Keyword: URL
43719 Total Search   |   Showing Results : 21 - 40
BKDR_VAWTRAK.DOKR connects to this URL to send and receive commands from a remote malicious user. The URL is categorized as C&C server.
BKDR_VAWTRAK.DOKR connects to this URL to send and receive commands from a remote malicious user. The URL is categorized as a C&C server.
BKDR_VAWTRAK.DOKR connects to this URL to send and receive commands from a remote malicious user. This URL is categorized as a C&C server.
CVE-2006-0731 WmRoot/adapter-index.dsp in SAP Business Connector Core Fix 7 and earlier allows remote attackers to conduct spoofing (phishing) attacks via an absolute URL in the url parameter, which
malware/grayware or malicious users. NOTES: It will display the following webpage: It the user clicks the invoice ink, they will be redirected to the following URL which will download another file: http://{BLOCKED
TROJ_RENOS.SM10 connects to this malicious URL to send the gathered information, which may be used by the remote user for blackhat search engine optimization (SEO). This URL also hosts FAKEAV
TROJ_RENOS.SM10 connects to this malicious URL to send the gathered information, which may be used by the remote user for blackhat search engine optimization (SEO). This URL also hosts FAKEAV
TROJ_RENOS.SM10 connects to this malicious URL to send the gathered information, which may be used by the remote user for blackhat search engine optimization (SEO). This URL also hosts FAKEAV
TROJ_RENOS.SM10 connects to this malicious URL to send the gathered information, which may be used by the remote user for blackhat search engine optimization (SEO). This URL also hosts FAKEAV
TROJ_RENOS.SM10 connects to this malicious URL to send the gathered information, which may be used by the remote user for blackhat search engine optimization (SEO). This URL also host FAKEAV malware.
This malicious URL is related to BKDR_DLLBOT.A. The malware connects to this URL in order to receive commands from a remote malicious user. The commanded routine is then performed on the affected
The malware related to this URL connects to this URL to download a malicious file. <SPAN style="FONT-FAMILY: 'Times New Roman','serif'; FONT-SIZE: 12pt; mso-fareast-font-family: 'Times New Roman';
HTML_HTAPORN connects to this malicious URL which contains pornographic content. Upon viewing the page it displays {BLOCKED}1.{BLOCKED}re-movies.com , a URL that is possibly malicious and contains
It is used in a Facebook spam that tricks users who want to get free iPads into clicking the URL or copying and pasting the URL into their browser address bar. Doing so will automatically post the
It is used in a Facebook spam that tricks users who want to get free iPads into clicking the URL or copying and pasting the URL into their browser address bar. Doing so will automatically post the
It is used in a Facebook spam that tricks users who want to get free iPads into clicking the URL or copying and pasting the URL into their browser address bar. Doing so will automatically post the
It is used in a Facebook spam that tricks users who want to get free iPads into clicking the URL or copying and pasting the URL into their browser address bar. Doing so will automatically post the
It is used in a Facebook spam that tricks users who want to get free iPads into clicking the URL or copying and pasting the URL into their browser address bar. Doing so will automatically post the
This URL is a phishing site that spoofs Apple's iTunes store. It is possible that the said URL is sent via email and has a subject pertaining to the renewal of iTunes account. Users are then
server URL}" HKEY_CURRENT_USER\UDP !alt! = "{obfuscated alternate C&C server URLs}" When the browser loads a web page, it checks if the URL is defined in HKEY_CURRENT_USER\UDP\c . If the URL is defined, it