Author Topic: Open files moved to chest  (Read 1118 times)

0 Members and 1 Guest are viewing this topic.

Offline DanielPerez

  • Newbie
  • *
  • Posts: 15
    • RF_Experiencias
Open files moved to chest
« on: December 12, 2017, 02:50:56 AM »
Hi! AIS detected UrlMal-inf[Trj] in several .PDFs and Phishing-VU[Phish] in a .HTM, and sent them to the chest.
Is it possible to read them through the Sandbox?
Thank you!

Offline Pondus

  • Probably Bot
  • ****
  • Posts: 37527
  • Not a avast user
Re: Open files moved to chest
« Reply #1 on: December 12, 2017, 07:14:52 AM »
Quote
UrlMal-inf[Trj] in several .PDFs
Means those pdf.doc contain clickable links to blacklisted URLs


Offline DanielPerez

  • Newbie
  • *
  • Posts: 15
    • RF_Experiencias
Re: Open files moved to chest
« Reply #2 on: December 18, 2017, 11:55:54 PM »
Thank you for your reply. Right, PDFs would be innocent text files if it wasn't for those links. What I need is to just read the contents of moved files without clicking on their links. Maybe I would convert them to inert PNGs if I find them valuable.
What would be the steps to do that?