VIRUS INFORMATION SUMMARY LIST 1990

 

                         VIRUS INFORMATION SUMMARY LIST
                               February 03, 1990

                       Copyright (C) 1990 by Merry Hughes

     The information in this file is a compilation of information that
 I have collected on Ms-Dos Computer Viruses over the past 16 months.
 With the number of known viruses increasing, it has become more and
 more difficult for one to keep all the information in one's head.
 Hopefully this listing will provide some assistance to those who wish
 to know more about a particular computer virus....it is not
 intended to provide a very detailed technical description, but to
 allow the reader to understand what a virus generally does, how it
 activates, what it is doing to their system, and most importantly,
 how to get rid of it.

     The user of this listing needs to keep in mind that the
 information provided is up-to-date only to the date of the listing
 itself.  If the listing is one month old, some items may not be
 accurate.  Also, with the wide dispersion of researchers and the
 various names that the same virus may be known by, some of the
 information may not be entirely accurate.  Lastly, as new variants
 of known viruses are isolated, some of the characteristics of the
 variant may be different...

     There are four sections to the listing.  The first section is
 an introduction which explains the format of the information in
 the listing and includes the code information used in some fields.
 The second section is the actual virus information summary listing.
 The third section is a cross-reference of common names for Ms-Dos
 computer viruses and indicates what name to use for the virus in the
 second section.  Lastly, there is a fourth section which is a
 revision history of the listing.

     Special thanks go to John McAfee for reviewing the listing before
 it was distributed, as well as to Jim Goodwin for producing his
 original ALLVIRUS.LST last April which inspired this updated listing.

     The Virus Information Summary List may be freely distributed by
 non-commercial systems and non-profit organizations, as long as the
 distribution file is not altered, and no more than a reasonable
 cost-of-duplication fee is charged.  Any other usage of the listing
 requires the approval and authorization of the copyright holder.

     If you find an error or omission in the listing, please feel
 free to contact me via Excalibur! BBS in Sunnyvale, CA at
 1-408-244-0813 (1200/2400/9600 HST), which is FidoNet 1:204/869.
 I can also be reached on Homebase/CVIA BBS at 1-408-988-4004 in
 Santa Clara, CA as Merry Hughes.

                                           Merry Hughes


------------------------------------------------------------------------
                          Introduction & Entry Format

     Each of the entries in the list consists of several fields.
 Below is a brief description of what is indicated in each of the
 fields.  For fields where codes may appear, the meaning of each
 code in indicated.

 Virus Name: Field contains one of the more common names for the
             virus.  The listing is alphabetized based on this
             field.
 Aliases:    Other names that the same virus may be referred to by.
             These names are aliases or A.K.A.'s.
 Effective Length: The length of the viral code after it has infected
             a program or system component.  For boot-sector infectors,
             the length is indicated as N/A, for not applicable.
 Type Code(s):  The type codes indicated for a virus indicate general
             behavior characteristics.  Following the type code(s) is
             a brief text description.  The type codes used are:
             A = Infects all program files (COM & EXE)
             B = Boot virus
             C = Infects COM files only
             D = Infects DOS boot sector on hard disk
             E = Infects EXE files only
             F = Floppy (360K) only
             K = Infects COMMAND.COM
             M = Infects Master boot sector on hard disk
             N = Non-resident (in memory)
             O = Overwriting
             P = Parasitic virus
             R = Resident (in memory)
             T = Manipulation of the File Allocation Table (FAT)
             X = Manipulation/Infection of the Partition Table
 Detection Method:
             This entry indicates how to determine if a program or
             system has been infected by the virus.  Where the virus
             can be detected with a shareware, public domain, or
             readily available commercial program, it is indicated.
             Programs referenced in the listing are:
             F-PROT    - Fridrik Skulason's F-Prot detector/disinfector
             IBM Scan - IBM's Virus Scanning Program <commercial>
             ViruScan - McAfee Associates' ViruScan program
 Removal Instructions:
             Brief instructions on how to remove the virus.  Where
             a shareware, public domain, or readily available
             commercial program is available which will remove the
             virus, it is indicated.  Programs referenced in the
             listing are:
             AntiCrim  - Jan Terpstra's AntiCrime program
             CleanUp  -  John McAfee's CleanUp universal virus
                         disinfector. <commercial product>
                         Note: CleanUp is only indicated for a virus
                         if it will disinfect the file, rather than
                         delete the infected file.
             DOS COPY  - Use the DOS COPY command to copy files from
                         infected non-bootable disks to newly formatted,
                         uninfected disks.  Note: do NOT use the
                         DOS DISKCOPY command on boot sector infected
                         disks, or the new disk will also be infected!
             DOS SYS   - Use the DOS SYS command to overwrite the boot
                         sector on infected hard disks or diskettes.
                         Be sure you power down the system first, and
                         boot from a write protected master diskette,
                         or the SYS command will copy the infected
                         boot sector.
             F-PROT    - Fridrik Skulason's F-Prot detector/disinfector
             M-1704    - Cascade/Cascade-B disinfector.
             M-1704C   - Cascade-C disinfector.
             M-3066    - Traceback virus disinfector.
             M-DAV     - use Dark Avenger Disinfector M-DAV and follow
                         instructions carefully, this virus is
                         extremely prolific.
             M-JRUSLM  - Jerusalem B disinfector.
             M-VIENNA  - Vienna, Vienna B Virus disinfector.
             MDisk     - MD Boot Virus Disinfector.  Be sure to use the
                         program which corresponds to your DOS release.
             Saturday  - European generic Jerusalem virus disinfector.
             Scan/D    - ViruScan run with the /D option.
             Scan/D/A  - ViruScan run with the /D /A options.
             UnVirus   - Yuval Rakavy's disinfector for Brain, Jerusalem,
                         Ping Pong, Ping Pong-B, Typo Boot, Suriv 1.01,
                         Suriv 2.01, and Suriv 3.00 viruses.
             Virus Buster - Yuval Tal's Virus Buster Detector/Disinfector
 General Comments:
             This field includes other information about the virus,
             including but not limited to: historical information,
             possible origin, possible damage the virus may cause,
             and activation criteria.


------------------------------------------------------------------------

 Virus Name:  AIDS
 Aliases:     Hahaha, Taunt, VGA2CGA
 Effective Length: N/A
 Type Code(s):  ONC - Overwriting Non-Resident .COM Infector
 Detection Method:  ViruScan V40+
 Removal Instructions:  Scan/D, or delete infected .COM files
 General Comments:
       The AIDS virus, also known as the Hahaha virus in Europe and
       referred to as the Taunt virus by IBM, is a generic .COM and
       .EXE file infector.  When the virus activates, it displays the
       message "Your computer now has AIDS", with AIDS covering
       about half of the screen.  The system is then halted, and
       must be powered down and rebooted to restart it.  Since this
       virus overwrites the first 13K of the executable program, the
       files must be deleted and replaced with clean copies in order
       to remove the virus.  It is not possible to recover the
       overwritten portion of the program.

       Note: this is NOT the Aids Info Disk/PC Cyborg Trojan.


 Virus Name:  Alabama
 Aliases:
 Effective Length:  1,560 bytes
 Type Code(s):  PRET - Parasitic Resident .EXE infector
 Detection Method:  ViruScan V43+, F-Prot
 Removal Instructions:  CleanUp, F-Prot, or delete infected files
 General Comments:
       The Alabama virus was first isolated at Hebrew University in
       Israel by Ysrael Radai in October, 1989.  Its first known
       activation was on October 13, 1989.  The Alabama virus will
       infect .EXE files, increasing their size by 1,560 bytes.  It
       installs itself memory resident when the first program infected
       with the virus is executed, however it doesn't use the normal
       TSR function.  Instead, this virus hooks Int 9 as well as
       IN and OUT commands.  When a CTL-ALT-DEL combination is
       detected, the virus causes an apparent boot but remains in RAM.
       The virus loads itself 30K under the highest memory location
       reported by DOS, and does not lower the amount of memory
       reported by BIOS or DOS.

       After the virus has been memory resident for one hour, the
       following message will appear in a flashing box:

       "SOFTWARE COPIES PROHIBITED BY INTERNATIONAL LAW..............
        Box 1055 Tuscambia ALABAMA USA."

       The Alabama virus uses a complex mechanism to determine whether
       or not to infect the current file.  First, it checks to see if
       there is an uninfected file in the current directory, if there
       is one it infects it.  Only if there are no uninfected files
       in the current directory is the program being executed
       infected.  However, sometimes instead of infecting the
       uninfected candidate file, it will instead manipulate the FATs
       to exchange the uninfected candidate file with the currently
       executed file without renaming it, so the user ends up thinking
       he is executing one file when in effect he is actually
       executing another one.  The end result is that files are
       slowly lost on infected systems.  This file swapping occurs
       when the virus activates on ANY Friday.


 Virus Name:  Alameda
 Aliases:     Merritt, Peking, Seoul, Yale
 Effective Length: N/A
 Type Code(s):  BRF - Resident Floppy Boot Sector Infector
 Detection Method:  ViruScan, F-Prot, IBM Scan
 Removal Instructions:  MDisk, CleanUp, F-Prot, or DOS SYS
 General Comments:
       The Alameda virus was first discovered at Merritt college in
       Alameda, California in 1987.  The original version of this virus
       caused no intentional damage, though there is now at least 1
       variant of this virus that now causes floppy disks to become
       unbootable after a counter has reached its limit (Alameda-C
       virus).

       The Alameda virus, and its variants, all replicate when the
       system is booted with a CTL-ATL-DEL and infect only 5 1/4"
       360K diskettes.  These viruses do stay in memory thru a warm
       reboot, and will infect both system and non-system disks.
       System memory can be infected on a warm boot even if Basic is
       loaded instead of DOS.

       The virus saves the real boot sector at track 39, sector 8,
       head 0.  The original version of the Alameda virus would only
       run on a 8086/8088 machine, though later versions can now run
       on 80286 systems.


 Virus Name:  Amstrad
 Aliases:
 Effective Length:  847 Bytes
 Type Code(s):  PNC - Parasitic Non-Resident .COM Infector
 Detection Method:  ViruScan V51+, F-Prot
 Removal Instructions:  Scan/D, F-Prot, or erase infected files
 General Comments:
       The Amstrad virus was first reported in November, 1989, by
       Jean Luz of Portugal, however it has been known of in Spain
       and Portugal for a year prior to that.  The virus is a generic
       .COM infector, but is not memory resident nor does it infect
       COMMAND.COM.

