textfiles/virus/NCSA/ncsa083.txt

98 lines
3.4 KiB
Plaintext
Raw Normal View History

2021-04-15 13:31:59 -05:00
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
<20> VIRUS REPORT <20>
<20> Joker <20>
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
Synonyms: Jocker
Date of Origin: December, 1989.
Place of Origin: Poland.
Host Machine: PC compatibles.
Host Files: Non resident. Infects EXE files.
OnScreen Symptoms: Infected programs display bogus error messages.
Nature of Damage: Damages program files.
Detected by: Scanv57+, Pro-Scan.
Removed by: CleanUp, Scan/D, or delete infected files.
The Joker was isolated in Poland in December, 1989. This virus is a
generic .EXE file infector, and is a poor replicator (ie. it does not
quickly infect other files).<Note: Note that reports are mixed on this
virus. Some claim that it is resident, and infects COM and COMMAND.COM,
but not EXE files.>
Infected programs will display bogus error messages and comments,
which cam be found in the infected files at the beginning of the viral
code. Some of the messages and comments include:
Incorrect DOS version
Invalid Volume ID Format failure
Please put a new disk into drive A:
End of input file
END OF WORKTIME. TURN SYSTEM OFF!
Divide Overflow
Water detect in Co-processor
I am hungry! Insert HAMBURGER into drive A:
NO SMOKING, PLEASE!
Thanks.
Don't beat me !!
Don't drink and drive.
Another cup of cofee ?
OH, YES!
Hard Disk head has been destroyed. Can you borrow me your one?
Missing light magenta ribbon in printer!
In case mistake, call GHOST BUSTERS
Insert tractor toilet paper into printer.
This virus may also alter .DBF files, adding messages to them.
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
<EFBFBD> which is copyright and distributed by the National Computer <20>
<EFBFBD> Security Association. It contains information compiled from <20>
<EFBFBD> many sources. To the best of our knowledge, all information <20>
<EFBFBD> presented here is accurate. <20>
<EFBFBD> <20>
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
<EFBFBD> <20>
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
<EFBFBD> computer security. Membership in the association is just $45 per <20>
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
<EFBFBD> <20>
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
<EFBFBD> <20>
<EFBFBD> This document may be distributed in any format, providing <20>
<EFBFBD> this message is not removed or altered. <20>
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ

Downloaded From P-80 International Information Systems 304-744-2253