Home > General > HeurEngine.MaliciousExploit

HeurEngine.MaliciousExploit

Compressed file Inner file SHA256: b82a3f6913795f82901c8f4248d2ec7c04d3411e85fb0c164401bc01beaa5e2b File name: pdf4.pdf Detection ratio: 11 / 43 Analysis date: 2012-01-28 01:11:51 UTC ( 5 years ago ) Analysis File detail Relationships Additional information Comments Pondus Avast Überevangelist Maybe Bot Posts: 31702 Re: Suspicious files, please check « Reply #2 on: June 22, 2010, 01:59:45 PM » Reply from AviraThe file '2010_worldcup.xls' has been determined to Cancel Sign in × Cookies are disabled! No VirusTotal Community member has commented on this item yet, be the first one to do so! http://pcialliance.org/general/heurengine-zerodaythreat.html

Only registered users can leave comments, sign in and have a voice! Mobile Malware Google Group CURRENT PDF THREATS - Malware Tracker Defcon 18 Materials (CD)- 2010 Las Vegas Black Hat USA 2010 (Las Vegas and DC) materials ************** ViCheck.ca - Malware check Find out more about VirusTotal Community. This site is completely free -- paid for by advertisers and donations. https://forums.techguy.org/threads/heurengine-maliciousexploit.953019/

This site requires cookies to be enabled to work properly Community Statistics Documentation FAQ About Join our community Sign in English Català Dansk Deutsch English Español Français Hrvatski Italiano Magyar Nederlands In order to check a file, please submit it to ThreatExpert. Such determination can only be made by observing its dynamic behaviour.

Post comment You have not signed in. Logged Chief Wiggum: Uh, no, you got the wrong number. Email: Recover password Cancel × Join VirusTotal Community Interact with other VirusTotal users and have an active voice when fighting today's Internet threats. Xecure lab discovers new variant of CVE-2014-4114 in Taiwan APT attacks (CVE-2014-4114 with APT Malware Embedded ) 2 years ago XyliBox Citadel 0.0.1.1 (Atmos) 11 months ago Search This Blog Malware

Pages Home Search the Interwebs Mobile and print friendly view | Friday, June 15, 2012 CVE-2012-1875 links and samples CVE-2012-1875 Internet Explorer 8 exploit has been publicly available from various sources Blog Archive ► 2016 (4) ► August (2) ► March (1) ► February (1) ► 2015 (6) ► August (1) ► May (1) ► March (1) ► February (2) ► January If you're not already familiar with forums, watch our Welcome Guide to get started. More comments Leave your comment... ?

About Contagio Mobile aka "take a sample, leave a sample" Contagio mobile mini-dump is a part of contagiodump.blogspot.com. This site requires cookies to be enabled to work properly Community Statistics Documentation FAQ About Join our community Sign in English Català Dansk Deutsch English Español Français Hrvatski Italiano Magyar Nederlands FileSearch: ThreatExpert's awareness of the file "msmgr.exe": Across all ThreatExpert reports, the file "msmgr.exe" was mostly identified as a threat. Short URL to this thread: https://techguy.org/953019 Log in with Facebook Log in with Twitter Log in with Google Your name or email address: Do you already have an account?

Note that many legitimate flash files may also use it to implement rich content and animations. http://www.threatexpert.com/threats/backdoor-win32-ircbot-gen.html Are you looking for the solution to your computer problem? plodr replied Feb 10, 2017 at 3:44 PM Loading... HeurEngine.MaliciousExploit Discussion in 'Virus & Other Malware Removal' started by bhatbhai, Sep 28, 2010.

Compressed file Inner file SHA256: 748f4fa260fd5bda95f9c97dac290b475eb45831ec5299ea8cabaeabd4b2806e File name: file-1165410_bin Detection ratio: 16 / 38 Analysis date: 2010-06-17 12:35:43 UTC ( 6 years, 8 months ago ) View latest Analysis File detail Join our site today to ask your question. No, create an account now. May 31 - Tinba / Zusy - tiny banker trojan ► May (6) ► April (7) ► March (3) ► February (2) ► January (1) ► 2011 (77) ► December (1)

We could not find any malicious content. CVE-2012-1875 links and samples 90 CVE-2012-0158 documents for testing and researc... In that case we will not adjust and remove detection for this damaged file. Click here to join today!

