能力值:
( LV2,RANK:10 )
|
-
-
2 楼
这个函数是打开注册表,不是写也不是读,没什么意义.
|
能力值:
( LV2,RANK:10 )
|
-
-
3 楼
谢谢你的回复..
打开注册表..他不得打开假码存在的这个位置吗??
我把我的过程贴出来吧..
HKLM\SOFTWARE\NotepadPlus\Rcode:"00000000000000000000000000000000000000"
RegOpenKeyExa
[下断F9运行后堆栈数据跑到这里]
0012EE14 76DB3607 /CALL 到 RegOpenKeyExA 来自 MSASN1.76DB3605
0012EE18 80000002 |hKey = HKEY_LOCAL_MACHINE
0012EE1C 76DB363C |Subkey = "SOFTWARE\Microsoft\Windows NT\CurrentVersion\msasn1"
0012EE20 00000000 |Reserved = 0
0012EE24 00020019 |Access = KEY_READ
0012EE28 0012EE58 \pHandle = 0012EE58
[继续F9运行后堆栈数据跑到这里]
0012ED30 77DCC449 /CALL 到 RegOpenKeyExA 来自 advapi32.77DCC444
0012ED34 80000000 |hKey = HKEY_CLASSES_ROOT
0012ED38 75C67704 |Subkey = "PROTOCOLS\Name-Space Handler\"
0012ED3C 00000000 |Reserved = 0
0012ED40 02000000 |Access = 2000000
0012ED44 0012ED60 \pHandle = 0012ED60
[继续F9运行后堆栈数据跑到这里]
0012EE3C 75C68051 /CALL 到 RegOpenKeyExA 来自 75C6804B
0012EE40 80000001 |hKey = HKEY_CURRENT_USER
0012EE44 75C69E60 |Subkey = "SOFTWARE\Policies\Microsoft\Windows\CurrentVersion\Internet Settings"
0012EE48 00000000 |Reserved = 0
0012EE4C 00000001 |Access = KEY_QUERY_VALUE
0012EE50 0012EE60 \pHandle = 0012EE60
[继续F9运行后堆栈数据跑到这里]
0012EE3C 75C69E4F /CALL 到 RegOpenKeyExA 来自 75C69E49
0012EE40 80000001 |hKey = HKEY_CURRENT_USER
0012EE44 75C69E60 |Subkey = "SOFTWARE\Policies\Microsoft\Windows\CurrentVersion\Internet Settings"
0012EE48 00000000 |Reserved = 0
0012EE4C 00000001 |Access = KEY_QUERY_VALUE
0012EE50 0012EE60 \pHandle = 0012EE60
[继续F9运行后堆栈数据跑到这里]
0012EE3C 75C6809F /CALL 到 RegOpenKeyExA 来自 75C68099
0012EE40 80000002 |hKey = HKEY_LOCAL_MACHINE
0012EE44 75C676A8 |Subkey = "Software\Microsoft\Windows\CurrentVersion\Internet Settings"
0012EE48 00000000 |Reserved = 0
0012EE4C 00000001 |Access = KEY_QUERY_VALUE
0012EE50 0012EE60 \pHandle = 0012EE60
[继续F9运行后堆栈数据跑到这里]
0012ECA0 77F4AE0F /CALL 到 RegOpenKeyExA 来自 SHLWAPI.77F4AE0D
0012ECA4 80000002 |hKey = HKEY_LOCAL_MACHINE
0012ECA8 00161660 |Subkey = "Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\"
0012ECAC 00000000 |Reserved = 0
0012ECB0 00000001 |Access = KEY_QUERY_VALUE
0012ECB4 00161658 \pHandle = 00161658
[继续F9运行后堆栈数据跑到这里]
0012ECA4 77F4AE0F /CALL 到 RegOpenKeyExA 来自 SHLWAPI.77F4AE0D
0012ECA8 80000001 |hKey = HKEY_CURRENT_USER
0012ECAC 00161708 |Subkey = "Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\"
0012ECB0 00000000 |Reserved = 0
0012ECB4 00020019 |Access = KEY_READ
0012ECB8 001616F8 \pHandle = 001616F8
[继续F9运行后堆栈数据跑到这里]
0012ECA4 77F4AE59 /CALL 到 RegOpenKeyExA 来自 SHLWAPI.77F4AE57
0012ECA8 80000002 |hKey = HKEY_LOCAL_MACHINE
0012ECAC 00161708 |Subkey = "Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\"
0012ECB0 00000000 |Reserved = 0
0012ECB4 00020019 |Access = KEY_READ
0012ECB8 00161700 \pHandle = 00161700
[继续F9运行后堆栈数据跑到这里]
0012ECA4 77F4AE0F /CALL 到 RegOpenKeyExA 来自 SHLWAPI.77F4AE0D
0012ECA8 80000001 |hKey = HKEY_CURRENT_USER
0012ECAC 00161708 |Subkey = "Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Ranges\"
0012ECB0 00000000 |Reserved = 0
0012ECB4 00020019 |Access = KEY_READ
0012ECB8 001616F8 \pHandle = 001616F8
