Help
RSS
API
Feed
Maltego
Contact
Domain > gov.cn
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
Most users have voted this as
not malicious
Files that talk to gov.cn
MD5
A/V
c3ccc578e0087683a3a55de916056d77
[
W32.Clod3a0.Trojan.8513
] [
Backdoor.Bot.187797
] [
Artemis!C3CCC578E008
] [
Win32.Troj.Undef.(kcloud)
] [
Backdoor.Win32.Bot
] [
Malware_fam.NB
]
fe734b28009c7dd5389f64d72722bb21
0dd56a0b8ea7bedb57cebf9aacdac40f
[
Malware.Packer.HGX1
] [
Heuristic.BehavesLike.Win32.Suspicious-BAY.G
] [
W32/Kryptik.AXUE!tr
]
508e8ae141de479e79ffdd6bc6d73a4d
[
W32.Clod765.Trojan.f51d
] [
TrojanDownloader.Dadobra.age
] [
PWS-Banker
] [
Trojan/Downloader.Dadobra.age
] [
Trojan.Win32.Dadobra.ugfa
] [
W32/Downldr2.DFTZ
] [
Suspicious.MH690.A
] [
Trojan.Packed-4
] [
Trojan-Downloader.Win32.Dadobra.age
] [
Trojan.DL.Dadobra.ACCO
] [
Trojan.DownLoad.6839
] [
Heuristic.LooksLike.Win32.SuspiciousPE.C
] [
TrojanDownloader.Dadobra.apb
] [
Trojan[Downloader]/Win32.Dadobra
] [
Win-Trojan/Downloader.180224.H
] [
Trj/Dadobra.QW
] [
PE:Worm.VBInjectEx!1.99E6
] [
W32/Dadobra.AGE!tr.dldr
] [
Luhe.Fiha.A
] [
Trojan.Win32.Dadobra.AIn
]
961c0ed105b1f4ade335051a3a1b0816
98a53e354a2d6c4f1f5d80edce0ac8fa
[
W32.Clod2c0.Trojan.96dc
] [
Worm.AutoRun.daj.n1
] [
PWS-Banker
] [
Spyware.Banker
] [
W32/AutoRun.daj
] [
Downloader
] [
Banker.CSBL
] [
Mal_Banld-1
] [
Worm.Win32.AutoRun.daj
] [
Trojan.Win32.AutoRun.omdm
] [
Mal/DelpDldr-C
] [
TrojWare.Win32.TrojanDownloader.Dadobra.~TNS
] [
Trojan.DownLoader10.9187
] [
Heuristic.BehavesLike.Win32.Suspicious-BAY.G
] [
Worm/AutoRun.aby
] [
Worm/Win32.AutoRun
] [
Win32.Hack.ThinlPackerT.a.378833
] [
Trojan/Win32.Banbra
] [
Trojan-Downloader.Win32.Small.102210
] [
Worm.Win32.AutoRun.Alh
] [
Trojan.Crypt
] [
W32/AutoRun.DAJ!worm
] [
Downloader.Banload.QIV
] [
Win32/Trojan.Dropper.b73
]
0ec14e7e494c3848c9924d1bc24c6d20
[
Trojan-Downloader/W32.Banload.38400.J
] [
TrojanDownloader.Banload.ls
] [
PWS-Banker.dldr
] [
Trojan/Downloader.Banload.ls
] [
Trojan-Downloader
] [
Trojan.PWS.Banker!lmwMVnvC7dM
] [
Suspicious.DLoader
] [
Win32.TRDldr.Delphi
] [
PUA.Packed.TeLock
] [
Trojan-Downloader.Win32.Banload.bjo
] [
Trojan.Downloader.Banload.PW
] [
Mal/DelpDldr-D
] [
TrojWare.Win32.TrojanDownloader.Banload.PW0
] [
Trojan.DownLoader.11220
] [
Heuristic.LooksLike.Win32.Suspicious.F
] [
Trojan-Downloader.Win32.Banload!IK
] [
TrojanDownloader.Banload.aahj
] [
Trojan.Win32.Downloader.38400.CF
] [
Win-Trojan/Banload.38400.I
] [
Trojan-Downloader.Win32.Banload.ls
] [
HeurEngine.ZeroDayThreat
] [
Trojan-Downloader.Win32.Banload
] [
Trj/Nabload.
