Keyword: PDF_FAREIT
5499 Total Search   |   Showing Results : 381 - 400
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
fake message inside the PDF tricking the users to click on the link: Dropped by other malware, Downloaded from the Internet, Spammed via email Connects to URLs/IPs, Displays windows
}tasunik.com/wordpress/personal/realestategj/oohay.php https://{BLOCKED}tasunik.com/wordpress/personal/realestategj/rehto.php It does the following: When users click the link on the PDF file, it accesses the said URL which is a phishing site, asking to
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
CVE-2009-0658 Buffer overflow in Adobe Reader 9.0 and earlier, and Acrobat 9.0 and earlier, allows remote attackers to execute arbitrary code via a crafted PDF document, related to a non-JavaScript
CVE-2007-5020 Unspecified vulnerability in Adobe Acrobat and Reader 8.1 on Windows allows remote attackers to execute arbitrary code via a crafted PDF file, related to the mailto: option and Internet
execute arbitrary code via a crafted PDF file. Microsoft Malware Protection Engine,Microsoft Windows Antigen,Microsoft Windows Defender,Microsoft Windows Forefront Security,Microsoft Windows Live OneCare
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this writing, the said sites are
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this writing, the said sites are
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. Arrival Details This Trojan arrives as an attachment to email messages spammed by other
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the downloaded files. As a result, malicious
to the following File Transfer Protocol (FTP) sites: ftp.{BLOCKED}h.com sherrif.{BLOCKED}3.com Other Details This spyware opens the following files: %All Users Profile%\Msn\Msn2\pic.pdf - decoy PDF
information %Temp%\NfIpv6.ocx - also detected as BKDR_NFLOG %Temp%\checkup.exe - also detected as BKDR_NFLOG %User Temp%\word.doc - non-malicious DOC file %User Temp%\±ØÒª.pdf - non-malicious PDF file %Temp%
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It takes advantage of software vulnerabilities to allow