Procedure
- Go to .
- Specify the search criteria.
- File SHA-1
- Period
- Press ENTER.All suspicious objects matching the search criteria appear.
- View the results.HeaderDescriptionFile SHA-1View the 160-bit hash value that uniquely identifies a file.Related MessagesView the messages containing the same suspicious object.Latest Message RecipientsView the most recent recipients of the email message containing suspicious objects.Latest DetectionView the date and time Virtual Analyzer last found the suspicious object in a submitted object.