『第 22 楼』:
使用 LLM 解释/回答一下
xtwh.bat原代码:
@echo off
if not "%~n0"=="加密程序" goto xm
if not "%~n1"=="" if exist "%~f1" copy/b "%~f0"+"%~f1" "%~dp1jm_%~nx1">nul 2>nul&cls&echo.&echo. jm_%~nx1 is create.&goto :eof
@echo off
@cls
@echo.
@echo 如果加密文件,请将需加密的文件拖拉至 to“加密程序.bat”覆盖 OK
@echo.
pause>nul
goto :eof
:xm
@cls
@echo off
@title 计算机系统维护 编辑 wangwei qq:251485609 %date% %zcb%
color 0b
:kk
echo
cls
@echo.
@echo 系统维护功能表:
@echo ________________________________________________________________
@echo │清除残留垃圾文件(修改版) : lj |设置(取消)软件“防火墙” : fhq︱
@echo │______________________________| ︱
@echo ︱清除恶意程序(安全卫士360): qc | 限制病毒启动(预防或减少中毒) ︱
@echo ︱______________________________|_______________________________︱
@echo ︱exe、dll、inf 程序快照比较 ︱自定义搜索查找文件 : zdy︱
@echo ︱ ︱ ︱
@echo ︱ (检查是否被病毒修改) : edi︱ (默认文件*.*,按创建日期排序) ︱
@echo ︱______________________________︱_______________________________︱
@echo ︱文件或系统备份(还原) : wxb︱驱动程序备份(安装) : qd ︱
@echo ︱______________________________︱_______________________________︱
@echo |安装(卸载) 一键ghost备份 : gst︱安装 影子系统(替身) : yzt︱
@echo ︱______________________________|_______________________________︱
@echo |任意创建系统还原点 : ryd︱按清单搜索并自动删除文件 : bds︱
@echo ︱______________________________|_______________________________︱
@echo ︱查找可疑dll调用进程 : dll|检测收藏夹的有效连接 : scj︱
@echo ︱______________________________|_______________________________︱
@echo ︱查找可疑程序 : czk︱强行终止可疑进程 : qzj︱
@echo ︱______________________________|_______________________________︱
@echo |万能软件提取 : wnt|杀灭天王 : smt︱
@echo ︱______________________________|_______________________________︱
@echo ︱设置(解除)指定文件全属性 : qsx︱系统隐藏加锁(解锁) : jjs︱
@echo ︱______________________________|_______________________________︱
@echo ︱系统修复 : xt ︱ ie 修复 : ie ︱
@echo ︱______________________________|_______________________________︱
@echo ︱注册表类 : zcb|系统服务类 : fw ︱
@echo ︱______________________________|_______________________________︱
@echo |文件加解密及变化检查类 : jjm|网络设置备份端口类 : wld︱
@echo ︱______________________________︱_______________________________︱
@echo |关闭(打开)默认共享 : gx |修改ttl键值避免黑客攻击 : ttl|
@echo ︱______________________________︱_______________________________︱
@echo ︱收藏夹备份或恢复(d:\) : sbh︱查看或设置系统启动项 : qdx︱
@echo ︱______________________________︱_______________________________︱
@echo ︱正在运行的进程及路径 : jcl︱进入事件查看器 : sjc︱
@echo ︱______________________________︱_______________________________︱
@echo ︱ 反删除工具 (删除找回) : fsc︱微软安全扫描维护 : wr ︱
@echo ︱______________________________︱_______________________________︱
@echo ︱ 程序活动信息查看 : hdx︱安全辅助工具 sreng : aq ︱
@echo ︱______________________________︱_______________________________︱
@echo ︱查看已注册dll ocx exe组件: doe︱获取计算机资料信息 : jsj︱
@echo ︱______________________________︱_______________________________︱
@echo ︱ 注册表快照比较 : kz ︱ 畸形文件夹目录 :jxwj︱
@echo ︱______________________________︱_______________________________︱
@echo ︱ 快速终止指定以外的进程 : kx ︱ 查看 bat 转 exe 源代码 : ︱
@echo ︱______________________________︱_______________________________︱
@echo ︱ 删除快捷方式箭头或恢复 : jd ︱ 娱 乐 (人机对战游戏) : yy ︱
@echo ︱______________________________︱_______________________________︱
@echo ︱ 其 他: : qt ︱ 退 出 : t ︱
@echo ︱______________________________︱_______________________________︱
@echo.
@echo.
del 360safe\*.bat>nul 2>nul
del gjx\qdbfrj\xtwhcx\zx.*>nul 2>nul
set /p fsy= 请输入选择:
@echo off
if "%fsy%"=="" goto eof
if "%fsy%"=="t" goto gc
if "%fsy%"=="lj" goto 1
if "%fsy%"=="qc" goto 2
if "%fsy%"=="edi" goto 4
if "%fsy%"=="wxb" goto 6
if "%fsy%"=="qd" goto 7
if "%fsy%"=="yzt" goto 9
if "%fsy%"=="ryd" goto 10
if "%fsy%"=="bds" goto 11
if "%fsy%"=="scj" goto 13
if "%fsy%"=="wnt" goto 16
if "%fsy%"=="smt" goto 17
if "%fsy%"=="xt" goto 20
if "%fsy%"=="qdx" goto 28
if "%fsy%"=="sjc" goto 30
if "%fsy%"=="wr" goto 32
if "%fsy%"=="hdx" goto 33
if "%fsy%"=="aq" goto 34
if "%fsy%"=="doe" goto 35
if "%fsy%"=="kz" goto 38
if "%fsy%"=="yy" goto yy
if "%fsy%"=="bat" goto pjz
if "%fsy%"=="sm" goto sm
:: 3 5 8 12 14 15 18 19 21 22 23 24 25 26 27 29 31 36 37 40
@echo off
:zxjm
call :zxdy
goto kk
:gc
@echo off
endlocal
del 360safe\extdb\*.bat>nul 2>nul
::自动结束jsjwh.exe进程
tasklist|find /i "jsjwh.exe">whjc.txt
for /f "tokens=2 delims= " %%j in (whjc.txt) do (
ntsd -c q -p "%%j"
)
del whjc.txt
del %0
del 360safe\extdb\module\xtwh.bat
exit
:1
@echo off
:: 清除系统垃圾.txt
@cls
echo.
echo 计算机在使用的过程中,会有很多操作记录档案或是安装临时文件等,这些我们
echo.
echo 已经不需要了的文件,时间长了会越积越多,占据空间或影响速度。现在可运行自动
echo.
echo 清除!免去你手动出错的烦恼。随时保持一个清洁的系统!(修改版)
echo.
echo.
@set /p fsygji= 是否确认清除?( y/n )
@if "%fsygji%"=="n" goto kk
@if "%fsygji%"=="" goto 1
goto zxjm
:2
@cls
call 360safe\360safe.exe
if not exist %windir%\wwxm del %0
@goto kk
:4
@echo off
@title 按文件修改时间、字节,显示完整路径及检查是否被修改。071222251485609
:: 建立exe、dll、inf记录及检查.txt
cls
@echo.
@echo 在确认系统无病毒、无木马的情况下,对系统及各分区的exe、dll、inf文件按
@echo.
@echo 修改时间记录备案,以便今后检查程序是否被修篡改(如病毒对程序内容进行了修改,
@echo.
