This domain has been known to host and distribute adware as well as other potentially unwanted software. The hosted servers are located in Columbus, Ohio within the United States which resides on the Ecommerce Corporation network.
Registrar:
GoDaddy.com, LLC
Server location:
Ohio, United States (US)
ASN:
AS32392 OPENTRANSFER-ECOMMERCE - Ecommerce Corporation,US
Scanner detections:
Detections (96% detected)
Scan engine
Details
Detections
Reason Heuristics
PUP.KEYDOWNLOAD.Q, Unnamed.Threat.19, Unnamed.Threat.25, Unnamed.Threat.38, PUP.OptimizerPro.Task.M, PUP.Installer.EliDahan.J, PUP.Optional.Installer.BeijingAmazGameAgeInternetTechnologyCo.Y, (M), PUP.Amonetizeltd.G, PUP.Installer.GTCONSULTORIAEMINFORMATICAA.I, Adware.sProtector.S, Threat.Win.Reputation.IMP, PUP.BanyanTreeTechnology (M), PUP.Optional.BeijingAmazGameAgeInternetTechnologyCo.Installer, PUP.EZDownloader.Bundler (M)
88.64%
Bkav FE
W32.Clod256.Trojan, W32.Clod46e.Trojan, W32.Clod364.Trojan, W32.Clod005.Trojan, W32.Clod433.Trojan, W32.Clod89a.Trojan, W32.Cloddb2.Trojan, W32.Clodd3f.Trojan, W32.Clod54e.Trojan, W32.Clod33f.Trojan, W32.XalunuC.Trojan, W32.Clod19d.Trojan, W32.Clodcb6.Trojan, HW32.CDB, W32.Clod6fc.Trojan, HW32.Stranacty
59.09%
Trend Micro House Call
TROJ_GEN.R0CBH0AHR13, ADW_SPROTECT, TROJ_AGENTT.KOR, TROJ_DLOADR.MSA, ADW_EMOTICONS, TROJ_GEN.F47V0611, TROJ_SPNR.29L213, TROJ_GEN.F47V0114, TROJ_APPINIT.BMH, TROJ_GEN.F47V0106
59.09%
Malwarebytes
PUP.Optional.Otshot.A, PUP.Optional.SProtect.A, PUP.Optional.MultiPlug.A, PUP.Optional.EZDownloader.A, PUP.Optional.BetterSoft.A, PUP.Optional.Aartemis.A, PUP.Optional.Bundler, PUP.Optional.SkyTech.A
54.55%
McAfee
Artemis!38F61D046E57, Artemis!2041AF161372, RDN/Generic.grp!gg, RDN/Generic Downloader.x!ip, Artemis!1D283DD3AE23, Artemis!903C06F02D54, Artemis!63ABAE978757
54.55%
Dr.Web
Adware.Downware.1244, Adware.BGuard.11, Trojan.DownLoad3.29733, Trojan.DownLoad3.30962, Trojan.DownLoad3.30969, Adware.Downware.1460
52.27%
VIPRE Antivirus
Adware.KeyDownload, Sprotector, Trojan.Win32.Generic, Trojan.Win32.Generic!SB.0, Iminent, Trojan.StartPage, Adware.Agent
50.00%
Baidu Antivirus
Trojan.Win32.Agent, Trojan.Win32.Duckegg, Adware.Win32.BHO, Trojan.Win32.Downloader, Adware.Win32.ELEX, Trojan.Win32.ScrambleWrapper
47.73%
ESET NOD32
Win32/TrojanDownloader.Agent.AFD (variant), Win32/Duckegg, Win32/SProtector (variant), Win32/InstalleRex, Win32/ELEX (variant)
43.18%
avast!
NSIS:SProtector-A [PUP], Win32:Agent-ASGX [Trj], Win32:Adware-AYT [PUP], Win32:Malware-gen, Win32:Adware-BCH [Adw], Win32:Vitro
40.91%
Comodo Security
Application.Win32.SProtect.GT, Application.Win32.Bundledz.C, TrojWare.Win32.Agent.~huf, UnclassifiedMalware, Heur.Suspicious
40.91%
G Data
Adware.Agent.NRJ, Adware.Generic.545897, Gen:Variant.Symmi.14078, Gen:Variant.Adware.BHO.Bprotector, Win32.Application.InstalleRex
40.91%
AVG
Generic5, Downloader.Generic13, MultiDropper_c, Downloader.Agent2, SHeur4, Dropper.Generic_r, MalSign.Generic, Skodna.Downloader
40.91%
MicroWorld eScan
Adware.Agent.NRJ, Adware.Generic.545897, Gen:Variant.Symmi.14078, Gen:Variant.Adware.BHO.Bprotector.1, Trojan.Generic.KD.866500, Application.Downloader.SV
36.36%
Sophos
Generic PUA BD, BProtector, Mal/Generic-S, BProtect BHO Plugin, Troj/Bdoor-BFO, Generic PUA OA, Elex, W32/Scribble-B, Amonetize
36.36%
The domain i1.stylefun.info has been seen to resolve to the following IP address.
File downloads found at URLs served by i1.stylefun.info.
Latest 30 of 46 download URLs
URL:
http://i1.stylefun.info/
Web server:
ASP.NET (ASP.NET) (ASP.NET) (ASP.NET) (ASP.NET)
Related Domains