Help RSS API Feed Maltego Contact                        

Domain > mmm.com.hk

More information on this domain is in AlienVault OTX

Is this malicious?

Files that talk to mmm.com.hk

MD5A/V
7a5fb88ddb1cea30ca364bf5e7834499[Trojan/Win32.Banker] [Trojan.Win32.Banload.BTEW]
70b30203776a2c78c80e62990eed02d4[PUP.Optional.InstallBrain.A] [Win32/Tnega.PTFMNQB] [Application.Win32.TinyExeGun.~A] [Trojan.DownLoader9.5231] [PFS/PCPerformer.casd]
0b639fa7a19f5b40dda4cc60fe0f0bd1[W32.excCloud16a.PE] [Win32.VJadtre.3] [Virus.Win32.Otwycal.1!O] [W32.Otwyacal.C] [W32/Simfect] [Virus.Win32.Otwycal.dszex] [W32.Wapomi.C!inf] [Win32/Wapomi.CD] [PE_WAPOMI.SM] [W32.Virus.Wapomi-1] [Virus.Win32.Otwycal.a] [Virus.Win32.Wapomi.AA] [Win32.HLLP.Protil.1] [W32/Jadtre.A] [Heuristic.LooksLike.Win32.SuspiciousPE.C] [W32/Patched-AG] [Win32/Protil.e] [Virus/Win32.Otwycal.a] [Win32.Otwycal.xp.112128] [Virus:Win32/Mikcer.A] [Win32.Otwycal.A] [Virus.Otwycal.a] [Win32/Wapomi.AA] [Win32/Wapomi] [Virus.Win32.Otwycal.$a] [Virus.Win32.Downloader.AB]
78b0bb09b897107ca673b8e7280cebf8
b986eaad1a36e10a7dc48bd77c88377d[W32.Vetor.PE] [Virus.Win32.Virut.1!O] [W32.Virut.G] [Virus.Virut.Win32.1938] [Virus.Win32.Virut.hpeg] [W32.Virut.CF] [Virut.HL] [Win32/Virut.17408] [PE_VIRUX.R] [Win32:Vitro] [Virus.Win32.Virut.ce] [Win32.Virut.AM] [Win32.Virut.56] [Heuristic.BehavesLike.Win32.ModifiedUPX.C!87] [W32/Scribble-B] [Win32/Virut.bt] [Virus/Win32.Virut.ce] [Win32.Virut.dd.368640] [Virus:Win32/Virut.BO] [Win32/Virut.F] [Virus.Virut.14] [W32/Sality.AO] [Win32/Virut.NBP] [PE:Win32.Virut.ec!1608462] [Virus.Win32.Virut] [W32/Virut.CE] [Virus.Win32.Virut.$NBP] [Virus.Win32.Virut.M]
fac8fe0626f4c887a5670da6df604b94
0703f623020420c80a7486aacb310cf0[HW32.CDB.9496] [Backdoor/W32.ZAccess.136192.BA] [ZeroAccess-FBE!0703F6230204] [Rootkit.0Access.ED] [Trojan.Win32.MaxplusENT.cxbwih] [Trojan.Zeroaccess.C] [Kryptik.CCES] [TROJ_KRYPTK.SML1] [TrojWare.Win32.Kryptik.BKPE] [BackDoor.MaxplusENT.13183] [TR/Sirefef.ploona] [Troj/ZAccess-QI] [Backdoor/ZAccess.ujl] [Trojan[Backdoor]/Win32.ZAccess] [Win32.Hack.ZAccess.dt.(kcloud)] [Trojan:Win32/Sirefef.P] [Backdoor.ZAccess] [PE:Malware.XPACK-HIE/Heur!1.9C48] [Trojan.Win32.Sirefef] [W32/Kryptik.Y!tr] [Win32/Trojan.bfa]
0437aec443cd8a8dac775699ec0e71a0[HW32.CDB.8795] [Artemis!0437AEC443CD] [WS.Reputation.1] [TrojWare.Win32.Injector.jm2] [Trojan.Click2.35671] [Adware/Rogue.683817.10] [Heuristic.LooksLike.Win32.Suspicious.C] [Win32.Troj.Undef.(kcloud)] [Trj/CI.A] [AdWare.SuspectCRC] [SHeur4.BUPE]
f2659a552502fbffc315f399f8a1f67d
