This is the textual version of the AVRD. In order to minimise editing overhead this version is now derived directly from the source of the HyperText version. The derivation is performed by a program, so the formatting may not always be perfect - but we'd rather spend our time coding !Killer/!Scanner ! Ignore any references to clicking in specific places in the document - this facility is only available in the HyperText version. ########################################################################### The Archimedes Virus Reference Document --------------------------------------------------------------------------- Version 1.58h (October 25, 1992) Copyright © 1991, 1992 Tor O. Houghton and Alan Glover This document is copyright. Profit based distribution (whether PD or Shareware) without prior consent from the authors, is strictly illegal. If in doubt, contact one of the authors. Note that this version of !ClearView also has certain conditions upon it's distribution. This is the hypertext form of this document, using the Binary Star !ClearView package. Click here (on the underlined word) for a brief guide to using this software and details about obtaining enhanced versions. A full list of the contents, and an index of the viruses covered in this edition of this document can be seen by clicking the 'index' icon (the rightmost one), or the underlined word in this sentence. ########################################################################### Abstract --------------------------------------------------------------------------- As the number of people using the Archimedes range of computers has increased over the years, so has the number of viruses. This document should be of interest to all users of an Acorn computer running a version of RISC OS, and contains the compiled information from various virus researchers and their killers. In particular, it is (as the title suggests) a compendium of the knowledge about viruses of Tor Houghton and Alan Glover. The purpose of this document is to give as many details as possible on each virus known, and to assist those who think they might be infected by a virus. A dilemma occurred as this document took form. How much information should be included? If we provided too much information, this document could well become an effective "cookbook" for people wanting to write a virus. This is not our intention. The professionals and programmers who read this will easily identify the missing or omitted information because they already have this background knowledge - it is part of the working tools of our profession. The document is not intended to provide very detailed technical information on a virus (although this may happen as a way of explaining it), but to allow the reader to understand what the virus generally does, what makes it activate and what it does upon activation. Most important, however, it should help the user with the removal! 1.0 Introduction --------------------------------------------------------------------------- A virus is nothing magical. Anyone with a bit of programming skills and some knowledge about the machine's operating system is capable of creating a virus. Usually these programmers think it is fun, they've read too many cyberpunk books, or they are generally pitiful creatures who like to inflict damage. Final note: In spite of many journalist's secret wishes, a computer virus cannot spread from one type of computer to another. For example, a virus written on a PC running MS-DOS or Windows cannot infect the Archimedes - in native mode. If you are using the PC emulator, a virus functions perfectly under this environment too (probably with a few exceptions due to the fact that there are about 1000 viruses running under this particular operating system). The only area in which some crossover is possible is hardware - if you have a DOS virus which thrashes the floppy disc out of alignment, it will obviously affect it when it is used normally! 1.1 Some Definitions --------------------------------------------------------------------------- Connectivity: The level of ability a computer has to connect to other computers. Nowadays it is very easy to, for example, phone a BBS and download new software. The higher level of connectivity, the higher the level of possible exposure to computer viruses. The same may also be considered true of other sources of software, such as PD libraries. Trojan Horse: This is a generic name (taken from Greek mythology) for a penetration method that includes hidden code. An example of this is the Link virus which, while being helpful in the ways of converting backspace to delete, also launches a virus into your computer. Virus: A computer virus can be defined as a malicious program capable of replicating itself. See "A Computer Security Glossary for the Advanced Practitioner" in the Computer Security Journal IV, No. 1, 1987 for a similar description. Please note that most computer viruses on the Archimedes do nothing but replicate, although there are a few exceptions. Worm: A computer program which moves through your computer system, altering data as it copies itself and deleting the old copy. If a worm reproduces it could also be called a virus. There are no reports of worms on the Archimedes, mainly because it is such a closed system, and would be detected much too easily to become a hazard. Networks are more exposed to such nasties. 1.2 Entry Explanations --------------------------------------------------------------------------- Name: The most common name of the virus. Often chosen because of some text found in the virus, or like CeBIT, connected to some event (the biggest computer show in Europe). Aliases: Names which other anti-viral agent documents (usually brief notes which are included with the program) use for the same virus. This includes names that are commonly used by BBS users etc. Origin: The country where the virus seems to have originated from. Isolation Date: The date (as detailed as possible) when the virus was first found. Effective Length: The length the virus occupies on the disc. The actual length in memory may well be shorter. Virus Type: Task refers to viruses written as a multitasking program (i.e. appears on the Task Manager, with or without a task name). Resident refers to viruses which, by reserving some memory, insert themselves as a machine code program invisible to the task manager. By monitoring certain interrupts the virus is able to spread. Also, if the virus attaches itself to files, this is noted along with what type of files it infects. Symptoms: Odd behaviour which might occur if the virus is loaded. This could be spurious crashes or files suddenly appearing (or disappearing!). Take note that this has nothing to do with what the virus actually does when it activates, as this will be detailed as extensive as possible under the 'general comments' section. Detection: Refers to anti-virus agents (complete with earliest version number) which to our knowledge detects the virus. Please be so kind as to update me on this, as I know there are several anti-virus programs wandering around which I don't have! Removal: Refers either to programs which remove the virus from the infected file (complete with earliest version number), or if possible, which files to delete without destroying the program. Where it says 'Remove named file(s)', take note that if there is a !Boot file present, be sure to check this too (i.e. with !Edit). In particular, never assume that a Module may be RMKilled, or that an application task may be Quit. It might disappear, but it may also set up a time bomb with serious effects on the system. As a rule, it is unwise to attempt to remove a virus from memory yourself. However some anti-virus programs contain specific code to detect and remove viruses which are present in memory. Where an anti-virus program is known to be able to do this the program and version is given. The criteria for this is that the anti-virus program either neutralises or removes the virus from memory, leaving the machine in a safe enough state for the anti-virus program to remove the infection from your media. Even with this protection, you should still do a CTRL-Reset as soon as possible after you have been infected. General Comments: As detailed information about the virus as possible. Also, if there are any mutated versions of the virus, these are stated here too, along with any relevant information. Please note that the number after the virus name states how many bytes it occupies on the disc. Source: The person who provided the information about the virus concerned. Where a name does not appear, it will probably have been written by Tor Houghton or Alan Glover. In some cases, an acknowledgment will be included to someone who has helped in the isolation or analysis of the virus. Sometimes square brackets ("[]") with a comment might appear. These are our comments, and offer additional useful information which we thought the original author left out. ########################################################################### Virus index --------------------------------------------------------------------------- Click on the virus name to find out more about it Archie FF8 Arcuebus BBCEconet Bigfoot CeBIT Code Sicarius Extend Funky Garfield_I Garfield_W Handler Icon Icon-A, Filer, Poison, NewVirus Image Increment Irqfix Link Mode87 Module ModVir, Illegal MyMod Silicon Herpes NetManager NetStatus Boot Parasite * Runopt Sprite * SpriteUtils T2 * Terminator * Thanatos * RISCOSExt Traphandler Valid Vigay DataDQM, Shakes Viruses marked with an asterisk (*) indicate that they carry malicious code. Any detection of one of these viruses should be treated thus: 1) Perform a CTRL-RESET as soon as possible.To be safe, press F12 and type FX 200,3 beforehand. This should get the virus out of memory, just leaving the storage media to be cleaned. Remember that infection can be as easy as opening a filer viewer! 2) Load a virus killer, and check that the virus is not active. Some virus killers (e.g. Pineapple's !Killer) are capable of removing any resident virus, and withstanding infection attempts whilst doing this. Bear in mind that not all anti-virus programs are intended to start up in an environment where a virus is active. 3) Run the virus killer through the system, opening the minimum possible number of filer windows. Obviously, if you keep your copy of the virus killer on a write-protected floppy this is quite easy! Remember to check removable discs too! Please note that spurious resets and/or errors which occur are usually the results of poor programming, and is therefore not considered malicious (it merely depicts the programmer's skills - he should have stuck to LOGO). Although not usually marked as malicious, some viruses will cause the !Boot of an application to be overwritten. This can cause things which usually happen automatically (eg: locating !System) to fail. ########################################################################### Archie =========================================================================== Last Updated: 21st April 1992 Aliases: FF8 Origin: United Kingdom Isolation Date: 1988 Effective Length: 920 bytes Virus Type: Resident Absolute (FF8) file infector. Symptoms: May cause "Address exception" or "Undefined instruction" errors. Absolute files will grow in length. --------------------------------------------------------------------------- Detection Media: Killer 1.17+ Memory: Interferon 2.00+ Scanner 1.02+ Killer 1.17+ Removal Media: Killer 1.17+ Memory: Killer 1.17+ --------------------------------------------------------------------------- General Comments: This is a piece of ARM code that is appended to executables with the Absolute (&FF8) filetype. It is 920 (&398) bytes long and has a tell-tale 4-character string at the end of its code, "1210", which is used as an "already-infected" flag. The first instruction of the original executable is saved near the end of the virus code space and is replaced by a branch to the first instruction of the Archie virus code. What Archievirus does when first run: 1.Attempts to infect executables (Absolute filetype) with the filespecs "@.