About
Community
Bad Ideas
Drugs
Ego
Erotica
Fringe
Society
Technology
Viruses
Virus Information
Virus Zines - 40HEX, Crypt, etc.
register | bbs | search | rss | faq | about
meet up | add to del.icio.us | digg it

A good list of virii


NOTICE: TO ALL CONCERNED Certain text files and messages contained on this site deal with activities and devices which would be in violation of various Federal, State, and local laws if actually carried out or constructed. The webmasters of this site do not advocate the breaking of any law. Our text files and message bases are for informational purposes only. We recommend that you contact your local law enforcement officials before undertaking any project based upon any information obtained from this or any other web site. We do not guarantee that any of the information contained on this system is correct, workable, or factual. We are not responsible for, nor do we assume any liability for, damages resulting from the use of any information on this site.
VIRUS CHARACTERISTICS LIST V60
Copyright 1989, McAfee Associates
408 988 3832

The following list outlines the critical characteristics of the known
IBM PC and compatible viruses.

==========================================================================

Infects Fixed Disk Partition Table-------------------+
Infects Fixed Disk Boot Sector---------------------+ |
Infects Floppy Diskette Boot --------------------+ | |
Infects Overlay Files--------------------------+ | | |
Infects EXE Files----------------------------+ | | | |
Infects COM files--------------------------+ | | | | |
Infects COMMAND.COM----------------------+ | | | | | |
Virus Remains Resident-----------------+ | | | | | | |
Virus Uses Self-Encryption-----------+ | | | | | | | |
| | | | | | | | |
| | | | | | | | | Increase in
| | | | | | | | | Infected
| | | | | | | | | Program's
| | | | | | | | | Size
| | | | | | | | | |
| | | | | | | | | |
Virus Disinfector V V V V V V V V V V Damage
-----------------------------------------------------------------------------
Korea M-DISK . . . . . . x x . N/A B,O
Vcomm CleanUp . . . . x . . . . 1074 O,P,L
ItaVir CleanUp . . . . x . . . . 3880 O,P,L,B
Solano CleanUp . x . x . . . . . 2000 O,P,L
V2000 CleanUp . x x x x x . . . 2000 O,P,L
1554 SCAN/D . x x x x . . . . 1554 O,P,L
512 SCAN/D . x x x . . . . . none O,P,L
EDV M-DISK . x . . . . x x x N/A B,O
Joker CleanUp . x x x . . . . . O,P
Icelandic-3 CleanUp . x . . x . . . . 853 O,P
Virus-101 CleanUp x x x x x x x . . 2560 P
1260 CleanUp x . . x . . . . . 1260 P
Perfume CleanUp . . . x . . . . . 765 P
Taiwan CleanUp . . . x . . . . . 708 P
Chaos MDISK . x . . . . x x . N/A B,O,D,F
Virus-90 CleanUp . x . x . . . . . 857 P
Oropax CleanUp . x . x . . . . . 2773 P,O
4096 CleanUp . x x x x x . . . 4096 D,O,P,L
Devil's Dance CleanUp . x . x . . . . . 941 D,O,P,L
Amstrad CleanUp . . . x . . . . . 847 P
Payday CleanUp . x . x x x . . . 1808 P
Datacrime II-B CleanUp x . x x x . . . . 1917 P,F
Sylvia/Holland CleanUp . . . x . . . . . 1332 p
Do-Nothing CleanUp . x . x . . . . . 608 p
Sunday CleanUp . x . x x x . . . 1636 O,P
Lisbon CleanUp . . . x . . . . . 648 P
Typo/Fumble CleanUp . x . x . . . . . 867 O,P
Dbase CleanUp . x . x . . . . . 1864 D,O,P
Ghost Boot Version MDISK . x . . . . x x . N/A B,O
Ghost COM Version CleanUp . . . x . . . . . 2351 B,P
New Jerusalem CleanUp . x . x x x . . . 1808 O,P
Alabama CleanUp . x . . x . . . . 1560 O,P,L
Yankee Doodle CleanUp . x . x x . . . . 2885 O,P
2930 CleanUp . x . x x . . . . 2930 P
Ashar CleanUp . x . . . . x . . N/A B
AIDS CleanUp . . . x . . . . . Overwrites Program
Disk Killer CleanUp . x . . . . x x . N/A B,O,P,D,F
1536/Zero Bug CleanUp . x . x . . . . . 1536 O,P
MIX1 CleanUp . x . . x . . . . 1618 O,P
Dark Avenger CleanUp . x x x x x . . . 1800 O,P,L
3551/Syslock CleanUp x . . x x . . . . 3551 P,D
VACSINA CleanUp . x . x x x . . . 1206 O,P
Ohio MDISK . x . . . . x . . N/A B
Typo (Boot Virus) MDISK . x . . . . x x . N/A O,B
Swap/Israeli Boot MDISK . x . . . . x . . N/A B
1514/Datacrime II CleanUp x . . x x . . . . 1514 P,F
Icelandic II CleanUp . x . . x . . . . 661 O,P
Pentagon MDISK . . . . . . x . . N/A B
3066/Traceback M-3066 . x . x x . . . . 3066 P
1168/Datacrime-B CleanUp x . . x . . . . . 1168 P,F
Icelandic CleanUp . x . . x . . . . 642 O,P
Saratoga CleanUp . x . . x . . . . 632 O,P
405 CleanUp . . . x . . . . . Overwrites Program
1704 Format CleanUp x x . x . . . . . 1704 O,P,F
Fu Manchu CleanUp . x . x x x . . . 2086 O,P
1280/Datacrime CleanUp x . . x . . . . . 1280 P,F
1701/Cascade CleanUp x x . x . . . . . 1701 O,P
1704/CASCADE-B CleanUp x x . x . . . . . 1704 O,P
Stoned/Marijuana CleanUp . x . . . . x . x N/A O,B,L
1704/CASCADE CleanUp x x . x . . . . . 1704 O,P
Ping Pong-B CleanUp . x . . . . x x . N/A O,B
Den Zuk MDISK . x . . . . x . . N/A O,B
Ping Pong CleanUp . x . . . . x . . N/A O,B
Vienna-B CleanUp . . . x . . . . . 648 P
Lehigh CleanUp . x x . . . . . . Overwrites P,F
Vienna/648 M-VIENNA . . . x . . . . . 648 P
Jerusalem-B CleanUp . x . x x x . . . 1808 O,P
Yale/Alameda CleanUp . x . . . . x . . N/A B
Friday 13th COM CleanUp . . . x . . . . . 512 P
Jerusalem CleanUp . x . x x x . . . 1808 O,P
SURIV03 CleanUp . x . x x x . . . O,P
SURIV02 CleanUp . x . . x . . . . 1488 O,P
SURIV01 CleanUp . x . x . . . . . 897 O,P
Pakistani Brain CleanUp . x . . . . x . . N/A B

