Selected viruses, spyware, and other threats: sorted alphabetically
These are encrypted, parasitic, resident, semi-stealth COM and EXE infectors. They infect suitable files as they are executed, created and copied. To infect files direct access to disk is utilized. Both these viruses mark the already infected files by adding 100 to the year of file origin. That modification is disguised, as well as the increase of the infected files length is. The viruses present themselves in an interesting way. If the virus, at certain circumstances, reads a file with length of 16384 bytes it simulated an error. In the encrypted virus body there are the following texts:
Trojector.1463: TROJECTOR II,(c) Armagedon Utilities, Athens 1992
Trojector.1561: TROJECTOR ]I[,(c) Armagedon Utilities, Athens 1992, Greetings to Vesselin
© 1992-2004 Eset s.r.o. All rights reserved. No part of this Encyclopedia may be reproduced, transmitted or used in any other way in any form or by any means without the prior permission.