ll-appserver.veoh.com

Qlipso, Inc.

Domain Information

The domain ll-appserver.veoh.com registered by Qlipso, Inc. was initially registered in June of 2005 through GODADDY.COM, LLC. This domain has been known to host and distribute adware as well as other potentially unwanted software. The hosted servers are located in New York City, New York within the United States which resides on the Limelight Networks, Inc. network.
Remove Malware from ll-appserver.veoh.com - Powered by Reason Core Security
Registrar:
GODADDY.COM, LLC

Server location:
New York, United States (US)

Create date:
Friday, June 24, 2005

Expires date:
Saturday, June 24, 2017

Updated date:
Monday, June 01, 2015

Root domain:

Scanner detections:
Detections  (69% detected)

Scan engine
Details
Detections

ESET NOD32
Win32/OpenCandy, Win32/InstallBrain.AO (variant), Win32/InstallBrain (variant), Win32/OpenCandy (variant), Win32/OpenCandy.A potentially unsafe (variant)
81.82%

Dr.Web
Adware.Conduit.6, Adware.Downware.1350, Adware.Zugo.49, Adware.Downware.741, Adware.Zugo.71, Adware.OpenCandy.154
63.64%

Malwarebytes
PUP.Optional.Conduit.A, Adware.InstallBrain, PUP.Optional.OpenCandy
45.45%

Reason Heuristics
PUP.Installer.Conduit.W, PUP.Installer.PPCTechSoft.K, PUP.Installer.Performersoft.V, Threat.Win.Reputation.IMP
45.45%

Trend Micro House Call
TROJ_GEN.R0CBC0OIG13, TROJ_GEN.F47V1217, TROJ_GEN.R0CBH0AI213, Suspicious_GEN.F47V0108, ADW_ZUGO
45.45%

Fortinet FortiGate
Adware/Zugo, Adware/OpenCandy, Adware/InstallBrain.OP, Riskware/Toolbar
45.45%

VIPRE Antivirus
Conduit, Trojan.Win32.Generic, InstallBrain
36.36%

Rising Antivirus
PE:PUF.OpenCandy!1.9DE5, PE:Trojan.Win32.Generic.1287BA48!310884936
36.36%

McAfee
Artemis!FDD780567F72, Artemis!C332A5F6B788, Artemis!B6759A82B842, Artemis!CF869216CA81
36.36%

McAfee Web Gateway
Artemis!FDD780567F72, Artemis!C332A5F6B788, BehavesLike.Win32.Expiro.tc, Artemis!CF869216CA81
36.36%

Panda Antivirus
PUP/Conduit.A
27.27%

Agnitum Outpost
Trojan.DL.Brantall, PUA.Toolbar, Riskware.Agent
27.27%

Antiy Labs AVL
Trojan/Win32.Tgenic, Trojan/Win32.TSGeneric, GrayWare[AdWare:not-a-virus]/Win32.Inffinity
27.27%

Kingsoft AntiVirus
Win32.Troj.Generic.a.(kcloud), Win32.Troj.Generic.(kcloud)
18.18%

G Data
Win32.Application.ConduitBrothersoftTB, Win32.Application.InstallBrain
18.18%

The domain ll-appserver.veoh.com has been seen to resolve to the following 8 IP addresses.

cdn-208-111-160-6.iad.llnw.net
September 28, 2014

cdn-208-111-161-254.iad.llnw.net
September 28, 2014

May 28, 2014

May 28, 2014

cds1048.lga.llnw.net
April 11, 2014

cds938.lga.llnw.net
April 11, 2014

cds1105.lga.llnw.net
August 5, 2013

cds1096.lga.llnw.net
August 5, 2013

File downloads found at URLs served by ll-appserver.veoh.com.

13 / 68    (PUP)

1 / 68      (Malware)

5 / 68      (PUP)

8 / 68      (PUP)

9 / 68      (PUP)

8 / 68      (PUP)

7 / 68      (PUP)

13 / 68    (PUP)

The following 29 files have been seen to comunicate with ll-appserver.veoh.com in live environments.

 
Latest 20 of 44 files

URL:
http://ll-appserver.veoh.com/

Google Analytics:
UA-31928443

Title:
“Watch Movies Online For Free | Your #1 Online Movie Experience | Veoh”

Description:
“Do you love to watch movies online - free? Veoh is the premier watch movies online provider that you and your whole family are sure to love. Upload your favorites and share them with friends. Register your online movies account today!”

Web server:
Apache/2.2.10 (Unix) PHP/5.2.6 (PHP/5.2.6)

Facebook:
Likes:  1,483
Shares:  3,797
Comments:  1,150

Statistics are for the previous month.

Remove Malware from ll-appserver.veoh.com - Powered by Reason Core Security