home *** CD-ROM | disk | FTP | other *** search
Text File | 1993-04-12 | 848.1 KB | 15,075 lines |
- Thunderbyte virus detector v5.04 - (C) Copyright 1989-1993, Thunderbyte B.V.
-
- TbScan report, 04-12-1993 21:16:57
-
- Parameters: C:\VIRUSES af ba nm ll=4 log=C:\AV_TEST\TBSCAN.LOG
-
- Jeff Cook, Thunderbyte U.S.A.
-
- BOOTSECTOR C:
-
- MASTER BOOT
-
- ACTIVE PART
-
- C:\VIRUSES\!FRIDAY.COM Infected by Jerusalem Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\!TIGER.COM Infected by Jerusalem Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\1024PSCR.COM Infected by 1024PSCR Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- M Memory resident code. This program can be a TSR but also a virus.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\109B.COM Infected by Hydra Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\10BYTE-V.COM Infected by Hydra Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\10PASS3.COM Infected by 10 Past 3 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\10PAST3.COM Infected by 10 Past 3 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\1193.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\1244.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\1308.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\13MIN.COM Infected by Hydra Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\1554-DJ.COM Infected by KEYPRESS.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\1554B.EXE Infected by 1554 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- K Unusual stack. The program has a suspicious stack or an odd stack.
-
- C:\VIRUSES\1554B.COM Infected by Cascade Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\1575-D.COM Infected by 1575 related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\1575-ORG.COM Infected by 1575 related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\15APR.COM Infected by Murphy Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\1605.COM Might be infected by Captain Trips Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\1701-B.COM Infected by Cascade Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\170X.EXE Infected by Cascade Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- N Wrong name extension. Extension conflicts with program structure.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- ! Invalid opcode (non-8088 instructions) or out-of-range branch.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\17Y4.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\17Y4-B.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- ! Invalid opcode (non-8088 instructions) or out-of-range branch.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\196.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\1963-B.COM Infected by V1963 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\199.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\1ST_STAR.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\2-TIGERS.COM Infected by Jerusalem Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\203.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\217A.COM Infected by Polish 217 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\224.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\2480-2.COM Might be infected by Crew 2480 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\250.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\2560.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\2623.EXE
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
-
- C:\VIRUSES\305.COM Infected by Timid Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\330.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
-
- C:\VIRUSES\334.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\334-2.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
-
- C:\VIRUSES\4096.COM Infected by 4096 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\46.COM Infected by Trivial-46 virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
-
- C:\VIRUSES\46VIRUS.COM Infected by Trivial-46 virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
-
- C:\VIRUSES\486.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\492.COM Infected by USSR 492 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\496.COM Might be infected by GENERIC.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
-
- C:\VIRUSES\4K.COM Infected by 4096 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\509.COM Might be infected by GENERIC.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
-
- C:\VIRUSES\512.COM Infected by 512 Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
-
- C:\VIRUSES\512-B.COM Infected by 512 Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
-
- C:\VIRUSES\512-D.COM Infected by 512 Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
-
- C:\VIRUSES\512-E.COM Infected by 512 Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
-
- C:\VIRUSES\512-F.COM Infected by 512 Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
-
- C:\VIRUSES\512-X.COM Infected by 512 Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
-
- C:\VIRUSES\513.COM Infected by 512 Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
-
- C:\VIRUSES\528.COM Might be infected by GENERIC.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
-
- C:\VIRUSES\529.COM Infected by USSR 529 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\529-1.COM Infected by USSR 529 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\529-2.COM Infected by USSR 529 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\539.COM Might be infected by GENERIC.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
-
- C:\VIRUSES\555.COM Infected by Dutch 555 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\555B.COM Infected by Dutch 555 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\666-B.COM Infected by Diamond Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\66C.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\712.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\733.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\7SON1.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\7SON2.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\7SON4.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\801.COM Infected by StarDot-801 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- D Disk write access. The program writes to disk without using DOS.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\8TUNES.COM Infected by Eight Tunes (1971) Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\901.EXE Infected by 4096 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- N Wrong name extension. Extension conflicts with program structure.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\903.COM Infected by Fichv 2.1 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\948.COM Infected by USSR 948 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\994.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\A204.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\AARON.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
-
- C:\VIRUSES\ABRAXAS.COM Might be infected by ARCV-4 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- D Disk write access. The program writes to disk without using DOS.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\ABRAXAS5.COM Infected by TRANS.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\ABX_01.COM Infected by TRANS.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\ABX_02.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\ABX_03.COM Infected by TRANS.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\ABX_04.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\ACID.COM Infected by TRANS.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\ACME.COM Might be infected by ACME Virus (Clonewar Mutant)
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
-
- C:\VIRUSES\ADA.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\ADOLPH.COM Infected by Adolph Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\ADX.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- D Disk write access. The program writes to disk without using DOS.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\AFRCA109.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\AFRI-109.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\AGIPLAN.COM Infected by Agiplan Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\AIDS.COM Infected by AIDSLOAD.EXE
- c No checksum / recovery information (Anti-Vir.Dat) available.
-
- C:\VIRUSES\AIDS-C.COM Infected by AIDSLOAD.EXE
- c No checksum / recovery information (Anti-Vir.Dat) available.
-
- C:\VIRUSES\AIDS2.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- N Wrong name extension. Extension conflicts with program structure.
-
- C:\VIRUSES\AIDSII.EXE Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- N Wrong name extension. Extension conflicts with program structure.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\AIDSII.COM Infected by Hydra Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- M Memory resident code. This program can be a TSR but also a virus.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\AIDSLOAD.EXE Infected by AIDSLOAD.EXE
- c No checksum / recovery information (Anti-Vir.Dat) available.
- N Wrong name extension. Extension conflicts with program structure.
-
- C:\VIRUSES\AIRCOP.COM Dropper of Aircop-B Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- D Disk write access. The program writes to disk without using DOS.
-
- C:\VIRUSES\AIRCOP-1.COM Infected by MUSICBUG.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- D Disk write access. The program writes to disk without using DOS.
-
- C:\VIRUSES\AIRCOP2.COM Dropper of Aircop-B Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- D Disk write access. The program writes to disk without using DOS.
-
- C:\VIRUSES\AKUKU.COM Infected by Akuku Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\AKUKU-C.COM Infected by Akuku Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- M Memory resident code. This program can be a TSR but also a virus.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\AKUKU-MT.COM Infected by Hydra Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\ALA1560A.EXE Infected by Alabama Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- M Memory resident code. This program can be a TSR but also a virus.
-
- C:\VIRUSES\ALA1560B.COM Infected by Hydra Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\ALABAMA.COM Infected by Alabama Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
-
- C:\VIRUSES\ALAMEDA.COM Dropper of Yale Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- D Disk write access. The program writes to disk without using DOS.
-
- C:\VIRUSES\ALBA-429.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\ALBA575.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\ALEMEDA.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- D Disk write access. The program writes to disk without using DOS.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\AMB1392.COM Infected by DEMO.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- M Memory resident code. This program can be a TSR but also a virus.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\AMILIA.COM Infected by Murphy Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\AMOEBA-1.COM Infected by DEMO.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- M Memory resident code. This program can be a TSR but also a virus.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\AMOEBA-2.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- M Memory resident code. This program can be a TSR but also a virus.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\AMST-299.COM Infected by Amstrad Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\AMST-345.COM Infected by Amstrad Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\AMST-740.EXE Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\ANARKIA.COM Might be infected by Captain Trips Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\ANARKIA2.COM Might be infected by Captain Trips Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\ANNA.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\ANTHRAX.COM Might be infected by Darth Vader Related
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- D Disk write access. The program writes to disk without using DOS.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\ANTHRAXB.COM Might be infected by Darth Vader Related
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- D Disk write access. The program writes to disk without using DOS.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\ANTICST.COM Infected by Murphy Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\ANTIMON.COM Infected by Antimon virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
-
- C:\VIRUSES\ANTISCAN.COM Might be infected by Captain Trips Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\ANTIX.COM Infected by Necropolis virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\ANTI_D.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\ANTI_DAF.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- D Disk write access. The program writes to disk without using DOS.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\ANTO.COM Infected by Anto Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
-
- C:\VIRUSES\AP-400.COM Infected by Anti-Pascal I Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- D Disk write access. The program writes to disk without using DOS.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\AP-440.COM Infected by Anti-Pascal I Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- D Disk write access. The program writes to disk without using DOS.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\AP-480.COM Infected by Anti-Pascal I Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- D Disk write access. The program writes to disk without using DOS.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\AP-529.COM Infected by Anti-Pascal II Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\AP-605.COM Infected by Anti-Pascal II Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\AP2_440B.COM Infected by Anti-Pascal I Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\AP2_480B.COM Infected by Anti-Pascal I Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\APOC.COM Might be infected by Captain Trips Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\APOCII.COM Infected by V2000 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\APRIL.EXE Infected by Up-side-down Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
-
- C:\VIRUSES\ARCHONX.COM Infected by Crew 2480 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
-
- C:\VIRUSES\ARCV-4.COM Infected by ARCV-4 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\ARCV-9.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
-
- C:\VIRUSES\ARCV93.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\ARCVSAND.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
-
- C:\VIRUSES\ARF.COM Infected by Vienna Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\ARF-B.COM Infected by Vienna Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\ARGENTIN.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\ARMA.COM Infected by Armagedon Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\ARMAGED.COM Infected by Armagedon Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\ARMAGEDO.COM Infected by Armagedon Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\AR_911.COM Infected by Armagedon Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\ASSIGN.COM Infected by Suriv 1.01 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\AT-149.COM Infected by AT149 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\AT144B.COM Infected by 144 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\ATT.EXE Infected by (VB) Hafenstrasse Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\ATTENTIN.COM Infected by Attention Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\ATTENTIO.COM Infected by Attention Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\ATTENTN.COM Infected by Attention Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\BACKTIME.COM Infected by Backtime Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\BADGUY-2.COM Infected by Crackpot-208 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
-
- C:\VIRUSES\BADTASTE.COM Infected by Murphy Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\BAMMPC1.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\BAMMPC10.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\BAMMPC2.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\BAMMPC3.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\BAMMPC4.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\BAMMPC5.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\BAMMPC6.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\BAMMPC7.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\BAMMPC8.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\BAMMPC9.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\BANANA.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
-
- C:\VIRUSES\BARCELNA.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\BARCELON.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\BASILISK.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- T Incorrect timestamp. Some viruses use this to mark infected files.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\BB.COM Infected by BB Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
-
- C:\VIRUSES\BB-MUD.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
-
- C:\VIRUSES\BB-VAR1.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
-
- C:\VIRUSES\BBS_ADD.COM Infected by TRANS.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
-
- C:\VIRUSES\BEAST-B.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
-
- C:\VIRUSES\BEBE.COM Infected by Bebe Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\BEBE2.COM Infected by Bebe Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\BEEPER.COM Infected by Russian Mirror Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\BENOIT.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\BEST-B.COM Infected by Best Wishes Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\BEST-D.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\BESTWISH.COM Infected by Best Wishes Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\BEWARE.COM Infected by (VB) Beware Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- D Disk write access. The program writes to disk without using DOS.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\BE_JERB.EXE Infected by Jerusalem Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- K Unusual stack. The program has a suspicious stack or an odd stack.
-
- C:\VIRUSES\BFD.EXE Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- N Wrong name extension. Extension conflicts with program structure.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\BIOS.COM Infected by VCL (encrypted) virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
-
- C:\VIRUSES\BITAD1.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\BKFNT765.EXE Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- K Unusual stack. The program has a suspicious stack or an odd stack.
-
- C:\VIRUSES\BKFNT905.EXE Infected by USSR 905 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- K Unusual stack. The program has a suspicious stack or an odd stack.
-
- C:\VIRUSES\BKMONDAY.EXE Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\BLAST.COM Infected by TRANS.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
-
- C:\VIRUSES\BLAZE.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- ! Invalid opcode (non-8088 instructions) or out-of-range branch.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\BLINKER.COM Infected by Backtime Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\BLJEC3.COM Infected by VVV-252 Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\BLJEC3B.COM Infected by VVV-252 Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
-
- C:\VIRUSES\BLJEC4.COM Infected by VVV-252 Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\BLJEC5.COM Infected by VVV-252 Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\BLJEC5B.COM Infected by VVV-252 Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
-
- C:\VIRUSES\BLJEC6.COM Infected by VVV-252 Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\BLJEC7.COM Infected by VVV-252 Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\BLJEC7B.COM Infected by VVV-252 Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
-
- C:\VIRUSES\BLJEC7D.COM Infected by VVV-252 Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- ! Invalid opcode (non-8088 instructions) or out-of-range branch.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\BLJEC8.COM Infected by VVV-252 Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\BLJEC9.COM Infected by VVV-252 Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\BLJEC9B.COM Infected by VVV-252 Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\BLJECDFX.COM Infected by VVV-252 Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- ! Invalid opcode (non-8088 instructions) or out-of-range branch.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\BLOOD.COM Infected by Blood Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
-
- C:\VIRUSES\BLOODLUS.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
-
- C:\VIRUSES\BMONDAYB.COM Infected by Black Monday Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\BMONDYBR.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\BNU.COM Might be infected by Ministry virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
-
- C:\VIRUSES\BOB.COM Infected by Vienna Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- N Wrong name extension. Extension conflicts with program structure.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\BOBINST.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
-
- C:\VIRUSES\BOBVIRUS.COM Might be infected by Ministry virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- M Memory resident code. This program can be a TSR but also a virus.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\BOMBER.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- ! Invalid opcode (non-8088 instructions) or out-of-range branch.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\BOOT.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
-
- C:\VIRUSES\BOOT1.COM Dropper of PingPong or Typo Boot Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- M Memory resident code. This program can be a TSR but also a virus.
