![]() "POST /services/register/rest/1/hasActivatableService HTTP/1.1Content-Length: 37Cookie: JSESSIONID=74437b1a38a4a3e5163bdc690cfa.zoeyHost: -Agent: iGO-9.35.2.0" with no payload "POST /rest/1/resource/list HTTP/1.1Content-Length: 39Host: -Agent: iGO-9.35.2.0" with no payload "POST /services/register/rest/1/get_device_descriptor_list HTTP/1.1Content-Length: 45Cookie: JSESSIONID=74437b1a38a4a3e5163bdc690cfa.zoeyHost: -Agent: iGO-9.35.2.0" with no payload "POST /services/diag/rest/1/settings HTTP/1.1Content-Length: 43Host: -Agent: iGO-9.35.2.0" with no payload "POST /services/register/rest/1/license HTTP/1.1Content-Length: 580Cookie: JSESSIONID=74437b1a38a4a3e5163bdc690cfa.zoeyHost: -Agent: iGO-9.35.2.0" with no payload "POST /services/register/rest/1/device HTTP/1.1Content-Length: 240Host: -Agent: iGO-9.35.2.0" with no payload "POST /services/index/rest/3/boot HTTP/1.1Content-Length: 22Host: -Agent: iGO-9.35.2.0" with no payload "POST /services/selfie/rest/1/update HTTP/1.1Connection: Keep-AliveContent-Type: application/json charset=UTF8Accept: application/jsonUser-Agent: WinHTTP ToolBox/1.0Content-Length: 77Host: " with no payload Multiple malicious artifacts seen in the context of different hostsĬontains ability to reboot/shutdown the operating system "tbagent.exe" wrote 8 bytes to a remote process "%PROGRAMFILES%\(x86)\Mazda\Toolbox\awesomium_process.exe" (Handle: 1008)įound malicious artifacts related to "80.249.174.16". "tbagent.exe" wrote 4 bytes to a remote process "%PROGRAMFILES%\(x86)\Mazda\Toolbox\awesomium_process.exe" (Handle: 1008) "tbagent.exe" wrote 52 bytes to a remote process "%PROGRAMFILES%\(x86)\Mazda\Toolbox\awesomium_process.exe" (Handle: 1008) "tbagent.exe" wrote 32 bytes to a remote process "%PROGRAMFILES%\(x86)\Mazda\Toolbox\awesomium_process.exe" (Handle: 1008) "" wrote 8 bytes to a remote process "%PROGRAMFILES%\(x86)\Mazda\Toolbox\tbagent.exe" (Handle: 596) "" wrote 4 bytes to a remote process "%PROGRAMFILES%\(x86)\Mazda\Toolbox\tbagent.exe" (Handle: 596) "" wrote 52 bytes to a remote process "%PROGRAMFILES%\(x86)\Mazda\Toolbox\tbagent.exe" (Handle: 596) "" wrote 32 bytes to a remote process "%PROGRAMFILES%\(x86)\Mazda\Toolbox\tbagent.exe" (Handle: 596)
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |