色姐姐激情网 所谓的“真实的百度云独一最新可用……”是病毒,大师翔实!52破解已屏蔽发帖者!
发布日期:2024-10-10 07:34 点击次数:170
本帖临了由 老灰猪 于 2017-4-25 13:28 裁剪
52破解已屏蔽了原发帖者,原原本本的病毒!
放毒死全家!!!
手工分析也通晓是彻心透骨的病毒。至于腾讯的查毒,我只可呵呵呵呵……
改动首页:
感染以下文献到系统色姐姐激情网,并植入驱动:
ipsec32.sys色姐姐激情网,ipsec64.sys,supporte6.exe
会给典型浏览器加尾巴:97175858_hao_pg,90058352_hao_pg
步履形状: 创建文献
细则信息: C:\Windows\libegl.dll
C:\Windows\supporte6.exe
C:\Windows\ipsec32.sys
C:\Users\Administrator\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2KQWVTOD\api[1]
C:\Windows\SkinH_EL.dll
步履形状: 创建可实行文献
细则信息: C:\Windows\libegl.dll
C:\Windows\supporte6.exe
C:\Windows\ipsec32.sys
C:\Windows\SkinH_EL.dll
步履形状: 查找文献
细则信息: FileName = C:\Windows\libegl.zh-CN
FileName = C:\Windows\libegl.zh-Hans
FileName = C:\Windows\libegl.zh
FileName = C:\Windows\libegl.en-US
FileName = C:\Windows\libegl.en
FileName = C:\Windows\libegl.CHS
FileName = C:\Windows\libegl.CH
FileName = C:\ProgramData\Microsoft\Network\Connections\Pbk\rasphone.pbk
FileName = C:\ProgramData\Microsoft\Network\Connections\Pbk\*.pbk
FileName = C:\Windows\system32\Ras\*.pbk
FileName = C:\Users\Administrator\AppData\Roaming\Microsoft\Network\Connections\Pbk\rasphone.pbk
FileName = C:\Users\Administrator\AppData\Roaming\Microsoft\Network\Connections\Pbk\*.pbk
FileName = C:\Windows
FileName = C:\Windows\*.*
FileName = C:\Users\Administrator\Desktop\QQ浏览器.lnk
步履形状: 树立寥落文献属性
细则信息: C:\Windows\SkinH_EL.dll
步履形状: 删除文献
细则信息: C:\Users\Administrator\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2KQWVTOD\api[1]
步履形状: 树立寥落文献夹属性
细则信息: C:\Users\Administrator\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5
C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\Cookies
C:\Users\Administrator\AppData\Local\Microsoft\Windows\History\History.IE5
步履形状: 修改文献试验
细则信息: C:\Windows\libegl.dll ---> Offset = 0
C:\Windows\supporte6.exe ---> Offset = 0
C:\Windows\ipsec32.sys ---> Offset = 0
C:\Windows\SkinH_EL.dll ---> Offset = 0
网罗步履
步履形状: 联网绽放网址
细则信息: InternetOpenUrlA: ****om/gameall/api?a=s&nm=ggggg&q=c116&v=1.0.0&s3=0&m=08-00-27-48-89-80, hInternet = 0x00cc0004, Flags = 0x00000001
步履形状: 绽放HTTP连结
细则信息: InternetOpenA: UserAgent: b70c, hSession = 0x00cc0004
步履形状: 征战到一个指定的套接字连结
细则信息: URL: u.****om, IP: **.133.40.**:80, SOCKET = 0x00000388
步履形状: 发送HTTP包
细则信息: GET /gameall/api?a=s&nm=ggggg&q=c116&v=1.0.0&s3=0&m=08-00-27-48-89-80 HTTP/1.1 User-Agent: b70c Host: u.****om
步履形状: 按称号赢得主机地址
细则信息: GetAddrInfoW: u.****om
注册表步履
步履形状: 修改注册表
细则信息: \REGISTRY\USER\S-*\Software\Microsoft\Windows Script\Settings\JITDebug
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Tracing\b70c_RASAPI32\EnableFileTracing
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Tracing\b70c_RASAPI32\EnableConsoleTracing
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Tracing\b70c_RASAPI32\FileTracingMask
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Tracing\b70c_RASAPI32\ConsoleTracingMask
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Tracing\b70c_RASAPI32\MaxFileSize
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Tracing\b70c_RASAPI32\FileDirectory
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Tracing\b70c_RASMANCS\EnableFileTracing
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Tracing\b70c_RASMANCS\EnableConsoleTracing
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Tracing\b70c_RASMANCS\FileTracingMask
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Tracing\b70c_RASMANCS\ConsoleTracingMask
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Tracing\b70c_RASMANCS\MaxFileSize
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Tracing\b70c_RASMANCS\FileDirectory
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList\S-*\RefCount
步履形状: 删除注册表键值
细则信息: \REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyServer
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyOverride
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\AutoConfigURL
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\CompatibilityAdapter\Signatures\User_Feed_Synchronization-{DD45CED3-68D4-4258-9DB0-B2D0B36690C9}.job
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\CompatibilityAdapter\Signatures\User_Feed_Synchronization-{DD45CED3-68D4-4258-9DB0-B2D0B36690C9}.job.fp
其他步履
步履形状: 检测本身是否被调试
细则信息: IsDebuggerPresent
步履形状: 创建互斥体
细则信息: RasPbFile
Local\ZonesCounterMutex
Local\ZoneAttributeCacheCounterMutex
Local\ZonesCacheCounterMutex
Local\ZonesLockedCacheCounterMutex
步履形状: 惯例加载驱动
细则信息: \??\C:\Windows\ipsec32.sys
步履形状: 绽放互斥体
细则信息: Local\MSCTF.Asm.MutexDefault1
Local\_!MSFTHISTORY!_
Local\c:!users!administrator!appdata!local!microsoft!windows!temporary internet files!content.ie5!
Local\c:!users!administrator!appdata!roaming!microsoft!windows!cookies!
Local\c:!users!administrator!appdata!local!microsoft!windows!history!history.ie5!
Local\WininetStartupMutex
Local\WininetConnectionMutex
Local\WininetProxyRegistryMutex
RasPbFile
Local\!IETld!Mutex
步履形状: 查找指定窗口
细则信息: NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
步履形状: 启动系统工作
细则信息: [工作启动告捷]: , ipsec32.sys, \??\C:\Windows\ipsec32.sys
步履形状: 窗口信息
细则信息: Pid = 1508, Hwnd=0x1701ce, Text = 确定, ClassName = Button.
Pid = 1508, Hwnd=0x1a01e0, Text = 百度云出现免费试用后点免费试用,然后在点击软件上的一键无穷试用!, ClassName = Static.
Pid = 1508, Hwnd=0x1a0114, Text = 信息:, ClassName = #32770.
Pid = 2748, Hwnd=0x1b0116, Text = 1:, ClassName = Static.
Pid = 2748, Hwnd=0x1d01c0, Text = load, ClassName = Button.
Pid = 2748, Hwnd=0x2401de, Text = 1, ClassName = Button.
Pid = 2748, Hwnd=0x1b01dc, Text = 2, ClassName = Button.
Pid = 2748, Hwnd=0x260168, Text = 3, ClassName = Button.
Pid = 2748, Hwnd=0x180166, Text = 4, ClassName = Button.
Pid = 2748, Hwnd=0x280112, Text = C:\Users\Administrator\Desktop, ClassName = MFCEditBrowse.
Pid = 1508, Hwnd=0x170306, Text = 请叫我大师男神i, ClassName = Afx:400000:b:10003:1900015:0.
Pid = 1508, Hwnd=0x160302, Text = 一键无穷试用技艺, ClassName = Button.
Pid = 1508, Hwnd=0x802ec, Text = 52pojie 请叫我大师男神i, ClassName = WTWindow.
Pid = 1508, Hwnd=0x1d0114, Text = 确定, ClassName = Button.
Pid = 1508, Hwnd=0x1901d2, Text = 启动时出错! 不实代码:4 不实信息:数构成员援用下标必须大于即是1 , ClassName = Static.
步履形状: 赢得TickCount值
细则信息: TickCount = 832109, SleepMilliseconds = 60000.
TickCount = 832125, SleepMilliseconds = 60000.
TickCount = 832140, SleepMilliseconds = 60000.
TickCount = 832156, SleepMilliseconds = 60000.
TickCount = 832171, SleepMilliseconds = 60000.
TickCount = 832218, SleepMilliseconds = 60000.
TickCount = 832234, SleepMilliseconds = 60000.
TickCount = 832250, SleepMilliseconds = 60000.
TickCount = 832265, SleepMilliseconds = 60000.
TickCount = 832281, SleepMilliseconds = 60000.
TickCount = 832296, SleepMilliseconds = 60000.
TickCount = 832312, SleepMilliseconds = 60000.
TickCount = 832359, SleepMilliseconds = 60000.
TickCount = 832375, SleepMilliseconds = 60000.
TickCount = 832390, SleepMilliseconds = 60000.
步履形状: 移动程度token权限
细则信息: SE_SECURITY_PRIVILEGE
SE_SHUTDOWN_PRIVILEGE
SE_AUDIT_PRIVILEGE
步履形状: 绽放事件
细则信息: HookSwitchHookEnabledEvent
\KernelObjects\MaximumCommitCondition
MSFT.VSA.COM.DISABLE.2748
MSFT.VSA.IEC.STATUS.6c736db0
Local\MSCTF.CtfActivated.Default1
Local\MSCTF.AsmCacheReady.Default1
\SECURITY\LSA_AUTHENTICATION_INITIALIZED
Global\SvcctrlStartEvent_A3752DX
步履形状: 查找PE资源信息
细则信息: (FindResourceExExW) hModule = 0x00000000, ResName: 95(ID), ResType: WIN32EXE
(FindResourceExExW) hModule = 0x00000000, ResName: 140(ID), ResType: WIN32EXE
(FindResourceExExW) hModule = 0x00000000, ResName: 97(ID), ResType: WIN32EXE
步履形状: 赢得窗口截图信息
细则信息: Foreground window Info: HWND = 0x001701ce, DC = 0xcc0109e6.
Foreground window Info: HWND = 0x00170306, DC = 0x9c010a8b.
Foreground window Info: HWND = 0x00170306, DC = 0xcc0109e6.
Foreground window Info: HWND = 0x00170306, DC = 0x5e0101db.
Foreground window Info: HWND = 0x001d0114, DC = 0xef01096b.
苏畅麻豆