Keyword: PDF_FAREIT
5499 Total Search   |   Showing Results : 1801 - 1820
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This file infector arrives on a
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. Arrival Details This Trojan arrives as an attachment to email messages spammed by other
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the dropped file(s). As a result, malicious
\NfIpv6.ocx - also detected as BKDR_NFLOG %Temp%\checkup.exe - also detected as BKDR_NFLOG %User Temp%\word.doc - non-malicious DOC file %User Temp%\±ØÒª.pdf - non-malicious PDF file %Temp%\YahooCache.ini
information %Temp%\NfIpv6.ocx - also detected as BKDR_NFLOG %Temp%\checkup.exe - also detected as BKDR_NFLOG %User Temp%\word.doc - non-malicious DOC file %User Temp%\±ØÒª.pdf - non-malicious PDF file %Temp%
This malware was involved in a malicious spam attack targeting Walmart customers on May 2013. It takes advantage of certain vulnerabilities to download and execute malware onto affected systems,
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan may be downloaded unknowingly by a user when visiting malicious website(s). Arrival Details This Trojan may be downloaded unknowingly by a user when visiting the following malicious
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This is a Trend Micro heuristic detection for suspicious Portable Document files (PDF) with embedded JavaScripts that may exploit vulnerabilities. If your Trend Micro product detects a file under
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This specially crafted PDF takes advantage of a vulnerability in U3D implementation in certain versions of Adobe Reader and Acrobat . After successfully exploiting the said vulnerability, it drops an
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This is the Trend Micro detection for files that exhibit certain behaviors. Other Details This is the Trend Micro detection for: PDF files that contain malicious JavaScript code. Malicious JavaScript
This Trojan arrives as an embedded .SWF file in bodies of malicious .DOC/.PDF files which Trend Micro detects as any of the following: TROJ_MDROP.WMP TROJ_PIDIEF.SMDX It aids in helping its main
Installation This Trojan drops and executes the following files: %User Temp%\ {malware name}.pdf - non-malicious .PDF file %User Temp%\ offer.exe - detected as TROJ_PROTUX.BB (Note: %User Temp% is
This is a Trend Micro detection for specially crafted .JPG, .PNG, .SWF, .PDF, .BMP and .GIF picture files that contains an iframe pointing to the possibly malicious websites. This Trojan arrives as
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a user while visiting malicious websites. It is a specially crafted PDF file
This Trojan is a specially crafted PDF file which when viewed or executed, may allow a malicious user to take control over an affected system. Other Details This specially crafted PDF file contains