- T Incorrect timestamp. Some viruses use this to mark infected files.
-
- C:\VIRUSES\BOOT2.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- M Memory resident code. This program can be a TSR but also a virus.
- T Incorrect timestamp. Some viruses use this to mark infected files.
-
- C:\VIRUSES\BOOTHORS.COM Infected by MUSICBUG.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- D Disk write access. The program writes to disk without using DOS.
-
- C:\VIRUSES\BOOTKILL.COM Might be infected by KILLFC.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- D Disk write access. The program writes to disk without using DOS.
-
- C:\VIRUSES\BOOTSEC1.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
-
- C:\VIRUSES\BOOTSEC2.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
-
- C:\VIRUSES\BOYS.COM Infected by Boys Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- S Contains a routine to search for executable (.COM or .EXE) files.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\BOYS2.COM Infected by Boys Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- S Contains a routine to search for executable (.COM or .EXE) files.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\BRAIN.COM Infected by MUSICBUG.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- D Disk write access. The program writes to disk without using DOS.
-
- C:\VIRUSES\BRAINDRP.EXE Dropper of Brain, Shoe or Ashar Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
-
- C:\VIRUSES\BRAINY.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\BREEZE.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\BRENDA.COM Infected by Brenda virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\BROTH321.COM Infected by Little Brother virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\BROTHER1.COM Infected by Little Brother virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\BROTHER2.COM Infected by Little Brother virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\BUBBLE.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\BUBBLES.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\BUBBLES2.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\BURG382.COM Infected by 382 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
-
- C:\VIRUSES\BURG405A.COM Infected by Burger Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\BURG560C.COM Might be infected by GENERIC.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
-
- C:\VIRUSES\BURG560G.COM Might be infected by GENERIC.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
-
- C:\VIRUSES\BURG560H.COM Might be infected by GENERIC.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
-
- C:\VIRUSES\BURG560K.COM Might be infected by GENERIC.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
-
- C:\VIRUSES\BURGCIA.COM Might be infected by GENERIC.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
-
- C:\VIRUSES\BURGER.COM Might be infected by GENERIC.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
-
- C:\VIRUSES\BURGHOF.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\BUSH.COM Infected by Vienna Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\BUSTED.COM Infected by Busted Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
-
- C:\VIRUSES\BYPASS1.EXE Infected by BYPASS1.EXE
- c No checksum / recovery information (Anti-Vir.Dat) available.
-
- C:\VIRUSES\B_537.COM Might be infected by GENERIC.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
-
- C:\VIRUSES\C-17Y4.COM Infected by Cascade Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\C-644.COM Infected by Vienna Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\CACODMON.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\CADKILL.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\CANCER.COM Infected by Amstrad Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- T Incorrect timestamp. Some viruses use this to mark infected files.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\CANNAB1.COM Might be infected by Stoned Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
-
- C:\VIRUSES\CANNAB2.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
-
- C:\VIRUSES\CANNAB3.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
-
- C:\VIRUSES\CANNABIS.COM Might be infected by Stoned Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
-
- C:\VIRUSES\CAPSONVR.COM Infected by Cascade Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\CAPTRIPS.COM Infected by Captain Trips Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\CARIOCA.COM Infected by Carioca Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\CASCADE.COM Infected by Cascade Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\CASCPHAN.COM Infected by Cascade Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
-
- C:\VIRUSES\CASINO.COM Infected by Casino Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\CASINO-C.COM Infected by Casino Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\CASPER.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- ! Invalid opcode (non-8088 instructions) or out-of-range branch.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\CATMAN.COM Infected by Catman Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
-
- C:\VIRUSES\CATMAN1.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- D Disk write access. The program writes to disk without using DOS.
- ! Invalid opcode (non-8088 instructions) or out-of-range branch.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\CAZ.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\CAZ-1024.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\CAZ-1159.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- N Wrong name extension. Extension conflicts with program structure.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
- K Unusual stack. The program has a suspicious stack or an odd stack.
-
- C:\VIRUSES\CBOMBER.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
-
- C:\VIRUSES\CBZ.COM Infected by CBZ.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- N Wrong name extension. Extension conflicts with program structure.
-
- C:\VIRUSES\CDSET5.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
-
- C:\VIRUSES\CEMETERY.COM Infected by Murphy Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\CH.COM Infected by Burger Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\CHAD.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\CHAOS.COM Infected by Spyer Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\CHECKSUM.COM Infected by Checksum-100/101 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\CHEEBA.COM Infected by CHEEBA-A Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\CHEESY.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\CHK4LITE.EXE
- c No checksum / recovery information (Anti-Vir.Dat) available.
- ? Inconsistent exeheader. Might be a virus but can also be a bug.
- K Unusual stack. The program has a suspicious stack or an odd stack.
-
- C:\VIRUSES\CHKDSK.COM Infected by USSR 1049 related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\CHNG-MPC.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- D Disk write access. The program writes to disk without using DOS.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\CHOPIN.COM Infected by ZK900 virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\CHRISTMA.COM Infected by Christmas (XA1) Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\CHRSTMAS.COM Infected by Vienna Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- D Disk write access. The program writes to disk without using DOS.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\CHUANG.COM Infected by VCL (encrypted) virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- D Disk write access. The program writes to disk without using DOS.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\CIA.COM Might be infected by GENERIC.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
-
- C:\VIRUSES\CINDER.COM Infected by Cinderella Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\CINDER-C.COM Infected by Cinderella Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\CIVILWAR.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\CIVIL_II.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\CKSUM101.COM Infected by Checksum-100/101 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\CL.COM Infected by Burger Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\CMDRBMBR.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\CODEZERO.COM Infected by VCL (encrypted) virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\COFFSHP1.COM Infected by Coffeeshop Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\COFFSHP2.EXE Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- K Unusual stack. The program has a suspicious stack or an odd stack.
-
- C:\VIRUSES\COL_MAC.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
-
- C:\VIRUSES\COMMENT.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
-
- C:\VIRUSES\COMMENT2.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
-
- C:\VIRUSES\COMMTROJ.COM Infected by MHZ.EXE
- c No checksum / recovery information (Anti-Vir.Dat) available.
- N Wrong name extension. Extension conflicts with program structure.
- D Disk write access. The program writes to disk without using DOS.
-
- C:\VIRUSES\COPYRGHT.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\COSS-883.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- N Wrong name extension. Extension conflicts with program structure.
- S Contains a routine to search for executable (.COM or .EXE) files.
- K Unusual stack. The program has a suspicious stack or an odd stack.
-
- C:\VIRUSES\COSSIGA.EXE Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- K Unusual stack. The program has a suspicious stack or an odd stack.
-
- C:\VIRUSES\COSSIGNA.EXE Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- K Unusual stack. The program has a suspicious stack or an odd stack.
-
- C:\VIRUSES\CRACKJAC.COM Infected by Necropolis virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
-
- C:\VIRUSES\CRACKY-V.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- ! Invalid opcode (non-8088 instructions) or out-of-range branch.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\CRASH.EXE Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- D Disk write access. The program writes to disk without using DOS.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\CRAZY.EXE
- c No checksum / recovery information (Anti-Vir.Dat) available.
-
- C:\VIRUSES\CRAZYIMP.COM Infected by Crazy Imp Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\CREEP-B.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- D Disk write access. The program writes to disk without using DOS.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\CREEPER.COM Infected by Creeper virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- D Disk write access. The program writes to disk without using DOS.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\CREW2480.COM Infected by Crew 2480 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
-
- C:\VIRUSES\CRF.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\CRIME-1A.COM Infected by Datacrime (1168) Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\CRIME-2.COM Infected by Datacrime II Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\CRIME-2B.COM Might be infected by Datacrime II Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\CRIMEIIB.COM Might be infected by Datacrime II Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\CRIMINAL.EXE Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- M Memory resident code. This program can be a TSR but also a virus.
- T Incorrect timestamp. Some viruses use this to mark infected files.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- O Found code that can be used to overwrite/move a program in memory.
- K Unusual stack. The program has a suspicious stack or an odd stack.
-
- C:\VIRUSES\CRPDEATH.COM Infected by DIR II virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
-
- C:\VIRUSES\CRUMBLE.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\CRUNCHER.COM Might be infected by Mirror Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\CRYPT.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
-
- C:\VIRUSES\CRZYEDIE.COM Infected by Crazy Eddie Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- D Disk write access. The program writes to disk without using DOS.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\CS1661.COM Infected by Cascade Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\CS1701A.COM Infected by Cascade Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\CS1701C.COM Infected by Cascade Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- ! Invalid opcode (non-8088 instructions) or out-of-range branch.
-
- C:\VIRUSES\CS1704A.COM Infected by Cascade Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\CS1704B2.COM Infected by Cascade Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\CS1704C.COM Infected by Cascade Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\CS1704D.COM Infected by Cascade Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\CS1704FR.COM Infected by Cascade Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\CSFORMIC.COM Infected by Cascade Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\CSL_BETA.COM Infected by PRE_REL Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\CSL_V4.COM Might be infected by CSL-V5 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\CSSR.COM Infected by CSSR 528 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\CUNNING.COM Infected by Cascade Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- ! Invalid opcode (non-8088 instructions) or out-of-range branch.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\CV4.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\CVIRUS.EXE Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- S Contains a routine to search for executable (.COM or .EXE) files.
-
- C:\VIRUSES\CW.COM Infected by Burger Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\CYBER101.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\CYBERNET.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\CYBERTCH.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\CYBTCH-B.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\CZECH.COM Infected by Jerusalem Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\C_1701S.COM Infected by Cascade Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\C_1704B.COM Infected by Cascade Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\D-DANCE.COM Infected by Devil's Dance Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- S Contains a routine to search for executable (.COM or .EXE) files.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\DA-1028.COM Infected by 1028 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\DA-1800B.COM Infected by Dark Avenger related virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\DA-1800E.COM Infected by Dark Avenger related virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\DA-2000Z.COM Infected by V2000 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\DA-2100A.COM Might be infected by V2000 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\DA-VAR1.COM Infected by Dark Avenger related virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- N Wrong name extension. Extension conflicts with program structure.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- ! Invalid opcode (non-8088 instructions) or out-of-range branch.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\DACB1530.COM Infected by Dark Avenger Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- M Memory resident code. This program can be a TSR but also a virus.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\DAMAGE.COM Infected by Diamond Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\DAMIEN.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- D Disk write access. The program writes to disk without using DOS.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
-
- C:\VIRUSES\DANGER.COM Might be infected by Timid Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\DARK3.COM Infected by Dark Avenger related virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\DARKDUDE.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\DARKLORD.COM Infected by Terror Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\DARKSTAR.COM Infected by Fear Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\DARTH1.COM Infected by Darth Vader Related
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\DARTH2.COM Infected by Darth Vader Related
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\DASH-EM.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\DATALOCK.COM Infected by DataLock Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\DATARAPE.COM Infected by LOL Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- T Incorrect timestamp. Some viruses use this to mark infected files.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\DAV-C.COM Infected by Dark Avenger related virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\DAVID.COM Infected by Diamond Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\DAY10.COM Infected by SYP
- c No checksum / recovery information (Anti-Vir.Dat) available.
- D Disk write access. The program writes to disk without using DOS.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\DBASE.COM Infected by dBASE Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\DBASE1.COM Infected by dBASE Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\DBASE2.COM Infected by dBASE Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\DBASE3.COM Infected by dBASE Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\DBLDISK.COM Infected by DBLDISK.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\DBL_VISN.COM Might be infected by ARCV-4 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- D Disk write access. The program writes to disk without using DOS.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\DC-1168.COM Infected by Datacrime (1168) Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\DC-B.COM Might be infected by DC-C.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
-
- C:\VIRUSES\DC-C.COM Infected by DC-C.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
-
- C:\VIRUSES\DCII-B.COM Infected by Datacrime II Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\DCR1168.COM Infected by Datacrime (1168) Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\DCR1280.COM Infected by Datacrime B (1280) Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- D Disk write access. The program writes to disk without using DOS.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\DCRMII.COM Infected by Datacrime II Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\DCRMIIB.COM Might be infected by Datacrime II Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- N Wrong name extension. Extension conflicts with program structure.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- ? Inconsistent exeheader. Might be a virus but can also be a bug.