       The virus carries a fake advertisement for the Amstrad computer.

       The Amstrad virus appears to cause no other damage to the
       system other than replicating and infecting files.


 Virus Name:  Ashar
 Aliases:     Shoe_Virus, UIUC Virus
 Effective Length: N/A
 Type Code(s):  BR - Resident Boot Sector Infector
 Detection Method:  ViruScan V41+, F-Prot
 Removal Instructions:  MDisk, CleanUp, F-Prot or DOS SYS command
 General Comments:
       The Ashar virus is a resident boot sector infector which is
       a variant of the Brain virus.  It differs from the Brain
       virus in that it can infect both floppies and hard disk, and
       the message in the virus has been modified to be:

            "VIRUS_SHOE RECORD, v9.0.  Dedicated to the dynamic
            memories of millions of virus who are no longer with us
            today".

       However, the above message is never displayed.  The
       identification string "ashar" is normally found at offset
       04a6 hex in the virus.

       A variant of the Ashar virus exists, Ashar-B or Shoe_Virus-B,
       which has been modified so that it can no longer infect hard
       drives.  The v9.0 in the message has also been altered to v9.1.


 Virus Name:  Brain
 Aliases:     Pakistani, Pakistani Brain
 Effective Length: N/A
 Type Code(s):  BR - Resident Boot Sector Infector
 Detection Method:  ViruScan, F-Prot, IBM Scan
 Removal Instructions:  MDisk, CleanUp, F-Prot, or DOS SYS command
 General Comments:
       The Pakistani Brain virus originated in Lahore, Pakistan and
       infects disk boot sectors by moving the original contents of the
       boot sector to another location on the disk, marking those 3
       clusters (6 sectors) bad in the FAT, and then writing the virus
       code in the disk boot sector.

       One sign of a disk having been infected, at least with the
       original virus, is that the volume label will will be changed
       to "(c) Brain".  Another sign is that the label "(c) Brain" can
       be found in sector 0 (the boot sector) on an infected disk.

       This virus does install itself resident on infected systems,
       taking up between 3K and 7K of RAM.  The Brain virus is able to
       hide from detection by intercepting any interrupt that might
       interrogate the boot sector and redirect the read to the original
       boot sector located elsewhere on the disk, thus some programs
       will be unable to see the virus.

       The original Brain virus only infected floppies, however variants
       to the virus can now infect hard disks.  Also, some variants
       have had the "(c) Brain" label removed to make them harder to
       detect.

       Known variants of the Brain virus include:
       Brain-B/Hard Disk Brain/Houston Virus - hard disk version.
       Brain-C - Brain-B with the "(c) Brain" label removed.
       Clone Virus - Brain-C but restores original boot copyright label.
       Clone-B - Clone Virus modified to destroy the FAT after 5/5/92.


 Virus Name:  Cascade
 Aliases:     Fall, Falling Letters, 1701, 1704
 Effective Length:  1,701 or 1,704 bytes
 Type Code(s):  PRC - Parasitic Resident Encrypting .COM Infector
 Detection Method:  ViruScan, F-Prot, IBM Scan
 Removal Instructions:  M-1704, CleanUp, or F-Prot
 General Comments:
       Originally, this virus was a trojan horse which was disguised
       as a program which was supposed to turn off the number-lock
       light when the system was booted.  The trojan horse instead
       caused all the characters on the screen to fall into a pile
       at the bottom of the screen.  In late 1987, the trojan horse
       was changed by someone into a memory resident .COM virus.

       While the original virus had a length of 1,701 bytes and would
       infect both true IBM PCs and clones, a variation exists of
       this virus which is 3 bytes longer than the original virus
       and does not infect true IBM PCs.  Both viruses are
       functionally identical in all other respects.

       Both of the viruses have some fairly unique qualities:  Both
       use an encryption algorithm to avoid detection and complicate
       any attempted analysis of them.  The activation mechanisms
       are based on a sophisticated randomization algorithm
       incorporating machine checks, monitor types, presence or
       absence of a clock card, and the time or season of the year.

       The viruses will activate on any machine with a CGA or VGA
       monitor in the months of September, October, November, or
       December in the years 1980 and 1988.

       Known variants of the Cascade virus are:
       1701-B : Same as 1701, except that it can activate in the
                fall of any year.
       1704-D : Same as the 1704, except that the IBM selection
                has been disabled so that it can infect true IBM
                PCs.

       Also see: 1704 Format


 Virus Name:  Cascade-B
 Aliases:     Blackjack, 1704-B
 Effective Length:  1,704 bytes
 Type Code(s):  PRC - Parasitic Resident Encrypting .COM Infector
 Detection Method:  ViruScan, F-Prot, IBM Scan
 Removal Instructions:  M-1704, M-1704C, CleanUp, F-Prot
 General Comments:
       The Cascade-B virus is similar to the Cascade virus, except
       that the cascading display has been replaced with a system
       reboot which will occur at random time intervals after the
       virus activates.

       Other variation(s) which have been documented are:
       1704-C : Same as 1704-B except that the virus can activate in
                December of any year. (Note: the disinfector for
                1704-C is M-1704C.)


 Virus Name:  Chaos
 Aliases:
 Effective Length:  N/A
 Type Code(s):  BR - Resident Boot Sector Infector
 Detection Method:  ViruScan V53+
 Removal Instructions:  MDisk, CleanUp, or DOS SYS Command
 General Comments:
       First reported in December, 1989 by James Berry of Kent,
       England, the Chaos virus is a memory resident boot sector
       infector of floppy and hard disks.

       When the Chaos virus infects a boot sector, it overwrites the
       original boot sector without copying it to another location
       on the disk.  Infected boot sectors will contain the
       following messages:

            "Welcome to the New Dungeon"
            "Chaos"
            "Letz be cool guys"

       The Chaos virus will flag the disk as being full of bad
       sectors upon activation, though most of the supposed bad
       sectors are still readable.  It is unknown what the
       activation criteria is.


 Virus Name:  Dark Avenger
 Aliases:     Black Avenger
 Effective Length:  1,800 bytes
 Type Code(s):  PRAK - Parasitic Resident .COM & .EXE Infector
 Detection Method:  ViruScan V36+, F-Prot
 Removal Instructions:  M-DAV, CleanUp, F-Prot
 General Comments:
      Dark Avenger was first isolated in the United States at U C Davis.
      It infects .COM, .EXE, and overlay files, including COMMAND.COM.
      The virus will install itself into system memory, becoming resident,
      and is extremely prolific at infecting any executable files
      that are openned for any reason.  This includes using the DOS
      COPY and XCOPY commands to copy uninfected files, both the source
      and the target files will end up being infected.  Infected files
      will have their lengths increased by 1,800 bytes.

      If you are infected with Dark Avenger, shutdown your computer
      and reboot from a Write Protected boot diskette for the system,
      then carefully use a disinfector, following all instructions.
      Be sure to rescan the system for infection once you have finished
      disinfecting it.

      The Dark Avenger virus contains the words: "The Dark Avenger,
      copyright 1988, 1989", as well as the message: "This program
      was written in the city of Sofia.  Eddie lives.... Somewhere in
      Time!".

      This virus bears no resemblance or similarity to the Jerusalem
      viruses, even though they are similar in size.


 Virus Name:  Datacrime
 Aliases:     1280, Columbus Day
 Effective Length:  1,280 bytes
 Type Code(s):  PNCK - Parasitic Non-Resident .COM Infector
 Detection Method:  ViruScan, F-Prot, IBM Scan
 Removal Instructions:  AntiCrim, Scan/D, or F-Prot
 General Comments:
       The Datacrime virus is a parasitic virus, and is also known as
       the 1280 virus.  The Datacrime virus is a non-resident
       virus, infecting .COM files.  The virus was originally
       discovered in Europe shortly after its release in March, 1989.

       The virus will attach itself to the end of a COM file, increasing
       the file's length by 1280 bytes.  The first 3 bytes of the host
       program are stored off in the virus's code and then replaced by
       a branch instruction so that the virus code will be executed
       before the host program.  In order to propagate, the virus
       searches thru directories for .COM files, other than
       COMMAND.COM and attaches to any found .COM files (except for
       where the 7th letter is a D).  Hard drive partitions are
       searched before the floppy drives are checked.  The virus will
       continue to propagate until the date is after October 12 of any
       year, then when it is executed it will display a message.  The
       message is something like:

                 "DATACRIME VIRUS"
                 "RELEASED: 1 MARCH 1989".

       A low-level format of the hard disk is then done.  Most likely
       the system will also crash shortly afterwards due to errors in
       the virus code.

       Unlike the other variants of Datacrime, the original Datacrime
       virus does not replicate, or infect files, until after April 1
       of any year.

       Lastly, if the computer system is using an RLL, SCSI, or PC/AT
       type harddisk controller, all variants of the Datacrime virus
       are not able to successfully format the hard disk, according
       to Jan Terpstra of the Netherlands.


 Virus Name:  Datacrime II
 Aliases:     1514, Columbus Day
 Effective Length:  1,514 bytes
 Type Code(s):  PNAK - Non-Resident Encrypting .COM & .EXE Infector
 Detection Method:  ViruScan, F-Prot, IBM Scan
 Removal Instructions:  AntiCrim, Scan/D, or F-Prot
 General Comments:
       The Datacrime II virus is a variant of the Datacrime virus, the
       major characteristic changes are that the effective length of
       the virus is 1,514 bytes, and that it can now infect both
       .COM and .EXE files.  There is also an encryption mechanism
       in the Datacrime II virus.

       The Datacrime II virus will not format disks on Mondays.


 Virus Name:  Datacrime IIB
 Aliases:     1917, Columbus Day
 Effective Length:  1,917 bytes
 Type Code(s):  PNAK - Non-Resident Encrypting .COM & .EXE Infector
 Detection Method:  ViruScan V51+, F-Prot
 Removal Instructions:  AntiCrim, Scan/D, F-Prot
 General Comments:
       The Datacrime IIB virus is a variant of the Datacrime II virus,
       and was isolated by Jan Terpstra of the Netherlands in
       November, 1989.  This virus, as with Datacrime II, infects
       generic .COM & .EXE files, including COMMAND.COM, adding 1,917
       bytes to the file length.  The virus differs from Datacrime II
       in that the encryption method used by the virus to avoid
       detection has been changed.

