dl2.v39installer.com

REACTIVATION PERIOD

Domain Information

The domain dl2.v39installer.com registered by REACTIVATION PERIOD was initially registered in October of 2013 through ENOM, INC.. This domain has been known to host and distribute adware as well as other potentially unwanted software. The hosted servers are located in New York City, New York within the United States which resides on the Limelight Networks, Inc. network. The domain is part of a DNS service that utilizes a number of reverse proxy IP Addresses (see below).
Remove Malware from dl2.v39installer.com - Powered by Reason Core Security
Registrar:
ENOM, INC.

Server location:
New York, United States (US)

Create date:
Tuesday, October 08, 2013

Expires date:
Wednesday, October 08, 2014

Updated date:
Thursday, November 20, 2014

ASN:
AS22822 LLNW-AS Limelight Networks, INC. proxy AS object

Root domain:

Scanner detections:
Detections  (100% detected)

Scan engine
Details
Detections

Reason Heuristics
PUP.Installer.InstallX.K, PUP.Installer.InstallX.L
100.00%

McAfee
Artemis!D4EB6FF32274, Artemis!079DC217D7B3, Artemis!6EC20B00A72F, Artemis!2B07D8E76375, Artemis!F93EE7C87FF5
100.00%

Malwarebytes
PUP.Optional.InstallIQ
100.00%

Trend Micro House Call
TROJ_GEN.F47V1219, TROJ_GEN.F47V1115, TROJ_GEN.F47V1206, TROJ_GEN.F47V1126
100.00%

NANO AntiVirus
Trojan.Win32.Searcher.cjaztx
100.00%

Comodo Security
Application.Win32.InstallIQ.B
100.00%

Dr.Web
Adware.Downware.1724, Adware.Searcher.2593
100.00%

VIPRE Antivirus
InstallIQ Installer
100.00%

McAfee Web Gateway
Artemis!D4EB6FF32274, Artemis!079DC217D7B3, Artemis!6EC20B00A72F, Heuristic.BehavesLike.Win32.Suspicious-BAY.K, Artemis!F93EE7C87FF5
100.00%

ESET NOD32
Win32/InstallIQ (variant)
100.00%

IKARUS anti.virus
Win32.Malware, Virus.Win32.Heur
100.00%

AVG
MalSign.InstallX
100.00%

avast!
Win32:Malware-gen
80.00%

Kingsoft AntiVirus
Win32.Troj.Generic.a.(kcloud)
80.00%

Rising Antivirus
PE:PUF.InstallIQ!1.9E4F
80.00%

The domain dl2.v39installer.com has been seen to resolve to the following 3 IP addresses.

September 2, 2014

February 6, 2014

February 6, 2014

File downloads found at URLs served by dl2.v39installer.com.

20 / 68    (Adware)

20 / 68    (Adware)

12 / 68    (Adware)

20 / 68    (Adware)

20 / 68    (Adware)

21 / 68    (Adware)

The following 18 files have been seen to comunicate with dl2.v39installer.com in live environments.

 
Latest 20 of 30 files

Remove Malware from dl2.v39installer.com - Powered by Reason Core Security