flash

Result Threat Antivirus Icon Time & Date Name Info Class Graph Actions
malicious
AgentTesla
75%
03.08.2021 23:13:12
DOC.exe
malicious
AgentTesla
79%
03.08.2021 22:48:17
PI A19T010620.exe
malicious
AgentTesla
79%
03.08.2021 22:23:17
Purchase Order to be treated on Request Imediatiely po09735-08837-8478.exe
malicious
AgentTesla
86%
03.08.2021 22:20:21
Inv 0110617985 PO Wartsila quantiparts B.V..exe
malicious
AgentTesla
43%
03.08.2021 22:13:19
ROQU2AjKs1.exe
malicious
AgentTesla
86%
03.08.2021 22:12:23
XP010-61.exe
malicious
AgentTesla
82%
03.08.2021 22:09:17
29.7.2021.exe
malicious
AgentTesla
82%
03.08.2021 22:05:16
Ziraat Bankası Swift Mesajı.exe
malicious
AgentTesla
81%
03.08.2021 22:02:15
Swift Copy.exe
malicious
AgentTesla
79%
03.08.2021 21:30:19
SOA.exe
malicious
AgentTesla
52%
03.08.2021 20:45:17
KkPVouLuOx.exe
malicious
AgentTesla
63%
03.08.2021 20:42:21
ORDER#142155312938 KALISKAYA WODKA CON1GQDP- URGENT-New.exe
malicious
AgentTesla
0%
03.08.2021 20:40:26
Purchase Order-568149.exe
malicious
AgentTesla
79%
03.08.2021 20:28:18
Products Order.exe
malicious
AgentTesla
85%
03.08.2021 20:17:15
POSH service quotation.exe
malicious
AgentTesla
70%
03.08.2021 19:52:19
2y6ArAJdV8xhjVU.exe
malicious
AgentTesla
77%
03.08.2021 19:35:34
model 800 DD.exe
malicious
AgentTesla
38%
03.08.2021 19:23:04
Quotation From Asia Tianjin Steel Co.Ltd.exe
malicious
AgentTesla
82%
03.08.2021 19:17:56
SOA.exe
malicious
AgentTesla
24%
03.08.2021 19:00:22
Purchase Order No.48743310321-RCN.pdf.exe
Windows:
InjectsWrites Registry keysDrops PE FilesHas more than one ProcessHas Email attachmentDisassembly is available
Android: Receives SMS Sends SMS Reboot Native CMD
Common: Generates Internet Traffic Generates HTTP Network Traffic Expired Sample Creates malicious files