![]() String found in binary or memory: nco.me/fa/ String found in binary or memory: n.radar.ga me/app/vpn /tehranwir eguard.jso n String found in binary or memory: n.radar.ga me/app/vpn /Radar.jso n String found in binary or memory: n.radar.ga me/app/rad ar.json String found in binary or memory: n.radar.ga me/app/lin ks.json String found in binary or memory: droid.goog lesource.c om/toolcha in/llvm-pr oject String found in binary or memory: emas.andro id.com/apk /res/andro id String found in binary or memory: emas.andro id.com/apk /res-auto String found in binary or memory: emas.andro id.com/aap t String found in binary or memory: 202.7.211: 7979/plus ![]() String found in binary or memory: 202.7.211: 7979/minus URLs found in memory or binary data Source: android 1User-Age nt: Dalvik /2.1.0 (Li nux U An droid 9 V Mware Virt ual Platfo rm Build/P I)Host: te hranwg.rad ar.gameCon nection: K eep-AliveA ccept-Enco ding: gzip HTTP traffic detected: GET /getWG Key HTTP/1. 0 (Linux U Androi d 9 VMwar e Virtual Platform B uild/PI)Ho st: cdn.ra dar.gameCo nnection: Keep-Alive Accept-Enc oding: gzi p HTTP traffic detected: GET /app/l inks.json HTTP/1.1Us er-Agent: Dalvik/2.1. 1User-Age nt: Dalvik /2.1.0 (Li nux U An droid 9 V Mware Virt ual Platfo rm Build/P I)Host: cd n.radar.ga meConnecti on: Keep-A liveAccept -Encoding: gzip HTTP traffic detected: GET /app/v pn/Radar.j son HTTP/1. HTTP traffic detected: GET /app/r adar.json HTTP/1.1Us er-Agent: Dalvik/2.1. HTTP traffic detected: GET /app/v pn/tehranw ireguard.j son HTTP/1. TCP traffic detected without corresponding DNS query: 185.143.23 3.120ĭownloads files from webservers via HTTP Source: global tra ffic TCP traffic detected without corresponding DNS query: 185.143.23 4.122 TCP traffic detected without corresponding DNS query: 142.251.20 9.14 TCP traffic detected without corresponding DNS query: 108.177.11 9.188 ![]() TCP traffic detected without corresponding DNS query: 142.250.18 6.42 TCP traffic detected without corresponding DNS query: 142.250.18 6.163 TCP traffic detected without corresponding DNS query: 216.58.212. Network traffic detected: HTTP traff ic on port 41404 -> 443Ĭonnects to IPs without corresponding DNS lookups Source: unknown Network traffic detected: HTTP traff ic on port 41406 -> 443 Network traffic detected: HTTP traff ic on port 443 -> 42 014 Network traffic detected: HTTP traff ic on port 41402 -> 443 Network traffic detected: HTTP traff ic on port 443 -> 41 402 Network traffic detected: HTTP traff ic on port 41400 -> 443 Network traffic detected: HTTP traff ic on port 443 -> 41 400 Network traffic detected: HTTP traff ic on port 443 -> 41 406 Network traffic detected: HTTP traff ic on port 443 -> 41 404 Network traffic detected: HTTP traff ic on port 52582 -> 443 Network traffic detected: HTTP traff ic on port 443 -> 52 584 Network traffic detected: HTTP traff ic on port 50870 -> 443 Network traffic detected: HTTP traff ic on port 52572 -> 443 Network traffic detected: HTTP traff ic on port 41416 -> 443 Network traffic detected: HTTP traff ic on port 39602 -> 443 Network traffic detected: HTTP traff ic on port 50458 -> 443 Network traffic detected: HTTP traff ic on port 52576 -> 443 Network traffic detected: HTTP traff ic on port 52574 -> 443 Network traffic detected: HTTP traff ic on port 42014 -> 443 Network traffic detected: HTTP traff ic on port 443 -> 52 582 Network traffic detected: HTTP traff ic on port 443 -> 41 416 Network traffic detected: HTTP traff ic on port 52578 -> 443 Network traffic detected: HTTP traff ic on port 443 -> 52 576 Network traffic detected: HTTP traff ic on port 443 -> 52 578 Network traffic detected: HTTP traff ic on port 52584 -> 443 Network traffic detected: HTTP traff ic on port 443 -> 52 572 Network traffic detected: HTTP traff ic on port 443 -> 52 574
0 Comments
Leave a Reply. |