- K Unusual stack. The program has a suspicious stack or an odd stack.
-
- C:\VIRUSES\DC_1280.COM Infected by Datacrime B (1280) Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\DD.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- D Disk write access. The program writes to disk without using DOS.
-
- C:\VIRUSES\DDANCE.COM Infected by Devil's Dance Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- S Contains a routine to search for executable (.COM or .EXE) files.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\DDAY-B.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\DDRUS.COM Infected by Vienna Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\DEADPOOL.COM Infected by Marauder virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\DEATHCOW.COM Infected by Trivial-46 virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\DEDICATE.COM Infected by Fear Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\DEFINE.COM Might be infected by DC-C.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\DEFINEB.COM Might be infected by DC-C.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\DEICIDE.COM Infected by Deicide Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
-
- C:\VIRUSES\DEICIDEB.COM Infected by Deicide Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
-
- C:\VIRUSES\DEMO.EXE
- c No checksum / recovery information (Anti-Vir.Dat) available.
-
- C:\VIRUSES\DEMO.COM Infected by DEMO.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\DEMOLITN.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
-
- C:\VIRUSES\DEMON.COM Infected by Demon Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
-
- C:\VIRUSES\DEMONIA1.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
-
- C:\VIRUSES\DENZUK.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- D Disk write access. The program writes to disk without using DOS.
-
- C:\VIRUSES\DEST1.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\DEST2.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\DEST3.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\DESTI.COM Infected by Bugres Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
-
- C:\VIRUSES\DESTRUCT.COM Infected by Destructor V4.00 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\DEVLDANC.COM Infected by Devil's Dance Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- S Contains a routine to search for executable (.COM or .EXE) files.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\DEWDZ.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
-
- C:\VIRUSES\DHOG.COM Might be infected by Define Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
-
- C:\VIRUSES\DI-ROCK1.COM Infected by Diamond Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\DIARR-B.COM Infected by TRANS.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\DIARR-C.COM Infected by Dir Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\DIARRHE6.COM Infected by VCL (encrypted) virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\DIARRHEA.COM Infected by VCL (encrypted) virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\DIASPRON.COM Might be infected by GENERIC.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
-
- C:\VIRUSES\DIAV-B.COM Infected by USSR 830 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\DIEYOUNG.COM Infected by V2000 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- T Incorrect timestamp. Some viruses use this to mark infected files.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\DIOGENES.COM Infected by VCL (encrypted) virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\DIR.COM Infected by DIRVIR Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\DIR-2A.COM Infected by DIR II virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
-
- C:\VIRUSES\DIRII-11.COM Infected by DIR II virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
-
- C:\VIRUSES\DIRR.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\DIRVIR.COM Infected by DIRVIR Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\DISCOM.COM Infected by Jerusalem Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\DISKJEB.COM Infected by KEYPRESS.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\DISKKILL.COM Infected by MUSICBUG.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- D Disk write access. The program writes to disk without using DOS.
-
- C:\VIRUSES\DISKPREP.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- D Disk write access. The program writes to disk without using DOS.
-
- C:\VIRUSES\DISNEY.EXE Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- D Disk write access. The program writes to disk without using DOS.
- K Unusual stack. The program has a suspicious stack or an odd stack.
- i Additional data found at end of file. Probably internal overlay.
-
- C:\VIRUSES\DM310.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\DM400.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\DMII1504.EXE Infected by Doom 2-B Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- ? Inconsistent exeheader. Might be a virus but can also be a bug.
- K Unusual stack. The program has a suspicious stack or an odd stack.
-
- C:\VIRUSES\DO.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\DO2.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\DO3.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
-
- C:\VIRUSES\DOCTOR.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- N Wrong name extension. Extension conflicts with program structure.
-
- C:\VIRUSES\DODO.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\DODO-PIG.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\DONOTHIN.COM Infected by Do Nothing Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\DONTELLO.COM Infected by VCL virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\DOODLE.EXE Infected by USSR 1049 related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\DOOM2.COM Infected by Doom-II Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
-
- C:\VIRUSES\DOOMII.COM Infected by Doom-II Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- N Wrong name extension. Extension conflicts with program structure.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\DOOMII.EXE Infected by Doom-II Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\DOOMSDAY.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- M Memory resident code. This program can be a TSR but also a virus.
-
- C:\VIRUSES\DOS62.COM Infected by Vienna Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\DOSEDIT.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\DOSKILL.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\DOSVIR.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\DOTEATER.COM Infected by Dot Killer Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\DOTKILL.COM Infected by Dot Killer Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\DOUBLEW.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- D Disk write access. The program writes to disk without using DOS.
- ! Invalid opcode (non-8088 instructions) or out-of-range branch.
-
- C:\VIRUSES\DR20-INF.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
-
- C:\VIRUSES\DR23.COM Might be infected by 1028 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\DRAIN.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- T Incorrect timestamp. Some viruses use this to mark infected files.
-
- C:\VIRUSES\DRIP.COM Infected by DRIP.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
-
- C:\VIRUSES\DROP.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\DROPPER.COM Infected by MUSICBUG.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- D Disk write access. The program writes to disk without using DOS.
-
- C:\VIRUSES\DROPPER2.COM Dropper of Aircop-B Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- D Disk write access. The program writes to disk without using DOS.
-
- C:\VIRUSES\DRQUMAK.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\DRSORT.EXE Might be infected by WARPCOM2.EXE
- c No checksum / recovery information (Anti-Vir.Dat) available.
-
- C:\VIRUSES\DRUID.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
-
- C:\VIRUSES\DSKPLUS1.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\DSKSPOIL.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\DT.COM Infected by Dark Avenger related virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\DT-191.COM Infected by Danish tiny virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\DT-KENDY.COM Infected by Kennedy (333) Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\DTR.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\DURANGO.COM Might be infected by Leprosy B Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
-
- C:\VIRUSES\DURBAN.COM Infected by Saterday 14th (Durban) Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\DUTCH555.COM Infected by Dutch 555 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- N Wrong name extension. Extension conflicts with program structure.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- K Unusual stack. The program has a suspicious stack or an odd stack.
-
- C:\VIRUSES\DVLDNCE2.COM Infected by Devil's Dance Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- S Contains a routine to search for executable (.COM or .EXE) files.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\EAR.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\EAR-812.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\EARNESTO.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\EARTHDAY.COM Infected by VCL (encrypted) virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- D Disk write access. The program writes to disk without using DOS.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\EAR_6.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\EAT.COM Infected by TRANS.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
-
- C:\VIRUSES\EDDIE.COM Infected by Dark Avenger related virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\EDDIE2A.COM Infected by V651 (Eddie 3) Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\EDDY.COM Infected by Dark Avenger related virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\EIGHTUNE.COM Infected by Eight Tunes (1971) Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\EKOTERR.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- D Disk write access. The program writes to disk without using DOS.
-
- C:\VIRUSES\ELIZA.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
-
- C:\VIRUSES\ELVIS.EXE Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- M Memory resident code. This program can be a TSR but also a virus.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- ? Inconsistent exeheader. Might be a virus but can also be a bug.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
- K Unusual stack. The program has a suspicious stack or an odd stack.
-
- C:\VIRUSES\ELYTHNIA.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
-
- C:\VIRUSES\EMF.COM Infected by Screaming Fist Virus2
- c No checksum / recovery information (Anti-Vir.Dat) available.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\EMF-A.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\EMFII.COM Might be infected by VCL virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\EMULATE.EXE Might be infected by Captain Trips Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- K Unusual stack. The program has a suspicious stack or an odd stack.
-
- C:\VIRUSES\ENCROAC2.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\ENCROACH.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\ENEMY.EXE Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
- K Unusual stack. The program has a suspicious stack or an odd stack.
- i Additional data found at end of file. Probably internal overlay.
-
- C:\VIRUSES\ENUN#1.EXE Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\ETC.COM Infected by E.T.C. 3.00 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\EU92421.COM Infected by Europe/92 Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\EU92424A.COM Infected by Europe/92 Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\EUROPE92.COM Infected by Europe/92 Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\EVIL.COM Infected by Phoenix related virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
-
- C:\VIRUSES\EVIL-D.COM Infected by Phoenix related virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- D Disk write access. The program writes to disk without using DOS.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\EVIL1.COM Infected by Phoenix related virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\EVILD.COM Infected by Phoenix related virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- D Disk write access. The program writes to disk without using DOS.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\EVILE.COM Infected by Phoenix related virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- D Disk write access. The program writes to disk without using DOS.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\EXPLODE.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
-
- C:\VIRUSES\EXTERM.COM Might be infected by Crackpot-208 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
-
- C:\VIRUSES\F1-337.COM Infected by 337
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\FACE.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- T Incorrect timestamp. Some viruses use this to mark infected files.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\FAKOFILE.EXE Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- N Wrong name extension. Extension conflicts with program structure.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
-
- C:\VIRUSES\FALCON.EXE
- c No checksum / recovery information (Anti-Vir.Dat) available.
-
- C:\VIRUSES\FAREN121.EXE
- c No checksum / recovery information (Anti-Vir.Dat) available.
- K Unusual stack. The program has a suspicious stack or an odd stack.
- i Additional data found at end of file. Probably internal overlay.
-
- C:\VIRUSES\FATFUCK.EXE
- c No checksum / recovery information (Anti-Vir.Dat) available.
-
- C:\VIRUSES\FATHERCH.COM Infected by Vienna Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\FCB.COM Infected by Burger Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
-
- C:\VIRUSES\FEAR.COM Infected by Fear Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\FEIST.COM Infected by (VB) Feist Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\FELLOW.EXE Might be infected by Kamikaze Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\FGT.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\FICHV20.COM Infected by Fichv 2.0 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\FICHV21.COM Infected by Fichv 2.1 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\FICHVE10.COM Infected by FEXE 1.0 virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- N Wrong name extension. Extension conflicts with program structure.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- ? Inconsistent exeheader. Might be a virus but can also be a bug.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\FILEHIDE.COM Infected by 789 virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\FILLER.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\FINDINT.EXE Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\FINGER.COM Infected by Murphy Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\FINN709.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- ! Invalid opcode (non-8088 instructions) or out-of-range branch.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\FIRE.EXE
- c No checksum / recovery information (Anti-Vir.Dat) available.
-
- C:\VIRUSES\FISH.COM Infected by Fish (6) Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- T Incorrect timestamp. Some viruses use this to mark infected files.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\FISH#6.COM Infected by Fish (6) Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- T Incorrect timestamp. Some viruses use this to mark infected files.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\FLASH.COM Infected by Flash Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\FLDATE11.COM Infected by USSR-1594 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- N Wrong name extension. Extension conflicts with program structure.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- ? Inconsistent exeheader. Might be a virus but can also be a bug.
-
- C:\VIRUSES\FLIP.COM Infected by Flip Virus COM/EXE
- c No checksum / recovery information (Anti-Vir.Dat) available.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
-
- C:\VIRUSES\FLIP2153.COM Infected by Flip Virus COM/EXE
- c No checksum / recovery information (Anti-Vir.Dat) available.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
-
- C:\VIRUSES\FLIP2343.COM Infected by Flip Virus COM/EXE
- c No checksum / recovery information (Anti-Vir.Dat) available.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\FLIPTROJ.COM Dropper of Filler Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
-
- C:\VIRUSES\FLP2153B.COM Might be infected by Flip Virus COM/EXE
- c No checksum / recovery information (Anti-Vir.Dat) available.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\FLP2153C.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\FONER.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
-
- C:\VIRUSES\FORMAT.COM Infected by FORMAT.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
-
- C:\VIRUSES\FRANCE.EXE Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\FRANCE.COM Infected by ZK900 virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\FRDO4096.COM Infected by 4096 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\FREEW692.COM Infected by Freew Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\FRERE.COM Might be infected by Captain Trips Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\FREREJ.COM Might be infected by Captain Trips Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\FREREJAC.COM Might be infected by Captain Trips Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\FRIDAY.COM Infected by Jerusalem Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- ! Invalid opcode (non-8088 instructions) or out-of-range branch.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\FRIDAY13.COM Infected by Friday the 13th Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- S Contains a routine to search for executable (.COM or .EXE) files.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\FRIENDS.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
-
- C:\VIRUSES\FRODO.COM Infected by 4096 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\FRODO409.COM Infected by 4096 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\FRODO409.EXE Infected by 4096 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- ! Invalid opcode (non-8088 instructions) or out-of-range branch.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\FROGGIE.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
-
- C:\VIRUSES\FROGMAN.COM Dropper of MichelAngelo Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
-
- C:\VIRUSES\FROGS.COM Infected by Frogs Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\FROGSB.COM Infected by Frogs Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\FS.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\FUCKYOU.COM Infected by F-Word Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\FUMANCHU.COM Infected by Jerusalem Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\FUTHARK.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\FUTHARKB.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\FVHS.COM Infected by LeprmutX Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
-
- C:\VIRUSES\FVHS-B.COM Infected by LeprmutX Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
-
- C:\VIRUSES\FX2.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\GC_1575A.COM Infected by 1575 related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\GC_1575C.COM Infected by 1575 related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\GEEK.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
-
- C:\VIRUSES\GENERIC.COM Infected by GENERIC.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
-
- C:\VIRUSES\GENF.COM Infected by Vienna Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- T Incorrect timestamp. Some viruses use this to mark infected files.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\GENIUS.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\GENIUS-C.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\GENIUS-D.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\GENIUS-E.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\GERGANA.COM Infected by Gergana Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\GERG_222.COM Infected by Gergana Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- S Contains a routine to search for executable (.COM or .EXE) files.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\GERG_300.COM Infected by Gergana Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\GERG_450.COM Infected by Gergana Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\GERG_512.COM Infected by Gergana Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\GETCLOCK.COM Infected by AIDSLOAD.EXE
- c No checksum / recovery information (Anti-Vir.Dat) available.
