FANDOM


Warrior is a memory resident infector of .EXE programs. 

Payloads

The first time a program infected with Warrior is executed, the virus will install itself memory resident at the top of available system memory, but below the 640K DOS boundary. The virus hooks interrupts 21 and 22. At this time, the Warrior virus will access the C: drive, infecting all .EXE programs located in the root directory. It will also infect one .EXE program in the current drive and directory. 

After Warrior is memory resident, it will infect .EXE programs when they are opened or executed. Infected programs will increase in size by 1,024 bytes with the viral code being located at the end of the infected file. The program's date and time in the DOS disk directory will not be altered. 

Programs infected with Warrior will contain the following text strings: 

"... and justice for all!" 
"Dream Over ...  And the alone warrior is warrior. 
 The powerfull WARRIOR!" 
"????????EXE"

It is unknown if Warrior does anything besides replicate. 

Removal

Delete the infected files.

Variants

Warrior 2

Warrior 2 is a non- resident version of the Warrior virus described above. It infects four .EXE files located in the C: drive current directory, and one .EXE file located in the current drive current directory, each time an infected program is executed. Like the original virus, it adds 1,024 bytes to infected files, with the virus being located at the end of the program. The file's date and time in the DOS disk directory listing will not be altered. The following text strings are visible within the viral code in all infected programs: 

"*.txt"            
"... and justice for all! (US constitution)" 
"Dream Over ..." 
"????????EXE"
Community content is available under CC-BY-SA unless otherwise noted.