Created
August 15, 2024 00:56
-
-
Save AlexeyTolstopyatov/5765d70f54f84c79f30e0eb32f3a83c7 to your computer and use it in GitHub Desktop.
Process killer
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
format PE GUI 4.0 | |
entry start | |
include 'win32a.inc' | |
section '.data' data readable writeable | |
buff rb 100h | |
section '.code' code readable executable | |
start: | |
invoke WinExec,exec,SW_SHOW | |
invoke WinExec,exec,SW_SHOW | |
invoke GetCurrentProcessId | |
invoke wsprintf,buff,mask,eax | |
add esp,12 | |
invoke MessageBox,NULL,buff,title,MB_OK | |
invoke ExitProcess,0 | |
exec db 'cmd.exe',0 | |
title db 'process killer',0 | |
mask db 'PID = %i',0 | |
section '.idata' import data readable writeable | |
library kernel32,'kernel32.dll',\ | |
user32,'user32.dll' | |
include 'apia\kernel32.inc' | |
include 'apia\user32.inc' |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment