亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? 29a-7.015

?? 從29A上收集的病毒源碼
?? 015
字號:

 Per-process residency review: common mistakes

 by Bumblebee


 Introduction

 Per-process residency is a TSR method discovered by Jack Qwerty in
 the early days of win32 platform. This great vxer got an alternative way
 to hook system calls instead of global residency, very common under DOS
 environments but so hard to obtain under win32 (win32 means win9x, ME,
 NT, 2000, XP, ?).

 That method is well known and has been used in several viruses. At run
 time the import table is patched to hook API calls of the infected host
 and then perform viral actions each time a call is done.

 I don't want to explain here how to do the per-process residency. I think
 there are yet so many infos about this topic (check references at the end
 of this article for more about this tech). This little article aims the
 result of the per-process residency. May be Jack Qwerty as pioneer didn't
 realize matters of efficiency, but at this point, we must analyze the
 method and (i hope) avoid some mistakes.

 I've coded so many times per-process residency and i've tried to find
 some ways to apply successfully the method. I hope this little article
 provide a different scope of view to per-process residency.


 State of the art: bad applied tech

 When i read on irc one of the best vxers in the history of virus writing
 type: "bah, it won't go so far, it's just a per-process", i got confused.
 What's the problem of per-process residency? We are wrong thinking is a
 kewl tech to find new files to infect? That's true, but wrong under some
 basis.

 Let's analyze what we understand by per-process residency:

   1. The virus patchs import table (does not matter at infection or run
      time)
   2. The API is called
   3. The hook gets the filename and tries to infect the file

 May be theoricaly that seems ok. But we will see in practice that this
 won't work at all.

 The classic per-process hook affects the APIs that can access a file:

 CopyFile* CopyFileEx* CreateFile* FindFirstFile FindFirstFileEx
 FindNextFile GetCurrentDirectory SetCurrentDirectory GetFileAttributes*
 SetFileAttributes* GetFileSize* GetFileType* GetFullPathName* LockFile*
 LockFileEx* MoveFile* MoveFileEx* SearchPath* UnlockFile* UnlockFileEx* ...

 Lemme explain why this approach is wrong and it won't help your virus to
 spread.

 At first place we must realize most of the APIs listed never (or quite
 never) are called from a usual win32 app over an executable file. How
 many programs installed in your comp use CopyFile? There's at least one
 that will copy an EXE? Following this idea all the APIs marked with * are
 not interesting to hook. Due: 1. those APIs are not used by user apps and/or
 2. those APIs never will access an executable (and we infect executables).

 At second place are the APIs not marked with *. Let's do two groups: find
 file and set/get directory. Find file APIs are a great way to infect files
 under windows nt if you affect cmd.exe. But since SFC is here to fuck us,
 i think those APIs are not usefull anymore (even them work fine under nt).
 Only that app is interesting, because the rest of the apps have a behavior
 that make them unusefull. And that behavior will fuck second group too, the
 set/get directory ones. Those APIs are not called from gui apps. Win32
 provides a set of common dialogs to perform such task. If a gui app needs
 to open a file, it will ask the user for it using such common dialogs.
 Those apps never user find files directly to browse folders. And if them
 use its own dialogs (rare), they are implemented through DLL. Those common
 dialogs affect also the set/get directory, when you ask for a file to open,
 it's usual let the dialog change the work directory, so those APIs are not
 called.

 So, what are the results? We have lots of per-process viruses that never, or
 almost never, infect files using its residency.
 It's believed that a per-process infector must have a run-time part due
 this residency method is not effective. In fact is not a bad idea: you get
 all windows files infected and then you have hosts to apply residency.
 In consequence most per-process resident viruses are just plain run-time
 direct action viruses. What a pitty.

 But the problem is not in the residency but in the way we apply it.


 Little ideas: open your mind

 Those ideas are the result of my little research and my buggy viruses.