-
- C:\VIRUSES\GHOST.COM Infected by Vienna Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- M Memory resident code. This program can be a TSR but also a virus.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\GIRAFFE.COM Infected by Coffeeshop Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\GOBLIN.COM Infected by Necropolis virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\GOLDGELD.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\GOOBER.COM Might be infected by Define Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\GOOBER2.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\GOTCHA.COM Infected by Gotcha! Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\GOTCHA1.COM Infected by Gotcha! Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\GOTCHA17.COM Infected by Gotcha! Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\GOTCHA4.COM Infected by Datacrime IIb Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\GOTCHA7.COM Infected by Gotcha! Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\GOTCHA9.COM Infected by Gotcha! Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\GOTCHAA.COM Infected by Gotcha! Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\GOTCHAB.COM Infected by Gotcha! Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\GR.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\GR-B.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\GREEK.COM Infected by Armagedon Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\GREEMLIN.EXE Infected by Diamond Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- T Incorrect timestamp. Some viruses use this to mark infected files.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\GREEMLIN.COM Infected by Diamond Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- T Incorrect timestamp. Some viruses use this to mark infected files.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\GREEN.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- D Disk write access. The program writes to disk without using DOS.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\GREMLIN.COM Infected by Diamond Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\GRITHER.COM Infected by Vienna Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\GRITHER1.COM Infected by Vienna Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\GRLINKS.COM Might be infected by Captain Trips Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\GROOVE.EXE
- c No checksum / recovery information (Anti-Vir.Dat) available.
- K Unusual stack. The program has a suspicious stack or an odd stack.
-
- C:\VIRUSES\GROUCH.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\GROUCHYB.COM Might be infected by Timid Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\GROUCHYC.COM Might be infected by Timid Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\GROUCHYE.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\GRUNT-1.COM Infected by GRUNT-1 Family Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
-
- C:\VIRUSES\GRUNT-B.COM Infected by GRUNT-2 Family Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
-
- C:\VIRUSES\GRUNT-C.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
-
- C:\VIRUSES\GRUNT-D.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
-
- C:\VIRUSES\GRUNT2.COM Infected by GRUNT-2 Family Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\GUPPY.COM Infected by Guppy Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\HACKER-F.COM Infected by Naughty Hacker Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\HACKER4.COM Infected by Naughty Hacker Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- T Incorrect timestamp. Some viruses use this to mark infected files.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\HACKTIC.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\HACKTIC2.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
-
- C:\VIRUSES\HADDOCK.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\HAF-1641.EXE Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\HAIFA.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\HALLO.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- p Packed program. A virus could be -invisibly- inside the program.
-
- C:\VIRUSES\HALLOE.COM Infected by Halloechen Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\HALLOECH.COM Infected by Halloechen Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\HALOCHEN.EXE Infected by Halloechen Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- i Additional data found at end of file. Probably internal overlay.
-
- C:\VIRUSES\HALOCHEN.COM Infected by Halloechen Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\HAPPY.EXE Infected by Happy New Year Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\HAPPY-C.EXE Infected by Happy New Year Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\HAPPY-NY.COM Infected by Happy New Year Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\HARAKI2.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- N Wrong name extension. Extension conflicts with program structure.
- S Contains a routine to search for executable (.COM or .EXE) files.
- i Additional data found at end of file. Probably internal overlay.
-
- C:\VIRUSES\HARAKIRI.EXE
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
-
- C:\VIRUSES\HARYANTO.COM Infected by Haryanto virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- M Memory resident code. This program can be a TSR but also a virus.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\HATE.COM Infected by Klaeren Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\HAUSE.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\HBT.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\HDROPT.EXE
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- K Unusual stack. The program has a suspicious stack or an odd stack.
-
- C:\VIRUSES\HEADCRSH.COM Infected by 1067 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\HEADKILL.EXE Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- N Wrong name extension. Extension conflicts with program structure.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\HEEVAHAV.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
-
- C:\VIRUSES\HEHHEH.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\HELL.COM Infected by Amstrad Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\HELLRAIS.COM Infected by Hellraiser virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\HELW1376.EXE Infected by Helloween Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\HERC2VGA.EXE
- c No checksum / recovery information (Anti-Vir.Dat) available.
- i Additional data found at end of file. Probably internal overlay.
-
- C:\VIRUSES\HERO.COM Infected by Hero Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\HERO394.EXE Infected by Hero Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- i Additional data found at end of file. Probably internal overlay.
-
- C:\VIRUSES\HEYYOU.COM Infected by 923 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\HIGHLAND.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\HITCHCOK.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\HIV.COM Infected by Murphy Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\HIV-B.COM Infected by Murphy Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\HOLGIRL2.COM Infected by Holland Girl Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\HOLLAND.COM Infected by Holland Girl Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\HOLLAND1.COM Infected by Holland Girl Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\HOLLANDB.COM Infected by Holland Girl Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\HONGKONG.COM Infected by Holland Girl Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\HORNS.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\HORSE.COM Infected by Naughty Hacker Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\HORSE1.COM Infected by Naughty Hacker Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\HORSE2.COM Infected by Naughty Hacker Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\HORSE2C.COM Infected by Naughty Hacker Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\HORSE3.COM Infected by Naughty Hacker Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\HORSE4.COM Infected by Naughty Hacker Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\HORSE5.COM Infected by Naughty Hacker Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\HORSE6.COM Infected by Naughty Hacker Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\HORSE7.COM Infected by Naughty Hacker Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\HUNG482.COM Infected by Hungarian 482 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\HUNGARY.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\HUP.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\HYBRYD.COM Infected by Hybryd Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
-
- C:\VIRUSES\HYDRA0.COM Infected by Hydra Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\HYDRA1.COM Infected by Hydra Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\HYDRA2.COM Infected by Hydra Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\HYDRA3.COM Infected by Hydra Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- M Memory resident code. This program can be a TSR but also a virus.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\HYDRA4.COM Infected by Hydra Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- M Memory resident code. This program can be a TSR but also a virus.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\HYDRA5.COM Infected by Hydra Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\HYDRA6.COM Infected by Hydra Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\HYDRA7.COM Infected by Hydra Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\HYDRA8.COM Infected by Hydra Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\HYMN.COM Infected by Hymn Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\HYMN1865.COM Infected by Hymn Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\HYMN1865.EXE Infected by Hymn Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- i Additional data found at end of file. Probably internal overlay.
-
- C:\VIRUSES\HYMN1962.EXE Infected by Sverdlov Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- i Additional data found at end of file. Probably internal overlay.
-
- C:\VIRUSES\HYMN1962.COM Infected by Sverdlov Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\HYMN2144.COM Infected by USSR 2144 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- M Memory resident code. This program can be a TSR but also a virus.
-
- C:\VIRUSES\HYMNP.COM Infected by Sverdlov Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\HYMNSVER.COM Infected by Sverdlov Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\ICE-1.EXE Infected by Icelandic/Saratoga Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- K Unusual stack. The program has a suspicious stack or an odd stack.
-
- C:\VIRUSES\ICE-2.EXE Infected by Icelandic/Saratoga Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- K Unusual stack. The program has a suspicious stack or an odd stack.
-
- C:\VIRUSES\ICE-9.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\ICE-II.EXE Infected by Icelandic/Saratoga Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
-
- C:\VIRUSES\ICE1.EXE Infected by Icelandic/Saratoga Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- i Additional data found at end of file. Probably internal overlay.
-
- C:\VIRUSES\ICELAND3.EXE Infected by Icelandic III Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\ICELANDC.EXE Infected by Icelandic/Saratoga Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
-
- C:\VIRUSES\ICEMIX1.COM Infected by Mix I Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- N Wrong name extension. Extension conflicts with program structure.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\ICEMIX1B.EXE Infected by Mix I Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
-
- C:\VIRUSES\IGOR.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\IKV-528.COM Infected by CSSR 528 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\INCOM.COM Infected by InCom Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
-
- C:\VIRUSES\INFINITY.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\INFO1.EXE Might be infected by Pisello Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- K Unusual stack. The program has a suspicious stack or an odd stack.
-
- C:\VIRUSES\INSUFF.COM Infected by MTE Virus (non-encrypted)
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\INSUFF2.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\INSUFF3.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\INTERNAL.COM Infected by Internal (1381) Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- N Wrong name extension. Extension conflicts with program structure.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\INTRCEPT.COM Infected by Vienna Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\INTRO.COM Might be infected by Captain Trips Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\INTRUDER.EXE Infected by Intruder Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
-
- C:\VIRUSES\INVADE.COM Infected by Jerusalem Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- M Memory resident code. This program can be a TSR but also a virus.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\INVADER.COM Infected by Jerusalem Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- M Memory resident code. This program can be a TSR but also a virus.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\INVADER2.COM Infected by Jerusalem Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- M Memory resident code. This program can be a TSR but also a virus.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\IRAQI-B.EXE
- c No checksum / recovery information (Anti-Vir.Dat) available.
-
- C:\VIRUSES\IRISH.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\IRONMAID.COM Infected by August 16th (Iron Maiden)
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- D Disk write access. The program writes to disk without using DOS.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\ISRAEL-C.COM Might be infected by Captain Trips Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\ISRAELI.COM Might be infected by Captain Trips Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\ISRAELI.EXE Might be infected by Captain Trips Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- K Unusual stack. The program has a suspicious stack or an odd stack.
-
- C:\VIRUSES\ITAL-803.COM Infected by StarDot-801 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- D Disk write access. The program writes to disk without using DOS.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\ITAVIR.COM Infected by Itavir Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- N Wrong name extension. Extension conflicts with program structure.
- D Disk write access. The program writes to disk without using DOS.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\ITTI-A.COM Infected by Itti-A Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\ITTI-B.COM Infected by Itti-B Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
-
- C:\VIRUSES\J-1361.COM Infected by Jerusalem Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\J-1813.COM Might be infected by Captain Trips Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\J-A204.COM Might be infected by Captain Trips Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\J-AC4KCH.COM Infected by Jerusalem Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- M Memory resident code. This program can be a TSR but also a virus.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\J-AC4KMO.COM Infected by Jerusalem Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- M Memory resident code. This program can be a TSR but also a virus.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\J-ACTOBA.COM Might be infected by Captain Trips Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\J-ANARK2.COM Might be infected by Captain Trips Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\J-ANARK3.EXE Might be infected by Captain Trips Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- K Unusual stack. The program has a suspicious stack or an odd stack.
-
- C:\VIRUSES\J-BLKFRI.EXE Might be infected by Captain Trips Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- K Unusual stack. The program has a suspicious stack or an odd stack.
-
- C:\VIRUSES\J-CLIPPR.EXE Might be infected by Captain Trips Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- K Unusual stack. The program has a suspicious stack or an odd stack.
-
- C:\VIRUSES\J-CNDER.COM Infected by Jerusalem Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\J-EINSTN.COM Infected by Einstein virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- N Wrong name extension. Extension conflicts with program structure.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- K Unusual stack. The program has a suspicious stack or an odd stack.
-
- C:\VIRUSES\J-F13416.COM Infected by Friday the 13th Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- S Contains a routine to search for executable (.COM or .EXE) files.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\J-F13B.COM Infected by Friday the 13th Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- S Contains a routine to search for executable (.COM or .EXE) files.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
-
- C:\VIRUSES\J-F13VAR.COM Infected by Friday the 13th Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
-
- C:\VIRUSES\J-INJECT.EXE Infected by J-INJECT.EXE
- c No checksum / recovery information (Anti-Vir.Dat) available.
-
- C:\VIRUSES\J-JVT1.COM Infected by Jerusalem Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\J-MIKY.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\J-MOCTEZ.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\J-MULE.COM Might be infected by Captain Trips Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\J-MUMY10.EXE Infected by Jerusalem Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- K Unusual stack. The program has a suspicious stack or an odd stack.
-
- C:\VIRUSES\J-NOV30.COM Infected by Jerusalem Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\J-PUERTO.EXE Might be infected by Captain Trips Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- K Unusual stack. The program has a suspicious stack or an odd stack.
-
- C:\VIRUSES\J-SPAIN.COM Infected by Jerusalem Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\J-STD3.COM Might be infected by Captain Trips Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- N Wrong name extension. Extension conflicts with program structure.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- K Unusual stack. The program has a suspicious stack or an odd stack.
