Dada Virus
Damage Virus
Danny Virus
Dark Apocalypse Virus
Dark Avenger Virus
Dark End Virus
Darth Vader II Virus
Darth Vader III Virus
Darth Vader Virus
Data Rape 2.0 Virus
Data Rape 2.3 Virus
Datacrime II-B Virus
Datacrime Virus
Datacrime-2 Virus
DataLock Virus
Datos Virus
Davis Virus
Day10 Virus
DBASE Virus
Death Hog Virus
Death Virus
Deceide 2 Virus
Dedicated Virus
Define Virus
Deicide Virus
Demolition Virus
Demon Virus
Den Zuk Virus
Dennis Virus
Deranged Virus
Dest1-2 Virus
Dest3 Virus
Destructor Virus
Devil's Dance Virus
Dial Virus
Diamond-RS Virus
Diarrhea 4 Virus
Digger Virus
Dima Virus
Diogenes Virus
Dir II var Virus
Dir Virus Virus
Dir-2 910 Virus
Dir-2/CD 1x Virus
Disk Killer Virus
Dismember Virus
Dk2 Virus
DM Virus
DM-330 Virus
DM-B Virus
Do Nothing Virus
Dodo 2456 Virus
Dodo Virus
Doodle Virus
Doom II Virus
Dorn Virus
Dos 7 Virus
DOS3 Virus
Dos7-B Virus
Dos7-C Virus
Dose-A Virus
Dot Killer Virus
Dot-789 Virus
Dot-801 Virus
Dr. Qumak2 Virus
The Dada Virus is a computer virus which infects .EXE files.
The virus is loaded into memory by executing an infected program and then affects the computer's runtime operation and corrupts program or overlay files and data files.
The Damage Virus is a computer virus which infects .COM, .EXE and overlay files including COMMAND.COM.
The virus is loaded into memory by executing an infected program and then affects the computer's runtime operation and corrupts program or overlay files and data files.
The Danny Virus is an encrypted computer virus which infects the fixed disk partition table.
The virus is loaded into memory by booting from an infected disk and then affects the computer's runtime operation.
The Dark Apocalypse Virus is a computer virus written by Crypt Keeper, which infects .COM and .EXE files.
The virus is loaded into memory by executing an infected program and then affects the computer's runtime operation, corrupts program or overlay files and damages the disk boot sector.
The virus activates it's payload on any Monday the 16th, replacing the boot sector with code to reboot the machine.
The Dark Avenger Virus is a computer virus which infects .COM, .EXE and overlay files including COMMAND.COM.
The virus is loaded into memory by executing an infected program and then affects the computer's runtime operation, corrupts program or overlay files.
The Dark End Virus is a computer virus which infects .COM and .EXE files.
The virus is loaded into memory by executing an infected program and then affects the computer's runtime operation and corrupts program files.
The Darth Vader II Virus is a computer virus which uses stealth techniques to avoid detection and which infects .COM files with a block of 345 or more zero bytes within them.
The virus is loaded into memory by executing an infected program and then affects the computer's runtime operation, corrupts program files.
The Darth Vader II Virus is a computer virus which uses stealth techniques to avoid detection and which infects .COM files with a block of 255 or more zero bytes within them.
The virus does not infect on DOS version 5 or later. The virus is loaded into memory by executing an infected program and then affects the computer's runtime operation, corrupts program files.
The Darth Vader Virus is a computer virus which uses stealth techniques to avoid detection and which infects .COM files.
The virus is loaded into memory by executing an infected program and then affects the computer's runtime operation, corrupts program files.
The Data Rape 2.0 Virus is a computer virus which infects .COM and .EXE files including COMMAND.COM.
The virus is loaded into memory by executing an infected program and then affects the computer's runtime operation and corrupts program or overlay files.
The Data Rape 2.3 Virus is a computer virus written by Zodiac and Data Disruptor of the Rabid organisation in 1991. It infects .COM and .EXE files including COMMAND.COM.
The virus is loaded into memory by executing an infected program and then affects the computer's runtime operation by preventing operation on a sunday, and on a 1:15 chance will reformat the hard disk, and corrupts program files.
The Datacrime II-B Virus is an encrypted computer virus which infects .COM and .EXE files including COMMAND.COM.
The virus is loaded into memory by executing an infected program and then affects the computer's runtime operation and corrupts program or overlay files.
The Datacrime Virus is an encrypted computer virus which infects .COM files including COMMAND.COM.
The virus is loaded into memory by executing an infected program and then affects the computer's runtime operation and corrupts program files and upon activation formats the first part of the hard disk.
The Datacrime-2 Virus is an encrypted computer virus which infects .COM and .EXE files.
The virus is loaded into memory by executing an infected program.
The virus corrupts program or overlay files.
The DataLock Virus is a computer virus which infects .COM, .EXE and overlay files including COMMAND.COM.
The virus is loaded into memory by executing an infected program and then affects the computer's runtime operation and corrupts program or overlay files.
The Datos Virus is a computer virus which infects the fixed disk partition table.
The virus is loaded into memory by executing an infected program and then affects the computer's runtime operation and corrupts program or overlay files.
