Central Point Anti-Virus immunized file

From Just Solve the File Format Problem
(Difference between revisions)
Jump to: navigation, search
(Software)
 
Line 16: Line 16:
 
* [https://winworldpc.com/product/central-point-anti-virus/1x Central Point Anti-Virus 1.x], at WinWorld
 
* [https://winworldpc.com/product/central-point-anti-virus/1x Central Point Anti-Virus 1.x], at WinWorld
 
* [{{SACFTPURL|avmuseum|tnt814.zip}} Turbo Anti-Virus v8.14]
 
* [{{SACFTPURL|avmuseum|tnt814.zip}} Turbo Anti-Virus v8.14]
 +
* [https://bencastricum.nl/unp/ UNP] - An example of a DOS utility that can de-immunize files
  
 
== Sample files ==
 
== Sample files ==

Latest revision as of 14:03, 27 March 2025

File Format
Name Central Point Anti-Virus immunized file
Ontology
Released ≤1991

Some versions of Central Point Anti-Virus, and Turbo Anti-Virus by Carmel Software (from which Central Point Anti-Virus was derived), have an "immunize file" feature that can modify DOS EXE and COM executable files, to insert a tamper-detection feature. This article describes these modified files.

[edit] Identification

Immunized COM files are observed to start with 14 bytes having the following pattern: e9 ?? ?? 00 ?? ?? 22 19 35 93 59 57 54 80.

Immunized EXE files have a certain byte pattern starting at the entry point (refer to MS-DOS_EXE#Special file positions): e8 20 00, then 32 bytes copied from the original file, then 5b 81 eb 03 01 50 51 52 ....

All files contain text strings such as "Central Point Anti-Virus (c) 1991 CPS" or "CARMEL Software Engineering - Turbo Anti-Virus(tm)", and "Self Integrity Check warning", but they differ by version.

[edit] Software

[edit] Sample files

Personal tools
Namespaces

Variants
Actions
Navigation
Toolbox