Keyword: PDF_FAREIT
5499 Total Search   |   Showing Results : 2001 - 2020
in memory to make memory string analysis harder. NOTES: This backdoor displays the following PDF file via Chrome: Trojan.Python.Agent.ag (Kaspersky) Dropped by other malware, Downloaded from the
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be manually installed
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It steals certain information from the system and/or
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive
}/pki/mscorp/crl/MSIT%20Machine%20Auth%20CA%202(1).crl Other Details This is the Trend Micro detection for: Infected PE_URSNIF.A-O containing the non-malicious PDF file from the affected system It does the following: It
infector infects the following file types: MS Office Files (.doc, .xls, .ppt, .mdb) Adobe PDF Files (.pdf) Archive Files(.zip, .rar) Program Application Files (.exe) Image Files (.gif, .png, .bmp, .jpg )
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
pct pdb pdd pdf pef pem pfx php pl plc pot potm potx ppam pps ppsm ppsx ppt pptm pptx prf ps psafe3 psd pspimage pst ptx py qba qbb qbm qbr qbw qbx qby r3d raf rar rat raw rdb rm rtf rw2 rwl 3dm 3ds 3fr
This spyware arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
PDF document, as demonstrated by 2008-HI2.pdf. Adobe Acrobat_Reader 3.0,Adobe Acrobat_Reader 4.0,adobe acrobat_reader 4.0.5,adobe acrobat_reader 4.5,adobe acrobat_reader 5.0,adobe acrobat_reader
for a PDF file with a null terminator (%00) followed by a long string. Adobe Acrobat 5.0,Adobe Acrobat 5.0.5,Adobe Acrobat 6.0,Adobe Acrobat 6.0.1,Adobe Acrobat 6.0.2,Adobe Acrobat Reader 5.0,Adobe
This spyware arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be unknowingly downloaded by a user while visiting malicious websites. It is
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
Exploit kits such as Angler Exploit Kit and Nuclear Exploit Pack have been updated to include one of the recent Hacking Team Flash zero-day vulnerabilities. Magnitude Exploit kit, in particular,
This Trojan modifies registry entries to disable various system services. This action prevents most of the system functions to be used. It connects to certain websites to send and receive
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It takes advantage of unknown vulnerabilities in certain software to download malicious
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the dropped file(s). As a result, malicious