*" and "%.*". In other words, all executables in the current and library directory are attacked. 2.Uses OS_File 36 as a "semaphore" to see if it is lodged in RMA. If a call to OS_File 36 returns with an error, then it hasn't infected the RMA yet, so it proceeds to claim 920 bytes of RMA, copy itself into there and points a claim of the OS_File vector to its new RMA location. 3.The time is checked to see if it is the 13th of the month. If so, the code loops indefinitely, displaying the 45-character message (in the virus, this message is EORed with &64, and is therefore not easy to spot.): Hehe...ArchieVirus strikes again... 4.Assuming it wasn't the 13th of the month (and NO, it doesn't check for a Friday!), then the original first instruction of the executable is replaced and the original normal code continues from &8000 onwards. The OS_File vector claim is quite important, because this serves two purposes: a.It allows OS_File 36 to return without an error, signalling that the RMA is already infected. b.It checks for OS_Files 0 and 10 (Save memory to file), 11 (create empty file) and 12,14,16 and 255 (Load file). If any of these are encountered then an infection attack is activated (see step 1 above). (Source: Richard K. Lloyd) ########################################################################### Arcuebus =========================================================================== Last Updated: 25th October 1992 Aliases: Origin: UK Isolation Date: October 1992 Effective Length: 9619 bytes Virus Type: Resident application infector Symptoms: Extra module files appear in applications --------------------------------------------------------------------------- Detection Media: Killer 1.381+ Memory: Killer 1.381+ VProtect 1.24+ Removal Media: Killer 1.381+ Memory: Killer 1.381+ --------------------------------------------------------------------------- General Comments: This virus spreads as a module within applications. The module has eight possible names: ProgUtil, Resource, InfoFile, SystemRS, ModularR, PureMath, SoundMdl and GraphMdl. When loaded (from a !Boot file) it installs itself as a NetStatus 3.07 (15 Sep 1988). A quick check for this virus is to press and type 'Help Virus'. The following text will be displayed: Congratulations. Your system has the Arcuebus virus. The following data may interest you:- Virus generation number: Dnnn This copy was born: At the same time a sound sample (loaded as a voice called Percussion-Bass) is played. This says 'I am a servant of the '. If anyone who hears this has a good idea what the last word is - do tell us! (Source: Paul Frohock) ########################################################################### BBCEconet =========================================================================== Last Updated: 29th June 1992 Aliases: Origin: United Kingdom Isolation Date: April 1992 Effective Length: 5280 bytes Virus Type: Resident Absolute (FF8) file infector. Symptoms: Module "BBCEconet 0.09" resident in RMA (&018xxxxx) (see also Mode87!). --------------------------------------------------------------------------- Detection Media: Killer 1.33+ Memory: Killer 1.33+ Scanner 1.33+ Interferon 2.12+ Scanner 1.34+ VProtect 1.15+ Removal Media: Killer 1.33+ Memory: Killer 1.33+ Scanner 1.34+ --------------------------------------------------------------------------- General Comments: The action of this virus bears a marked similarity to Link, i.e. it appends code to absolutes and uses a module to perform the infection (in this case BBCEconet, which it installs). As with Link, it attempts to infect %.Squeeze. However, both viruses use the same check to see whether a file is infected so it is not possible to have an absolute simultaneously infected by Link and BBCEconet. The majority of this virus is kept encrypted when it is not executing, and it also encrypts a segment at the beginning of the absolute file. The encryption key changes with each infection. In short, you need dedicated software to remove it. The datestamp will not change, and as with Link, it temporarily patches Interferon to allow itself to infect without any alarms being given. There are various date fired routines, outlined below. Friday 13th: It's Friday! Why are you working? I first infected a commercial program with good help from Dr. Blob. Now you're infected too - and probably most of your penpals. I've got more in store! And... I've created XXXX copies of myself. Good luck! December 25th: Merry Christmas! April 1st: E.T. phones home! (It sends ATD 0749 679794 to the serial port, so if you have a Hayes compatible modem connected, it will dial this number - a well-known bulletin board service in Somerset.) June 25th: Ph'nglui mglw'nafh Chtulhu R'lyeh fthagn. And... I've created XXXX copies of myself. [The non-english part of this message was introduced by H.P. Lovecraft in his short story The Call of Cthulhu, where it translates to "In his house at R'lyeh, dead Cthulhu waits dreaming." Probably used by the virus writer as proof that he has read this book.] All of these messages will appear in an error box titled "Ouch! You've been bitten!" It may also clear the screen and print the word "LOVE" in mode 12. (Source: Alan Glover) ########################################################################### Bigfoot =========================================================================== Last Updated: 11th September 1992 Aliases: Origin: United Kingdom Isolation Date: August 1992 Effective Length: 5535 or 5580 bytes Virus Type: Task. Stores code as separate file. Symptoms: Additional files with random names in capital letters appear in applications --------------------------------------------------------------------------- Detection Media: Killer 1.381+ Memory: Killer 1.381+ Scanner 1.47+ (5580 byte strain only?) Removal Media: Killer 1.381+ Memory: Killer 1.381+ delete named file, remove line from !Boot. --------------------------------------------------------------------------- General Comments: This is a fairly simple BASIC program, which installs as a desktop task called Bigfoot. It has messages for certain dates, namely: 25 Dec: Happy Christmas from BigFoot ... The VIRUS 05 Nov: "Wizz Bang! Its Guyfalks night BigFoot Strikes again! 04 Jul: "Hay there its the 4th of July ,American Independence! Best wishes from BigFoot 15 Mar: This is a HOLD UP! Give me all the PD software you can get,,, Or you SYSTEM gets it!!! By the way its the end of the fishing season. It infects by creating or modifying the !Boot file, using a random name of 1-10 upper case characters. The virus is saved as a BASIC file of the same name. However the BASIC itself always has REM>Bigfoot on the first line. Apart from spreading, it has no malicious code. The 5535 byte version can not be Quitted from the Task Manager. (Source: Alan Glover, with thanks to Paul Frohock and David Cox for initial analysis) ########################################################################### CeBIT =========================================================================== Last Updated: 21st April 1992 Aliases: Lord of Darkness, TlodMod Origin: Germany Isolation Date: March 1991 Effective Length: 1240 bytes Virus Type: Resident !Boot file infector, stores code as separate file. Symptoms: File "TlodMod" in application directories. --------------------------------------------------------------------------- Detection Media: Killer 1.17+ Memory: Interferon 2.00+ Scanner 1.23+ Killer 1.17+ VProtect 1.06+ Scanner 1.20+ Removal Media: Killer 1.17+ Memory: Killer 1.17+ delete named file, remove last line from !Boot. --------------------------------------------------------------------------- General Comments: This is a module called "TlodMod" with the following title string: TlodMod 1.11 (11 Nov 1990) by Devil the LORD OF DARKNESS It is 1240 (&4D8) bytes long and hooks itself into UpCallV. It then activates once a minute and first checks for the existence of .TlodMod. If this already exists, then no further action is taken. If it doesn't, however, it then attempts to append the following line to .!Boot: rme. TlodMod 0 rml. .TlodMod If it succeeds at this, a counter is incremented and the module is replicated as .TlodMod. Every 16th successful infection will trip the virus into issuing a "*Wipe $.path.file*" (which will inevitably fail!) and then displaying a message accompanied by a simple graphic. The message displayed is thus: This is a warning to all Users, I am back on the Archimedes ... Your Archie is infected now and with him most of your programms. Don't worry, nothing is damaged, but keep in mind the protection! And always think about the other side of THE LORD OF DARKNESS ... Virus generation is (Source: Richard K. Lloyd) ########################################################################### Code =========================================================================== Last Updated: 11th September 1992 Aliases: Origin: UK Isolation Date: June 1992 Effective Length: 2251 bytes Virus Type: Resident !Boot file infector, stores code as separate file. Symptoms: File "Code" in application directories. --------------------------------------------------------------------------- Detection Media: Killer 1.360+ Memory: Killer 1.360+ Scanner 1.42+ VProtect 1.17+ Removal Media: Killer 1.360+ Memory: Killer 1.360+ Scanner 1.42+ --------------------------------------------------------------------------- General Comments: This virus installs itself as a desktop task called "Window Manager". The 'Code' file is filetyped as &FF8, but is actually plain BASIC. The virus can either extend a !Boot or create one - if one is created it will be 44 bytes long. The only effects from this virus will be the the loss of sprites for some applications, since the !Boot file it creates does not contain an IconSprites statement to load the sprites. (Source: Alan Glover) ########################################################################### Extend =========================================================================== Last Updated: 21st April 1992 Aliases: Origin: United Kingdom Isolation Date: October 1990 Effective Length: 940 bytes Virus Type: Resident task. Stores code as separate file. Symptoms: File "MonitorRM", "CheckMod", "ExtendRM", "OSextend", "ColourRM", "Fastmod", "CodeRM" or "MemRM" in application directory. Each time the code is