ll-appserver.veoh.com

Qlipso, Inc.

Domain Information

The domain ll-appserver.veoh.com registered by Qlipso, Inc. was initially registered in June of 2005 through GODADDY.COM, LLC. This domain has been known to host and distribute adware as well as other potentially unwanted software. The hosted servers are located in New York City, New York within the United States which resides on the Limelight Networks, Inc. network.
Registrar:
GODADDY.COM, LLC

Server location:
New York, United States (US)

Create date:
Friday, June 24, 2005

Expires date:
Saturday, June 24, 2017

Updated date:
Monday, June 1, 2015

Root domain:

Scanner detections:
Detections  (82% detected)

Scan engine
Details
Detections

Reason Heuristics
PUP.Installer.Conduit.W, PUP.Installer.PPCTechSoft.K, PUP.OpenCandy.Installer (L), PUP.Installer.Performersoft.V, Threat.Win.Reputation.IMP, PUP.InstallCore.DesktopE.Installer (M)
67.86%

ESET NOD32
Win32/OpenCandy, Win32/InstallBrain.AO (variant), Win32/Toolbar.Conduit, Win32/InstallBrain (variant), Win32/OpenCandy (variant), Win32/OpenCandy.A potentially unsafe (variant)
42.86%

Dr.Web
Adware.Conduit.6, Adware.Downware.1350, Adware.Zugo.49, Adware.Downware.741, Adware.Zugo.71, Adware.OpenCandy.154, Adware.OpenCandy.141
35.71%

Malwarebytes
PUP.Optional.Conduit.A, Adware.InstallBrain, PUP.Optional.OpenCandy
25.00%

VIPRE Antivirus
Conduit, Trojan.Win32.Generic, InstallBrain, Threat.4732184
25.00%

McAfee
Artemis!FDD780567F72, Artemis!C332A5F6B788, Artemis!B6759A82B842, Artemis!CF869216CA81, Artemis!44DE29799305, Virus.W32/Ramnit.a
25.00%

Fortinet FortiGate
Adware/Zugo, Adware/OpenCandy, Adware/InstallBrain.OP, Riskware/Toolbar, W32/OpenCandy
21.43%

Rising Antivirus
PE:PUF.OpenCandy!1.9DE5, PE:Trojan.Win32.Generic.1287BA48!310884936
17.86%

Trend Micro House Call
TROJ_GEN.R0CBC0OIG13, TROJ_GEN.F47V1217, TROJ_GEN.R0CBH0AI213, Suspicious_GEN.F47V0108, ADW_ZUGO
17.86%

ESET NOD32
Win32/OpenCandy.A potentially unsafe application, Win32/Ramnit.H virus
17.86%

Microsoft Security Essentials
Worm:Win32/NeksMiner.A, TrojanDownloader:Win32/Brantall.A, Threat.Undefined
14.29%

avast!
Win32:Installer-AG [PUP], Win32:InstallBrain-V [PUP], Win32:RmnDrp
14.29%

G Data
Win32.Application.ConduitBrothersoftTB, Win32.Application.InstallBrain, Win32.Adware.OpenCandy
10.71%

Panda Antivirus
PUP/Conduit.A
10.71%

F-Prot
W32/IBrain.G.gen, W32/Ramnit.E
10.71%

The domain ll-appserver.veoh.com has been seen to resolve to the following 8 IP addresses.

cdn-208-111-160-6.iad.llnw.net
September 28, 2014

cdn-208-111-161-254.iad.llnw.net
September 28, 2014

May 28, 2014

May 28, 2014

cds1048.lga.llnw.net
April 11, 2014

cds938.lga.llnw.net
April 11, 2014

cds1105.lga.llnw.net
August 5, 2013

cds1096.lga.llnw.net
August 5, 2013

File downloads found at URLs served by ll-appserver.veoh.com.

1 / 68      (Malware)

5 / 68      (PUP)

7 / 68      (PUP)

The following 150 files have been seen to comunicate with ll-appserver.veoh.com in live environments.

 
Latest 20 of 292 files

URL:
http://ll-appserver.veoh.com/

Google Analytics:
UA-31928443

Title:
“Watch Movies Online For Free | Your #1 Online Movie Experience | Veoh”

Description:
“Do you love to watch movies online - free? Veoh is the premier watch movies online provider that you and your whole family are sure to love. Upload your favorites and share them with friends. Register your online movies account today!”

Web server:
Apache/2.2.10 (Unix) PHP/5.2.6 (PHP/5.2.6)

Facebook:
Likes:  1,491
Shares:  3,842
Comments:  1,161

Statistics are for the previous month.