 At first place i've proved the good results of run-time direct action
 methods over DLLs. When a DLL is loaded and its EP called, the work
 directory of the DLL is the same of the loader. So a simple scan of the
 work directory should give us new files to infect. But that's not perfect
 at all due the loader is running and then the file locked, so we cannot
 infect it and probably there is not other execultables to infect. However
 if an infected DLL from the system is loaded, it will be loaded before
 other local DLLs of the loader, so there is a chance to infect DLLs too.
 As you must realize, that idea is not nice under an environment with
 SFC fucking arround [SFC]. I played this idea 1st time with AOC [AOC].

 That idea should be applied to per-process. If we peep into explorer.exe
 under win98 we see per-process residence is a bad idea. You will never
 affect an executable (or at least a little only). Most interesting calls
 to CreateFileA are performed by DLLs loaded by explorer at run time. So
 if you hook LoadLibraryA and then in that API hook all CreateFileA in
 the DLLs loaded by explorer, you'll get an awesome residency method with
 almost all files hit by explorer infected. I used this residency under
 BeeFree [BEF].

 It's true explorer is a special case, and BeeFree was direct action vs
 it due that. Again SFC is a problem ;-) And this idea is not better than
 infect kernell32.dll on disk. But per-process applied to DLL may be is
 a good intermediate idea. That means you must implement DLL infection
 (sometimes not so trivial) and again your success is limited by SFC.
 I used that idea at 99Ways [99W].

 Beefree idea can be used with in-memory infection, and there are some
 examples of viruses doing it. That should be a great answer to our
 prays, but i wanna discard it coz with that idea the important part
 is not the per-process but the in-memory infection. Check the stuff
 about that done by Griyo [GRY].

 At this point we have two unusual ways to apply per-process residency that
 seem effective without SFC. But that apply is only about 'where', and we
 must discuss also 'how'.

 Let's say that per-process residence over a simple CreateFileA in a PE
 EXE can be very effective. But we must change the 'how'.

 Just change the chip: out aim is not a file but a folder. Ah! kewl XD
 Don't spect an EXE when CreateFileA is called. Peep the path. There are
 three kind of path possible in a CreateFileA: 1. it's an absolute path, 2.
 it's a relative path, 3. just a filename. In 1st case we get the path (yeah,
 discard the filename... i bet is not infectable), change directory to that
 path and scan the folder for files to infect. In 2nd case just do the same,
 and in 3rd just infect current folder because is prossible a commond dialog
 changed the folder intead the app. Tadaa! You got it. Per-process is now
 effective. Very effective! Just think that escenario:

  1. Notepad is infected
  2. User opens the readme.txt of a new installed soft
  3. Notepad opens the file and our virus gets a hot path
  4. The new app is infected

 Pretty easy. Is true under SFC files that method will be more limited, but
 you don't need to infect a protected file to rock! Every app that needs to
 open a file to do something with it is able to get new paths to peep into.

 In fact direct action vs windows folder is not really needed, but once
 you must code routines to scan directories, include a direct action part
 and let it work under system without SFC.

 I used this approach under some viruses: 99Ways, Youngary [YOU], ...

 To end this article i wanna comment another way i've used lately in
 freebird [FRB]. Since the folder idea looks for folders, that one looks for
 directory changes. It's a less effective method due it's more slow. Let's
 say is a slow infector. For this approach you must get work directory
 before release the control to the host. You can make this approach with
 threads and not use per-process hooks at all, but it won't be so fine due
 usual problems of threads running in an app that doesn't know that threads
 are running ;)

 Then you choose an API that is called with a moderated frequency, or related
 to directory changes (not set/get directory due thos APIs won't be called
 and probably not available to hook). In last instance hook ExitProcess, but
 then it will be a slow-slow infector XD You won't do nothing with the API,
 so a GetDC or like should rock. When the hooked API is run, just get current
 directory, and if it's not the same than the stored... just infect current
 directory. Store the new one to test in the future and return the control
 to the host. Easy, isn't it? In that way we will infect on directory change
 even when we don't know where the hell is done that directory change.

