Keyword: PDF_FAREIT
5498 Total Search   |   Showing Results : 281 - 300
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
This spyware arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It does not have any backdoor routine. It deletes itself after execution. Arrival Details
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this writing, the said sites are
This spyware may be dropped by other malware. It uses certain lists of user names and passwords to access password-protected shared files. It connects to certain websites to send and receive
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be dropped by other malware. It connects to
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be dropped by other malware. It does not have
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan Spy arrives on a system
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan Spy arrives on a system
We recently received samples of a malicious spam campaign that uses a malicious PDF attachment as its malware infection vector. The mail itself has no body content and appears to be sent from a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the dropped file(s). As a result, malicious
specially-crafted PDF that exploits a certain vulnerability in Adobe Reader and Acrobat . Once successful, it drops an embedded executable file. It then runs the malware and as a result, the malicious routines of the
malicious users. Installation This Trojan drops the following files: %User Temp%\Winword.exe - TROJ_DROPPR.ECZ %User Temp%\Adobe.pdf - non-malicious PDF opened by the malware to hide its malicious routine
\iso88591 - non-malicious component file %User Temp%\110830g.pdf - non-malicious PDF opened by the malware to hide its malicious routine %User Temp%\Acrobat.exe - TROJ_DROPPER.QUB (Note: %User Temp% is the
following files: %User Temp%\SVCHOST.EXE - TSPY_BRICKS.A %User Temp%\hi.pdf - non-malicious PDF opened by the malware to hide its malicious routine %Current%\iso88591 - non-malicious component file (Note:
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It executes
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
\bootstrap_20243.html %Program Files%\is55187.log %User Temp%\0000D820.log %User Temp%\0000D82F.log %User Temp%\icreinstall\{malware file name} %Desktop%\Continue PDF Reader Installation.lnk %User Temp%\0000DFE0.log