More votes Blog | Twitter | | Google groups | ToS | Privacy policy × Recover your password Enter the email address associated to your VirusTotal Community account and we'll send Stay logged in Sign up now! I don't know why AVAST think it is safe.QuoteAntivirus Version Last Update Resulta-squared5.0.0.302010.06.21Trojan-Dropper.MSExcel.Agent!IKAhnLab-V32010.06.20.002010.06.19-AntiVir8.2.2.62010.06.21-Antiy-AVL2.0.3.72010.06.18-Authentium5.2.0.52010.06.21MSExcel/Dropper.B!CamelotAvast4.8.1351.02010.06.21-Avast55.0.332.02010.06.21-AVG9.0.0.7872010.06.21-BitDefender7.22010.06.21-CAT-QuickHeal10.002010.06.18-ClamAV0.96.0.3-git2010.06.21-Comodo51722010.06.21TrojWare.MSExcel.TrojanDropper.Agent.bcDrWeb5.0.2.033002010.06.21-eSafe7.0.17.02010.06.20-eTrust-Vet36.1.76502010.06.19-F-Prot4.6.1.1072010.06.20-F-Secure9.0.15370.02010.06.21-Fortinet4.1.133.02010.06.20-GData212010.06.21-IkarusT3.1.1.84.02010.06.21Trojan-Dropper.MSExcel.AgentJiangmin13.0.9002010.06.15Heur:Exploit.CVE-2009-3129Kaspersky7.0.0.1252010.06.21Trojan-Dropper.MSExcel.Agent.bcMcAfee5.400.0.11582010.06.21Exploit-MSExcel.uMcAfee-GW-Edition2010.12010.06.21Exploit-MSExcel.uMicrosoft1.59022010.06.21Exploit:Win32/CVE-2009-3129NOD3252142010.06.21-Norman6.05.062010.06.20-nProtect2010-06-21.012010.06.21-Panda10.0.2.72010.06.20-PCTools7.0.3.52010.06.21HeurEngine.MaliciousExploitRising22.53.00.042010.06.21-Sophos4.54.02010.06.21-Sunbelt64822010.06.21-Symantec20101.1.0.892010.06.21Bloodhound.Exploit.306TheHacker6.5.2.0.3022010.06.20-TrendMicro9.120.0.10042010.06.20TROJ_EXELDROP.ATrendMicro-HouseCall9.120.0.10042010.06.21TROJ_EXELDROP.AVBA323.12.12.52010.06.21-ViRobot2010.6.21.38962010.06.21-VirusBuster5.0.27.02010.06.21- Logged Pondus Avast Überevangelist Maybe Bot Posts: 31702 Re: Suspicious files, please check « Reply #1 on: June

More comments Leave your comment... ?

No one has voted on this item yet, be the first one to do so! bhatbhai, Sep 28, 2010 #1 This thread has been Locked and is not open to further replies. More comments Leave your comment... ? P.S.

For analysis info, see the AlienVault link below and the Metasploit module and demo. Newer Than: Search this thread only Search this forum only Display results as threads Useful Searches Recent Posts More... For a comprehensive pro-active protection against threats, please consider ThreatFire - our behavioral antivirus solution. By downloading the samples, anyone waives all rights to claim punitive, incidental and consequential damages resulting from mishandling or self-infection.

Cancel Sign in × Cookies are disabled! By default, this is C:\Documents and Settings\[UserName]\Local Settings\Temp\ (Windows NT/2000/XP). Advertisement bhatbhai Thread Starter Joined: Sep 28, 2010 Messages: 2 Hi all, Last night, I started getting notifications from my Spyware Doctor about a HeurEngine.MaliciousExploit (risk level medium-high).