SHA256: 71b2f1c5642d24c7f35479399c96cc572b1f0a24d4843ed0fddbf93af12d59c3 File name: p.exe Detection ratio: 36 / 56 Analysis date: 2016-11-27 00:03:46 UTC ( 0 minutes ago ) GData Trojan.GenericKD.3764705 20161127 Ikarus Trojan.Win32.Filecoder 20161126 Invincea virus.win32.sality.at 20161018 K7GW Trojan ( 004e16c11 ) 20161127 Kaspersky Trojan.Win32.Inject.acgan 20161127 Malwarebytes Trojan.MalPack.NSIS 20161127 McAfee Artemis!81D6AF74652B 20161127 McAfee-GW-Edition BehavesLike.Win32.Ransom.cc 20161126 eScan Trojan.GenericKD.3764705 20161127 Microsoft Ransom:Win32/Cerber 20161126 Panda Trj/Genetic.gen 20161126 Qihoo-360 HEUR/QVM20.1.6872.Malware.Gen 20161127 Sophos Mal/Generic-S 20161127 Symantec Trojan.Gen 20161127 Tencent Win32.Trojan.Inject.Auto 20161127 TrendMicro-HouseCall TROJ_GEN.R047H09KP16 20161127 VIPRE Trojan.Win32.Generic!BT 20161126 nProtect Ransom/W32.Cerber.163103 20161126 2016-11-26 17:43:28.144466 IP 192.168.1.102.51195 > 203.162.253.20.80: Flags [P.], seq 0:376, ack 1, win 256, length 376: HTTP: GET /p.exe HTTP/1.1 E….L@…WF…f…….P~..*%…P…….GET /p.exe HTTP/1.1 […]