textfiles/virus/NCSA/ncsa133.txt

64 lines
2.9 KiB
Plaintext
Raw Normal View History

2021-04-15 13:31:59 -05:00
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
<20> VIRUS REPORT <20>
<20> V2000 <20>
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
Synonyms: Dark Avenger III, Stealth virus, Travel virus
Date of Origin: February, 1990.
Place of Origin: Sophia, Bulgaria
Host Machine: PC compatibles.
Host Files: Remains resident. Infects COM (including COMMAND.COM), EXE,
and overlay files.
Increase in Size of Infected Files: 2000 bytes.
Nature of Damage: Affects system run-time operation. Corrupts program
and overlay files. Corrupts file linkage.
Detected by: Scanv59+
Removed by: Scan/D
Scan Code: "Zopy me - I want to travel". Also contains "(c) 1989 by
Vesselin Bontchev".
V2000 may look for and delete any programs written by the Bulgarian
Vesselin Bontchev, and contains a copyright notice for him, suggesting
the virus was written neither by him nor by one of his admirers.
V2000 can make a mess of things. If V2000 is present in memory, a DIR
command won't show that files have grown in size. CHKDSK/F may produce
crosslinked files. System crashes can occur, and some systems won't
boot, due to the modification of COMMAND.COM or the hidden system files.
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
<EFBFBD> which is copyright and distributed by the National Computer <20>
<EFBFBD> Security Association. It contains information compiled from <20>
<EFBFBD> many sources. To the best of our knowledge, all information <20>
<EFBFBD> presented here is accurate. <20>
<EFBFBD> <20>
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
<EFBFBD> <20>
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
<EFBFBD> computer security. Membership in the association is just $45 per <20>
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
<EFBFBD> <20>
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
<EFBFBD> <20>
<EFBFBD> This document may be distributed in any format, providing <20>
<EFBFBD> this message is not removed or altered. <20>
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ

Downloaded From P-80 International Information Systems 304-744-2253