70 lines
3.5 KiB
Plaintext
70 lines
3.5 KiB
Plaintext
![]() |
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
|||
|
<20> VIRUS REPORT <20>
|
|||
|
<20> LodeRunner <20>
|
|||
|
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
|||
|
|
|||
|
Synonyms: Load Runner, Apple II GS Virus
|
|||
|
|
|||
|
Date of Origin: July, 1989.
|
|||
|
|
|||
|
Place of Origin: France.
|
|||
|
|
|||
|
Host Machine: Apple II GS.
|
|||
|
|
|||
|
Host Files: Boot block virus
|
|||
|
|
|||
|
Increase in Size of Infected Files: n/a
|
|||
|
|
|||
|
Nature of Damage: Erases boot blocks of disk in slot 5, drive 1. No
|
|||
|
files are damaged.
|
|||
|
|
|||
|
The damage done by this virus is minimal --it destroys only the boot
|
|||
|
blocks of a 3.5" disk (5.25" disks and hard disks seem to be immune),
|
|||
|
leaving all the files and directories intact (it can, however, render
|
|||
|
some copy-protected games unusable). LOAD RUNNER has a finite life-span
|
|||
|
built in -- at the same time it starts damaging, it also stops
|
|||
|
propagating, and being a boot block virus, it destroys copies of itself
|
|||
|
when it destroys the boot blocks.
|
|||
|
|
|||
|
Virus copies itself to $E1/BC00 thru $E1/BFFF. Virus resides in the
|
|||
|
boot blocks of a 3.5" disk. Copies itself to $E1/BC00 when disk is
|
|||
|
booted. Copies itself to disk in slot 5, drive 1 when
|
|||
|
CONTROL-APPLE-RESET is pressed. Propagation routine gains control by
|
|||
|
patching undocumented system vector in Memory Manager. Original boot
|
|||
|
blocks are not saved --virus contains code to emulate standard boot
|
|||
|
process. Infects disks in slot 5, drive 1 only. Infection of disks
|
|||
|
occurs when CONTROL-APPLE-RESET is pressed. Infection of host machine
|
|||
|
occurs when an infected disk is booted.
|
|||
|
|
|||
|
Triggered by any date between Oct. 1 and Dec. 31 inclusive, of any
|
|||
|
year. Damage occurs when an infected disk is booted. If damage occurs,
|
|||
|
further infection will not occur. (Note that the damage process wipes
|
|||
|
the virus off of the infected disk.)
|
|||
|
|
|||
|
|
|||
|
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
|||
|
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
|||
|
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
|||
|
<EFBFBD> Security Association. It contains information compiled from <20>
|
|||
|
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
|||
|
<EFBFBD> presented here is accurate. <20>
|
|||
|
<EFBFBD> <20>
|
|||
|
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
|||
|
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
|||
|
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
|||
|
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
|||
|
<EFBFBD> <20>
|
|||
|
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
|||
|
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
|||
|
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
|||
|
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
|||
|
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
|||
|
<EFBFBD> <20>
|
|||
|
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
|||
|
<EFBFBD> <20>
|
|||
|
<EFBFBD> This document may be distributed in any format, providing <20>
|
|||
|
<EFBFBD> this message is not removed or altered. <20>
|
|||
|
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
|||
|
|
|||
|
Downloaded From P-80 International Information Systems 304-744-2253
|