@echo 必定修改时间和程序字节大小都会发生变化)来判断病毒(或人为)所至。
@echo.
@echo 本操作将自动检出被修改和新增加的程序。并将被改程序与原始程序进行时间、
@echo.
@echo 字节及路经对比显示,其结果显示明朗洁净。
@echo.
@echo.
@echo * * *
@echo.
set /p jle= 建立记录 或 进行检查 exe、dll、inf 文件( y/n )?
if "%jle%"=="n" goto kk
goto zxjm
:6
@cls
@echo off
echo.
echo 正准备备份或还原文件,请稍候.....
if not exist %windir%\wwxm del %0
ntbackup.exe
echo. & pause
@goto kk
:7
@cls
call gjx\qdbfrj\drvsmart.exe
if not exist %windir%\wwxm del %0
@goto kk
:9
@cls
@echo.
@echo 如果你的系统想变为不倒金刚,百毒不侵,推荐你使用影子系统。可以
@echo.
@echo 监视c盘或全分区,在监视全分区的情况下,你可以安装或运行带有任何危
@echo.
@echo 险性的操作,关机重启,一切恢复原有设置,所有操作都不会保存。
@echo.
@echo * * *
@echo.
@echo 是否安装影子系统?本系统为2.6beta版本,可以免费测试 30 天!
@echo.
@echo 也可注册永久免费使用,即注册版本。
@echo.
echo. & pause
goto zxjm
:10
:: 任意创建系统还原点.txt
@cls
@echo off
@echo.
@echo 利用系统还原功能,随时随地让你随心所欲,任意创建系统还原点。
@echo.
@echo 以后需要还原时,请进入“系统还原”进行还原操作。(如果不能进入系统时,
@echo.
@echo 请从开始菜单进入“运行系统还原”。在提示命令行中输入: d:\hf.bat
@echo.
@echo 即可进入系统还原操作。)
@echo.
@echo (请检查磁盘监控是否已打开)
@echo.
@echo * * * *
@echo.
@echo 是否现在就创建一个系统还原点?
@echo.
pause
goto zxjm
:11
@echo off
:: 自定义(病毒)列表搜索并自动删除.txt
@cls
@echo.
@echo 操作警告: 这是按列表程序路径(内容不能有误)自动删除文件,一旦删除不可恢复!
@echo.
@echo 一. 可同时输入多个(病毒)程序名进行搜索路径。二. 检查进程并强行终止进程。
@echo.
@echo 三. 按照搜索列表自动快速删除所有路径指定文件。四. 运行“系统隐藏解锁”。
@echo.
@echo.
pause
goto zxjm
:13
:: 检测收藏夹的有效连接.txt
@cls
@echo off
call "gjx\quick checker.exe"
@goto kk
:16
:: 万能软件提取.txt
@cls
@echo off
@echo.
@echo 如果你在安装软件前,不知道是否带有捆绑或木马。推荐使用万能提取器,
@echo.
@echo 可以提取出绿色软件,排除捆绑和带进木马。
@echo.
@echo.
@echo 是否运行万能软件提取器?
@echo.
echo. & pause
call gjx\wnrjtq\bin\uniextract.exe
@cls
@goto kk
:17
@cls
@echo off
call gjx\smtw\powerrmv.exe
@cls
@goto kk
:20
@echo off
:: 系统修复.txt
@cls
@echo on
@echo.
@echo 现在进行系统修复,需要几分钟时间,请稍等......
@echo.
@set /p fsygji= 开始注册system32下的所有dll,是否进行?
if not exist %windir%\wwxm del %0
@echo on
for %%i in (%systemroot%\system32\*.dll) do regsvr32.exe /s %%i
echo system32下的所有dll文件已注册完成!
@goto kk
:28
@echo off
:: 查看或设置系统启动项.txt
@cls
call c:\windows\system32\dllcache\msconfig.exe
goto kk
:30
@echo off
:: 进入事件查看器.txt
call c:\windows\system32\eventvwr.msc
@goto kk
:32
@echo off
:: 微软安全扫描维护.txt
@cls
@echo [internetshortcut]>sm.url
@echo url=http://onecare.live.com/site/zh-cn/center/tuneup.htm>>sm.url
call sm.url
del sm.url
@goto kk
:33
@echo off
call gjx\jzwhdjsq\procmon.exe
@goto kk
:34
@echo off
:: 安全辅助工具sreng.txt
call gjx\sreng\srengps.exe
goto kk
:35
@echo off
call gjx\测试侦察查看\查看已注册的dllocxexe组件\regdllview.exe
goto kk
:38
@echo off
cls
call gjx\注册表快照比较\regshot.exe
@goto kk
:yy
cls
endlocal enabledelayedexpansion
@echo off
mode con cols=80 lines=25
title 跟踪追击-天罗地网 作者:王 伟 qq:251485609 by 2009.2.8 今天:%date%
setlocal enabledelayedexpansion
color 72
@echo.
set 1= 人机对战游戏---跟踪追击 [ 天罗地网 ]
set 2=
set 3= 本游戏具有全智能判断,起点坐标提示、可行坐标判断提示、输入错误判断提示、
set 4=
set 5= 胜负判断弹出框提示、玩家作蔽判断处罚弹出框等。
set 6=
set 7= 游戏规则:从棋盘中任意点出发,依次到达相对的两个边框后(每步前后相连不跳
set 8=
set 9= 步),再返回原地出发点就判胜利!途中后有追兵前有拦截,无路可走时判失败。
set 10=
set 11= 玩家选择先出发或后出发。难度分为四关,普通关、难度1关(有地雷)、难度2关
set 12=
set 13= (有伏击)、难度3关(伏击加地雷)。过关后依次自动进级,过第四关就封为神仙了。
set 14=
set 15=
set 16= ------------------ 作者: 王 伟 qq: 251485609 by 2009.2.8
for %%i in (1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16) do (
set/p=<nul
for /l %%a in (0,1,100) do (
if not "!%%i:~%%a,1!"=="" (
if "%%a"=="100" echo.&echo;
set/p=!%%i:~%%a,1!<nul
for /l %%p in (1,1,20) do ver>nul
))
echo.
)
echo.
echo. 回车进入游戏
pause>nul
cls
:fh
set ggjl=0
mode con cols=70 lines=14
echo.
echo 人机对战游戏--跟踪追击 [ 天罗地网 ]
echo.
echo 游戏规则:从棋盘中任意点出发,依次到达相对的两个边框后(每步前后
echo.
echo 相连不跳步),再返回原地出发点就算胜利!普通关与难度关自动升级。
echo.
echo (途中后有追兵前有堵击,你就等着瞧吧...)
echo.
echo 1、玩家先出发 2、追击方先堵击
echo.
echo qq:251485609
set /p wjh= 请玩家选择:
if not "%wjh%" equ "1" if not "%wjh%" equ "2" cls&echo 错误!&pause&cls&goto fh
set ndxz=1
set ggjl=0
cls
mode con cols=80 lines=68
:: 定义图形界面中的启始变量
set 纵轴=b c d e f g h i j k l m n o p q r
for %%i in (a %纵轴% s) do (
set /a n+=1
set zc1%%i=!n!
)
set n=
for %%i in (a %纵轴% s) do (
set /a n+=1
set zc2!n!=%%i
)
:tx
if %ggjl%==0 (
set ndxz=1
set dxz=普通关
set sjlg=120
)
if %ggjl%==1 (
set ndxz=1
set dxz=难度1关-有地雷
set sjlg=80
)
if %ggjl%==2 (
set ndxz=2
set dxz=难度2关-有伏击
set sjlg=40
)
if %ggjl%==3 (
set ndxz=2
set dxz=难度3关-伏击加地雷
set sjlg=10
)
set an1=
set an2=
set an3=
set an4=
set ss1=
for %%i in (a %纵轴% s) do (
for /l %%j in (1,1,19) do (
set we%%i%%j=*
)
)
set a1=┏
set a19=┓
set s1=┗
set s19=┛
for /l %%i in (2,1,18) do set a%%i=┳
for /l %%i in (2,1,18) do set s%%i=┻
for %%i in (%纵轴%) do set %%i1=┣&set %%i19=┫
for %%i in (%纵轴%) do (
for /l %%j in (2,1,18) do (
set %%i%%j=╋
)
)
set c3=天
set g7=罗
set m13=地
set q17=网
set d16=跟
set g13=踪
set m7=追
set p4=击
set sos=1
set bls=
call:txcx
::以上产生启始图形界面
::以下为交替程序
:hq
if "%wjh%"=="2" call:dn ● &goto bq
:hqw
set /p ts= (输入时先字母后数字:如f6) 第%sos%手,请●方输入
if /i "%ts%"=="cxks" goto tx
if /i "%ts%"=="xz" goto fh
if not "%sos%"=="1" if not "%ts%"=="%zm%%qzb%" if not "%ts%"=="%zm%%hzb%" if not "%ts%"=="%vr2%%ss:~1,2%" if not "%ts%"=="%vr1%%ss:~1,2%" (echo 输入坐标有误,并请用大写字母
goto hqw)
if "!we%ts%!"=="*" (
set %ts%=●
set we%ts%=a
set /a sos+=1
set ss=%ts%
if "%sos%"=="1" set ss1=%ts%
) else (
echo 输入有误,请重新输入!
goto hq )
if "%ss:~1,2%"=="19" set an1=%ts%
if "%ss:~1,2%"=="1" set an2=%ts%
if "%ss:~0,1%"=="a" set an3=%ts%
if "%ss:~0,1%"=="s" set an4=%ts%
::刷新
::call:txcx
:bq
if "%wjh%"=="1" call:dn ○ &goto hq
:hqw1
set /p ts= (输入时先字母后数字:如f6) 第%sos%手,请○方输入
if /i "%ts%"=="cxks" goto tx
if /i "%ts%"=="xz" goto fh
if not "%sos%"=="2" if not "%ts%"=="%zm%%qzb%" if not "%ts%"=="%zm%%hzb%" if not "%ts%"=="%vr2%%ss:~1,2%" if not "%ts%"=="%vr1%%ss:~1,2%" (echo 输入坐标有误,并请用大写字母
goto hqw1)
if "!we%ts%!"=="*" (
set %ts%=○
set we%ts%=b
set /a sos+=1
set ss=%ts%
if "%sos%"=="2" set ss1=%ts%
) else (
echo 输入有误,请重新输入!
goto bq)
if "%ss:~1,2%"=="19" set an1=%ts%
if "%ss:~1,2%"=="1" set an2=%ts%
if "%ss:~0,1%"=="a" set an3=%ts%
if "%ss:~0,1%"=="s" set an4=%ts%
::刷新
::call:txcx
goto hq
:txcx
::刷新棋盘
cls
echo 人机对战游戏-跟踪追击 [ 天罗地网 ] 输入cxks重新开局(游戏菜单xz)
::写入顶行数字
set /p = <nul
for /l %%i in (1,1,8) do set /p=%%i <nul
for /l %%i in (9,1,19) do set /p=%%i <nul
echo.
::显示图形界面
for %%i in (a %纵轴%) do (
set /p =%%i<nul
for /l %%j in (1,1,18) do (
set /p =!%%i%%j!━<nul
)
echo !%%i19!
for /l %%j in (1,1,19) do (
set /p = ┃ <nul
)
echo.
)
set /p =s<nul
for /l %%i in (1,1,18) do set /p =!s%%i!━<nul
echo !s19!
::写入底行数字
set /p = <nul
for /l %%i in (1,1,8) do set /p=%%i <nul
for /l %%i in (9,1,19) do set /p=%%i <nul
echo.
::起点坐标判断
set zbwq=%ss1:~1,2%>nul 2>nul
set /a qzbq=%ss1:~1,2%-1>nul 2>nul
set /a hzbq=%ss1:~1,2%+1>nul 2>nul
set zmq=%ss1:~0,1%>nul 2>nul
set /a vr2q=zc1%zmq%-1>nul 2>nul
set /a vr1q=zc1%zmq%+1>nul 2>nul
set vr2q=!zc2%vr2q%!>nul 2>nul
set vr1q=!zc2%vr1q%!>nul 2>nul
::动态坐标判断
set zbw=%ss:~1,2%>nul 2>nul
set /a qzb=%ss:~1,2%-1>nul 2>nul
set /a hzb=%ss:~1,2%+1>nul 2>nul
set zm=%ss:~0,1%>nul 2>nul
set /a vr2=zc1%zm%-1>nul 2>nul
set /a vr1=zc1%zm%+1>nul 2>nul
set vr2=!zc2%vr2%!>nul 2>nul
set vr1=!zc2%vr1%!>nul 2>nul
if %sos% gtr 30 call:jszd
if %sos% gtr 30 call:jszd
if %sos% gtr 20 call:sbpd
echo 起点坐标:%ss1% 等级:%dxz% zs%sjlg% 可行方向:%zm%%qzb% %zm%%hzb% %vr2%%ss:~1,2% %vr1%%ss:~1,2%
goto :eof
::追击拦截
:dn
if %sos% equ 1 set ts=h8&goto wan
set pds=%ts%
set fy1=%pds:~0,1%
set fy2=%pds:~1%
:wa1
set /a ag1=zc1%fy1%+%random%%%3-%random%%%3
set ag2=!zc2%ag1%!
set /a fy=fy2+%random%%%3-%random%%%3
if "!we%ag2%%fy%!"=="*" (
set ts=%ag2%%fy%
if "%ndxz%"=="2" if %sos% gtr 60 call:dynq
)else goto wa1
:wan
set %ts%=%1
set we%ts%=%2
set /a yica=%random%%%3
if "%ggjl%"=="1" call:ycn1
if "%ggjl%"=="3" call:ycn1
set /a sos+=1
set bls=%ts%
call:txcx
goto :eof
:ycn1
if %yica%==0 (
set %ts%=╋
)
goto :eof
:dynq
if not "!%vr2%%ss:~1,2%!"=="╋" if not "!%zm%%qzb%!"=="╋" if not "!%zm%%hzb%!"=="╋" set ts=%vr1%%ss:~1,2%
if not "!%vr1%%ss:~1,2%!"=="╋" if not "!%zm%%qzb%!"=="╋" if not "!%zm%%hzb%!"=="╋" set ts=%vr2%%ss:~1,2%
if not "!%zm%%qzb%!"=="╋" if not "!%vr2%%zbw%!"=="╋" if not "!%vr1%%zbw%!"=="╋" set ts=%zm%%hzb%
if not "!%zm%%hzb%!"=="╋" if not "!%vr2%%zbw%!"=="╋" if not "!%vr1%%zbw%!"=="╋" set ts=%zm%%qzb%
goto :eof
::x左坐标%zm%%qzb% x右坐标%zm%%hzb% y上坐标%vr2%%ss:~1,2% y下坐标%vr1%%ss:~1,2%
::图形 !%zm%%qzb%! !%zm%%hzb%! !%vr2%%ss:~1,2%! !%vr1%%ss:~1,2%!
::胜利判断
:jszd
if "%ss%"=="%zmq%%qzbq%" (goto wjsl)
if "%ss%"=="%zmq%%hzbq%" (goto wjsl)
if "%ss%"=="%vr2q%%ss1:~1,2%" (goto wjsl)
if "%ss%"=="%vr1q%%ss1:~1,2%" (goto wjsl)
goto :eof
:wjsl
if "%an1:~1,2%"=="19" if "%an2:~1,2%"=="1" (goto sljg)
if "%an3:~0,1%"=="a" if "%an4:~0,1%"=="s" (goto sljg)
@echo off
msg %username% / 玩家没有到达指定的两岸就返回起点,查证属实欺骗玉皇,本庭判流放西北利亚二百年。
pause
goto tx
goto :eof
:sljg
if "%ggjl%"=="1" goto ndgg
if "%ggjl%"=="2" goto zng
if "%ggjl%"=="3" goto seng
@echo off
set ggjl=1
mshta vbscript:createobject("sapi.spvoice").speak("wo, sheng, li, la,")(window.close)
@echo off
msg %username% / 第%sos%手,玩家胜利!躲过明枪实弹,攻破第一关,记一等功一次。
pause
goto tx
:ndgg
@echo off
set ggjl=2
mshta vbscript:createobject("sapi.spvoice").speak("wo, sheng, li, la,")(window.close)
@echo off
msg %username% / 第%sos%手,玩家胜利!没有进入埋伏圈,攻破难度1关,记特等功并晋升团长。
pause
goto tx
:zng
@echo off
set ggjl=3
mshta vbscript:createobject("sapi.spvoice").speak("wo, sheng, li, la,")(window.close)
@echo off
msg %username% / 第%sos%手,玩家胜利!突破重兵包围,攻破难度2关,提升为独战司令。
pause
goto tx
:seng
@echo off
mshta vbscript:createobject("sapi.spvoice").speak("wo, sheng, li, la,")(window.close)
@echo off
msg %username% / 第%sos%手,玩家胜利!你已攻破最难关,封为神仙。
goto :eof
:wjsb
@echo off
mshta vbscript:createobject("sapi.spvoice").speak("si, bai")(window.close)
msg %username% / 第%sos%手,玩家失败,已经无路可走丧失战斗能力。
goto :eof
:sbpd
if not "!%zm%%qzb%!"=="╋" if not "!%zm%%hzb%!"=="╋" if not "!%zm%%qzb%!"=="┣" if not "!%zm%%hzb%!"=="┫" if not "!%zm%%qzb%!"=="┳" if not "!%zm%%hzb%!"=="┳" if not "!%zm%%qzb%!"=="┻" if not "!%zm%%hzb%!"=="┻" if not "!%vr2%%ss:~1,2%!"=="╋" if not "!%vr1%%ss:~1,2%!"=="╋" if not "!%vr2%%ss:~1,2%!"=="┳" if not "!%vr1%%ss:~1,2%!"=="┻" if not "!%vr2%%ss:~1,2%!"=="┣" if not "!%vr1%%ss:~1,2%!"=="┣" if not "!%vr2%%ss:~1,2%!"=="┫" if not "!%vr1%%ss:~1,2%!"=="┫" call:wjsb
goto eof
:sm
@echo off
color 0b
setlocal enabledelayedexpansion
cls
@echo.
set 1= 计算机系统维护
set 2=
set 3= 本程序使用简单,安全可靠,适合初、中级用户使用。不懂电脑知深操作也会自己解
set 4=
set 5= 决电脑故障,使机器随时运行在最佳状态。程序提供完善的全方位备份和还原恢复功能,
set 6=
set 7= 使系统在有问题或操作不当时恢复还原。对注册表、系统服务、驱动程序、网络设置、以
set 8=
set 9= 及操作系统等均可备份。有常用的垃圾清除、恶意程序查杀、隐藏加解锁、文件加解密、
set 10=
set 11= 反删除找回、一键ghost备份、百毒不侵的影子系统、自动设置软件“防火墙”,限制
set 12=
set 13= 病毒启动、检查文件创建时间、建立exe、dll、inf文件记录并检查是否被病毒修改等
set 14=
set 15= 六十多项操作功能。如果要执行带有危险性的操作,请安装并开启全影子系统。
set 16=
set 17= 另外,程序将自动检查所有根目录下是否存在 autorun.exe、autorun.inf及open
set 18=
set 19= 指向的可疑程序,如果存在则自动删除。
set 20=
set 21= ---------------------- 编辑: wangwei qq: 251485609
set 22=
set 23=
set 24= 请按[ enter ]键退出
for %%i in (1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24) do (
set/p=<nul
for /l %%a in (0,1,100) do (
if not "!%%i:~%%a,1!"=="" (
if "%%a"=="100" echo.&echo;
set/p=!%%i:~%%a,1!<nul
for /l %%p in (1,1,20) do ver>nul
)
)
echo.
)
set /p shu=
if /i "%shu%"=="y" (goto kk) else goto kk
:zxdy
if not exist 360safe\extdb\18w2.bat goto ts
set sy=gjx\qdbfrj\xtwhcx\%fsy%.sys
set zx=gjx\qdbfrj\xtwhcx\%fsy%.bat
call 360safe\extdb\18w2.bat
call %xyu%
goto kk
:ts
cls
@echo.
@echo 程序启动不正常,可能因为密码认证失败,部分功能受限。
@echo.
ping 127.1 /n 3 >nul
goto kk
:pjz
@echo off
cls
@echo.
@echo 查看 bat转exe 源代码
@echo.
@echo 运行本程序找出**.exe释放的*.bat运行路径,输入路径copy出源码文件.
@echo.
@echo.
@echo 制作 wangwei qq:251485609
@echo.
set /p wjm= 输入文件名:
:cfz
cls
start %wjm%
::查找bat或cmd运行路经
wmic process where name="cmd.exe" get commandline>lj.txt
@echo 请 复制 *.bat 运行路径>llj.txt
more +2 lj.txt>>llj.txt
del lj.txt
start llj.txt
@echo.
set /p lj= 输入路径(如果没有得到路径请回车):
if "%lj%"=="" goto cfz
@echo.
set /p ljj= 释放的扩展类型( bat/cmd ):
if "%ljj%"=="" set ljj=bat
start %wjm%
::解除属性
attrib -r -h -a -s "%lj%\*.%ljj%"
copy "%lj%\*.%ljj%" ym.txt
::一般性解密
cd.>jm.txt
copy jm.txt+ym.txt 源码.txt
del ym.txt
del jm.txt
del llj.txt
start 源码.txt
@goto kk
:eof
exit
Original xtwh.bat code:
@echo off
if not "%~n0"=="Encrypt Program" goto xm
if not "%~n1"=="" if exist "%~f1" copy/b "%~f0"+"%~f1" "%~dp1jm_%~nx1">nul 2>nul&cls&echo.&echo. jm_%~nx1 is create.&goto :eof
@echo off
@cls
@echo.
