看了看感觉是搞QQkey([ANSI] 0x000964c6)来盗号
这个IP:43.227.198.101详情(https://x.threatbook.cn/nodev4/ip/43.227.198.101)
- [ANSI] 0x000960b0: account":"(.*?)","client_type":.*?,"face_index":.*?,"gender":.*?,"nickname":"(.*?),"uin":"(.*?)","uin
- [ANSI] 0x00096121: 0002XM#
- [ANSI] 0x00096129: 410509207
- [ANSI] 0x00096164: http://localhost.ptlogin2.qq.com:4300/pt_get_uins?callback=ptui_getuins_CB&r=0.7478418888058513&pt_local_tk=0.3858416392467916
- [ANSI] 0x000961e3: pt_local_token=0.3858416392467916;
- [ANSI] 0x0009620d: ?GET
- [ANSI] 0x00096212: POST
- [ANSI] 0x00096217: HEAD
- [ANSI] 0x00096228: https://
- [ANSI] 0x00096231: User-Agent:
- [ANSI] 0x00096240: Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)
- [ANSI] 0x00096273: http=
- [ANSI] 0x00096279: HTTP/1.1
- [ANSI] 0x00096282: Accept: */*
- [ANSI] 0x0009628e: Accept:
- [ANSI] 0x00096298: Accept: */*
- [ANSI] 0x000962a4: Referer:
- [ANSI] 0x000962af: Referer:
- [ANSI] 0x000962b9: Accept-Language:
- [ANSI] 0x000962cc: Accept-Language: zh-cn
- [ANSI] 0x000962e3: Content-Type:
- [ANSI] 0x000962f3: Content-Type: application/x-www-form-urlencoded
- [ANSI] 0x00096323: Cookie:
- [ANSI] 0x0009632d: Cookie:
- [ANSI] 0x00096336: Set-Cookie
- [ANSI] 0x00096343: Set-Cookie:
- [ANSI] 0x0009635c: #òyoÅ
- [ANSI] 0x00096366: http://
- [ANSI] 0x00096370: https
- [ANSI] 0x00096376: =deleted
- [ANSI] 0x00096381: &callback=ptui_getst_CB&r=0.15739138866774738&pt_local_tk=0.3858416392467916
- [ANSI] 0x000963ce: http://localhost.ptlogin2.qq.com:4300/pt_get_st?clientuin=
- [ANSI] 0x00096409: clientkey
- [ANSI] 0x0009642f: @qq.com
- [ANSI] 0x000964c6: umber/&clientkey=/QQkey/&ptlang=2052&httptype=0&ADUIN=/QQnumber/&ADSESSION=1523533342&ADTAG=CLIENT.QQ.5569_Mysrv.0&ADPUBNO=26776
- [ANSI] 0x00096547: /QQnumber/
- [ANSI] 0x00096552: /QQkey/
- [ANSI] 0x0009655a: &r=0.2074233236566705
- [ANSI] 0x00096594: 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/53.0.2785.104 Safari/537.36 Core/1.53.4549.400 QQBrowser/9.7.12900.400
- [ANSI] 0x00096615: https://mail.qq.com/cgi-bin/getverifyimage?sid=
- [ANSI] 0x00096645: mail.qq.com
- [ANSI] 0x00096651: &url
- [ANSI] 0x00096656: &sid=
- [ANSI] 0x0009665c: &fun=list&loc=frame_html,,,3
- [ANSI] 0x00096679: https://mail.qq.com/cgi-bin/setting1?sid=
- [ANSI] 0x000966a5: upgrade-insecure-requests:1
- [ANSI] 0x000966e5: 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/53.0.2785.104 Safari/537.36 Core/1.53.4549.400 QQBrowser/9.7.12900.400
- [ANSI] 0x00096766: referer:https://mail.qq.com/cgi-bin/frame_html?sid=
- [ANSI] 0x0009679a: &r=0.2074233236566705
- [ANSI] 0x0009680c: penadvertsyn=1&txtformat=0&IsValid=0&atcpsubject=0&autoaddaddress=0&savesendbox=0&sendmailunicode=0&bgsend=0&QQlight=0&plpopen=1
- [ANSI] 0x0009688d: &fwdbackup=0&fwaddrverifycode=
- [ANSI] 0x00096ab1: fontid=0&defaultsizeid=0&defaultcolor=default&listmode=1&delflag=0&selectSign=-1&noinclude=0&titlePrefix=0&autofwd=2&fwdaddress=
- [ANSI] 0x00096b32: sid=
- [ANSI] 0x00096b5c: 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/53.0.2785.104 Safari/537.36 Core/1.53.4549.400 QQBrowser/9.7.12900.400
- [ANSI] 0x00096bdd: deleted
- [ANSI] 0x00096c0d: [url=home.php?mod=space&uid=471048]@707[/url] éèÖÃ′úàíÆ¾Ö¤ê§°ü!
- [ANSI] 0x00096c24: 708 ½ûÖ1×Ô¶ˉéèÖÃCookiesê§°ü!
- [ANSI] 0x00096c41: 709 ÖØ¶¨ÏòéèÖÃê§°ü!
- [ANSI] 0x00096c55: User-Agent:
- [ANSI] 0x00096c62: User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
- [ANSI] 0x00096cb7: Accept:
- [ANSI] 0x00096cc0: Accept: text/html, application/xhtml+xml, */*
- [ANSI] 0x00096cf0: Accept-Encoding:
- [ANSI] 0x00096d02: Accept-Encoding: gbk, GB2312
- [ANSI] 0x00096d21: Accept-Language:
- [ANSI] 0x00096d33: Accept-Language: zh-cn
- [ANSI] 0x00096d4c: Content-Type: application/x-www-form-urlencoded
- [ANSI] 0x00096d7e: Cache-Control:
- [ANSI] 0x00096d8e: Cache-Control: no-cache
- [ANSI] 0x00096da8: Cookie:
- [ANSI] 0x00096db1: 713 ¶áè¡êy¾Yê§°ü!
- [ANSI] 0x00096dc9: "@Location:
- [ANSI] 0x00096ddc: $@<meta.+?charset=[^\w]?([-\w]+)
- [ANSI] 0x00096e01: gb2312
- [ANSI] 0x00096e08: Adodb.Stream
- [ANSI] 0x00096e15: Type
- [ANSI] 0x00096e1a: Mode
- [ANSI] 0x00096e1f: Open
- [ANSI] 0x00096e24: Write
- [ANSI] 0x00096e2a: Position
- [ANSI] 0x00096e33: Charset
- [ANSI] 0x00096e3b: ReadText
- [ANSI] 0x00096e44: Close
- [ANSI] 0x00096e4a: 712 ·tÎñÆ÷Î′Ïìó|!
- [ANSI] 0x00096e5c: 711 ·¢ËíÇëÇóê§°ü!
- [ANSI] 0x00096e6e: 710 éèÖÃD-òéí·ê§°ü!
- [ANSI] 0x00096e82: 705 éèÖÃ3¬ê±ê±¼äê§°ü!
- [ANSI] 0x00096e98: 704 ′′½¨WinHttpÇëÇóê§°ü!
- [ANSI] 0x00096eb1: 703 ′′½¨WinHttpᬽóê§°ü!
- [ANSI] 0x00096eca: 702 ′′½¨WinHttp»á»°ê§°ü!
- [ANSI] 0x00096ee3: 701 ½aÎöURLμØÖ·ê§°ü!
- [ANSI] 0x00096ef8: 700 μ±Ç°Ïμí32»Ö§3ÖWinHttp·tÎñ!
- [ANSI] 0x00096f4f: ò×z>43.227.198.101
- [ANSI] 0x00096f62: xyz2393413
- [ANSI] 0x00096f6f: =Heyl=
- [ANSI] 0x00096f76: \syenm.exe
- [ANSI] 0x00096fd9: This program must be run under Win32
复制代码 ----------
以下由PortEX-Master自动生成
- PEID Signatures
- ***************
- [UPX v0.89.6 - v1.02 / v1.05 - v1.22] bytes matched: 43 at address: 0x683a20
- pattern: ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? 8a 06 46 88 07 47 01 db 75 07 8b 1e 83 ee fc 11 db 72 ed b8 01 ?? ?? ?? 01 db 75 07 8b 1e 83 ee fc 11 db 11 c0 01 db 73 ?? 75 ?? 8b 1e 83 ee fc
- [UPX 2.90 [LZMA] -> Markus Oberhumer, Laszlo Molnar & John Reiser] bytes matched: 55 at address: 0x683a20
- pattern: 60 be ?? ?? ?? ?? 8d be ?? ?? ?? ?? 57 83 cd ff eb 10 90 90 90 90 90 90 8a 06 46 88 07 47 01 db 75 07 8b 1e 83 ee fc 11 db 72 ed b8 01 00 00 00 01 db 75 07 8b 1e 83 ee fc 11 db 11 c0 01 db
- [UPX v1.25 (Delphi) Stub] bytes matched: 8 at address: 0x683a20
- pattern: 60 be 00 ?? ?? 00 8d be 00 ?? ?? ff
复制代码
|