98 lines
3.4 KiB
Plaintext
98 lines
3.4 KiB
Plaintext
ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿
|
||
³ VIRUS REPORT ³
|
||
³ Joker ³
|
||
ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ
|
||
|
||
Synonyms: Jocker
|
||
|
||
Date of Origin: December, 1989.
|
||
|
||
Place of Origin: Poland.
|
||
|
||
Host Machine: PC compatibles.
|
||
|
||
Host Files: Non resident. Infects EXE files.
|
||
|
||
OnScreen Symptoms: Infected programs display bogus error messages.
|
||
|
||
Nature of Damage: Damages program files.
|
||
|
||
Detected by: Scanv57+, Pro-Scan.
|
||
|
||
Removed by: CleanUp, Scan/D, or delete infected files.
|
||
|
||
The Joker was isolated in Poland in December, 1989. This virus is a
|
||
generic .EXE file infector, and is a poor replicator (ie. it does not
|
||
quickly infect other files).<Note: Note that reports are mixed on this
|
||
virus. Some claim that it is resident, and infects COM and COMMAND.COM,
|
||
but not EXE files.>
|
||
|
||
Infected programs will display bogus error messages and comments,
|
||
which cam be found in the infected files at the beginning of the viral
|
||
code. Some of the messages and comments include:
|
||
|
||
Incorrect DOS version
|
||
|
||
Invalid Volume ID Format failure
|
||
|
||
Please put a new disk into drive A:
|
||
|
||
End of input file
|
||
|
||
END OF WORKTIME. TURN SYSTEM OFF!
|
||
|
||
Divide Overflow
|
||
|
||
Water detect in Co-processor
|
||
|
||
I am hungry! Insert HAMBURGER into drive A:
|
||
|
||
NO SMOKING, PLEASE!
|
||
|
||
Thanks.
|
||
|
||
Don't beat me !!
|
||
|
||
Don't drink and drive.
|
||
|
||
Another cup of cofee ?
|
||
|
||
OH, YES!
|
||
|
||
Hard Disk head has been destroyed. Can you borrow me your one?
|
||
|
||
Missing light magenta ribbon in printer!
|
||
|
||
In case mistake, call GHOST BUSTERS
|
||
|
||
Insert tractor toilet paper into printer.
|
||
|
||
This virus may also alter .DBF files, adding messages to them.
|
||
|
||
|
||
ÉÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ»
|
||
º This document was adapted from the book "Computer Viruses", º
|
||
º which is copyright and distributed by the National Computer º
|
||
º Security Association. It contains information compiled from º
|
||
º many sources. To the best of our knowledge, all information º
|
||
º presented here is accurate. º
|
||
º º
|
||
º Please send any updates or corrections to the NCSA, Suite 309, º
|
||
º 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS º
|
||
º and upload the information: (202) 364-1304. Or call us voice at º
|
||
º (202) 364-8252. This version was produced May 22, 1990. º
|
||
º º
|
||
º The NCSA is a non-profit organization dedicated to improving º
|
||
º computer security. Membership in the association is just $45 per º
|
||
º year. Copies of the book "Computer Viruses", which provides º
|
||
º detailed information on over 145 viruses, can be obtained from º
|
||
º the NCSA. Member price: $44; non-member price: $55. º
|
||
º º
|
||
º The document is copyright (c) 1990 NCSA. º
|
||
º º
|
||
º This document may be distributed in any format, providing º
|
||
º this message is not removed or altered. º
|
||
ÈÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍͼ
|
||
|
||
Downloaded From P-80 International Information Systems 304-744-2253
|