loading

This is a tutorial on how to make a Batch Fake Virus/Hacking Code to scare your friends!

Step 1: Copy and Paste If You Are Too Lazy.

If you just want the code to scare your friends and do not want to learn how it works, you can go ahead and copy it here and paste it into a New Text Document. (make sure to save the code as .bat NOT .txt)

How to make a Batch File (for windows):

  • Go to your desktop.
  • Right click the empty space.
  • Click/Hover over New.
  • Click Text Document.
  • Copy/Type in coding.
  • Click File.
  • Click Save As.
  • Change the file from .txt to .bat (ex. New Text Document ===> New Text Document.bat)
  • Click Save.

The code is here (copy all of it as it is, there is no changing required, the password in the initial asking is fakehack, which i will teach you how to change):

@echo off
title SecurityGuard v1.03
color C
echo SecurityGuard v1.03 enabled!
echo This program has been...
ping -n 2 127.0.0.1>nul
echo.
echo     _####_
echo    #      #
echo   #        #
echo   #        #
echo   #        #
echo  ############ 
echo #   LOCKED   #
echo #     ##     #
echo #    ####    #
echo #    ####    #
echo #     ##     #
echo #     ##     #
echo ##############
echo.
ping -n 2 127.0.0.1>nul
echo Enter password to activate the program...
set/p "pass=>"
if NOT %pass%== fakehack goto :incorrect_pass
if %pass%== fakehack goto :correct_pass</p><p>:correct_pass</p><p>cls
echo Password hidden...
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
echo PASSWORD CORRECT
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
color 97
cls
title svr_hack_var_aggressive.exe
echo Initializing svr_hack_var_aggressive.exe
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
tree C:/Windows/System32
echo Initializing Complete! Are you ready to continue enable Proxy Servers?
@echo off
:choice
set /P c=Are you sure you want to continue[Y/N]?
if /I "%c%" EQU "Y" goto :somewhere
if /I "%c%" EQU "N" goto :somewhere_else
goto :choice</p><p>:somewhere</p><p>cls
echo Proxy Servers enabling...
ping -n 2 127.0.0.1>nul
echo Proxy Servers 27%% enabled...
ping -n 2 127.0.0.1>nul
echo Proxy Servers 56%% enabled...
ping -n 2 127.0.0.1>nul
echo Proxy Servers 89%% enabled...
ping -n 2 127.0.0.1>nul
echo Proxy Servers have been enabled. Are you ready to enable software rooting?
@echo off
:choice
set /P c=Are you sure you want to continue[Y/N]?
if /I "%c%" EQU "Y" goto :somewhere2
if /I "%c%" EQU "N" goto :somewhere_else2
goto :choice</p><p>:somewhere_else</p><p>echo svr_hack_var_aggressive.exe had been closed, exiting out of cmd...
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
exit</p><p>:somewhere2</p><p>echo Collecting files to root... (Warning, this process may take several minutes!)
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
@echo off
tree C:\
@echo off
:choice
set /P c=Are you sure you want to root all of the selected files?[Y/N]?
if /I "%c%" EQU "Y" goto :somewhere3
if /I "%c%" EQU "N" goto :somewhere_else3
goto :choice</p><p>:somewhere_else2</p><p>echo svr_hack_var_aggressive.exe had been closed, exiting out of cmd...
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
exit</p><p>:somewhere_else3</p><p>echo svr_hack_var_aggressive.exe had been closed, exiting out of cmd...
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
exit</p><p>:somewhere3</p><p>@echo off
cls
echo Rooting files... (Warning this process may take several minutes!)
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
echo File rooting has been completed.
goto :hardcore</p><p>:incorrect_pass</p><p>cls
echo Password hidden...
ping -n 2 127.0.0.1>nul
echo PASSWORD INCORRECT: svr_hack_var_aggressive.exe has been closed, exiting out of cmd...
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
exit</p><p>:hardcore</p><p>@echo off
cls
echo Transfering user to passive mode...
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
title Passive
color B
echo svr_hack_var_aggressive.exe has been enabled...
ping -n 2 127.0.0.1>nul
echo Checking if svr_hack_var_aggressive.exe is running correctly...
ping -n 2 127.0.0.1>nul 
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
cls
echo svr_hack_var_aggressive.exe has initialized 
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
echo svr_hack_var_aggressive.exe has enabled Proxy servers 
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
echo svr_hack_var_aggressive.exe has rooted files 
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
cls
echo Removing traces of svr_hack_var_aggressive.exe in files...
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
tree C:/Windows/ADFS
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
cls
echo svr_hack_var_aggressive.exe has been removed...
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
echo cmd will be replaced in 3...
ping -n 2 127.0.0.1>nul
echo 2...
ping -n 2 127.0.0.1>nul
echo 1...
ping -n 2 127.0.0.1>nul
cls
echo ...
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
ping -n 2 127.0.0.1>nul
cls
start cmd
exit</p>
<p>Interesting. Will this cause any longterm damage to one's computer? I'm completely unfamiliar with this sort of stuff.</p>
Here's the simple answer, no. This batch code will not harm your computer or others computers in any way. I did explain what all of the parts did in the second step if you want to know what each section does.
<p>Cool, thanks!</p>
<p>whats the password</p>
<br>Batch Fake Virus/Hack Code<br>This is a tutorial on how to make a Batch Fake Virus/Hacking Code to scare your friends!<br><br>STEP 1: COPY AND PASTE IF YOU ARE TOO LAZY.<br><br>Copy and paste if you are too lazy.<br>If you just want the code to scare your friends and do not want to learn how it works, you can go ahead and copy it here and paste it into a New Text Document. (make sure to save the code as .bat NOT .txt)<br><br>How to make a Batch File (for windows):<br><br>Go to your desktop.<br>Right click the empty space.<br>Click/Hover over New.<br>Click Text Document.<br>Copy/Type in coding.<br>Click File.<br>Click Save As.<br>Change the file from .txt to .bat (ex. New Text Document ===&gt; New Text Document.bat)<br>Click Save.<br>The code is here (copy all of it as it is, there is no changing required, the password in the initial asking is fakehack, which i will teach you how to change):<br><br>@echo off<br>title SecurityGuard v1.03<br>color C<br>echo SecurityGuard v1.03 enabled!<br>echo This program has been...<br>ping -n 2 127.0.0.1&gt;nul<br>echo.<br>echo _####_<br>echo # #<br>echo # #<br>echo # #<br>echo # #<br>echo ############ <br>echo # LOCKED #<br>echo # ## #<br>echo # #### #<br>echo # #### #<br>echo # ## #<br>echo # ## #<br>echo ##############<br>echo.<br>ping -n 2 127.0.0.1&gt;nul<br>echo Enter password to activate the program...<br>set/p &quot;pass=&gt;&quot;<br>if NOT %pass%== fakehack goto :incorrect_pass<br>if %pass%== fakehack goto :correct_pass<p>:correct_pass</p><p>cls<br>echo Password hidden...<br>ping -n 2 127.0.0.1&gt;nul<br>ping -n 2 127.0.0.1&gt;nul<br>echo PASSWORD CORRECT<br>ping -n 2 127.0.0.1&gt;nul<br>ping -n 2 127.0.0.1&gt;nul<br>color 97<br>cls<br>title svr_hack_var_aggressive.exe<br>echo Initializing svr_hack_var_aggressive.exe<br>ping -n 2 127.0.0.1&gt;nul<br>ping -n 2 127.0.0.1&gt;nul<br>ping -n 2 127.0.0.1&gt;nul<br>tree C:/Windows/System32<br>echo Initializing Complete! Are you ready to continue enable Proxy Servers?<br>@echo off<br>:choice<br>set /P c=Are you sure you want to continue[Y/N]?<br>if /I &quot;%c%&quot; EQU &quot;Y&quot; goto :somewhere<br>if /I &quot;%c%&quot; EQU &quot;N&quot; goto :somewhere_else<br>goto :choice</p><p>:somewhere</p><p>cls<br>echo Proxy Servers enabling...<br>ping -n 2 127.0.0.1&gt;nul<br>echo Proxy Servers 27%% enabled...<br>ping -n 2 127.0.0.1&gt;nul<br>echo Proxy Servers 56%% enabled...<br>ping -n 2 127.0.0.1&gt;nul<br>echo Proxy Servers 89%% enabled...<br>ping -n 2 127.0.0.1&gt;nul<br>echo Proxy Servers have been enabled. Are you ready to enable software rooting?<br>@echo off<br>:choice<br>set /P c=Are you sure you want to continue[Y/N]?<br>if /I &quot;%c%&quot; EQU &quot;Y&quot; goto :somewhere2<br>if /I &quot;%c%&quot; EQU &quot;N&quot; goto :somewhere_else2<br>goto :choice</p><p>:somewhere_else</p><p>echo svr_hack_var_aggressive.exe had been closed, exiting out of cmd...<br>ping -n 2 127.0.0.1&gt;nul<br>ping -n 2 127.0.0.1&gt;nul<br>exit</p><p>:somewhere2</p><p>echo Collecting files to root... (Warning, this process may take several minutes!)<br>ping -n 2 127.0.0.1&gt;nul<br>ping -n 2 127.0.0.1&gt;nul<br>ping -n 2 127.0.0.1&gt;nul<br>@echo off<br>tree C:\<br>@echo off<br>:choice<br>set /P c=Are you sure you want to root all of the selected files?[Y/N]?<br>if /I &quot;%c%&quot; EQU &quot;Y&quot; goto :somewhere3<br>if /I &quot;%c%&quot; EQU &quot;N&quot; goto :somewhere_else3<br>goto :choice</p><p>:somewhere_else2</p><p>echo svr_hack_var_aggressive.exe had been closed, exiting out of cmd...<br>ping -n 2 127.0.0.1&gt;nul<br>ping -n 2 127.0.0.1&gt;nul<br>exit</p><p>:somewhere_else3</p><p>echo svr_hack_var_aggressive.exe had been closed, exiting out of cmd...<br>ping -n 2 127.0.0.1&gt;nul<br>ping -n 2 127.0.0.1&gt;nul<br>exit</p><p>:somewhere3</p><p>@echo off<br>cls<br>echo Rooting files... (Warning this process may take several minutes!)<br>ping -n 2 127.0.0.1&gt;nul<br>ping -n 2 127.0.0.1&gt;nul<br>ping -n 2 127.0.0.1&gt;nul<br>ping -n 2 127.0.0.1&gt;nul<br>ping -n 2 127.0.0.1&gt;nul<br>ping -n 2 127.0.0.1&gt;nul<br>ping -n 2 127.0.0.1&gt;nul<br>ping -n 2 127.0.0.1&gt;nul<br>ping -n 2 127.0.0.1&gt;nul<br>ping -n 2 127.0.0.1&gt;nul<br>ping -n 2 127.0.0.1&gt;nul<br>ping -n 2 127.0.0.1&gt;nul<br>ping -n 2 127.0.0.1&gt;nul<br>ping -n 2 127.0.0.1&gt;nul<br>ping -n 2 127.0.0.1&gt;nul<br>ping -n 2 127.0.0.1&gt;nul<br>ping -n 2 127.0.0.1&gt;nul<br>ping -n 2 127.0.0.1&gt;nul<br>ping -n 2 127.0.0.1&gt;nul<br>ping -n 2 127.0.0.1&gt;nul<br>ping -n 2 127.0.0.1&gt;nul<br>ping -n 2 127.0.0.1&gt;nul<br>ping -n 2 127.0.0.1&gt;nul<br>ping -n 2 127.0.0.1&gt;nul<br>echo File rooting has been completed.<br>goto :hardcore</p><p>:incorrect_pass</p><p>cls<br>echo Password hidden...<br>ping -n 2 127.0.0.1&gt;nul<br>echo PASSWORD INCORRECT: svr_hack_var_aggressive.exe has been closed, exiting out of cmd...<br>ping -n 2 127.0.0.1&gt;nul<br>ping -n 2 127.0.0.1&gt;nul<br>ping -n 2 127.0.0.1&gt;nul<br>exit</p><p>:hardcore</p><p>@echo off<br>cls<br>echo Transfering user to passive mode...<br>ping -n 2 127.0.0.1&gt;nul<br>ping -n 2 127.0.0.1&gt;nul<br>ping -n 2 127.0.0.1&gt;nul<br>title Passive<br>color B<br>echo svr_hack_var_aggressive.exe has been enabled...<br>ping -n 2 127.0.0.1&gt;nul<br>echo Checking if svr_hack_var_aggressive.exe is running correctly...<br>ping -n 2 127.0.0.1&gt;nul <br>ping -n 2 127.0.0.1&gt;nul<br>ping -n 2 127.0.0.1&gt;nul<br>ping -n 2 127.0.0.1&gt;nul<br>ping -n 2 127.0.0.1&gt;nul<br>ping -n 2 127.0.0.1&gt;nul<br>cls<br>echo svr_hack_var_aggressive.exe has initialized <br>ping -n 2 127.0.0.1&gt;nul<br>ping -n 2 127.0.0.1&gt;nul<br>echo svr_hack_var_aggressive.exe has enabled Proxy servers <br>ping -n 2 127.0.0.1&gt;nul<br>ping -n 2 127.0.0.1&gt;nul<br>echo svr_hack_var_aggressive.exe has rooted files <br>ping -n 2 127.0.0.1&gt;nul<br>ping -n 2 127.0.0.1&gt;nul<br>cls<br>echo Removing traces of svr_hack_var_aggressive.exe in files...<br>ping -n 2 127.0.0.1&gt;nul<br>ping -n 2 127.0.0.1&gt;nul<br>ping -n 2 127.0.0.1&gt;nul<br>ping -n 2 127.0.0.1&gt;nul<br>tree C:/Windows/ADFS<br>ping -n 2 127.0.0.1&gt;nul<br>ping -n 2 127.0.0.1&gt;nul<br>cls<br>echo svr_hack_var_aggressive.exe has been removed...<br>ping -n 2 127.0.0.1&gt;nul<br>ping -n 2 127.0.0.1&gt;nul<br>ping -n 2 127.0.0.1&gt;nul<br>echo cmd will be replaced in 3...<br>ping -n 2 127.0.0.1&gt;nul<br>echo 2...<br>ping -n 2 127.0.0.1&gt;nul<br>echo 1...<br>ping -n 2 127.0.0.1&gt;nul<br>cls<br>echo ...<br>ping -n 2 127.0.0.1&gt;nul<br>ping -n 2 127.0.0.1&gt;nul<br>ping -n 2 127.0.0.1&gt;nul<br>cls<br>start cmd<br>exit</p>
<p>@echo off</p><p>title SecurityGuard v1.03</p><p>color C</p><p>echo SecurityGuard v1.03 enabled!</p><p>echo This program has been...</p><p>ping -n 2 127.0.0.1&gt;nul</p><p>echo.</p><p>echo _####_</p><p>echo # #</p><p>echo # #</p><p>echo # #</p><p>echo # #</p><p>echo ############ </p><p>echo # LOCKED #</p><p>echo # ## #</p><p>echo # #### #</p><p>echo # #### #</p><p>echo # ## #</p><p>echo # ## #</p><p>echo ##############</p><p>echo.</p><p>ping -n 2 127.0.0.1&gt;nul</p><p>ping -n 2 127.0.0.1&gt;nul</p><p>ping -n 2 127.0.0.1&gt;nul</p><p>echo PASSWORD CORRECT</p><p>ping -n 2 127.0.0.1&gt;nul</p><p>ping -n 2 127.0.0.1&gt;nul</p><p>color 97</p><p>cls</p><p>title svr_hack_var_aggressive.exe</p><p>echo Initializing svr_hack_var_aggressive.exe</p><p>ping -n 2 127.0.0.1&gt;nul</p><p>ping -n 2 127.0.0.1&gt;nul</p><p>ping -n 2 127.0.0.1&gt;nul</p><p>tree C:/Windows/System32</p><p>echo Initializing Complete! Are you ready to continue enable Proxy Servers?</p><p>@echo off</p><p>:choice</p><p>set /P c=Are you sure you want to continue[Y/N]?</p><p>if /I &quot;%c%&quot; EQU &quot;Y&quot; goto :somewhere</p><p>if /I &quot;%c%&quot; EQU &quot;N&quot; goto :somewhere_else</p><p>goto :choice&lt;/p&gt;&lt;p&gt;:somewhere&lt;/p&gt;&lt;p&gt;cls</p><p>echo Proxy Servers enabling...</p><p>ping -n 2 127.0.0.1&gt;nul</p><p>echo Proxy Servers 27%% enabled...</p><p>ping -n 2 127.0.0.1&gt;nul</p><p>echo Proxy Servers 56%% enabled...</p><p>ping -n 2 127.0.0.1&gt;nul</p><p>echo Proxy Servers 89%% enabled...</p><p>ping -n 2 127.0.0.1&gt;nul</p><p>echo Proxy Servers have been enabled. Are you ready to enable software rooting?</p><p>@echo off</p><p>:choice</p><p>set /P c=Are you sure you want to continue[Y/N]?</p><p>if /I &quot;%c%&quot; EQU &quot;Y&quot; goto :somewhere2</p><p>if /I &quot;%c%&quot; EQU &quot;N&quot; goto :somewhere_else2</p><p>goto :choice&lt;/p&gt;&lt;p&gt;:somewhere_else&lt;/p&gt;&lt;p&gt;echo svr_hack_var_aggressive.exe had been closed, exiting out of cmd...</p><p>ping -n 2 127.0.0.1&gt;nul</p><p>ping -n 2 127.0.0.1&gt;nul</p><p>exit&lt;/p&gt;&lt;p&gt;:somewhere2&lt;/p&gt;&lt;p&gt;echo Collecting files to root... (Warning, this process may take several minutes!)</p><p>ping -n 2 127.0.0.1&gt;nul</p><p>ping -n 2 127.0.0.1&gt;nul</p><p>ping -n 2 127.0.0.1&gt;nul</p><p>@echo off</p><p>tree C:\</p><p>@echo off</p><p>:choice</p><p>set /P c=Are you sure you want to root all of the selected files?[Y/N]?</p><p>if /I &quot;%c%&quot; EQU &quot;Y&quot; goto :somewhere3</p><p>if /I &quot;%c%&quot; EQU &quot;N&quot; goto :somewhere_else3</p><p>goto :choice&lt;/p&gt;&lt;p&gt;:somewhere_else2&lt;/p&gt;&lt;p&gt;echo svr_hack_var_aggressive.exe had been closed, exiting out of cmd...</p><p>ping -n 2 127.0.0.1&gt;nul</p><p>ping -n 2 127.0.0.1&gt;nul</p><p>exit&lt;/p&gt;&lt;p&gt;:somewhere_else3&lt;/p&gt;&lt;p&gt;echo svr_hack_var_aggressive.exe had been closed, exiting out of cmd...</p><p>ping -n 2 127.0.0.1&gt;nul</p><p>ping -n 2 127.0.0.1&gt;nul</p><p>exit&lt;/p&gt;&lt;p&gt;:somewhere3&lt;/p&gt;&lt;p&gt;@echo off</p><p>cls</p><p>echo Rooting files... (Warning this process may take several minutes!)</p><p>ping -n 2 127.0.0.1&gt;nul</p><p>ping -n 2 127.0.0.1&gt;nul</p><p>ping -n 2 127.0.0.1&gt;nul</p><p>ping -n 2 127.0.0.1&gt;nul</p><p>ping -n 2 127.0.0.1&gt;nul</p><p>ping -n 2 127.0.0.1&gt;nul</p><p>ping -n 2 127.0.0.1&gt;nul</p><p>ping -n 2 127.0.0.1&gt;nul</p><p>ping -n 2 127.0.0.1&gt;nul</p><p>ping -n 2 127.0.0.1&gt;nul</p><p>ping -n 2 127.0.0.1&gt;nul</p><p>ping -n 2 127.0.0.1&gt;nul</p><p>ping -n 2 127.0.0.1&gt;nul</p><p>ping -n 2 127.0.0.1&gt;nul</p><p>ping -n 2 127.0.0.1&gt;nul</p><p>ping -n 2 127.0.0.1&gt;nul</p><p>ping -n 2 127.0.0.1&gt;nul</p><p>ping -n 2 127.0.0.1&gt;nul</p><p>ping -n 2 127.0.0.1&gt;nul</p><p>ping -n 2 127.0.0.1&gt;nul</p><p>ping -n 2 127.0.0.1&gt;nul</p><p>ping -n 2 127.0.0.1&gt;nul</p><p>ping -n 2 127.0.0.1&gt;nul</p><p>ping -n 2 127.0.0.1&gt;nul</p><p>echo File rooting has been completed.