The Davis Virus is a computer virus which infects .EXE files.
The virus is loaded into memory by executing an infected program and then affects the computer's runtime operation and corrupts program or overlay files.
The Day10 Virus is a computer virus which infects .COM files including COMMAND.COM.
The virus is loaded into memory by executing an infected program and then affects the computer's runtime operation, corrupts program or overlay files.
The DBASE Virus is a computer virus which infects .COM files.
The virus is loaded into memory by executing an infected program and then affects the computer's runtime operation and corrupts program or overlay files and data files.
The Death Hog Virus is a computer virus which infects all files.
The virus is loaded into memory by executing an infected program.
The virus steals a large amount of memory to disrupt runtime operations and corrupts program or overlay files and data files.
The Death Virus is a computer virus which infects .COM and .EXE files.
The virus is loaded into memory by executing an infected program.
The virus corrupts program or overlay files and data files.
The Deceide 2 Virus is a computer virus which infects .COM files.
The virus is loaded into memory by executing an infected program and then affects the computer's runtime operation and corrupts program or overlay files.
The Dedicated Virus is an encrypted computer virus which uses stealth techniques to avoid detection and which infects .COM files including COMMAND.COM.
The virus is loaded into memory by executing an infected program and then affects the computer's runtime operation, corrupts program or overlay files.
The Define Virus is a computer virus which infects .COM and .EXE files including COMMAND.COM.
The virus is loaded into memory by executing an infected program and then affects the computer's runtime operation, corrupts program, overlay files and data files.
The Deicide Virus is a computer virus which infects .COM files in the root directory of the current drive only.
The virus is loaded into memory by executing an infected program and then affects the computer's runtime operation, corrupts program files.
If all files are infected, and Deicide is not on the C drive it attempts to
ruin it anyway. If all files in the root direcory on drive C are infected, data on the fixed disk
is destroyed, a message displayed and the computer hung.
If a program is successfully overwritten, Deicide exits to DOS after displaying the message 'File corruption error.'
If Deicide is trapped on a diskette that is write-protected, it will generate 'Abort, Retry, Ignore, Fail' messages .
The Demolition Virus is a computer virus which infects .COM files including COMMAND.COM.
The virus is loaded into memory by executing an infected program and then affects the computer's runtime operation, corrupts program or overlay files.
The Demon Virus is a computer virus which infects .COM files including COMMAND.COM.
The virus is loaded into memory by executing an infected program and then affects the computer's runtime operation and corrupts program files.
On a Tuesday, Demon will destroy all data on the hard drive.
The Den Zuk Virus is a computer virus which infects the diskette boot sector.
The virus is loaded into memory by booting from an infected disk and then affects the computer's runtime operation.
The Dennis Virus is a computer virus which infects .COM and .EXE files including COMMAND.COM.
The virus is loaded into memory by executing an infected program and then affects the computer's runtime operation and corrupts program or overlay files.
The Deranged Virus is a computer virus which infects .COM and .EXE files.
The virus is loaded into memory by executing an infected program and then affects the computer's runtime operation and corrupts program or overlay files.
The Dest1-2 Virus is a computer virus which infects .COM files including COMMAND.COM.
The virus is loaded into memory by executing an infected program and then affects the computer's runtime operation, corrupts program or overlay files.
The Dest3 Virus is a computer virus which infects .COM files including COMMAND.COM.
The virus is loaded into memory by executing an infected program.
The virus corrupts program or overlay files and data files.
The Destructor Virus is a computer virus which infects .COM, .EXE and overlay files including COMMAND.COM.
The virus is loaded into memory by executing an infected program and then affects the computer's runtime operation and corrupts program or overlay files.
The Devil's Dance Virus is a computer virus which infects .COM files.
The virus is loaded into memory by executing an infected program and then affects the computer's runtime operation and corrupts program files.
Upon activation, it will display a message on the screen and destroy the data held in the hard disk biit sector.
The Dial Virus is a VCL generated computer virus which infects .COM files including COMMAND.COM.
The virus is loaded into memory by executing an infected program and then affects the computer's runtime operation by attempting to dial a connected modem, and corrupts program files.
The Diamond-RS Virus is a computer virus which uses stealth techniques to avoid detection and which infects .COM and .EXE files including COMMAND.COM.
The virus is loaded into memory by executing an infected program and then affects the computer's runtime operation and corrupts program or overlay files.
The Diarrhea 4 Virus is a VCL generated encrypted computer virus which infects .COM files including COMMAND.COM.
The virus is loaded into memory by executing an infected program and then affects the computer's runtime operation by filling the screen with garbage characters, and corrupts program files.
The Digger Virus is a computer virus which infects .COM and .EXE files including COMMAND.COM.
The virus is loaded into memory by executing an infected program and then affects the computer's runtime operation and corrupts program or overlay files.
The Dima Virus is a computer virus which infects .COM and .EXE files including COMMAND.COM.
The virus is loaded into memory by executing an infected program.
The virus corrupts program or overlay files and data files.
The Diogenes Virus is a computer virus The virus is loaded into memory by executing an infected program and then affects the computer's runtime operation and corrupts program or overlay files.
