Ads
related to: what exe files are viruses goingavg.com has been visited by 100K+ users in the past month
avast.com has been visited by 100K+ users in the past month
Search results
Results From The WOW.Com Content Network
ABC, discovered in October 1992, is a memory-resident, file-infecting computer virus which infects EXE files and may alter both COM and EXE files. ABC activates on the 13th day of every month. Upon infection, ABC becomes memory-resident at the top of system memory but below the 640K DOS boundary and hooks interrupts 16 and 1C.
The files show a creation date of 6-23-2008 and show an original name of Olalatheworld.exe and an internal name of Olalatheworld. The files are 124,928 bytes in size. These characteristics can help distinguish the infected files, which is important because some of the names used by the file are names of legitimate Windows files and therefore ...
Due to a bug in the virus, only the first EXE file in any directory is infected. Abraxas-infected files will become 1,171 bytes in length and contain Abraxas' viral code. The file's date and time in the DOS disk directory listing will be set to the system date and time when infection occurred.
The Ada virus mainly targets .COM files, specifically COMMAND.COM. AGI-Plan: Month 4-6 DOS Mülheim: AGI-Plan is notable for reappearing in South Africa in what appeared to be an intentional re-release. AI DOS AIDS: AIDSB, Hahaha, Taunt DOS 1990 AIDS is the first virus known to exploit the DOS "corresponding file" vulnerability. AIDS II: DOS ...
When an infected file is executed, Alabama goes memory resident. Whenever a .EXE file is executed from this point on, Alabama will search out for another file to infect. This is probably intended to place blame on the file that is being executed instead of the virus itself. Files infected by Alabama increase in size by 1,560 bytes. [2]
Sality is a family of polymorphic file infectors, which target Windows executable files with the extensions .EXE or .SCR. [1] Sality utilizes polymorphic and entry-point obscuring (EPO) techniques to infect files using the following methods: not changing the entry point address of the host, and replacing the original host code at the entry point of the executable with a variable stub to ...
Ads
related to: what exe files are viruses goingavast.com has been visited by 100K+ users in the past month
avg.com has been visited by 100K+ users in the past month