=
We are hiring! Windows Kernel Developer (Remote), apply here!
flash

Result Threat Antivirus Icon Time & Date Name Info Class Graph Actions
clean
None
2022-05-27 20:25:48 +02:00
NEW SUBMISSION- LORENCE OJWANG - 11771 SE 71ST CT Belleview FL 34420.msg
clean
1%
2022-05-27 20:18:26 +02:00
http://pub.lucidpress.com
clean
3%
2022-05-27 20:17:46 +02:00
RE_iRecord_Installer.msi
clean
None
no Icon
2022-05-27 20:11:30 +02:00
"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=32902 --gpu-device-id=258 --gpu-sub-system-id=372379708 --gpu-revision=9 --gpu-driver-version=9.17.10.4229 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1936 --field-trial-handle=1140,i,1665820781832391095,17286350129585345858,131072 /prefetch:2
malicious
42%
2022-05-27 20:05:33 +02:00
apprun.exe
malicious
12%
2022-05-27 20:04:28 +02:00
http://promogiveawayus.com
clean
0%
2022-05-27 20:04:18 +02:00
https://notification.tubecup.net
clean
3%
2022-05-27 20:03:38 +02:00
MD5 & SHA Checksum Utility.exe
clean
0%
2022-05-27 19:59:42 +02:00
https://docs.google.com/presentation/d/e/2PACX-1vQLIu1X0IVnxZJYibfHTDtGdl4umjzrNQRqM8P15_pKuHsxivDaDjKXey0w5atKnGomwg17E-2HUJIW/pub?start=false&loop=false&delayms=3000&slide=id.p
malicious
73%
no Icon
2022-05-27 19:50:25 +02:00
[cpu]
malicious
75%
no Icon
2022-05-27 19:50:25 +02:00
bash
malicious
73%
no Icon
2022-05-27 19:50:25 +02:00
ntpd
malicious
63%
no Icon
2022-05-27 19:50:19 +02:00
sshd
malicious
62%
no Icon
2022-05-27 19:50:19 +02:00
tftp
malicious
Mirai
66%
no Icon
2022-05-27 19:50:19 +02:00
wget
malicious
None
no Icon
2022-05-27 19:50:15 +02:00
ftp
clean
None
2022-05-27 19:36:07 +02:00
CA14522283_5480736289593760083_label.pdf
malicious
FormBook
None
2022-05-27 19:35:11 +02:00
SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe
clean
2%
2022-05-27 19:31:39 +02:00
https://linkprotect.cudasvc.com/url?a=https%3a%2f%2f4ncz5-oaaaa-aaaad-qcczq-cai.raw.ic0.app%2f&c=E,1,yzYGtry9tkljqbJFR2Fcl9THP5bR1sEWsz96zu1YjEpVa-GeOf64B1QO3Pqj4BfBfwPlAE-gtFsjV2hfrh_QzouozC2Fgzm-iaKMtOem3A,,&typo=1
malicious
9%
2022-05-27 19:30:34 +02:00
activation.reg.exe
no
Graph
Windows:
InjectsWrites Registry keysDrops PE FilesHas more than one ProcessHas Email attachmentDisassembly is available
Android: Receives SMS Sends SMS Reboot Native CMD
Common: Generates Internet Traffic Generates HTTP Network Traffic Expired Sample Creates malicious files