A suspicious file is the associated SHA-1 hash value with the potential to expose systems to danger or loss. View suspicious files to understand your risk, find related messages, and assess the relative prevalence of the suspicious file.
All suspicious objects matching the search criteria appear.
Header |
Description |
---|---|
File SHA-1 |
View the 160-bit hash value that uniquely identifies a file. |
Related Messages |
View the messages containing the same suspicious object. |
Latest Message Recipients |
View the most recent recipients of the email message containing suspicious objects. |
Latest Detection |
View the date and time Virtual Analyzer last found the suspicious object in a submitted object. |