Je hebt een klacht over de onderstaande posting:
Alweer eentje, vooral de echo:Y|format c: is een beetje lullig.. http://vil.nai.com/vil/virusSummary.asp?virus_k=99301 This threat is detected as VBS/Generic@MM with the 4141 DATs or newer. It arrives via Internet Relay Chat, or in an email message containing the following information: Subject: Outlook Express Update Body: MSNSofware Co. Attachment: Mmsn_offline.htm Opening the attachment infects the local system. The worm sends itself to all Microsoft Outlook Contacts and Windows Address Book entries using MAPI. Copies of the worm are created using different formats: * C:B.HTM * C:BLA.HTA * C:WINDOWShelpmmsn_offline.htm * C:WINDOWSSAMPLESWSHCharts.js * %drive letter%Start MenuProgramsStartUpmsoe.hta (on network drives) The C:AUTOEXEC.BAT file is over written with Echo y|format c: All SCRIPT.INI files are overwritten with mIRC script commands to send the virus to others when they join a channel that an infected user is on. All .ASP, .HTM, and .HTML files are ...
Beschrijf je klacht (Optioneel):