찾아줄게요
CCT 파일은 무엇입니까?
-
안녕하세요. 제 컴퓨터에서 CCT라는 파일을 찾았는데 이것이 무엇인지 잘 모르겠습니다. 알려주시면 감사하겠습니다.
-
CCT 파일은 Macromedia Director, 쇽웨이브 캐스트 파일 입니다. Adobe에서 배포한 파일인 것으로 보입니다. 2008-08-09 05:46:34에 처음으로 보고되었으며 2008-08-09 04:14:40에 마지막으로 보고되었습니다.
-
적절한 프로그램을 다운로드하여 CCT 파일을 열 수 있습니다.
-
Macromedia Director, 쇽웨이브 캐스트 파일
-
시그니처 정보가 없습니다.
-
연관 링크 #1: 첨부된 링크가 없습니다.
-
연관 링크 #2: 첨부된 링크가 없습니다.
-
-
[2021-04-18 00:36:33] @Krystia22165766 @CCTV Według skanera ibm http://megawrzuta.pl jest czysta linki i zdjęcia: https://archive.ph/bSo1A https://archive.ph/2021.04.17-173315/ https://exchange.xforce.ibmcloud.com/url/megawrzuta.pl https://twitter.com/Krystia22165766/status/1383474474306076675/photo/1
-
[2021-04-18 00:23:55] @Krystia22165766 @CCTV Chodzi o raport http://virustotal.com ze strony http://zerocert.org bez gwiazdki chyba zabezpiecza ją comodo. Wcześniej mieli błędny certyfikat bo Chromium raportowało że ta strona jest niebezpieczna https://cert.zero.camp/safeguard/ Zdjęcie https://twitter.com/Krystia22165766/status/1383471297984823307/photo/1
-
[2021-04-18 00:22:02] @Krystia22165766 @CCTV Raport http://virustotal.com z gwiazdką czekam na raport http://zerocert.org bez gwizdki. Zdjęcia i link: https://archive.today/2021.04.17-171706/ https://www.virustotal.com/gui/url/8d997bafa7883dcc8ff1164d4a4103d6cc896a8627c54d4005bea860466a93fc/detection https://twitter.com/Krystia22165766/status/1383470823231553541/photo/1
-
[2021-03-19 17:45:27] @yvesago #phishing s://firebasestorage.googleapis.com/v0/b/tcctax-50511.appspot.com/o/tax_clear_leg1.html?token= c10dcd35-157a-434c-a3ec-475db0d850ac#POST to s://docwebserve.yakubfashionltd.com/data.php 103.19.255.244 BD ping @malwrhunterteam @Spam404 @PhishStats https://twitter.com/yvesago/status/1372846670807961604/photo/1
-
[2021-02-19 07:09:03] @bad_packets Active #DDoS malware payload detected: http://45.14.148.234/arm7 ( https://www.virustotal.com/gui/url/6cffe49eea97bee2c68a7b384548a1ebbdfc967e4c80e07847a04bc5aa3d97b9/details) Hosting provider: hostsolutions.ro (AS44220) ???????? Target: MVPower DVR (JAWS web server) RCE vulnerability ( https://pentestpartners.com/security-blog/pwning-cctv-cameras/) #threatintel https://twitter.com/bad_packets/status/1362539655007068160/photo/1
-
[2021-02-18 17:27:08] @nao_sec New blog post! #nccTrojan is a RAT used by #TA428 in attacks targeting East Asian defense and aviation organizations. Please see the analysis result of nccTrojan v1 and v2???? https://insight-jp.nttsecurity.com/post/102gr6l/ta428ncctrojan
-
[2020-11-05 18:34:28] @ffforward /eacctverse3b.ga is on @Microsoft IP (@Azure I guess) 52.249.218.220 and has been on 40.76.192.17. @Pawp81 @GossiTheDog anything you guys can look into or forward to the right people? Handlers without an UI is usually pretty hard to get anyone to care about.
