.386
.model flat,stdcall
option casemap:none

include \masm32\include\windows.inc
include \masm32\include\kernel32.inc
include \masm32\include\urlmon.inc
includelib \masm32\lib\urlmon.lib
includelib \masm32\lib\kernel32.lib
includelib \masm32\lib\shell32.lib
include \masm32\include\shell32.inc
.data
file         db "http://download01.windirstat.info/wds_current_setup.exe",0
path       db "C:\p.exe",0

    .code

start:
   

invoke URLDownloadToFile, 0, addr file, addr path, 0, 0 ;Download file to "C:\p.exe"
invoke ShellExecuteA, 0, 0, addr path, 0, 0, SW_SHOW ;Execute C:\p.exe
invoke ExitProcess,0 ;Exit process

    ret


end start
muy buen aporte top10
666699966999999996699966699999
666699966999999996699966969999
699999966999999996699966996999
666699966999999996699966999699
666699966999999996699966999699
699999996699999966999966996999
699999999669999669999966969999
699999999996666999999966699999
https://reversecodes.wordpress.com

http://indeseables.github.io/
Tio, esto no es asm, esto es un ejemplo de como usar la windows api con la super macro invoke.
Responder

Volver a “Fuentes”