executed it grabs 1k of RMA - this will eventually lead to a system crash. --------------------------------------------------------------------------- Detection Media: Killer 1.17+ Memory: Interferon 2.00+ VProtect 1.06+ Killer 1.17+ Hunter 1.00+ Scanner 1.20+ Scanner 1.36+ Removal Media: Killer 1.17+ Memory: Killer 1.17+ delete named file, remove extra lines from !Boot. --------------------------------------------------------------------------- General Comments: It's a module which can go under 8 different filenames (the name is picked at random using the current time as a seed): MonitorRM, CheckMod, ExtendRM, OSextend, ColourRM, Fastmod, CodeRM or MemRM. However, the module itself has the following title string: Extend 1.56 (08 Jul 1989) It is 940 (&3AC) bytes long and initialises itself as a nameless Wimp task which then looks for Wimp Message 5 (double-click). It attempts to either create an !Boot in the application directory or append to an already existing one with the following lines: IconSprites .!Sprites [0D] RMEnsure Extend 0 RMRun .ModName [0D] ||[FF] The "IconSprites" line is omitted if it is appended to an existing !Boot. "ModName" is one of the 8 possible filenames. The Extend Virus uses the &FF (i.e. decimal 255) byte at the end as a self-check to see if has infected the !Boot file already. Of course, it copies itself to the new name inside the application directory as you would expect. Note the incorrect use of &0D (decimal 13) to terminate the lines, rather than the more correct &0A (decimal 10). A shift-double-click does NOT cause an infection, but it DOES claim yet another 1K of never-to-be-released RMA. There is no damage apart from the claiming of RMA (which will eventually lead to a system crash). (Source: Richard K. Lloyd) ########################################################################### Funky =========================================================================== Last Updated: 25th October 1992 Aliases: Origin: UK Isolation Date: October 1992 Effective Length: 1308 bytes Virus Type: Resident application infector Symptoms: Sprite file called 'Funky!', application task called 'Window Dude' --------------------------------------------------------------------------- Detection Media: Killer 1.381+ Memory: Killer 1.381+ VProtect 1.24+ Removal Media: Killer 1.381+ Memory: Killer 1.381+ --------------------------------------------------------------------------- General Comments: In common with the Icon family, this is a BASIC program hidden under a Sprite filetype. It initialises as a desktop task called 'Window Dude' and infects by saving copies of itself and amending !Boot files. (Source: Paul Frohock) ########################################################################### Garfield_I =========================================================================== Last updated: 11th September 1992 Aliases: Origin: United Kingdom Isolation Date: June 1992 Effective Length: 1640, not including the files "!Boot", "!Run" and "!Sprites". Virus Type: Resident application infector. Symptoms: Directory "!Pic" with files "!Boot", "!Run", "!Mod" (module) and "!Sprites". Recursive infections possible. --------------------------------------------------------------------------- Detection Media: Killer 1.362+ Memory: Killer 1.362+ Scanner 1.42+ VProtect 1.20+ Scanner 1.47+ Removal Media: Killer 1.362+ Memory: Killer 1.362+ Scanner 1.42+ Scanner 1.47+ --------------------------------------------------------------------------- General Comments: Garfield_I is a resident virus, lodging itself in the RMA as a module "IconManager". When active, it creates a directory inside an application called "!Pic" with the files "!Boot", "!Run", "!Mod" and "!Sprites". The virus code is contained in "!Mod". It then proceeds to add the following lines to the infected application's "!Boot" file: RMEnsure IconManager 1.27 .!pic Garfield_I uses the default Acorn sprite file sprite, so a casual glimpse in an application folder will not reveal it unless you a) use a different sprite for sprite files or you b) open the folder with "full info". It does not check for multiple infections. Infected applications will, more often than not, contain "!Pic" directories inside "!Pic" directories. Garfield_I activates on the first Monday of any month, displaying "The Garfield Virus is here to stay" then repeatedly "Don't you just hate Mondays?" until the machine is reset or switched off. (Source: Alan Glover) ########################################################################### Garfield_W =========================================================================== Last Updated: 11th September 1992 Aliases: Origin: United Kingdom Isolation Date: June 1992 Effective Length: 1480, not including the files "!Boot", "!Run" and "!Sprites". Virus Type: Resident application infector. Symptoms: Directory "!Obey" with files "!Boot", "!Run", "!Mod" (module) and "!Sprites". Recursive infections possible. --------------------------------------------------------------------------- Detection Media: Killer 1.360+ Memory: Killer 1.360+ Scanner 1.41+ Scanner 1.41+ VProtect 1.17+ Interferon 2.00+ Removal Media: Killer 1.360+ Memory: Killer 1.360+ Scanner 1.41+ --------------------------------------------------------------------------- General Comments: Garfield_W is a resident virus, lodging itself in the RMA as a module "WimpAIDS". When active, it creates a directory inside an application called "!Obey" with the files "!Boot", "!Run", "!Mod" and "!Sprites". The virus code is contained in "!Mod". It then proceeds to add the following lines to the infected application's "!Boot" file: .!Obey |Above line is inoculation for the wimp virus Garfield_W uses the default Acorn Obey file sprite, so a casual glimpse in an application folder will not reveal it unless you a) use a different sprite for obey files or you b) open the folder with "full info". Garfield_W does not check for multiple infections. Infected applications will, more often than not, contain "!Obey" directories inside "!Obey" directories. Garfield_W activates on the first Monday of any month, displaying "The Garfield Virus is here to stay" then repeatedly "Don't you just hate Mondays?" until the machine is reset or switched off. [ Note: Although both Garfield_I and Garfield_W call themselves Garfield, and give the same message, we have given them separate entries since certain items differ between them - notably application and module names. ] (Source: Alan Glover) ########################################################################### Handler =========================================================================== Last Updated: 25th October 1992 Aliases: Origin: UK Isolation Date: October 1992 Effective Length: 1532 bytes Virus Type: Resident application infector Symptoms: Desktop Task called 'Task Handler'. --------------------------------------------------------------------------- Detection Media: Killer 1.381+ Memory: Killer 1.381+ VProtect 1.24+ Removal Media: Killer 1.381+ Memory: Killer 1.381+ --------------------------------------------------------------------------- General Comments: This virus is loaded by a !run file, so is likely to spread slower than most. It renames the original !Run file to Obey. The virus itself is in an absolute called Handler. It may display a message: You have been infected with the Handler VIRUS The Virus is just to see how good a program can infect Sorry if it has up set you in any way, Thats about all i can say! Generation : Press any key to change the channel. (Source: Paul Frohock) ########################################################################### Icon =========================================================================== Last Updated: 7th July 1992 Aliases: Icon-A, Filer, Poison, NewVirus Origin: United Kingdom Isolation Date: 1990? Effective Length: 5498 bytes in base version Virus Type: Task. Stores code as separate file. Symptoms: Nameless wimp task on the Task Manager. Silly error messages may appear without reason. The files "Icon", "Poison", "Splodge" or "NewVirus" in application directories --------------------------------------------------------------------------- Detection Media: Killer 1.17+ Memory: Killer 1.17+ Scanner 1.32+ Scanner 1.32+ IVSearch 2.05+ (note 1) VProtect 1.06+ Hunter 1.00+ (note 1) Removal Media: Killer 1.17+ Memory: Killer 1.17+ delete named file, remove last line from !Boot. --------------------------------------------------------------------------- General Comments: The Icon virus family is a type of very contagious viruses. They are harmless to that extent that they do not destroy files. However, they are very annoying (although I must admit some of the messages were quite amusing!). Common for all the viruses in the Icon family is that the virus is an unnamed wimp task written in BASIC. It spreads by adding a few lines to the !Boot file of an application (without checking for multiple infections), and then saving the code as a file as with filetype sprite. BASIC -quit . The original virus displayed a stupid error message on start-up, and then every so often after that. Commonly also called the Filer virus as the error message header claims that it's from the Filer. Here are a few examples of what type of error messages which might appear: ".desreveR maertS tuptuO" "This error should not occur." "Previous error did not occur." "Could not reach top of stack." Known variant(s) of the Icon virus are: Icon-2096 Filename: Poison Random error code replaced with a *I am stuck - which might log the user on to a network if they're very unfortunate! Icon-2616 Filename: Icon No silly messages from this version - also has the name of the person who modified it (yes, the UK Computer Crimes Unit have acted on this!). Icon-2631 Filename: Splodge Identical to 2616, except the change of name. Icon-5498 Filename: Icon, though the in-core name is 'Extra'. Does have silly messages. Icon-5574 Filename: Icon As 5498 with missing Hourglass_On call added. Silly message less likely to appear when it is loaded. Icon-5737 Filename: NewVirus As 5574, but with a three-key sequence to exit the program. High likelihood of a silly error at startup. Insignificant changes to !Boot save routine. Icon-5742 Filename: Icon Bugfix of 5737. Less likely to give silly errors when loaded. (Source: Alan Glover) ########################################################################### Image =========================================================================== Last Updated: 21st April 1992 Aliases: Origin: Northern Ireland ? Isolation Date: Jan. 1992 by Svlad Cjelli Effective Length: 512 bytes Virus Type: Resident, although not in RMA Symptoms: Files "Image" and "!Spr" in application directories. The file "image" has no filetype, but !Spr has the type Obey. --------------------------------------------------------------------------- Detection Media: Killer 1.26+ Memory: Killer 1.26+ Scanner 1.13+ VProtect 1.07+ Removal Media: Killer 1.26+ Memory: Killer 1.26+ Scanner 1.15+ delete "Image". If there is a "!Spr" file, delete !Run and rename !Spr as !Run, otherwise delete !Boot. --------------------------------------------------------------------------- General Comments: This virus carries no payload, but spreads VERY