142ba0fee7df666be4bd20d3636d7f60[W32.NeshtaB.PE] [Win32.Neshta.A] [Virus/W32.Neshta] [Virus.Win32.Neshta!O] [W32.Neshta.A] [W32/HLLP.41472.e] [W32/HLLP.41472] [W32.Neshuta] [Neshta.C] [Win32/Neshta.A] [PE_NESHTA.A-O] [W32.Neshuta.A] [Virus.Win32.Neshta.a] [Trojan.Win32.Neshta.cwfstr] [Win32.HLLP.Neshta] [Virus.Neshta.Win32.1] [W32/Neshta.A] [Heuristic.BehavesLike.Win32.Suspicious.H] [W32/Bloat-A] [Virus.Neshta.a] [Virus/Win32.Neshta.a] [Win32.Troj.Neshta.c.(kcloud)] [Virus:Win32/Neshta.A] [Win32.Neshta.B] [Win32/Neshta] [Virus.Win32.Neshta.$a] [PE:Win32.Netsha.a!411233] [Virus.Win32.Neshta] [Worm/Delf.FF] [W32/Neshta.A.worm] [VirusOrg.Win32.Neshta.A]
dd8cd66e031610784b3ceb9db386e756[W32.ConfickerMT10BC.Worm] [Worm/W32.Kido.165220.B] [Net-Worm.Win32.Conficker.1!O] [W32/Conficker.worm] [Worm.Conficker] [W32/Kido.ih] [Trojan.Win32.Kido.imftj] [W32.Downadup] [Conficker.FA] [TROJ_SPNR.0CGS13] [Worm.Kido!UDxV70FoN/I] [Worm.Win32.Conficker.165220] [NetWorm.Win32.Kido.A] [Trojan.Click2.23086] [TROJ_SPNR.21H913] [Mal/Conficker-A] [Worm[Net]/Win32.Kido] [Worm:Win32/Conficker.C] [Worm/Win32.Conficker] [Worm.Win32.kido.110] [W32/Conficker.C.worm] [W32/Kido.IH!tr] [Worm/Downadup] [Win32/Worm.a79]
063a3c5479cb7819c4567967287a4df1[MW.Clod9fd.Trojan.e689] [Exploit.JS.PDF.EE] [Exploit.PDF.Jsc.YP] [Exploit.Script.Pdfka.hpbmn] [Trojan.Pidief] [Exploit.AAL] [PDF/Pidief.AJK] [TROJ_PIDEX.SML] [Exploit.Pdfka-22] [JS.A.EX-Pdfka.135268.F] [Exploit.JS.Pdfka.cuc] [Exploit.PDF.2635] [EXP/Pidief.amp] [HEUR_PDFJS.UNREF] [Heuristic.BehavesLike.PDF.Exploit-CRT.O] [Troj/ExpJS-EL] [Exploit:Win32/Pdfjsc.YP] [PDF/Exploit] [PDF/Exploit.Pidief.PHG] [NORMAL:Hack.Exploit.MalPDF.a!1609222] [Exploit.JS.Pdfka] [PDF/PDFKa!tr] [Script/PDF.Exploit.CU] [JS.PDF.collectEmailInfo.2]
45719d29d45b105b7e7039aa8583d321[HW32.CDB.D094] [Trojan.Dropper.VHT] [W32.Ramnit.DR] [Trojan.Downloader] [Trojan.Win32.Ramnit.bbgdmp] [Ramnit.Y] [Trojan.Slugin-1] [Packed.Win32.Krap.ar] [Trojan.Kryptik!vfuEx8yPmlY] [Worm.Win32.A.Net-Koobface.126464] [PE:Trojan.Ramnit!6.150] [TrojWare.Win32.Kryptik.ILZ] [Trojan.Inject1.32497] [TROJ_DROPPR.SMAL] [Heuristic.BehavesLike.Win32.Suspicious-BAY.K] [Mal/Ramnit-ZZ] [Packed.Krap.druy] [Trojan[Packed]/Win32.Krap] [Trojan:Win32/Ramnit.A] [Trojan/Win32.Krap] [W32/Cosmu.E.drp] [Win32/Ramnit.A] [Trojan.Win32.Koobface.udb] [Virus.Win32.Ramnit] [W32/KRYPTIK.FH!tr] [Cryptic.BJE] [VirusOrg.Win32.Ramnit.E]
