Keyword: HTML_FPSYME
5722 Total Search   |   Showing Results : 3161 - 3180
This URL is used in a phishing attack that specifically targets clients of Khaleeji Commerical Bank. The phishing email informs clients that they need to log into their online account to activate and
JS_SHELLCOD.SMGU accesses this URL to download JS_EXPLOIT.ADA.
TROJ_FAKEAV.HAMP may be unknowingly downloaded by a user while visiting this website.
TROJ_FAKEAV.HAMP may be unknowingly downloaded by a user while visiting this website.
TROJ_FAKEAV.HAMP may be unknowingly downloaded by a user while visiting this website.
TROJ_FAKEAV.HAMP may be unknowingly downloaded by a user while visiting this website.
TROJ_FAKEAV.HAMP may be unknowingly downloaded by a user while visiting this website.
TROJ_FAKEAV.HAMP may be unknowingly downloaded by a user while visiting this website.
TROJ_FAKEAV.HAMP may be unknowingly downloaded by a user while visiting this website.
related to HTML_AGENTT.AMF.
related to HTML_IFRAME.ALR.
This is the URL where recipients of the Dubai First spam are redirected to when they click the link in the message body.
The URL is related to HTML_FAKETUBE.A.
This URL is related to HTML_FAKETUBE.A.
The URL is related to HTML_FAKETUBE.A.
the URL is related to HTML_FAKETUBE.A.
The URL is related to HTML_FAKETUBE.A.
The URL is related to HTML_FAKETUBE.A.
The URL is related to HTML_FAKETUBE.A.
TSPY_PIRMINAY.A sends its gathered information to this site.