OTX_f24b873fa61d48d5436099a79ccc5524b276fd0626a6e915dd3c5e5d231a9600 | |
Rich Text Format data, version 1, ANSI | 279472 |
2017-12-27 11:46:09 | |
ce002e76ce3038070934fd6b883a2033 | |
19e9dfabdb9b10a90b62c12f205ff0d1eeef3f14 | |
f24b873fa61d48d5436099a79ccc5524b276fd0626a6e915dd3c5e5d231a9600 | |
N/A | |
N/A | |
N/A | |
N/A | |
Domain | IP |
---|---|
crl4.digicert.com | N/A |
crl3.digicert.com | N/A |
ALYac | Trojan.Script.762262 |
Ad-Aware | Trojan.Script.762262 |
AegisLab | Exploit.Msword.Agent!c |
AhnLab-V3 | RTF/Cve-2012-0158 |
Antiy-AVL | Trojan[Exploit]/Office.CVE-2012-0158 |
Arcabit | Trojan.Script.DBA196 |
Baidu | Win32.Exploit.CVE-2012-0158.h |
BitDefender | Trojan.Script.762262 |
CAT-QuickHeal | Exp.RTF.CVE-2012-0158 |
DrWeb | Exploit.Rtf.82 |
ESET-NOD32 | Win32/Exploit.CVE-2012-0158.JL |
Emsisoft | Trojan.Script.762262 (B) |
F-Secure | Trojan.Script.762262 |
GData | Trojan.Script.762262 |
Ikarus | Exploit.MSWord.Agent |
Jiangmin | Exploit.CVE-2012-0158.a |
Kaspersky | Exploit.MSWord.Agent.ey |
MAX | malware (ai score=98) |
McAfee | Exploit-CVE2012-0158.f |
McAfee-GW-Edition | Exploit-CVE2012-0158.f |
MicroWorld-eScan | Trojan.Script.762262 |
Microsoft | Exploit:Win32/CVE-2012-0158 |
NANO-Antivirus | Trojan.Rtf.CVE20120158.dxopnd |
Qihoo-360 | heur.rtf.obfuscated.1 |
Sophos | Troj/DocDrop-DM |
Symantec | Trojan.Mdropper |
Tencent | Exploit.WORD.CVE-2012-0158 |
Zillya | Downloader.OpenConnection.JS.105247 |
ZoneAlarm | Exploit.MSWord.Agent.ey |
Zoner | Probably RTFBinData |