Keyword: HTML_ADODB
5728 Total Search   |   Showing Results : 3241 - 3260
Users are redirected to this site in order to purchase a product key for a supposed hacking tool for Facebook . This supposed hacking tool is malware detected as SPYW_FAKEHACK.
TROJ_DLOAD.BTN may compose spammed messages which contain a link to this site. This Trojan uses the London Olympics 2012 to lure users into executing the malware.
TROJ_DLOAD.BTN may compose spammed messages which contain a link to this site. This Trojan uses the London Olympics 2012 to lure users into executing the malware.
Hackers attacked Bureau of Food and Drugs (BFAD) Philippines' website to lead users to a series of redirections, including this malicious URL.
TROJ_ZBOT.ESF accesses this site to download its configuration file.
TROJ_DLOADR.ZTZ and TROJ_DLOADR.ZUA connect to this possibly malicious URL.
HTML_PORN connects to this malicious URL which contains pornographic content. The page only displays an Apache 2 test page.
HTML_HTAPORN connects to this malicious URL which contains pornographic content. Upon viewing the page it displays {BLOCKED}1.{BLOCKED}re-movies.com , a URL that is possibly malicious and contains
HTML_HTAPORN connects to this malicious URL which contains pornographic content.
HTML_PORNY connects to this malicious URL which contains pornographic content.
This Trojan may be hosted on a website and run when a user accesses the said website. It redirects browsers to certain sites. Arrival Details This Trojan may be hosted on a website and run when a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies the Internet Explorer Zone Settings. It
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It adds registry entries to enable its automatic
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the downloaded files. As a result, malicious
This Trojan has two embedded .SWF files in its body that it uses to exploit CVE-2011-0611. The two .SWF files are detected as SWF_EXPLOIT.WS. If exploit is successful, it drops files. This Trojan
It monitors specific URLs. If users access these monitored sites, they are redirected by this malware to specific malicious sites. This Trojan may be dropped by other malware. Arrival Details This
This specially crafted .DOC file takes advantage of a vulnerability in certain versions of Adobe Flash Player to drop an embedded .SWF file detected by Trend Micro as SWF_DROPPER.A. This Trojan