-
- C:\VIRUSES\J-STD5.COM Might be infected by Captain Trips Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- N Wrong name extension. Extension conflicts with program structure.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- K Unusual stack. The program has a suspicious stack or an odd stack.
-
- C:\VIRUSES\J-STTD.COM Might be infected by Captain Trips Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\J-SUNDY2.COM Infected by Jerusalem Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\J-SUNDYC.COM Infected by Jerusalem Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\J-SUNDYD.EXE Infected by Jerusalem Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- K Unusual stack. The program has a suspicious stack or an odd stack.
-
- C:\VIRUSES\J-SURIV3.EXE Might be infected by Captain Trips Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- K Unusual stack. The program has a suspicious stack or an odd stack.
-
- C:\VIRUSES\J-SWISS.EXE Might be infected by Captain Trips Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- K Unusual stack. The program has a suspicious stack or an odd stack.
-
- C:\VIRUSES\J-TRIPLE.COM Might be infected by Captain Trips Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\J4J.COM Infected by J4J Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\JABB812.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\JAMES.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
-
- C:\VIRUSES\JAP-XMAS.COM Might be infected by Japanese Christmas Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\JAPAN.COM Might be infected by Japanese Christmas Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\JASMINE.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
- ! Invalid opcode (non-8088 instructions) or out-of-range branch.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\JD_276.COM Might be infected by Mirror Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\JER-VAR1.COM Might be infected by Captain Trips Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\JER-VAR2.COM Might be infected by Captain Trips Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\JER-VAR3.COM Might be infected by Captain Trips Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\JER-VAR4.COM Might be infected by Captain Trips Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\JER-VAR6.COM Might be infected by Captain Trips Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\JER-VAR7.COM Might be infected by Captain Trips Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\JERS-B.EXE Might be infected by Captain Trips Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- K Unusual stack. The program has a suspicious stack or an odd stack.
-
- C:\VIRUSES\JERUCARF.COM Might be infected by Captain Trips Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\JERUSALB.COM Might be infected by Captain Trips Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\JERUSELM.COM Might be infected by Captain Trips Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\JERUSL-B.COM Might be infected by Captain Trips Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\JIHUU.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\JOANNA.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\JOE.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- N Wrong name extension. Extension conflicts with program structure.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\JOEDEM1.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\JOEXE.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- N Wrong name extension. Extension conflicts with program structure.
- ? Inconsistent exeheader. Might be a virus but can also be a bug.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
- K Unusual stack. The program has a suspicious stack or an odd stack.
-
- C:\VIRUSES\JOJO.COM Infected by Cascade Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\JOKER!.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- D Disk write access. The program writes to disk without using DOS.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\JOKER-A.EXE
- c No checksum / recovery information (Anti-Vir.Dat) available.
- i Additional data found at end of file. Probably internal overlay.
-
- C:\VIRUSES\JOKER2.COM Might be infected by DEMO.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\JOSHI2.COM Dropper of Joshi Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- D Disk write access. The program writes to disk without using DOS.
-
- C:\VIRUSES\JOSHUA.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\JO_V111.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
-
- C:\VIRUSES\JUNE16.COM Infected by June 16th (Pretoria) Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
-
- C:\VIRUSES\JUNE16TH.COM Infected by June 16th (Pretoria) Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
-
- C:\VIRUSES\JUSTICE.COM Infected by Justice Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\J_1600.COM Might be infected by Captain Trips Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\J_GC_B.COM Infected by 1575 related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- N Wrong name extension. Extension conflicts with program structure.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
- K Unusual stack. The program has a suspicious stack or an odd stack.
-
- C:\VIRUSES\KAMASYA.COM Infected by Murphy Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\KAMIKAZE.COM Infected by Kamikaze Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- N Wrong name extension. Extension conflicts with program structure.
-
- C:\VIRUSES\KARIN.COM Infected by Flip Virus COM/EXE
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\KEM257A1.COM Infected by Kemerovo Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\KEMEROVO.COM Infected by Kemerovo Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\KENNEDY.COM Infected by Kennedy (333) Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\KEY.COM Infected by Keypress Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- M Memory resident code. This program can be a TSR but also a virus.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\KEYCOM.COM Infected by Keypress Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- M Memory resident code. This program can be a TSR but also a virus.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\KEYDROP.COM Infected by MUSICBUG.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- D Disk write access. The program writes to disk without using DOS.
-
- C:\VIRUSES\KEYPRESS.COM Infected by Keypress Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\KIEV.COM Infected by Kiev Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\KIEV493.COM Infected by Kiev Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\KIIS.COM Infected by SK virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\KILL.COM Might be infected by KILLFC.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- ! Invalid opcode (non-8088 instructions) or out-of-range branch.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\KILL1.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- ! Invalid opcode (non-8088 instructions) or out-of-range branch.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\KILLER1.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- ! Invalid opcode (non-8088 instructions) or out-of-range branch.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\KILLFC.COM Infected by KILLFC.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- D Disk write access. The program writes to disk without using DOS.
-
- C:\VIRUSES\KILROY.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- D Disk write access. The program writes to disk without using DOS.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
-
- C:\VIRUSES\KINISON.COM Infected by VCL (encrypted) virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- D Disk write access. The program writes to disk without using DOS.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\KINNISON.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\KISS.EXE Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\KIT.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\KLAEREN.EXE Infected by Klaeren Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- K Unusual stack. The program has a suspicious stack or an odd stack.
- i Additional data found at end of file. Probably internal overlay.
-
- C:\VIRUSES\KLAEREN.COM Infected by Klaeren Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\KODE4V11.COM Might be infected by DC-C.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
-
- C:\VIRUSES\KOREA.COM Infected by MUSICBUG.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- D Disk write access. The program writes to disk without using DOS.
-
- C:\VIRUSES\KOUCH1.COM Infected by VCL (encrypted) virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\KRANZ.COM Infected by Holland Girl Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- D Disk write access. The program writes to disk without using DOS.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\KUKAC-NA.COM Infected by Turbo 448 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- M Memory resident code. This program can be a TSR but also a virus.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\KUKACT5.COM Infected by Turbo Kukac Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- M Memory resident code. This program can be a TSR but also a virus.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\KUKU.COM Infected by Kuku-448 virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\KVIRUS.COM Infected by USSR 1049 related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\KYLIE.COM Might be infected by Captain Trips Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\LABEL.COM Infected by Disk Int Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- D Disk write access. The program writes to disk without using DOS.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\LCASE847.COM Infected by Lower Case virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
-
- C:\VIRUSES\LCCANCER.COM Infected by Amstrad Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\LCMTE1.COM Infected by Fear Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\LCRB2.COM Might be infected by GENERIC.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
-
- C:\VIRUSES\LCT3.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\LEAP.COM Infected by USSR 516 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\LEAPFROG.COM Infected by USSR 516 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\LEAP_FRG.COM Infected by USSR 516 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\LEECH.COM Infected by Leech Dropper
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\LEECH2.COM Infected by Leech Dropper
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\LEGALIZ2.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\LEGALIZE.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\LEHIGH.COM Infected by Lehigh Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
-
- C:\VIRUSES\LENIN543.COM Might be infected by KEYPRESS.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\LENIN600.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\LEP-A.COM Infected by Leprosy Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
-
- C:\VIRUSES\LEP-C1.COM Infected by Leprosy C or D Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
-
- C:\VIRUSES\LEP-D.COM Infected by Leprosy C or D Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
-
- C:\VIRUSES\LEP-VIPR.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
-
- C:\VIRUSES\LEP-XABA.EXE Infected by Crackpot-1972 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- N Wrong name extension. Extension conflicts with program structure.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\LEPROSYB.COM Infected by Leprosy B Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
-
- C:\VIRUSES\LIBERTY.COM Infected by Liberty Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- M Memory resident code. This program can be a TSR but also a virus.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
-
- C:\VIRUSES\LIBERTY1.COM Infected by KEYPRESS.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
-
- C:\VIRUSES\LIBERTY2.COM Infected by Liberty-Boot Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
-
- C:\VIRUSES\LIBERTYS.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\LIBERTY_.EXE Infected by Liberty-Boot Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- M Memory resident code. This program can be a TSR but also a virus.
- K Unusual stack. The program has a suspicious stack or an odd stack.
- i Additional data found at end of file. Probably internal overlay.
-
- C:\VIRUSES\LIGHT.COM Might be infected by Tiny (163) Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
-
- C:\VIRUSES\LISBON.COM Infected by Vienna Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\LISBON-A.COM Infected by Vienna Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- ! Invalid opcode (non-8088 instructions) or out-of-range branch.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\LISBON-B.COM Infected by Vienna Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\LISBON2.COM Infected by Vienna Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- T Incorrect timestamp. Some viruses use this to mark infected files.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\LOCKUP.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
-
- C:\VIRUSES\LOVCHILB.COM Infected by LoveChild Virus or Trojan
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- D Disk write access. The program writes to disk without using DOS.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\LOVECHLD.COM Infected by LoveChild Virus or Trojan
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- D Disk write access. The program writes to disk without using DOS.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\LOZ-1023.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- ! Invalid opcode (non-8088 instructions) or out-of-range branch.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\LOZINSKY.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- ! Invalid opcode (non-8088 instructions) or out-of-range branch.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\LYTHYUM.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\M-ANTIC1.EXE Infected by Murphy Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\M-GOBLIN.COM Infected by DEMO.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\M-HIV1.COM Infected by Murphy Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\M-KMSYA2.EXE Infected by Murphy Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\M-MURPH2.COM Infected by Murphy Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\M-MURPH3.EXE Infected by Murphy Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\M-PEST.COM Infected by Murphy Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\M-SM1835.COM Infected by Murphy Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\M-SWAMI.COM Infected by Murphy Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\M-TORMB.EXE Infected by Dark Avenger related virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\MACHO.COM Infected by Syslock Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
-
- C:\VIRUSES\MADDEN.EXE Might be infected by ACME Virus (Clonewar Mutant)
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
-
- C:\VIRUSES\MADDENB.EXE Might be infected by Intruder Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
-
- C:\VIRUSES\MAG2560.COM Infected by Magnitogorsk Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
-
- C:\VIRUSES\MAGN2048.COM Infected by Magnitogorsk Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
-
- C:\VIRUSES\MAGN2560.COM Infected by Magnitogorsk Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\MAKE-10.EXE Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
-
- C:\VIRUSES\MAKE-11.EXE
- c No checksum / recovery information (Anti-Vir.Dat) available.
- i Additional data found at end of file. Probably internal overlay.
-
- C:\VIRUSES\MAKESTND.COM Dropper of Zapper/Rostov Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\MAKETORM.COM Dropper of Zapper/Rostov Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
-
- C:\VIRUSES\MALMSEY.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
-
- C:\VIRUSES\MALTESE.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\MANEQUIN.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\MANOWAR.COM Infected by Terror Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\MANTA.COM Infected by a Virus created by the VCS
- c No checksum / recovery information (Anti-Vir.Dat) available.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\MANUEL.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\MARAUDER.COM Infected by Marauder virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\MARIO.EXE Infected by StarDot-600 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- D Disk write access. The program writes to disk without using DOS.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- K Unusual stack. The program has a suspicious stack or an odd stack.
-
- C:\VIRUSES\MATTHEW.COM Infected by Vienna Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\MAYAK.COM Infected by Mayak-2339 virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\MCWHALE.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
-
- C:\VIRUSES\MCWHLE-B.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\MD-VIRUS.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- ! Invalid opcode (non-8088 instructions) or out-of-range branch.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\MEGATROJ.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- D Disk write access. The program writes to disk without using DOS.
-
- C:\VIRUSES\MEM.COM Might be infected by Captain Trips Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\MENDOZA.COM Might be infected by Captain Trips Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\MERDE-4.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\MESS.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\METAL.COM Might be infected by Leprosy B Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- D Disk write access. The program writes to disk without using DOS.
-
- C:\VIRUSES\METAL-B.COM Infected by Boys related virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\MG-1.COM Infected by MG Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\MG-2.COM Infected by MG Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\MG-31.COM Infected by MG Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- M Memory resident code. This program can be a TSR but also a virus.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\MG-4.COM Infected by MG Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- M Memory resident code. This program can be a TSR but also a virus.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\MGTU.COM Infected by MGTU Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\MHZ.EXE Infected by MHZ.EXE
- c No checksum / recovery information (Anti-Vir.Dat) available.
- D Disk write access. The program writes to disk without using DOS.
-
- C:\VIRUSES\MICHEL.COM Dropper of MichelAngelo Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
-
- C:\VIRUSES\MICRO128.COM Infected by TINY128 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\MICROPOX.COM Infected by USSR 1049 related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\MIGRAM.COM Infected by Murphy Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\MIKEDROP.COM Dropper of MichelAngelo Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
-
- C:\VIRUSES\MIMIC1.COM Infected by VCL (encrypted) virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- ! Invalid opcode (non-8088 instructions) or out-of-range branch.
