찾아줄게요
APR 파일은 무엇입니까?
-
안녕하세요. 제 컴퓨터에서 APR라는 파일을 찾았는데 이것이 무엇인지 잘 모르겠습니다. 알려주시면 감사하겠습니다.
-
APR 파일은 ArcView 프로젝트 파일 입니다. Esri에서 배포한 파일인 것으로 보입니다. 2008-08-09 03:19:53에 처음으로 보고되었으며 2021-09-09 05:34:26에 마지막으로 보고되었습니다.
-
적절한 프로그램을 다운로드하여 APR 파일을 열 수 있습니다.
-
ArcView 프로젝트 파일
-
시그니처 정보가 없습니다.
-
연관 링크 #1: https://www.esri.com/ko-kr/arcgis/products/arcgis-pro/overview
-
연관 링크 #2: 첨부된 링크가 없습니다.
-
-
[2021-06-26 18:04:17] @kyleehmke Several suspicious domains registered at MonoVM in June and set to loopback: datenlook.com ([email protected]) esaprocess.com ([email protected]) indieonw.com indoffs.com ([email protected]) mesourcetv.com ([email protected]) H/t @DomainTools https://twitter.com/kyleehmke/status/1408742908820340740/photo/1
-
[2021-06-22 14:49:05] @bogdanangh #Cabassous ( also known as #FluBot) new sample. seem they're beginning to use the pkg name " http://com.eg.android.AlipayGphone" like they did back a 2 month ago (from April to May) https://www.virustotal.com/gui/file/06dbf0e0bfab9f74c0744b8fe29bec1cf48171bce9df7ff56be34a62babf15d2/details
-
[2021-06-16 00:41:06] @pollo290987 #sodinokibi #EnigmaProtector Interesting filename and uploaded from BR JBS_sodinokibi_protected.exe ec926f3d4237e3aa70852c25c156df18 https://twitter.com/pollo290987/status/1404856503417311238/photo/1
-
[2021-06-12 01:35:33] @RonnyTNL @virustotal @FileZillaPro . Hi @virustotal @bquintero @msftsecresponse Here is an other one "PDF24 Creator" tagged as ☑ File distributed by Microsoft Corporation I'm pretty sure it isn't the case. https://www.virustotal.com/gui/file/dab644778468eaff0655c102b1ff998ea7336eee285922d06a2a5a7d45a1fc2b/detection
-
[2021-06-06 00:28:55] @ggyaf Aí rapaziada. resolvi trazer essa bomba free. pq tem mt espertinho tentando vender o bagulho que tem de graça na internet ai. Aproveitem pq provavelmente no próximo patch ja vai tomar fix. Download: https://www.mediafire.com/file/plsjw0a6nehrsza/crasher.zip/file Links: https://github.com/vperpl/sex-ploits/releases/tag/J%23e https://www.virustotal.com/gui/file/bf9066bf502bd726dbecac61b2a3d98bd0ddc87d35912fc8e40fa481a8d0e6fa/detection https://twitter.com/ggyaf/status/1401229560834924545/video/1
-
[2021-05-21 12:16:06] @ChouchWard https://pastebin.com/BhKy9JmS Domains // (Very Active) Mail Phishing Campaign via Malicious Link - Since April 2021 @malware_traffic @malwrhunterteam @malpedia @abuse_ch @Unit42_Intel @VK_Intel
-
[2021-05-15 04:27:20] @Arkbird_SOLG #ATM Interesting to see that #DispCashBR continue to be used. recent samples in April-May 2021. I take the opportunity for share the yara rule: sample: https://bazaar.abuse.ch/sample/432f732a4ecbb86cb3dedbfa881f2733d20cbcc5958ead52823bf0967c133175/ Yara rule: https://github.com/StrangerealIntel/DailyIOC/blob/master/2021-05-14/DispCashBR/ATM_DispCashBR_May_2021_1.yara cc @Bank_Security @BushidoToken @c3rb3ru5d3d53c
-
[2021-05-12 22:51:33] @ozuma5119 #Phishing Alert⚠ #フィッシング #詐欺 #gmo #gmoインターネット hxxps://myjcb.co.geristrarqence.buzz/ IP: 118.27.35.228 (GMO Internet @ConohaPR .JP????????) Registrar: NameSilo https://otx.alienvault.com/indicator/domain/geristrarqence.buzz Brand: JCB Card ジェーシービーカード. Japan???????? https://urlscan.io/result/91d4bcf1-1fa3-4052-8ff9-823029fdd4d8/ https://twitter.com/ozuma5119/status/1392507750517669889/photo/1
-
[2021-05-03 22:50:15] @James_inthe_box A csv formatted list of all the #malspam campaigns that crossed my path in April to include #malware family. hash. c2. and email exfil addresses. https://gist.github.com/silence-is-best/852a1c7c7dcf29fdc8d5df73433e7676 #retrohunt https://twitter.com/James_inthe_box/status/1389245930105233408/photo/1
-
[2021-05-03 09:13:21] @ozuma5119 #Phishing Alert⚠ #フィッシング #詐欺 #gmo #gmoインターネット hxxps://160.251.99.14/ IP: 160.251.99.14 (GMO Inernet @ConoHaPR . JP????????) https://www.abuseipdb.com/check/160.251.99.14 Brand: JCB Card ジェーシービーカード???????? https://urlscan.io/result/b5df4d7a-ee89-4bef-b469-8d60aef76b7e/ https://exchange.xforce.ibmcloud.com/url/https:~2F~2F160.251.99.14~2F https://twitter.com/ozuma5119/status/1389040351894065152/photo/1
-
[2021-05-01 20:48:36] @Arkbird_SOLG Samples: https://bazaar.abuse.ch/browse/tag/IronPython/ https://bazaar.abuse.ch/sample/65b43e30547ae4066229040c9056aa9243145b9ae5f3b9d0a01a5068ef9a0361/ Yara: https://github.com/StrangerealIntel/DailyIOC/blob/master/2021-05-01/Turla/APT_Turla_IronPython_Apr_2021_1.yara
-
[2021-04-28 20:45:17] @neonprimetime live cred #phishing received today 4/28/2021 subject: Payment Copy for 19th April and 25th April 2021 hxxps://sreetech.net/font-awesome/less/?login= [email protected] https://app.any.run/tasks/7ed72caa-0e65-4a93-87f8-bad7db49ff45 https://twitter.com/neonprimetime/status/1387402544482242560/photo/1
-
[2021-04-27 22:51:00] @luc4m nice! tracking #ursnif #isfb version:2.50 build:193 group:4462 Apr 21 2021/images/10291029JSJUYNHG fd38b156517859c151b1599f6cf38096 @felixw3000 @VK_Intel @HazMalware @Mesiagh @abuse_ch @malware_traffic @abuse_ch https://twitter.com/reecdeep/status/1386967595400695808 https://twitter.com/luc4m/status/1387071791160565766/photo/1
-
[2021-04-27 04:30:16] @ObscurityLabs #dell posted an article addressing that the files are not malicious and they signed and redeployed the binary bdbicextractor.exe to remedy the problem. https://www.dell.com/support/kbdoc/en-ca/000185741/dell-client-updates-launched-on-april-22-2021-incorrectly-identified-as-malware
-
[2021-04-17 07:47:01] @MBThreatIntel Tech support scam #browlock targeting ????????. Source: adult malvertising jpfftapr.fun/150421jp-8554 Phone: 050-5534-8554 https://twitter.com/MBThreatIntel/status/1383220418081792000/photo/1
-
[2021-04-15 05:56:08] @Arkbird_SOLG That the same SWF file and can be hunted.(a1d0a5484e67d6edc72cd833e976afc0d48afc3cb85670089d3d61e0c139fcc2) Yara: https://github.com/StrangerealIntel/DailyIOC/blob/master/2021-04-14/Underminer/Exp_Underminer_Apr_2021_1.yar cc: @nao_sec @jeromesegura https://twitter.com/Arkbird_SOLG/status/1382467737050521600/photo/1
-
[2021-04-12 08:56:47] @papa_anniekey これ、通信先が日本なんですよね。 hxxp://13.114.247.134/winhace/*.exe Look at the Analysis of "BILL - APRIL KYC.xlsx" with malicious activity. https://app.any.run/tasks/499bc553-3b4c-4bcf-9444-7c48412f0afa #encrypted #exploit #CVE201711882 #loader @anyrun_app https://twitter.com/papa_anniekey/status/1381426038832439296/photo/1
-
[2021-04-02 17:21:26] @JAMESWT_MHT #IcedID Big Wave too today Xls/Dll https://bazaar.abuse.ch/browse/tag/IcedID/ Dll https://bazaar.abuse.ch/sample/fa391aa80eba03870abb2514f0cd48c397807bd1aed622bcdc55948d695f12a3/ Dll Urls https://urlhaus.abuse.ch/browse/tag/IcedID/ /ds/0204.gif s/jaishritours.com s/digitalcreations.co.in s/unityindiversity.in s/utabmis.ac.rw s/pinkpaprika.co.uk C2 nenepepe.pro cc @sugimu_sec https://twitter.com/JAMESWT_MHT/status/1377589161616625664 https://twitter.com/JAMESWT_MHT/status/1377929158593032192/photo/1
-
[2021-04-01 23:47:29] @c_APT_ure And again another #DESKTOPgroup mail today.. NO April Fools joke ???? RTF -> embedded Excel w/ macro -> PS download more PC code -> #Remcos RAT C2: poseidon99.ddns.net https://bazaar.abuse.ch/sample/5f7e614ee696c3c2c437fa513db6c09a5203536793ef2e2b2f47971df90fbc1f/
-
[2021-03-24 00:15:28] @mguesdon 4 jours après. ca s'améliore mais très très doucement: 22 AVs sur 63 au 23/03: https://www.virustotal.com/gui/file/86a0d1ba0ae2b311636a32c90cc81b4aa459dc9232f4476c0bdc3cfad7fb6a8f/detection Toujours pas détecté semble t il par BitDefender. F-Secure. Sophos. Panda..
