Clone 2.0 Virus

 Virus Name:  Clone 2.0 
 V Status:    Rare 
 Discovery:   September, 1993 
 Symptoms:    Hidden .COM files created; system hangs when executing .EXE 
              programs; TSR 
 Origin:      Australia 
 Eff Length:  833 Bytes 
 Type Code:   SRsE - Spawning Resident .EXE Infector 
 Detection Method:  AVTK, Sweep, F-Prot, ViruScan, IBMAV, 
                    NAV, NAVDX, VAlert, ChAV, 
                    Sweep/N, NShld, AVTK/N, IBMAV/N, Innoc, NAV/N 
 Removal Instructions:  Delete infected files 
 General Comments: 
       The Clone 2.0 virus was received in September, 1993, and is from 
       Australia.  It is a memory resident spawning or companion virus. 
       When the first Clone 2.0 infected program is executed, this virus 
       will install itself as a low system memory TSR of 2,048 bytes. 
       Interrupt 21 will be hooked by the virus in memory. 
       One the virus is memory resident, it will infect .EXE programs 
       when they are executed or opened by creating a hidden .COM file 
       with the same base file name.  The hidden companion file will have 
       a file length of 833 bytes and its file date and time will be the 
       system date and time when it was created.  The following text 
       strings can be found in all of the companion files: 
               "Your PC is Cloned!!" 
               "Clone Virus ver 2.0..(c) Cataclysm 1992 Sydney, 
                Australia....To Create and Mutate..." 
               ".EXE .COM LOVEV20.EXE" 
       System hangs frequently occur when infected programs are executed. 

Show viruses from discovered during that infect .

Main Page