× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 4cc6e847ada0ebe30d88d93b07c58024380626295d43135ca161473d0cd20cb9
File name: f514f830p417n06h5150s036r838name@organization.com.docx
Detection ratio: 1 / 56
Analysis date: 2017-03-21 23:59:09 UTC ( 3 months ago )
Antivirus Result Update
Symantec W97M.Downloader 20170321
Ad-Aware 20170321
AegisLab 20170321
AhnLab-V3 20170321
Alibaba 20170321
ALYac 20170321
Antiy-AVL 20170321
Arcabit 20170321
Avast 20170321
AVG 20170321
Avira (no cloud) 20170321
AVware 20170321
Baidu 20170321
BitDefender 20170321
Bkav 20170321
CAT-QuickHeal 20170321
ClamAV 20170322
CMC 20170317
Comodo 20170322
CrowdStrike Falcon (ML) 20170130
Cyren 20170321
DrWeb 20170321
Emsisoft 20170322
Endgame 20170317
ESET-NOD32 20170321
F-Prot 20170322
F-Secure 20170322
Fortinet 20170322
GData 20170321
Ikarus 20170321
Invincea 20170203
Jiangmin 20170321
K7AntiVirus 20170321
K7GW 20170320
Kaspersky 20170321
Kingsoft 20170322
Malwarebytes 20170321
McAfee 20170321
McAfee-GW-Edition 20170321
Microsoft 20170321
eScan 20170321
NANO-Antivirus 20170321
nProtect 20170321
Palo Alto Networks (Known Signatures) 20170322
Panda 20170321
Qihoo-360 20170322
Rising 20170321
SentinelOne (Static ML) 20170315
Sophos 20170321
SUPERAntiSpyware 20170321
Symantec Mobile Insight 20170321
Tencent 20170322
TheHacker 20170321
TrendMicro 20170321
TrendMicro-HouseCall 20170321
Trustlook 20170322
VBA32 20170321
VIPRE 20170321
ViRobot 20170321
Webroot 20170322
WhiteArmor 20170315
Yandex 20170321
Zillya 20170321
ZoneAlarm by Check Point 20170321
Zoner 20170321
The file being studied follows the Compound Document File format! More specifically, it is a MS Word Document file.
Summary
last_author
desegregation
code_page
1200
author
mutineers
Document summary
company
glints
code_page
1200
OLE Streams
name
Root Entry
clsid
type_literal
root
clsid_literal
on
sid
0
size
2240
type_literal
stream
size
128
name
\x05DocumentSummaryInformation
sid
12
type_literal
stream
size
176
name
\x05SummaryInformation
sid
11
type_literal
stream
size
64
name
\x06DataSpaces/DataSpaceInfo/StrongEncryptionDataSpace
sid
6
type_literal
stream
size
112
name
\x06DataSpaces/DataSpaceMap
sid
4
type_literal
stream
size
200
name
\x06DataSpaces/TransformInfo/StrongEncryptionTransform/\x06Primary
sid
9
type_literal
stream
size
76
name
\x06DataSpaces/Version
sid
3
type_literal
stream
size
62792
name
EncryptedPackage
sid
1
type_literal
stream
size
1289
name
EncryptionInfo
sid
10
ExifTool file metadata
MIMEType
image/vnd.fpx

LocaleIndicator
1033

Author
mutineers

Company
glints

LastModifiedBy
desegregation

FileTypeExtension
fpx

CodePage
Unicode UTF-16, little endian

FileType
FPX

File identification
MD5 1550bff984ce578267ccaa6d7a70d952
SHA1 e6c118eff20068d6242c3287a62f7b7e5b97fc1c
SHA256 4cc6e847ada0ebe30d88d93b07c58024380626295d43135ca161473d0cd20cb9
ssdeep
1536:pBjayNsHI9y5cxaKGA8nRc8pOR1kmV3RqhGZHK7tfsVIog6IpFAczwAxEWU:/NsHI9TxaZnRgRqmV3RqgdKxUyj6cFrJ

File size 69.0 KB ( 70656 bytes )
File type MS Word Document
Magic literal
CDF V2 Document, corrupt: Can't expand summary_info

TrID Generic OLE2 / Multistream Compound File (100.0%)
Tags
doc

VirusTotal metadata
First submission 2017-03-20 23:26:40 UTC ( 3 months ago )
Last submission 2017-03-20 23:26:40 UTC ( 3 months ago )
File names f514f830p417n06h5150s036r838name@organization.com.docx
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!