× Çerezler devre dışı bırakılmış! Bu sitenin düzgün bir şekilde çalışabilmesi için çerezlerin açık olması gerekir.
SHA256: e4e85ed771868f3488bbd87d0ca5ed56de5689ac73c3220a5b6d77e3aeac71fb
Dosya adı: =?UTF-8?B?MjAyMuuFhCDqs6Dsho3ssqDrj4Qg6rCc7Ya1IO2YhO2ZqS5od3A=?=
Tespit edilme orani 8 / 58
Analiz tarihi: 2019-04-15 02:55:24 UTC ( 1 ay, 1 hafta önce) En sonuncusunu görüntüle
Antivirus Sonuç Güncelle
Arcabit Exploit.CVE-2015-2545.Gen 20190415
BitDefender Exploit.CVE-2015-2545.Gen 20190415
Emsisoft Exploit.CVE-2015-2545.Gen (B) 20190415
FireEye Exploit.CVE-2015-2545.Gen 20190415
GData Exploit.CVE-2015-2545.Gen 20190415
MAX malware (ai score=82) 20190415
eScan Exploit.CVE-2015-2545.Gen 20190415
TACHYON Trojan-Exploit/HWP.Spenib.Gen 20190415
Acronis 20190413
Ad-Aware 20190415
AegisLab 20190415
AhnLab-V3 20190414
Alibaba 20190402
ALYac 20190415
Antiy-AVL 20190415
Avast 20190415
Avast-Mobile 20190414
AVG 20190415
Avira (no cloud) 20190414
Babable 20180918
Baidu 20190318
Bkav 20190412
CAT-QuickHeal 20190414
ClamAV 20190414
CMC 20190321
Comodo 20190415
CrowdStrike Falcon (ML) 20180202
Cybereason 20180308
Cylance 20190415
Cyren 20190415
DrWeb 20190415
eGambit 20190415
Endgame 20190403
ESET-NOD32 20190415
F-Prot 20190415
F-Secure 20190414
Fortinet 20190415
Ikarus 20190414
Sophos ML 20190313
Jiangmin 20190415
K7AntiVirus 20190414
K7GW 20190414
Kaspersky 20190415
Kingsoft 20190415
Malwarebytes 20190415
McAfee 20190415
McAfee-GW-Edition 20190414
Microsoft 20190415
NANO-Antivirus 20190414
Palo Alto Networks (Known Signatures) 20190415
Panda 20190414
Qihoo-360 20190415
Rising 20190414
SentinelOne (Static ML) 20190407
Sophos AV 20190414
SUPERAntiSpyware 20190410
Symantec 20190414
Symantec Mobile Insight 20190410
Tencent 20190415
TheHacker 20190411
TotalDefense 20190413
Trapmine 20190325
TrendMicro-HouseCall 20190415
Trustlook 20190415
VBA32 20190412
ViRobot 20190414
Webroot 20190415
Yandex 20190412
Zillya 20190412
ZoneAlarm by Check Point 20190415
Zoner 20190414
The file being studied follows the Compound Document File format! More specifically, it is a Hangul (Korean] Word Processor document file.
OLE Streams
name
Root Entry
clsid
type_literal
root
clsid_literal
on
sid
0
size
9152
type_literal
stream
sid
4
name
\x05HwpSummaryInformation
size
513
type_literal
stream
sid
13
name
BinData/BIN0001.eps
size
3545
type_literal
stream
sid
14
name
BodyText/Section0
size
59354
type_literal
stream
sid
2
name
DocInfo
size
7099
type_literal
stream
sid
12
name
DocOptions/_LinkDoc
size
524
type_literal
stream
sid
1
name
FileHeader
size
256
type_literal
stream
sid
6
name
PrvImage
size
1834
type_literal
stream
sid
7
name
PrvText
size
2044
type_literal
stream
sid
11
name
Scripts/DefaultJScript
size
136
type_literal
stream
sid
10
name
Scripts/JScriptVersion
size
13
ExifTool file metadata
MIMEType
image/vnd.fpx

FileType
FPX

FileTypeExtension
fpx

File identification
MD5 2b62101042cb91f93b49a51a9c38c617
SHA1 573398fd6f3dc3048e75a26d68f1690cd4f51e45
SHA256 e4e85ed771868f3488bbd87d0ca5ed56de5689ac73c3220a5b6d77e3aeac71fb
ssdeep
1536:cbC1xNo6EEN80PvpQ3Gs3GVaBsgXv1RUHo6Da6S8v8nVvmV:jXK6iWIBfvTQo6uG8nVeV

Dosya boyutu 79.5 KB ( 81408 bytes )
Dosya türü Hangul (Korean] Word Processor document
Magic lafzı
CDF V2 Document, corrupt: Cannot read summary info

TrID Hangul (Korean) Word Processor document (alternate) (67.3%)
Generic OLE2 / Multistream Compound File (32.6%)
Tags
cve-2015-2545 exploit hwp

VirusTotal metadata
First submission 2019-04-15 02:55:24 UTC ( 1 ay, 1 hafta önce)
Last submission 2019-04-15 02:55:24 UTC ( 1 ay, 1 hafta önce)
Dosya isimleri =?UTF-8?B?MjAyMuuFhCDqs6Dsho3ssqDrj4Qg6rCc7Ya1IO2YhO2ZqS5od3A=?=
Yorum yok.. Henüz hiçbir VirusTotal Topluluğu üyesi bu öğeye yorum yapmadı.Bunu yapan ilk sen ol!

Yorum ekleyin...

?
Yorumu gönder.

Üye girişi yapmadınız..Sadece kayıtlı kullanıcılar yorum yapabilir.Sesinizi duyurmak için giriş yapın.

Oy yok.. Bu öğeyi daha önce hiç kimse oylamadı.Bunu yapan ilk sen ol!