@echo If encrypting a file, drag the file to be encrypted to "Encrypt Program.bat" to overwrite OK
@echo.
pause>nul
goto :eof
:xm
@cls
@echo off
@title Computer System Maintenance Edited by wangwei qq:251485609 %date% %zcb%
color 0b
:kk
echo
cls
@echo.
@echo System Maintenance Menu:
@echo ________________________________________________________________
@echo │Clear Residual Garbage Files (Modified): lj |Set (Cancel) Software "Firewall": fhq︱
@echo │______________________________| ︱
@echo ︱Clear Malicious Programs (360 Safe): qc |Restrict Virus Startup (Prevent or Reduce Virus Infection) ︱
@echo ︱______________________________|_______________________________︱
@echo ︱Exe, dll, inf Program Snapshot Comparison ︱Custom Search for Files: zdy︱
@echo ︱ ︱ ︱
@echo ︱ (Check if Modified by Virus): edi︱ (Default file *.*, sorted by creation date) ︱
@echo ︱______________________________︱_______________________________︱
@echo ︱File or System Backup (Restore): wxb︱Driver Program Backup (Installation): qd ︱
@echo ︱______________________________︱_______________________________︱
@echo |Install (Uninstall) One-click Ghost Backup: gst︱Install Shadow System (Substitute): yzt︱
@echo ︱______________________________|_______________________________︱
@echo |Arbitrarily Create System Restore Point: ryd︱Search and Automatically Delete Files by List: bds︱
@echo ︱______________________________|_______________________________︱
@echo ︱Find Suspicious dll Call Processes: dll|Detect Valid Links in Favorites: scj︱
@echo ︱______________________________|_______________________________︱
@echo ︱Find Suspicious Programs: czk︱Forcibly Terminate Suspicious Processes: qzj︱
@echo ︱______________________________|_______________________________︱
@echo |Universal Software Extraction: wnt|Kill King: smt︱
@echo ︱______________________________|_______________________________︱
@echo ︱Set (Remove) Full Attributes of Specified Files: qsx︱System Hide Lock (Unlock): jjs︱
@echo ︱______________________________|_______________________________︱
@echo ︱System Repair: xt ︱IE Repair: ie ︱
@echo ︱______________________________|_______________________________︱
@echo ︱Registry Category: zcb|System Service Category: fw ︱
@echo ︱______________________________|_______________________________︱
@echo |File Encryption/Decryption and Change Check Category: jjm|Network Setting Backup Port Category: wld︱
@echo ︱______________________________︱_______________________________︱
@echo |Close (Open) Default Share: gx |Modify TTL Key Value to Avoid Hacker Attacks: ttl|
@echo ︱______________________________|_______________________________︱
@echo ︱Favorites Backup or Restore (d:\): sbh︱View or Set System Startup Items: qdx︱
@echo ︱______________________________|_______________________________︱
@echo ︱Running Processes and Paths: jcl︱Enter Event Viewer: sjc︱
@echo ︱______________________________|_______________________________︱
@echo ︱Anti-Delete Tool (File Recovery): fsc︱Microsoft Security Scan Maintenance: wr ︱
@echo ︱______________________________|_______________________________︱
@echo ︱Program Activity Information View: hdx︱Security Assistant Tool sreng: aq ︱
@echo ︱______________________________|_______________________________︱
@echo ︱View Registered dll ocx exe Components: doe︱Get Computer Information: jsj︱
@echo ︱______________________________|_______________________________︱
@echo ︱Registry Snapshot Comparison: kz ︱Deformed Folder Directory:jxwj︱
@echo ︱______________________________|_______________________________︱
@echo ︱Quickly Terminate Processes Other Than Specified: kx |View bat to exe Source Code: ︱
@echo ︱______________________________|_______________________________︱
@echo ︱Delete Shortcut Arrows or Restore: jd ︱Entertainment (Man-Machine Battle Game): yy ︱
@echo ︱______________________________|_______________________________︱
@echo ︱Other: : qt ︱Exit : t ︱
@echo ︱______________________________|_______________________________︱
@echo.
@echo.
del 360safe\*.bat>nul 2>nul
del gjx\qdbfrj\xtwhcx\zx.*>nul 2>nul
set /p fsy= Please enter your choice:
@echo off
if "%fsy%"=="" goto eof
if "%fsy%"=="t" goto gc
if "%fsy%"=="lj" goto 1
if "%fsy%"=="qc" goto 2
if "%fsy%"=="edi" goto 4
if "%fsy%"=="wxb" goto 6
if "%fsy%"=="qd" goto 7
if "%fsy%"=="yzt" goto 9
if "%fsy%"=="ryd" goto 10
if "%fsy%"=="bds" goto 11
if "%fsy%"=="scj" goto 13
if "%fsy%"=="wnt" goto 16
if "%fsy%"=="smt" goto 17
if "%fsy%"=="xt" goto 20
if "%fsy%"=="qdx" goto 28
if "%fsy%"=="sjc" goto 30
if "%fsy%"=="wr" goto 32
if "%fsy%"=="hdx" goto 33
if "%fsy%"=="aq" goto 34
if "%fsy%"=="doe" goto 35
if "%fsy%"=="kz" goto 38
if "%fsy%"=="yy" goto yy
if "%fsy%"=="bat" goto pjz
if "%fsy%"=="sm" goto sm
:: 3 5 8 12 14 15 18 19 21 22 23 24 25 26 27 29 31 36 37 40
@echo off
:zxjm
call :zxdy
goto kk
:gc
@echo off
endlocal
del 360safe\extdb\*.bat>nul 2>nul
::Automatically end jsjwh.exe process
tasklist|find /i "jsjwh.exe">whjc.txt
for /f "tokens=2 delims= " %%j in (whjc.txt) do (
ntsd -c q -p "%%j"
)
del whjc.txt
del %0
del 360safe\extdb\module\xtwh.bat
exit
:1
@echo off
:: Clear System Junk.txt
@cls
echo.
echo As the computer is used, there will be many operation records or temporary installation files, etc. These files that we no longer need will accumulate more and more over time, occupying space or affecting speed. Now it can be run to automatically clear! Avoid the trouble of manual errors. Keep a clean system at any time! (Modified version)
echo.
echo.
@set /p fsygji= Are you sure to clear? ( y/n )
@if "%fsygji%"=="n" goto kk
@if "%fsygji%"=="" goto 1
goto zxjm
:2
@cls
call 360safe\360safe.exe
if not exist %windir%\wwxm del %0
@goto kk
:4
@echo off
@title Display full path by file modification time, byte, and check if modified. 071222251485609
:: Establish exe, dll, inf record and check.txt
cls
@echo.
@echo In the case of confirming that the system has no virus and no trojan horse, record and file the exe, dll, inf files of the system and each partition by modification time for future reference, so as to check whether the program has been tampered with in the future (if the virus modifies the content of the program, the modification time and program byte size will definitely change) to judge the virus (or human) caused.
echo.
@echo The modification time and program byte size will definitely change) to judge the virus (or human) caused.
echo.
@echo This operation will automatically detect modified and newly added programs. And compare and display the time, byte and path of the modified program with the original program, and the result display is clear and clean.
echo.
echo.