[继续F9运行后堆栈数据跑到这里]
0012ECA4 77F4AE59 /CALL 到 RegOpenKeyExA 来自 SHLWAPI.77F4AE57
0012ECA8 80000002 |hKey = HKEY_LOCAL_MACHINE
0012ECAC 00161708 |Subkey = "Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Ranges\"
0012ECB0 00000000 |Reserved = 0
0012ECB4 00020019 |Access = KEY_READ
0012ECB8 00161700 \pHandle = 00161700
[继续F9运行后堆栈数据跑到这里]
0012ED78 77F55DE5 /CALL 到 RegOpenKeyExA 来自 SHLWAPI.77F55DDF
0012ED7C 80000002 |hKey = HKEY_LOCAL_MACHINE
0012ED80 10047188 |Subkey = "SOFTWARE\KasperskyLab\SetupFolders"
0012ED84 00000000 |Reserved = 0
0012ED88 00000001 |Access = KEY_QUERY_VALUE
0012ED8C 0012EDA4 \pHandle = 0012EDA4
[继续F9运行后堆栈数据跑到这里]
0012ED78 77F55DE5 /CALL 到 RegOpenKeyExA 来自 SHLWAPI.77F55DDF
0012ED7C 80000002 |hKey = HKEY_LOCAL_MACHINE
0012ED80 10047188 |Subkey = "SOFTWARE\KasperskyLab\SetupFolders"
0012ED84 00000000 |Reserved = 0
0012ED88 00000001 |Access = KEY_QUERY_VALUE
0012ED8C 0012EDA4 \pHandle = 0012EDA4
[继续F9运行后堆栈数据跑到这里]
0012ED78 77F55DE5 /CALL 到 RegOpenKeyExA 来自 SHLWAPI.77F55DDF
0012ED7C 80000002 |hKey = HKEY_LOCAL_MACHINE
0012ED80 10047188 |Subkey = "SOFTWARE\KasperskyLab\SetupFolders"
0012ED84 00000000 |Reserved = 0
0012ED88 00000001 |Access = KEY_QUERY_VALUE
0012ED8C 0012EDA4 \pHandle = 0012EDA4
[继续F9运行后堆栈数据跑到这里]
这个直接到了小布丁.exe了..不知道为什么!!
0012E974 746830A7 /CALL 到 RegOpenKeyExA 来自 746830A1
0012E978 80000002 |hKey = HKEY_LOCAL_MACHINE
0012E97C 0012EBC4 |Subkey = "SOFTWARE\Microsoft\CTF\Compatibility\小布丁.exe"
0012E980 00000000 |Reserved = 0
0012E984 00020019 |Access = KEY_READ
0012E988 0012E990 \pHandle = 0012E990
[继续F9运行后堆栈数据跑到这里]
0012EC64 746830A7 /CALL 到 RegOpenKeyExA 来自 746830A1
0012EC68 80000002 |hKey = HKEY_LOCAL_MACHINE
0012EC6C 74682F14 |Subkey = "SOFTWARE\Microsoft\CTF\SystemShared\"
0012EC70 00000000 |Reserved = 0
0012EC74 00020019 |Access = KEY_READ
0012EC78 0012EC80 \pHandle = 0012EC80
[继续F9运行后堆栈数据跑到这里]
0012EC64 746830A7 /CALL 到 RegOpenKeyExA 来自 746830A1
0012EC68 80000002 |hKey = HKEY_LOCAL_MACHINE
0012EC6C 74682F14 |Subkey = "SOFTWARE\Microsoft\CTF\SystemShared\"
0012EC70 00000000 |Reserved = 0
0012EC74 00020019 |Access = KEY_READ
0012EC78 0012EC80 \pHandle = 0012EC80
[继续F9运行后堆栈数据跑到这里]
0012ECA8 7468260A /CALL 到 RegOpenKeyExA 来自 74682604
0012ECAC 80000002 |hKey = HKEY_LOCAL_MACHINE
0012ECB0 74682644 |Subkey = "SOFTWARE\Microsoft\CTF\"
0012ECB4 00000000 |Reserved = 0
0012ECB8 00020019 |Access = KEY_READ
0012ECBC 0012ECC4 \pHandle = 0012ECC4
[这个加载的时间比其他的要长..不过也就两三秒钟的样子]
0012F514 73FBAE76 /CALL 到 RegOpenKeyExA 来自 USP10.73FBAE70
0012F518 80000002 |hKey = HKEY_LOCAL_MACHINE
0012F51C 73FA17B0 |Subkey = "SOFTWARE\Microsoft\Windows NT\CurrentVersion\LanguagePack\SurrogateFallback"
0012F520 00000000 |Reserved = 0
0012F524 00000009 |Access = KEY_QUERY_VALUE|KEY_ENUMERATE_SUB_KEYS
0012F528 0012F534 \pHandle = 0012F534
[再F9运行 程序就开始跑飞起来了.]
0012E28C 77E7FB8E /CALL 到 RegOpenKeyExA 来自 RPCRT4.77E7FB88
0012E290 80000002 |hKey = HKEY_LOCAL_MACHINE
0012E294 77E7F88C |Subkey = "Software\Microsoft\Rpc"
0012E298 00000000 |Reserved = 0
0012E29C 00020019 |Access = KEY_READ
0012E2A0 0012E2B8 \pHandle = 0012E2B8
[再F9 没有数据显示了]
|
|
|