Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | Nov. 7, 2024, 1:43 p.m. | Nov. 7, 2024, 1:45 p.m. |
-
PASSWORDRECOVERY64EXE.EXE "C:\Users\test22\AppData\Local\Temp\PASSWORDRECOVERY64EXE.EXE"
1688
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
No hosts contacted. |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
Bkav | W64.AIDetectMalware |
Lionic | Trojan.Win32.Generic.4!c |
Cynet | Malicious (score: 100) |
ALYac | Gen:Variant.Lazy.541289 |
VIPRE | Gen:Variant.Lazy.541289 |
BitDefender | Gen:Variant.Lazy.541289 |
Arcabit | Trojan.Lazy.D84269 |
APEX | Malicious |
MicroWorld-eScan | Gen:Variant.Lazy.541289 |
Emsisoft | Gen:Variant.Lazy.541289 (B) |
McAfeeD | ti!37C9A9C6634B |
CTX | exe.trojan.lazy |
FireEye | Gen:Variant.Lazy.541289 |
Antiy-AVL | GrayWare/Win32.Wacapew |
Microsoft | Program:Win32/Wacapew.C!ml |
GData | Gen:Variant.Lazy.541289 |
AhnLab-V3 | Trojan/Win.Generic.C5676159 |
McAfee | Artemis!28245807DB66 |
DeepInstinct | MALICIOUS |
Malwarebytes | Spyware.PasswordStealer.Generic |
TrendMicro-HouseCall | TROJ_GEN.R002H09K424 |
MaxSecure | Trojan.Malware.300983.susgen |
Fortinet | W32/PossibleThreat |