This threat may be encountered when visiting a malicious webpage or by viewing malicious HTML content containing the exploit.
If the exploit runs on a vulnerable computer, it could result in the download and execution of arbitrary files from the following website:
Analysis by Tim Liu
There are no common symptoms associated with this threat. Alert notifications from installed antivirus software may be the only symptoms.