Quantcast
Channel: LeakedIn
Viewing all articles
Browse latest Browse all 5503

Potential leak of data: Obfuscated HTTP URL

$
0
0
Detected 2 occurrence(s) of ‘h[x]{2}p[s]*:\/\/[a-z0-9\-\./]+': chp​lugins\conduit-search.xml [2014-04-30] FF Extension: No Name - C:\Program Files (x86)\Mozilla Firefox\browser\extensions\{972ce4c6-7e08-4474-a285-3208198ce6fd} [Not Found] CHR HomePage: Default -> hxxp://www.google.com/ CHR StartupUrls: Default -> "hxxp://www.google.com/", "" CHR Extension: (Blue Exorcist Theme) - C:\Users\Viper\AppData\Local\Google\Chrome\User Data\Default\Extensions\kgoiipfcgeibblincnkdfpicpmciinmg [2014-11-02] S2 PowerMon; C:\Windows\Temp\PowerMon\PowerMon.exe [1958288 2013-10-11] () [File not signed Source: http://pastebin.com/raw.php?i=cWbsSm9D

Viewing all articles
Browse latest Browse all 5503

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>