310 Virus

 Virus Name:  310 
 Aliases:     DM.310 
 V Status:    Rare 
 Discovery:   January, 1992 
 Symptoms:    .COM file growth; write protect errors 
 Origin:      Unknown 
 Eff Length:  310 Bytes 
 Type Code:   PRaCK - Parasitic Resident .COM Infector 
 Detection Method:  Sweep, ViruScan, F-Prot, AVTK, NAVDX, 
                    NAV, IBMAV, VAlert, PCScan, ChAV, 
                    NShld, LProt, Sweep/N, Innoc, NProt, AVTK/N, NAV/N, 
 Removal Instructions:  Delete infected files 
 General Comments: 
       The 310 virus was received in January, 1992.  Its origin is unknown. 
       This virus is a memory resident infector of .COM programs, including 
       The first time a program infected with 310 is executed, the 310 
       virus will install itself memory resident in available free memory, 
       hooking interrupts 21 and 63 in the interrupt area.  There will be 
       no change to total system and available free memory as indicated by 
       the DOS CHKDSK program. 
       Once the 310 virus is memory resident, it will infect .COM programs 
       when they are executed.  If COMMAND.COM is executed, it will become 
       infected.  Programs infected with the 310 virus will have a file 
       length increase of 310 bytes with the virus being located at the end 
       of the infected file.  The program's date and time in the DOS disk 
       directory listing will not have been altered. 
       Systems infected with the 310 virus will notice that attempts to 
       execute programs from write protected diskettes will result in a 
       write protect error message being displayed by DOS.  This occurs 
       because the virus doesn't check for the error and properly handle 

Show viruses from discovered during that infect .

Main Page