Help
RSS
API
Feed
Maltego
Contact
Domain > microtek.com
×
Welcome!
Right click nodes and scroll the mouse to navigate the graph.
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
Files that talk to microtek.com
MD5
A/V
5e5f2ba73005a54ea71e591feff2b1d7
[
Artemis!5E5F2BA73005
] [
Trojan.Win32.Jorik.Cutwail.pgy
]
2a6e7154c7f62a8109dae1b6a6a204c3
[
SHeur4.BNRB
] [
TrojanDownloader*Win32/Cutwail.BS
]
d2f2c9e7b5d32c5114a2f8511d9efcc2
5e6ffe3abdc1caa35ee40b0a1908bf4c
[
Win32/Tnega.XfYFUAD
] [
BackDoor.Bulknet.967
] [
Win32/Injector.AIRV
] [
W32/Injector.AHLB!tr
] [
Trojan-Downloader.Win32.Karagany
] [
Trojan.Crypt.NKN
] [
PWS-Zbot-FAQD!5E6FFE3ABDC1
] [
TrojanDownloader*Win32/Cutwail.BS
] [
winpe/Kryptik.CBZD
] [
TROJ_FIDOBOT.SM0
] [
Trojan.Buzus
]
6bd3a60b66efb707e894f2717cccf17b
57be65340d0a4336f525d108862ccf50
2263766e2732eb5e6eb78b5d35423883
[
Crypt2.BTUL
] [
TrojanDownloader*Win32/Cutwail.BS
]
3be8faf7b111dadde0d8e17b428125b0
[
Backdoor/W32.Androm.39936.C
] [
Trojan.Androm.vsg.cw4
] [
Trojan.Inject
] [
Trojan/Kryptik.bdbi
] [
Trojan.Win32.Androm.btkkib
] [
WS.Reputation.1
] [
TROJ_CUTWAIL.PQP
] [
Backdoor.Win32.Androm.vsg
] [
Backdoor.Androm!mmztmFLZ69E
] [
UnclassifiedMalware
] [
BackDoor.Bulknet.958
] [
Win32.HeurC.KVMH004.a.(kcloud)
] [
TrojanDownloader:Win32/Cutwail
] [
Client-SMTP.39936
] [
W32/Backdoor.DIPS-1259
] [
Backdoor.Androm
] [
Virus.Win32.Cryptor
] [
W32/Androm.VSG!tr.bdr
] [
Win32/Cryptor
] [
W32/Palevo.GEZ.worm
]
7e265cfaa3a92f9b07c518dcbe577262
[
Crypt_s.BOF
] [
TrojanDownloader*Win32/Cutwail.BS
]
ee18d4dfd97d32e98cd76c330f023e12
152fbf67adaa5455ac89003f69528244
[
BackDoor-FAYA!152FBF67ADAA
]
357423154cf2deb27cea8219633158ca
[
TrojanPWS.Zbot.AZ4
] [
Cutwail-FBYD!357423154CF2
] [
Trojan.PPush
] [
Trojan
] [
Trojan/Kryptik.bcej
] [
Trojan.Win32.Bulknet.bsbxmg
] [
W32.Pilleuz
] [
Win32/Cutwail.CeCCXcD
] [
Backdoor.Win32.Pushdo.qfj
] [
Backdoor.Pushdo!X+87TMMiffo
] [
Troj/Cutwail-AM
] [
TrojWare.Win32.Kryptik.BAVK
] [
BackDoor.Bulknet.893
] [
BKDR_PUSHDO.NIL
] [
Backdoor/Pushdo.adm
] [
TrojanDownloader:Win32/Cutwail.BS
] [
W32/Backdoor.WNGO-5843
] [
Backdoor.Pushdo
] [
Malware.Pilleuz!rem
] [
Trojan.CryptDTE
] [
W32/Pushdo.PYD!tr.bdr
] [
Crypt.CDTE
] [
Trj/CI.A
]
b50e50a9a6c3d407f4b1fac8759d95f6
98428f0dd3514edeb4f14e4d14cccdb3
63e2d975b940af1a4ae7c80f7f6f7052
[
TrojanDownloader*Win32/Cutwail.BS
]
baa408ed5bf00d6bbc48d25119f9e412
[
SHeur4.BLIR
] [
PWS-Zbot-FBFS!BAA408ED5BF0
]
0c699bf8815137404fc43f6e56761ac8
[
Trojan.Dropper.VQH
] [
TrojanDownloader.Cutwail
] [
Trojan-FBGJ!0C699BF88151
