Hi forum friends,
See the list: http://www.blade-defender.org/eval-lab/
example: 58d250aa7f4ba35217c7d285daf02949 2010-05-17 Eleonore Exploits pack v1.4.1 FF3 11/41 (26.83%) TR/Crypt.ZPACK.Gen Blocked MD hxxp://allnettraf.com/
allnettraf*com
Summary
•Computer Threats: 1
General Info: Web Site Location Ukraine
allnettraf*com
Threat Report
Total threats found: 1
Small-whitebg-red Virus
Threats found: 1
Here is a complete list:
Threat Name: Trojan.FakeAV!gen27
Location: htxp://allnettraf.com/ve5rf/load.php?spl=java_gsb&h=
Searching because the software isn't released yet:
You can search the list online.
I give an example here, where I entered the hxxp address into google for: hxxp://testforus.com/pdf.php which has: Trojan.Win32.SuspectCRC!IK
with the following search results
http://www.google.nl/#hl=nl&source=hp&q ... 0068b179f4
unmasked parasites: http://www.google.com/safebrowsing/diag ... tforus.com
http://www.freepcsecurity.co.uk/2010/04 ... -april-12/
Folks see why we cannot do without NS and RP in the Fx and flock browser
luntrus
BLADE Malicious URL Analysis
BLADE Malicious URL Analysis
Mozilla/5.0 (Windows; U; Windows NT 6.0; en-US; rv:1.9.0.16) Gecko/2010010414 Firefox/3.0.16 Flock/2.5.6
Re: BLADE Malicious URL Analysis
Folks see why we cannot do without NS and RP in the Fx and flock browser
Dude...don't forget SeaMonkey!
Dude...don't forget SeaMonkey!

Mozilla/5.0 (Windows; U; Windows NT 6.0; en-US; rv:1.9.1.9) Gecko/20100317 SeaMonkey/2.0.4