Search
Keyword: PDF_FAREIT
malicious users. Installation This Trojan drops and executes the following files: %User Temp%\alg.exe - BKDR_ETUMBOT.O %User Temp%\error.pdf - non-malicious PDF opened by the malware to hide its malicious
TROJ_WIMMIE.BYE (Note: %Program Files% is the default Program Files folder, usually C:\Program Files.) It drops the following non-malicious file: %User Temp%\Adobe-.pdf - non malciious PDF file opened by the
This specially crafted PDF takes advantage of a vulnerability in U3D implementation in certain versions of Adobe Reader and Acrobat . After successfully exploiting the said vulnerability, it drops an
This .PDF file poses as a harmless document that bore the titles "25th Annual Huntsville Post SAME Golf Tournament" and "Tibetan New Year". It specifically targets
This specially crafted PDF takes advantage of a Stack-based buffer overflow in CoolType.dll in certain versions of Adobe Reader and Acrobat . After successfully exploiting the said vulnerability, it
legitimate .PDF password recovery software called "Advanced PDF Password Recovery Pro". It allows a user to use the registered version of the software without purchasing it.
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes then deletes itself afterward. It executes the dropped file(s). As a result,
\NfIpv6.ocx - also detected as BKDR_NFLOG %Temp%\checkup.exe - also detected as BKDR_NFLOG %User Temp%\word.doc - non-malicious DOC file %User Temp%\±ØÒª.pdf - non-malicious PDF file %Temp%\YahooCache.ini
information %Temp%\NfIpv6.ocx - also detected as BKDR_NFLOG %Temp%\checkup.exe - also detected as BKDR_NFLOG %User Temp%\word.doc - non-malicious DOC file %User Temp%\±ØÒª.pdf - non-malicious PDF file %Temp%
information %Temp%\NfIpv6.ocx - also detected as BKDR_NFLOG %Temp%\checkup.exe - also detected as BKDR_NFLOG %User Temp%\word.doc - non-malicious DOC file %User Temp%\±ØÒª.pdf - non-malicious PDF file %Temp%
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. Arrival Details This Trojan arrives as an attachment to email messages spammed by other
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This file infector arrives on a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the dropped file(s). As a result, malicious
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This malware was involved in a malicious spam attack targeting Walmart customers on May 2013. It takes advantage of certain vulnerabilities to download and execute malware onto affected systems,
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan may be downloaded unknowingly by a user when visiting malicious website(s). Arrival Details This Trojan may be downloaded unknowingly by a user when visiting the following malicious
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a