ad.adorika.com

Domains By Proxy, LLC  (Proxy Registrant)

Domain Information

The domain ad.adorika.com is registered by proxy through GODADDY.COM, LLC and was originally registered in September of 2010. This domain has been known to host and distribute adware as well as other potentially unwanted software. The hosted servers are located in Omaha, Nebraska within the United States which resides on the Yahoo! Inc. network.
Remove Malware from ad.adorika.com - Powered by Reason Core Security
Registrar:
GODADDY.COM, LLC

Server location:
Nebraska, United States (US)

Create date:
Wednesday, September 01, 2010

Expires date:
Wednesday, September 01, 2021

Updated date:
Sunday, July 15, 2012

ASN:
AS36646 YAHOO-NE1 - Yahoo,US

Root domain:

Scanner detections:
Detections  (100% detected)

Scan engine
Details
Detections

Reason Heuristics
PUP.Awimba.W, PUP.Optional.VisualSoftwareSystems.N, DownloadManager.AirSoftware.F, PUP.TUGUUSL.X, PUP.Installer.OptimumInstaller.AA, PUP.Tightrope.DownloadAdmin.Bundler (M), PUP.Adknowledge.OptimumInstaller.Installer (M)
100.00%

Dr.Web
Adware.W3i.29, Adware.Downware.1167, Adware.Downware.1078, Adware.Downware.1326, Adware.Downware.1108
75.00%

Avira AntiVirus
APPL/DomaIQ.Gen, Adware/AirInst.2556, ADWARE/Adware.Gen7, Adware/Agent.909545, APPL/Solimba.Gen
75.00%

avast!
Win32:DomaIQ-I [PUP], Win32:DomaIQ-M [PUP], PUP-gen [PUP], Win32:DomaIQ-AI [PUP], NSIS:DomaIQ-C [PUP], Win32:Installer-J [PUP]
66.67%

Sophos
DomainIQ pay-per install, AirInstaller, PUA 'iBryte Optimum Installer'
66.67%

VIPRE Antivirus
DomaIQ, Threat.4782985, AirInstaller, Optimum Installer
66.67%

IKARUS anti.virus
Trojan-Dropper, Trojan-Ransom.Win32.Blocker, PUA.AirAdInstaller, Win32.Malware, Trojan.SuspectCRC, AdWare.DomaIQ, Win32.SuspectCrc
66.67%

K7 AntiVirus
Adware, Trojan , Unwanted-Program , Adware
58.33%

NANO AntiVirus
Riskware.Win32.DomaIQ.crbbqh, Riskware.Win32.Downware.cwfgel, Riskware.Win32.AirAdInstaller.cxhlas, Riskware.Base64.DomaIQ.cwpnap
58.33%

Comodo Security
UnclassifiedMalware, Application.Win32.AirAdInstaller.A, ApplicUnwnt, ApplicUnwnt.Win32.AdWare.iBryte.H
58.33%

Vba32 AntiVirus
AdWare.MSIL.DomaIQ, AdWare.AirAdInstaller, TScope.Trojan.MSIL, SScope.Adware.OptimusInstaller.26607, Trojan.StartPage
58.33%

Rising Antivirus
PE:Trojan.Win32.Generic.1498DBAD!345562029, PE:PUF.Airinstall!1.9C4C, PE:Trojan.Win32.Generic.1582BDDE!360889822, PE:Trojan.Win32.Rouge.d!1075354374
58.33%

F-Prot
W32/DomaIQ.B, W32/AirInstall.A.gen, W32/DomaIQ.A, W32/Ibryte.C.gen
50.00%

Fortinet FortiGate
W32/DomaIQ.C, W32/Crypt.AALD!tr, Riskware/IBryte, W32/DownWare.I
50.00%

Malwarebytes
Adware.DomaIQ, PUP.FakeFlash.Domaiq, PUP.Optional.Ibryte, MSIL.Solimba
50.00%

The domain ad.adorika.com has been seen to resolve to the following 6 IP addresses.

mpr2.ngd.vip.ne1.yahoo.com
February 13, 2016

mpr1.ngd.vip.ne1.yahoo.com
February 13, 2016

mpr2.ngd.vip.ne1.yahoo.com
September 5, 2014

mpr1.ngd.vip.ne1.yahoo.com
September 5, 2014

mpr2.ngd.vip.bf1.yahoo.com
April 11, 2014

mpr1.ngd.vip.bf1.yahoo.com
April 11, 2014

File downloads found at URLs served by ad.adorika.com.

The following 66 files have been seen to comunicate with ad.adorika.com in live environments.

 
Latest 20 of 97 files

URL:
http://ad.adorika.com/

Web server:
ATS

Remove Malware from ad.adorika.com - Powered by Reason Core Security