ll-appserver.veoh.com

Qlipso, Inc.

Domain Information

The domain ll-appserver.veoh.com registered by Qlipso, Inc. was initially registered in June of 2005 through GODADDY.COM, LLC. This domain has been known to host and distribute adware as well as other potentially unwanted software. The hosted servers are located in New York City, New York within the United States which resides on the Limelight Networks, Inc. network.
Registrar:
GODADDY.COM, LLC

Server location:
New York, United States (US)

Create date:
Friday, June 24, 2005

Expires date:
Saturday, June 24, 2017

Updated date:
Monday, June 01, 2015

Root domain:

Scanner detections:
Detections  (82% detected)

Scan engine
Details
Detections

Reason Heuristics
PUP.Installer.Conduit.W, PUP.Installer.PPCTechSoft.K, PUP.OpenCandy.Installer (L), PUP.Installer.Performersoft.V, Threat.Win.Reputation.IMP, PUP.InstallCore.DesktopE.Installer (M)
63.33%

ESET NOD32
Win32/OpenCandy, Win32/InstallBrain.AO (variant), Win32/Toolbar.Conduit, Win32/InstallBrain (variant), Win32/OpenCandy (variant), Win32/OpenCandy.A potentially unsafe (variant)
40.00%

Dr.Web
Adware.Conduit.6, Adware.Downware.1350, Adware.Zugo.49, Adware.Downware.741, Adware.Zugo.71, Adware.OpenCandy.154, Adware.OpenCandy.141
33.33%

Malwarebytes
PUP.Optional.Conduit.A, Adware.InstallBrain, PUP.Optional.OpenCandy
23.33%

VIPRE Antivirus
Conduit, Trojan.Win32.Generic, InstallBrain, Threat.4732184
23.33%

McAfee
Artemis!FDD780567F72, Artemis!C332A5F6B788, Artemis!B6759A82B842, Artemis!CF869216CA81, Artemis!44DE29799305, Virus.W32/Ramnit.a
23.33%

McAfee Web Gateway
Artemis!FDD780567F72, Artemis!C332A5F6B788, BehavesLike.Win32.Expiro.tc, Artemis!CF869216CA81, Artemis!44DE29799305, Adware-OpenCandy.dll
20.00%

Fortinet FortiGate
Adware/Zugo, Adware/OpenCandy, Adware/InstallBrain.OP, Riskware/Toolbar, W32/OpenCandy
20.00%

Rising Antivirus
PE:PUF.OpenCandy!1.9DE5, PE:Trojan.Win32.Generic.1287BA48!310884936
16.67%

Trend Micro House Call
TROJ_GEN.R0CBC0OIG13, TROJ_GEN.F47V1217, TROJ_GEN.R0CBH0AI213, Suspicious_GEN.F47V0108, ADW_ZUGO
16.67%

ESET NOD32
Win32/OpenCandy.A potentially unsafe application, Win32/Ramnit.H virus
16.67%

Microsoft Security Essentials
Worm:Win32/NeksMiner.A, TrojanDownloader:Win32/Brantall.A, Threat.Undefined
13.33%

avast!
Win32:Installer-AG [PUP], Win32:InstallBrain-V [PUP], Win32:RmnDrp
13.33%

Antiy Labs AVL
Trojan/Win32.Tgenic, Trojan/Win32.TSGeneric, GrayWare[AdWare:not-a-virus]/Win32.Inffinity
13.33%

G Data
Win32.Application.ConduitBrothersoftTB, Win32.Application.InstallBrain, Win32.Adware.OpenCandy
10.00%

The domain ll-appserver.veoh.com has been seen to resolve to the following 8 IP addresses.

cdn-208-111-160-6.iad.llnw.net
September 28, 2014

cdn-208-111-161-254.iad.llnw.net
September 28, 2014

May 28, 2014

May 28, 2014

cds1048.lga.llnw.net
April 11, 2014

cds938.lga.llnw.net
April 11, 2014

cds1105.lga.llnw.net
August 5, 2013

cds1096.lga.llnw.net
August 5, 2013

File downloads found at URLs served by ll-appserver.veoh.com.

1 / 68      (Malware)

6 / 68      (PUP)

7 / 68      (PUP)

The following 150 files have been seen to comunicate with ll-appserver.veoh.com in live environments.

 
Latest 20 of 292 files

URL:
http://ll-appserver.veoh.com/

Google Analytics:
UA-31928443

Title:
“Watch Movies Online For Free | Your #1 Online Movie Experience | Veoh”

Description:
“Do you love to watch movies online - free? Veoh is the premier watch movies online provider that you and your whole family are sure to love. Upload your favorites and share them with friends. Register your online movies account today!”

Web server:
Apache/2.2.10 (Unix) PHP/5.2.6 (PHP/5.2.6)

Facebook:
Likes:  1,491
Shares:  3,842
Comments:  1,161

Statistics are for the previous month.