CARVIEW |
Select Language
HTTP/2 200
date: Sat, 11 Oct 2025 20:08:02 GMT
content-type: text/html; charset=UTF-8
server: cloudflare
x-frame-options: DENY
x-content-type-options: nosniff
x-xss-protection: 1;mode=block
vary: accept-encoding
cf-cache-status: DYNAMIC
content-encoding: gzip
set-cookie: _csrf-frontend=926b07f9593e4992b891c7a90f76a57413dc5cb074060a648e8db4b15fca6168a%3A2%3A%7Bi%3A0%3Bs%3A14%3A%22_csrf-frontend%22%3Bi%3A1%3Bs%3A32%3A%22ou7As88dl03gBqFZUtCA-VrBCMTxfHAm%22%3B%7D; HttpOnly; Path=/
cf-ray: 98d0fcb54a5b1eef-BLR
::Here is the complete code. Sorry about that.:::::::::::::::::::::::::::::: - Pastebin.com
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ::Here is the complete code. Sorry about that.
- ::::::::::::::::::::::::::::::::::::::::::::
- :: Elevate.cmd - Version 4
- :: Automatically check & get admin rights
- :: see "https://stackoverflow.com/a/12264592/1016343" for description
- ::::::::::::::::::::::::::::::::::::::::::::
- @echo off
- CLS
- ECHO.
- ECHO =============================
- ECHO Running Admin shell
- ECHO =============================
- :init
- setlocal DisableDelayedExpansion
- set cmdInvoke=1
- set winSysFolder=System32
- set "batchPath=%~dpnx0"
- rem this works also from cmd shell, other than %~0
- for %%k in (%0) do set batchName=%%~nk
- set "vbsGetPrivileges=%temp%\OEgetPriv_%batchName%.vbs"
- setlocal EnableDelayedExpansion
- :checkPrivileges
- NET FILE 1>NUL 2>NUL
- if '%errorlevel%' == '0' ( goto gotPrivileges ) else ( goto getPrivileges )
- :getPrivileges
- if '%1'=='ELEV' (echo ELEV & shift /1 & goto gotPrivileges)
- ECHO.
- ECHO **************************************
- ECHO Invoking UAC for Privilege Escalation
- ECHO **************************************
- ECHO Set UAC = CreateObject^("Shell.Application"^) > "%vbsGetPrivileges%"
- ECHO args = "ELEV " >> "%vbsGetPrivileges%"
- ECHO For Each strArg in WScript.Arguments >> "%vbsGetPrivileges%"
- ECHO args = args ^& strArg ^& " " >> "%vbsGetPrivileges%"
- ECHO Next >> "%vbsGetPrivileges%"
- if '%cmdInvoke%'=='1' goto InvokeCmd
- ECHO UAC.ShellExecute "!batchPath!", args, "", "runas", 1 >> "%vbsGetPrivileges%"
- goto ExecElevation
- :InvokeCmd
- ECHO args = "/c """ + "!batchPath!" + """ " + args >> "%vbsGetPrivileges%"
- ECHO UAC.ShellExecute "%SystemRoot%\%winSysFolder%\cmd.exe", args, "", "runas", 1 >> "%vbsGetPrivileges%"
- :ExecElevation
- "%SystemRoot%\%winSysFolder%\WScript.exe" "%vbsGetPrivileges%" %*
- exit /B
- :gotPrivileges
- setlocal & cd /d %~dp0
- if '%1'=='ELEV' (del "%vbsGetPrivileges%" 1>nul 2>nul & shift /1)
- ::::::::::::::::::::::::::::
- ::START
- ::::::::::::::::::::::::::::
- @echo off
- REM Check if the script is running with administrative privileges
- net session >nul 2>&1
- if %errorLevel% == 0 (
- echo Running with administrative privileges...
- ) else (
- echo Please run this script as an administrator.
- pause
- exit
- )
- REM Kill processes
- taskkill /f /im explorer.exe
- taskkill /f /im TextInputHost.exe
- taskkill /f /im ShellExperienceHost.exe
- taskkill /f /im StartMenuExperienceHost.exe
- REM Pause for a few seconds
- timeout /t 5
- REM Start processes with error handling
- start explorer.exe
- if %errorLevel% neq 0 (
- echo Failed to start explorer.exe
- pause
- exit
- )
- REM Start TextInputHost.exe
- start "TextInputHost.exe" "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe"
- if %errorLevel% neq 0 (
- echo Failed to start TextInputHost.exe
- pause
- exit
- )
- REM Start StartMenuExperienceHost.exe
- start "StartMenuExperienceHost.exe" "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"
- if %errorLevel% neq 0 (
- echo Failed to start StartMenuExperienceHost.exe
- pause
- exit
- )
- echo All processes started successfully.
- pause
- exit
Advertisement
Add Comment
Please, Sign In to add comment
-
⭐✅ Exploit 2500$ in 15 Minutes⭐⭐⭐ 7
JavaScript | 4 sec ago | 0.25 KB
-
⭐⭐⭐Make $15OO in 2O minutesV G⭐⭐
Java | 4 sec ago | 0.10 KB
-
📌 Swapzone +37% glitch
JavaScript | 5 sec ago | 0.24 KB
-
Free Crypto Method (NEVER SEEN BEFORE)⭐⭐ 1
JavaScript | 13 sec ago | 0.25 KB
-
📝 Exchange profit method
JavaScript | 15 sec ago | 0.24 KB
-
⭐⭐⭐GMAIL Logs (2FA disabled)⭐⭐
Java | 16 sec ago | 0.10 KB
-
⭐✅ Swapzone Glitch ✅ Working ⭐⭐ E
JavaScript | 22 sec ago | 0.25 KB
-
⭐ Free Crypto Method ⭐
JavaScript | 24 sec ago | 0.24 KB
We use cookies for various purposes including analytics. By continuing to use Pastebin, you agree to our use of cookies as described in the Cookies Policy. OK, I Understand