| OTX_d474eec649cb1825c487df07a1ef2a0c9767949bdcadf60ab996f71fd143a214 | |
| Rich Text Format data, version 1, ANSI | 419898 |
| 2017-12-27 11:52:57 | |
| 9eca81dd6953e4ff691d8a534280a8f2 | |
| 6340a7916db67c1b6dc1731014bb440435578c66 | |
| d474eec649cb1825c487df07a1ef2a0c9767949bdcadf60ab996f71fd143a214 | |
| N/A | |
| N/A | |
| N/A | |
| N/A | |
| Source: |

| AVG | RTF:CVE-2012-0158-CQ [Expl] |
| Ad-Aware | Exploit.RTF-ObfsStrm.Gen |
| AegisLab | Exploit.Msword.Cve!c |
| AhnLab-V3 | Doc/Cve-2012-0158 |
| Antiy-AVL | Trojan/Win32.TGeneric |
| Arcabit | Exploit.RTF-ObfsStrm.Gen |
| Avast | RTF:CVE-2012-0158-CQ [Expl] |
| Avira | EXP/Rtf.CVE-2012-0158.J.6 |
| Baidu | Win32.Exploit.Agent.v |
| BitDefender | Exploit.RTF-ObfsStrm.Gen |
| CAT-QuickHeal | Exp.RTF.CVE-2012-0158 |
| Cyren | RTF/CVE120158 |
| DrWeb | Exploit.Rtf.CVE2012-0158 |
| ESET-NOD32 | Win32/Exploit.Agent.NLY |
| Emsisoft | Exploit.RTF-ObfsStrm.Gen (B) |
| F-Prot | RTF/CVE120158 |
| F-Secure | Exploit.RTF-ObfsStrm.Gen |
| Fortinet | MSWord/Toolbar.A!exploit |
| GData | Exploit.RTF-ObfsStrm.Gen |
| Ikarus | Rtf.Exploit.CVE-2012-0158 |
| Kaspersky | Exploit.MSWord.CVE-2012-0158.ei |
| MAX | malware (ai score=98) |
| McAfee | Exploit-CVE2012-0158.k |
| McAfee-GW-Edition | Exploit-CVE2012-0158.k |
| MicroWorld-eScan | Exploit.RTF-ObfsStrm.Gen |
| Microsoft | Exploit:Win32/CVE-2012-0158 |
| NANO-Antivirus | Exploit.ComObj.CVE-2012-0158.hzuf |
| Sophos | Troj/DocDrop-CD |
| Symantec | Trojan.Mdropper |
| Tencent | Word.Exploit.Cve-2012-0158.Hyjy |
| ZoneAlarm | Exploit.MSWord.CVE-2012-0158.ei |
| Zoner | Probably RTFBinData |