Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6402 | March 17, 2021, 1:48 p.m. | March 17, 2021, 1:51 p.m. |
-
T6R.exe "C:\Users\test22\AppData\Local\Temp\T6R.exe"
4244
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
172.217.25.14 | Active | Moloch |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
host | 172.217.25.14 |
Bkav | W32.AIDetect.malware1 |
FireEye | Generic.mg.88fee451ee8a4be3 |
McAfee | Artemis!88FEE451EE8A |
Sangfor | Trojan.Win32.Save.a |
CrowdStrike | win/malicious_confidence_80% (W) |
APEX | Malicious |
Avast | FileRepMalware |
Kaspersky | UDS:DangerousObject.Multi.Generic |
McAfee-GW-Edition | BehavesLike.Win32.Trojan.ct |
Ikarus | Trojan.VB.Crypt |
Microsoft | Trojan:Win32/Tnega!ml |
AhnLab-V3 | Win-Trojan/VBKrand.Gen |
GData | Win32.Trojan-Downloader.GuLoader.IH0G2J |
Cynet | Malicious (score: 100) |
BitDefenderTheta | Gen:NN.ZevbaF.34608.jm0@aSVCleli |
Rising | Trojan.Kryptik!8.8 (CLOUD) |
Fortinet | W32/Kryptik.EOVV!tr |
AVG | FileRepMalware |