The Dir II var Virus is a computer virus which infects .COM and .EXE files.
The virus is loaded into memory by executing an infected program and then affects the computer's runtime operation and corrupts program or overlay files.
The Dir Virus is a computer virus which uses stealth techniques to avoid detection and which infects .COM files including COMMAND.COM.
The virus is loaded into memory by executing an infected program and then affects the computer's runtime operation and corrupts program or overlay files and data files.
The Dir-2 910 Virus is a computer virus which uses stealth techniques to avoid detection and which infects .COM files including COMMAND.COM.
The virus is loaded into memory by executing an infected program and then affects the computer's runtime operation and corrupts program or overlay files and data files.
The Dir-2/CD 1x Virus is an encrypted computer virus which uses stealth techniques to avoid detection and which infects .COM, .EXE and overlay files including COMMAND.COM.
The virus is loaded into memory by executing an infected program and then affects the computer's runtime operation, corrupts program or overlay files and data files.
The Disk Killer Virus is a computer virus which infects the fixed disk and diskette boot sectors .
The virus is loaded into memory by booting from an infected disk and then affects the computer's runtime operation and corrupts program or overlay files and data files.
The Dismember Virus is an encrypted computer virus which infects .COM files including COMMAND.COM.
The virus is loaded into memory by executing an infected program and then affects the computer's runtime operation, corrupts program or overlay files.
The Dk2 Virus is a computer virus which infects .COM files.
The virus is loaded into memory by executing an infected program and then affects the computer's runtime operation and corrupts program or overlay files.
The DM Virus is a computer virus which infects .COM files including COMMAND.COM.
The virus is loaded into memory by executing an infected program and then affects the computer's runtime operation, corrupts program or overlay files.
The DM-330 Virus is a computer virus which infects .COM files including COMMAND.COM.
The virus is loaded into memory by executing an infected program and then affects the computer's runtime operation, corrupts program or overlay files.
The DM-B Virus is a computer virus which infects .COM files including COMMAND.COM.
The virus is loaded into memory by executing an infected program and then affects the computer's runtime operation, corrupts program or overlay files.
The Do Nothing Virus is a computer virus which infects .COM files.
The virus is loaded into memory by executing an infected program.
The virus corrupts program or overlay files and data files.
The Dodo 2456 Virus is a computer virus which infects .COM files including COMMAND.COM.
The virus is loaded into memory by executing an infected program and then affects the computer's runtime operation and corrupts program or overlay files.
The Dodo Virus is a computer virus The virus is loaded into memory by executing an infected program and then affects the computer's runtime operation and corrupts program or overlay files.
The Doodle Virus is a computer virus which infects .COM and .EXE files.
The virus is loaded into memory by executing an infected program and then affects the computer's runtime operation and corrupts program or overlay files.
The Doom II Virus is a computer virus which infects .COM and .EXE files.
The virus is loaded into memory by executing an infected program and then affects the computer's runtime operation, corrupts program or overlay files and data files.
The Dorn Virus is a computer virus which infects .COM files.
The virus is loaded into memory by executing an infected program and then affects the computer's runtime operation and corrupts program or overlay files.
The Dos 7 Virus is a computer virus which infects .COM files.
The virus is loaded into memory by executing an infected program and then affects the computer's runtime operation and corrupts program or overlay files.
The DOS3 Virus is a computer virus which infects .COM and .EXE files.
The virus is loaded into memory by executing an infected program and then affects the computer's runtime operation and corrupts program or overlay files.
The Dos7-B Virus is a computer virus which infects .COM files including COMMAND.COM.
The virus is loaded into memory by executing an infected program and then affects the computer's runtime operation and corrupts program or overlay files.
The Dos7-C Virus is a computer virus which infects .COM files including COMMAND.COM.
The virus is loaded into memory by executing an infected program and then affects the computer's runtime operation and corrupts program or overlay files.
The Dose-A Virus is a computer virus which infects .COM and .EXE files including COMMAND.COM.
The virus is loaded into memory by executing an infected program and then affects the computer's runtime operation and corrupts program or overlay files.
The Dot Killer Virus is a computer virus which infects .COM files including COMMAND.COM.
The virus is loaded into memory by executing an infected program and then affects the computer's runtime operation and corrupts program or overlay files.
The Dot-789 Virus is a computer virus which infects .COM files including COMMAND.COM.
The virus is loaded into memory by executing an infected program and then affects the computer's runtime operation and corrupts program or overlay files and data files.
The Dot-801 Virus is a computer virus which infects .COM files including COMMAND.COM.
The virus is loaded into memory by executing an infected program.
The virus corrupts program or overlay files.
The Dr. Qumak2 Virus is a computer virus which infects .COM files including COMMAND.COM.
ion and corrupts program or overlay files.
‹Væ3ÀFäƒÒÿvÿvš9ÿvÿvèoÿ]Ê3ÀPšð ‹ðÀ~‹Nü‹Vþ¸W‹ÞšVš5 ^‹å]Êÿv
ÿvÿvè–ÿ]Ê