fast, to the extent that you can delete the file, only to see it instantly re-appear again if it is in memory! It loads its code into the OS workspace, at &5500, it is therefore liable to crash the machine should the OS use that area of workspace. The !Run or !Boot file looks like this: LOAD .IMAGE 5500[0d]GO 5500[0d] It's action on infection is to save .Image, and then either to create a !Boot file if one does not exist, or if it does, rename the !Run file to !Spr and then create a new !Run file. (Sources: Alan Glover, Svlad Cjelli) ########################################################################### Increment =========================================================================== Last Updated: 18th September 1992 Aliases: Origin: UK, Cornwall ? Isolation Date: September 1992 Effective Length: 464 bytes Virus Type: Resident Symptoms: CMOS configuration settings seem to change randomly --------------------------------------------------------------------------- Detection Media: Killer 1.375+ Memory: Killer 1.375+ Scanner 1.49+ Scanner 1.49+ VProtect 1.23+ Removal Media: Killer 1.375+ Memory: Killer 1.375+ --------------------------------------------------------------------------- General Comments: The virus appends itself to existing !boot files. The virus may not be immediately obvious when an infected !boot file is viewed in !Edit because it inserts 28 or more line feeds between the legitimate file and the viral appendage. However CTRL-Down Arrow will move down to the bottom of the file and expose the telltale signs of a machine code appendage on the end of the file. On each infection the virus will increment a CMOS RAM location - the location is incremented too on each infection with the effect of seemingly random problems appearing (including ROM modules becoming unplugged for example). (Source: Alan Glover, with thanks to Lee Davies) ########################################################################### Irqfix =========================================================================== Last Updated: 14th September 1992 Aliases: Origin: United Kingdom Isolation Date: September 1992 Effective Length: 940 bytes Virus Type: Resident task. Stores code as separate file. Symptoms: File "RiscExtRM", "WimpPoll", "OSSystem", "MiscUtil", "FastRom", "IRQFix" or "AppRM" in application directory. Each time the code is executed it grabs 1k of RMA - this will eventually lead to a system crash. --------------------------------------------------------------------------- Detection Media: Killer 1.374+ Memory: Killer 1.374+ Scanner 1.48+ Scanner 1.48+ VProtect 1.22+ Removal Media: Killer 1.374+ Memory: Killer 1.374+ Scanner 1.48+ delete named file, remove extra lines from !Boot. --------------------------------------------------------------------------- General Comments: This is a variant of Extend which uses IRQFix as the module name, and different filenames. In all other respects the code is identical to Extend. (Source: Alan Glover, with thanks to Alex Belton) ########################################################################### Link =========================================================================== Last Updated: 21st April 1992 Aliases: Origin: United Kingdom Isolation Date: January 10th, 1992 Effective Length: 1416 bytes Virus Type: Resident Absolute file infector. Also a Trojan Horse. Symptoms: Module 'BSToDel' in module list. Files are re-stamped. --------------------------------------------------------------------------- Detection Media: Killer 1.27+ Memory: Interferon 2.10+ Scanner 1.03+ Killer 1.27+ Hunter 1.16+ Hunter 1.16+ Scanner 1.20+ Removal Media: Killer 1.27+ Memory: Killer 1.27+ Hunter 1.16+ Inteferon 2.10+ Scanner 1.20+ Hunter 1.16+ Scanner 1.20+ --------------------------------------------------------------------------- General Comments: The reason why I found the Link virus was because of the module 'BSToDel' appearing in the module list. Also, suddenly Killer 1.17 didn't work (It gave an "Integrity check failed" and refused to load)! As I already have made my own 'backspace to delete' utility as a module, I wondered where that module came from! (It certainly wasn't as a separate module on the disc.) Before installing itself as a module, it infects %.Squeeze (if there is a library directory, and if Squeeze is indeed in it) - just in case there wasn't enough room in the RMA. Then it hooks onto the FSControlV and InsV vectors. The latter so that it can do what the module title expects it to do: convert backspace (&08) to delete (&7F) (the reason why I also typed it as a Trojan Horse). The FSControl vector is used so that it can look for certain actions - namely *Run and *Copy. When it detects one of these, it does the following. Replaces the first three instructions in the file with its own, making an absolute branch to the end of the file. The rest of the module is then stored here, with the original three instructions too. To make detection a bit more difficult, it encrypts itself with an EOR variant (different key each time). On any Friday the 13th, it will display the message Message from LINK: Active since 30-Nov-91 every time it infects a program. [As Alan pointed out, this date is fixed, so meaning that it bears no relationship to the time which a system became infected.] The virus does no damage apart from attaching itself to files. Files infected by the Link virus are re-stamped to the date they were infected. Also, at the end of the module (and effectively each infected file - although encrypted) the word 'LINK' appears. I first thought this was used as an 'already infected' flag, but this is not so. What it does is check the second instruction in the file, and if this is 'MOV PC,R0' (probably reckons that few programs have this as their second instruction) it recognizes it as infected. If not, the file is infected. This method of checking the file might add to the difficulty of making an inoculator. Why didn't Interferon detect this virus? At first, I thought that there might be a bug in Interferon, but as I found out, the Link virus checks to see if Interferon is in memory by using OS_Module 18 (look-up module name). By doing this, it also finds where the module code is. Then, it changes a CMP instruction within the code so that Interferon never detects OS_GBPB. After the infection is finished, the Link virus changes the code back to what it was. [I'm working on a CRC routine for a future version of Interferon at the moment, so Interferon should be 100% operational 'real soon now'.] ########################################################################### Mode87 =========================================================================== Last Updated: 11th September 1992 Aliases: Origin: Unknown. UK? Isolation Date: Unknown - possibly autumn 1991 Effective Length: 848 bytes Virus Type: Resident !Boot file infector. Symptoms: Module 'Mode87' in application directories. --------------------------------------------------------------------------- Detection Media: Killer 1.360+ Memory: Killer 1.360+ Scanner 1.41+ Interferon 1.10+ VProtect 1.17+ Removal Media: Killer 1.360+ Memory: Killer 1.360+ Scanner 1.41+ --------------------------------------------------------------------------- General Comments: Mode87 installs itself in the RMA as "BBCEconet". The way to tell the difference from this and the original Acorn network module, is that the address of where the module lies is at &01xxxxxx instead of a ROM address (&03xxxxxx) by typing *Modules. If Acorn's original module is not *Unplugged, it will install itself on top of this, and not easily seen in the module list. Mode87 is not malevolent. Although it destroys the original !Boot file of an application, it is not treated as a virus with serious damage potential. Mode87 simply overwrites any !Boot file already there (and if there isn't one, it creates a new one) with: | Boot file IconSprites .!Sprites RMLoad .Mode87 [00][00][00] Then it proceeds to save itself as a module with the filename "Mode87". If it has reached an infection count of 256, an expanding circle (black, if you are using the standard desktop palette) will "eat" your screen. Control will then return to normal. Mode87 releases its vector claim on OS_FSControl, so it is quite safe to *RMKill it. (Source: Tor Houghton) ########################################################################### Module =========================================================================== Last Updated: 11th September 1992 Aliases: Illegal, ModVir Origin: Unknown Isolation Date: October 1991 Effective Length: 956 bytes Virus Type: Resident module infector. Symptoms: Modules grow by approx. 1k, and are re-datestamped. May cause system crashes when accessing files (load, save, etc. --------------------------------------------------------------------------- Detection Media: Killer 1.17+ Memory: Interferon 2.00+ Hunter 1.00+ Killer 1.17+ Scanner 1.14+ Hunter 1.00+ VProtect 1.10+ Removal Media: Killer 1.26+ Memory: Killer 1.26+ Hunter 1.00+ Hunter 1.00+ Scanner 1.46+ --------------------------------------------------------------------------- General Comments: This is a very nicely written virus which appends itself to modules, redirecting three module entry points to pass through itself before being handed on to the module's original entry point. It spreads by infecting a module as it is loaded, and then the newly loaded module infects the next one loaded, and so on... This virus is likely to be very widespread, since it was distributed on the Archimedes World February 1992 cover disc in the MicroDrive demo (in it, several modules were infected). It does nothing until 6th September 1992, when it will display the message: Your computer has been virus infected. This is intended to be a friendly virus, and hasn't done any damage to your disc as is possible now, but it isn't active anymore from now on. Be more careful with illegal software next time! [Along with a generation counter. Another interesting observation is that it does not infect locked modules. Infects whenever it notices a RUN or LOAD action on a module. As a result, THIS VIRUS IS EXTREMELY CONTAGIOUS.] The message that it isn't active anymore is not true! It ALWAYS (even after 06-Sep-1992) attaches itself to the OS_File (FileV) vector. The virus first calls the previous owner of the OS_File vector (FileSwitch?). This means that the module will be loaded and initialised. If the length of the module minus the initialise word of the module is equal to 956 (i.e. the length of the virus), then the module is already infected and the virus deactivates itself (the newly loaded module has already attached itself to the OS_File vector). If the module isn't infected, the virus attaches itself at the end of the module, overwriting the init/final/service words in the module header, preserving the original 3 words. (Source: Alan Glover, Michel Fasen) ########################################################################### MyMod =========================================================================== Last Updated: 21st April 1992 Aliases: Silicon Herpes Origin: United Kingdom Isolation Date: June-August 1991 Effective Length: 2948 bytes Virus Type: Resident Symptoms: Additional files "SSLM" (filetype Module) and "SSLF" in application directories. Message on every Friday the 13th. Module "MyMod" in module list. --------------------------------------------------------------------------- Detection Media: Killer 1.17+ Memory: Interferon 2.00+ Scanner 1.15+ Killer 1.17+ VProtect 1.10+ Scanner 1.20+ Hunter 1.16+ Hunter 1.16+ Removal Media: Killer 1.17+ Memory: Killer 1.17+ Scanner 1.16+ Hunter 1.16+ Interferon 2.10+ Scanner 1.20+ delete "SSLM", rename "SSLF" to !Boot. --------------------------------------------------------------------------- General Comments: This works by redirecting the Alias$@RunType for Obey files, so spreads very fast. Once on each Friday 13th you'll get this message: Hi there. It's me, with my latest addition to the ARCHIMEDIES range of computer programs. This one's called silicon herpes. It's annoying but DOES NO REAL DAMAGE!!! Anyway, it's Friday the 13th, and what can you expect. Acorn state that RISC OS has high protection against programs of this nature. I can't call it a virus, as a virus does damage With Acorn making these bold statements about RISC OS I decided to write a demonstration to disprove their theories. I must admit though, it was quite difficult. Anyway, I don't want to keep you so I'd like to say, have a very happy Christmas, Easter, Summer or what ever, and hang kickin There's a likelihood of various spurious errors from one of the variants (both are the same length) since it addresses application memory directly! (Source: Alan Glover) ########################################################################### NetManager =========================================================================== Last Updated: 11th September 1992 Aliases: Origin: United Kingdom Isolation Date: June-August 1991 Effective Length: 900 bytes Virus Type: Resident !Boot file infector Symptoms: Module 'NetManager' in module list. --------------------------------------------------------------------------- Detection Media: Killer 1.17+ Memory: Interferon 2.00+ VProtect 1.10+ Killer 1.17+ Scanner 1.40+ Scanner 1.20+ Removal Media: Killer 1.17+ Memory: Killer 1.17 Scanner 1.40+ Scanner 1.20+ Interferon 2.10+ delete !Boot. RMKill NetManager --------------------------------------------------------------------------- General Comments: I believe this to be the prototype for, or maybe the inspiration for, the TrapHandler virus. Although the coding is quite different in places, there's quite a similarity in the design. There are a number of coding errors in the virus, most notably around the time bomb area, making it harmless in this form. The intention of the code is to check for Friday 13th, and display a message, however it will never detonate (... unless there's a fixed version in circulation ... though that's what I believe TrapHandler is). It's fortunate that it never displays the message, because there's another coding error and the message isn't actually there! (Source: Alan Glover) ########################################################################### NetStatus =========================================================================== Last Updated: 21st April 1992 Aliases: Boot Origin: Norway or Belgium Isolation Date: October 1991 Effective Length: 2048 or 2072 bytes Virus Type: Resident !Boot file infector Symptoms: !Boot filelength increase. --------------------------------------------------------------------------- Detection Media: Killer 1.27+ Memory: Interferon 1.10+ Scanner 1.02+ Killer 1.27+ VProtect 1.10+ Scanner 1.20+ Hunter 1.16+ Hunter 1.16+ VirusKill 1.00+ Removal Media: Killer 1.27+ Memory: Killer 1.27+ Scanner 1.17+ Hunter 1.16+ Hunter 1.16+ Interferon 1.10+ Scanner 1.20+ RMKill NetStatus --------------------------------------------------------------------------- General Comments: NetStatus is written as a module, and in many ways it functions exactly the same way as the TrapHandler virus, as it saves all of its code in an application's !Boot file. It differs strongly from from this one, however, as NetStatus does not overwrite the !Boot file. The original !Boot instructions are executed after the virus has been loaded, making it more difficult to spot than TrapHandler. Some times a message will appear (after a mode change): Hello, there. Just a little message. The infection count is: This program is harmless 10 Jun 1991 [This message is encrypted, and will neither show up in memory nor in the infected !Boot file.] One might think that NetStatus should be placed as a 'variant' of TrapHandler, as the way the two viruses work are so similar (both viruses work by loading the !Boot file into memory below &8000 and then jumping to the code). However, seeing that the code itself was so different, I chose to let it have it's own entry. Also, NetStatus infects the !Boot file instead of overwriting it! If you think you might have been infected by this virus, do *Help NetStatus to see if it is version 2.00, and if it is, do a *Modules to check where it resides. If the address is 018xxxxx then you are infected, if not, the address should be 038xxxxx. [This virus has the potential to cause chaos on Econet networks, where it will replace the real NetStatus module - causing anything that relies on it to fail.] Known variant(s) of the NetStatus virus are: NetStatus-2048 This appears to be an earlier version of NetStatus. Some code is missing in this version, but they appear identical in operation. Please note that not many virus killers are aware of both versions. If it understands only one strain, the !Boot file will become corrupt. ########################################################################### Parasite =========================================================================== Last Updated: 21st April 1992 Aliases: Origin: UK, Cheshire? Isolation Date: January 1992 by S. Haeck Effective Length: 6K & 7K Virus Type: Resident application infector, stores code as separate file. Symptoms: Additional modules appearing within applications --------------------------------------------------------------------------- Detection Media: Killer 1.27+ Memory: Killer 1.27+ Scanner 1.23+ Scanner 1.20+ VProtect 1.12+ Removal Media: Killer 1.27+ Memory: Killer 1.27+ --------------------------------------------------------------------------- General Comments: This is a **very** nasty virus. Handle any infections with care! The parasite virus was first discovered by S. Haeck in January 1992. The two strains are identical, except that the first always uses the same name for it's module, and the second has a random choice of 20 (twenty) filenames. It will only activate on machines whose network station number is <80 - which will include non-networked machines, which typically have 0 or 1 in the CMOS. Do NOT try to RMKill the module - a delayed action machine crash will result. It will *wipe any of the following file/directory names - !vkiller, vir, shield, prot and !guardian - this points at a UK origin since it is not aware of Scanner. It has a whole repertoire of dirty tricks, which are time triggered: - Corruption of the net printer name (it uses this as workspace) - Midnight, and xx:13: crash the computer - Before 07:00: crash the computer 300-900 seconds later - 00:00 to 00:59 on 1st Jan: crash the computer - 1st of any month: claim 16K of RMA (not used) - 21st June: set MouseStep to 1 - 21st December: set MouseStep to 127 (fast!) - 29th February: Set MouseStep to -5 (fast, and reversed) - If there is a 0 in the time, and the virus loaded from SCSI:*unplug the Podule Manager (disabling the SCSI disc) - At 0x and x0 seconds, if the module came from IDEFS: alias the IconSprites command so that no further sprites are cached Furthermore, there are some which can be fired at any time: 1 in 50: Change sound settings 1 in 25: Redefine character set to all spaces after 60-240 seconds 1 in 60: Corrupt the disc in drive 0 Lastly, there are a group of serious actions (which are limited so only a certain number occur within a given period): - Before 08:00 (14:00 Sundays): configure number of hard and floppy drives to zero. - Mondays: Configure Fontsize 0K, SpriteSize 512K, which will cripple a 1Mb machine! - 25th December: Configure MonitorType 3, Sync 0 - A 7 in the time: Configure Country to Greece - 1 in 4: Configure ADFS, Harddiscs 2, Drive 5 (very tricky if you don't happen to have two ST506 drives) The module names which it can use are: FontLibrary, CodeLibrary, ScreenObjct, PromptsPick, HPIBIntMngr, PRomModules, BasicCryptr, ChrSelecter, WimpModMake, PaletteUtl2, ModeUtility, FontUtility, TempManager, ColourConvt, IndexReader, ArthurImage, SyncUtility, VIDCManager, FontPalette, HugoFiennes. The first (6435 byte) strain always uses the name FontLibrary. Note that Hugo Fiennes, whose name appears at several points in the code, as well as being one of the module filenames, has much better things to do than write viruses, and has no known connection with this virus! (Source: Alan Glover, with thanks to Geoff Riley for much of the decoding) ########################################################################### Runopt =========================================================================== Last Updated: 25th October 1992 Aliases: Origin: UK Isolation Date: October 1992 Effective Length: 1684 bytes Virus Type: Resident application infector Symptoms: Desktop APPLICATION Task called 'Task Manager'. --------------------------------------------------------------------------- Detection Media: Killer 1.381+ Memory: Killer 1.381+ VProtect 1.24+ Removal Media: Killer 1.381+ Memory: Killer 1.381+ --------------------------------------------------------------------------- General Comments: In a similar manner to Icon, this virus uses a !Boot file to load a BASIC program. The program is called RunOpt!, and is filetyped as data. Note that the real 'Task Manager' shows up as a module task NOT an application task. (Source: Paul Frohock) ########################################################################### Sprite =========================================================================== Last Updated: 21st April 1992 Aliases: 'Really Annoying Sprite Virus' Origin: Germany ? Ireland ? Isolation Date: February 1992 by Svlad Cjelli Effective Length: 720 bytes Virus Type: Resident application infector, stores code as separate file. Symptoms: File "Sprite" and maybe !Str in applications --------------------------------------------------------------------------- Detection Media: Killer 1.27+ Memory: Killer 1.27+ Scanner 1.23+ Removal Media: Killer 1.27+ Memory: Killer 1.27+ delete Sprite, delete !Boot OR delete !Run and rename !Str to !Run (depending whether !Str is present or not). --------------------------------------------------------------------------- General Comments: This has got some similarities with Image, but until I've (Alan) had a chance to do a code comparison, I'm not going to class them as members of the same virus family. In months which begin with an F it will change the pointer settings. As far as I can tell, the parameter block is junk, and it's hard to tell whether the call will return! If it does, a delayed routine is programmed, which when entered will do FX200,3, zero all the CMOS RAM, and display a message. The message is: Piracy IS theft - Your SYSTEM is DOOMED - Deutschland Uber Alles! For people like me who don't know any German, a liberal translation is 'Germany is best'. This is encrypted, so is not usually visible. Important note: Initial reports about this virus suggested that it could cause disc corruption. Aside from possible errors during attempted infections, it does not have any maliciously targetted code for filing systems. Infection is by saving the virus code as 'Sprite' (filetyped as such), and either creating a !Boot, or renaming !Run to !Str and saving a new !Run which runs !Str. (Source: Alan Glover, with thanks to Svlad Cjelli) ########################################################################### SpriteUtils =========================================================================== Last Updated: 11th September 1992 Aliases: Origin: UK Isolation Date: June 1992 Effective Length: 3028 bytes Virus Type: Resident application infector, stores code as separate file. Symptoms: File "Sprutils" appears in applications --------------------------------------------------------------------------- Detection Media: Killer 1.360+ Memory: Killer 1.360+ VProtect 1.17+ Scanner 1.42+ Removal Media: Killer 1.360+ Memory: Killer 1.360+ Scanner 1.42+ --------------------------------------------------------------------------- General Comments: This virus spreads by inserting a line in !run files, loading a trojan SpriteUtils module. It is my opinion that this virus is designed as an enabling tool for further unpleasant activities triggered remotely over a network. My reason for concluding this is that in addition to normal spreading and replication it goes to great pains to alter the Econet Protection setting to enable User Remote Procedure Calls. It intercepts the SWI vectors to process Econet_SetProtection and Econet_ReadProtection to return, and allow modification of, the value which was present when the virus started. It then supports two RPCs, one to turn off all protection, and the other to restore the setting with just RPCs enabled. It also attempts to disable VProtect, and will succeed with earlier versions. However, a new version of VProtect will have no problem in preventing the virus from being loaded in to a clean machine. It has no timed or other malicious contents, however as usual there are some consequences of the way it is written. In particular, it will claim 2K of RMA workspace, and never release it, nor does it restore the Econet protection setting it first found. (Source: Alan Glover) ########################################################################### T2 =========================================================================== Last Updated: 11th September 1992 Aliases: Origin: United Kingdom Isolation Date: July 1992 Effective Length: 4304 bytes Virus Type: Merges with absolute !RunImage files. Symptoms: Messages from "T2" and spurious errors. --------------------------------------------------------------------------- Detection Media: Killer 1.370+ Memory: Killer 1.370+ VProtect 1.20+ Scanner 1.43+ Scanner 1.43+ Removal Media: Killer 1.370+ Memory: Killer 1.370+ --------------------------------------------------------------------------- General Comments: This is a very dangerous virus, which can cause severe data loss if not treated rapidly. On 1st Jan, 14th Feb, 1st May, 4th July, 31st October, 25th December and Friday 13th a message from T2 will be displayed and it will write invalid data to the first 32K of ADFS drives 0-7. On D or E format floppies this will destroy the FS Map and Root Directory, on D format hard discs it will destroy the boot block, FS Map and Root Directory. On E format hard discs, it will destroy the boot block only, since the Free Space map and Root directory are elsewhere on the disc surface. It will also attempt to do the same to Nexus drives 4-7. The messages are: December 25th Yuletide Jollities from T2 A special christmas present: New blank disks all round. 1st January New Year's Resolution from T2 New Year's Resolution: I will keep my disks write protected. 14th February St. Valentine's Day Roses are red, Violets are blue, I've wiped your hard disk, Because I hate you. 1st May Mayday from T2 Mayday, mayday, mayday: your data's sinking. 31st October Spookiness from T2 You've got a vicious virus AND blanked disks - spooky huh? July 4th Independence Day celebrations from T2 You are now fully independent of your saved data. Friday 13th Comiserations from T2 Bad luck, me ol' China. Your disks have kinda left you in the lurch, as it were. Unfortunate, huh? And the random choice ones: Greetings from T2 I hate you. F*ck off and die. Painfully. Comment from T2 You stink of sh*t. Observation from T2 You're a f*cking c*nt. Hi there, from your friendly virus Hi there. You may (or may not) know me. I'm a virus. User meet T2. T2 meet user. Good ... See ya around. It also has a random chance routine, based on a 0.1 second timer, which has various possible effects, including: - A rude message (see above) - Scrambled CMOS memory - Crashing the machine - Destroying disc data (as above) There is not an easy quick check for this virus, since it will not show up as a module or desktop task. The easiest way I can come up with to do the following from BASIC (ensure that VProtect 1.20 or above is NOT loaded to avoid a false alarm). SYS "XOS_ServiceCall",,&C0FFEE TO ,A%:PRINT A% If the number printed is zero, and VProtect 1.20+ is not loaded (or any other anti-virus program aware of this virus) then it is loaded and active. (Source: Alan Glover) ########################################################################### Terminator =========================================================================== Last Updated: 11th September 1992 Aliases: Origin: United Kingdom Isolation Date: July 1992 Effective Length: 3648 bytes Virus Type: Task. Stores code as separate file. Symptoms: Additional files appear in applications (see below) --------------------------------------------------------------------------- Detection Media: Killer 1.372+ Memory: Killer 1.372+ Scanner 1.47+ Removal Media: Killer 1.372+ Memory: Killer 1.372+ delete named file, remove last line from !Boot. --------------------------------------------------------------------------- General Comments: Strictly speaking - this is an Icon variant. However it has been changed sufficiently that it merits its own entry. It can choose one of eight task names, and one of eight different filenames/filetypes to save itself. In other respects it acts and spreads like Icon, though there is 1 in 10 chance of drive zero being wiped on each infection. The task names are : ADFS Filer, RMA Manager, Filer Extension, File Compactor, ADFS Filer (again), MemAlloc, " " and "F*ck off!" (except with no asterisk - you know what I mean...). The filenames and filetypes are: Icon (Sprite), MemAlloc (Module), RunCode (Absolute), ABCLib (Module), CLib (Module), Colours (Modules), FPEmulator (Module) and !DeskBoot (Utility). !Killer patches the virus before removing it to ensure that ADFSFiler is not rmkilled by the virus. (Source: Alan Glover) ########################################################################### Thanatos =========================================================================== Last Updated: 21st April 1992 Aliases: RISCOSext, RISCOS Extensions Origin: United Kingdom Isolation Date: May 1991 Effective Length: 11756 or 11764 bytes Virus Type: Task. Stores code as separate file. Symptoms: Files "RISCOSext" and "TaskAlloc" in application directories. Wimp task "Thanatos" visible in the Task Manager. --------------------------------------------------------------------------- Detection Media: Killer 1.17+ Memory: Killer 1.17+ Scanner 1.23+ VProtect 1.10+ Removal Media: Killer 1.17+ Memory: Killer 1.17+ delete named files --------------------------------------------------------------------------- General Comments: This is an encrypted (simple EOR with &7A, lower-case "z") BASIC program (crypted = 11756 bytes long, TOP-PAGE of BASIC program = 7660 bytes) called "RISCOSext" with a filetype of Absolute (yes, a very poor piece of ARM code decrypts and runs it and wastes nearly 4K of space between &8100 and &9000 !). Associated with it is a Sprite file (actually of filetype Module) called "TaskAlloc", which is 344 bytes long containing a rude sprite to replace the mouse pointer. When run, it installs itself as a Wimp task named "Thanatos" and then looks for double-clicks to infect application directories (copies the RISCOSext and TaskAlloc files into there and then appends the 'usual' string to the !Boot file (to run RISCOSext). The nasty section of the Thanatos Virus REALLY IS nasty, so I urge you to study this carefully. Rough once every 100000 times around the Wimp_Poll loop, Thanatos can: * 2 out of 13 chancesShut down icon bar application at random (whilst displaying its own icon bar icon during the shutdown). * 1 out of 13 chancesCause a Desktop Quit. * 3 out of 13 chancesReverse the mouse pointer step (sets it -2). * 1 out of 13 chancesCrash the machine by poking a duff instruction at the start of memory. * 1 out of 13 chancesRandomise the 240 bytes of CMOS. [If this happens, you may have to either short or remove the battery from your machine, as it might refuse to boot.] * 4 out of 13 chancesRandomly display one of 8 very rude messages - one of which also changes the mouse pointer shape to a rude graphic and another will also shutdown an icon bar application (the same routine as above). * 1 out of 13 chancesWipe the contents of . It also has a "special date" section as follows: Any Friday 13th: Advertises its own "virus killer" (from Armen Software). April 1st10 Address exception errors, followed by coloured rectangles and a 'stuck' mouse pointer for 10 seconds. An "April Fool" message is then displayed. December 25th: Destroys the disk map of ADFS drives 0, 4 and 5 followed by a "Merry Crimble" message. October 31st:Formats the floppy in drive 0, followed by a "Spooky" message. January 1st: As December 25th, but followed by a New Year's Resolution message (to keep your disks write-protected...). [ The 11764 byte variant is functionally identical, but a slightly earlier version ] (Source: Richard K. Lloyd) [Attempting to kill Thanatos by clicking 'Quit' in the Task Manager will not work. However, Killer and VKiller will patch the missing closedown code into the virus before removing it from memory.] ########################################################################### TrapHandler =========================================================================== Last Updated: 21st April 1992 Aliases: Origin: United Kingdom Isolation Date: September 1991 Effective Length: 924 bytes Virus Type: Resident !Boot file infector. Overwrites original !Boot file completely (or creates a new one if it doesn't find one) and stores own code here. Symptoms: Applications which depend on a !Boot file fail to run (i.e. if the !System !Boot file was overwritten, !Edit would fail to run due to the fact that the !System folder hasn't been seen. The same applies if the !Boot file in the Fonts directory is overwritten. The module 'TrapHandler'is present in the module list. --------------------------------------------------------------------------- Detection Media: Killer 1.17+ Memory: Interferon 2.00+ Scanner 1.03+ Killer 1.17+ VProtect 1.10+ Scanner 1.23+ Removal Media: Killer 1.17+ Memory: Killer 1.17+ Scanner 1.03+ Interferon 2.10+ delete !boot file Scanner 1.20+ RMKill TrapHandler --------------------------------------------------------------------------- General Comments: The TrapHandler virus is written as a module which infects application directories by overwriting the !Boot file with its own code. By hooking onto the FSControl vector, it looks for a *Run action, and on finding one (eg. the user opens a directory with applications, and if any of these contain a !Boot file (which RISC OS automatically executes)), TrapHandler overwrites the application's !Boot file with its own code. This code is loaded into memory by using a simple *LOAD .!Boot
