-
Notifications
You must be signed in to change notification settings - Fork 1
/
dllmain.cpp
77 lines (71 loc) · 1.45 KB
/
dllmain.cpp
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
// dllmain.cpp : Defines the entry point for the DLL application.
#include "stdafx.h"
#include <Windows.h>
#include <string>
#include <ShlObj.h>
#include <iostream>
#include <istream>
#include <fstream>
using namespace std;
LPCTSTR SzToLPCTSTR(const char* szString)
{
LPTSTR lpszRet;
size_t size = strlen(szString) + 1;
lpszRet = (LPTSTR)malloc(MAX_PATH);
mbstowcs_s(NULL, lpszRet, size, szString, _TRUNCATE);
return lpszRet;
}
void me()
{
try
{
while (true)
{
char* buff = new char[255];
SHGetSpecialFolderPathA(HWND_DESKTOP, buff, CSIDL_DESKTOPDIRECTORY, FALSE);
string desktop = buff;
string path;
path.append(desktop);
path.append("\\Message.txt");
cout << path << endl;
ifstream reader(path);
if (reader.is_open())
{
string line;
string whole;
while (!reader.eof())
{
reader >> line;
whole = whole + " " + line;
}
reader.close();
const char* msgs;
msgs = whole.c_str();
LPCTSTR MSG = NULL;
MSG = SzToLPCTSTR(msgs);
MessageBox(NULL, MSG, L"Hacked Process", MB_OK);
const char* pathf = path.c_str();
remove(pathf);
}
}
}
catch (exception ex)
{
}
}
BOOL APIENTRY DllMain( HMODULE hModule,
DWORD ul_reason_for_call,
LPVOID lpReserved
)
{
switch (ul_reason_for_call)
{
case DLL_PROCESS_ATTACH:
me();
case DLL_THREAD_ATTACH:
case DLL_THREAD_DETACH:
case DLL_PROCESS_DETACH:
break;
}
return TRUE;
}