 You must be very carefull with the API you choose. We don't want to overload
 the app with calls to GetCurrentDirectory and checking code. And it must
 be an API suitable to be called in the app process after a possible
 directory change.


 Last words

 I hope you enjoy that article and you got the point.

 I cannot end this article without a reference to the current state of the
 vx scene huehehe. It's true there are so few ppl able to code this tech,
 but for those few beginners that are in the good way of the win32asm...
 do it per-process! XD

 As you can see, per-process residency is still as kewl as Jack Qwerty got
 it so many years ago. We just need to do some tunning to make it more
 efficient and it is still a great alternative to the sanct sanctorum of
 the global residency under win32. Keep it ring3!

 Regards.


 References

 SFC - Win2K infection, Griyo 29A-4
       Win2k.SFPDisable, Benny & Ratter 29A-6
 AOC - Win32.Anvil of Crom, Bumblebee 29A-4
 BEF - BeeFree, Bumblebee 29A-6
 99W - 99 Ways to die, Bumblebee 29A-5
 GRY - EXPLORER *in-memory* infection, Griyo 29A-4
 YOU - Win32.Yonggary!, Bumblebe MTX-3
 FRB - Freebird, Bumblebee 29A-7

**

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
不卡的av在线| 国产精品三级视频| 国产精品美女久久久久av爽李琼| 亚洲综合色区另类av| 韩国女主播成人在线| 欧美视频日韩视频| 欧美极品少妇xxxxⅹ高跟鞋| 毛片基地黄久久久久久天堂| 日本韩国欧美国产| 国产精品福利一区| 国产精品综合在线视频| 欧美一二三四区在线| 亚洲成a人在线观看| 色久优优欧美色久优优| 国产精品区一区二区三| 国产一区不卡在线| 欧美成人精品福利| 日韩av电影天堂| 69久久夜色精品国产69蝌蚪网| 亚洲男人的天堂一区二区| www.日本不卡| 中文字幕永久在线不卡| 国产91精品精华液一区二区三区| 日韩免费性生活视频播放| 日本亚洲最大的色成网站www| 欧美性猛交xxxx乱大交退制版| 国产精品美女久久久久久| 成人在线视频首页| 欧美韩国日本不卡| 国产成人综合视频| 国产精品久久久久桃色tv| 成人精品亚洲人成在线| 国产精品久久精品日日| 99在线热播精品免费| 国产精品你懂的在线欣赏| 波多野结衣一区二区三区 | 亚洲欧美激情小说另类| 99re6这里只有精品视频在线观看 99re8在线精品视频免费播放 | 欧美一区二区三区四区五区| 亚洲成av人片在线观看无码| 91精品婷婷国产综合久久| 亚洲电影一区二区三区| 欧美一区二区三区电影| 免费观看久久久4p| 国产调教视频一区| 91香蕉国产在线观看软件| 