Description: Mainly complete the implementation principle of trojans, only as a research study to use, not for other,
To Search:
File list (Check if you may need any files):
Rreadme.txt
6i服务器\EnumFileSystemServer.bas
........\modAPIs.bas
........\ModCD.bas
........\ModDisk.bas
J客户\ModGer.bas
6i服务器\modHideTask.bas
........\ModKb.bas
J客户\ModList.bas
6i服务器\ModMouse.bas
........\ModOnr.bas
J客户\ModPing.bas
.....\ModTree.bas
6i服务器\modwinsock.bas
........\NTREBOOT.bas
........\SysInfo.bas
J客户\Form1.frm
.....\FrmCd.frm
.....\FrmClose.frm
.....\FrmConnect.frm
.....\FrmDisk.frm
.....\FrmInfo.frm
.....\FrmInte.frm
.....\FrmKb.frm
6i服务器\frmMain.frm
........\FrmMouse.frm
J客户\FrmMouse.frm
.....\FrmNav.frm
.....\FrmOnr.frm
.....\FrmShell.frm
.....\FrmSys.frm
.....\Form1.frx
.....\FrmInte.frx
.....\FrmKb.frx
6i服务器\frmMain.frx
........\frmMessage.frx
........\Server.vbp
J客户\工程1.vbp
6i服务器\Server.vbw
J客户\工程1.vbw
6i服务器
J客户