The domain ll-appserver.veoh.com registered by Qlipso, Inc. was initially registered in June of 2005 through GODADDY.COM, LLC. This domain has been known to host and distribute adware as well as other potentially unwanted software. The hosted servers are located in New York City, New York within the United States which resides on the Limelight Networks, Inc. network.
Registrar:
GODADDY.COM, LLC
Server location:
New York, United States (US)
Create date:
Friday, June 24, 2005
Expires date:
Saturday, June 24, 2017
Updated date:
Monday, June 1, 2015
Scanner detections:
Detections (82% detected)
Scan engine
Details
Detections
Reason Heuristics
PUP.Installer.Conduit.W, PUP.Installer.PPCTechSoft.K, PUP.OpenCandy.Installer (L), PUP.Installer.Performersoft.V, Threat.Win.Reputation.IMP, PUP.InstallCore.DesktopE.Installer (M)
67.86%
ESET NOD32
Win32/OpenCandy, Win32/InstallBrain.AO (variant), Win32/Toolbar.Conduit, Win32/InstallBrain (variant), Win32/OpenCandy (variant), Win32/OpenCandy.A potentially unsafe (variant)
42.86%
Dr.Web
Adware.Conduit.6, Adware.Downware.1350, Adware.Zugo.49, Adware.Downware.741, Adware.Zugo.71, Adware.OpenCandy.154, Adware.OpenCandy.141
35.71%
Malwarebytes
PUP.Optional.Conduit.A, Adware.InstallBrain, PUP.Optional.OpenCandy
25.00%
VIPRE Antivirus
Conduit, Trojan.Win32.Generic, InstallBrain, Threat.4732184
25.00%
McAfee
Artemis!FDD780567F72, Artemis!C332A5F6B788, Artemis!B6759A82B842, Artemis!CF869216CA81, Artemis!44DE29799305, Virus.W32/Ramnit.a
25.00%
Fortinet FortiGate
Adware/Zugo, Adware/OpenCandy, Adware/InstallBrain.OP, Riskware/Toolbar, W32/OpenCandy
21.43%
Rising Antivirus
PE:PUF.OpenCandy!1.9DE5, PE:Trojan.Win32.Generic.1287BA48!310884936
17.86%
Trend Micro House Call
TROJ_GEN.R0CBC0OIG13, TROJ_GEN.F47V1217, TROJ_GEN.R0CBH0AI213, Suspicious_GEN.F47V0108, ADW_ZUGO
17.86%
ESET NOD32
Win32/OpenCandy.A potentially unsafe application, Win32/Ramnit.H virus
17.86%
Microsoft Security Essentials
Worm:Win32/NeksMiner.A, TrojanDownloader:Win32/Brantall.A, Threat.Undefined
14.29%
avast!
Win32:Installer-AG [PUP], Win32:InstallBrain-V [PUP], Win32:RmnDrp
14.29%
G Data
Win32.Application.ConduitBrothersoftTB, Win32.Application.InstallBrain, Win32.Adware.OpenCandy
10.71%
Panda Antivirus
PUP/Conduit.A
10.71%
F-Prot
W32/IBrain.G.gen, W32/Ramnit.E
10.71%
The domain ll-appserver.veoh.com has been seen to resolve to the following 8 IP addresses.
cdn-208-111-160-6.iad.llnw.net
September 28, 2014
cdn-208-111-161-254.iad.llnw.net
September 28, 2014
cds1048.lga.llnw.net
April 11, 2014
cds938.lga.llnw.net
April 11, 2014
cds1105.lga.llnw.net
August 5, 2013
cds1096.lga.llnw.net
August 5, 2013
File downloads found at URLs served by ll-appserver.veoh.com.
The following 150 files have been seen to comunicate with ll-appserver.veoh.com in live environments.
URL:
http://ll-appserver.veoh.com/
Google Analytics:
UA-31928443
Title:
“Watch Movies Online For Free | Your #1 Online Movie Experience | Veoh”
Description:
“Do you love to watch movies online - free? Veoh is the premier watch movies online provider that you and your whole family are sure to love. Upload your favorites and share them with friends. Register your online movies account today!”
Web server:
Apache/2.2.10 (Unix) PHP/5.2.6 (PHP/5.2.6)
Facebook:
Likes: 1,491
Shares: 3,842
Comments: 1,161
Statistics are for the previous month.