Help RSS API Feed Maltego Contact                        

Domain > dresser.com

More information on this domain is in AlienVault OTX

Is this malicious?

Files that talk to dresser.com

MD5A/V
1cc0cfa5485d814b67ace50cb0a5b100[HW32.CDB.E978] [Kryptik.CDQY] [UnclassifiedMalware] [Trojan.Packed.26527] [Backdoor:Win32/Kelihos] [W32/Trojan.KUPJ-3598] [Heur.Trojan.Hlux] [Win32.SuspectCrc] [W32/Hlux.BWUN!tr.bdr] [Crypt_s.GKU]
1929530a1f2d6d48a87aac928220e460[HW32.CDB.4199] [Backdoor.Hlux.r3] [Trojan.Win32.Hlux.cwwgjj] [Kryptik.CCFN] [Backdoor.Win32.Hlux.crc] [Backdoor.Hlux!GJ0f5FTmyog] [UnclassifiedMalware] [BackDoor.Slym.14056] [Heuristic.LooksLike.Win32.Suspicious.E] [Mal/Kelihos-A] [Trojan[Backdoor]/Win32.Hlux] [Trojan:Win32/Sisron] [Trojan/Win32.Tepfer] [Heur.Trojan.Hlux] [Win32.SuspectCrc] [W32/Hlux.BWUN!tr.bdr] [Crypt_s.GJB] [Trojan.Win32.Kryptik.BZWV] [Win32/Trojan.e55]
2cea2302f3f5c4280a6990e4e1965a60[Backdoor.Hlux.r3] [Trojan.Win32.Hlux.cxceyl] [Kryptik.CCFN] [TROJ_SPNR.36DM14] [Backdoor.Win32.Hlux.djbj] [Backdoor.Hlux!4usFCOdA3iI] [Trojan.Win32.S.PSW-Tepfer.835600.DB] [Mal/Kelihos-A] [TrojWare.Win32.Kryptik.BLUU] [Trojan.PWS.Stealer.12891] [TR/Kryptik.oeons] [Trojan[Backdoor]/Win32.Hlux] [Backdoor:Win32/Kelihos.F] [Trojan/Win32.Tepfer] [Heur.Trojan.Hlux] [Trojan.Win32.Kryptik.BZDO] [Trojan.Crypt_s] [W32/Hlux.BZDO!tr.bdr] [Crypt_s.GGV] [Win32/Trojan.fec]
9844a1b8a10ed4568240ae7a528bef5d[HW32.CDB.Bf28] [Backdoor.Kelihos] [Malware.Packer.OCD] [Trojan.PWS.Tepfer!vHSA+Pr89Pk] [Kryptik.CCFN] [Win32/Kelihos.baJHSHD] [Trojan-PSW.Win32.Tepfer.tokd] [Trojan.Win32.Kryptik.cvtteo] [UnclassifiedMalware] [BackDoor.Slym.13304] [TR/Crypt.EPACK.53967] [Mal/Kelihos-A] [Backdoor:Win32/Kelihos] [Trojan/Win32.Tepfer] [Heur.Trojan.Hlux] [Trojan.Crypt_s] [W32/FakeAv.BWUN!tr] [Crypt_s.GCT] [Trojan.Win32.InfoStealer.AZ] [Win32/Trojan.65e]
462b7c4b2b5db7dbd9c6531eed3bcea1[HW32.CDB.13b2] [Backdoor.Hlux.r3] [Kryptik.CCFN] [Backdoor.Win32.Hlux.djae] [Backdoor.Hlux!S3hIEdaLTpA] [Mal/Kelihos-A] [TrojWare.Win32.Kryptik.BLUU] [BackDoor.Slym.14044] [TR/Kryptik.oeons] [Trojan[Backdoor]/Win32.Hlux] [Backdoor:Win32/Kelihos.F] [Trojan/Win32.Tepfer] [W32/Trojan.HBIJ-4969] [Heur.Trojan.Hlux] [Trojan.Win32.Kryptik.BZDO] [Trojan.Crypt_s] [W32/Hlux.BWUN!tr.bdr] [Crypt_s.GGV]
9d52b8bb0f293d6adf237b964078d566[HW32.CDB.63e2] [Backdoor.Hlux.r3] [Trojan.Win32.Kryptik.cwzoag] [Kryptik.CCFN] [Backdoor.Win32.Hlux.dnld] [Backdoor.Hlux!zgxT2bGF2IQ] [UnclassifiedMalware] [Trojan.Packed.26544] [Heuristic.LooksLike.Win32.Suspicious.E] [Mal/FakeAV-UF] [Backdoor:Win32/Kelihos] [Trojan/Win32.Tepfer] [W32/Trojan.HFNJ-2013] [Heur.Trojan.Hlux] [Trojan.Win32.Kryptik.CASL] [Win32/Kryptik.CASL] [Backdoor.Win32.Kelihos] [W32/Hlux.CASL!tr.bdr] [Crypt_s.GMK]
56b02dc8b8072c1f787058a56eae64f0[HW32.CDB.9b1c] [Backdoor.Hlux.r3] [Trojan.Win32.Hlux.cwhrmp] [Kryptik.CCFN] [Backdoor.Win32.Hlux.djkd] [Mal/Kelihos-A] [TrojWare.Win32.Kryptik.BZOO] [Trojan.DownLoad3.28912] [Trojan[Backdoor]/Win32.Hlux] [Backdoor:Win32/Kelihos] [Trojan/Win32.Tepfer] [Heur.Trojan.Hlux] [Trojan.Crypt_s] [W32/Hlux.BWUN!tr.bdr] [Crypt_s.GHE] [Trojan.Win32.Kryptik.BZIX] [Win32/Trojan.ef7]
2c2371e95bb5d87ccd5d19a114492f70[HW32.CDB.18af] [Packed.Win32.Katusha.3!O] [WS.Reputation.1] [Kryptik.CDQY] [TrojWare.Win32.Kryptik.CBCJ] [BackDoor.Slym.13873] [Backdoor:Win32/Kelihos.F] [Trojan/Win32.Tepfer] [Heur.Trojan.Hlux] [Backdoor.Win32.Kelihos] [Crypt_s.GNC] [Trojan.Win32.Kryptik.CBCJ] [Win32/Trojan.0de]

Whois

PropertyValue
NameDomain Administrator
Organization General Electric Company
Email domain.admin@ge.com
Address 3135 Easton Turnpike
Zip Code 06828-0001
City Fairfield
State CT
Country US
Phone +1.2033732962
Fax +1.2033732962
NameServer pdns5.ultradns.info
Created 1995-09-01 04:00:00
Changed 2015-08-27 05:53:38
Expires 2016-08-31 00:00:00
Registrar CSC CORPORATE DOMAIN