对安全技术有兴趣的进来练个手
一个QQ病毒,PEtite 2.2的壳,有兴趣来练练手。 不敢,啪啪怕 没事儿,试试又不妨,大不了QQ就不知道归谁了。 <P>什么也不会……</P><P>不过里面好像没有网络部分的代码,所以没有破坏力吧</P><P>ADVAPI32.RegCloseKey
ADVAPI32.RegCreateKeyExA
ADVAPI32.RegSetValueExA
KERNEL32.CloseHandle
KERNEL32.CopyFileA
KERNEL32.CreateEventA
KERNEL32.CreateProcessA
KERNEL32.CreateToolhelp32Snapshot
KERNEL32.FreeLibrary
KERNEL32.GetLastError
KERNEL32.GetModuleFileNameA
KERNEL32.GetModuleHandleA
KERNEL32.GetProcAddress
KERNEL32.GetStartupInfoA
KERNEL32.GetSystemDirectoryA
KERNEL32.GetWindowsDirectoryA
KERNEL32.LoadLibraryA
KERNEL32.Process32First
KERNEL32.Process32Next
KERNEL32.WaitForSingleObject
MFC42.
MFC42.
MFC42.
MFC42.
MFC42.
MFC42.
MFC42.
MFC42.
MFC42.
MFC42.
MFC42.
MFC42.
MFC42.
MFC42.
MFC42.
MFC42.
MFC42.
MFC42.
MFC42.
MFC42.
MFC42.
MFC42.
MFC42.
MFC42.
MFC42.
MFC42.
MFC42.
MFC42.
MFC42.
MFC42.
MFC42.
MFC42.
MFC42.
MFC42.
MFC42.
MFC42.
MFC42.
MFC42.
MFC42.
MFC42.
MFC42.
MFC42.
MSVCRT.__CxxFrameHandler
MSVCRT.__dllonexit
MSVCRT.__getmainargs
MSVCRT.__p__commode
MSVCRT.__p__fmode
MSVCRT.__set_app_type
MSVCRT.__setusermatherr
MSVCRT._controlfp
MSVCRT._except_handler3
MSVCRT._exit
MSVCRT._initterm
MSVCRT._onexit
MSVCRT._setmbcp
MSVCRT._strupr
MSVCRT._XcptFilter
MSVCRT.exit
MSVCRT.fclose
MSVCRT.fopen
MSVCRT.fread
MSVCRT.fseek
MSVCRT.fwrite
MSVCRT.sprintf
MSVCRT.strrchr
MSVCRT.strstr
USER32.EnumWindows
USER32.GetWindowThreadProcessId
USER32.PostMessageA
USER32.WaitForInputIdle
</P> <P>你已经把壳脱了?</P> <P>Google后,找到</P><P>r!sc's petite 2.2/2.1 enlarger v1.0</P> 那MFC里的那些隐含函数呢? <P>不知道,用w32Dasm而已……</P><P>我这方面是小白……</P> <P>并不是所有的病毒木马有网络相关函数的。有些木马里面压缩了一个DLL,一切活动由那个DLL完成的。</P>
页:
[1]