Help
RSS
API
Feed
Maltego
Contact
Domain > www.l52m.com
×
Welcome!
Right click nodes and scroll the mouse to navigate the graph.
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
Files that talk to www.l52m.com
MD5
A/V
64d8b413b2f5f3842e6126b398f62ab5
[
Trojan.Dropper.RIL
] [
Trojan.Dropper.RIL
] [
Trojan.Dropper.RIL
] [
Trojan.Dropper.RIL
] [
W32/Trojan.CFMM
] [
Trojan.Dropper-2316
] [
Trojan.Dropper.RIL
] [
Trojan.Dropper.RIL
] [
Trojan.MulDrop.11143
] [
BehavesLike.Win32.Ipamor.cc
] [
W32/Trojan.ELEP-3813
] [
PWS:MSIL/Kelopol.B
] [
Trojan.Dropper.RIL
] [
Win32/AdClicker.GD
] [
Trojan.Dropper.RIL
] [
Trojan.Staser
] [
Trojan.Win32.Dropper.abn
] [
W32/Dropper.WF!tr
] [
Trojan.Win32.Dropper.wf
] [
Win32/Trojan.7a4
]
5e1fa65677a1051954371ec05edbaea2
[
Trojan/W32.ServStart.32768.C
] [
Trojan.Nitol.A8
] [
Artemis!5E1FA65677A1
] [
Trojan.Dropper
] [
Posible_Worm32
] [
Trojan.MicroFake!Nyu0d5RIIDk
] [
Downloader
] [
WORM_NITOL.SMB0
] [
Trojan.Win32.ServStart.akz
] [
Trojan.Win32.ServStart.cwayzx
] [
TrojWare.Win32.Scar.GLHP
] [
Trojan.DownLoader9.45593
] [
WORM_NITOL.SMB0
] [
BehavesLike.Win32.Ipamor.nh
] [
Troj/Nitol-R
] [
W32/Dloadr.DNE!tr
] [
Trojan/Win32.MicroFake.rz
] [
Trojan.Kazy.D9BC6E
] [
Trojan/Win32.ServStart
] [
DDoS:Win32/Nitol.B
] [
Trojan.ServStart
] [
Trojan.ServStart.CE
] [
Trojan.Win32.FakeLpk.aad
] [
Trojan.Win32.MicroFake
] [
PSW.OnlineGames4.BBOB
]
0a8926c9bb51236adc4c613d941ee60a
[
Trojan.Sisproc.G4
] [
Trojan.Staser
] [
Posible_Worm32
] [
W32/Trojan2.OLBU
] [
Win32/Yoddos.BU
] [
Trojan.Win32.StartServ.wbc
] [
Trojan.Win32.Staser.ddshvy
] [
Mal/Behav-031
] [
UnclassifiedMalware
] [
Trojan.Yoddos.Win32.390
] [
W32/Trojan.CJAT-6108
] [
W32/Yoddos.BU!tr
] [
Trojan/Win32.Staser
] [
Trojan.Heur.JP.fmKfa8P0ave
] [
Trojan:Win32/Wepiall.A
] [
Trojan.Staser
] [
Trojan.Yoddos.BU
] [
Win32.Trojan.Startserv.Gvp
] [
Trojan.Win32.Yoddos
] [
SHeur4.CAAQ
] [
Trojan.Win32.Yoddos.BU
] [
Win32/Trojan.f66
]
15b11a92b38a041ebbec544a7ed15d46
1dfbb4ac59c9f8cbf42cc90264705b5d
[
Trojan.Win32.Sdbot.drsjzf
]
79e9fd6ac556f3c6cf2658ddaa4640cb
[
W32.Clode38.Trojan.b9a1
] [
Backdoor.SdBot.r5
] [
RDN/Sdbot.worm!cf
] [
Trojan.Win32.Sdbot.drsjzf
] [
TROJ_COPYER.F
] [
Backdoor.Win32.Sdbot.aepa
] [
Backdoor.Win32.A.Sdbot.109568.A[h]
] [
UnclassifiedMalware
] [
Trojan.DownLoader13.16657
] [
Backdoor.SdBot.Win32.14671
] [
TROJ_COPYER.F
] [
RDN/Sdbot.worm!cf
] [
W32/Trojan.FXHK-0978
] [
Trojan.Kazy.D772A3
] [
Trojan/Win32.MDA
] [
Trojan:Win32/Bulta!rfn
] [
Backdoor.Sdbot
] [
Win32.Backdoor.Sdbot.Aljd
] [
Win32.SuspectCrc
] [
Win32/DH{gRJMgRMDDwA1ICQifTZQCg}
] [
Backdoor.Win32.Sdbot.aepa
] [
Win32/Trojan.6cc
]
1ea2c756a0f0528d2e80ab204aa9de0b
[
W32.WaltesoO.Trojan
] [
Trojan.Rincux.AW
] [
Trojan/W32.Rincux.57344.F
] [
Trojan.Win32.Staser!O
] [
Trojan.ServStart.A
] [
Trojan.Rincux.AW
] [
Trojan.ServStart
] [
Trojan.Rincux.AW
] [
Trojan.Staser!
