASN:
AS22822 LLNW-AS Limelight Networks, INC. proxy AS object
Scanner detections:
Detections (100% detected)
Scan engine
Details
Detections
Reason Heuristics
PUP.Installer.InstallX.K, PUP.Installer.InstallX.L
100.00%
McAfee
Artemis!D4EB6FF32274, Artemis!079DC217D7B3, Artemis!6EC20B00A72F, Artemis!2B07D8E76375, Artemis!F93EE7C87FF5
100.00%
Malwarebytes
PUP.Optional.InstallIQ
100.00%
Trend Micro House Call
TROJ_GEN.F47V1219, TROJ_GEN.F47V1115, TROJ_GEN.F47V1206, TROJ_GEN.F47V1126
100.00%
NANO AntiVirus
Trojan.Win32.Searcher.cjaztx
100.00%
Comodo Security
Application.Win32.InstallIQ.B
100.00%
Dr.Web
Adware.Downware.1724, Adware.Searcher.2593
100.00%
VIPRE Antivirus
InstallIQ Installer
100.00%
ESET NOD32
Win32/InstallIQ (variant)
100.00%
IKARUS anti.virus
Win32.Malware, Virus.Win32.Heur
100.00%
AVG
MalSign.InstallX
100.00%
avast!
Win32:Malware-gen
80.00%
Rising Antivirus
PE:PUF.InstallIQ!1.9E4F
80.00%
Total Defense
Win32/Tnega.eKHcQJB
80.00%
Bkav FE
W32.Clod1ad.Trojan, W32.Clodbfd.Trojan
80.00%
The domain dl2.v39installer.com has been seen to resolve to the following 3 IP addresses.
File downloads found at URLs served by dl2.v39installer.com.
The following 96 files have been seen to comunicate with dl2.v39installer.com in live environments.