TIP: Click on subject to list as thread! ANSI
echo: virus_info
to: ANGELO BRANCADORO
from: MIKA LINDBLAD
date: 1997-12-03 18:24:00
subject: Tentacle

Quoting the inspirational words of Angelo Brancadoro.
 AB> Does anyone have any info on the tentacle virus?
I found this from F-Prot.
--
Name: Tentacle
Alias: Win.Tentacle
Type: Non-resident  EXE-files
Size: 1958
This Windows-based virus was found in the wild from France and UK in March 
1996. The virus was distributed in a file called dogzcode.zip via the 
alt.cracks usenet newsgroup. Tentacle infects Windows 3.1x EXE files.
Tentacle infects files in the current and Windows directories. It does not 
stay memory resident.
Occasionally, Tentacle will replace the icon in the infected EXE file with 
it's own copy. This new icon has a picture of a tentacle and the text 
'Tentacle'. Tentacle also sometimes corrupts EXE files when infecting them. 
Such program do not work after the infection.
The author of this virus also wrote the Shell (Tentacle II) virus. See: Shell
Description: Mikko Hypponen, Data Fellows Ltd's F-PROT Pro Support Copyright 
(c) 1989-1997, Frisk Software International
--
ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ                                              Ú¿
³E-mail : mig@tbf.bbbs.eu.org          Fidonet : 2:222/50            ³
³Infernal BBBS, ~Inferno WHQ~, +358-(0)2-7318157                     ³
ÀÙ                                              ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ
... Do programmers GOTO school?
--- BBBS/2 v3.33 How
---------------
* Origin: tbf://email.messages.files.doors.etc/ (2:222/50)

SOURCE: echomail via exec-pc

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.