�����������������������������Ŀ
                   �        VIRUS REPORT         �
                   �          Lehigh-2           �
                   �������������������������������

Host Machine: PC compatibles.

Host Files: Remains resident. Infects COMMAND.COM only.

Increase in Size of Infected Files: overwrites files.

Nature of Damage: Corrupts program or overlay files. Overwrites the FAT
and boot sector after infecting four floppies.

Detected by: Scanv56+, F-Prot, IBM Scan, Pro-Scan.

Removed by: CleanUp, or use MDisk and replace COMMAND.COM with a clean
copy, or use F-Prot.

Derived from: Lehigh virus.

Scan Code: 50 53 80 FC 4B 74 08 80 FC 4E 74 03 E9 77 01 8B DA 80 7F 01 3A
75 05 8A 07 EB 07.

    A version of the Lehigh virus modified to retain its infection
counter in RAM. After 10 infections, it corrupts the boot sector and
FATs.


��������������������������������������������������������������������ͻ
�  This document was adapted from the book "Computer Viruses",       �
�  which is copyright and distributed by the National Computer       �
�  Security Association. It contains information compiled from       �
�  many sources. To the best of our knowledge, all information       �
�  presented here is accurate.                                       �
�                                                                    �
�  Please send any updates or corrections to the NCSA, Suite 309,    �
�  4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS  �
�  and upload the information: (202) 364-1304. Or call us voice at   �
�  (202) 364-8252. This version was produced May 22, 1990.           �
�                                                                    �
�  The NCSA is a non-profit organization dedicated to improving      �
�  computer security. Membership in the association is just $45 per  �
�  year. Copies of the book "Computer Viruses", which provides       �
�  detailed information on over 145 viruses, can be obtained from    �
�  the NCSA. Member price: $44; non-member price: $55.               �
�                                                                    �
�            The document is copyright (c) 1990 NCSA.                �
�                                                                    �
�  This document may be distributed in any format, providing         �
�  this message is not removed or altered.                           �
��������������������������������������������������������������������ͼ

Downloaded From P-80 International Information Systems 304-744-2253