-
- C:\VIRUSES\MIMIC2.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\MINDLESS.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- D Disk write access. The program writes to disk without using DOS.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
-
- C:\VIRUSES\MINDRIOT.COM Infected by 1992B Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
-
- C:\VIRUSES\MINI-35.COM Might be infected by DC-C.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
-
- C:\VIRUSES\MINI-45.COM Infected by Minimal Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
-
- C:\VIRUSES\MINI117.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\MINI45.COM Infected by Minimal Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
-
- C:\VIRUSES\MINI91.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- S Contains a routine to search for executable (.COM or .EXE) files.
-
- C:\VIRUSES\MINI97.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
-
- C:\VIRUSES\MINI99.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\MINISCUL.COM Infected by Define Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
-
- C:\VIRUSES\MINISTRY.COM Infected by Ministry virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
-
- C:\VIRUSES\MIR.COM Infected by Dark Avenger related virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- ! Invalid opcode (non-8088 instructions) or out-of-range branch.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\MIRROR.COM Infected by Russian Mirror Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\MIT.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\MITHRAND.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- T Incorrect timestamp. Some viruses use this to mark infected files.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\MIX-1.EXE Infected by Mix I Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\MIX1.EXE Infected by Mix I Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\MIX1FIX.EXE Infected by Mix I Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
- i Additional data found at end of file. Probably internal overlay.
-
- C:\VIRUSES\MIX2.COM Infected by Mix II Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\MKWORM.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
-
- C:\VIRUSES\MLTI.COM Infected by USSR 830 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\MLTI830.COM Infected by USSR 830 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\MNDRT2_.COM Infected by 1992B Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- D Disk write access. The program writes to disk without using DOS.
-
- C:\VIRUSES\MOBY6H.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- ! Invalid opcode (non-8088 instructions) or out-of-range branch.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\MONO.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\MONTH46A.COM Infected by Agiplan Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\MONXLA.COM Infected by Vienna Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\MONXLA-B.COM Infected by Vienna Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\MORE.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\MORGOTH.COM Infected by DEICIDE-2 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\MOSQUITO.EXE Infected by Mosquito! Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- M Memory resident code. This program can be a TSR but also a virus.
- K Unusual stack. The program has a suspicious stack or an odd stack.
- i Additional data found at end of file. Probably internal overlay.
-
- C:\VIRUSES\MOUSE.COM Infected by J4J Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\MRJ.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\MSHARK1.COM Infected by Mshark Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\MSHOCK.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\MSK.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
- ! Invalid opcode (non-8088 instructions) or out-of-range branch.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\MSK_1075.COM Infected by Crash Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- M Memory resident code. This program can be a TSR but also a virus.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\MSS.EXE Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- N Wrong name extension. Extension conflicts with program structure.
- S Contains a routine to search for executable (.COM or .EXE) files.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\MTL-THND.COM Might be infected by Leprosy B Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- D Disk write access. The program writes to disk without using DOS.
-
- C:\VIRUSES\MTSU532.COM Infected by MSTU-531 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\MUAD'DIB.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\MULTI.COM Infected by Jerusalem Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- T Incorrect timestamp. Some viruses use this to mark infected files.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\MUNNICH.COM Infected by Munich Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
-
- C:\VIRUSES\MURPHY.COM Infected by Murphy Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\MURPHY-1.COM Infected by Murphy Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\MURPHY-2.COM Infected by Murphy Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\MUSICBUG.COM Infected by MUSICBUG.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- D Disk write access. The program writes to disk without using DOS.
-
- C:\VIRUSES\MUTANT.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- ! Invalid opcode (non-8088 instructions) or out-of-range branch.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\MUTWHALE.COM Infected by Whale Mutant #21
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\NANITE.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
-
- C:\VIRUSES\NAVIGATO.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\NAZI.COM Might be infected by Captain Trips Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\NAZIPBIA.EXE
- c No checksum / recovery information (Anti-Vir.Dat) available.
-
- C:\VIRUSES\NAZISK-2.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
-
- C:\VIRUSES\NAZISKIN.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- D Disk write access. The program writes to disk without using DOS.
-
- C:\VIRUSES\NEATSEX.EXE Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- N Wrong name extension. Extension conflicts with program structure.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
-
- C:\VIRUSES\NECRO.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\NECROP.COM Infected by Necropolis virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
-
- C:\VIRUSES\NECROP-X.COM Infected by V1963 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\NED_DEMO.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\NEPOLIM.COM Infected by Polimer Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
-
- C:\VIRUSES\NEWBAD.COM Infected by Crackpot-208 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
-
- C:\VIRUSES\NEWJERU.COM Might be infected by Captain Trips Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\NEWYEARS.COM Infected by Vienna Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\NICHOLS.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
-
- C:\VIRUSES\NIGHTCR3.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
-
- C:\VIRUSES\NINA.COM Infected by Nina Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\NINES705.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\NKOTB.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\NMAN.EXE Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- S Contains a routine to search for executable (.COM or .EXE) files.
-
- C:\VIRUSES\NMAN-B.EXE Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- S Contains a routine to search for executable (.COM or .EXE) files.
-
- C:\VIRUSES\NOGZOEEN.EXE
- c No checksum / recovery information (Anti-Vir.Dat) available.
-
- C:\VIRUSES\NOINT.COM Infected by MUSICBUG.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- D Disk write access. The program writes to disk without using DOS.
-
- C:\VIRUSES\NOMENKLA.COM Infected by Nomenclatura Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- D Disk write access. The program writes to disk without using DOS.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\NOMNKLAT.COM Infected by Nomenclatura Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- D Disk write access. The program writes to disk without using DOS.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\NOONBEEP.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\NOTHING.COM Infected by Do Nothing Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\NOV17-B.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\NOV17768.EXE Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
- K Unusual stack. The program has a suspicious stack or an odd stack.
-
- C:\VIRUSES\NOV17TH.COM Infected by November 17th Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\NPLAGUE.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- p Packed program. A virus could be -invisibly- inside the program.
-
- C:\VIRUSES\NTKC-B.COM Infected by Vienna Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\NULL-178.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\NULLSET.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
-
- C:\VIRUSES\NULLSETB.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\NUMBER1B.COM Infected by AIDSLOAD.EXE
- c No checksum / recovery information (Anti-Vir.Dat) available.
-
- C:\VIRUSES\OFF-E.EXE Infected by SVC Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\OLD-YANK.EXE Might be infected by Old Yankee Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- ? Inconsistent exeheader. Might be a virus but can also be a bug.
- i Additional data found at end of file. Probably internal overlay.
-
- C:\VIRUSES\OLDYANK.COM Infected by Old Yankee Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\OLO.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\OMEGA.COM Infected by Omega Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- D Disk write access. The program writes to disk without using DOS.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\ONTAR512.COM Infected by Ontario Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\ONTARIO.COM Infected by Ontario Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\ONTARIO.EXE Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- ! Invalid opcode (non-8088 instructions) or out-of-range branch.
- T Incorrect timestamp. Some viruses use this to mark infected files.
- ? Inconsistent exeheader. Might be a virus but can also be a bug.
- K Unusual stack. The program has a suspicious stack or an odd stack.
-
- C:\VIRUSES\ONTARIO3.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
-
- C:\VIRUSES\OPWOLF.COM Infected by Cascade Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\ORION262.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\OROPAX.COM Infected by Oropax Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- M Memory resident code. This program can be a TSR but also a virus.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\OROPAX!.COM Infected by Oropax Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- M Memory resident code. This program can be a TSR but also a virus.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\OTTO.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\OTTO5.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\OW-27B.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
-
- C:\VIRUSES\OW0.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
-
- C:\VIRUSES\OW1.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
-
- C:\VIRUSES\OW2.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
-
- C:\VIRUSES\OW3.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
-
- C:\VIRUSES\OW30.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\OW4.COM Might be infected by DC-C.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
-
- C:\VIRUSES\OW5.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
-
- C:\VIRUSES\OW6.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
-
- C:\VIRUSES\OW7.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
-
- C:\VIRUSES\PADDED-A.COM Infected by DEMO.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\PARIS.COM Infected by Paris Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- D Disk write access. The program writes to disk without using DOS.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
-
- C:\VIRUSES\PARIS.EXE Infected by Paris Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- D Disk write access. The program writes to disk without using DOS.
- K Unusual stack. The program has a suspicious stack or an odd stack.
-
- C:\VIRUSES\PARITY.COM Infected by Parity Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\PARK.EXE Infected by Dark Avenger related virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- ! Invalid opcode (non-8088 instructions) or out-of-range branch.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\PASC7808.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- N Wrong name extension. Extension conflicts with program structure.
-
- C:\VIRUSES\PATH.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
-
- C:\VIRUSES\PATIENTB.COM Infected by Doom 2-B Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
-
- C:\VIRUSES\PAYDAY.COM Might be infected by Captain Trips Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\PCBB.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\PCBB1273.COM Infected by J4J Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\PCBB1652.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\PCBB1677.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\PCBB3.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\PCBB5.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\PCBBXXXX.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\PCFLU2A.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\PCFLU2C.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\PEACH.COM Infected by Peach Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
-
- C:\VIRUSES\PEARLHBR.COM Infected by VCL (encrypted) virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
-
- C:\VIRUSES\PEBBLE.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
-
- C:\VIRUSES\PERFUM13.COM Infected by G-Virus 1.3 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
-
- C:\VIRUSES\PERFUME.COM Might be infected by G-Virus 1.3 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
-
- C:\VIRUSES\PETERBRG.COM Infected by Vienna Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\PGPONG_B.COM Dropper of PingPong or Typo Boot Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- M Memory resident code. This program can be a TSR but also a virus.
-
- C:\VIRUSES\PHANTOM.COM Infected by Phantom Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\PHENOME.COM Might be infected by Captain Trips Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\PHOENIX.COM Infected by Phoenix related virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
-
- C:\VIRUSES\PHOENIX1.COM Infected by Phoenix related virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- T Incorrect timestamp. Some viruses use this to mark infected files.
-
- C:\VIRUSES\PHOENIX2.COM Infected by Phoenix related virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- T Incorrect timestamp. Some viruses use this to mark infected files.
-
- C:\VIRUSES\PHX1226M.COM Infected by Phoenix related virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
-
- C:\VIRUSES\PIF-PAF.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\PING-B.COM Dropper of PingPong or Typo Boot Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- M Memory resident code. This program can be a TSR but also a virus.
-
- C:\VIRUSES\PINGPONG.COM Infected by MUSICBUG.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
-
- C:\VIRUSES\PIRATE.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
-
- C:\VIRUSES\PITER.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
-
- C:\VIRUSES\PIXEL-1.COM Infected by Amstrad Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\PIXEL275.COM Infected by Amstrad Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\PIXEL892.COM Infected by Amstrad Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\PIXEL897.COM Infected by Amstrad Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\PIXEL899.COM Infected by Amstrad Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\PIXEL905.COM Infected by Amstrad Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\PIXIE.COM Infected by Amstrad Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\PIXL-345.COM Infected by Amstrad Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\PIXL-847.COM Infected by Amstrad Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\PIXL-850.COM Infected by Amstrad Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\PIXL277.COM Infected by Amstrad Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\PIXL847A.COM Infected by Amstrad Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\PIXL852.COM Infected by Amstrad Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\PIXL892.COM Infected by Amstrad Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\PIXL897.COM Infected by Amstrad Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\PIXL899A.COM Infected by Amstrad Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\PIXL899B.COM Infected by Amstrad Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\PIXLS457.COM Infected by Amstrad Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\PIXLS550.COM Infected by Amstrad Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\PLAGUE.COM Might be infected by Leprosy B Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- D Disk write access. The program writes to disk without using DOS.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\PLAQUE-A.COM Might be infected by Leprosy B Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
-
- C:\VIRUSES\PLAS-HM2.EXE Infected by Jerusalem Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- K Unusual stack. The program has a suspicious stack or an odd stack.
- i Additional data found at end of file. Probably internal overlay.
-
- C:\VIRUSES\PLASREL.COM Infected by Jerusalem Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\PLAST421.COM Might be infected by Captain Trips Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\PLAST451.COM Might be infected by Captain Trips Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\PLASTCOB.COM Might be infected by Captain Trips Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\PLASTIQ.EXE Might be infected by Captain Trips Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- K Unusual stack. The program has a suspicious stack or an odd stack.
-
- C:\VIRUSES\PLASTIQ.COM Might be infected by Captain Trips Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\PLASTIQB.COM Infected by Jerusalem Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\PLASTIQU.EXE Infected by Jerusalem Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- M Memory resident code. This program can be a TSR but also a virus.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
- K Unusual stack. The program has a suspicious stack or an odd stack.
- i Additional data found at end of file. Probably internal overlay.
-
- C:\VIRUSES\PLATINUM.EXE Infected by Jerusalem Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- K Unusual stack. The program has a suspicious stack or an odd stack.