]
520afb1eb5884b996719b9b8d2c59773
[
PWS-Banker.dldr
] [
Trojan-Downloader
] [
Trojan-Downloader
] [
W32/Behav-Heuristic-066
] [
Trojan.Win32.Banload.bdwous
] [
Suspicious.DLoader
] [
Downloader
] [
Win32.Banload.bkl
] [
Trojan-Downloader.Win32.Banload.bjo
] [
Trojan.PWS.Banker!JyDHJsPdBqw
] [
UnclassifiedMalware
] [
Trojan.DownLoader.11686
] [
Heuristic.BehavesLike.Win32.Suspicious-BAY.G
] [
Mal/DelpDldr-C
] [
Win32.TrojDownloader.Banload.ag.(kcloud)
] [
Win-Trojan/Banload.38400.H
] [
TrojanDownloader.Banload
] [
HeurEngine.ZeroDayThreat
] [
Trojan-Downloader.Win32.Banload
] [
Downloader.Rozena
] [
Trj/Nabload.ACN
]
24a034d09222c5370365c4cdadde0f65
[
HW32.CDB.Da0d
] [
Packed.Win32.Katusha.3!O
] [
Kryptik.CDQY
] [
TrojWare.Win32.Kryptik.CBCJ
] [
Trojan.Packed.26581
] [
Backdoor:Win32/Kelihos.F
] [
Trojan/Win32.Tepfer
] [
Heur.Trojan.Hlux
] [
Trojan.Crypt_s
] [
W32/Kryptik.BD!tr
] [
Crypt_s.GNC
] [
Trojan.Win32.Kryptik.CBCJ
] [
Win32/Trojan.0de
]
b45c930f1c0cc6ed86f6b9d67e487465
79739e11890cfce4b5033486168c7561
f1e88db8f23510fd9cc9c099812d70b9
7e8d00673bb1df921b54e40dcd7ab336
4811b6c64abcf7909a07eba5931d0a1d
[
Spyware.Zbot.TE
]
f890956fc62e0a7aee759e507e753bb3
[
TrojanDownloader.Cutwail.r4
] [
Downloader-FSH!F890956FC62E
] [
Trojan.Cutwail.Win32.74
] [
Backdoor.Trojan
] [
ZBot.STQQ
] [
TROJ_CUTWAIL.XZO
] [
Trojan.Win32.Cutwail.csa
] [
Trojan.Cutwail!t70uGHDPjbU
] [
BackDoor.Bulknet.1150
] [
TR/Cutwail.A.62
] [
Trojan/Win32.Cutwail
] [
TrojanDownloader:Win32/Cutwail.BS
] [
W32/Trojan.OXZC-2776
] [
W32/Kryptik.CAKI!tr
] [
Trojan.Win32.Kryptik.CAKI
] [
Win32/Trojan.Multi.daf
]
274256a090dcd9ee3a406cf95cd18d47
[
HW32.CDB.398d
] [
Kryptik.CDQY
] [
Backdoor.Win32.Hlux.dpru
] [
Backdoor.Hlux!RvRbcitOmAk
] [
TrojWare.Win32.Kryptik.CAUP
] [
Trojan.Packed.26581
] [
Backdoor:Win32/Kelihos.F
] [
Trojan/Win32.Tepfer
] [
Heur.Trojan.Hlux
] [
Win32/Kryptik.CAXO
] [
Trojan.Crypt_s
] [
W32/Hlux.BWUN!tr.bdr
] [
Crypt_s.GNC
] [
Trojan.Win32.Kryptik.CAXO
]
17496fae58080cd4673f7a71d930410d
[
HW32.CDB.Ea27
] [
W32/Trojan-juke-based!Maximus
] [
Mal_Banker11
] [
Mal/Behav-103
] [
TrojWare.Win32.Downloader.VB.RAB
] [
Trojan.DownLoad.6323
] [
Mal_Banker11
] [
Trojan.Win32.Downloader.350208.C
] [
Trojan/Win32.CSon
] [
