Lionic |
Trojan.MSOffice.ObfsObjDat.4!c |
Cynet |
Malicious (score: 99) |
CAT-QuickHeal |
Exp.RTF.Obfus.Gen |
Skyhigh |
BehavesLike.Trojan.nx |
ALYac |
Exploit.RTF-ObfsObjDat.Gen |
VIPRE |
Exploit.RTF-ObfsObjDat.Gen |
Sangfor |
Exploit.Generic-Doc.Save.74c7ccbf |
Arcabit |
Exploit.RTF-ObfsObjDat.Gen |
Symantec |
Exp.CVE-2017-11882!g2 |
ESET-NOD32 |
multiple detections |
McAfee |
RTFObfustream.c!F179217F7E89 |
Avast |
RTF:Obfuscated-gen [Trj] |
Kaspersky |
UDS:DangerousObject.Multi.Generic |
BitDefender |
Exploit.RTF-ObfsObjDat.Gen |
NANO-Antivirus |
Exploit.Rtf.Heuristic-rtf.dinbqn |
MicroWorld-eScan |
Exploit.RTF-ObfsObjDat.Gen |
Rising |
Exploit.Generic!1.EB5C (CLASSIC) |
Emsisoft |
Exploit.RTF-ObfsObjDat.Gen (B) |
F-Secure |
Heuristic.HEUR/Rtf.Malformed |
DrWeb |
Exploit.CVE-2017-11882.123 |
TrendMicro |
HEUR_RTFMALFORM |
FireEye |
Exploit.RTF-ObfsObjDat.Gen |
Sophos |
Troj/RtfExp-EQ |
Ikarus |
Exploit.CVE-2017-11882 |
Google |
Detected |
Avira |
TR/AVI.Obfuscated.cciap |
MAX |
malware (ai score=84) |
Antiy-AVL |
Trojan[Exploit]/MSOffice.CVE-2017-11882 |
Kingsoft |
Win32.Infected.AutoInfector.a |
ZoneAlarm |
HEUR:Exploit.MSOffice.Generic |
GData |
Exploit.RTF-ObfsObjDat.Gen |
Varist |
RTF/CVE-2017-11882 |
AhnLab-V3 |
RTF/Malform-A.Gen |
Zoner |
Probably Heur.RTFObfuscation |
Tencent |
Office.Exploit.Generic.Htgl |
huorong |
Exploit/CVE-2017-11882.gen |
Fortinet |
MSOffice/CVE_2017_11882.DMP!exploit |
AVG |
RTF:Obfuscated-gen [Trj] |