PDFExaminer


Recent PDF malware detections. This list is delayed 2 weeks. +Submit one

MD5filenamesizeseverityjsflashembedencrypt
659cf4c6baa87b082227540047538c2a view report fcexploit.pdf 25169 101 J      
5.0@1043: suspicious.obfuscation using String.fromCharCode
5.0@1043: suspicious.obfuscation getAnnots access blocks
5.0@1043: suspicious.warning: object contains JavaScript
10.0@21269: suspicious.obfuscation using unescape
21.0@22553: pdf.exploit using TIFF overflow CVE-2010-0188
21.0@22553: suspicious.string base 64 nop sled used in TIFF overflow CVE-2010-0188
21.0@22553: pdf.exploit TIFF overflow CVE-2010-0188
02488fbf56ec3768f41ded4b5107c401 view report [Intelligent Systems Reference Library 95] Liana Razmerita, Gloria Phillips-Wren, Lakhmi C. Jain (eds.) - Innovations in Knowledge Management_ The Impact of Social Media, Semantic Web and Cloud Computing (2016, Springer-V.pdf 7276968 3        
13.0@289358: suspicious.obfuscation using eval
15ad18214258a41817450a3694d37720 view report 000006.pdf 6458 52 J      
6.0@423: suspicious.obfuscation using unescape
6.0@423: suspicious.obfuscation using substring
6.0@423: suspicious.string Shellcode NOP sled
6.0@423: pdf.exploit util.printf CVE-2008-2992
6.0@423: suspicious.warning: object contains JavaScript
dac125f250d388d76db3c95844923767 view report [Chapman & Hall_CRC The R Series] Yihui Xie - Dynamic Documents with R and knitr (2015, Chapman and Hall_CRC).pdf 7070775 8        
340.0@1700363: suspicious.obfuscation using eval
864.0@2343212: suspicious.obfuscation using eval
dac125f250d388d76db3c95844923767 view report [Chapman & Hall_CRC The R Series] Yihui Xie - Dynamic Documents with R and knitr (2015, Chapman and Hall_CRC).pdf 7070775 8        
340.0@1700363: suspicious.obfuscation using eval
864.0@2343212: suspicious.obfuscation using eval
48da6f6cb33590c4526118ab439fa694 view report -Bridging-the-Semantic-Gap-in-Image-and-Video-Analysis.pdf 6344903 3        
17.0@128391: suspicious.obfuscation using eval
48da6f6cb33590c4526118ab439fa694 view report 3319738909.pdf 6344903 3        
17.0@128391: suspicious.obfuscation using eval
6f26580dc2463551413ba1c283f29bf8 view report gurgaon.pdf 5005 6 J     E
1.0@15: suspicious.warning: object contains JavaScript
13.0@935: suspicious.obfuscation using eval
13.0@935: suspicious.warning: object contains JavaScript
a1ddc9ebe19a3d43ec25889085ad3ed8 view report pdf-doc-vba-eicar-dropper.pdf 10381 5 J      
8.0@907: suspicious.embedded OLE document header
9.0@9967: suspicious.warning: object contains JavaScript
4d84342fca2f369df355db346c396fad view report 3d08dc767eb0c2d123de3015f7cdef44fbfd74cc 19086 10 J      
25.0@17: suspicious.javascript in XFA block
25.0@17: suspicious.obfuscation using String.replace
25.0@17: suspicious.warning: object contains JavaScript
f719f107583cbededa62485773fa44f6 view report AS3000-2018.pdf 3330560 1 J      
3553.0@7347: suspicious.warning: object contains JavaScript
64c64f2af03c169474e0aa47ee1bfbd2 view report Designing-Data-Intensive-Applications-The-Big-Ideas-Behind-Reliable-Scalable-and-Maintainable-Systems(3).pdf 5889424 1        
2897.0@3806154: suspicious.embedded html file
cd30aaa49eeae6b5da4d5257aeb5e5b9 view report Roberto Ierusalimschy - 2017 - Programming in Lua 4th Ed (5.3).pdf 869386 30        
516.0@266261: suspicious.obfuscation using unescape
517.0@269011: suspicious.obfuscation using unescape
6fe557fe29e8051710e4ce1c7faa14d9 view report Programming in Lua third edition.pdf 2634491 11        
2600.0@242621: block size over 10MB
856.0@1726718: suspicious.obfuscation using String.replace
928.0@1806483: suspicious.obfuscation using unescape
357976f06eebf465422253ade40a359d view report desc_0359-MN.pdf 155463 1        
4.0@150038: suspicious.embedded external content