× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: d969039f45723e5cb83b2f358b2f69db3aabf47d18d07237c79f03ffb6acf8c8
File name: Attached file%3a Request for payment.i1.4q5755k79jj#44x.rtf
Detection ratio: 0 / 55
Analysis date: 2016-09-27 08:26:50 UTC ( 14 hours, 33 minutes ago ) View latest
Antivirus Result Update
ALYac 20160927
AVG 20160927
AVware 20160927
Ad-Aware 20160927
AegisLab 20160927
AhnLab-V3 20160927
Alibaba 20160927
Antiy-AVL 20160927
Arcabit 20160927
Avast 20160927
Avira (no cloud) 20160927
Baidu 20160927
BitDefender 20160927
Bkav 20160926
CAT-QuickHeal 20160927
CMC 20160921
ClamAV 20160927
Comodo 20160927
Cyren 20160927
DrWeb 20160927
ESET-NOD32 20160927
Emsisoft 20160927
F-Prot 20160926
F-Secure 20160927
Fortinet 20160927
GData 20160927
Ikarus 20160927
Jiangmin 20160927
K7AntiVirus 20160927
K7GW 20160927
Kaspersky 20160927
Kingsoft 20160927
Malwarebytes 20160927
McAfee 20160923
McAfee-GW-Edition 20160926
eScan 20160927
Microsoft 20160927
NANO-Antivirus 20160927
Panda 20160926
Qihoo-360 20160927
Rising 20160927
SUPERAntiSpyware 20160927
Sophos 20160927
Symantec 20160927
Tencent 20160927
TheHacker 20160927
TrendMicro 20160927
TrendMicro-HouseCall 20160927
VBA32 20160926
VIPRE 20160927
ViRobot 20160927
Yandex 20160926
Zillya 20160926
Zoner 20160927
nProtect 20160927
The file being studied follows the Compound Document File format! More specifically, it is a MS Word Document file.
Summary
last_author
recuperated
code_page
1200
author
inappropriateness
Document summary
company
competitiveness
code_page
1200
OLE Streams
name
Root Entry
clsid
type_literal
root
clsid_literal
on
sid
0
size
2048
type_literal
stream
size
148
name
\x05DocumentSummaryInformation
sid
12
type_literal
stream
size
188
name
\x05SummaryInformation
sid
11
type_literal
stream
size
64
name
\x06DataSpaces/DataSpaceInfo/StrongEncryptionDataSpace
sid
6
type_literal
stream
size
112
name
\x06DataSpaces/DataSpaceMap
sid
4
type_literal
stream
size
200
name
\x06DataSpaces/TransformInfo/StrongEncryptionTransform/\x06Primary
sid
9
type_literal
stream
size
76
name
\x06DataSpaces/Version
sid
3
type_literal
stream
size
109912
name
EncryptedPackage
sid
1
type_literal
stream
size
1057
name
EncryptionInfo
sid
10
ExifTool file metadata
MIMEType
image/vnd.fpx

LocaleIndicator
1049

Author
inappropriateness

Company
competitiveness

LastModifiedBy
recuperated

FileTypeExtension
fpx

CodePage
Unicode UTF-16, little endian

FileType
FPX

File identification
MD5 7adeae5d6b09ec6e7842e4197a78336b
SHA1 9886faa2b4dc0ced02ac9c99c0a57b3c2fe64cdf
SHA256 d969039f45723e5cb83b2f358b2f69db3aabf47d18d07237c79f03ffb6acf8c8
ssdeep
3072:cw+7eJi1/7ghfzmwlt+1WZ15GXi8ces82qj9FC4:h+7Ijmw7+YQX5x2qjP

File size 115.0 KB ( 117760 bytes )
File type MS Word Document
Magic literal
CDF V2 Document, corrupt: Can't expand summary_info

TrID Generic OLE2 / Multistream Compound File (100.0%)
Tags
doc

VirusTotal metadata
First submission 2016-09-27 08:26:50 UTC ( 14 hours, 33 minutes ago )
Last submission 2016-09-27 13:57:53 UTC ( 9 hours, 2 minutes ago )
File names Final Notice
Attached file%3a Request for payment.i1.4q5755k79jj#44x.rtf
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!