       The Datacrime IIB virus will not format disks on Mondays.


 Virus Name:  Datacrime-B
 Aliases:     1168, Columbus Day
 Effective Length:  1,168 bytes
 Type Code(s):  PNE - Parasitic Non-Resident Generic .EXE Infector
 Detection Method:  ViruScan, F-Prot, IBM Scan
 Removal Instructions: AntiCrim, Scan/D, or F-Prot
 General Comments:
       The Datacrime-B virus is a variant of the Datacrime virus, the
       differences being that the effective length of the virus is
       1,168 bytes, and instead of infecting .COM files, .EXE files
       are infected.


 Virus Name:  DBASE
 Aliases:
 Effective Length: 1,864 bytes
 Type Code(s):  PRC - Parasitic Resident .COM and Overlay Infector
 Detection Method:  ViruScan V47+, F-Prot
 Removal Instructions: Scan/D, or F-Prot
 General Comments:
       The DBASE virus was discovered by Ross Greenberg of New York.
       This virus infects .COM & .OVL files, and will corrupt data in
       .DBF files by randomly transposing bytes in any open .DBF file.
       It keeps track of which files and bytes were transposed in a
       hidden file (BUG.DAT) in the same directory as the .DBF file(s).
       The virus restores these bytes if the file is read, so it
       appears that nothing is wrong.  Once the BUG.DAT file is 90
       days old or more, the virus will overwrite the FAT and root
       directory on the disk.

       After this virus has been detected, if you remove the infected
       DBase program and replace it with a clean copy, your DBF files
       that were openned during the period that you were infected
       will be useless since they are garbled on the disk even
       though they would be displayed as expected by the infected
       Dbase program.


 Virus Name:  Den Zuk
 Aliases:     Search, Venezuelan
 Effective Length: N/A
 Type Code(s):  BRF - Resident Floppy Boot Sector Infector
 Detection Method:  ViruScan, F-Prot, IBM Scan
 Removal Instructions: MDisk, F-Prot, or DOS SYS command
 General Comments:
       The Den Zuk virus is a memory-resident, boot sector infector of
       360K 5 1/4" diskettes.  The virus can infect any diskette
       in a floppy drive that is accessed, even if the diskette is
       not bootable.  If an attempt is made to boot the system with an
       infected non-system disk, Den Zuk will install itself into
       memory even though the boot failed.  After the system is booted
       with an infected diskette, a purple "DEN ZUK" graphic will appear
       after a CTL-ALT-DEL is performed if the system has a CGA, EGA, or
       VGA monitor.  While the original Den Zuk virus did not cause any
       damage to the system, some variants maintain a counter of how
       many times the system has been rebooted, and after the counter
       reaches its limit, the floppy in the disk drive is reformated.
       The counter in these variants of the virus is usually in the
       range of 5 to 10.

       The following text strings can be found in the viral code on
       diskettes which have been infected with the Den Zuk virus:

                 "Welcome to the
                     C l u b
                  --The HackerS--
                      Hackin'
                   All The Time

                   The HackerS"

       The diskette volume label of infected diskettes may be changed
       to Y.C.1.E.R.P., though this change only occurs if the Den Zuk
       virus removed a Pakistani Brain infection before infecting the
       diskette with Den Zuk.  The Den Zuk virus will also remove
       an Ohio virus infection before infecting the diskette with
       Den Zuk.

       The Den Zuk virus is thought to be written by the same person
       or persons as the Ohio virus.  The "Y.C.1.E.R.P." string is
       found in the Ohio virus, and the viral code is similar in
       many respects.


 Virus Name:  Devil's Dance
 Aliases:     Mexican
 Effective Length:  941 Bytes
 Type Code(s):  PRCT - Parasitic Resident .COM Infector
 Detection Method:  ViruScan V52+
 Removal Instructions: Scan/D, or delete infected files
 General Comments:
       The Devil's Dance virus was first isolated in December, 1989,
       by Mao Fragosso of Mexico City.  The Devil's Dance virus
       increases the size of infected .COM files by 941 bytes, and
       will infect a file multiple times until the file becomes too
       large to fit in available system memory.

       Once an infected program has been run, any subsequent warm-
       reboot (CTL-ALT-DEL) will result in the following message
       being displayed:

       "DID YOU EVER DANCE WITH THE DEVIL IN THE WEAK MOONLIGHT?
                            PRAY FOR YOUR DISKS!!
                                The Joker"

       The Devil's Dance virus is destructive.  After the first 2,000
       keystrokes, the virus starts changing the colors of any text
       displayed on the system monitor.  After the first 5,000
       keystrokes, the virus erases the first copy of the FAT.  At
       this point, when the system is rebooted, it will display the
       message above and again distroy the first copy of the FAT, then
       allow the boot to proceed.


 Virus Name:  Disk Killer
 Aliases:     Computer Ogre, Disk Ogre, Ogre
 Effective Length: N/A
 Type Code(s):  BRT - Resident Boot Sector Infector
 Detection Method:  ViruScan V39+, F-Prot
 Removal Instructions:  MDisk, CleanUp, F-Prot, or DOS COPY & SYS
 General Comments:
       The Disk Killer virus is a boot sector infector that spreads by
       writing copies of itself to 3 unused block on either a floppy or
       hard disk.  These blocks will then be marked as bad in the FAT
       so that they cannot be overwritten.  The boot sector is patched
       so that when the system is booted, the virus code will be
       executed and it can attempt to infect any new disks exposed to
       the system.  The virus counts the number of disks it has
       infected and does no harm until it has reached a predetermined
       limit.  When the limit is reached or exceeded and the system is
       rebooted, a message is displayed identifying COMPUTER OGRE and
       a date of April 1.  It then says to leave alone and proceeds to
       write full blocks of a single character randomly all over the
       disk, effectively trashing it.  Once this has occurred, the only
       recourse is to reformat the disk.  Backup copies of files from
       the disk can be restored following the reformat, but if they were
       infected as well, all will appear to be fine until the limit
       is again reached.  It is important to note that when the message
       is displayed, if the system is turned off immediately it may
       be possible to salvage some files on the disk using various
       utility programs as this virus first destroys the boot, FAT,
       and directory blocks.

       Disk Killer can be removed by using McAfee Associate's MDisk
       utility, or the DOS SYS command, to overwrite the boot sector
       on hard disk or bootable floppies.  On non-system floppies,
       files can be copied to non-infected floppies, followed by
       reformatting the infected floppies.  Be sure to reboot the
       system from a write protected master diskette before
       attempting to remove the virus first or you will be
       reinfected by the virus in memory.


 Virus Name:  Do-Nothing Virus
 Aliases:     The Stupid Virus
 Effective Length: 608 Bytes
 Type Code(s):  PRC - Parasitic Resident .COM Infector
 Detection Method:  ViruScan V49+, F-Prot
 Removal Instructions: Scan/D or F-Prot
 General Comments:
         This virus was first reported by Yuval Tal of Israel in
         October, 1989.  The virus will infect .COM files, but only the
         first one in the current directory, whether it was previously
         infected or not.  The Do-Nothing virus is also memory
         resident, always installing itself to memory address
         9800:100h, and can only infect systems with 640K of memory.
         The virus does not protect this area of memory in any way,
         and other programs which use this area will overwrite it in
         memory, removing the program from being memory resident.

         The Do-Nothing virus does no apparent damage, nor does it
         affect operation of the system in any observable way, thus
         its name.


 Virus Name:  Friday The 13th COM Virus
 Aliases:     COM Virus, Miami, Munich, South African, 512 Virus
 Effective Length: 512 Bytes
 Type Code(s):  PNC - Parasitic Non-Resident .COM Infector
 Detection Method:  ViruScan, F-Prot
 Removal Instructions: Scan/D, or F-Prot
 General Comments:
       The original Friday The 13th COM virus first appeared in
       South Africa in 1987.  Unlike the Jerusalem (Friday The 13th)
       viruses, it is not memory resident, nor does it hook any
       interrupts.  This virus only infects .COM files, but not
       COMMAND.COM.  On each execution of an infected file, the
       virus looks for two other .COM files on the C drive and 1
       on the A drive, if found they are infected.  This virus is
       extremely fast, and the only indication of propagation occuring
       is the access light being on for the A drive, if the current
       default drive is C.  The virus will only infect a .COM file
       once.  The files, after infection, must be less than 64K in
       length.

       On every Friday the 13th, if the host program is executed, it
       is deleted.

       Known variants of the Friday The 13th COM virus are:
       Friday The 13th-B: same, except that it will infect every
            file in the currect subdirectory or in the system path if
            the infected .COM program is in the system path.
       Friday The 13th-C: same as Friday The 13th-B, except that the
            message "We hope we haven't inconvenienced you" is
            displayed whenever the virus activates.


 Virus Name:  Fu Manchu
 Aliases:     2080, 2086
 Effective Length:  2,086 (COM files) & 2,080 (EXE files) bytes
 Type Code(s):  PRA - Parasitic Resident .COM & .EXE Infector
 Detection Method:  ViruScan, F-Prot
 Removal Instructions: Scan/D, or F-Prot
 General Comments:
       The Fu Manchu virus attaches itself to the beginning of .COM
       files or the end of .EXE files.  It appears to be a rewritten
       version of the Jerusalem virus, with a possible creation date
       of 3/10/88.  A marker usually found in this virus is

       A marker or id string usually found in this virus is
       'sAXrEMHOr'.

       One out of sixteen infections will result in a timer being
       installed, and after a random amount of time, the message
       "The world will hear from me again!" is displayed and
       the system reboots.  This message will also be displayed on
       an infected system after a warm reboot, though the virus doesn't
       survive in memory.

       After August 1, 1989, the virus will monitor the keyboard buffer,
       and will add derogatory comments to the names of various
       politicians.  These comments go to the keyboard buffer, so
       their effect is not limited to the display.  The messages within
       the virus are encrypted.

       Some variants of the Fu Manchu virus can infect overlay, .SYS,
       and .BIN files.

       This virus is very rare in the United States.


 Virus Name:  Ghost Boot
 Aliases:     Ghostballs
 Effective Length: N/A
 Type Code(s):  B - Non-Resident Boot Sector Infector
 Detection Method:  ViruScan V46+, F-Prot
 Removal Instructions: MDisk, CleanUp, F-Prot, or DOS SYS Command
 General Comments:
       The Ghost viruses (both boot and COM) were discovered at
       Icelandic University by Fridrik Skulason.  The Ghost Boot
       virus infects boot sectors of hard disks and floppies, and is
       similar to the Ping Pong virus.

