The domain dl2.v39installer.com registered by REACTIVATION PERIOD was initially registered in October of 2013 through ENOM, INC.. This domain has been known to host and distribute adware as well as other potentially unwanted software. The hosted servers are located in New York City, New York within the United States which resides on the Limelight Networks, Inc. network. The domain is part of a DNS service that utilizes a number of reverse proxy IP Addresses (see below).
New York, United States (US)
Tuesday, October 08, 2013
Wednesday, October 08, 2014
Thursday, November 20, 2014
AS22822 LLNW-AS Limelight Networks, INC. proxy AS object
Detections (100% detected)
Artemis!D4EB6FF32274, Artemis!079DC217D7B3, Artemis!6EC20B00A72F, Artemis!2B07D8E76375, Artemis!F93EE7C87FF5
Trend Micro House Call
TROJ_GEN.F47V1219, TROJ_GEN.F47V1115, TROJ_GEN.F47V1206, TROJ_GEN.F47V1126
McAfee Web Gateway
Artemis!D4EB6FF32274, Artemis!079DC217D7B3, Artemis!6EC20B00A72F, Heuristic.BehavesLike.Win32.Suspicious-BAY.K, Artemis!F93EE7C87FF5
The domain dl2.v39installer.com has been seen to resolve to the following 3 IP addresses.
File downloads found at URLs served by dl2.v39installer.com.
The following 18 files have been seen to comunicate with dl2.v39installer.com in live environments.