Rezultati pretraživanja
  1. 17. lis 2019.

    Please to announce Definitive Dossier of Devilish Debug Details – Part Deux of our PDB path research, where covers his journey into statistical analysis and approaches for general classification of PDB paths with respect to malware.

    Prikaži ovu nit
  2. 4. pro 2019.

    IBM X-Force report new destructive malware, initial access to victims linked to APT34: C:\Users\Developer\source\repos\ZeroCleare\x64\Release\zeroclear.pdb ? 🧐

  3. 3. pro 2019.

    Stumbled across this PDB path today while looking for bins with some of APT37's favorite User-Agent strings: C:\Users\jack\Desktop\test\ec_new\down_new\Release\down_new.pdb I see this was covered in Operation ENDTRADE report w/ many others:

    Prikaži ovu nit
  4. 28. lis 2019.

    This is obviously just a coincidence, but I thought it was a fun overlap. It's called because malware developers are humans and humans have predictable conventions:

    Prikaži ovu nit
  5. 27. ruj 2019.

    Fresh compiled KEYBOY cluster, now featuring Cobalt Strike c:\Users\john\Documents\Visual Studio 2008\Projects\myWorkDll\Release\myWorkDll.pdb C:\Users\john\source\repos\CsDecodeExec\Release\CsDecodeExec.pdb C:\Users\Tony\Desktop\CsDecodeExec\Release\CsDecodeExec.pdb

    Prikaži ovu nit
  6. 9. velj 2018.

    That time when we had a president who respected our intelligence agencies and didn’t get his information from . ❤️

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.