-
- C:\VIRUSES\PLO.COM Might be infected by Captain Trips Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- S Contains a routine to search for executable (.COM or .EXE) files.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\PLOVDIV.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
-
- C:\VIRUSES\PLOVDV11.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
-
- C:\VIRUSES\PLSCOBOL.COM Might be infected by Captain Trips Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\POEM.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\POEM2.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- M Memory resident code. This program can be a TSR but also a virus.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\POGUE.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\POGUE!.COM Infected by MTE Virus (non-encrypted)
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\POL-217.COM Infected by Polish 217 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\POL-529.COM Infected by USSR 529 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\POL-583.COM Infected by Vienna Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\POL529-A.COM Infected by USSR 529 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\POL529-B.COM Infected by USSR 529 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\POL529-C.COM Infected by USSR 529 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\POL529-D.COM Infected by USSR 529 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\POLIMER.COM Infected by Polimer Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
-
- C:\VIRUSES\POLISH.EXE Infected by Vienna Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- N Wrong name extension. Extension conflicts with program structure.
- S Contains a routine to search for executable (.COM or .EXE) files.
- T Incorrect timestamp. Some viruses use this to mark infected files.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\POSS103B.COM Infected by Poss-A Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\POSS2367.COM Infected by Poss-A Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\POSS2438.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\POSS2446.COM Infected by Poss-B virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\POSSA.COM Infected by Poss-A Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\POSSB.COM Infected by Poss-B virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\POSSESSD.COM Infected by Poss-A Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\POX2.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\PR-BKTIM.COM Infected by Backtime Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\PR-JOKER.COM Infected by Backtime Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\PR-SHAKR.COM Infected by Backtime Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\PRAGJOKR.COM Infected by Backtime Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\PRETORIA.COM Infected by June 16th (Pretoria) Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
-
- C:\VIRUSES\PRISM.COM Infected by Flip Virus COM/EXE
- c No checksum / recovery information (Anti-Vir.Dat) available.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\PROGVIR.COM Might be infected by GENERIC.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
-
- C:\VIRUSES\PROT.COM Infected by Cascade Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- M Memory resident code. This program can be a TSR but also a virus.
-
- C:\VIRUSES\PROTO-T.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\PROUD.COM Infected by Phoenix related virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\PRTSCR.COM Infected by MUSICBUG.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- D Disk write access. The program writes to disk without using DOS.
-
- C:\VIRUSES\PRUDENTS.COM Infected by 1210 (Prudent) Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- N Wrong name extension. Extension conflicts with program structure.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- K Unusual stack. The program has a suspicious stack or an odd stack.
-
- C:\VIRUSES\PS!KO-A.COM Infected by Dark Avenger related virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\PS!KO-B.COM Infected by Dark Avenger related virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\PS!KO-C.COM Might be infected by 1028 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- T Incorrect timestamp. Some viruses use this to mark infected files.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\PS-MPC2.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- N Wrong name extension. Extension conflicts with program structure.
- K Unusual stack. The program has a suspicious stack or an odd stack.
-
- C:\VIRUSES\PS-MPCPK.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- N Wrong name extension. Extension conflicts with program structure.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- K Unusual stack. The program has a suspicious stack or an odd stack.
-
- C:\VIRUSES\PSQR.COM Infected by Jerusalem Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\PSQR1720.COM Infected by Jerusalem Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\PSYCHO.COM Infected by Psycho Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
-
- C:\VIRUSES\PS_707.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- D Disk write access. The program writes to disk without using DOS.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\PUERTO.COM Might be infected by Captain Trips Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\QSPAWN.EXE
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- i Additional data found at end of file. Probably internal overlay.
-
- C:\VIRUSES\QUICKEY.COM Infected by Nomenclatura Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- D Disk write access. The program writes to disk without using DOS.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\QUIET.COM Infected by Quiet Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\R-20.COM Might be infected by 1028 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\R-22.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\RADYUM.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
-
- C:\VIRUSES\RADYUM-B.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
-
- C:\VIRUSES\RAMVIR.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\RANDOM.COM Infected by Fear Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\RAPE-10.COM Infected by Rape Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\RAPE-11.COM Infected by LOL Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\RAPE22.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\RAPE747.COM Infected by LOL Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\RAT.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
-
- C:\VIRUSES\RAUBKOPI.COM Infected by Raubkopie Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- D Disk write access. The program writes to disk without using DOS.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\RAV.EXE Infected by Dark Avenger related virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\RAV.COM Infected by Dark Avenger related virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\REAPER.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\RED-DIAV.COM Infected by USSR 830 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\REDCROSS.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\REDDIAV.COM Infected by USSR 830 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\REDDIAV2.COM Infected by USSR 830 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\REDHRNG.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\REDX.COM Infected by Ambulance Car Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\REDX_2.COM Infected by Ambulance Car Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\REQ_981.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\RESET.COM Infected by Omega Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- D Disk write access. The program writes to disk without using DOS.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\RESEXT.COM Infected by Necropolis virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\RESSURCT.COM Infected by 483 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\RETVIR.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- ! Invalid opcode (non-8088 instructions) or out-of-range branch.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\REVENGE.COM Infected by Revenge Attacker Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\RICHARDS.COM Infected by VCL (encrypted) virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
-
- C:\VIRUSES\RM.EXE Infected by V801 Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- D Disk write access. The program writes to disk without using DOS.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- K Unusual stack. The program has a suspicious stack or an odd stack.
-
- C:\VIRUSES\RMIRROR.COM Infected by Russian Mirror Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\RMIT.COM Infected by Leprosy Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
-
- C:\VIRUSES\RNA2.EXE
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
-
- C:\VIRUSES\ROB.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- D Disk write access. The program writes to disk without using DOS.
-
- C:\VIRUSES\ROB3.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
-
- C:\VIRUSES\ROSTOV.COM Infected by MUSICBUG.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- D Disk write access. The program writes to disk without using DOS.
-
- C:\VIRUSES\RPVS.COM Infected by RVPS related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
-
- C:\VIRUSES\RTL4.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\RUSHHOUR.EXE Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\RUSH_VIR.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\RUSSIA.COM Infected by Fear Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\R_1992.COM Infected by 1992B Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
-
- C:\VIRUSES\S-CADET.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
-
- C:\VIRUSES\S86.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\SAD.COM Infected by VVV-252 Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
-
- C:\VIRUSES\SADDAM.COM Infected by Saddam Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\SARA.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\SARA!.COM Infected by Fear Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\SARATOGA.COM Infected by Icelandic/Saratoga Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- N Wrong name extension. Extension conflicts with program structure.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
-
- C:\VIRUSES\SAT-BUG.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\SAT14.COM Infected by Saterday 14th (Durban) Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\SATHANYC.COM Infected by Necropolis virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\SBC-1024.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\SBDATAMO.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\SBHEADA.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\SBWHYWIN.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\SCHITZO.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- N Wrong name extension. Extension conflicts with program structure.
- i Additional data found at end of file. Probably internal overlay.
-
- C:\VIRUSES\SCHITZO.EXE
- c No checksum / recovery information (Anti-Vir.Dat) available.
- i Additional data found at end of file. Probably internal overlay.
-
- C:\VIRUSES\SCOTTSV.COM Infected by Scotts Valley Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\SCRAMBLE.EXE Might be infected by J-INJECT.EXE
- c No checksum / recovery information (Anti-Vir.Dat) available.
-
- C:\VIRUSES\SCREAM4.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\SCREAM5.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\SCREAMER.COM Infected by SCREAMER Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\SCREAMII.COM Infected by Screamer II virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\SCREEN1.COM Infected by USSR 948 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\SCRIBBLE.COM Infected by LeprmutX Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
-
- C:\VIRUSES\SCROLL.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\SCRUNCH.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\SCYTHE.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- T Incorrect timestamp. Some viruses use this to mark infected files.
-
- C:\VIRUSES\SDOT-789.COM Infected by V801 Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- D Disk write access. The program writes to disk without using DOS.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\SDOT801.COM Infected by StarDot-801 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\SD_789.COM Infected by V801 Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- D Disk write access. The program writes to disk without using DOS.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\SEC4096.EXE Infected by 4096 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
- K Unusual stack. The program has a suspicious stack or an odd stack.
- i Additional data found at end of file. Probably internal overlay.
-
- C:\VIRUSES\SECJERU.EXE Might be infected by Captain Trips Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- K Unusual stack. The program has a suspicious stack or an odd stack.
- i Additional data found at end of file. Probably internal overlay.
-
- C:\VIRUSES\SECRET.COM Infected by SHHS Virus (Overwriting)
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- D Disk write access. The program writes to disk without using DOS.
-
- C:\VIRUSES\SECT0.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- D Disk write access. The program writes to disk without using DOS.
-
- C:\VIRUSES\SEMTEX.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\SENECA.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
-
- C:\VIRUSES\SENECA2.EXE Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- N Wrong name extension. Extension conflicts with program structure.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
-
- C:\VIRUSES\SENT-1.COM Infected by Sentinel Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\SENT-3.COM Infected by Sentinel Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- D Disk write access. The program writes to disk without using DOS.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\SENT-5.COM Infected by Sentinel Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- D Disk write access. The program writes to disk without using DOS.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\SENT5173.COM Infected by Sentinel Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- D Disk write access. The program writes to disk without using DOS.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\SENT5402.COM Infected by Sentinel Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- D Disk write access. The program writes to disk without using DOS.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\SENTINEL.COM Infected by Sentinel Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\SENTVAR1.COM Infected by Sentinel Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\SEX-REV.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
-
- C:\VIRUSES\SEX11.COM Infected by MUSICBUG.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- D Disk write access. The program writes to disk without using DOS.
-
- C:\VIRUSES\SEXUAL.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
-
- C:\VIRUSES\SF-I.COM Infected by SCREAMER Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\SF-IIC.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\SFER.COM Infected by Amstrad Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\SHADB635.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\SHAKE.COM Infected by Shake Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\SHAKER.COM Infected by Backtime Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\SHAKY.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- ! Invalid opcode (non-8088 instructions) or out-of-range branch.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\SHEKTROJ.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- N Wrong name extension. Extension conflicts with program structure.
-
- C:\VIRUSES\SHHS.COM Infected by SHHS Virus (Overwriting)
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
-
- C:\VIRUSES\SHIT.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\SICKSICK.EXE Might be infected by Intruder Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
-
- C:\VIRUSES\SILENCE.COM Infected by Amstrad Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\SILLY.COM Infected by Amstrad Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\SILNIGHT.EXE Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\SILVER.COM Infected by LeprmutX Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
-
- C:\VIRUSES\SILVER-B.EXE
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- N Wrong name extension. Extension conflicts with program structure.
-
- C:\VIRUSES\SILVER2D.COM Infected by LeprmutX Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
-
- C:\VIRUSES\SILVER2F.COM Infected by LeprmutX Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
-
- C:\VIRUSES\SILVER3D.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
-
- C:\VIRUSES\SIMP.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\SIMPLE.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
-
- C:\VIRUSES\SIMPSON.COM Infected by Leprosy Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
-
- C:\VIRUSES\SIMULATE.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\SK-1992.COM Infected by 1992B Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
-
- C:\VIRUSES\SKISM.COM Infected by Captain Trips Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\SKISM1.COM Infected by Captain Trips Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\SKISM10.COM Infected by Captain Trips Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\SKISM11.COM Infected by Captain Trips Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\SKISM14.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- p Packed program. A virus could be -invisibly- inside the program.
-
- C:\VIRUSES\SKISM2.COM Infected by Captain Trips Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\SKISM3.COM Infected by Captain Trips Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\SKISM4.COM Infected by Captain Trips Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\SKISM5.COM Infected by Captain Trips Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\SKISM6.COM Infected by Captain Trips Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\SKISM7.COM Infected by Captain Trips Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\SKISM8.COM Infected by Captain Trips Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\SKISM808.COM Infected by 1992B Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
-
- C:\VIRUSES\SKISM9.COM Infected by Captain Trips Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\SLAY.COM Infected by 5120 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\SLAY.EXE Infected by 5120 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- ? Inconsistent exeheader. Might be a virus but can also be a bug.
- O Found code that can be used to overwrite/move a program in memory.
- K Unusual stack. The program has a suspicious stack or an odd stack.
- i Additional data found at end of file. Probably internal overlay.
-
- C:\VIRUSES\SLAYER.COM Infected by 5120 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- M Memory resident code. This program can be a TSR but also a virus.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\SLIME.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\SLOD.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- D Disk write access. The program writes to disk without using DOS.
- ! Invalid opcode (non-8088 instructions) or out-of-range branch.
-
- C:\VIRUSES\SLOW.COM Might be infected by Scotts Valley Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\SLOWDOWN.EXE
- c No checksum / recovery information (Anti-Vir.Dat) available.
-
- C:\VIRUSES\SMAL-144.COM Infected by 144 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\SMALARCV.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\SMALLEXE.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\SMASHER.EXE Infected by SMASHER.EXE
- c No checksum / recovery information (Anti-Vir.Dat) available.
-
- C:\VIRUSES\SMELL-IT.COM Infected by TRANS.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
-
- C:\VIRUSES\SMILE.EXE Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- D Disk write access. The program writes to disk without using DOS.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- i Additional data found at end of file. Probably internal overlay.
