Help RSS API Feed Maltego Contact                        

Domain > 2012tj.com

More information on this domain is in AlienVault OTX

Is this malicious?

Files that talk to 2012tj.com

MD5A/V
172f8efb6d801e59fa8fe7bbbb142576[Trojan.Win32.Buzus!O] [Worm.Autorun.DM8] [W32/Autorun.worm.bcj] [Worm.Autorun] [Trojan/Buzus.ghsv] [Trojan.Buzus!qWzb2obpc4o] [W32.Buzus] [Killav.BPLK] [WORM_YMINKY.SMRP] [Win.Trojan.Buzus-170] [Worm.Win32.AutoRun.gcpd] [Trojan.Win32.MLW.blzwz] [Trojan.Win32.A.Buzus.120320.E] [Worm.Win32.AutoRun.aag] [Troj/Buzus-FX] [Win32.HLLW.Autoruner.45767] [Trojan.Buzus.Win32.59295] [Trojan/Win32.Buzus] [Worm:Win32/Yeltminky.A] [Worm/Win32.AutoRun] [BScope.Trojan-Dropper.Injector] [Trojan-PWS.Win32.Lmir] [W32/Delf.EP!worm] [Worm.Win32.AutoRun.ACK] [Win32/Trojan.0bf]
631e785bee54e992892ce1ae424d90e5[W32.SafeDrvHAR.Worm] [Worm.Autorun.DM8] [Artemis!631E785BEE54] [Trojan.Downloader] [Trojan] [Trojan.Win32.Buzus.bnskj] [W32.Buzus] [Suspicious_F.E] [Win32/Autorun.K] [Mal_Otorun5] [Trojan.Win32.Diple.aoyk] [Trojan.Buzus!1xqIPjvIXyo] [Trojan.Win32.Buzus.59401] [TrojWare.Win32.Buzus.ebgb] [Trojan.MulDrop2.64109] [TR/Spy.Hacko.3] [Heuristic.BehavesLike.Win32.Suspicious-BAY.G] [Troj/Buzus-FX] [Trojan/Buzus.abqg] [Trj/Buzus.AH] [Worm.Autorun.(kcloud)] [Worm:Win32/Yeltminky.A] [Trojan/Win32.Buzus] [Virus.Win32.Heur.a] [BScope.P2P-Worm.Palevo] [Malware.Buzus] [Win32/AutoRun.Delf.EP] [Worm.Win32.Autorun.tux] [Trojan-Spy.Hacko] [W32/Delf.EP!worm] [Worm.Win32.AutoRun.40]
7787e98b23d9a7e7875e4b9ae564a0ba[W32.SafeDrvHAR.Worm] [Worm.Autorun.DM8] [Artemis!7787E98B23D9] [Trojan.Downloader] [Riskware] [Trojan] [Trojan/Buzus.eeux] [Trojan.Win32.Buzus.bnskj] [W32.Buzus] [Suspicious_F.E] [Mal_Otorun5] [Win32:Virut-AGQ] [Worm.Win32.AutoRun.gcpp] [Trojan.Buzus!1xqIPjvIXyo] [Troj/Buzus-FX] [Win32.HLLW.Autoruner.45767] [TR/Spy.Hacko.3] [Mal_Otorun5] [Heuristic.BehavesLike.Win32.Suspicious-BAY.G] [Trojan/Buzus.abqg] [Win32.Troj.Buzus.(kcloud)] [Worm:Win32/Yeltminky.A] [Trojan.Win32.Buzus.59401] [Virus.Win32.Heur.a] [BScope.P2P-Worm.Palevo] [Win32/AutoRun.Delf.EP] [Worm.Win32.Autorun.tux] [Trojan-Spy.Hacko] [W32/Delf.EP!worm]
c0f49dc98720e9ab38c2bff809af7c23[W32.SafeDrvHAR.Worm] [Packed.Win32.TDSS!O] [Worm.Autorun.DM8] [Artemis!C0F49DC98720] [Trojan.Downloader] [Trojan.Buzus!1xqIPjvIXyo] [W32.Buzus] [Suspicious_F.E] [Win32/Autorun.K] [Worm.Win32.AutoRun.gcpp] [Trojan.Win32.Buzus.bnskj] [Trojan.Win32.Buzus.59401] [Virus.Win32.Heur.a] [Worm.Win32.AutoRun.aag] [TrojWare.Win32.Buzus.ebgb] [Worm.Win32.AutoRun] [Mal_Otorun5] [Heuristic.BehavesLike.Win32.Suspicious-BAY.G] [Troj/Buzus-FX] [Trojan/Win32.Buzus] [Worm.Autorun.(kcloud)] [Worm:Win32/Yeltminky.A] [Trojan/Win32.Buzus] [Win32/AutoRun.Delf.EP] [BScope.P2P-Worm.Palevo] [Trj/Buzus.AH] [Trojan-PWS.Win32.Lmir] [W32/Delf.EP!worm] [Trojan.Win32.Buzus.AmVX] [Win32/Trojan.a1b]

Whois

PropertyValue
Email test_download110@163.com
NameServer DNS.IDCSH.NET
Created 2014-11-23 00:00:00
Changed 2014-11-23 00:00:00
Expires 2015-11-23 00:00:00
Registrar XIN NET TECHNOLOGY C

DNS Resolutions

DateIP Address
2024-08-0620.205.118.3 (ClassC)
2024-11-0820.255.200.238 (ClassC)
2024-11-2220.255.104.129 (ClassC)
2025-02-2020.255.208.255 (ClassC)
2025-03-17154.89.120.137 (ClassC)
2025-05-16154.89.120.150 (ClassC)
2025-07-05156.224.139.146 (ClassC)
2025-08-08156.224.139.198 (ClassC)

Port 80

Port 443

Subdomains

DateDomainIP
www.2012tj.com2013-10-08
View on OTX | View on ThreatMiner








Data with thanks to AlienVault OTX, VirusTotal, Malwr and others. [Sitemap]



� Copyright 2019 AlienVault, Inc. | Legal| Status| Do Not Sell My Personal Information