Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- @echo off
- title Computer Virus Archive
- echo Computer Virus Archive
- echo By Javanese
- echo -----------------------------------------------
- pause
- echo Virus.9x.CIH
- echo When CIH infects files, it checks to see whether there are enough gaps to completely store its code,
- echo rather than simply writing its code to the end of the file and increasing file size. If it has enough space,
- echo CIH will infect the file without increasing file size. If it does not, CIH will ignore the file,
- echo giving it better ability to further infect a user's computer without the user noticing anything.
- echo -------------------------------------------------------------------------------------------------------------
- echo On April 26th (in the original variant), CIH activates, overwriting part of the BIOS (Basic Input Output System) and overwriting the first megabyte of
- echo all hard disks in an endless loop, causing the computer to crash. Once rebooted, the BIOS is corrupted and will no longer display anything on the screen or
- echo initiate the boot sequence, rendering the computer unusable.
- echo ---------------------------------------------------------------------------
- pause
- echo Virus.DOS.Kela
- echo the TPE classification is affixed to those viruses that were produced with the "TridenT Polymorphic Engine (TPE),"
- echo a virus writing engine with polymorphic capabilities.
- pause
- echo Virus.DOS.OneHalf
- echo The virus gains control at bootup and
- echo creates a random encryption key, which
- echo it stores in the master boot record
- echo (MBR). It then enumerates the size of
- echo the hard drive and selects the last two
- echo unencrypted cylinders on the disk, and encrypts
- echo them using the aforementioned key. It continues encrypting
- echo the last two unencrypted cylinders until it finally reaches
- echo the middle of the disk, when it outputs "Dis is one half."
- echo to the screen.
- echo Now, the virus basically owns your hard drive.
- echo When data that resides in the encrypted cylinders is accessed,
- echo OneHalf takes control and decrypts it and then displays it to the
- echo user. However, if the virus is removed improperly,
- echo the encryption key is lost and all data is permanently
- echo damaged beyond repair and must be recovered from backups.
- pause
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement