Threat Encyclopedia

Selected viruses, spyware, and other threats: sorted alphabetically


These viruses utilize technique of infecting files which was first used in the virus Dir-II. They do not infect files directly, they only alter pointer to point to the first allocation unit of the file. These viruses are not only stealth, as their forerunners were, but also polymorphic. When an infected file is executed they will occupy more than 3 KB of memory below 640 KM and they hook the interrupt INT 21h. The virus Byway.A infects only files in the root directory of a diskette; Byway.B infects also files in the subdirectories. The virus will create file CHKLIST.MS and loads its body into it. In the encrypted body of the virus also the following text strings can be found:

The-HdnV <by:Wai-Chan,Aug94,UCV>

© 1992-2004 Eset s.r.o. All rights reserved. No part of this Encyclopedia may be reproduced, transmitted or used in any other way in any form or by any means without the prior permission.