The blackmail is coming ~ ~

Source: Internet
Author: User
Tags md5 hash

the blackmail is coming ~ ~
Sorting things today, found a big wave of blackmail virus came. A typical act is a deceptive name. For example: Md5:7a3e070f232fda5e71bc3506005d35ae name:forced landing experience to take the rook. exe, you can see is pretending to be a game software. The program has a very bull icon: Italian hair technology, shaped like:

Post-run program callsnet.exe User Administrator Huanghaisheng command, giveAdministratoradd a password forHuanghaisheng's password. and then callNet.exe user to find a group of huanghaisheng/addnet.exe localgroup administrators password to find the group master/add
Then turn off your machine. This screen appears after the boot. The picture is too beautiful, I dare not look

The main features of this are: 1. Spread through QQ group. --or where to get the code to find the group master 2. Through the group should be the game group. ---or I'm aexperience the ride speed. exe, I'm not going to order it.3. The idea of technology, sounds good formal appearance. 4.HuanghaishengYellow Sea Life, is the name of the group or the master of his two big uncle?
two. Through QQ to money too not technical content, if the other party will not on QQ it? In case the other side can not find another Internet computer landing QQ It (because I added the password it?) No problem, the blackmail will be able to eliminate these obstacles. Can not QQ, the phone always have it, then, you give me a phone? Sample MD5:43C534B095235C3B8D7121E2BAA2352A is easy to write, Net.exe user a984601077. Add a password to the current user:a984601077 And then what? Then there is no then, wait until you restart the computer, just like this ....

The main features of this: 1. Leave the phone, good contact 2. Did not help you automatically shut down, until you play enough computer, shut the machine, slept, woke up, opened the machine, only to find
Three. Light blackmail can make a few money, I have to rely on technology to eat not only can blackmail, but also can teach you blackmail. Awarded to the fish is not as good as the fishing sample MD5:812E688506F7A254F76211F450935BEF program name: First breakthrough Monica drill. Exe should also be a game cheat. After running the program is very cute

The back of the Moe has been Net.exe user%username% 1141563248mima to add you athe 1141563248mima password. then lock workstation. Lock the screen, click, you can also log in. But after restarting the computer


Haha, after a certain point, you can also log in. Should be the blackmail too string technology, did not put %username% replaced with the current real user name, the password was not successfully added.
Four. Simple rape typeSample Md5:b9990e5094ca6bb65d4adb6d5ff393a7Program Name: Small e loophole a key to receive QQ Red diamond three months. exeRed diamond three months, good temptation, run after the password set to 19950401. It should be a birthday, if it is blackmail's birthday, I have to say that a small age began extortion, it is very promising.

Five. Pretend to function md5:9b654989b279005b7b8413f3a487fcc7 after the beautiful interface, point a play music, the computer shut down, set the password. The password is set to 1430865962.
Play a window before shutting down
After boot:

A sample of a group of extorted persons, a sample of MD5 Hash is: f8a34471018cc37c008555041b1623ebf3f01f7c13bf3aa3cbbe2c5437d826bbecbde61eb3a9adfdf3e86cf6fab668ccebb4c712710cdbcd027 e37c9580daa7adbb39a964223fe6d84a72c3bc72ed693d02088e51306ed9fb8604dc36897b2b8d02088e51306ed9fb8604dc36897b2b8c4748d59e572 80af27dbe767d6133d70be8be1f73b157400bf39d0eca3ef0565b9990e5094ca6bb65d4adb6d5ff393a7632636c5f8e1f2824a37f312199b9523812e6 88506f7a254f76211f450935bef812e688506f7a254f76211f450935bef92c7d7af91e5ab88a8440bbbabd0e27d83e74d1a2d1a30ecd9b6700f7ff98e E543c534b095235c3b8d7121e2baa2352a9b654989b279005b7b8413f3a487fcc708d8587a9de598110599aebef0a6d6ca7cdc69578fa1c8d8e91ebe1 b583047a77a3e070f232fda5e71bc3506005d35ae4b449d0abf21b016b47d3489053f442b1f70ddd1782805c08cf0f15820efa053

Finally, look at what these samples are mostly disguised as.

The blackmail is coming ~ ~

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.