RedLine looks for and loads a DLL named “wow64log.dll” in Windows\System32. Therefore, we can drop our own DLL to intercept and terminate the malware. The exploit DLL will simply display a Win32API message box and call exit(). Our RedLine exploit DLL must export the “InterlockedExchange” function or it fails with an error. We do not […]
http://www.krajai.go.th/readme.html notified by AnonSec Team
Tags:
defacement
http://www.nakhamloei.go.th/readme.html notified by AnonSec Team
Tags:
defacement
http://www.napongloei.go.th/readme.html notified by AnonSec Team
Tags:
defacement
http://www.nonghin.go.th/readme.html notified by AnonSec Team
Tags:
defacement
http://www.nonpasang.go.th/readme.html notified by AnonSec Team
Tags:
defacement
http://www.nonpodaeng.go.th/readme.html notified by AnonSec Team
Tags:
defacement
http://www.npt.go.th/readme.html notified by AnonSec Team
Tags:
defacement
http://www.pnt.go.th/readme.html notified by AnonSec Team
Tags:
defacement
http://www.raitai.go.th/readme.html notified by AnonSec Team
Tags:
defacement