-
[2020-11-05 17:59:16] @ffforward #Phishing via rs6.net @ConstantContact > /pulleycal.com > @googlecloud posts to s/eacctverse3b.ga/ggg/next.php cc @Spam404
-
[2020-08-26 06:41:10] @yungmay0 fuck fuck fuck. Found this one through PS logging. #malspam #PowerShell hxxp://pelayoacctg.org.ph/app/balance/ml4ar1t2n/ https://app.any.run/tasks/6f234b9c-35dd-4659-be3c-f6ee6a6b1567 …
-
[2020-04-05 15:51:58] @bad_packets Active DDoS malware payload detected: http://45.161.255.133:48657/Mozi.a ( https://www.virustotal.com/gui/url/e262b54c79ec4e5686a0f6900ab4c9d2845fedc3d28bf97e71c02cf4785da455/details …) Exploit attempt source IP: 45.161.255.133 () Target: Generic CCTV-DVR remote code execution vulnerability ( http://kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html …) #threatintel #malware pic.twitter.com/bBDKr1VcTO
-
[2020-03-24 00:19:30] @James_inthe_box Active #Lokibot at: http://bistromkt.com.pa/link/linkdjdjdj.exe c2: http://kitchenraja.in/links/Panel/five/fre.php hash 8dfe82b54c28cc7dcad0d7671384c127 on @mal_share cc @fumik0_ @cocaman @hexlax pic.twitter.com/B0ccTFa5Wi
-
[2020-03-06 09:01:41] @0xCARNAGE #Formbook XLAM->CVE-2017-11882->Fuckery Payload: altamonteorators.com/images/admin/8907.exe Contacts several domains: homedocctorofamerica.com mddick.info etbuyshomes.com drkathyskrafts.com https://app.any.run/tasks/50425c88-aec7-4ed9-847e-96b40ff9c98a/ …
-
[2020-03-04 21:52:21] @ActorExpose Active Mailer kit (compromised) /cctvsecurityinstallations.co.uk/wp-content/themes/legrand-child/yala.php @douglasmun @CSAFCert https://twitter.com/ActorExpose/status/1235186039255379968 …
-
[2020-02-11 10:09:34] @bad_packets Active DDoS malware payload detected: http://72.2.249.219:58706/Mozi.a ( https://virustotal.com/gui/url/ff26e444bf3fac425eee7e63b5421ff4097228ccfbb80bef5808c32475d3b501/details …) Exploit attempt source IP: 72.2.249.219 () Target: Generic CCTV-DVR remote code execution vulnerability ( http://kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html …) #threatintel #malware pic.twitter.com/kdnymy0VaX
-
[2020-02-11 05:28:51] @relationsatwork Meanwhile. someone ordered from #escobarinc all #escobarfold2 available in the multiverse.. http://bit.ly/pef2run Anyway. @WellsFargo should check REICHSTE LLC 6850368975 acct = archived entity since 4/2019 - NOT allowed to new business transactions. http://bit.ly/reichstellc pic.twitter.com/DLC338pIQP
-
[2020-01-01 13:29:06] @bad_packets Active DDoS malware payload detected: http://112.17.78.170:38996/Mozi.a () https://virustotal.com/gui/file/e15e93db3ce3a8a22adb4b18e0e37b93f39c495e4a97008f9b1a9a42e1fac2b0/detection … Exploit attempt source IP: 112.17.78.170 () Target: Multiple CCTV/DVR vendors remote code execution vulnerability ( https://www.exploit-db.com/exploits/39596 ) #threatintel pic.twitter.com/3tcXtFmCO7
-
보이스피싱, 불법촬영물, 랜섬웨어, 사이버 안보위협 등에 관련된 사안의 경우 다음과 같은 기관 및 단체의 도움을 받을 수 있습니다. 노모어랜섬(No More Ransom) 경찰청 사이버범죄 신고시스템 국가정보원 민원센터