W32/Trojan-juke-based!Maximus
] [
Trj/CI.A
] [
PE:Trojan.DL.Win32.Undef.qef!1075264791
] [
Trojan-Spy.Win32.Banker.anv
] [
PossibleThreat
] [
Luhe.Fiha.A
] [
Trojan.Win32.Downloader.ae
] [
Win32/Trojan.Downloader.8d3
]
2e3ffe4ec4ccafba2b9d2a87f93ec2fc
[
W32.Clod18b.Trojan.c611
] [
Malware.Packer.T
] [
W32/Behav-Heuristic-064
] [
W32/Themida_Packed!Eldorado
] [
Backdoor.Formador
] [
Mal_Banker11
] [
Packed.Win32.Black.a
] [
Trojan.Win32.A.Black.1337856.G
] [
Packed.Win32..Black.~A
] [
Trojan.Packed.650
] [
Mal_Banker11
] [
Heuristic.BehavesLike.Win32.Suspicious-BAY.S
] [
Mal/Behav-285
] [
Trojan/Win32.CSon
] [
Trojan.Win32.Heur.087
] [
Trj/Thed.A
] [
Win32/Packed.Themida.A
] [
PE:Trojan.DL.Win32.Undef.qef!1075264791
] [
Packed.Win32.Themida
] [
W32/Packed.2D18!tr
] [
Win32/Themida
] [
Trojan.Win32.Black.AZ
] [
Win32/Trojan.2ff
]
6726c601aa0ff5b4af96b1b9ae2c6b07
[
W32.Clodc52.Trojan.3785
] [
Artemis!6726C601AA0F
] [
W32/Trojan-Gypikon-based.DM2!Ma
] [
Suspicious.MH690.A
] [
Packed/Upack
] [
Trojan.Win32.A.Downloader.143776
] [
TrojWare.Win32.TrojanSpy.Pophot.d
] [
Trojan.DownLoad2.41332
] [
Cryp_Xed-14
] [
Heuristic.BehavesLike.Win32.Suspicious-BAY.G
] [
Mal/Behav-103
] [
Win32.Hack.UpackT.a.15981
] [
Trojan/Win32.CSon
] [
W32/Trojan-Gypikon-based.DM2!Ma
] [
Trj/Pupack.A
] [
PE:Packer.Win32.Upack.a!1075128095
] [
Trojan-Downloader.Win32.Banload
] [
PossibleThreat
] [
Downloader.Rozena
] [
Trojan.Win32.Downloader.AMg
] [
Win32/Trojan.4b9
]
6c2433c1af996fc5361652a5733bffe4
[
W32.Clod176.Trojan.1879
] [
Backdoor/W32.Small.483840
] [
Artemis!6C2433C1AF99
] [
Trojan.Win32.Small.bereyl
] [
WS.Reputation.1
] [
Mal_Banker
] [
Packed.Win32.Black.d
] [
Backdoor.Small!Zwlg+mAYIMc
] [
Packed.Win32.Aspack.AB
] [
BACKDOOR.Trojan
] [
HEUR/Crypted
] [
Heuristic.BehavesLike.Win32.Suspicious-BAY.G
] [
Mal/Behav-270
] [
Backdoor/Win32.Small
] [
Win32.Hack.Undef.(kcloud)
] [
TrojanPSW.Pinch
] [
Trj/Thed.B
] [
Win32/Packed.ASProtect.AAB
] [
Trojan.Win32.VBCode.flp
] [
Virus.Win32.Hupigon.BQO
] [
W32/Black.D
] [
Luhe.Fiha.C
] [
HackTool.Win32.Transmit.AlR
]
Whois
Property
Value
Organization
China Internet Network Information Center (CNNIC)
Email
tech@cnnic.cn
NameServer
D.DNS.CN
Created
1990-11-28 00:00:00
Changed
2015-06-19 00:00:00