亚洲成人资源在线| 精品国产一区二区国模嫣然| 国产精品一级片| 亚洲天堂网中文字| 欧美日韩精品一区二区三区蜜桃| 日本欧美一区二区| 中文字幕久久午夜不卡| 欧美在线免费观看亚洲| 日日夜夜精品视频天天综合网| 日韩午夜av电影| 不卡的av网站| 亚洲福利国产精品| 久久网站最新地址| 91热门视频在线观看| 日日噜噜夜夜狠狠视频欧美人| 久久久久久夜精品精品免费| 色成年激情久久综合| 日韩**一区毛片| 国产精品高潮久久久久无| 91精品国产日韩91久久久久久| 国产福利视频一区二区三区| 亚洲三级在线观看| 精品国产伦一区二区三区观看体验| av高清不卡在线| 奇米亚洲午夜久久精品| 亚洲欧美中日韩| 久久综合一区二区| 在线观看av不卡| 国产成人高清在线| 麻豆91在线观看| 亚洲最色的网站| 欧美国产综合一区二区| 欧美一级一级性生活免费录像| 99久久精品国产毛片| 久久精品国产精品亚洲红杏| 亚洲国产精品久久艾草纯爱| 欧美激情一区二区三区| 欧美电影免费观看完整版| 在线观看av一区| av高清久久久| 国产成人在线电影| 久久精品国产99国产| 亚洲电影第三页| 亚洲精品中文在线观看| 久久久久国产免费免费| 精品电影一区二区三区| 欧洲另类一二三四区| 99视频在线精品| 国产乱国产乱300精品| 亚洲午夜视频在线| 亚洲丝袜精品丝袜在线| 国产精品久久久久久久久动漫| 久久综合九色综合久久久精品综合| 欧美老女人在线| 色欧美片视频在线观看| av一区二区三区在线| 岛国精品一区二区| 高清在线观看日韩| 国产酒店精品激情| 国产高清在线观看免费不卡| 国产一区二区在线看| 日本不卡一区二区| 男女男精品网站| 男人的天堂亚洲一区| 蜜臀av一区二区在线观看 | 91精品国产手机| 欧美男女性生活在线直播观看| 欧美亚洲高清一区| 欧美理论片在线| 欧美一区二区在线观看| 日韩精品专区在线影院观看| 欧美不卡一二三| 久久久久久久免费视频了| 国产网红主播福利一区二区| 国产性天天综合网| 国产精品免费丝袜| 亚洲免费电影在线| 午夜精品一区二区三区三上悠亚 | 久久66热re国产| 国内精品视频一区二区三区八戒| 国产综合久久久久久久久久久久| 黄色日韩网站视频| www.日韩在线| 91麻豆免费视频| 欧美人妖巨大在线| 精品久久久三级丝袜| 国产日韩av一区二区| 亚洲日本电影在线| 日韩中文字幕不卡| 国内成人自拍视频| 成人精品一区二区三区中文字幕| 色域天天综合网| 91精品国产乱| 国产精品午夜在线| 一区二区视频免费在线观看| 日韩精品色哟哟| 国产成人自拍网| 在线观看国产91| 欧美mv日韩mv亚洲| 亚洲欧美色综合| 美女视频黄频大全不卡视频在线播放| 国产综合色视频| 欧美自拍偷拍午夜视频| 欧美成人一区二区三区在线观看 | 国产性色一区二区| 一级精品视频在线观看宜春院| 欧美a级一区二区| 不卡大黄网站免费看| 在线播放一区二区三区| 国产亚洲一区二区三区四区| 亚洲国产综合人成综合网站| 国产一区二区三区黄视频 | 亚洲一区二区三区美女| 国产一区二区导航在线播放| 在线这里只有精品| 久久免费的精品国产v∧| 亚洲综合网站在线观看| 国产盗摄一区二区| 欧美裸体bbwbbwbbw| 欧美极品另类videosde| 免费精品视频最新在线| 色婷婷av久久久久久久| 久久久不卡网国产精品二区| 午夜精品久久久久久久蜜桃app | 国产精品视频在线看| 视频一区二区中文字幕| 91免费视频网址| 国产性天天综合网| 日本不卡123| 欧美日韩在线亚洲一区蜜芽| 国产拍揄自揄精品视频麻豆| 视频一区欧美精品| 色天天综合色天天久久| 日本一区二区三区四区| 狠狠色综合播放一区二区| 欧美精品一二三区| 亚洲精品视频一区二区| 成人免费电影视频| 久久亚洲综合色| 精品在线观看免费| 欧美一区二区三区喷汁尤物| 亚洲综合色网站| 91黄色激情网站| 亚洲男人的天堂在线aⅴ视频 | 亚洲人精品午夜| 99麻豆久久久国产精品免费优播| 久久久久久久久久久电影| 久久精品国产77777蜜臀| 欧美一区二区三区啪啪| 日日骚欧美日韩| 欧美电视剧免费全集观看| 美女一区二区视频| 日韩欧美不卡一区| 久久精品国产99国产|