now we are sure this is a PE image,let's look up whether it's a dll,if not,goto #1
then check the export dll name ,if it's not 'KERNEL32.DLL',goto #1
Now go into it's export table,get the APIs address which we use to start our smart work,hahahaha.
Remove SEH frame
......
SEH handler:
resume to #1
具体细节问题,大家自己去研究。目前大多数Win32病毒都是这个过程,当然具体实现方法会有不同。“
找到Kernel32的API以后,就可以导入其它dll中要用到的API了。
注意,把API地址存在一个数组里,然后用下面方法调用(过分初级了:()
push large param_n
......
push large param_1
call [ebp+Func-GetVirAddr]
注意,所有的Win32 API都是从右至左压栈的。