and then executing the code at
. On any Friday after the 20th of any month it will open a regular message box (i.e. using Wimp_ReportError) with the number of infections in the header, and an 'Ignorance will be your undoing.' This message is rather misleading, as the only destructive thing it does is overwrite your !Boot files (although it could - as all viruses can - be modified to do much nastier things). I might sound a bit trivial here - if your $.!Boot on the harddisc was overwritten, you might get a bit more than annoyed(!). However, as this !Boot file only gets run when you reset your machine, it is not very likely to get infected by this virus (unless you accidentally double-click on it or run it). ########################################################################### Valid =========================================================================== Last Updated: 21st April 1992 Aliases: Origin: Unknown Isolation Date: March 4, 1992 by Atle M. Bårdholt Effective Length: 1389 bytes Virus Type: Non-resident application infector, stores code as separate file. Symptoms: Files "Valid" and "Source" in application directories. --------------------------------------------------------------------------- Detection Media: Killer 1.30+ Memory: n/a Scanner 1.23+ VProtect 1.13+ Removal Media: Killer 1.30+ Memory: n/a Scanner 1.23+ delete !Run and "Source". Rename "Valid" to !Run. --------------------------------------------------------------------------- General Comments: Valid is a non-resident virus written in BASIC which works by renaming the !Run file of the application to "Valid", then saving itself as a file called "Source" and creating a new !Run file which points to the virus code. Both have correct filetypes (e.g. Obey and BASIC). In its current form it can hardly spread far. It surprises me that it was even released at all. Due to a major flaw in the code, Valid creates faulty !Run files every time it infects - effectively rendering the application non-executable - making it easy to detect that something is wrong. It is assumed, however, that this is fixed in other or newer versions (the incore filename of the BASIC file is "Source2"), as it is a very simple thing to do something about it. (This version keeps the first 21 chars of the orginal !Run file instead of making a new one.) On floppy based systems this virus causes a noticeable slowdown when it infects an application, as it uses the OSCLI command EnumDir to create a list of applications to infect. This list is saved as a file (as a result of EnumDir), and then loaded into some reserved memory. When the processing of this data is finished, the file is deleted. Valid never infects an application twice, as it checks to see if there's an "our" in the first line (part of RUN .Source) of the !Run file. Also, it is not certain it will infect a given application - there's only a 30% chance (determined by RND(10)>7) of this happening. Valid does little besides replicate (if it had worked properly), but does create a 0 byte file called "Infected!" in the application directory after any 22nd in any month. ########################################################################### Vigay =========================================================================== Last Updated: 21st April 1992 Aliases: DataDQM, Shakes Origin: United Kingdom Isolation Date: Probably April 1991 Effective Length: 2311 or 2432 bytes Virus Type: Task. Stores code as separate file. Symptoms: File "DataDQM" in application directories. The Task "TaskManager" in the Task Manager window. --------------------------------------------------------------------------- Detection Media: Killer 1.17+ Memory: Killer 1.17+ Scanner 1.23+ VProtect 1.10+ Removal Media: Killer 1.17+ Memory: Killer 1.17+ delete !Boot and file. --------------------------------------------------------------------------- General Comments: This is a BASIC program called "datadqm" with an associated 97-byte !Boot file. The REMs at the start of the program are as follows: REM (C)1989 PAUL VIGAY REM REM A nasty little Archie Virus !! REM ... or is something up with your monitor ??? REM REM version 1.1a (24th October 1989) Hence you now know why it's called the "Vigay Virus" - the author's name appears as a comment at the start! When first run, it initialises as a Wimp task called "TaskManager" and then waits for either: 1) a chance of (500 * hours left of a Thursday) to 1 to crop up to spark off a silly "wobble" demo (wobbles the screen and mouse pointer). Yes, this demo only appears on a Thursday and more frequently as the day wears on. or, 2) a file/directory double-click, in which case it attempts to replicate itself to the first application directory at that level that doesn't already have either an "!Boot" or a DataDQM" file. (Source: Richard K. Lloyd) [Apparently there are several versions existing (but apparently not circlulating), some activating on Fridays, others on Friday the 13th. It is not known whether these Friday versions broke loose, and later variants were also compiled using the Archimedes BASIC Compiler by DABS Press. We are still speculating if any of these are available to the general public. Also, it is worth clarifying that the 'TaskManager' will appear as an application task, unlike the real Task Manager which is a module task.] ########################################################################### Virus Detection Utilities --------------------------------------------------------------------------- (Note: only this programs which are still believed to be regularly updated are included here) Guardian: © Paul Vigay. Latest version known is !Guardian3 3.09 (14th Oct-1992). Multitasking application which keeps an eye on tasks and also has virus scanner/removal capabilities. IMPORTANT NOTE: At various places in the application it claims to remove all known viruses, and to be "equal, if not better, in spec than !Killer". Both these claims are clearly false (the current version of !Guardian only deals with five viruses - including his own (Vigay)). Handle the software, and the author's claims, with care. Hunter: © Michel Fasen. Latest version known is 1.16/9 (17-Feb-1992). Multitasking application. Nice touch by using the Interface manager. Not RISC OS 3 compatible. Public Domain. Interferon: © Tor O. Houghton. Latest known version is 2.12 (13-Mar-1992). Resident program which looks for transfer of data to disc from areas below &8000, and from the RMA (e.g. most viruses which are written as modules, for example). Public Domain. Killer: © Pineapple Software Ltd. Written by Alan Glover of Acorn Computers Ltd. Latest version known is 1.381 (25-Oct-1992). Multi-tasking scanner/disinfectant. Currently, this application is the one which detects and removes all known viruses on the Archimedes. Very user friendly interface, lots of useful options, includes a nice window with look-up virus information. Commercial product. Scanner: © Tor O. Houghton. Latest version known is 1.51 (Oct-1992). A non-WIMP application which detects and removes the most common viruses. Commercial software, available direct from the author. VProtect: © Pineapple Software Ltd. Written by Alan Glover of Acorn Computers Ltd. Latest version known is 1.24 (25-Oct-1992). Resident program which, amongst other things, checks !Run and !Boot and module files for infection before running them. Supplied with !Killer. As you can see, there are several virus utilities mentioned in section 3.0. For all of you who have written a virus utility and want it to appear with correct information concerning version numbers, and what it can detect and remove etc., could you please send your latest version to one of the previously mentioned addresses. This document exists in three parallel forms. Versions suffixed 'p' are the Impression version (primarily maintained by Tor Houghton), and those suffixed 'h' use the Binary Star !Clearview PD reader application to present a hypertext document. Updates to the document may be sent to either author, and both versions will get updated. The text version (suffixed 't') is derived from the Cleariew version. There is also an experimental vb version. Also, could you please include a note on what the program/virus does? Some help files we have seen have been very vague. All this information is based on our own reactions, and may well be incorrect in some parts. If you don't like it, send us some information (not too verbose). ########################################################################### Acknowledgements & Credits --------------------------------------------------------------------------- This list contains some of the many people who have helped in the preparation and updating of this document. Despite their best efforts, there are undoubtably some errors - which are wholly our own work :-). Simon Burrows: Additional virus documentation. Svlad Cjelli: Additional virus documentation. Michel Fasen: Additional virus documentation. Eivind Hagen: For letting me borrow Impression of him! Bjørn Hotvedt: For keeping up with the never-ending postings to and from Alan (and other people!). Richard K. Lloyd: For documentation on the older viruses. Terje Slettebø: For help with the disassembly of the NetStatus virus. Paul Frohock: For help and information long before !Killer saw light of day (and still going strong :-) )! The following pieces of software are amongst those I (Alan) use for virus analysis - my thanks to those in the list below who have added changes etc at my request or helped in other ways (you know who you are...). !QZap - Kevin Quinn (PD Desktop Disassembler) !Dissi - John Tytgat (Registered version - Desktop Disassembler/Source generator) !DeskEdit - RISC Developments (!Edit, with many useful additions) !Snoop - DT Software (Desktop examination tool) !QDBug - Vertical Twist/QDE (Powerful Debugger/Monitor) !Detour - Electronic Solutions (Path control utility) ########################################################################### Contacting the authors --------------------------------------------------------------------------- POST: Tor Houghton Alan Glover 17K Park Village PO Box 459 University of Sussex Cambridge Falmer CB1 4QB Brighton UK BN1 9RD UK EMAIL: Tor O. Houghton: torh@cogs.susx.ac.uk Alan Glover: aglover@acorn.co.uk BBS: The World of Cryton(+44) (0)749 670030 or (+44) (0)749 679794 Tor O. Houghton: #121 Alan Glover: #6 Arcade (+44) (0)81 654 2212 Alan Glover: #244 Excelsior! (M)BBS (+47) (0)2 84 63 79 Tor O. Houghton: Tor Houghton (Note: Tor is presently unable to call BBSs, and I do not call very often at the moment - use another means to contact either of us). FAX: Alan Glover (+44) (0)223 415222 Acorn Computers Ltd. (+44) (0)223 254264 Pineapple Software (+44) (0)81 598 2343 TELEPHONE: Pineapple Software (+44) (0)81 599 1476 Acorn Computers Ltd. (+44) (0)223 254254 ########################################################################### Checklist --------------------------------------------------------------------------- (last change 25/10/92) Click on the name of the virus to read more about it. Media Memory Virus Utility D R D R Archie Guardian Y N ? ? Killer Y Y Y Y Scanner Y N N N Arcuebus Killer Y Y Y Y BBCEconet Killer Y Y Y Y Scanner Y N Y Y Interferon N N Y N Bigfoot Killer Y Y Y Y Scanner Y N N N CeBIT Hunter Y Y Y Y Interferon N N Y Y Killer Y Y Y Y Scanner Y N Y N Code Killer Y Y Y Y Scanner Y Y N N Extend Guardian Y ? Y ? Hunter Y Y N N Interferon N N Y N Killer Y Y Y Y Scanner Y N Y N Funky Killer Y Y Y Y Garfield_I Killer Y Y Y Y Scanner Y Y Y Y Interferon N N Y N Garfield_W Killer Y Y Y Y Scanner Y Y Y Y Interferon N N Y N Handler Killer Y Y Y Y Icon Hunter ! ! N N IVSearch ! ! ? ? Killer Y Y Y Y Scanner Y Y N N Image Killer Y Y Y Y Scanner Y N Y Y Increment Killer Y Y Y Y Scanner Y N Y N IRQFix Killer Y Y Y Y Scanner Y Y N N Link Hunter Y Y Y Y Interferon N N Y Y Killer Y Y Y Y Scanner Y Y Y Y Mode87 Killer Y Y Y Y Scanner Y Y N N Interferon N N Y N Module Guardian Y Y ? ? Hunter Y Y Y Y Interferon N N Y N Killer Y Y Y Y Scanner Y Y N N MyMod Hunter Y Y Y Y Interferon N N Y Y Killer Y Y Y Y Scanner Y Y Y Y NetManager Guardian ? ? ? ? Interferon N N Y Y Killer Y Y Y Y Scanner Y Y Y Y NetStatus Hunter ! ! Y Y Interferon N N Y Y Killer Y Y Y Y Scanner Y Y Y Y VirusKill Y Y ? ? Parasite* Killer Y Y Y Y Scanner Y N Y N Runopt Killer Y Y Y Y Sprite* Killer Y Y Y Y Scanner Y N N N SpriteUtils Killer Y Y Y Y Scanner Y Y N N T2 Killer Y Y Y Y Scanner Y N N Y Terminator* Killer Y Y Y Y Scanner Y N N N Thanatos* Hunter Y Y N N Killer Y Y Y Y Scanner Y N N N Traphandler Hunter Y Y Y Y Interferon N N Y Y Killer Y Y Y Y Scanner Y Y Y Y Valid Killer Y Y na na Scanner Y Y na na Vigay Guardian Y Y ? ? Killer Y Y Y Y Scanner Y N N N ? Refers to cases where the documentation fails to explain exactly what it does with the virus. ! Special cases (e.g. some killers might not detect all variants of a virus), refer to the separate virus entries in this document for details. na Not applicable, typically a virus which does not reside in memory. ########################################################################### Quick Checks --------------------------------------------------------------------------- (last change 25/10/92) Click on the virus name to read more about it. Archie - Attacks absolute (filetype &FF8) files. Arcuebus - Installs a false NetStatus module (3.07). BBCEconet - Attacks absolute files, encrypting part of them. Loads trojan BBCEconet module. Bigfoot - Desktop task called 'bigfoot', file with randomly chosen name in capitals (BASIC file). CeBIT - Attacks applications. File "TlodMod" in app. directory. Module "TlodMod" in module list. Code - Desktop task called 'Window Manager'. Applications may 'lose' their sprites. Extend - Attacks applications. Files "MonitorRM", "CheckMod", "ExtendRM", "OSextend", ColourRM", "Fastmod", "CodeRM" or "MemRM" in app. directory . Module "Extend" in module list. Funky - Desktop task called 'Window Dude'. Garfield_I - Creates application called !Pic, loads a module called IconManager. Garfield_W - Creates application called !Obey, loads a module called WimpAIDS. Handler - Creates an application task called 'Task Handler'. Icon - Attacks applications. Files "Icon", "Poison" or "NewVirus" in app. directories. Nameless WIMP task in the Task Manager. Image - Attacks applications. Files "Image" and "!Spr" in app. directory. Increment - Attacks applications. Appends to !Boot - look for 'load .!boot 8000' towards the end of the !Boot. Irqfix - Attacks applications. Files "RiscExtRM", "WimpPoll", "OSSsystem", "MiscUtil", "FastRom", "IRQFix" or "AppRM in app. directory. Module "Irqfix" in module list. Link - Attacks absolute (filetype &FF8) files. Module "BSToDel" in module list. Infected files are re-stamped. Mode87 - Loads a module called BBCEconet (replacing the real one). Overwrites !Boot files. Module - Attacks modules. Infected modules are re-stamped. MyMod - Attacks applications. Files "SSLM" and "SSLF" in app. directories. Module "MyMod" in module list. NetManager - Attacks !Boot files. Module "NetManager" in module list. NetStatus - Attacks !Boot files. Module "NetStatus" in module list (at offset &018xxxxx). Ensure the program you use understands both strains of this virus! Killer and Scanner do. See also Arcuebus. Parasite - Attacks applications. Random of 20 filename choices for the code carrier. RunOpt - Starts an APPLICATION task called 'Task Manager' Sprite - Attacks applications. Files "Sprite" and "!Str" in app. directories. SpriteUtils - Attacks applications. File SprUtils saved in applications. Loads from !run. T2 - Attacks !RunImage files of type &FF8. Files grow by about 4K. See entry for details. Terminator - An Icon variant which uses varied file/task names. Extra files appear in directories. Thanatos - Attacks applications. Files "RISCOSext" and "TaskAlloc" in app. directory. "Thanatos" visible in the Task Manager. TrapHandler - Attacks !Boot files. Module "TrapHandler" in module list. Valid - Attacks applications. Files "Valid" and "Source" in app. directory. Vigay - Attacks applications. File "DataDQM" in app. directories. WIMP task named "TaskManager" in the Task Manager. ########################################################################### Calendar --------------------------------------------------------------------------- A number of viruses have messages which are programmed to be displayed on a given day or dates. Some are specific dates (eg 4th July) others are less specific such as the first monday of the month, or Friday 13th. This section is subdivided into months, for the viruses with specific dates and messages which could occur in any suitable month. To read more about a particular virus mentioned in this section click on the virus name (which will be underlined). January February March April May June July August September October November December Any ########################################################################### January --------------------------------------------------------------------------- Date Virus Message/Action 1st Parasite Crashes computer before 01:00 1st T2 New Year's Resolution from T2... 1st Thanatos Suggested new-year's resolution... ########################################################################### February --------------------------------------------------------------------------- Date Virus Message/Action 14th T2 St. Valentine's Day Roses are red, Violets are blue... 29th Parasite Set Mouse step rate to -5 (fast & reversed) ########################################################################### March --------------------------------------------------------------------------- Date Virus Message/Action 15th Bigfoot This is a HOLD UP! Give me all the PD software... ########################################################################### April --------------------------------------------------------------------------- Date Virus Message/Action 1st BBCEconet E.T. phones home! 1st Thanatos Address Exception at &0863FB3C ########################################################################### May --------------------------------------------------------------------------- Date Virus Message/Action 1st T2 Mayday from T2... ########################################################################### June --------------------------------------------------------------------------- Date Virus Message/Action 21st Parasite Set Mouse step rate to 1 (slow) 25th BBCEconet Ph'nglui mglw'nafh Chtulhu... ########################################################################### July --------------------------------------------------------------------------- Date Virus Message/Action 4th T2 Independence Day celebrations from T2... 4th Bigfoot Hay there its the 4th of July... ########################################################################### August --------------------------------------------------------------------------- Date Virus Message/Action No viruses are known which display messages specifically during this month. ########################################################################### September --------------------------------------------------------------------------- Date Virus Message/Action 6th (1992) Module Your computer has been virus infected... ########################################################################### October --------------------------------------------------------------------------- Date Virus Message/Action 31st T2 Spookiness from T2... 31st Thanatos Your disk's been formatted without you asking... ########################################################################### November --------------------------------------------------------------------------- Date Virus Message/Action 5th Bigfoot Wizz Bang! Its Guyfalks night... ########################################################################### December --------------------------------------------------------------------------- Date Virus Message/Action 21st Parasite Set Mouse step rate to 127 (very fast) 21st Parasite Change MonitorType and Sync settings 25th BBCEconet Merry Christmas! 25th Bigfoot Happy Christmas from BigFoot ... The VIRUS 25th T2 Yuletide Jollities from T2... 25th Thanatos Merry Chrimble! Hope you liked your pressy... ########################################################################### Any Month --------------------------------------------------------------------------- Date Virus Message/Action 13th Archie Hehe ArchieVirus strikes again Friday 13th Link Message from LINK: Active since 30-Nov-91 Friday 13th BBCEconet It's Friday! Why are you working.... Friday 13th MyMod Hi there. It's me, with my latest addition... Friday 13th T2 Comiserations from T2... Friday >20thTraphandler Ignorance will be your undoing First MondayGarfield_I The Garfield Virus is here to stay First MondayGarfield_I Don't you just hate Mondays? First MondayGarfield_W The Garfield Virus is here to stay First MondayGarfield_W Don't you just hate Mondays? Any ThursdayVigay Screen wobbles up/down ########################################################################### Index --------------------------------------------------------------------------- Introduction Introduction Abstract Virus Index Index to known viruses Virus Detection Utilities Acknowledgements & Credits Contacting the authors Checklist Quick Checks Calendar Index of virus names and aliases: Archie Arcuebus BBCEconet Bigfoot Boot CeBIT Code DataDQM Extend Filer FF8 Funky Garfield_I Garfield_W Handler Icon Icon-A Illegal Image Increment IRQFix Link Mode87 Module ModVir MyMod NetManager NetStatus Newvirus Parasite Poison RISCOSExt Runopt Shakes Sicarius Silicon Herpes Sprite SpriteUtils T2 Terminator Thanatos Traphandler Valid Vigay