Keyword: HTML_FPSYME
5718 Total Search   |   Showing Results : 3221 - 3240
TROJ_DLOAD.BTN may compose spammed messages which contain a link to this site. This Trojan uses the London Olympics 2012 to lure users into executing the malware.
TROJ_DLOAD.BTN may compose spammed messages which contain a link to this site. This Trojan uses the London Olympics 2012 to lure users into executing the malware.
TROJ_DLOAD.BTN may compose spammed messages which contain a link to this site. This Trojan uses the London Olympics 2012 to lure users into executing the malware.
This website is a phishing URL for Banco de Oro. Similar to other phishing sites, it also displays fake login page to steal user's credentials and use it for other malicious activities.
Users are redirected to this site in order to purchase a product key for a supposed hacking tool for Facebook . This supposed hacking tool is malware detected as SPYW_FAKEHACK.
TROJ_DLOAD.BTN may compose spammed messages which contain a link to this site. This Trojan uses the London Olympics 2012 to lure users into executing the malware.
TROJ_DLOAD.BTN may compose spammed messages which contain a link to this site. This Trojan uses the London Olympics 2012 to lure users into executing the malware.
Hackers attacked Bureau of Food and Drugs (BFAD) Philippines' website to lead users to a series of redirections, including this malicious URL.
TROJ_ZBOT.ESF accesses this site to download its configuration file.
TROJ_DLOADR.ZTZ and TROJ_DLOADR.ZUA connect to this possibly malicious URL.
HTML_PORN connects to this malicious URL which contains pornographic content. The page only displays an Apache 2 test page.
HTML_HTAPORN connects to this malicious URL which contains pornographic content. Upon viewing the page it displays {BLOCKED}1.{BLOCKED}re-movies.com , a URL that is possibly malicious and contains
HTML_HTAPORN connects to this malicious URL which contains pornographic content.
HTML_PORNY connects to this malicious URL which contains pornographic content.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the downloaded files. As a result, malicious
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies the Internet Explorer Zone Settings. It
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It adds registry entries to enable its automatic