Advertisement
mickojavanese

ASwr

Aug 24th, 2014
3,107
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1.    
  2.  
  3.     @echo off
  4.     title Computer Virus Archive
  5.     echo           Computer Virus Archive
  6.     echo           By Javanese
  7.     echo -----------------------------------------------
  8.     pause
  9.     echo  Virus.9x.CIH
  10.     echo  When CIH infects files, it checks to see whether there are enough gaps to completely store its code,
  11.     echo  rather than simply writing its code to the end of the file and increasing file size. If it has enough space,
  12.     echo  CIH will infect the file without increasing file size. If it does not, CIH will ignore the file,
  13.     echo  giving it better ability to further infect a user's computer without the user noticing anything.
  14.    echo -------------------------------------------------------------------------------------------------------------
  15.    echo  On April 26th (in the original variant), CIH activates, overwriting part of the BIOS (Basic Input Output System) and overwriting the first megabyte of
  16.    echo  all hard disks in an endless loop, causing the computer to crash. Once rebooted, the BIOS is corrupted and will no longer display anything on the screen or
  17.    echo  initiate the boot sequence, rendering the computer unusable.
  18.    echo ---------------------------------------------------------------------------
  19.    pause
  20.    echo  Virus.DOS.Kela
  21.    echo  the TPE classification is affixed to those viruses that were produced with the "TridenT Polymorphic Engine (TPE),"
  22.    echo  a virus writing engine with polymorphic capabilities.
  23.    pause
  24.    echo Virus.DOS.OneHalf
  25.    echo The virus gains control at bootup and
  26.    echo creates a random encryption key, which
  27.    echo it stores in the master boot record
  28.    echo (MBR). It then enumerates the size of
  29.    echo the hard drive and selects the last two
  30.    echo unencrypted cylinders on the disk, and encrypts
  31.    echo them using the aforementioned key. It continues encrypting
  32.    echo the last two unencrypted cylinders until it finally reaches
  33.    echo the middle of the disk, when it outputs "Dis is one half."
  34.    echo to the screen.
  35.    echo Now, the virus basically owns your hard drive.
  36.    echo When data that resides in the encrypted cylinders is accessed,
  37.    echo OneHalf takes control and decrypts it and then displays it to the
  38.    echo user. However, if the virus is removed improperly,
  39.    echo the encryption key is lost and all data is permanently
  40.    echo damaged beyond repair and must be recovered from backups.
  41.    pause
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement