1. Skip to navigation
  2. Skip to content
  3. Skip to sidebar







This simple virus is written in BASIC.

The virus speads by adding a copy of itself to ZIP and ARJ archives as README.EXE file. When README.EXE is executed the virus searches for more ZIP and ARJ archives on the disk and writes a copy of itself to them.

Disinfection & Removal

Automatic Disinfection

Allow F-Secure Anti-Virus to disinfect the relevant files.

For more general information on disinfection, please see Removal Instructions.

Technical Details

The virus uses DOS commands 'DIR \*.ARJ /S /B >>ARJ.DAT' and 'DIR \*.ZIP /S /B >>ZIP.DAT' to create lists of ZIP and ARJ archives that are available on the hard disk. The virus uses archive names from these list files to create a command line for calling the archivers: for ARJ its: 'ARJ a <archive name> README.EXE>>NULL' and for PKZIP its: 'PKZIP <archive name> README.EXE>>NULL'. The virus will not infect archives if ARJ.EXE or PKZIP.EXE are not present.

To block output to the screen from ARJ and PKZIP the virus redirects screen output to NULL device. The ARJ.DAT and ZIP.DAT files are deleted before the virus returns control to the system by using DOS commands: 'DEL ARJ.DAT>>NULL' and 'DEL ZIP.DAT>>NULL'.

When README.EXE is run, it displays several messages on the screen like 'Decompressing video drivers' or 'Decompressing sound files' and a progress indicator. During that time the virus infects all available archives. When the virus returns control to the system it displays a message:

Eh He He He v1.0 (2)

The number in brackets could change.

Technical Details: Alexey Podrezov, F-Secure

Submit a sample

Wondering if a file or URL is malicious? Submit a sample to our Lab for analysis via the Sample Analysis System (SAS)

Give And Get Advice

Give advice. Get advice. Share the knowledge on our free discussion forum.