Skip to main content
Skip to main content
Microsoft Security Intelligence
Published Jun 18, 2010 | Updated Sep 15, 2017

Exploit:Win32/Pdfjsc.FO

Detected by Microsoft Defender Antivirus

Aliases: PDF/Exlpoit (AhnLab) PDF/Expl.HX (Command) Trojan-Dropper.VBS.Pdfka.a (Kaspersky) EXP/Pidief.fav (Avira) Exploit.PDF-Dropper.Gen (BitDefender) PDF/POS!exploit (CA) Exploit.PDF.888 (Dr.Web) Exploit.PDF-Dropper (Ikarus) Exploit-PDF.ck (McAfee) Exploit/PDF (Panda) Troj/PDFex-DO (Sophos) Exploit.PDF.LaunchExe (Sunbelt Software) Trojan.Pidief.J (Symantec) TROJ_PIDIEF.WU (Trend Micro)

Summary

Exploit:Win32/Pdfjsc.FO is the detection for a malicious PDF file that, when opened with a certain version of Adobe Acrobat or Reader, tries to execute a malicious batch script.
Manual removal is not recommended for this threat. To detect and remove this threat and other malicious software that may have been installed, run a full-system scan with an up-to-date antivirus product such as Microsoft Security Essentials, or the Microsoft Safety Scanner. For more information about using antivirus software, see http://www.microsoft.com/security/antivirus/av.aspx.
Get the latest computer updates
This threat may exploit vulnerabilities in Adobe Acrobat and Adobe Reader. To prevent this threat from re-infecting your computer, install the latest version of these programs from here.
Follow us