Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Aug. 13, 2024, 5:07 p.m. | Aug. 13, 2024, 5:09 p.m. |
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
No hosts contacted. |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
section | .ndata |
file | C:\Users\test22\AppData\Local\Temp\nsm68E8.tmp\LangDLL.dll |
file | C:\Users\test22\AppData\Local\Temp\nsm68E8.tmp\System.dll |
Bkav | W32.AIDetectMalware |
Elastic | malicious (moderate confidence) |
Sangfor | Trojan.Win32.Agent.Vijg |
Symantec | Trojan.Gen.MBT |
ESET-NOD32 | NSIS/Injector.CWE |
APEX | Malicious |
Avast | FileRepMalware [Misc] |
Kaspersky | HEUR:Trojan.Win32.GuLoader.gen |
TrendMicro | Trojan.Win32.GULOADER.YXEHLZ |
McAfeeD | ti!8CF6A3D7E569 |
Trapmine | suspicious.low.ml.score |
Detected | |
Microsoft | Trojan:Win32/Wacatac.B!ml |
ZoneAlarm | HEUR:Trojan.Win32.GuLoader.gen |
Varist | W32/Trojan.KNSX-6595 |
McAfee | Artemis!29E3DE6B17D0 |
DeepInstinct | MALICIOUS |
Ikarus | Trojan.NSIS.Agent |
Panda | Trj/Chgt.AD |
TrendMicro-HouseCall | Trojan.Win32.GULOADER.YXEHLZ |
huorong | Trojan/Injector.bqy |
Fortinet | W32/CWE!tr |
AVG | FileRepMalware [Misc] |
CrowdStrike | win/malicious_confidence_90% (W) |