Keyword: JS_SMALL
6026 Total Search   |   Showing Results : 4481 - 4500
TSPY_ZBOT.TEW connects to this URL(s) to download its configuration file.
JS_QBOT.AB connects to this URL.
JS_QBOT.AB connects to this URL.
JS_QBOT.AB connects to this URL.
JS_QBOT.AB connects to this URL.
JS_QBOT.AB connects to this URL.
JS_QBOT.AB connects to this URL.
This URL is related to JS_IFRAME.OYA.
This URL is used in a phishing attack that specifically targets clients of Khaleeji Commerical Bank. The phishing email informs clients that they need to log into their online account to activate and
JS_SHELLCOD.SMGU accesses this URL to download TROJ_LAMECHI.D.
JS_SHELLCOD.SMGU may be downloaded from this URL.
JS_SHELLCOD.SMGU accesses this URL to download TROJ_DLOADR.DAM.
JS_SHELLCOD.SMGU accesses this URL to download PE_PARITE.A.
JS_SHELLCOD.SMGU accesses this URL to download TROJ_GAMETHI.FMS.
JS_SHELLCOD.SMGU accesses this URL to download TSPY_ARDAMAX.HR.
JS_PIDIEF.XF executes certain files from this site.
related to HTML_AGENTT.AMF.
This malicious website is used in a Facebook clickjacking attack. The page hosts a spoofed YouTube page in Italian. Users who click the play button will inadvertently take part in the spamming
The site {BLOCKED}0.85.172/bl.js may redirect to this site. This site is related to the fake Osama bin Laden video spam in Facebook.
Shortened URL that points to the site� http://{BLOCKED}count.info/end.php . This is related to the malware JS_FBOOK.VTG and the fake Osama bin Laden video attack in Facebook .