Help RSS API Feed Maltego Contact                        

Domain > ch00669804.vicp.net

More information on this domain is in AlienVault OTX

Is this malicious?

Files that talk to ch00669804.vicp.net

MD5A/V
d6c3727c67f1ccd1a0b7f59ac58c82a4[0x59077bb8] [Trojan.0001#3200@1F83EC@.mg] [Win32/Yoddos.BB] [Trojan*Win32/Dynamer!ac] [W32/Trojan.ADWS-5205] [Virus.Win32.Ramnit] [BackDoor.Bulknet.1287]
5cc638c4f204383bc26d1ced189fb17a[BackDoor.Bladabindi.1056] [Virus.ILCrypt] [W32/Trojan.GIDO-1117] [Backdoor.XTRat] [MSIL8.PXX]
5a9f76153b8a3f10413d539efe08dc2e[Trojan.DownLoader10.49831] [Worm.AutoRun.Win32.105652] [Virus.Win32.Ramnit] [Trojan.0001#3200@1F83EC@.mg] [W32/Yoddos.BJ!tr] [W32/Trojan.GUNY-5697] [Win32/Yoddos.BJ]
90e78c0bf5649d7627300e51a0e443c5[LNK/Stuxnet.A] [Exploit*W32/WormLink.B] [Exploit.Cpllnk] [Exploit.Lnk.CVE-2010-2568.a] [Exploit.LNK.CVE-2010-2568] [PIF.StuxNet.A] [Exp/Cplink-A] [EXPL_CPLNK.SM] [Downloader.OpenConnection.JS.133524] [Exploit.CVE20102568] [CVE-2010-2568!Camelot] [Exploit*Win32/CplLnk.A] [LNK/ShellLink.CVE20102568!exploit] [Bloodhound.Exploit.343] [Exploit.LNK] [LNK/Exploit.CVE-2010-2568] [Runner*LNK*Runner] [Virus.4C0000000114020000.mg] [EXP/CVE-2010-2568.A] [Exploit-CVE2010-2568!lnk]
46e5d9135444076a1f980155f4bfc74e[W32/Gamarue.a!lnk] [Worm.Win32.Gamarue] [Mal/Bundpil-LNK]
96bd5b7c4a06ee9cd6d57bcb442df503[Trojan.0001#3200@1F83EC@.mg] [Win32/Yoddos.BJ] [W32/Yoddos.BJ!tr] [W32/Trojan.ATLE-5711] [Virus.Win32.Ramnit] [Worm.AutoRun.Win32.105652] [Trojan.DownLoader10.49831]
5c03a3220b638117c8b5ae225b8195e2[0x5904b58b] [Trojan.SkypeSpam.11] [Trojan.MSIL5] [W32/Trojan.FKCL-6199] [Backdoor*Win32/Fynloski.A] [MSIL/Injector.ELJ!tr] [MSIL8.CIGC] [MSIL/Injector.FIL]

Whois

PropertyValue
Email domain@oray.com
NameServer NS2.EXHERA.COM
Created 2001-08-15 00:00:00
Changed 2014-03-29 00:00:00
Expires 2018-08-15 00:00:00
Registrar SHANGHAI BEST ORAY I