flash

Result Threat Antivirus Icon Time & Date Name Info Class Graph Actions
malicious
59%
03.08.2021 23:37:18
TMB1fxNaqR.exe
clean
2%
03.08.2021 23:32:07
https://outlook.office365.com/Encryption/retrieve.ashx?recipientemailaddress=ap%40gswater.com&senderemailaddress=grainwater%40radianresearch.com&senderorganization=AwGKAAAAAoYAAAADAQAAAL%2bPwYr4eztBl9bc2pXl9%2f9PVT1XYXR0aG91ckVuZ2luZWVyaW5nLm9ubWljcm9zb2Z0LmNvbSxPVT1NaWNyb3NvZnQgRXhjaGFuZ2UgSG9zdGVkIE9yZ2FuaXphdGlvbnMsREM9TkFNUFIwMUEwMTAsREM9UFJPRCxEQz1PVVRMT09LLERDPUNPTW3U2z0RbcxKmUtxcJ88CKJDTj1Db25maWd1cmF0aW9uLENOPVdhdHRob3VyRW5naW5lZXJpbmcub25taWNyb3NvZnQuY29tLENOPUNvbmZpZ3VyYXRpb25Vbml0cyxEQz1OQU1QUjAxQTAxMCxEQz1QUk9ELERDPU9VVExPT0ssREM9Q09NAQ%3d%3d&messageid=%3cBN6PR0101MB299654BC7612BE90121C8E74BBF09%40BN6PR0101MB2996.prod.exchangelabs.com%3e&cfmRecipient=SystemMailbox%7bD0E409A0-AF9B-4720-92FE-AAC869B0D201%7d%40WatthourEngineering.onmicrosoft.com&consumerEncryption=false&senderorgid=1abee47c-68ca-4166-a776-68475cb4c2d2&urldecoded=1&e4e_sdata=NAlD4xF5G7xsjCpoXLsrqcFvJk6j2vhVIIKSh98po4JUh8sQDhUS2lu3%2f27pCMtALumoYdxBZFlm2ASgEEpgP3NQkpb%2bn1kpgDgOCtqD09%2bG%2bs8heIeUlJTsqucw0Zz9OP7E6qTSm5hEj40bLIFk1SDbdplq9xz8N2Bf2l3k4%2fRwKrYELyDkr67ZSu8gKah3uOJUUSAuDu5R6fJPiAjKampBbQQqlsds8zLPJ%2b3ltpS0fbh4UsFYc2O7%2bUSJWWZyaqmvnnGyYWLFrZs%2fgtJGXGapSFUFyG6YbDvs4i0ZVqatNUFdh07tVh62OLJ9%2fEix1dt9V%2frV%2fLktpIvUxQ6RgA%3d%3d
malicious
57%
03.08.2021 23:29:15
LRios3pM39.exe
malicious
16%
03.08.2021 23:28:50
SvchostInjector_x64 with SC.dll
malicious
Lokibot
61%
03.08.2021 23:24:19
Invoice and BL.exe
clean
0%
03.08.2021 23:18:47
http://www.the-sun.com
malicious
HTMLPhisher
0%
03.08.2021 23:17:22
State Settlement Copy.html
clean
None
03.08.2021 23:16:58
0333 - CCFL Seniors Funded Facilities Risk Assessments 20210801.mhtml
malicious
HTMLPhisher
0%
03.08.2021 23:15:02
https://aeriallightingandelectric-my.sharepoint.com/:u:/g/personal/khardy_aerialelectric_com/ESDO6oK0Y2FPjomZ3thjzpYB912czBooPXA5DhMbhXvPhA?download=1
clean
0%
03.08.2021 23:13:16
https://ess.barracudanetworks.com/log/attachment/1627515221-105232-5320-12529-1-a236c4ba216273b0a47cf360a456634c/Cap%20FCE%20Tier%203%205%204%2018.pdf_page-11.png
malicious
AgentTesla
75%
03.08.2021 23:13:12
DOC.exe
malicious
IcedID
52%
03.08.2021 23:10:46
aFqZ2vCizZ.dll
malicious
Snake Keylogger
85%
03.08.2021 23:10:20
Request Quotation.exe
malicious
1%
03.08.2021 23:07:24
https://www.canva.com/design/DAEl-R1jp6Q/7tYJcxXWl2osP9-56-X6pQ/view?utm_content=DAEl-R1jp6Q&utm_campaign=designshare&utm_medium=link&utm_source=publishsharelink
malicious
RedLine
68%
03.08.2021 23:07:19
7C3BEB3D9B0A8E0BDC6344A24B3B527B96CB9C845AA68.exe
malicious
FormBook
37%
03.08.2021 22:56:17
Purchase contract #9009.exe
malicious
AsyncRAT
None
03.08.2021 22:55:16
invoice.vbs
malicious
AgentTesla
79%
03.08.2021 22:48:17
PI A19T010620.exe
malicious
RedLine
54%
03.08.2021 22:47:17
7d9bXpW0im.exe
clean
None
03.08.2021 22:33:19
http://tonysglovesandsafety.com
Windows:
InjectsWrites Registry keysDrops PE FilesHas more than one ProcessHas Email attachmentDisassembly is available
Android: Receives SMS Sends SMS Reboot Native CMD
Common: Generates Internet Traffic Generates HTTP Network Traffic Expired Sample Creates malicious files