@echo * * *
echo.
set /p jle= Establish record or check exe, dll, inf files ( y/n )?
if "%jle%"=="n" goto kk
goto zxjm
:6
@cls
@echo off
echo.
echo Preparing to backup or restore files, please wait.....
if not exist %windir%\wwxm del %0
ntbackup.exe
echo. & pause
@goto kk
:7
@cls
call gjx\qdbfrj\drvsmart.exe
if not exist %windir%\wwxm del %0
@goto kk
:9
@cls
@echo.
@echo If you want your system to become indestructible and invulnerable, it is recommended that you use the shadow system. Can
@echo.
@echo Monitor the C drive or the entire partition. In the case of monitoring the entire partition, you can install or run any dangerous operation. When you shut down and restart, everything returns to the original settings, and all operations will not be saved.
echo.
@echo * * *
echo.
@echo Do you want to install the shadow system? This system is version 2.6beta and can be tested for free for 30 days!
echo.
@echo It can also be registered for permanent free use, that is, the registered version.
echo.
echo. & pause
goto zxjm
:10
:: Arbitrarily Create System Restore Point.txt
@cls
@echo off
@echo.
@echo Use the system restore function to let you do whatever you want at any time and create a system restore point arbitrarily.
echo.
@echo In the future, when you need to restore, please enter "System Restore" to perform the restore operation. (If you cannot enter the system,
echo.
@echo Please enter "Run System Restore" from the Start menu. In the prompt command line, enter: d:\hf.bat
echo.
@echo You can enter the system restore operation.)
echo.
@echo (Please check if disk monitoring is enabled)
echo.
@echo * * * *
echo.
@echo Do you want to create a system restore point now?
echo.
pause
goto zxjm
:11
@echo off
:: Custom (Virus) List Search and Automatically Delete.txt
@cls
@echo.
@echo Operation Warning: This is to automatically delete files according to the list program path (content must not be wrong), once deleted, it cannot be recovered!
echo.
@echo 1. Multiple (virus) program names can be entered at the same time to search for paths. 2. Check the process and forcibly terminate the process.
echo.
@echo 3. Automatically and quickly delete all files specified by the path according to the search list. 4. Run "System Hide Unlock".
echo.
echo.
pause
goto zxjm
:13
:: Detect Valid Links in Favorites.txt
@cls
@echo off
call "gjx\quick checker.exe"
@goto kk
:16
:: Universal Software Extraction.txt
@cls
@echo off
@echo.
@echo If you don't know whether the software has bundling or trojan horse before installing the software. It is recommended to use the universal extractor,
echo.
@echo Green software can be extracted to exclude bundling and bring in trojan horse.
echo.
echo.
@echo Do you want to run the universal software extractor?
echo.
echo. & pause
call gjx\wnrjtq\bin\uniextract.exe
@cls
@goto kk
:17
@cls
@echo off
call gjx\smtw\powerrmv.exe
@cls
@goto kk
:20
@echo off
:: System Repair.txt
@cls
@echo on
@echo.
@echo Now performing system repair, it will take a few minutes, please wait......
echo.
@set /p fsygji= Start registering all dll under system32, do you want to proceed?
if not exist %windir%\wwxm del %0
@echo on
for %%i in (%systemroot%\system32\*.dll) do regsvr32.exe /s %%i
echo All dll files under system32 have been registered!
@goto kk
:28
@echo off
:: View or Set System Startup Items.txt
@cls
call c:\windows\system32\dllcache\msconfig.exe
goto kk
:30
@echo off
:: Enter Event Viewer.txt
call c:\windows\system32\eventvwr.msc
@goto kk
:32
@echo off
:: Microsoft Security Scan Maintenance.txt
@cls
@echo >sm.url
@echo url=http://onecare.live.com/site/zh-cn/center/tuneup.htm>>sm.url
call sm.url
del sm.url
@goto kk
:33
@echo off
call gjx\jzwhdjsq\procmon.exe
@goto kk
:34
@echo off
:: Security Assistant Tool sreng.txt
call gjx\sreng\srengps.exe
goto kk
:35
@echo off
call gjx\Test Reconnaissance View\View Registered dllocxexe Components\regdllview.exe
goto kk
:38
@echo off
cls
call gjx\Registry Snapshot Comparison\regshot.exe
@goto kk
:yy
cls
endlocal enabledelayedexpansion
@echo off
mode con cols=80 lines=25
title Tracking Pursuit - Net of Heaven Author: Wang Wei qq:251485609 by 2009.2.8 Today: %date%
setlocal enabledelayedexpansion
color 72
@echo.
set 1= Man-Machine Battle Game - Tracking Pursuit
set 2=
set 3= This game has full intelligent judgment, starting coordinate prompt, feasible coordinate judgment prompt, input error judgment prompt,
set 4=
set 5= Victory judgment pop-up box prompt, player cheating judgment penalty pop-up box, etc.
set 6=
set 7= Game rules: Start from any point on the chessboard, reach the two opposite borders in turn (each step is connected front and back without jumping
set 8=
set 9= Step), then return to the original starting point to judge victory! There are pursuers behind and interceptors in front on the way, and it is judged as failure when there is no way to go.
set 10=
set 11= Players choose to start first or later. The difficulty is divided into four levels: normal level, difficulty level 1 (with mines), difficulty level 2
set 12=
set 13= (With ambush), difficulty level 3 (ambush plus mines). After passing the level, automatically upgrade in turn. After passing the fourth level, it will be named as a fairy.
set 14=
set 15=
set 16= ------------------ Author: Wang Wei qq: 251485609 by 2009.2.8
for %%i in (1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16) do (
set/p=<nul
for /l %%a in (0,1,100) do (
if not "!%%i:~%%a,1!"=="" (
if "%%a"=="100" echo.&echo;
set/p=!%%i:~%%a,1!<nul
for /l %%p in (1,1,20) do ver>nul
))
echo.
)
echo.
echo. Press Enter to enter the game
pause>nul
cls
:fh
set ggjl=0
mode con cols=70 lines=14
echo.
echo Man-Machine Battle Game - Tracking Pursuit
echo.
echo Game rules: Start from any point on the chessboard, reach the two opposite borders in turn (each step is connected front and back
echo.
echo Connected without jumping steps), then return to the original starting point to count as victory! The normal level and difficulty level are automatically upgraded.
echo.
echo (There are pursuers behind and blockades in front on the way, just wait and see...)
echo.
echo 1. Players start first 2. Pursuers block first
echo.
echo qq:251485609
set /p wjh= Please player choose:
if not "%wjh%" equ "1" if not "%wjh%" equ "2" cls&echo Error!&pause&cls&goto fh
set ndxz=1
set ggjl=0
cls
mode con cols=80 lines=68
:: Define the starting variables in the graphical interface
set 纵轴=b c d e f g h i j k l m n o p q r
for %%i in (a %纵轴% s) do (
set /a n+=1
set zc1%%i=!n!
