Lumension® Endpoint Intelligence Center

Lumension® Endpoint Intelligence Center

Accurate. Current. Accessible.


File Lookup

Upload a binary file:
Or provide a hash file:
SHA-1 hash:
MD5 hash:
SHA-256 hash:


Learn More »

Malware Analysis

Upload a suspect file:

Provide your email address:
Email:  Why?

Learn More »

Application Scanner

Discover all applications and executables in your environment »

Device Scanner

Discover all removable storage devices used in your environment »

Vulnerability Scanner

Discover all OS and application vulnerabilities in your environment »

Threats

Risk Name Type
MEDIUM
WORM
MEDIUM
TROJAN
LOW
TROJAN
LOW
WORM
MEDIUM
WORM

Vulnerabilities

Score CVE Id Summary
5.0
The SDK for Komodia Redir...
5.0
The SDK for Komodia Redir...
2.1
The ARM GIC distributor v...
10.0
radexecd.exe in Persisten...
Unknown
KENT-WEB Joyful Note befo...

Patches

Impact Identifier Summary
Critical - 01
F-Secure Anti-Virus DEF F...
Critical - 01
Sophos Anti-Virus IDE fil...
Critical - 01
Sophos Anti-Virus IDE fil...
Critical - 01
Sophos Anti-Virus IDE fil...
Critical - 01
Windows Defender Definiti...

File Lookup

Upload a binary file:
Or provide a hash file:
SHA-1 hash:
MD5 hash:
SHA-256 hash:


Malware Analysis

Upload a suspect file:

Provide your email address:
Email:  Why?


Last Updated: 01 Mar 2015 10:25:02