       Random file corruption may occur on systems infected with
       this virus.

       Note: if you have the Ghost Boot virus, more likely than not
       you also have the Ghost COM virus.  If you disinfect the Boot
       Sector to get rid of the Boot virus, unless you also remove
       the COM virus, your boot sectors will again have the Ghost
       Boot virus.


 Virus Name:  Ghost COM
 Aliases:     Ghostballs
 Effective Length:  2,351 bytes
 Type Code(s):  PNC - Parasitic Non-Resident .COM Infector
 Detection Method:  ViruScan V46+, F-Prot
 Removal Instructions: MDisk or DOS SYS and erase infected .COM files,
       or CleanUp, F-Prot
 General Comments:
       The Ghost viruses (both boot and COM) were discovered at
       Icelandic University by Fridrik Skulason.  The Ghost COM
       virus infects generic .COM files, increasing the file size by
       2,351 bytes.

       Symptoms of this virus are very similar to the Ping Pong
       virus, and random file corruption may occur on infected
       systems.

       The Ghost COM virus is the first known virus that can infect
       both files (.COM files in this case) and disk boot sectors.
       After the boot sector is infected, it also acts as a virus
       (see Ghost BOOT virus).

       To remove this virus, turn off the computer and reboot from
       a write protected master diskette for the system.  Then
       use either MDisk or the DOS SYS command to replace the boot
       sector on the infected disk.  Any infected .COM files must
       also be erased and deleted, then replaced with clean copies
       from your original distribution diskettes.


 Virus Name:  Golden Gate
 Aliases:     Mazatlan, 500 Virus
 Effective Length: N/A
 Type Code(s):  BR - Resident Boot Sector Infector
 Detection Method:  ViruScan (identifies as Alameda)
 Removal Instructions: MDisk, F-Prot, or DOS SYS command
 General Comments:
       The Golden Gate virus is a modified version of the Alameda virus
       which activates when the counter in the virus has determined
       that it is infected 500 diskettes.  The virus replicates when
       a CTL-ALT-DEL is performed, infecting any diskette in the floppy
       drive.  Upon activation, the C: drive is formatted.  The
       counter in the virus is reset on each new floppy or hard drive
       infected.

       Known Variants of this virus are:
       Golden Gate-B: same as Golden Gate, except that the counter
           has been changed from 500 to 30 infections before
           activation, and only diskettes are infected.
       Golden Gate-C: same as Golden Gate-B, except that the hard
           drive can also be infected.  This variant is also known
           as the Mazatlan Virus, and is the most dangerous of the
           Golden Gate viruses.


 Virus Name:  Halloechen
 Aliases:
 Effective Length:  ??? Bytes
 Type Code(s):  P_A - Parasitic .COM &.EXE Infector
 Detection Method:  ViruScan V57+
 Removal Instructions: Scan/D or delete infected files
 General Comments:
       The Halloechen virus was reported by Christoff Fischer of
       the University of Karlsruhe in West Germany.  The virus is
       reported to be a generic .COM & .EXE infector which is
       widespread in West Germany.  When infected files are run,
       input from the keyboard is garbled.  No sample is available,
       so it is not possible to determine its length or what else
       it might do at this time.


 Virus Name:  Holland Girl
 Aliases:     Sylvia
 Effective Length: 1,332 Bytes
 Type Code(s):  PRC - Resident Parasitic .COM Infector
 Detection Method:  ViruScan V50+, F-Prot
 Removal Instructions: F-Prot, or Scan/D
 General Comments:
       The Holland Girl or Sylvia Virus was first reported by Jan
       Terpstra of the Netherlands.  This virus is memory resident
       and infects only .COM files, increasing their size by 1,332
       bytes.  The virus apparently does no other damage, and
       does not infect COMMAND.COM.

       The virus's name is due to the fact that the virus code
       contains the name and phone number of a girl named Sylvia
       in Holland, along with her address, requesting that post cards
       be sent to her.  The virus is believed to have been written
       by her ex-boyfriend.


 Virus Name:  Icelandic
 Aliases:     656, One In Ten, Disk Crunching Virus
 Effective Length: 656 bytes
 Type Code(s):  PRE - Resident Parasitic .EXE Infector
 Detection Method:  ViruScan, F-Prot
 Removal Instructions: Scan/D, or F-Prot
 General Comments:
       The Icelandic, or "Disk Crunching Virus", was originally
       isolated in Iceland in June 1989.  This virus only infects
       .EXE files, with infected files growing in length between
       656 and 671 bytes.  File lengths after infection will always
       be a multiple of 16.  The virus attaches itself to the end
       of the programs it infects, and infected files will always
       end with hex '4418,5F19'.

       The Icelandic virus will copy itself to the top of free memory
       the first time an infected program is executed.  Once in high
       memory, it hides from memory mapping programs.  If a program
       later tries to write to this area of memory, the computer will
       crash.  If the virus finds that some other program has "hooked"
       Interrupt 13, it will not proceed to infect programs.  If
       Interrupt 13 has not been "hooked", it will attempt to infect
       every 10th program executed.

       On systems with only floppy drives, or 10 MB hard disks, the
       virus will not cause any damage.  However, on systems with
       hard disks larger than 10 MB, the virus will select one unused
       FAT entry and mark the entry as a bad sector each time it
       infects a program.


 Virus Name:  Icelandic-II
 Aliases:     System Virus, One In Ten
 Effective Length: 632 Bytes
 Type Code(s):  PRE - Parasitic Resident .EXE Infector
 Detection Method:  ViruScan, F-Prot
 Removal Instructions: Scan/D, or F-Prot
 General Comments:
       The Icelandic-II Virus is a modified version of the Icelandic
       Virus, and was isolated for the first time in July 1989 in
       Iceland.  These two viruses are very similar, so only the
       changes to this variant are indicated here, refer to Icelandic
       for the base virus information.

       Each time the Icelandic-II virus infects a program, it will
       modify the file's date, thus making it fairly obvious that
       the program has been changed.  The virus will also remove
       the read-only attribute from files, but does not restore it
       after infecting the program.

       The Icelandic-II virus can infect programs even if the system
       is running an anti-viral TSR that monitors interrupt 21, such
       as FluShot+.

       On hard disks larger than 10 MB, there are no bad sectors
       marked in the FAT as there is with the Icelandic virus.


 Virus Name:  Icelandic-III
 Aliases:     December 24th
 Effective Length: 853 Bytes
 Type Code(s):  PRE - Parasitic Resident .EXE Infector
 Detection Method:  ViruScan V57+, F-Prot
 Removal Instructions: F-Prot, Scan/D, or delete infected files
 General Comments:
       The Icelandic-III Virus is a modified version of the Icelandic
       Virus, and was isolated for the first time in December 1989 in
       Iceland.  These two viruses are very similar, so only the
       changes to this variant are indicated here, refer to Icelandic
       for the base virus information.

       The Icelandic-III virus's id string in the last 2 words of the
       program is hex '1844,195F', the bytes in each word being
       reversed from the id string ending the Icelandic and
       Icelandic-II viruses.  There are also other minor changes to
       the virus from the previous Icelandic viruses, including the
       addition of several NOP instructions.

       Before the virus will infect a program, it checks to see if the
       program has been previously infected with Icelandic or
       Icelandic-II, if it has, it does not infect the program.
       Files infected with the Icelandic-III virus will have their
       length increased by between 848 and 863 bytes.

       If an infected program is run on December 24th of any year,
       programs subsequently run will be stopped, later displaying
       the message "Gledileg jol" ("Merry Christmas" in icelandic)
       instead.


 Virus Name:  Jerusalem
 Aliases:     PLO, Israeli, Friday 13th, Russian, 1813(COM), 1808(EXE)
 Effective Length:  1,813 (COM files) & 1,808 (EXE files) bytes
 Type Code(s):  PRA - Parasitic Resident .COM & .EXE Infector
 Detection Method:  ViruScan, F-Prot, IBM Scan
 Removal Instructions:  Scan/D/A, Saturday, CleanUp, UnVirus, F-Prot
 General Comments:
       The Jerusalem Virus was originally isolated at Hebrew
       University in Israel in the Fall of 1987.  The virus is
       memory resident and can survive a warm reboot (CTL-ALT-DEL).
       .COM and .EXE files are infected, with .EXE files being
       reinfected each time they are executed due to a bug in the
       virus.

       This virus redirects interrupt 8 and 1/2 hour after execution
       of an infected program the system will slow down by a factor
       of 10.

       On Friday The 13ths, after the virus is installed in memory,
       every program executed will be deleted from disk.

       The identifier for some strains is "sUMsDos", however,
       this identifer is usually not found in the newer variants of
       Jerusalem.

       Also see: Jerusalem B, New Jerusalem, Payday, Suriv 3.00


 Virus Name:  Jerusalem B
 Aliases:
 Effective Length:  1,813 (.COM files) & 1,808 (.EXE files) bytes
 Type Code(s):  PRA - Parasitic Resident .COM & .EXE Infector
 Detection Method:  ViruScan, F-Prot, IBM Scan
 Removal Instructions:  F-Prot, Saturday, CleanUp, M-JRUSLM, UnVirus
 General Comments:
       Identical to the Jerusalem virus, except that in some cases
       it does not reinfect .EXE files.  Jerusalem B is the most
       common of all PC viruses, and can infect .SYS and program
       overlay files in addition to .COM and .EXE files.

       Not all variants of the Jerusalem B virus slow down the
       system after an infection has occurred.

       Known variants of Jerusalem B are:
       Jerusalem-C: Jerusalem B without the timer delay to slow
           down the processor.
       Jerusalem-D: Jerusalem C which will destroy both copies of
           the FAT on any Friday The 13th after 1990.
       Jerusalem-E: Jerusalem D but the activation is in 1992.

       Also see: Jerusalem, New Jerusalem, Payday, Suriv 3.00


 Virus Name:  Joker
 Aliases:
 Effective Length:  ??? Bytes
 Type Code(s):  PNE - Parasitic Non-Resident .EXE Infector
 Detection Method:  ViruScan V57+
 Removal Instructions: Scan/D, or delete infected files
 General Comments:
       The Joker Virus was isolated in Poland in December, 1989.
       This virus is a generic .EXE file infector, and is a poor
       replicator (ie. it does not quickly infect other files).

       Programs which are infected with the Joker virus will
       display bogus error messages and comments.  These messages
       and comments can be found in the infected files at the
       beginning of the viral code.  Here are some of the
       messages and comments that may be displayed:

       "Incorrect DOS version"
       "Invalid Volume ID Format failure"
       "Please put a new disk into drive A:"
       "End of input file"
       "END OF WORKTIME.  TURN SYSTEM OFF!"
       "Divide Overflow"
       "Water detect in Co-processor"
       "I am hungry! Insert HAMBURGER into drive A:"
       "NO SMOKING, PLEASE!"
       " Thanks."
       "Don't beat me !!"
       "Don't drink and drive."
       "Another cup of cofee ?"
       " OH, YES!"
       "Hard Disk head has been destroyed. Can you borow me your one?"
       "Missing light magenta ribbon in printer!"
       "In case mistake, call GHOST BUSTERS"
       "Insert tractor toilet paper into printer."

       This virus may also alter .DBF files, adding messages to
       them.


 Virus Name:  Lehigh
 Aliases:
 Effective Length:  N/A
 Type Code(s):  ORKT - Overwriting Resident COMMAND.COM Infector
 Detection Method:  ViruScan, F-Prot, IBM Scan
 Removal Instructions: MDisk & replace COMMAND.COM with clean copy, or
       F-Prot
 General Comments:
       The Lehigh virus infects only the COMMAND.COM file on both
       floppies and hard drives.  The infection mechanism is to over-
       write the stack space.  When a disk which contains an
       uninfected copy of COMMAND.COM is accessed, that disk is then
       infected.  A infection count is kept in each copy of the virus,
       and after 4 infections, the virus overwrites the boot sector and
       FATs.

       A variation of the Lehigh virus, Lehigh-2, exists which
       maintains its infection counter in RAM and corrupts the boot
       sector and FATs after 10 infections.


 Virus Name:  Lisbon
 Aliases:
 Effective Length:  648 bytes
 Type Code(s):  PNC - Parasitic Non-Resident COM Infector
 Detection Method:  ViruScan V49+, F-Prot
 Removal Instructions: Scan/D, or F-Prot
 General Comments:
       The Lisbon virus is a strain of the Vienna virus first
       isolated by Jean Luz in Portugal in November, 1989.  The virus
       is very similar to Vienna, except that almost every word in
       the virus has been shifted 1-2 bytes in order to avoid virus
       identification/detection programs which could identify the
       Vienna virus.

       1 out of every 8 infected files will have the 1st 5 bytes of
       the 1st sector changed to "@AIDS", thus rendering the
       program unusable.


 Virus Name:  MIX/1
 Aliases:     MIX1
 Effective Length: 1,618 Bytes
 Type Code(s): PRE - Parasitic Resident .EXE Infector
 Detection Method:  ViruScan V37+, F-Prot
 Removal Instructions: Scan/D, Virus Buster, or F-Prot
 General Comments:
       The MIX1 Virus was originally isolated on August 22, 1989, on
       several BBSs in Israel.  This virus is a parasitic memory-
       resident .EXE file infector.  Once an infected program has been
       executed, the virus will take up 2,048 bytes in RAM.  Each
       .EXE file then executed will grow in length between 1,618 and
       1,634 bytes, depending on the original file size.  The virus
       will not, however, infect files of less than 8K in size.

       Infected files can be manually identified by a characteristic
       "MIX1" always being the last 4 bytes of an infected file.
       Using Debug, if byte 0:33C equals 77h, then the MIX1 virus is
       in memory.

       This virus will cause garbled output on both serial and
       parallel devices, as well as the the num-lock being constantly
       on.  After the 6th infection, booting the system will crash
       the system due to a bug in the code, and a ball will start
       bouncing on the system monitor.

       There is a variant of this virus which does not have the
       problem of system crashs occurring, and will only infect files
       that are greater than 16K in length.


 Virus Name:  New Jerusalem
 Aliases:
 Effective Length: 1,813 Bytes (.COM) & 1,808 Bytes (.EXE)
 Type Code(s):  PRA - Parasitic Resident .COM & .EXE Infector
 Detection Method:  ViruScan V45+, F-Prot
 Removal Instructions:  Saturday, CleanUp, F-Prot
 General Comments:
       New Jerusalem is a variation of the original Jerusalem virus
       which has been modified to be undetectable by ViruScan versions
       prior to V45 as well as IBM's VIRSCAN product as of October 20,
       1989.  The virus was first detected when it was uploaded to
       several BBSs in Holland beginning on October 14, 1989.  It
       infects both .EXE and .COM files and activates on any Friday The
       13th, deleting infected programs when they are attempted to be
       run.

       This virus is memory resident, and as with other Jerusalem
       viruses, may infect overlay, .SYS, .BIN, and .PIF files.

       Also see: Jerusalem, Jerusalem B, Payday, Suriv 3.00


 Virus Name:  Ohio
 Aliases:
 Effective Length: N/A
 Type Code(s):  BF - Resident Floppy Boot Sector Infector
 Detection Method:  ViruScan, F-Prot
 Removal Instructions:  MDisk, F-Prot, or DOS SYS Command
 General Comments:
       The Ohio virus is a memory resident boot sector infector, only
       infecting 360K floppy disks.  The Ohio virus is similar in
       many respects to the Den Zuk virus, and is believed to possibly
       be the earlier version of Den Zuk.  A diskette infected with
       Ohio will be immune to infection by the Pakistani Brain virus.

       The following text strings appear in the Ohio virus:

                "V  I  R  U  S
                      b y
                  The Hackers
                  Y C 1 E R P
                 D E N Z U K 0
                 Bandung 40254
                   Indonesia

           (C) 1988, The Hackers Team...."


 Virus Name:  Oropax
 Aliases:     Music Virus, Musician
 Effective Length:  2,756 - 2,806 bytes, but usually 2,773 bytes
 Type Code(s):  PRC - Parasitic Resident .COM Infector
 Detection Method:  ViruScan V53+, F-Prot
 Removal Instructions:  SCAN /D, F-Prot, or delete infected files
 General Comments:
       The Oropax virus has had several reports, but no samples of
       the virus are available.  It is supposed to infect .COM files,
       increasing their length by between 2,756 bytes and 2,806 bytes.
       Infected files will always have a length divisible by 51.  The
       virus may become active (on a random basis) five minutes after
       infection of a file, playing three different tunes with a
       seven minute interval in between.

       One variant recently reported in Europe pleays six different
       tunes at seven minute intervals.


 Virus Name:  Payday
 Aliases:
 Effective Length:  1,808 Bytes (.EXE) & 1,813 Bytes (.COM)
 Type Code(s):  PRA - Parasitic Resident .COM & .EXE Infector
 Detection Method:  ViruScan V51+, F-Prot
 Removal Instructions:  M-JRUSLM, UnVirus, Saturday, CleanUp, F-Prot
 General Comments:
       The Payday virus was isolated by Jan Terpstra of the Netherlands
       in November, 1989.  It is a variant of the Jerusalem B virus,
       the major difference being that the activation criteria to
       delete files has been changed from every Friday The 13th to
       any Friday but Friday The 13ths.

       Also see: Jerusalem, Jerusalem B, New Jerusalem, Suriv 3.00


 Virus Name:  Pentagon
 Aliases:
 Effective Length:  N/A
 Type Code(s):  BRF - Resident Floppy Boot Sector Infector
 Detection Method:  ViruScan, F-Prot
 Removal Instructions: MDisk, CleanUp, or DOS SYS Command
 General Comments:
       The Pentagon virus consists of a normal Ms-Dos 3.20 boot
       sector where the name 'IBM' has been replaced by 'HAL', along
       with two files.  The first file has a name of the hex
       character 0F9H, and contains the portion of the virus code
       which would not fit into the boot sector, as well as the
       original boot sector of the infected disk.  The second file
       is named PENTAGON.TXT and does not appear to be used or contain
       any data.  The 0F9H file is accessed by its absolute storage
       address.  Portions of this virus are encrypted.

       The Pentagon virus only infects 360K floppies, and will look
       for and remove the Brain virus from any disk that it infects.
       It is memory resident, occupying 5K of RAM, and can survive
       a warm reboot or CTL-ALT-DEL.


 Virus Name:  Perfume
 Aliases:     765, 4711
 Effective Length:  765 Bytes
 Type Code(s):  PNCK - Parasitic Non-Resident .COM Infector
 Detection Method: ViruScan V57+, F-Prot
 Removal Instructions: F-Prot, or delete infected files
 General Comments:
       The Perfume virus is of German origin, and has also been
       isolated in Poland in December, 1989.  This virus infects
       .COM files, and will look for COMMAND.COM and infect it if
       it isn't already infected.  Infected files always grow in
       length by 765 bytes.

       The virus will sometimes ask the system user a question,
       and then not run the infected program unless the system
       user types in 4711, the name of a German perfume.

       In the most common variant of this virus, however, the
       questions have been overwritten with miscellaneous
       characters.


 Virus Name:  Ping Pong
 Aliases:     Bouncing Ball, Bouncing Dot, Italian, Vera Cruz
 Effective Length:  N/A
 Type Code(s):  BRF - Resident Floppy Boot Sector Infector
 Detection Method:  ViruScan, F-Prot, IBM Scan
 Removal Instructions:  MDisk, CleanUp, F-Prot, or DOS SYS command
 General Comments:
       The Ping Pong virus is a boot sector virus which was first
       reported in March 1988.  The original Ping Pong virus only
       infects Floppy Disks.

       When the virus activates, which is on a random basis, a
       bouncing ball or dot appears on the screen.  This display
       can only be stoppy thru a system reboot.  No other damage
       is apparently done.


 Virus Name:  Ping Pong-B
 Aliases:     Falling Letters, Boot
 Effective Length:  N/A
 Type Code(s): BR - Resident Boot Sector Infector
 Detection Method:  ViruScan, F-Prot, IBM Scan
 Removal Instructions: CleanUp, MDisk, F-Prot, or DOS SYS Command
 General Comments:
       The Ping Pong-B virus is a variant of the Ping Pong virus.  The
       major difference is that Ping Pong-B can infect hard disks as
       well as floppies.


