Views:
A suspicious file is the associated SHA-1 hash value with the potential to expose systems to danger or loss. View suspicious files to understand your risk, find related messages, and assess the relative prevalence of the suspicious file.

Procedure

  1. Go to DetectionsSuspicious ObjectsFiles.
  2. Specify the search criteria.
    • File SHA-1
    • Period
  3. Press ENTER.
    All suspicious objects matching the search criteria appear.
  4. View the results.
    Header
    Description
    File SHA-1
    View the 160-bit hash value that uniquely identifies a file.
    Related Messages
    View the messages containing the same suspicious object.
    Latest Message Recipients
    View the most recent recipients of the email message containing suspicious objects.
    Latest Detection
    View the date and time Virtual Analyzer last found the suspicious object in a submitted object.