Welcome![Sign In][Sign Up]
Location:
Search - kill process in vb

Search list

[Windows Developvbkill

Description: vb实现的windows进程管理,在vb6,win2k下测试通过-vb achieve the windows process management, in VB6, the test under win2k
Platform: | Size: 2048 | Author: | Hits:

[Windows DevelopkillProcess

Description: VB杀进程源代码。绝对可以用。。包括很多杀毒进程一样可以干掉。-CHENG Yuan reached the VB code. Absolute can be used. . Including many anti-virus can kill the process.
Platform: | Size: 7168 | Author: sadsa | Hits:

[Shell apivbprotect

Description: 讲需要保护的程序作为自定义资源添加到新的VB程序里,新程序一运行就自动释放内部包含的程序到特定位置,然后通过SHELL调用,自身则结束运行,怀疑就是“借鸡生蛋”,也是常用的木马病毒免杀技术。-Stresses the need to protect the process as add custom resources to a new VB program, the new procedures on the one run automatically included in the release of internal procedures to a specific location, then through the SHELL call, then the end of their run, suspected of " borrow鸡生蛋" It is also commonly used to kill Trojan virus-free technology.
Platform: | Size: 385024 | Author: wang | Hits:

[Internet-NetworkHDLL

Description:  在VB中,卸载NTDLL杀进程就是这种方法,但请慎重卸载其它DLL,先载入DLL并获取地址,然后Call函数地址,如果映像大小大于0,并且小于1.25G,估计没有那么大的DLL,这是只是为了判断数据是否合法,程序源码及方法仅供参考。-In VB, uninstall NTDLL kill the process is this way, but please carefully unloaded another DLL, first load the DLL and get the address, and then Call function address, if the image size is greater than 0 and less than 1.25G, estimated not so great DLL This is just to determine whether the data is legitimate, and methods of program source code for reference only.
Platform: | Size: 23552 | Author: lfc7713 | Hits:

[Windows DevelopHDLL

Description: 在VB中,卸载NTDLL杀进程就是这种方法,但请慎重卸载其它DLL,先载入DLL并获取地址,然后Call函数地址,如果映像大小大于0,并且小于1.25G,估计没有那么大的DLL,这是只是为了判断数据是否合法,程序源码及方法仅供参考。以下为Assembly部分:Dim lngIndex As Long, lngCodeStart As Long    程序起始位址必须是16的倍数    VarPtr函数是用来取得变量的地址    lngCodeStart = VarPtr(m_OpCode(0))    m_opIndex = 0 程序开始的元素的位置    --------以下开始放入所需的程序----------    将参数push到堆栈    由于是stdcall CALL 参数由最后一个开始放到堆栈-In VB, uninstall NTDLL kill the process is this way, but please carefully unloaded another DLL, first load the DLL and get the address, then Call function address, if the image size is greater than 0 and less than 1.25G, estimated not so much DLL This is only to determine whether the data is legitimate, program source code and methods for reference only. The following is the Assembly section: Dim lngIndex As Long, lngCodeStart As Long ' program starting address must be a multiple of 16' VarPtr function is used to obtain the address of the variable lngCodeStart = VarPtr (m_OpCode (0)) m_opIndex = 0 ' program begins position of the element ' -------- The following required procedures to start---------- into' push the parameters onto the stack ' because it is stdcall CALL parameters onto the stack by the last start
Platform: | Size: 23552 | Author: apudn35 | Hits:

CodeBus www.codebus.net