Help
RSS
API
Feed
Maltego
Contact
Domain > www.jsgla.com
×
Welcome!
Right click nodes and scroll the mouse to navigate the graph.
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
Files that talk to www.jsgla.com
MD5
A/V
1242cecff2a12449fde10fcb62c0d47d
[
TrojanDDoS.Nitol.B4
] [
Trojan.DownLoader10.14956
] [
Win32/ServStart.DL
] [
W32/Staser.CP!tr
] [
DoS.CUN
] [
Trojan.Win32.ServStart
] [
Trojan.Win32.Staser.qyy
] [
Obfuscated-FQG!hb
] [
DDoS*Win32/Nitol.B
] [
Suspicious.Emit
] [
TROJ_NITOL.SMJ
] [
BScope.P2P-Worm.Palevo
]
8d4442c52aee286f4315217515520aa4
[
HW32.ScpSenexe.ciis
] [
Artemis!8D4442C52AEE
] [
Trojan.ServStart
] [
Virus
] [
Trojan
] [
W32/NewMalware-Rootkit-I-based!
] [
WS.Reputation.1
] [
Startpage.ALTD
] [
UnclassifiedMalware
] [
DLOADER.Trojan
] [
Win32.Troj.Undef.(kcloud)
] [
Trojan/Win32.Swisyn
] [
BScope.P2P-Worm.Palevo
] [
Backdoor.Win32.Farfli
] [
W32/ServStart.DD
] [
Rozena
]
2a3f3800011bffcbf695c27ec9d65eaf
[
TR/Rogue.9527662
] [
Trojan.PWS.Gamania.42680
] [
Win32/Farfli.AEJ
] [
W32/Zegost.LT!tr
] [
Trojan.FakePutt
] [
BackDoor-AWQ!2A3F3800011B
] [
Backdoor*Win32/Zegost.BX
] [
Backdoor.Farfli!4858
]
d06d911d9cdcf71a5be985d058cbc4e3
[
W32.OnGamesLT180912HKGHAAI.Trojan
] [
Artemis!D06D911D9CDC
] [
Trojan-Downloader
] [
W32/Behav-Heuristic-060
] [
Suspicious.MH690.A
] [
Startpage.ALTD
] [
Cryp_Xed-12
] [
Suspicious!SA
] [
Packed.Win32.UPack
] [
Mal/Behav-031
] [
Packed.Win32.MUPACK.~KW
] [
Trojan.Inject1.29007
] [
Heuristic.BehavesLike.Win32.Suspicious-BAY.G
] [
Win32.Troj.Undef.(kcloud)
] [
Packed/Upack
] [
BScope.P2P-Worm.Palevo
] [
Trj/Pupack.A
] [
DoS.CVH
]
24177b3a1f8007b16958e4c5c3ed5c87
[
TrojanDDoS.Nitol.B4
] [
Trojan.DownLoader10.14956
] [
Win32/ServStart.DL
] [
W32/Staser.CP!tr
] [
DoS.CUN
] [
Trojan.Win32.ServStart
] [
Trojan.Win32.Staser.qyy
] [
Obfuscated-FQG!hb
] [
DDoS*Win32/Nitol.B
] [
Suspicious.Emit
] [
TROJ_NITOL.SMJ
] [
BScope.P2P-Worm.Palevo
]
0f189d1fc07885b6603aec57e5d390e4
[
TR/Rogue.9527662
] [
Trojan.PWS.Gamania.42680
] [
Win32/Farfli.AEJ
] [
W32/Zegost.LT!tr
] [
Trojan.FakePutt
] [
BackDoor-AWQ!0F189D1FC078
] [
Backdoor*Win32/Zegost.BX
] [
Backdoor.Farfli!4858
] [
Backdoor.Trojan
]
021df0c2f1b9aa40ec1d1c8af2baf7fc
[
TR/Rogue.9527662
] [
Trojan.PWS.Gamania.42680
] [
Win32/Farfli.AEJ
] [
W32/Zegost.LT!tr
] [
Trojan.FakePutt
] [
BackDoor-AWQ!021DF0C2F1B9
] [
Backdoor*Win32/Zegost.BX
] [
Backdoor.Farfli!4858
]
22a62e32bb0903cf5bda871179daa456
[
TrojanDDoS.Nitol.B4
] [
Trojan.DownLoader10.14956
] [
Win32/ServStart.DL
] [
W32/Staser.CP!tr
] [
DoS.CUN
] [
Trojan.Win32.ServStart
] [
Trojan.Win32.Staser.qyy
] [
Obfuscated-FQG!hb
] [
DDoS*Win32/Nitol.B
] [
Suspicious.Emit
] [
TROJ_NITOL.SMJ
] [
BScope.P2P-Worm.Palevo
]
0a059981b69fa9d1cf80e8e0f4b00d73
[
TrojanDDoS.Nitol.B4
] [
Trojan.DownLoader10.14956
] [
Win32/ServStart.DL
] [
W32/Staser.CP!tr
] [
DoS.CUN
] [
Trojan.Win32.ServStart
] [
Trojan.Win32.Staser.qyy
] [
Obfuscated-FQG!hb
] [
DDoS*Win32/Nitol.B
] [
Suspicious.Emit
] [
TROJ_NITOL.SMJ
] [
BScope.P2P-Worm.Palevo
]
a433203c2a9197268c0f35b500dff784
d52a8103b4b14f808ab259a3086e638e
[
Trojan.8848F9C2AF58FCE5
] [
Backdoor.Overie!486D
] [
Troj/Nitol-R
] [
Trojan.ServStart
] [
DDoS*Win32/Nitol.B
] [
Trojan.Win32.Nitol.Ad
] [
Win32/Nitol.BG
] [
DoS-FAB!D52A8103B4B1
] [
Trojan.Nitol.A
] [
Trojan.Servstart.1312
] [
Trojan.DownLoader9.28506
] [
Trojan.Win32.Scar.glhp
] [
Win.Trojan.Servstart-495
] [
Win32/ServStart.AD
] [
SHeur4.AJCX
] [
Trojan.Win32.Patcher
] [
W32/Scar.GKRE!tr
] [
Trojan.Scar.Win32.70347
] [
TROJ_NITOL.SMJ
]
Whois
Property
Value
Email
712c52fd33ddb2069428aaf08d09d15f-1930186@contact.gandi.net
NameServer
B.DNS.GANDI.NET
Created
2015-02-26 00:00:00
Changed
2015-02-26 00:00:00
Expires
2016-02-26 00:00:00
Registrar
GANDI SAS