Legend:

Damage Fields - B - Corrupts or overwrites Boot Sector
O - Affects system run-time operation
P - Corrupts program or overlay files
D - Corrupts data files
F - Formats or erases all/part of disk
L - Directly or indirectly corrupts file linkage

Size Increase - The length, in bytes, by which an infected
program or overlay file will increase

Characteristics - x - Yes
. - No

Disinfectors - SCAN/D - VIRUSCAN with /D option
SCAN/D/A - VIRUSCAN with /D and /A options
MDISK/P - MDISK with "P" option
All Others - The name of disinfecting program
Note:
The SCAN /D option will overwrite and then delete the
entire infected program. The program must then be
replaced from the original program diskette. If you wish
to try and recover an infected program, then use the
named disinfector if available.


 
To the best of our knowledge, the text on this page may be freely reproduced and distributed.
If you have any questions about this, please check out our Copyright Policy.

 

totse.com certificate signatures
 
 
About | Advertise | Bad Ideas | Community | Contact Us | Copyright Policy | Drugs | Ego | Erotica
FAQ | Fringe | Link to totse.com | Search | Society | Submissions | Technology
Hot Topics
Php
Withstanding an EMP
Good computer destroyer?
Wow, I never thought the navy would be so obvious.
Alternatives Internets to HTTP
Anti-Virus
a way to monitor someones AIM conversation
VERY simple question: browser history
 
Sponsored Links
 
Ads presented by the
AdBrite Ad Network

 

TSHIRT HELL T-SHIRTS