] [
Trojan
] [
Trojan/Wigon.ph
] [
Malware
] [
Mal_DLDER
] [
Trojan.Downloader.Small-3221
] [
UnclassifiedMalware
] [
BackDoor.Bulknet.893
] [
TrojanDownloader:Win32/Cutwail.BS
] [
Virus.Win32.Heur.c
] [
BScope.Trojan.Cutwail.4512
] [
Win32/Wigon.PH
] [
W32/Pushdo.B!tr.bdr
]
eda12e74f2bad4b28fdd71781fe4eee8
[
Crypt2.BTUL
] [
TrojanDownloader*Win32/Cutwail.BS
]
66db43669a9cb80274d2ba6a1f44945e
[
TrojanDownloader*Win32/Cutwail.BS
]
b4252cc54a81b00ccdf1d01523d28209
[
Artemis!B4252CC54A81
] [
Trojan.Inject
] [
Trojan.Dropper
] [
Backdoor.Win32.Pushdo.qgg
] [
Win32.Hack.Pushdo.q.(kcloud)
] [
TrojanDownloader:Win32/Cutwail.BS
] [
Backdoor/Win32.Pushdo
] [
Backdoor.Win32.Pushdo
] [
W32/Pushdo.PYD!tr.bdr
] [
Trj/Dtcontx.E
]
DNS Resolutions
Date
IP Address
2013-06-19
202.39.72.2
(
ClassC
)
2025-01-07
103.123.243.21
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyDate: Sun, 27 Aug 2023 12:27:04 GMTServer: ApacheLocation: https://microtek.com/Content-Length: 229Content-Type: text/html; charsetiso-8859-1 !DOCTYPE HTML PUBLIC -//IETF//DTD HTML 2.0//EN>html>head>title>301 Moved Permanently/title>/head>body>h1>Moved Permanently/h1>p>The document has moved a hrefhttps://microtek.com/>here/a>./p>/body>/html>
Port 443
HTTP/1.1 307 Temporary RedirectDate: Sun, 27 Aug 2023 12:27:04 GMTServer: ApacheExpires: Thu, 19 Nov 1981 08:52:00 GMTCache-Control: no-store, no-cache, must-revalidatePragma: no-cacheSet-Cookie: ci_s div styleborder:1px solid #990000;padding-left:20px;margin:0 0 10px 0;>h4>A PHP Error was encountered/h4>p>Severity: Notice/p>p>Message: Undefined index: HTTP_ACCEPT_LANGUAGE/p>p>Filename: models/Lang_model.php/p>p>Line Number: 54/p> p>Backtrace:/p> p stylemargin-left:10px> File: /home/microtek/public_html/application/models/Lang_model.phpbr /> Line: 54br /> Function: _error_handler /p> p stylemargin-left:10px> File: /home/microtek/public_html/application/models/Lang_model.phpbr /> Line: 31br /> Function: accept_language /p> p stylemargin-left:10px> File: /home/microtek/public_html/application/core/Base_Controller.phpbr /> Line: 130br /> Function: get_lang /p> p stylemargin-left:10px> File: /home/microtek/public_html/application/core/Base_Controller.phpbr /> Line: 69br /> Function: process_lang /p> p stylemargin-left:10px> File: /home/microtek/public_html/application/controllers/Home.phpbr /> Line: 7br /> Function: __construct /p> p stylemargin-left:10px> File: /home/microtek/public_html/index.phpbr /> Line: 315br /> Function: require_once /p> /div>
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]