찾아줄게요
WID 파일은 무엇입니까?
-
안녕하세요. 제 컴퓨터에서 WID라는 파일을 찾았는데 이것이 무엇인지 잘 모르겠습니다. 알려주시면 감사하겠습니다.
-
WID 파일은 SAP BusinessObjects 웹 인텔리전스 파일 입니다. SAP에서 배포한 파일인 것으로 보입니다. 2017-10-26 04:00:55에 처음으로 보고되었으며 2017-10-26 04:00:55에 마지막으로 보고되었습니다.
-
SAP BusinessObjects Web Intelligence 프로그램을 다운로드하여 WID 파일을 열 수 있습니다.
-
SAP BusinessObjects 웹 인텔리전스 파일
SAP BusinessObjects Web Intelligence File -
시그니처 정보가 없습니다.
-
연관 링크 #2: 첨부된 링크가 없습니다.
-
-
[2021-06-19 15:27:02] @bsmuir Someone asked me about the prevalence of this threat in the wild; it doesn't appear to be widely abused yet. but here is a small #Android #adware app that contacts domains hosted by #NBdomain - https://www.virustotal.com/gui/file/a1829e68e4f5268320ba79f86b1de0e14893ec056afc392381e16a368ec174f0/details
-
[2021-05-19 15:32:35] @InQuest ???? Malicious RTF document found hosted at: https///waselp.com.sa/wp-includes/widgets/w/s.wbk SHA256: a840d8ddfc537c199c74029e97d5571455753b547f0c2061061d76a9d5a65eea IOC extracted from sample: https://labs.inquest.net/dfi/hash/5392f59cac6f4b6c7d0379306818a1cad6ff12dc940a5ecb4fac36a2e0dd7877
-
[2021-05-14 03:50:53] @Racco42 Malspam "AZ.: 339/15 Unterlassungserklärung - Digitale Zustellung" brings some kind of simple jscript #rat. anybody know a name? https://app.any.run/tasks/ac2498fc-270b-42b5-993f-909120aba06b C2: hxxps://greenwidow.top/update.php Nobody was picking up the call home ????
-
[2021-03-07 02:11:55] @KrystianAndrz20 @ZeroCERT @rikmerremkir @Cryptolaemus1 @ninoseki Do ZeroCERT. Chyba służby fałszują stronę http://virustotal.com. Proszę prześledzić wideo moje ip nie jest zawirusowane. Link i zdjęcie. Proszę sprawdzić czy sprawa jest jakoś powiązana z sex taśmą członka tzw rodziny Królewskiej. https://archive.vn/fvP2l https://twitter.com/KrystianAndrz20/status/1368263086365409290/photo/1
-
[2021-03-05 17:44:41] @HarioMenkel Hello #gootkit my old friend.. hxxps://pwamerongen.nl/2020/08/15/welche-rechtsschutzversicherung-deckt-widerruf-darlehensvertrag/ More infos: https://otx.alienvault.com/pulse/6041fd76309033fc658e6785 https://twitter.com/HarioMenkel/status/1367773049316126720/photo/1
-
[2021-02-18 07:13:58] @cyberwar_15 #북한 #박진혁 #전창혁 #김일 https://www.justice.gov/opa/pr/three-north-korean-military-hackers-indicted-wide-ranging-scheme-commit-cyberattacks-and https://twitter.com/cyberwar_15/status/1362178504276647937/photo/1
-
[2021-02-11 04:07:30] @kyleehmke @silentpush @mattjshelton @obaig11 Thanks! @jfslowik and @DomainTools have a great blog related to this research and several of those domains in case you haven't seen it: https://www.domaintools.com/resources/blog/current-events-to-widespread-campaigns-pivoting-from-samples-to-identify
-
[2021-02-06 05:08:13] @ActorExpose Active Phish (compromised) hxxps://licitacoesepregoes.socorro.sp.gov.br/wp-admin/js/widgets/index1.php @CSAFCert
-
[2021-01-05 20:17:12] @Cryptolaemus1 New #emotet Epoch 2 urls 2/2 s://radioclype.scola.ac-paris.fr/wp-admin/js/widgets/6S/
-
[2020-12-24 06:56:30] @VK_Intel 2020-12-23: ????Course Our #Zero2Automated Malware Course ????We are launching a new ????holiday promotion to obtain our course https://courses.zero2auto.com/?coupon= HAPPYHOLIDAYS - 15% off storewide until 26th December at midnight Zero2Automated with discount code "HAPPYHOLIDAYS" ???? @0verfl0w_ | @sysopfb
-
[2020-12-19 15:41:14] @bl4ckh0l3z @kurd_RAT @malwrhunterteam (2/2) And this is exactly what has already happened in the recent past when it has been devoted to spreading the ???? WannaRen ransomware. ???????????? https://cntechpost.com/2020/04/09/ransomware-wannaren-may-have-been-spread-widely-through-download-sites/
-
[2020-11-24 01:38:21] @lazyactivist192 @FertigNeverDies @SSA_WorldWide Notice that thats from http://att.com. whats the lasst thing you got published? Also. I'm 22 my dude lol. I was published at 19. Im a child. but I'm a successful child.
