Help
RSS
API
Feed
Maltego
Contact
Domain > login.secure.emea.msn.com
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
Most users have voted this as
not malicious
Files that talk to login.secure.emea.msn.com
MD5
A/V
42a8a3a2ee1875c48adbb2e45b24a121
[
W32.AlwarevenQZ.Trojan
] [
Worm.AutoRun.aalc.n3
] [
Downloader-AZN.dr
] [
Worm.AutoRun.Win32.8401
] [
W32/AutoRun.afcb
] [
Trojan.Win32.AutoRun.gxnje
] [
W32/Heuristic-210!Eldorado
] [
W32.SillyDC
] [
DLoader.OJNU
] [
WORM_AUTORUN.TEO
] [
Worm.AutoRun!ng3M/aN0fN0
] [
Packed.Win32.UPack
] [
Trojan.PWS.Gamania.19081
] [
Heuristic.BehavesLike.Win32.Suspicious-BAY.G
] [
Mal/Autorun-C
] [
Trojan/Glox.d
] [
Trojan[:HEUR]/Win32.Unknown
] [
Win32.Troj.PopHot.c.(kcloud)
] [
TrojanSpy:Win32/Hitpop.AG
] [
Packed/Upack
] [
OScope.Trojan.Delf
] [
Trj/Pupack.A
] [
Win32/Spy.Pophot.NAO
] [
PE:Trojan.Win32.UnPack.a!1075261686
] [
Trojan.Win32.Glox
] [
W32/AUTORUN.AFB!worm
] [
PSW.Delf.2.BI
] [
Trojan.Win32.Pophot.BNAO
] [
Win32/Trojan.da6
]
f0d1779a489b17605710163396bd7bbe
[
Trojan.Win32.MulDrop3.bbtkhi
] [
Trojan.ADH.2
] [
UnclassifiedMalware
] [
Trojan.MulDrop3.5911
] [
TR/Strictor.10133
] [
Trojan/Win32.HDC
] [
Trojan.ADH
]
bdc152c84af8a87d5a95d09b6eb32131
[
Ransom-FBUV!BDC152C84AF8
] [
Trojan
] [
Trojan.Win32.Reveton.bsdcxb
] [
WS.Reputation.1
] [
UnclassifiedMalware
] [
Trojan.Reveton.57
] [
TR/Reveton.R.644
] [
Win32.Troj.Reveton.R.(kcloud)
] [
Trojan:Win32/Reveton.R
] [
Trojan/Win32.Reveton
] [
Win32/Reveton.R
] [
Win32.SuspectCrc
] [
W32/Reveton.R!tr
] [
Trojan.Reveton
] [
Trojan.Winlock
] [
Trojan.Reveton!8IFS7DAtelQ
] [
W32/ScriptInjector.A!tr
]
857a0a643312f31fa39d1dacb2e65223
9980bb50032f996ea12c9a6ba31e7864
[
Backdoor/W32.Poison.102400.BB
] [
Artemis!9980BB50032F
] [
Backdoor/Poison.bqhj
] [
Riskware
] [
W32/Trojan4.AAC
] [
Win32/Hupigon.FN
] [
Patched_c.IQH
]
25ebd7b09b79cac96891d9759f95fdaa
[
Backdoor/W32.Poison.102400.BA
] [
Heuristic.BehavesLike.Win32.Suspicious-BAY.K
]
278a1a8feb5d8d52c425e9df8bb79283
[
Trojan.FakeMS
] [
Win32.Troj.Kryptik.M.(kcloud)
] [
Spyware/Win32.Zbot
] [
Trojan.Win32.Kryptik.m
] [
W32/LockScreen.LOL!tr
]
558dd77209b56732ef5caa9a5d8cc8fc
d5f439b66e72e5bf79c9467611c2ec5a
[
OpenCandy
] [
Adware.Conduit.3
] [
Win32/OpenCandy
]
5e63e6ecba322f7d60c10236843a70e1
[
Worm.Win32.Fujack!O
] [
W32/Fujacks.ah
] [
Worm.AutoRun
] [
Trojan-Downloader.Win32.Small
] [
Trojan.Win32.Fujack.lwgy
] [
W32/SelfStarterInternetTrojan!M
] [
W32.Fubalca
] [
Smalltroj.BFXG
] [
Trojan.Small-1570
] [
Worm.Win32.Fujack.av
] [
Worm.Fujack!T8l/EwDWgE4
] [
Trojan.DownLoader.20808
] [
Mal/Dropper-AB
] [
Worm.MyInfect.az.106496
] [
Win-Trojan/Xema.variant
] [
Virus.Win32.Heur.l
] [
Worm.Fujack
] [
Trj/CI.A
] [
PE:Worm.Win32.Autorun.fng!1075221508
] [
Trojan-PWS.Win32.OnLineGames
] [
W32/Fujack.AV
] [
Worm/Butileg.M
] [
Worm.Win32.Fujack.ab
] [
Virus.Win32.Viking.LF
]
e7484514c0464642be7b4dc2689354c8
214e9d3e8e2f6a1c829117901ae5b420
[
Trojan-Spy.Win32.Pophot!O
] [
Trojan.Pophot.Win32.7289
] [
Trojan.Win32.Pophot.vkkrz
] [
W32.Hitapop
] [
Pophot.AKK
] [
TROJ_POPHOT.AEJ
] [
Trojan.Delf-8568
] [
TrojanSpy.Pophot!QuPJCISqbiI
] [
Trojan.Hitpop.2078
] [
Heuristic.BehavesLike.Win32.Suspicious-BAY.K
] [
TrojanSpy.Pophot.cro
] [
Trojan[Spy]/Win32.Pophot
] [
Trojan/Win32.Pophot
] [
TrojanSpy.Pophot
] [
PE:Trojan.Clicker.Win32.PopHot.eiv!1075208453
] [
Trojan-Spy.Win32.Pophot
] [
W32/Pophot.BGT!tr
] [
Corrupted
] [
Win32/Trojan.e6d
]
0d659de2643cc4adf422a59881072f20
[
TrojanDownloader.Tiny.r1
] [
Downloader.Tiny.Win32.2652
] [
Trojan/Downloader.Tiny.y
] [
Trojan.Win32.Tiny.vpyic
] [
W32/Downloader.VDA
] [
Downloader.Trojan
] [
Downloader
] [
Trojan-Downloader.Win32.Tiny.y
] [
Trojan.DL.Tiny!UkOU7NCEzxw
] [
TrojWare.Win32.TrojanDownloader.Tiny.~AI
] [
Trojan.DownLoader.7059
] [
Heuristic.BehavesLike.Win32.Suspicious-BAY.K
] [
Trojan/PSW.QQPass.zw
] [
Win-Trojan/Downloader.1650
] [
W32/Downloader-Sml!Eldorado
] [
BScope.Trojan-Spy.Zbot
] [
Trojan.Win32.Tiny.aucA
] [
PE:Trojan.DL.Small.ddk!1073970257
] [
W32/Tiny.A!tr.dldr
] [
Win32/PEPatch
] [
Trj/CI.A
] [
HEUR/Malware.QV
]
7981cf02da5f960b5154824f1870765b
[
W32.Virut.D
] [
Virus
] [
Virus.Win32.Virut.jxol
] [
Virut.AZOE
] [
Win32/Virut.10088.B
] [
PE_VIRUT.WY-3
] [
Win32:Virut
] [
W32.Virut.ci
] [
Virus.Win32.Virut.n
] [
Win32.Virut.H
] [
Virus.Win32.Virut.q
] [
Win32.Virut.5
] [
Heuristic.BehavesLike.Win32.Suspicious-BAY.K
] [
W32/Vetor-A
] [
Virus/Win32.Virut.n
] [
Win32.Virut.F.58880
] [
Virus:Win32/Virut.E
] [
Win32/Virut.C
] [
Virus.Virut.07
] [
Malware.Virut!rem
] [
Win32/Virut.F
] [
Virus.Win32.Virut
] [
W32/MetaCrypt.5
] [
Win32/Virut.Y
]
2751716cc70bc45fd910e3baff809a73
[
W32.Clod485.Trojan.4742
] [
W32/Pinkslipbot
] [
Trojan/PSW.Qbot.cgy
] [
Trojan.Win32.Qbot.eyzkt
] [
W32/Qakbot.AB
] [
Backdoor.Sdbot
] [
Win32/Qakbot.KJ
] [
BKDR_QAKBOT.SMG
] [
Trojan-PSW.Win32.Qbot.cgy
] [
Trojan.PWS.Qbot!9DSUkTx8LKg
] [
Mal/FakeAV-IU
] [
UnclassifiedMalware
] [
Trojan.DownLoader2.46642
] [
BDS/Qakbot.B.8
] [
Trojan/PSW.Qbot.jc
] [
Win32.PSWTroj.Qbot.c.(kcloud)
] [
Trojan.Win32.A.PSW-Qbot.267776.A[UPX]
] [
Trojan/Win32.Zbot
] [
W32/Qakbot.ANUV-8836
] [
Trojan.Zeus.EA.0999
] [
Trj/Qbot.AE
] [
Win32/Qbot.AN
] [
Trojan-PWS.Win32.Qbot
] [
W32/Qbot.CGY!tr.pws
] [
Luhe.Fiha.A
] [
Trojan.Win32.InfoStealer.avgA
]
02e3c20b44098ae1912c2a387a06f2fc
[
TROJ_AUTOTI.EOS
] [
UnclassifiedMalware
] [
Troj/Autoit-AIB
] [
Win32/Injector.Autoit.ALN
] [
Worm.Win32.AutoIt
]
c92f165c785930d8b5afe84084ed4034
[
Exploit.Comele.A
] [
Win32/DH{JVcANQ}
]
b0b933bd802bd6e0cd27c6c37299f126
[
Ransom-FBSH!B0B933BD802B
] [
Trojan.FavLock
] [
WS.Reputation.1
] [
Trojan-Ransom.Win32.Foreign.gzvs
] [
W32/Ransom.RT!tr
]
8f78b1665fd080ffc149f0ec7ec694cb
d8dfa157a09614c969373b7e421c103c
[
Win32/Adclicker.KL
] [
Trojan.Win32.Autoit.95736
] [
Trojan.Win32.Malware.a
] [
Troj/Bckdr-QPW
] [
W32/Bckdr.QPW!tr
]
Whois
Property
Value
Email
domains@microsoft.com
NameServer
NS2.MSFT.NET
Created
1994-11-10 00:00:00
Changed
2014-10-08 00:00:00
Expires
2022-06-04 00:00:00
Registrar
MARKMONITOR INC.