37a988a39b1b1ce3af281c07691669c0[W32.Missenl.Trojan] [Trojan/W32.Lebag.100212] [Trojan.Win32.Lebag!O] [Trojan.Ramnit.A] [Trojan.Zbot.Win32.31767] [Trojan.Win32.Baidu.wyvyb] [Kryptik.PWR] [Win32/Ramnit.CB] [Trojan.Kazy-3818] [Trojan.Win32.Lebag.ssr] [Trojan.Win32.Lebag.145780] [Troj/Ramnit-AK] [Trojan.Click2.40916] [TR/Spy.ZBot.web] [TROJ_KRYPTK.SMB] [Heuristic.BehavesLike.Win32.Suspicious-BAY.K] [Trojan[Spy]/Win32.Zbot] [Trojan:Win32/Ramnit.A] [Trojan/Win32.Zbot] [Trojan.Lebag.ssr] [Win32/Ramnit.A] [PE:Trojan.Win32.Lebag.a!1075350448] [Trojan.Win32.Ramnit] [W32/Kryptik.KBU!tr] [Trojan.Win32.Lebag.aJ] [VirusOrg.Win32.Ramnit.I]
1b72ca04d10a75da4b1e52f7c27cec36[Trojan.Win32.MicroFake!O] [Trojan.ServStart.A4] [Artemis!1B72CA04D10A] [Trojan.ServStart] [Trojan.Win32.MicroFake.cafca] [Backdoor.Trojan] [Nitol.A] [Trojan.Win32.MicroFake.qt] [Trojan.Win32.A.MicroFake.31744] [TrojWare.Win32.TrojanDownloader.Small.CO] [Trojan.DownLoader5.19250] [Trojan.MicroFake.Win32.34] [TR/Nitol.blanu] [TROJ_NITOL.SMJ] [Trojan/Win32.MicroFake] [Win32.Troj.DeepScan.x.(kcloud)] [DDoS:Win32/Nitol.A] [Trojan/Win32.Mircofake] [Trojan.Win32.Scar.sgh] [Trojan.Win32.ServStart] [W32/MicroFake.HU!tr] [DDoS.AC] [Trojan.Win32.FakeMS.ayQ] [Win32/Trojan.0a6]
09b41c2670562121b4ff72db59050cba[PUP-FID!09B41C267056] [WS.Reputation.1] [not-a-virus:AdWare.Win32.MultiPlug.bei] [Trojan.Win32.Crossrider.cwpxlg] [Application.Win32.Multiplug.R] [Trojan.Crossrider.12895] [MultiPlug] [GrayWare[AdWare:not-a-virus]/Win32.MultiPlug] [AdWare.MultiPlug] [Win32/AdWare.MultiPlug.V] [PE:Malware.MultiPlug!6.13CF] [AdWare.Win32.CostMin] [Riskware/PUP]
8848faf95f1068b66d2150cd875ab3d0[Trojan.Script.Dinihou.cnmtqi]
e4d82e110a1e9b35197c6b1b452e216e
374a7545eff41d254698649ccbf5d484[W32.HfsAdware.BC3C] [CryptInno] [PUP.Optional.InstallCore] [W32/A-6c5f2e7b!Eldorado] [Win.Adware.Installcore-624] [Riskware.Win32.InstallCore.ddoubm] [Application.Win32.Installcore.IO] [Trojan.Packed.25266] [BehavesLike.Win32.CryptInno.jc] [W32/A-6c5f2e7b!Eldorado] [GrayWare[Adware]/Win32.installcore.nz] [Win32.Application.InstallCore.CZ] [Riskware/InstallCore] [Adware.Win32.InstallCore.ZU]
4578507ed37099c8d655f53bdddf4e5d[Downloader.OpenConnection.JS.153785] [susp.swf.cve-2015-7645.1]

Whois

PropertyValue
NameMINI MICRO METHODS LTD
Email wbrack@MMM.COM.HK
Country HK
NameServer NS2.BBRACK.ORG
Created 1995-12-14 00:00:00
Expires null
Registrar Hong Kong Domain Nam

DNS Resolutions

DateIP Address
2018-11-28107.150.96.213 (ClassC)
2021-02-18107.150.102.158 (ClassC)
2025-08-1243.241.73.70 (ClassC)

Subdomains

DateDomainIP
mail.mmm.com.hk2025-06-2943.241.73.70
ftp.mmm.com.hk2025-06-2943.241.73.70
www.mmm.com.hk2025-07-0143.241.73.70
View on OTX | View on ThreatMiner








Data with thanks to AlienVault OTX, VirusTotal, Malwr and others. [Sitemap]



� Copyright 2019 AlienVault, Inc. | Legal| Status| Do Not Sell My Personal Information