-
[2020-10-29 16:18:34] @abel1ma (続き) hxxps://itgallery.com.bd/backup/7/ hxxp://jobmuslim.com/wp-admin/js/widgets/HrWFGwvcF/ hxxps://airrlist.com/wp-includes/VBG/ hxxps://www.ppinds.in/fonts/NnaS2zf/ hxxps://www.yadanaraung.com/wp-content/zWNM/
-
[2020-10-29 14:49:09] @Cryptolaemus1 New #emotet Epoch 3 urls 1/2 s://visionmedia.vn/wp-includes/bjkuZ9LtT/ s://demowebsite6.club/wp-admin/wKm1/ s://itgallery.com.bd/backup/7/ //jobmuslim.com/wp-admin/js/widgets/HrWFGwvcF/ s://airrlist.com/wp-includes/VBG/ s://www.ppinds.in/fonts/NnaS2zf/
-
[2020-10-28 18:59:54] @Cryptolaemus1 New #emotet Epoch 2 urls 1/2 //nanettecook.org/wp-admin/x/ //scalarmonitoring.com/wp-admin/js/widgets/S0A/ s://fourseasonsjsc.com/wp-admin/hzu9vvt/ s://ningyangseo.com/wp-admin/am/ s://www.rapidcarwash.net/wp-content/nO6U/ //coolchacult.com/wp-includes/i/
-
[2020-10-20 16:29:56] @4mul8ing @Hamaalin Here are many websites that have encoded language for this same subject. in google search results. They match with codes for #childtraffickers across the world. The Governments cannot do much unless we all speak out. 1) https://develop.docs.modyo.com/widgets/retail/credit-cards.html 2) https://hybrid-analysis.com/sample/6743e819a34e26290e4b9e7692ff5a063cdc0d48cc87f6c77fb3c28097db79e4?environmentId= 110&lang= en https://twitter.com/4mul8ing/status/1318484585571700738/photo/1
-
[2020-10-07 19:04:15] @reecdeep ????#Dridex #Malware from #malspam h/t @58_158_177_102 ➡️hxxps://newmg532.wordswideweb.com/osn5u0wii.txt ????c2 177.87.70.3:443 213.133.102.195:3889 27.254.174.93:33443 27.254.174.77:4443 @sugimu_sec @James_inthe_box @guelfoweb @theDark3d @gorimpthon #infosec #CyberSecurity https://twitter.com/reecdeep/status/1313812381907202048/photo/1
-
[2020-10-01 09:01:08] @_re_fox #evilnum #malware #lnk VerificationCompliance.zip (4aeea8888ca29e68952de98828efd380) Contains IDNationwide.jpg.lnk (3ca27cb1e35573c8b671cb3cd1eb26ce) https://app.any.run/tasks/edc4a23b-7890-4c84-bbc7-6fefae04d03a
-
[2020-09-09 09:43:58] @bad_packets " @CISAgov is aware of open-source reporting of targeted denial-of-service (DoS) and distributed denial-of-service ( #DDoS) attacks against finance and business organizations worldwide." https://us-cert.cisa.gov/ncas/current-activity/2020/09/04/dos-and-ddos-attacks-against-multiple-sectors …
-
[2020-08-26 09:11:46] @Cryptolaemus1 New #Emotet E1 payloads 23:19UTC+: https://app.any.run/tasks/1957796f-da95-482a-839d-a4db6990a70e … /jerem.com/themes/nu2/ s://itcsis.com/docuitc/G/ s://www.jejach.net/widgets/1E/ /mikebonales.com/blog/In5/ /grandsignatureyercaud.com/css/Gp/ /hstlive.com/blabs/N/ /www.immortalmodeling.com/dev/blog/SF/
-
[2020-08-25 21:55:53] @ScarletSharkSec #Formbook Sample https://app.any.run/tasks/ec92afec-48e5-4327-856d-813ca353a216 … Payload: hxxp://blockchainmarketisprettygoodforworldwide.duckdns.org/bg/vbc.exe Pattern: domain/ncs/?data Domains in comment.
