%%File: VIRS0814.TXT %%Name/Aliases: Voronezh, Voronezh B, Voronezh-1600 %%Platform: PC/MS-DOS %%Type: Program., %%Disk Location: COM application., EXE application. %%Features: Direct acting. %%Damage: Corrupts a program or overlay files. %%Size: %%See Also: %%Notes: Voronezh-1600 places a Far CALL to its body at the EXE file's entry point This virus does not change the file entry point, as does Leapfrog and Brainy