Help
RSS
API
Feed
Maltego
Contact
Domain > iicsdrd.com
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
Reports
http://ransomwaretracker.abuse.ch/feeds/csv/
https://otx.alienvault.com/pulse/56b2251167db8c168...
https://otx.alienvault.com/pulse/56e85de34637f24cb...
https://ransomwaretracker.abuse.ch/downloads/RW_UR...
https://techhelplist.com/spam-list/1039-money-tran...
Files that talk to iicsdrd.com
MD5
A/V
a01d37a1ba32af8947db3359408faf21
[
Ransom.FileLocker
] [
Trojan.Cryptlock.N!g2
] [
BehavesLike.Win32.PWSZbot.dh
]
95713fe27cf3d4ab43af566e836a6534
[
Trojan.Cryptlock.N!g2
] [
BehavesLike.Win32.Expiro.fh
]
41661762466bbc7fd3a4886542f70f35
d35f8ac998d1ab023127ce95c88b4e6d
[
BackDoor-FDCH!D35F8AC998D1
]
24677dec505cb7e2e2f91f476b8bc17e
[
Trojan.MalPack.PK
] [
BehavesLike.Win32.Virut.gh
]
676fcfb2195d844c7aefce89c4e80068
[
RDN/Ransom
] [
Win32/Filecoder.TeslaCrypt.I
] [
Uds.Dangerousobject.Multi!c
] [
BehavesLike.Win32.Sality.hc
] [
TR/Crypt.Xpack.445332
] [
Ransom:Win32/Tescrypt
] [
Trojan/Win32.Teslacrypt
] [
Trj/TeslaCrypt.A
] [
Trojan.Win32.Filecoder
] [
Malicious_Behavior.VEX.99
] [
Trojan.Win32.TeslaCrypt.I
]
e16fcc441c52abaabdf0299ce9f9c067
[
Mal/Ransom-EC
] [
Trojan/Win32.Teslacrypt
]
1feb0edc49c0bf671f01d01e7adf6641
51f4e19a5af56e53fb310e5225e62820
[
Uds.Dangerousobject.Multi!c
] [
Trojan.Symmi.DEC96
] [
Mal/Ransom-EC
] [
Trojan/Win32.Teslacrypt
]
da03f4e79364a9c817ee87b4a852d22f
7705d87ced655fa6a46055c2a21682a0
[
Artemis!7705D87CED65
] [
Ransom.CryptoWall
] [
Troj.Banker.W32.Shifu!c
] [
Trojan.Win32.Encoder.eadukr
] [
Trojan.Cryptolocker.N
] [
Trojan-Banker.Win32.Shifu.atv
] [
Trojan.Win32.U.Ransom.868352[h]
] [
Trojan.Encoder.3797
] [
Artemis
] [
TR/AD.TeslaCrypt.Y.198
] [
Ransom:Win32/Tescrypt.H
] [
Trojan/Win32.Teslacrypt
] [
Trj/CI.A
] [
Trojan.Win32.Injector
] [
W32/Shifu.ATV!tr
] [
Win32/Trojan.4f3
]
daa35d0da3b98e054c1ba8f848918930
[
Win32/Filecoder.TeslaCrypt.I
] [
Ransom_CRYPTESLA.YUYAHL
] [
Trojan-Banker.Win32.Shifu.atw
] [
Trojan.Win32.U.TeslaCrypt.524288[h]
] [
Troj.Banker.W32.Shifu!c
] [
Trojan.Encoder.3801
] [
Ransom_CRYPTESLA.YUYAHL
] [
BehavesLike.Win32.Sality.hc
] [
W32/TeslaCrypt.I!tr
] [
Trojan.Cripack.1
] [
Trojan/Win32.Teslacrypt
] [
Artemis!DAA35D0DA3B9
] [
Trojan-Random.TeslaCrypt3
] [
Trj/RansomCrypt.E
]
a3e3e0da87c9b12495731f75995bcb48
c2aafa02d36fd6cb0e513425869af77a
965e35b8c1f797372fc12dd69ab2cf74
[
Mal/Ransom-EC
] [
Trojan/Win32.Teslacrypt
]
c5bb44f96a9528e38f269953706350b3
e074d377c476fd85af72a6b5b89c70f5
[
Artemis!E074D377C476
] [
Suspicious.Cloud.2
] [
Win32/Filecoder.TeslaCrypt.I
] [
BehavesLike.Win32.Sality.hc
] [
Trojan.Symmi.DEC96
] [
Trojan/Win32.Teslacrypt
]
ea1d5fc176c61ba1c990ffb618f4fca6
[
Troj.Banker.W32.Shifu!c
] [
Trojan.Cripack.1
] [
Trojan-Banker.Win32.Shifu.aua
] [
Win32.Trojan.Bp-dropperv.Bzmy
] [
Trojan.AVKill.59847
] [
BehavesLike.Win32.FakeSecTool.hc
] [
TR/Crypt.Xpack.445448
] [
Trojan[Banker]/Win32.Shifu
] [
Ransom:Win32/Tescrypt
] [
Trojan/Win32.Teslacrypt
] [
Win32/Filecoder.TeslaCrypt.I
] [
Trojan.Win32.Filecoder
] [
Malicious_Behavior.VEX.99
] [
FileCryptor.GUQ
]
a32dfbffac8ac42de7364239953282ce
[
TR/Crypt.Xpack.445558
] [
Win32/Kryptik.ENJR
] [
Trojan.Cryptolocker.N
] [
W32/Kryptik.ENFX!tr
] [
Ransom*Win32/Tescrypt.E
] [
Trojan.MalPack.PK
] [
Trojan.Win32.Crypt
] [
Trojan-Ransom.Win32.Bitman.hxk
] [
TROJ_FORUCON.BMC
] [
Mal/Wonton-BZ
] [
Trojan.Encoder.3813
]
c2c337b603020dc1a7de7acbe12b7f1b
[
Trojan.Rovnix.C
] [
Trojan.Rovnix.C
] [
Trojan.Encoder.3813
] [
Trojan.Rovnix.C
] [
Troj/Ransom-CDI
] [
Trojan-Ransom.Win32.Bitman.ibq
] [
Trojan.Win32.Crypt
] [
Trojan.Rovnix.C
] [
Trojan.MalPack.PK
] [
Trojan.Rovnix.C
] [
Ransom*Win32/Tescrypt.E
] [
Trojan.Rovnix.C
] [
Malicious_Behavior.VEX.93
] [
Trojan.Cryptolocker.N
] [
Crypt5.AHIX
] [
Win32/Kryptik.ENJR
] [
Trojan.Rovnix.C
] [
TR/Crypt.Xpack.445555
]
Whois
Property
Value
NameServer
NS2.SITE4NOW.NET
Created
2007-11-29 00:00:00
Changed
2015-12-06 00:00:00
Expires
2016-11-29 00:00:00
Registrar
GODADDY.COM, LLC