While infecting a file the virus accesses DOS functions (INT 21h). To do
that it creates and runs two temporary COM files – saves their hexadecimal
dump to disk and converts it to binary file by using DEBUG (if there are no
DEBUG in PATH, the virus may corrupt the files while infecting them).
|Find out the statistics of the threats spreading in your region|