 Virus Name:  Saratoga
 Aliases:     642, One In Two
 Effective Length: 642 Bytes
 Type Code(s):  PRE - Resident Parasitic .EXE Infector
 Detection Method:  ViruScan, F-Prot
 Removal Instructions: Scan/D, F-Prot, or delete infected files
 General Comments:
       The Saratoga Virus was first isolated in California in July 1989.
       This virus is very similar to the Icelandic and Icelandic-II
       viruses, so the differences from the Icelandic virus only
       are indicated here.  Please refer back to the description of
       the Icelandic virus for the base information.

       The Saratoga virus's main difference from the Icelandic virus
       is that when it copies itself to memory, it modifies the memory
       block so that it appears to belong to the operating system,
       thus avoiding anyone reusing the block.

       Similar to the Icelandic-II virus, the Saratoga can infect
       programs even if the system has installed an anti-viral TSR
       which "hooks" interrupt 21, such as FluShot+.  Also like
       Icelandic-II is that this virus can infect programs which have
       been marked Read-Only, though it does not restore the Read-Only
       attribute to the file afterwards.


 Virus Name:  SF Virus
 Aliases:
 Effective Length:  N/A
 Type Code(s):  BRF - Resident Floppy Boot Sector Infector
 Detection Method: ViruScan (identifies as Alameda)
 Removal Instructions: MDisk, CleanUp, F-Prot, or DOS SYS command
 General Comments:
       The SF Virus is a modified version of the Alameda virus
       which activates when the counter in the virus has determined
       that it is infected 100 diskettes.  The virus replicates when
       a CTL-ALT-DEL is performed, infecting the disk in the floppy
       drive.  Upon activation, the diskette in the floppy drive is
       reformated.  The SF Virus only infects 5 1/4" 360K floppys.


 Virus Name:  Stoned
 Aliases:     Hawaii, Marijuana, New Zealand, San Diego, Smithsonian
 Effective Length:  N/A
 Type Code(s):  BRX - Resident Boot Sector Infector
 Detection Method:  ViruScan, CleanUp, F-Prot, IBM Scan
 Removal Instructions:  CleanUp, MDisk, F-Prod
 General Comments:
       The Stoned virus was first reported in Wellington, New
       Zealand in early 1988.  The original virus only infected
       360KB 5 1/4" diskettes, doing no overt damage.  There are,
       however, two known variants which can infect hard disks.

       This virus is memory resident following the system being
       booted from an infected disk.  It will infect any diskette
       inserted into the system and accessed.

       On one out of every eight system bootup, the virus will
       display the message:

             "Your computer is now stoned.  Legalize Marijuana"

       The Stoned virus can be removed from 360KB diskettes by
       using either the MDisk, CleanUp, or F-Prot programs.  It
       can also be removed from diskettes by using the DOS SYS
       command.

       Known variants of the Stoned Virus are:
       Stoned-B : same as Stoned, but can also infect hard disks via
                  the hard disk's partition table.  Infected
                  systems with RLL controllers will frequently hang.
       Stoned-C : same as Stoned, except that the message has been
                  removed.

       For variants Stoned-B and Stoned-C, removal instructions are
       the same for diskettes.  However, an infected hard disk must
       be disinfected by using MDisk with the /P parameter or
       CleanUp.  The reason for the different hard disk
       instructions is due to Stoned infecting the partition
       table on the hard disk.


 Virus Name:  Sunday
 Aliases:
 Effective Length: 1,636 Bytes
 Type Code(s):  PRAT - Parasitic Resident .COM, .EXE. & .OV? Infector
 Detection Method:  ViruScan V49+, F-Prot
 Removal Instructions: CleanUp, Scan/D, or F-Prot
 General Comments:
         The Sunday virus was discovered by many users in the Seattle,
         Washington area in November, 1989.  This virus activates on
         any Sunday, displaying the message:

             "Today is Sunday, why do you work so hard?"

         The Sunday virus appears to have been derived from the
         Jerusalem virus, the viral code being similar in many
         respects.

         Damage to the file allocation table or FAT has been reported
         from a number of infected users.


 Virus Name:  Suriv 1.01
 Aliases:     April 1st, Israeli, Suriv01
 Effective Length:  897 bytes
 Type Code(s):  PRC - Parasitic Resident .COM Infector
 Detection Method:  ViruScan, F-Prot, IBM Scan
 Removal Instructions:  Scan/D, F-Prot, or UnVirus
 General Comments:
       The Suriv 1.01 virus is a memory resident .COM infector.  It
       will activate on April 1st after memory is infected by running
       an infected file and then a uninfected .COM file is executed.
       On activation, it will display the message:

       "APRIL 1ST HA HA HA YOU HAVE A VIRUS".

       The system will then lock up, requiring it to be powered off and
       then back on.

       The text "sURIV 1.01" can be found in the viral code.


 Virus Name:  Suriv 2.01
 Aliases:     April 1st-B, Israeli, Suriv02
 Effective Length: 1,488 bytes
 Type Code(s):  PRE - Parasitic Resident .EXE Infector
 Detection Method:  ViruScan, F-Prot, IBM Scan
 Removal Instructions:  Scan/D, F-Prot, or UnVirus
 General Comments:
       The Suriv 2.01 virus is a memory resident .EXE infector.  It
       will activate on April 1st after memory is infected by running
       an infected file, displaying the same message as Suriv 1.01
       and locking up the system.  The virus will cause a similar
       lockup, though no message, 1 hour after an infected .EXE file
       is executed on any day on which the system default date of
       01-01-80 is used.  The virus will only infect the file once.


 Virus Name:  Suriv 3.00
 Aliases:     Israeli, Suriv03
 Effective Length:  1,813 (COM files) & 1,808 (EXE files) bytes
 Type Code(s):  PRA - Parasitic Resident .COM & .EXE Infector
 Detection Method:  ViruScan, F-Prot
 Removal Instructions: Scan/D, F-Prot, or Unvirus
 General Comments:
       May be a variant of the Jerusalem virus.  The string "sUMsDos"
       has been changed to "sURIV 3.00".  The Suriv 3.00 virus
       activates on Friday The 13ths when an infected program is
       run or if it is already present in system memory, however
       files are not deleted due to a bug in the viral code.  Other

       Other than on Friday The 13ths, after the virus is memory
       resident for 30 seconds, an area of the screen is turned into
       a "black window" and a time wasting loop is executed with
       each timer interrupt.

       As with the Jerusalem B viruses, this virus can also infect
       overlay, .SYS, and other executable files besides .EXE and
       .COM files, though it does not infect COMMAND.COM itself.


 Virus Name:  Swap
 Aliases:     Falling Letters Boot, Israeli Boot
 Effective Length:  N/A
 Type Code(s):  BRF - Resident Floppy Boot Sector Infector
 Detection Method:  ViruScan, F-Prot
 Removal Instructions:  MDisk, CleanUp, F-Prot, or DOS SYS Command
 General Comments:
       The Swap Virus, or Israeli Boot Virus, was first reported in
       August 1989.  This virus is a memory resident boot sector
       infector that only infects floppies.  The floppy's boot
       sector is infected the first time it is accessed.  One bad
       cluster will be written on track 39, sectors 6 and 7 with the
       head unspecified.  If track 39, sectors 6 and 7, are not
       empty, the virus will not infect the disk.  Once the virus
       is memory resident, it uses 2K or RAM.  The actual length of
       the viral code is 740 bytes.

       The Swap virus activates after being memory resident for 10
       minutes.  A cascading effect of letters and characters on the
       system monitor is then seen, similar to the cascading effect
       of the Cascade and Traceback viruses.

       The virus was named the Swap virus because the first isolated
       case had the following phrase located at bytes 00B7-00E4 on
       track 39, sector 7:

           "The Swapping-Virus. (C) June, 1989 by the CIA"

       However, this phrase is not found on diskettes which have been
       freshly infected by the Swap virus.

       A diskette infected with the Swap virus can be easily identified
       by looking at the boot sector with a sector editor, such as
       Norton Utilities.  The error messages which normally occur at
       the end of the boot sector will not be there, instead the start
       of the virus code is present.  The remainder of the viral code
       is located on track 39, sectors 6 and 7.


 Virus Name:  SysLock
 Aliases:     3551, 3555
 Effective Length:  3,551 Bytes
 Type Code(s): PNA - Encrypting Non-Resident .COM & .EXE Infector
 Detection Method:  ViruScan, F-Prot
 Removal Instructions: Scan/D, or F-Prot
 General Comments:
       The SysLock virus is a parasitic encrypting virus which
       infects both .COM and .EXE files, as well as damaging some
       datafiles on infected systems.  This virus does not install
       itself memory resident, but instead searchs through the
       .COM and .EXE files and subdirectories on the current disk,
       picking one at executable file at random to infect.  The
       infected file will have its length increased by approximately
       3,551 bytes, though it may vary slightly depending on file
       infected.

       The SysLock virus will damage files by searching for the word
       "Microsoft" in any combination of upper and lower case
       characters, and when found replace the word with either
       "MACROSOFT".

       If the SysLock virus finds that an environment variable
       "SYSLOCK" exists in the system and has been set to "@" (hex 40),
       the virus will not infect any programs or perform string
       replacements, but will instead pass control to its host
       immediately.

       Known variant(s) of SysLock are:
       Macho-A : same as the SysLock virus, except that "Microsoft"
                 is replaced with "MACHOSOFT".


 Virus Name:  Taiwan
 Aliases:
 Effective Length:  708 Bytes
 Type Code(s): PNC - Parasitic Non-Resident .COM Infector
 Detection Method:  ViruScan V56+, F-Prot
 Removal Instructions: Scan/D, or delete infected files
 General Comments:
       The Taiwan virus was first isolated in January, 1989 in
       Taiwan, R.O.C.  This virus is a non-resident generic .COM
       infector.


 Virus Name:  Traceback
 Aliases:     3066
 Effective Length:  3,066 bytes
 Type Code(s):  PRA - Parasitic Resident .COM & .EXE Infector
 Detection Method:  ViruScan, F-Prot, IBM Scan
 Removal Instructions:  M-3066, VirClean, F-Prot, or delete infected files
 General Comments:
       The Traceback virus infects both .COM and .EXE files, adding
       3,066 bytes to the length of the file.  After an infected
       program is executed, it will install itself memory resident
       and infect other programs that are openned.  Additionally, if
       the system date is after December 5, 1988, it will attempt to
       infect one additional .COM or .EXE file in the current
       directory.  If an uninfected file doesn't exist in the current
       directory, it will search the entire disk, starting at the
       root directory, looking for a candidate.  This search
       process terminates if it encounters an infected file before
       finding a candidate non-infected file.

       This virus derives its name from two characteristics.  First,
       infected files contain the directory path of the file causing
       the infection within the viral code, thus is it possible
       to "trace back" the infection thru a number of files.  Second,
       when it succeeds in infected another file, the virus will
       attempt to access the on-disk copy of the program that the
       copy of the virus in memory was loaded from so that it can
       update a counter in the virus.  The virus takes over disk
       error handling while trying to update the original infected
       program, so if it can't infect it, the user will be unaware
       that an error occurred.

       The primary symptom of the Traceback virus having infected
       the system is that if the system date is after December 28,
       1988, the memory resident virus will produce a screen display
       with a cascading effect similar to the Cascade/1701/1704
       virus.  The cascading display occurs one hour after system
       memory is infected.  If a keystroke is entered from the key-
       board during this display, a system lockup will occur.  After
       one minute, the display will restore itself, with the characters
       returning to their original positions.  This cascade and
       restore display are repeated by the virus at one hour
       intervals.

       Also see: Traceback II


 Virus Name:  Traceback II
 Aliases:     2930
 Effective Length: 2,930 Bytes
 Type Code(s):  PRA - Parasitic Resident .COM & .EXE Infector
 Detection Method:  ViruScan V41+, F-Prot
 Removal Instructions: Scan/D, F-Prot, or delete infected files.
 General Comments:
       The Traceback II virus is a variant of the Traceback (3066)
       virus.  It is believed that Traceback II predates the
       Traceback virus, however the Traceback virus was isolated
       and reported first.  As with the Traceback virus, the
       Traceback II virus is memory resident and infects both .COM
       & .EXE files.

       The comments indicated for the Traceback virus generally
       apply to the Traceback II virus, with the exception that the
       file length increase is 2,930 bytes instead of 3,066 bytes.


 Virus Name:  Typo Boot
 Aliases:     Mistake
 Effective Length:  N/A
 Type Code(s):  BR - Resident Boot Sector Infector
 Detection Method:  ViruScan, F-Prot
 Removal Instructions:  MDisk, F-Prot, or DOS SYS Command
 General Comments:
       The Typo Boot virus was first isolated in Israel by Y. Radai
       in June, 1989.  This virus is a memory resident boot sector
       infector, taking up 2K at the upper end of system memory once
       it has installed itself memory resident.

       The major symptom that will be noticed on systems infected
       with the Typo Boot virus is that certain characters in
       printouts are always replaced with other phonetically
       similar characters.  Since the virus also substitutes hebrew
       letters for other hebrew letters, the virus was most likely
       written by someone in Israel.  Digits in numbers may also
       be transposed or replaced with other numbers.  The substitutions
       impact printouts only, the screen display and data in files is
       not affected.

       The Typo Boot virus is similar structurally to the Ping Pong
       virus, and may be a variant of Ping Pong.  It can be removed
       from a disk by using MDisk, CleanUp, DOS SYS command, or
       just about any Ping Pong disinfector.


 Virus Name:  Typo COM
 Aliases:     Fumble, 867
 Effective Length: 867 Bytes
 Type Code(s):  PRC - Parasitic Resident .COM Infector
 Detection Method:  ViruScan V48+, F-Prot
 Removal Instructions:  Scan/D, F-Prot, or delete infected files
 General Comments:
       The Typo COM virus is similar to the Typo Boot virus in that
       it will garble data that is sent to the parallel port once it
       has activated.  Unlike the Boot virus, the COM virus infects
       generic .COM files.  This virus was first reported by Joe
       Hirst of Brighton, UK, in November, 1989.

       The Typo COM virus only infects .COM files on even-numbered
       days.


 Virus Name:  Vacsina
 Aliases:
 Effective Length:  1,206 bytes
 Type Code(s):  PRA - Parasitic Resident .COM & .EXE Infector
 Detection Method:  ViruScan, F-Prot
 Removal Instructions: Scan/D/A, F-Prot, or delete infected files
 General Comments:
       The Vacsina virus is approximately 1200 bytes in length and can
       be found in the memory control block (MCB) of infected systes.
       Vacsina infects both .COM and .EXE files, as well as .SYS and
       .BIN files.  One sign of a Vacsina infection is that programs
       which have been infected may "beep" when executed.


 Virus Name:  Vcomm
 Aliases:
 Effective Length:  637 Bytes
 Type Code(s):  PRE - Parasitic Resident .EXE Infector
 Detection Method: F-Prot
 Removal Instructions: F-Prot, or delete infected files
 General Comments:
       The Vcomm virus is of Polish origin, first isolated in
       December, 1989.  The virus is a .EXE file infector.  When an
       infected file is run, the virus will attempt to infect one
       .EXE file in the current directory.

       When Vcomm infects a file, it first pads the file so that the
       files length is a multiple of 512 bytes, then it adds its
       637 bytes of virus code to the end of the file.

       The memory resident portion of the virus intercepts any
       disk writes that are attempted, and changes them into disk
       reads.


 Virus Name:  Vienna
 Aliases:     Austrian, Unesco, DOS-62, DOS-68, 1-in-8, 648
 Effective Length:  648 bytes
 Type Code(s):  PNC - Parasitic Non-Resident .COM Infector
 Detection Method:  ViruScan, F-Prot
 Removal Instructions:  M-Vienna, CleanUp, VirClean, F-Prot
 General Comments:
       The Vienna virus was first isolated in April, 1988, in Moscow at
       a UNESCO children's computer summer camp.  The virus will infect
       1 .COM file whenever a program infected with the virus is run.
       1 in every 8 infected programs will perform a system warm reboot
       whenever the viral code is executed.  Some .COM programs
       infected with this virus may not run.


 Virus Name:  Vienna-B
 Aliases:     62-B
 Effective Length:  648 bytes
 Type Code(s):  PNC - Parasitic Non-Resident .COM Infector
 Detection Method:  ViruScan, F-Prot
 Removal Instructions:  M-Vienna, CleanUp, VirClean, F-Prot
 General Comments:
       The Vienna-B virus is a variant of the Vienna virus, the major
       difference being that instead of a warm reboot, the program
       being executed will be deleted.


 Virus Name:  Virus-90
 Aliases:
 Effective Length:  857 bytes
 Type Code(s):  PRC - Parasitic Resident .COM Infector
 Detection Method:  ViruScan V53+, F-Prot
 Removal Instructions:  Scan/D, F-Prot, or delete infected files
 General Comments:
       The Virus-90 virus was originally distributed in December, 1989
       by Patrick Toulme as an "educational tool", with the virus
       source also available for sale.  In January, 1990, the
       author contacted the sites where he had uploaded the virus
       requesting that they remove it from their systems, he having
       decided a live virus was not a "good idea" for an educational
       tool after being contacted by several viral authorities.


 Virus Name:  Virus101
 Aliases:
 Effective Length:  2,560 Bytes
 Type Code(s):  PRAFK - Parasitic Resident Infector
 Detection Method: ViruScan V57+
 Removal Instructions:  Scan/D or delete infected files
 General Comments:
       The Virus101 is the "big brother" of Virus-90, also written by
       Patrick Toulme as an "educational tool" in January 1990.
       This virus is memory resident, and employs an encryption scheme
       to avoid detection on files.  It infects COMMAND.COM, and all
       other executable file types.  Once it has infected all the
       files on a diskette, it will infect the diskette's boot
       sector.  It only infects floppy diskettes in its current
       version.


 Virus Name:  W13
 Aliases:
 Effective Length:  534 Bytes
 Type Code(s):  PNC - Parasitic Non-Resident .COM Infector
 Detection Method: F-Prot
 Removal Instructions:  F-Prot, or delete infected files
 General Comments:
       The W13 virus is a .COM file infector that doesn't do much
       except for infect files.  The virus was isolated in December
       1989 in Poland.

       There are two variants of the W13 virus, one is 534 bytes
       in length, and the second is 507 bytes long.  The 507 byte
       variant has some bugs in the original virus corrected.


 Virus Name:  Yankee Doodle
 Aliases:
 Effective Length:  2,885 or 2,899 Bytes
 Type Code(s):   PRA - Parasitic Resident .COM & .EXE Infector
 Detection Method:  ViruScan V42+, F-Prot
 Removal Instructions: Scan/D, VirClean, F-Prot, or delete infected files
 General Comments:
       The Yankee Doodle virus was discovered by Alexander Holy of
       the North Atlantic Project in Vienna, Austria, on
       September 30, 1989.  This virus is a parasitic virus which
       infects both .COM and .EXE files, and installs itself
       memory resident.  After installing itself memory resident, it
       will play Yankee Doodle on this system speaker at 17:00.
       Infected programs will be increased in length by 2,899 bytes.
       Other than being disruptive by playing yankee doodle, this
       virus currently does nothing else harmful besides infecting
       files.  As a side note, the Yankee Doodle Virus will seek out
       and modify Ping Pong viruses, changing them so that they self-
       destruct after 100 infections.


 Virus Name:  Zero Bug
 Aliases:     Palette, 1536
 Effective Length:  1,536 bytes
 Type Code(s):  PRC - Parasitic Resident .COM Infector
 Detection Method:  Viruscan V38+, F-Prot
 Removal Instructions: Scan/D, F-Prot, or delete infected files
 General Comments:
       The Zero Bug virus was first isolated in the Netherlands by
       Jan Terpstra in September, 1989.  This virus is a memory
       resident .COM file infector.  Infected .COM files will
       increase in size by 1,536 bytes, however the increase in file
       length will not show up when the disk directory is displayed.

       The virus's main objective is to infect the copy of
       COMMAND.COM indicated by the environment variable COMSPEC.
       If COMSPEC doesn't point to anything, the Zero Bug virus will
       install itself memory resident using INT 21h.

       After the virus has either infected COMMAND.COM or become
       memory resident, it will infect all .COM files that are
       accessed, including those access by actions such as COPY or
       XCOPY.  Any .COM file created on an infected system will also
       be infected.

       If the currently loaded COMMAND.COM is infected, the virus
       will hook into the timer interrupt 1Ch, and after a certain
       amount of time has past, a smiley face character (ASCII 01)
       will appear and eat all the zeros it can find on the screen.
       The virus does not delete files or format disks in its present
       form.