-
[2021-03-23 03:01:34] @micham OMG. "doxed"????. This scary page (hosted at @000webhost_com ) offers a @YouTube link to "Osama Bin Laden Gaming" and a malicious file to "fix". which is hosted at @MEGAprivacy . Don't fall for it and stay safe! https://www.virustotal.com/gui/file/4ce7c226c16e4c68fbe973443dca04cdad68e2cb31aa90c16482203ad4546fe0/detection https://twitter.com/micham/status/1374073787000315906/photo/1
-
[2021-03-02 23:15:01] @siri_urz https://www.first.org/events/web/cti-apr2021/ Call for Speakers
-
[2021-02-07 20:11:52] @ActorExpose Chinese Phish kit exfil: [email protected] (CN actor) kit: https://drive.google.com/drive/folders/11zto_ZYjr3FaINyAPRdQ2UDuE6lkqd86 @emailrepio @JCyberSec_
-
[2021-02-04 00:52:36] @andpalmier https://inizioaggiuntivaprotezione.com/ ????️ @hostingconcepts ???? @cpanel ☣️ 176.123.0.55 (AS200019) ???? https://urlscan.io/result/fb4760ca-b5e2-4b45-911d-caecb191b864/
-
[2021-01-29 22:21:52] @hatr According to @milkr3am and @craiu this file ( https://www.virustotal.com/gui/file/90e4f02ab9157f389d785c3dcddfa432085b237f2a4c3befb4a093d0f2711b5b/details) will remove Emotet infections end of April. If you look at the sample. you can see german words in there ("Hilfe". "Beenden"). German Federal Police won't comment on whether they're involved. https://twitter.com/hatr/status/1355159227019485188/photo/1
-
[2021-01-29 01:24:13] @MBThreatIntel We are checking on the #Emotet 'cleanup binary'. It seems the actual date to trigger the uninstall routine is April 25. More details to come. /cc @campuscodi @LawrenceAbrams https://www.virustotal.com/gui/file/a9c68d527223db40014d067cf4fdae5be46cca67387e9cfdff118276085f23ef/detection https://docs.microsoft.com/en-us/cpp/c-runtime-library/reference/localtime-localtime32-localtime64?view= msvc-160 https://twitter.com/MBThreatIntel/status/1354842730711502850/photo/1
-
[2021-01-26 21:01:45] @DownSecBelgium prudence si vous téléchargez le fichier d'installation de filezilla pour windows sur le site de filezilla le fichier est infecté ! https://www.virustotal.com/gui/file/6a582d1be83f079fd584f90b5872eb186889cdcc97bd276d51e65defedd77543/detection @zataz @Damien_Bancal @Numerama @zdnetfr @fillezca @FileZillaPro
-
[2021-01-21 05:34:42] @Cryptolaemus1 new #Emotet Epoch 1 urls ://yahyalisayam.com/sys-cache/tAsw/ ://casinos-hub.com/s/ZQhDyLF/ ://deoditas.com/n/FUEyoG/ ://mts2019-002-site9.gtempurl.com/wp-content/E/ s://ocean4gamers.com/wp-content/GAuYf/ ://academiaprogreso.com/cgi-bin/Z5/ s://newtop.one/responsives/z/
-
[2021-01-19 15:22:19] @yvesago #phishing spam sender script on #opendir @ERocaprevera site @CubeNodeSystem hosting 185.50.196.201 ping @malwrhunterteam @Spam404 @PhishStats https://twitter.com/yvesago/status/1351429766042288128/photo/1
-
[2021-01-16 02:34:49] @bl4ckh0l3z @malwrhunterteam #alien #banker #cybercrime ???? C2: chujwdupepolicji.xyz wykurwyzpolicji.xyz ziobrotykurwo.xyz przestanmialienaprzesladowac.xyz dreamdime.top oldgoodshoe.top blackdreamz.top
-
보이스피싱, 불법촬영물, 랜섬웨어, 사이버 안보위협 등에 관련된 사안의 경우 다음과 같은 기관 및 단체의 도움을 받을 수 있습니다. 노모어랜섬(No More Ransom) 경찰청 사이버범죄 신고시스템 국가정보원 민원센터