REvil looks for and executes DLLs in its current directory. Therefore, we can potentially hijack a vulnerable DLL to execute our own code, control and terminate the malware pre-encryption. The…
>> AUTHOR: deepcore
Conti looks for and executes DLLs in its current directory. Therefore, we can potentially hijack a vulnerable DLL to execute our own code and control and terminate the malware pre-encryption….
RedLine looks for and loads a DLL named “wow64log.dll” in WindowsSystem32. Therefore, we can drop our own DLL to intercept and terminate the malware. The exploit DLL will simply display…
RedLine looks for and loads a DLL named “wow64log.dll” in Windows\System32. Therefore, we can drop our own DLL to intercept and terminate the malware. The exploit DLL will simply display…
http://www.krajai.go.th/readme.html notified by AnonSec Team
http://www.nakhamloei.go.th/readme.html notified by AnonSec Team
http://www.napongloei.go.th/readme.html notified by AnonSec Team
http://www.nonghin.go.th/readme.html notified by AnonSec Team
http://www.nonpodaeng.go.th/readme.html notified by AnonSec Team
http://www.nonpasang.go.th/readme.html notified by AnonSec Team