</p><p>goto :hardcore&lt;/p&gt;&lt;p&gt;:incorrect_pass&lt;/p&gt;&lt;p&gt;cls</p><p>echo Password hidden...</p><p>ping -n 2 127.0.0.1&gt;nul</p><p>echo PASSWORD INCORRECT: svr_hack_var_aggressive.exe has been closed, exiting out of cmd...</p><p>ping -n 2 127.0.0.1&gt;nul</p><p>ping -n 2 127.0.0.1&gt;nul</p><p>ping -n 2 127.0.0.1&gt;nul</p><p>exit&lt;/p&gt;&lt;p&gt;:hardcore&lt;/p&gt;&lt;p&gt;@echo off</p><p>cls</p><p>echo Transfering user to passive mode...</p><p>ping -n 2 127.0.0.1&gt;nul</p><p>ping -n 2 127.0.0.1&gt;nul</p><p>ping -n 2 127.0.0.1&gt;nul</p><p>title Passive</p><p>color B</p><p>echo svr_hack_var_aggressive.exe has been enabled...</p><p>ping -n 2 127.0.0.1&gt;nul</p><p>echo Checking if svr_hack_var_aggressive.exe is running correctly...</p><p>ping -n 2 127.0.0.1&gt;nul </p><p>ping -n 2 127.0.0.1&gt;nul</p><p>ping -n 2 127.0.0.1&gt;nul</p><p>ping -n 2 127.0.0.1&gt;nul</p><p>ping -n 2 127.0.0.1&gt;nul</p><p>ping -n 2 127.0.0.1&gt;nul</p><p>cls</p><p>echo svr_hack_var_aggressive.exe has initialized </p><p>ping -n 2 127.0.0.1&gt;nul</p><p>ping -n 2 127.0.0.1&gt;nul</p><p>echo svr_hack_var_aggressive.exe has enabled Proxy servers </p><p>ping -n 2 127.0.0.1&gt;nul</p><p>ping -n 2 127.0.0.1&gt;nul</p><p>echo svr_hack_var_aggressive.exe has rooted files </p><p>ping -n 2 127.0.0.1&gt;nul</p><p>ping -n 2 127.0.0.1&gt;nul</p><p>cls</p><p>echo Removing traces of svr_hack_var_aggressive.exe in files...</p><p>ping -n 2 127.0.0.1&gt;nul</p><p>ping -n 2 127.0.0.1&gt;nul</p><p>ping -n 2 127.0.0.1&gt;nul</p><p>ping -n 2 127.0.0.1&gt;nul</p><p>tree C:/Windows/ADFS</p><p>ping -n 2 127.0.0.1&gt;nul</p><p>ping -n 2 127.0.0.1&gt;nul</p><p>cls</p><p>echo svr_hack_var_aggressive.exe has been removed...</p><p>ping -n 2 127.0.0.1&gt;nul</p><p>ping -n 2 127.0.0.1&gt;nul</p><p>ping -n 2 127.0.0.1&gt;nul</p><p>echo cmd will be replaced in 3...</p><p>ping -n 2 127.0.0.1&gt;nul</p><p>echo 2...</p><p>ping -n 2 127.0.0.1&gt;nul</p><p>echo 1...</p><p>ping -n 2 127.0.0.1&gt;nul</p><p>cls</p><p>echo ...</p><p>ping -n 2 127.0.0.1&gt;nul</p><p>ping -n 2 127.0.0.1&gt;nul</p><p>ping -n 2 127.0.0.1&gt;nul</p><p>cls</p><p>start cmd</p><p>exit&lt;/p&gt;</p><p>This is without the password, working on it to fix pw!</p>
<p>help me what is the password</p>
<p>when i enter the password it closes automatically, why is this?</p>
<p>You must have typed in the password incorrectly, make sure the password that you type in is &quot;falsehack&quot; with no quotes (unless you have changed the password). Also the password in caps sensitive so you have to type it exactly how it is.</p>
<p>this password didn't work for me</p>
<p>check out the screenshot and help me please</p>
<p>Please can you make me a password software in this style,</p><p>Thx</p><p>Email me@ lllenderdudelll@gmail.com</p>