The domain dl5.v39installer.com registered by REACTIVATION PERIOD was initially registered in October of 2013 through ENOM, INC.. This domain has been known to host and distribute adware as well as other potentially unwanted software. The hosted servers are located in Belfast, Northern Ireland within United Kingdom which resides on the RIPE Network Coordination Centre network.
Northern Ireland, United Kingdom (GB)
Tuesday, October 08, 2013
Wednesday, October 08, 2014
Thursday, November 20, 2014
Detections (100% detected)
PUP.Installer.InstallX.D, PUP.Installer.InstallX.K, PUP.Installer.SecureInstall.K, PUP.Installer.InstallX.L, PUP.InstallX.Installer (M)
Trend Micro House Call
TROJ_GEN.F47V1112, TROJ_GEN.F47V1219, TROJ_GEN.F47V1025, TROJ_GEN.F47V1211, TROJ_GEN.F47V0407, TROJ_GEN.F47V1220, TROJ_GEN.F47V1210
Trojan.Win32.Searcher.cjaztx, Riskware.Win32.Searcher.csnymk, Riskware.Win32.Searcher.cjaztx
Adware.Searcher.2593, Adware.Downware.1724, Adware.Downware.1426, Adware.Downware.2512
Artemis!D4EB6FF32274, Artemis!34A1D3B16B4C, Artemis!73D92A4F4B90, Artemis!27D3FB6CE1B3, Artemis!079DC217D7B3, Artemis!507B3EE96EDC, Artemis!6A559DDDDA1D, Artemis!F93EE7C87FF5, Artemis!24AE5CB1B73F
McAfee Web Gateway
Artemis!D4EB6FF32274, Artemis!34A1D3B16B4C, Artemis!73D92A4F4B90, Heuristic.BehavesLike.Win32.Suspicious-BAY.K, Artemis!079DC217D7B3
Win32.SuspectCrc, Win32.Malware, Virus.Win32.Heur, PUA.InstallIQ
Win32:Malware-gen, Win32:PUP-gen [PUP]
The domain dl5.v39installer.com has been seen to resolve to the following 3 IP addresses.
May 3, 2015
File downloads found at URLs served by dl5.v39installer.com.
Latest 30 of 32 download URLs
The following 230 files have been seen to comunicate with dl5.v39installer.com in live environments.