The domain www.uoshdefken.com registered by REACTIVATION PERIOD was initially registered in May of 2014 through ENOM, INC.. This domain has been known to host and distribute adware as well as other potentially unwanted software. The hosted servers are located in Los Angeles, California within the United States which resides on the FDCservers.net network.
California, United States (US)
Wednesday, May 28, 2014
Thursday, May 28, 2015
Friday, July 10, 2015
AS6461 ABOVENET - Abovenet Communications, Inc,US
Detections (100% detected)
PUP.ClovermediaSL.E, PUP.PaymentsInteractiveSL.E, PUP.PluginUpdateSL.E, PUP.Tuguu.Clovermedia.Bundler (M), PUP.Tuguu.PaymentsInteractive.Bundler (M), PUP.Softpulse.PluginUpdate.Bundler (M)
Adware DomaIQ.EJ, Adware Generic_r.NH, Adware DomaIQ.EN, Trojan horse Downloader.Generic13.CIBN.dropper
DomaIQ-CC [PUP], DomaIQ-CO [PUP], Win32:DomaIQ-BO [PUP]
Win32/DomaIQ.BB potentially unwanted application, Win32/DomaIQ.BH potentially unwanted application, Win32/DomaIQ.BI potentially unwanted application
Adware-DomaIQ!645AC5093719, Adware-DomaIQ!D8B4E789A702, PUP-FAO!FD9222FDB7C2, Adware-DomaIQ!71734E3D2229, CryptDomaIQ, Program.CryptDomaIQ
PUA.DomaIQ, PUA.Lollipop, Packed/PECompact
APPL/DomaIQ.beor, APPL/DomaIQ.Gen, APPL/DomaIQ.Gen8, TR/Dropper.Gen, Adware/Kazy.374465.2
DomainIQ pay-per install, Generic PUA PF, Generic PUA FC, Generic PUA AP, PUA 'DomainIQ pay-per install'
Antiy Labs AVL
GrayWare[AdWare:not-a-virus]/Win32.Lollipop, Riskware[:not-a-virus]/Win32.Lollipop.qo, Trojan/Win32.TGeneric, GrayWare[AdWare:not-a-virus,HEUR]/MSIL.DomaIQ
K7 Gateway Antivirus
McAfee Web Gateway
Adware-DomaIQ!645AC5093719, Adware-DomaIQ!D8B4E789A702, Heuristic.BehavesLike.Win32.Suspicious.H, Adware-DomaIQ!71734E3D2229
The domain www.uoshdefken.com has been seen to resolve to the following 2 IP addresses.
File downloads found at URLs served by www.uoshdefken.com.