Today, my friend suddenly wants me to ask for help, saying that the number of online game legendary world has been stolen, because friends are surfing the Internet at home, excluding the possibility that the account and password in public places are despised by others. . According to a friend, more than an hour before the theft, I downloaded a photo of a netizen on the Internet and opened the browse, but it was indeed a photo of the netizen, and it was using the "Windows Picture and Fax Viewer" (friend Home is XP system) open, this can certainly be a picture file. The friend also told the author that the suffix is .gif, which is obviously a picture file, and the friend's computer does not have anti-virus software installed, and the most important thing is that the file has not been deleted.
The author asked the friend to send the file through QQ. When I sent it, I found that the file was not a gif file but the exe file in the QQ display file name. The file name is: my photo .gif.exe, and its icon is also an icon for the image file, as shown in Figure 1. I think that my friend's computer should open the "Hide extension of known file types" (you can set it in the "My Computer" menu "Tools → Folder Options → View → Advanced Settings", as shown in Figure 2, so tell My suffix is gif. The author accidentally clicked on this file and found that it can be opened with "WinRAR", so I opened it with WinRAR and found that it contains two files - my photo .gif and server.exe, It is certain that this server.exe is the Trojan, which is the culprit of the Friends of the World.
Since it can be opened directly with WinRAR, the author concludes that it was made by WinRAR, and now I will begin to decrypt its production process. To have an ico (icon) file of the image file (you can use other software to extract, I will not tell you the detailed process here), as shown in Figure 3. Select the image file and the Trojan, right click and select "Add to Archive" (WinRAR option), see Figure 4, enter the compressed file name in the "archive file name", such as: my photo.gif.exe, suffix It can be executed directly for .exe. If it is not.rar, WinRAR will be opened, so the last suffix here is .exe. Select "compression method" according to your needs, then click the "Advanced" tab and select "SFX option". Figure 5, fill in the path you need to extract in the "release path", the author here is filled with "%systemroot%\\temp" (excluding quotes), indicating that the temp (temporary file) file is extracted to the system installation directory Under the folder, and enter "server.exe" (without the quotation marks) in "Run after release", enter "My Photo.gif" (without the quotation marks) in "Run before release".
This will open my photo .gif file before unzipping, causing the illusion that a friend judges the file, it will be considered as an image file, and will automatically run the Trojan (ie server.exe) after the release. Select "Hide All" in "Silent Mode" of the "Mode" tab, select "Overwrite All Files" in "Overlay Mode", and "Custom SFX Chart" in the "Text and Icon" tab. ", load the ico file of the image file you just prepared, and then click "OK", so that a trojan that bundles the picture is seamlessly created. When the file is opened, the image file will be run first, then the Trojan will be automatically opened. Documents, there will be no prompts in the middle.
Note: I hope that the majority of friends do not use illegal purposes, here to decrypt the Trojan bundle is to hope that everyone understands its principles.
Does Master Lu use it, what is the use of Master Lu? “Master Lu, formerly known as Z Weapons,
The most classic way to extract RAR format files is to double-click the compresse
Jinshan T disk high-intensity encryption, multi-channel backup, automatic synchro
How to get the best performance from your love machine is what many friends are looking for. So the
How does the computer input method turn Simplified to Traditional?
Auto-finding driver Driver Wizard Tutorial Guide
360 compression how to encrypt 360 compression encryption settings tutorial
CTRL+Y key to resume the previous operation
Clone the contents of the old hard drive to the new hard drive
How does the computer turn on and off the Chinese character input method?
What if the application cannot be completely uninstalled?
Everything can't find a solution for the Dropbox folder
Windows optimization master does have malicious code and countermeasures
Win 7 operating system to create wifi wireless network
How to add an app shortcut in the Win10 Start menu
Win10 install Office365 and Office 2016 no response how to do
Where is Santa Claus? Win10 map location tracking target
Data Backup Solution Norton Trial Report
Win8 command prompt CMD command invalidation problem resolution
Win10 Mobile 10.0.12609.0 New Exposure
Ntscan metamorphosis scanner usage and FAQ
Win8 system Defender function and security software conflict how to solve