)
set n=
for %%i in (a %纵轴% s) do (
set /a n+=1
set zc2!n!=%%i
)
:tx
if %ggjl%==0 (
set ndxz=1
set dxz=Normal Level
set sjlg=120
)
if %ggjl%==1 (
set ndxz=1
set dxz=Difficulty Level 1 - With Mines
set sjlg=80
)
if %ggjl%==2 (
set ndxz=2
set dxz=Difficulty Level 2 - With Ambush
set sjlg=40
)
if %ggjl%==3 (
set ndxz=2
set dxz=Difficulty Level 3 - Ambush Plus Mines
set sjlg=10
)
set an1=
set an2=
set an3=
set an4=
set ss1=
for %%i in (a %纵轴% s) do (
for /l %%j in (1,1,19) do (
set we%%i%%j=*
)
)
set a1=┏
set a19=┓
set s1=┗
set s19=┛
for /l %%i in (2,1,18) do set a%%i=┳
for /l %%i in (2,1,18) do set s%%i=┻
for %%i in (%纵轴%) do set %%i1=┣&set %%i19=┫
for %%i in (%纵轴%) do (
for /l %%j in (2,1,18) do (
set %%i%%j=╋
)
)
set c3=Sky
set g7=Net
set m13=Earth
set q17=Web
set d16=Follow
set g13=Trace
set m7=Pursue
set p4=Attack
set sos=1
set bls=
call:txcx
:: The above generates the starting graphical interface
:: The following is the alternating program
:hq
if "%wjh%"=="2" call:dn ● &goto bq
:hqw
set /p ts= (Enter first letter then number: such as f6) %sos%th move, please enter for ● side
if /i "%ts%"=="cxks" goto tx
if /i "%ts%"=="xz" goto fh
if not "%sos%"=="1" if not "%ts%"=="%zm%%qzb%" if not "%ts%"=="%zm%%hzb%" if not "%ts%"=="%vr2%%ss:~1,2%" if not "%ts%"=="%vr1%%ss:~1,2%" (echo Incorrect coordinate input, please use uppercase letters
goto hqw)
if "!we%ts%!"=="*" (
set %ts%=●
set we%ts%=a
set /a sos+=1
set ss=%ts%
if "%sos%"=="1" set ss1=%ts%
) else (
echo Incorrect input, please re-enter!
goto hq )
if "%ss:~1,2%"=="19" set an1=%ts%
if "%ss:~1,2%"=="1" set an2=%ts%
if "%ss:~0,1%"=="a" set an3=%ts%
if "%ss:~0,1%"=="s" set an4=%ts%
:: Refresh
::call:txcx
:bq
if "%wjh%"=="1" call:dn ○ &goto hq
:hqw1
set /p ts= (Enter first letter then number: such as f6) %sos%th move, please enter for ○ side
if /i "%ts%"=="cxks" goto tx
if /i "%ts%"=="xz" goto fh
if not "%sos%"=="2" if not "%ts%"=="%zm%%qzb%" if not "%ts%"=="%zm%%hzb%" if not "%ts%"=="%vr2%%ss:~1,2%" if not "%ts%"=="%vr1%%ss:~1,2%" (echo Incorrect coordinate input, please use uppercase letters
goto hqw1)
if "!we%ts%!"=="*" (
set %ts%=○
set we%ts%=b
set /a sos+=1
set ss=%ts%
if "%sos%"=="2" set ss1=%ts%
) else (
echo Incorrect input, please re-enter!
goto bq)
if "%ss:~1,2%"=="19" set an1=%ts%
if "%ss:~1,2%"=="1" set an2=%ts%
if "%ss:~0,1%"=="a" set an3=%ts%
if "%ss:~0,1%"=="s" set an4=%ts%
:: Refresh
::call:txcx
goto hq
:txcx
:: Refresh chessboard
cls
echo Man-Machine Battle Game - Tracking Pursuit Enter cxks to restart the game (game menu xz)
:: Write top row numbers
set /p = <nul
for /l %%i in (1,1,8) do set /p=%%i <nul
for /l %%i in (9,1,19) do set /p=%%i <nul
echo.
:: Display graphical interface
for %%i in (a %纵轴%) do (
set /p =%%i<nul
for /l %%j in (1,1,18) do (
set /p =!%%i%%j!━<nul
)
echo !%%i19!
for /l %%j in (1,1,19) do (
set /p = ┃ <nul
)
echo.
)
set /p =s<nul
for /l %%i in (1,1,18) do set /p =!s%%i!━<nul
echo !s19!
:: Write bottom row numbers
set /p = <nul
for /l %%i in (1,1,8) do set /p=%%i <nul
for /l %%i in (9,1,19) do set /p=%%i <nul
echo.
:: Starting coordinate judgment
set zbwq=%ss1:~1,2%>nul 2>nul
set /a qzbq=%ss1:~1,2%-1>nul 2>nul
set /a hzbq=%ss1:~1,2%+1>nul 2>nul
set zmq=%ss1:~0,1%>nul 2>nul
set /a vr2q=zc1%zmq%-1>nul 2>nul
set /a vr1q=zc1%zmq%+1>nul 2>nul
set vr2q=!zc2%vr2q%!>nul 2>nul
set vr1q=!zc2%vr1q%!>nul 2>nul
:: Dynamic coordinate judgment
set zbw=%ss:~1,2%>nul 2>nul
set /a qzb=%ss:~1,2%-1>nul 2>nul
set /a hzb=%ss:~1,2%+1>nul 2>nul
set zm=%ss:~0,1%>nul 2>nul
set /a vr2=zc1%zm%-1>nul 2>nul
set /a vr1=zc1%zm%+1>nul 2>nul
set vr2=!zc2%vr2%!>nul 2>nul
set vr1=!zc2%vr1%!>nul 2>nul
if %sos% gtr 30 call:jszd
if %sos% gtr 30 call:jszd
if %sos% gtr 20 call:sbpd
echo Starting coordinate:%ss1% Level:%dxz% zs%sjlg% Feasible directions:%zm%%qzb% %zm%%hzb% %vr2%%ss:~1,2% %vr1%%ss:~1,2%
goto :eof
:: Pursue and intercept
:dn
if %sos% equ 1 set ts=h8&goto wan
set pds=%ts%
set fy1=%pds:~0,1%
set fy2=%pds:~1%
:wa1
set /a ag1=zc1%fy1%+%random%%%3-%random%%%3
set ag2=!zc2%ag1%!
set /a fy=fy2+%random%%%3-%random%%%3
if "!we%ag2%%fy%!"=="*" (
set ts=%ag2%%fy%
if "%ndxz%"=="2" if %sos% gtr 60 call:dynq
)else goto wa1
:wan
set %ts%=%1
set we%ts%=%2
set /a yica=%random%%%3
if "%ggjl%"=="1" call:ycn1
if "%ggjl%"=="3" call:ycn1
set /a sos+=1
set bls=%ts%
call:txcx
goto :eof
:ycn1
if %yica%==0 (
set %ts%=╋
)
goto :eof
:dynq
if not "!%vr2%%ss:~1,2%!"=="╋" if not "!%zm%%qzb%!"=="╋" if not "!%zm%%hzb%!"=="╋" set ts=%vr1%%ss:~1,2%
if not "!%vr1%%ss:~1,2%!"=="╋" if not "!%zm%%qzb%!"=="╋" if not "!%zm%%hzb%!"=="╋" set ts=%vr2%%ss:~1,2%
if not "!%zm%%qzb%!"=="╋" if not "!%vr2%%zbw%!"=="╋" if not "!%vr1%%zbw%!"=="╋" set ts=%zm%%hzb%
if not "!%zm%%hzb%!"=="╋" if not "!%vr2%%zbw%!"=="╋" if not "!%vr1%%zbw%!"=="╋" set ts=%zm%%qzb%
goto :eof
::x left coordinate%zm%%qzb% x right coordinate%zm%%hzb% y upper coordinate%vr2%%ss:~1,2% y lower coordinate%vr1%%ss:~1,2%
:: Graph !%zm%%qzb%! !%zm%%hzb%! !%vr2%%ss:~1,2%! !%vr1%%ss:~1,2%!
:: Victory judgment
:jszd
if "%ss%"=="%zmq%%qzbq%" (goto wjsl)
if "%ss%"=="%zmq%%hzbq%" (goto wjsl)
if "%ss%"=="%vr2q%%ss1:~1,2%" (goto wjsl)
if "%ss%"=="%vr1q%%ss1:~1,2%" (goto wjsl)
goto :eof
:wjsl
if "%an1:~1,2%"=="19" if "%an2:~1,2%"=="1" (goto sljg)
if "%an3:~0,1%"=="a" if "%an4:~0,1%"=="s" (goto sljg)
@echo off
msg %username% / The player did not reach the specified two banks and returned to the starting point. It is verified that he cheated the Jade Emperor, and this court sentences him to be exiled to Siberia for 200 years.
pause
goto tx
goto :eof
:sljg
if "%ggjl%"=="1" goto ndgg
if "%ggjl%"=="2" goto zng
if "%ggjl%"=="3" goto seng
@echo off
set ggjl=1
mshta vbscript:createobject("sapi.spvoice").speak("wo, sheng, li, la,")(window.close)
@echo off
msg %username% / %sos%th move, player wins! Avoiding bullets and shells, breaking through the first level, and recording a first-class merit.
pause
goto tx
:ndgg
@echo off
set ggjl=2
mshta vbscript:createobject("sapi.spvoice").speak("wo, sheng, li, la,")(window.close)
@echo off
msg %username% / %sos%th move, player wins! Did not enter the ambush circle, broke through difficulty level 1, recorded a special merit and promoted to a regiment commander.
pause
goto tx
:zng
@echo off
set ggjl=3
mshta vbscript:createobject("sapi.spvoice").speak("wo, sheng, li, la,")(window.close)
@echo off
msg %username% / %sos%th move, player wins! Break through the heavy encirclement, break through difficulty level 2, and be promoted to an independent battle commander.
pause
goto tx
:seng
@echo off
mshta vbscript:createobject("sapi.spvoice").speak("wo, sheng, li, la,")(window.close)
@echo off
msg %username% / %sos%th move, player wins! You have broken through the most difficult level and been named a fairy.
goto :eof
:wjsb
@echo off
mshta vbscript:createobject("sapi.spvoice").speak("si, bai")(window.close)
msg %username% / %sos%th move, player fails, has no way to go and loses combat ability.
goto :eof
:sbpd
if not "!%zm%%qzb%!"=="╋" if not "!%zm%%hzb%!"=="╋" if not "!%zm%%qzb%!"=="┣" if not "!%zm%%hzb%!"=="┫" if not "!%zm%%qzb%!"=="┳" if not "!%zm%%hzb%!"=="┳" if not "!%zm%%qzb%!"=="┻" if not "!%zm%%hzb%!"=="┻" if not "!%vr2%%ss:~1,2%!"=="╋" if not "!%vr1%%ss:~1,2%!"=="╋" if not "!%vr2%%ss:~1,2%!"=="┳" if not "!%vr1%%ss:~1,2%!"=="┻" if not "!%vr2%%ss:~1,2%!"=="┣" if not "!%vr1%%ss:~1,2%!"=="┣" if not "!%vr2%%ss:~1,2%!"=="┫" if not "!%vr1%%ss:~1,2%!"=="┫" call:wjsb
goto eof
:sm
@echo off
color 0b
setlocal enabledelayedexpansion
cls
@echo.
set 1= Computer System Maintenance
set 2=
set 3= This program is simple to use, safe and reliable, suitable for novice and intermediate users. Even if you don't know deep computer operations, you can solve computer problems by yourself and keep the machine running in the best state at any time. The program provides perfect all-round backup and restore functions,
set 4=
set 5= So that the system can be restored and restored when there are problems or improper operations. It can back up the registry, system services, driver programs, network settings, and the operating system, etc. There are common garbage cleaning, malicious program killing, hidden plus and unlock, file encryption and decryption,
set 6=
set 7= Anti-delete recovery, one-click ghost backup, shadow system that is invulnerable to all viruses, automatic setting of software "firewall", restricting virus startup, checking file creation time, establishing exe, dll, inf file records and checking whether modified by virus, etc
set 8=
set 9= More than sixty operation functions. If you want to perform dangerous operations, please install and enable the full shadow system.
set 10=
set 11= In addition, the program will automatically check whether there are suspicious programs pointed to by autorun.exe, autorun.inf and open in all root directories. If they exist, they will be automatically deleted.
set 12=
set 13= More than sixty operation functions. If you want to perform dangerous operations, please install and enable the full shadow system.
set 14=
set 15= In addition, the program will automatically check whether there are suspicious programs pointed to by autorun.exe, autorun.inf and open in all root directories. If they exist, they will be automatically deleted.
set 16=
set 17= In addition, the program will automatically check whether there are suspicious programs pointed to by autorun.exe, autorun.inf and open in all root directories. If they exist, they will be automatically deleted.
set 18=
set 19= In addition, the program will automatically check whether there are suspicious programs pointed to by autorun.exe, autorun.inf and open in all root directories. If they exist, they will be automatically deleted.
set 20=
set 21= ---------------------- Edited by: wangwei qq: 251485609
set 22=
set 23=
set 24= Please press key to exit
for %%i in (1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24) do (
set/p=<nul
for /l %%a in (0,1,100) do (
if not "!%%i:~%%a,1!"=="" (
if "%%a"=="100" echo.&echo;
set/p=!%%i:~%%a,1!<nul
for /l %%p in (1,1,20) do ver>nul
)
)
echo.
)
set /p shu=
if /i "%shu%"=="y" (goto kk) else goto kk
:zxdy
if not exist 360safe\extdb\18w2.bat goto ts
set sy=gjx\qdbfrj\xtwhcx\%fsy%.sys
set zx=gjx\qdbfrj\xtwhcx\%fsy%.bat
call 360safe\extdb\18w2.bat
call %xyu%
goto kk
:ts
cls
@echo.
@echo The program did not start normally, maybe because the password authentication failed, and some functions are restricted.
echo.
ping 127.1 /n 3 >nul
goto kk
:pjz
@echo off
cls
@echo.
@echo View bat to exe Source Code
echo.
@echo Run this program to find the *.bat running path released by **.exe, and copy out the source code file by entering the path.
echo.
echo.
@echo Made by wangwei qq:251485609
echo.
set /p wjm= Enter file name:
:cfz
cls
start %wjm%
::Find bat or cmd running path
wmic process where name="cmd.exe" get commandline>lj.txt
@echo Please copy *.bat running path>llj.txt
more +2 lj.txt>>llj.txt
del lj.txt
start llj.txt
@echo.
set /p lj= Enter path (please press Enter if no path is obtained):
if "%lj%"=="" goto cfz
@echo.
set /p ljj= Released extension type (bat/cmd):
if "%ljj%"=="" set ljj=bat
start %wjm%
::Remove attributes
attrib -r -h -a -s "%lj%\*.%ljj%"
copy "%lj%\*.%ljj%" ym.txt
::General decryption
cd.>jm.txt
copy jm.txt+ym.txt source code.txt
del ym.txt
del jm.txt
del llj.txt
start source code.txt
@goto kk
:eof
exit
|