-
[2020-07-31 05:07:28] @executemalware Nightwish from Wacken 2018 (Decades tour) being streamed now on: https://wacken-world-wide.com/
-
[2020-07-30 06:50:04] @executemalware Long Distance Calling is on now: https://wacken-world-wide.com/
-
[2020-07-30 04:46:08] @VK_Intel 2020-07-29: Delphi Plugin-Based #Loader "ShowMagic" | #Signed Cert -> "MAK GmbH" #Sectigo bot_id: 3 version: 3 bid3/bidv3/vhwid | mode communicatioon MD5:29DC14A1F07962CB84ED7E26F2067CC2 h/t @malwrhunterteam pic.twitter.com/smsqzdz1vO
-
[2020-07-27 22:59:15] @yvesago #phishing @Chronopost s://almostadama.com/wp-includes/widgets/ #opendir ping @malwrhunterteam @Spam404 @PhishStats @Malwaredev pic.twitter.com/poTDdPVC3V
-
[2020-07-07 12:28:48] @bad_packets Our latest CVE-2020-5902 scans have identified 3.012 vulnerable F5 hosts worldwide. Bad Packets vulnerability scan results are freely available for authorized government CERT. CSIRT. and ISAC teams. Submit request here: https://forms.gle/Kwsiyp8U43W3MSXFA … https://twitter.com/bad_packets/status/1280002119236325377 …
-
[2020-07-05 16:00:08] @NetwideSA Found a file that looks a bit suspicious!? Here’s a nifty tool to learn more about the viruses affecting your system CLICK HERE https://www.hybrid-analysis.com/ For cybersecurity solutions http://netwide.co.za/ #Netwide #Cybersecurity #YouGotIT pic.twitter.com/9y22mdhVkM
-
[2020-06-09 22:33:10] @0xrb Exclusive: Obscure Indian cyber firm spied on politicians. investors worldwide https://uk.reuters.com/article/us-india-cyber-mercenaries-exclusive-idUKKBN23G1GQ …
-
[2020-05-25 23:35:38] @JanTom12900449 Malware on VM: https://app.any.run/tasks/be33c7d8-048b-4536-bd50-919b6008f6d8 … Record with behavior graph: https://any.run/report/425fe75506b5a4e352a9e8cab7c321cf98b12a81f9bf556b5164dbedff1872f8/be33c7d8-048b-4536-bd50-919b6008f6d8#processes … Malware running: https://cdn.discordapp.com/attachments/692797937494917130/714483978563878942/unknown.png … Discord without malware: https://media.discordapp.net/attachments/692797937494917130/714484659529973770/unknown.png?width= 1298&height= 672 …
-
[2020-05-21 21:01:26] @James_inthe_box 500 samples..looks like #ursnif with a c2 of: https://worldwidebars.xyz/index.htm cc @xyz pic.twitter.com/xuYTwxDM72
-
보이스피싱, 불법촬영물, 랜섬웨어, 사이버 안보위협 등에 관련된 사안의 경우 다음과 같은 기관 및 단체의 도움을 받을 수 있습니다. 노모어랜섬(No More Ransom) 경찰청 사이버범죄 신고시스템 국가정보원 민원센터