Path: utzoo!attcan!uunet!cs.utexas.edu!csd4.milw.wisc.edu!uakari.primate.wisc.edu!indri!polyslo!vlsi3b15!vax1.cc.lehigh.edu!sei.cmu.edu!krvw From: CHESS@YKTVMV.BITNET (David M. Chess) Newsgroups: comp.virus Subject: DataCrime II - tiny clarification (PC) Message-ID: <0002.8908101123.AA06574@ge.sei.cmu.edu> Date: 9 Aug 89 00:00:00 GMT Sender: Virus Discussion List Lines: 12 Approved: krvw@sei.cmu.edu Alan Roberts is basically right about the oddness of the "DataCrime II"s self-degarbling code. One small point (just so we don't get too impressed with these virus-writers): while the trick that Alan refers to does prevent the virus from degarbling itself if you single-step through it, it's still trivial to disassemble; just set a breakpoint right after the degarbling loop (there's even one clear byte there to make it easy!), and let it run until then. The virus writer was probably trying to show off, and no doubt thinks him/her/itself very clever, but in fact the trick added about 90 seconds to the time required to analyze the virus, and was hardly worth the effort... DC