Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | Sept. 2, 2023, 6:31 p.m. | Sept. 2, 2023, 6:37 p.m. |
-
ela205.exe "C:\Users\test22\AppData\Local\Temp\ela205.exe"
1664
Name | Response | Post-Analysis Lookup |
---|---|---|
z.nnnaajjjgc.com | 156.236.72.121 |
Suricata Alerts
Suricata TLS
No Suricata TLS
pdb_path | helppane.pdb |
resource name | MUI |
resource name | REGISTRY |
resource name | TYPELIB |
resource name | XML |
Elastic | malicious (high confidence) |
McAfee | GenericRXAA-FA!FF0CA5D8A61D |
Malwarebytes | Malware.AI.183015198 |
Sangfor | Trojan.Win64.Agent.Va8f |
Symantec | ML.Attribute.HighConfidence |
ESET-NOD32 | a variant of Win64/GenKryptik.GLXL |
Kaspersky | UDS:DangerousObject.Multi.Generic |
Avast | Win64:Evo-gen [Trj] |
Tencent | Win32.Trojan.Crypt.Jflw |
F-Secure | Trojan.TR/Crypt.Agent.amzjb |
DrWeb | Trojan.DownLoader45.60881 |
TrendMicro | Trojan.Win64.PRIVATELOADER.YXDIAZ |
McAfee-GW-Edition | BehavesLike.Win64.Dropper.bm |
Sophos | Mal/Generic-S |
Avira | TR/Crypt.Agent.amzjb |
Gridinsoft | Trojan.Win64.Gen.bot |
Microsoft | Trojan:Win32/Sabsik.FL.B!ml |
AhnLab-V3 | Malware/Win.Generic.C5451803 |
TrendMicro-HouseCall | Trojan.Win64.PRIVATELOADER.YXDIAZ |
Rising | Downloader.Agent!8.B23 (TFE:2:EmnL0dJ0FNC) |
Ikarus | Trojan-Downloader.Win64.Agent |
AVG | Win64:Evo-gen [Trj] |
DeepInstinct | MALICIOUS |