DrWeb |
Exploit.Rtf.Obfuscated.32 |
CAT-QuickHeal |
Exp.RTF.Obfus.Gen |
McAfee |
RTFObfustream.c!39669A47B553 |
VIPRE |
Exploit.RTF-ObfsStrm.Gen |
Sangfor |
Malware.Generic-RTF.Save.c5a892ae |
Arcabit |
Exploit.RTF-ObfsStrm.Gen |
Cyren |
CVE-2017-11882.C.gen!Camelot |
Symantec |
Bloodhound.RTF.20 |
ESET-NOD32 |
a variant of DOC/Abnormal.C |
Cynet |
Malicious (score: 99) |
Kaspersky |
HEUR:Exploit.MSOffice.Generic |
BitDefender |
Exploit.RTF-ObfsStrm.Gen |
NANO-Antivirus |
Exploit.Rtf.Heuristic-rtf.dinbqn |
MicroWorld-eScan |
Exploit.RTF-ObfsStrm.Gen |
Tencent |
Exp.Ole.CVE-2017-11882.a |
Emsisoft |
Exploit.RTF-ObfsStrm.Gen (B) |
F-Secure |
Heuristic.HEUR/Rtf.Malformed |
TrendMicro |
HEUR_RTFMALFORM |
FireEye |
Exploit.RTF-ObfsStrm.Gen |
Sophos |
Troj/RtfExp-EQ |
Ikarus |
Exploit.CVE-2017-11882 |
Avira |
HEUR/Rtf.Malformed |
Antiy-AVL |
Trojan[Exploit]/OLE.CVE-2017-11882 |
ZoneAlarm |
HEUR:Exploit.MSOffice.Generic |
GData |
Exploit.RTF-ObfsStrm.Gen |
Google |
Detected |
AhnLab-V3 |
RTF/Malform-A.Gen |
Zoner |
Probably Heur.RTFObfuscation |
MAX |
malware (ai score=80) |
Fortinet |
RTF/GenericKD.47107450!tr |