![]() HTTP traffic detected: GET /gs/gs alphasha2g 2.crl HTTP /1.1Connec tion: Keep -AliveAcce pt: */*Use r-Agent: M icrosoft-C ryptoAPI/6. 1Connecti on: Keep-A liveAccept : */*User- Agent: Mic rosoft-Cry ptoAPI/6.1 Host: crl. 0) like G eckoAccept -Encoding: gzip, def lateHost: aescripts. HTTP traffic detected: GET /learn /zxp-insta ller/ HTTP /1.1Accept : text/htm l, applica tion/xhtml +xml, */*A ccept-Lang uage: en-U SUser-Agen t: Mozilla /5.0 (Wind ows NT 6.1 Trident/ 7.0 rv:11. ![]() Source: C:\Program Files\Internet Explorer\iexplore.exeįile created: C:\Users\u ser\AppDat a\Local\Mi crosoft\Wi ndows\Temp orary Inte rnet Files \Content.I E5\77PTX9D T\favicon.ico String found in binary or memory: w.facebook. IP address seen in connection with other malware Found application associated with file extension.Correcting counters for adjusted boot time.Number of analysed new started processes analysed: Windows 7 SP1 (with Office 2010 SP2, IE 11, FF 54, Chrome 60, Acrobat Reader DC 17, Flash 26, Java.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |