Subscribe via feed.
Archive for May, 2022

RedLine.Stealer Code Execution

Posted by deepcore under exploit (No Respond)

RedLine looks for and loads a DLL named “wow64log.dll” in Windows\System32. Therefore, we can drop our own DLL to intercept and terminate the malware. The exploit DLL will simply display a Win32API message box and call exit(). Our RedLine exploit DLL must export the “InterlockedExchange” function or it fails with an error. We do not […]

http://www.krajai.go.th/readme.html

Posted by deepcore under defacement (No Respond)

http://www.krajai.go.th/readme.html notified by AnonSec Team

Tags:

http://www.nakhamloei.go.th/readme.html

Posted by deepcore under defacement (No Respond)

http://www.nakhamloei.go.th/readme.html notified by AnonSec Team

Tags:

http://www.napongloei.go.th/readme.html

Posted by deepcore under defacement (No Respond)

http://www.napongloei.go.th/readme.html notified by AnonSec Team

Tags:

http://www.nonghin.go.th/readme.html

Posted by deepcore under defacement (No Respond)

http://www.nonghin.go.th/readme.html notified by AnonSec Team

Tags:

http://www.nonpasang.go.th/readme.html

Posted by deepcore under defacement (No Respond)

http://www.nonpasang.go.th/readme.html notified by AnonSec Team

Tags:

http://www.nonpodaeng.go.th/readme.html

Posted by deepcore under defacement (No Respond)

http://www.nonpodaeng.go.th/readme.html notified by AnonSec Team

Tags:

http://www.npt.go.th/readme.html

Posted by deepcore under defacement (No Respond)

http://www.npt.go.th/readme.html notified by AnonSec Team

Tags:

http://www.pnt.go.th/readme.html

Posted by deepcore under defacement (No Respond)

http://www.pnt.go.th/readme.html notified by AnonSec Team

Tags:

http://www.raitai.go.th/readme.html

Posted by deepcore under defacement (No Respond)

http://www.raitai.go.th/readme.html notified by AnonSec Team

Tags: