Ads
related to: what exe files are viruses going home back to full length- Total Security
#1 Anti-Malware Solution
Enjoy Total Peace of Mind
- For PC/Mac & Mobile
Best Antivirus Protection
Unbeatable Threat Detection
- Bitdefender™ VPN
4000+ Servers In 50+ Countries.
Zero Logs. Ultra-Secure Connection.
- Antivirus Plus
Essential Protection for Windows
Stealthy & Light on Resources
- Total Security
Search results
Results From The WOW.Com Content Network
An altered/infected file's date and time in the DOS disk directory listing may have been updated to the current system date and time when the file was altered/infected. No text strings are visible within the viral code in infected EXE files, but the following text strings are encrypted within the initial copy of the ABC virus: ABC_FFEA Minsk 8. ...
There will be no file length increase unless the original host program was smaller than 792 bytes, in which case it will become 792 bytes in length. The program's date and time in the DOS disk directory listing will not be altered. The following text strings are found in infected files: "*.EXE *.COM .." "Program too big to fit in memory" "Acid ...
Due to a bug in the virus, only the first EXE file in any directory is infected. Abraxas-infected files will become 1,171 bytes in length and contain Abraxas' viral code. The file's date and time in the DOS disk directory listing will be set to the system date and time when infection occurred.
EXE file, Ontario.1024 goes memory resident and infects files of these types upon being opened. COMMAND.COM is infected using a special routine. Infected files will increase in size by 1,024 bytes. However, when Ontario.1024 is in memory, no increase in file size will be observed due to the virus' stealthing.
The Ada virus mainly targets .COM files, specifically COMMAND.COM. AGI-Plan: Month 4-6 DOS Mülheim: AGI-Plan is notable for reappearing in South Africa in what appeared to be an intentional re-release. AI DOS AIDS: AIDSB, Hahaha, Taunt DOS 1990 AIDS is the first virus known to exploit the DOS "corresponding file" vulnerability. AIDS II: DOS ...
AIDS II works by first finding an uninfected EXE file in the working directory and then creating a companion COM file with the viral code. The COM files will always be 8,064 bytes in length, with a timestamp corresponding to the time of infection. After creating the new COM file, the virus then plays a loud note, and displays the following ...