 Virus Name:  405
 Aliases:
 Effective Length:  N/A
 Type Code(s):  ONC - Overwriting Non-Resident .COM Infector
 Detection Method:  ViruScan, F-Prot, IBM Scan
 Removal Instructions: Scan/D, F-Prot, or delete infected files
 General Comments:
       The 405 virus is an overwriting virus which infects only .COM
       files in the current directory.  If the length of the .COM file
       was originally less than 405 bytes, the resulting infected file
       will have a length of 405 bytes.  This virus currently cannot
       recognize .COM files that are already infected, so it will
       attempt to infect them again.  No info on what else this
       particular virus does....


 Virus Name:  1260
 Aliases:
 Effective Length:  1,260 Bytes
 Type Code(s):  PNC - Parasitic Encrypting Non-Resident .COM Infector
 Detection Method:  ViruScan V57+
 Removal Instructions: CleanUp V57+
 General Comments:
       The 1260 virus was first isolated in January, 1990.  This
       virus does not install itself resident in memory, but is it
       extremely virulent at infecting .COM files.  Infected files
       will have their length increased by 1,260 bytes, and the
       resulting file will be encrypted.  The encryption key changes
       with each infection which occurs.

       The 1260 virus can infect a local area network, including the
       file server and all workstations.


 Virus Name:  1704 Format
 Aliases:
 Effective Length: 1,704 Bytes
 Type Code(s): PRC - Parasitic Encrypting Resident .COM Infector
 Detection Method:  ViruScan, F-Prot, IBM Scan
 Removal Instructions: M-1704, CleanUp, Scan/D, F-Prot
 General Comments:
       Like the Cascade Virus, but the disk is formatted when the
       virus activates.


 Virus Name:  4096
 Aliases:
 Effective Length: 4,096 Bytes
 Type Code(s):  PRA - Parasitic Resident .COM & .EXE Infector
 Detection Method:  ViruScan V53+, F-Prot
 Removal Instructions: Scan/D, F-Prot, or see note below
 General Comments:
       The 4096 virus was first isolated in January, 1990.  This virus
       has been classified as the worse virus seen by most experts,
       and no one has successfully recovered their system from it.

       The 4096 virus infects .COM, .EXE, and Overlay files, adding
       4,096 bytes to their length.  Once the virus is resident in
       system memory, the increase in length will not appear in a
       directory listing.  Once this virus has installed itself into
       memory, it will infect any executable file that is openned,
       including if it is openned with the COPY or XCOPY command.

       This virus is destructive to both data files and executable
       files, as it very slowly crosslinks files on the system's
       disk.  The crosslinking occurs so slowly that it appears there
       is a hardware problem, the virus being almost invisible.

       As a side note, if the virus is present in memory and you
       attempt to copy infected files, the new copy of the file will
       not be infected with the virus.  Thus, one way to disinfect
       a system is to copy off all the infected files to diskettes
       while the virus is active in memory, then power off the system
       and reboot from a write protected (uninfected) system disk.
       Once rebooted and the virus is not in memory, delete the
       infected files and copy back the files from the diskettes.
       The above will disinfect the system, if done correctly, but
       will still leave the problem of cross-linked files which are
       permanently damaged.


 -----------------------------------------------------------------------
      The following is a cross-reference of common virus names back to
 the name they are listed by in the virus information section.
 Hopefully, this cross-reference will alleviate some confusion when
 different anti-viral software packages refer to different names for
 the same virus.

 Virus Name              Refer To Virus(es) In VirusSum.Txt:
 ----------------------  -----------------------------------------------
 AIDS                    AIDS
 Alabama                 Alabama
 Alameda                 Alameda
 Amstrad                 Amstrad
 April 1st               Suriv 1.01
 April 1st-B             Suriv 2.01
 Ashar                   Ashar
 Austrian                Vienna
 Black Avenger           Dark Avenger
 Black Friday            Jerusalem
 Blackjack               Cascade-B
 Boot                    Ping Pong-B
 Bouncing Ball           Ping Pong
 Bouncing Dot            Ping Pong
 Cascade                 Cascade
 Cascade-B               Cascade-B
 Chaos                   Chaos
 Columbus Day            Datacrime, Datacrime II, Datacrime IIB, Datacrime-B
 COM Virus               Friday The 13th COM Virus
 Computer Ogre           Disk Killer
 Dark Avenger            Dark Avenger
 Datacrime               Datacrime
 Datacrime II            Datacrime II
 Datacrime IIB           Datacrime IIB
 Datacrime-B             Datacrime-B
 DBase                   DBase
 December 24th           Icelandic-III
 Den Zuk                 Den Zuk
 Devil's Dance           Devil's Dance
 Disk Crunching Virus    Icelandic, Saratoga
 Disk Killer             Disk Killer
 Disk Ogre               Disk Killer
 Do-Nothing Virus        Do-Nothing Virus
 DOS-62                  Vienna
 DOS-68                  Vienna
 Fall                    Cascade
 Falling Letters         Cascade, Ping Pong-B
 Falling Letters Boot    Swap Boot
 Friday 13th             Jerusalem
 Friday 13th COM Virus   Friday The 13th COM Virus
 Fu Manchu               Fu Manchu
 Fumble                  Typo COM
 Ghost Boot              Ghost Boot
 Ghost COM               Ghost COM
 Ghostballs              Ghost Boot, Ghost COM
 Golden Gate             Golden Gate
 Hahaha                  AIDS
 Halloechen              Halloechen
 Hawaii                  Stoned
 Holland Girl            Holland Girl
 Icelandic               Icelandic
 Icelandic-II            Icelandic-II
 Icelandic-III           Icelandic-III
 Israeli                 Jerusalem, Suriv 1.01, Suriv 2.01, Suriv 3.00
 Israeli Boot            Swap
 Italian                 Ping Pong
 Jerusalem               Jerusalem
 Jerusalem A             Jerusalem
 Jerusalem B             Jerusalem
 Jerusalem C             Jerusalem
 Jerusalem D             Jerusalem
 Jerusalem E             Jerusalem
 Joker                   Joker
 Lehigh                  Lehigh
 Lisbon                  Lisbon
 Marijuana               Stoned
 Mazatlan                Golden Gate
 Merritt                 Alameda
 Mexican                 Devil's Dance
 Miami                   Friday The 13th
 Mistake                 Typo Boot
 MIX1                    MIX1
 MIX/1                   MIX1
 Munich                  Friday The 13th COM Virus
 Music Virus             Oropax
 Musician                Oropax
 New Jerusalem           New Jerusalem
 New Zealand             Stoned
 Ogre                    Disk Killer
 Ohio                    Ohio
 One In Eight            Vienna
 One In Ten              Icelandic, Icelandic-II
 One In Two              Saratoga
 Oropax                  Oropax
 Pakistani               Brain
 Pakistani Brain         Brain
 Palette                 Zero Bug
 Payday                  Payday
 Peking                  Alameda
 Pentagon                Pentagon
 Perfume                 Perfume
 Ping Pong               Ping Pong
 Ping Pong-B             Ping Pong-B
 PLO                     Jerusalem
 Russian                 Jerusalem
 San Diego               Stoned
 Saratoga                Saratoga
 Seoul                   Alameda
 SF Virus                SF Virus
 Shoe_Virus              Ashar
 Shoe_Virus-B            Ashar-B
 Smithsonian             Stoned
 South African           Friday The 13th COM Virus
 Stoned                  Stoned
 Stupid Virus            Do-Nothing
 Sunday                  Sunday
 Sylvia                  Holland Girl
 System Virus            Icelandic-II
 Suriv 1.01              Suriv 1.01
 Suriv 2.01              Suriv 2.01
 Suriv 3.00              Suriv 3.00
 Suriv01                 Suriv 1.01
 Suriv02                 Suriv 2.01
 Suriv03                 Suriv 3.00
 Swap                    Swap
 SysLock                 Syslock
 Taiwan                  Taiwan
 Taunt                   AIDS
 Traceback               Traceback
 Traceback II            Traceback II
 Typo Boot               Typo Boot
 Typo COM                Typo COM
 UIUC Virus              Ashar
 UIUC Virus-B            Ashar
 Unesco                  Vienna
 Vacsina                 Vacsina
 Vcomm                   Vcomm
 Vera Cruz               Ping Pong
 VGA2CGA                 AIDS
 Vienna                  Vienna
 Vienna-B                Vienna-B
 Virus-90                Virus-90
 Virus101                Virus101
 W13                     W13
 Yale                    Alameda
 Yankee Doodle           Yankee Doodle
 Zero Bug                Zero Bug
 62-B                    Vienna-B
 405                     405
 500 Virus               Golden Gate
 632                     Saratoga
 512 Virus               Friday The 13th COM Virus
 642                     Icelandic
 648                     Vienna
 765                     Perfume
 867                     Typo COM
 1168                    Datacrime-B
 1260                    1260
 1280                    Datacrime
 1514                    Datacrime II
 1536                    Zero Bug
 1701                    Cascade
 1704                    Cascade, Cascade-B
 1704 Format             1704 Format
 1704-B                  Cascade B
 1808                    Jerusalem
 1813                    Jerusalem
 1917                    Datacrime IIB
 2080                    Fu Manchu
 2086                    Fu Manchu
 2930                    Traceback II
 3066                    Traceback
 3551                    SysLock
 3555                    SysLock
 4096                    4096
 4711                    Perfume
------------------------------------------------------------------------
                        Virus Information Summary List
                               Revision History

January 15, 1990 -
     First release of listing, which contained 52 of 61 known Ms-Dos
     computer viruses.  Of the 9 known viruses which were not
     completed, they contained very basic information, though no
     detailed description, those viruses were:
            Chaos                Swap
            Icelandic            Taiwan
            Icelandic-II         Typo Boot
            Ohio                 2930
            Saratoga

February 03, 1990 -
     Second release of listing, which now includes updated information
     for the following viruses:
            Alabama
            Chaos
            Den Zuk
            Datacrime II, Datacrime IIB
            Do-Nothing
            Icelandic, Icelandic-II
            Ohio
            Saratoga
            Stoned
            Swap
            SysLock
            Traceback, Traceback II (was 2930 in previous release)
            Typo Boot
     The following new Ms-Dos computer viruses were added to the
     listing:
            Halloechen
            Icelandic-III
            Joker
            Perfume
            Vcomm
            Virus101
            W13
            1260

------------------------------------------------------------------------

Comments

Popular posts from this blog

BOTTOM LIVE script

Evidence supporting quantum information processing in animals

ARMIES OF CHAOS