] [
W32/A-3f87e513!Eldorado
] [
Trojan.Rincux
] [
Trojan.Win32.Staser.cjbrez
] [
PE:Trojan.Staser!6.70B[F1]
] [
Trojan.Rincux.AW
] [
TrojWare.Win32.Staser.PEQ
] [
Trojan.Rincux.AW
] [
Trojan.DnsAmp.1
] [
Trojan.Staser.Win32.627
] [
DoS-FAK!1EA2C756A0F0
] [
Troj/Sdbot-DQA
] [
W32/A-3f87e513!Eldorado
] [
Trojan[:HEUR]/Win32.Unknown
] [
Win32.HeurC.KVM005.a.(kcloud)
] [
Trojan.Rincux.AW
] [
DDoS:Win32/Nitol.B
] [
DoS-FAK!1EA2C756A0F0
] [
Trojan.StartSrv.2115
] [
Win32.Trojan.Staser.Ecba
] [
Trojan.Rincux.AW
] [
Trojan.Win32.Staser.peq
] [
Win32/Trojan.d74
]
2214977136c3cb900241958d26888815
[
Win32.Ramnit
] [
RmnDrp*Win32*RmnDrp
] [
Win32.Ramnit
] [
W32/Ramnit.B
] [
W32/Ramnit.A
] [
Win32.Ramnit
] [
Win32.Ramnit
] [
Win32/Ramnit.A
] [
W32.Ramnit.A
] [
W32.Ramnit-1
] [
Win32.Rmnet
] [
Win32.Ramnit
] [
W32/Ramnit.C
] [
W32/Ramnit.B
] [
Win32.Ramnit
] [
DDoS.Win32.Nitol
] [
Virus.Win32.Nimnul.a
] [
Trojan.ServStart
] [
W32/Ramnit.a
] [
Virus*Win32/Ramnit.A
] [
Win32.Ramnit
] [
Virus.Win32.Nimnul.aa
] [
Win32.Ramnit.a
] [
W32/Patched-I
] [
W32.Ramnit!inf
] [
PE_RAMNIT.H
] [
Virus.60E8000000005D8BC5.mg
] [
Virus.Win32.Nimnul.a
]
2456d45da236d45dfddea031e5c5b205
e4924ca5392df192708d9821fa4409c7
[
W32.Sality.PE
] [
Win32.Sality.3
] [
Virus/W32.Sality.D
] [
W32.Sality.U
] [
Win32.Sality.3
] [
W32.Virut.CF
] [
Win32/Sality.NBA
] [
PE_SALITY.RL
] [
Win32:Kukacka
] [
Virus.Win32.Sality.beygb
] [
Win32.Sality.3
] [
Mal/Sality-D
] [
Win32.Sality.3
] [
Win32.Sector.30
] [
Virus.Sality.Win32.25
] [
PE_SALITY.RL
] [
BehavesLike.Win32.Sality.dc
] [
Win32.Sality.ab.173464
] [
Virus:Win32/Sality.AU
] [
Win32.Sality.3
] [
Win32/Kashu.E
] [
Win32.Sality.3
] [
Win32/Sality.AA
] [
Win32.Sality.3
] [
Virus.Win32.Sality.bakb
] [
Win32.Sality
] [
Win32.Virus.Sality.Akes
] [
Trojan.Win32.DDos
] [
Win32/Sality
] [
W32/Sality.AA
] [
Virus.Win32.Sality.I
]
a84ad82ad5bd19ad362d0e9fac5083a9
[
W32.Sality.PE
] [
Win32.Sality.3
] [
Virus/W32.Sality.D
] [
W32.Sality.U
] [
Virus.Sality.Win32.25
] [
Win32.Sality.3
] [
W32.Sality.AE
] [
Win32/Sality.NBA
] [
PE_SALITY.RL
] [
Win32:SaliCode
] [
Virus.Win32.Sality.beygb
] [
Win32.Sality.3
] [
Mal/Sality-D
] [
Win32.Sality.3
] [
Win32.Sector.30
] [
PE_SALITY.RL
] [
BehavesLike.Win32.Sality.cc
] [
W32/Sality.AT
] [
Virus:Win32/Sality.AU
] [
Win32.Sality.3
] [
Win32/Kashu.E
] [
Win32.Sality.3
] [
Win32/Sality.AA
] [
Win32.Sality.3
] [
Virus.Win32.Sality.bakb
] [
Win32.Sality
] [
Win32.Virus.Sality.Lmas
] [
Virus.Win32.Virut
] [
Win32/Sality
] [
W32/Sality.AA
] [
Virus.Win32.Sality.I
]
Whois
Property
Value
Email
913541748@qq.com
NameServer
F1G1NS2.DNSPOD.NET
Created
2014-05-17 00:00:00
Changed
2014-08-02 00:00:00
Expires
2015-05-17 00:00:00
Registrar
1 API GMBH