-
- C:\VIRUSES\SMILEY.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- D Disk write access. The program writes to disk without using DOS.
-
- C:\VIRUSES\SMOB1A.COM Infected by Vienna Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\SNAKE.COM Infected by TRANS.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
-
- C:\VIRUSES\SNFV.COM Infected by VCL (encrypted) virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\SOCHA.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\SOLANO.COM Infected by Solano 2000 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\SOLOMON.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\SOMETHIN.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\SORRY.COM Infected by G-Virus 1.3 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
-
- C:\VIRUSES\SOUND4.EXE
- c No checksum / recovery information (Anti-Vir.Dat) available.
- p Packed program. A virus could be -invisibly- inside the program.
- i Additional data found at end of file. Probably internal overlay.
-
- C:\VIRUSES\SOUTHAFR.COM Infected by Friday the 13th Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- S Contains a routine to search for executable (.COM or .EXE) files.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\SOUTHER.COM Infected by LeprmutX Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
-
- C:\VIRUSES\SP.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\SPANISH.COM Infected by Jerusalem Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\SPYER.EXE Infected by Spyer Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
- K Unusual stack. The program has a suspicious stack or an odd stack.
-
- C:\VIRUSES\SR.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\STAF.COM Infected by Staff Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
-
- C:\VIRUSES\STAR801.COM Infected by StarDot-801 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- D Disk write access. The program writes to disk without using DOS.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\STARSHP.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\START.EXE
- c No checksum / recovery information (Anti-Vir.Dat) available.
-
- C:\VIRUSES\STEALTH.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
-
- C:\VIRUSES\STIGMATA.COM Infected by Greetings Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\STINK1.COM Infected by Stinkfoot Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\STNKFOOT.COM Infected by Stinkfoot Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\STONE.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
-
- C:\VIRUSES\STONED.COM Infected by MUSICBUG.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- D Disk write access. The program writes to disk without using DOS.
-
- C:\VIRUSES\STONED.EXE Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- ! Invalid opcode (non-8088 instructions) or out-of-range branch.
-
- C:\VIRUSES\STONED-A.COM Infected by MUSICBUG.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- D Disk write access. The program writes to disk without using DOS.
-
- C:\VIRUSES\STONED-E.COM Infected by MUSICBUG.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- D Disk write access. The program writes to disk without using DOS.
-
- C:\VIRUSES\STONEDII.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\STONED_A.COM Dropper of Zapper/Rostov Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
-
- C:\VIRUSES\STPD1355.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\STRIKERB.COM Infected by Burger Related (Striker) Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\STUPIDA.COM Infected by Do Nothing Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\STUPIDPR.COM Infected by DEMO.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\SU1XUXA.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\SU2.EXE Infected by Suriv 2.01 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- K Unusual stack. The program has a suspicious stack or an odd stack.
-
- C:\VIRUSES\SUB-ZERO.COM Infected by Captain Trips Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\SUBLI110.COM Infected by Solano 2000 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\SUBLIMNL.COM Infected by Solano 2000 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\SUCCUBUS.COM Infected by VCL virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- D Disk write access. The program writes to disk without using DOS.
-
- C:\VIRUSES\SUNDAY.COM Infected by Jerusalem Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\SUNDAY-2.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- T Incorrect timestamp. Some viruses use this to mark infected files.
-
- C:\VIRUSES\SUNDAY-A.COM Infected by Jerusalem Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\SUNDAY-B.COM Infected by Jerusalem Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- S Contains a routine to search for executable (.COM or .EXE) files.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\SUNDAYX.COM Infected by Jerusalem Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\SUOMI.COM Infected by 1008 (Suomi) Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
-
- C:\VIRUSES\SUPER.COM Infected by Jerk (Talentless) Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\SURFER.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
-
- C:\VIRUSES\SURIV-1.COM Infected by Suriv 1.01 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\SURIV03.COM Might be infected by Captain Trips Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\SURIV201.COM Infected by Suriv 2.01 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- N Wrong name extension. Extension conflicts with program structure.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- K Unusual stack. The program has a suspicious stack or an odd stack.
-
- C:\VIRUSES\SURIVA.COM Infected by Suriv 1.01 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\SURVIVE.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
-
- C:\VIRUSES\SUSAN1.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
-
- C:\VIRUSES\SUX.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\SVC.COM Infected by SVC Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- M Memory resident code. This program can be a TSR but also a virus.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\SVC1064.COM Infected by SVC Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\SVC1689.COM Infected by SVC Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\SVC31.COM Infected by SVC Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\SVC3103.COM Infected by SVC Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- N Wrong name extension. Extension conflicts with program structure.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
- K Unusual stack. The program has a suspicious stack or an odd stack.
- i Additional data found at end of file. Probably internal overlay.
-
- C:\VIRUSES\SVC40.COM Infected by SVC Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\SVC41740.COM Infected by SVC Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\SVC50.COM Infected by SVC Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- N Wrong name extension. Extension conflicts with program structure.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
- K Unusual stack. The program has a suspicious stack or an odd stack.
-
- C:\VIRUSES\SVC60.COM Infected by SVC Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\SVC60.EXE Infected by SVC Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- ? Inconsistent exeheader. Might be a virus but can also be a bug.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
- K Unusual stack. The program has a suspicious stack or an odd stack.
-
- C:\VIRUSES\SVC64644.EXE Infected by SVC Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- M Memory resident code. This program can be a TSR but also a virus.
- ? Inconsistent exeheader. Might be a virus but can also be a bug.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
- K Unusual stack. The program has a suspicious stack or an odd stack.
-
- C:\VIRUSES\SVERDLOV.COM Infected by Sverdlov Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\SVIR.EXE Infected by SVir Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- K Unusual stack. The program has a suspicious stack or an odd stack.
-
- C:\VIRUSES\SVS.COM Infected by TRANS.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\SWAP.COM Infected by MUSICBUG.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- D Disk write access. The program writes to disk without using DOS.
-
- C:\VIRUSES\SWEDEDRP.COM Infected by MUSICBUG.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- D Disk write access. The program writes to disk without using DOS.
-
- C:\VIRUSES\SWISS143.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\SYLVIA.COM Infected by Holland Girl Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\SYLVIA1.COM Infected by Holland Girl Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\SYLVIA4.COM Infected by Holland Girl Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\SYSLOCK.COM Infected by Syslock Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
-
- C:\VIRUSES\SYSLOCK1.COM Infected by Syslock Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
-
- C:\VIRUSES\S_FORMAT.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\TAIWAN.COM Infected by Taiwan Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
-
- C:\VIRUSES\TAIWAN-3.COM Might be infected by Captain Trips Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\TAIWAN-4.COM Might be infected by Captain Trips Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\TAIWAN2.COM Infected by Taiwan Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
-
- C:\VIRUSES\TAIWAN3.COM Might be infected by Captain Trips Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\TARGET.COM Infected by Marauder virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\TB1.COM Infected by Whale Mutant #15
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- T Incorrect timestamp. Some viruses use this to mark infected files.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
-
- C:\VIRUSES\TB1.EXE Infected by Whale Mutant #15
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- K Unusual stack. The program has a suspicious stack or an odd stack.
-
- C:\VIRUSES\TB2.COM Infected by Whale Mutant #15
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- T Incorrect timestamp. Some viruses use this to mark infected files.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
-
- C:\VIRUSES\TB3.COM Infected by Whale Mutant #15
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- T Incorrect timestamp. Some viruses use this to mark infected files.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
-
- C:\VIRUSES\TB4.COM Infected by Whale Mutant #15
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- T Incorrect timestamp. Some viruses use this to mark infected files.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
-
- C:\VIRUSES\TB5.COM Infected by Whale Mutant #15
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- T Incorrect timestamp. Some viruses use this to mark infected files.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
-
- C:\VIRUSES\TB6.COM Infected by Whale Mutant #15
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- T Incorrect timestamp. Some viruses use this to mark infected files.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
-
- C:\VIRUSES\TB7.COM Infected by Whale Mutant #15
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- T Incorrect timestamp. Some viruses use this to mark infected files.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
-
- C:\VIRUSES\TB8.COM Infected by Whale Mutant #15
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- T Incorrect timestamp. Some viruses use this to mark infected files.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
-
- C:\VIRUSES\TB9.COM Infected by Whale Mutant #15
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- T Incorrect timestamp. Some viruses use this to mark infected files.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
-
- C:\VIRUSES\TCBK3066.COM Infected by Traceback (3066) Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\TDR_MUIS.COM Infected by CHEEBA-A Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\TEL-AVIV.COM Might be infected by Captain Trips Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\TEL3445.COM Infected by 3445 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
-
- C:\VIRUSES\TELECOM.COM Infected by Telecom (3784) Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\TELECOM1.COM Infected by Telecom (3784) Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\TEN1554.COM Infected by 1554 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\TENBYTE0.COM Infected by 1554 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\TEQUILA.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\TEQUILA.EXE Infected by Tequila Virus (Signature B)
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\TERMINTR.COM Infected by VCL (encrypted) virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- D Disk write access. The program writes to disk without using DOS.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\TERROR.COM Infected by Terror Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\TEST.COM Infected by TEST.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\TEST1.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- T Incorrect timestamp. Some viruses use this to mark infected files.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\TESTER.COM Infected by Test Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\TETNUS.EXE Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- D Disk write access. The program writes to disk without using DOS.
-
- C:\VIRUSES\TH.EXE Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- ? Inconsistent exeheader. Might be a virus but can also be a bug.
-
- C:\VIRUSES\THU1.COM Infected by Jerusalem Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\THUNDER.COM Infected by Akuku Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- D Disk write access. The program writes to disk without using DOS.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\THUR12TH.COM Infected by CD Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
-
- C:\VIRUSES\THXGIVN.COM Infected by V-1 Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\TIC_109.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\TIME.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- ! Invalid opcode (non-8088 instructions) or out-of-range branch.
-
- C:\VIRUSES\TIMID.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\TIMID-B.COM Infected by Timid Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\TIMID-C.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\TINY.COM Infected by Tiny (163) Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\TINY-133.COM Infected by Tiny Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\TINY-134.COM Infected by Tiny Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\TINY-138.COM Infected by Tiny Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\TINY-143.COM Infected by Tiny Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\TINY-154.COM Infected by Tiny Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\TINY-156.COM Infected by Tiny Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\TINY-158.COM Infected by Tiny Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\TINY-159.COM Infected by Tiny Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\TINY-160.COM Infected by Tiny Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\TINY-167.COM Infected by Tiny Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\TINY-198.COM Infected by Tiny Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\TINY122.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
-
- C:\VIRUSES\TINY124.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\TINY124B.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
-
- C:\VIRUSES\TINY126.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\TINY134.COM Infected by Tiny Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\TINY160.COM Infected by Tiny Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\TINY163.COM Infected by Tiny (163) Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\TINY198.COM Infected by Tiny Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\TINYB.COM Infected by Brenda virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\TINYC.COM Might be infected by Brenda virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\TINYF.COM Might be infected by Greetings Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\TINYIN80.COM Infected by Tiny Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\TMTMID.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\TOBACCO.COM Might be infected by Captain Trips Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\TOKYO.EXE
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
-
- C:\VIRUSES\TONY.COM Infected by Tony Related Virud
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\TONY-H.EXE Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- ? Inconsistent exeheader. Might be a virus but can also be a bug.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- i Additional data found at end of file. Probably internal overlay.
-
- C:\VIRUSES\TONYBDRP.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- M Memory resident code. This program can be a TSR but also a virus.
-
- C:\VIRUSES\TOPSY905.COM Infected by USSR 905 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- N Wrong name extension. Extension conflicts with program structure.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\TORMENT.COM Dropper of Aircop-B Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- D Disk write access. The program writes to disk without using DOS.
-
- C:\VIRUSES\TOYS.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- D Disk write access. The program writes to disk without using DOS.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\TP05.COM Might be infected by DEMO.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\TP06VIR.COM Might be infected by DEMO.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\TP16VIR.COM Might be infected by DEMO.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\TP19HVIR.COM Infected by Yankee Doodle Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\TP23VIR.COM Infected by Vacsina Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\TP24.COM Infected by Vacsina Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\TP25.COM Infected by Yankee Doodle Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\TP25VIR.COM Infected by Yankee Doodle Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\TP33VIR.COM Infected by VACSINA EXE2COM conversion
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- T Incorrect timestamp. Some viruses use this to mark infected files.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\TP34VIR.COM Infected by Yankee Doodle Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- T Incorrect timestamp. Some viruses use this to mark infected files.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\TP38VIR.COM Infected by Yankee Doodle Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- M Memory resident code. This program can be a TSR but also a virus.
- T Incorrect timestamp. Some viruses use this to mark infected files.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\TP39VIR.COM Infected by Yankee Doodle Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\TP39YANK.COM Infected by Yankee Doodle Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\TP41VIR.COM Infected by Yankee Doodle Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\TP42VIR.COM Infected by Yankee Doodle Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\TP44VIR.COM Infected by USSR 1049 related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\TP46.COM Infected by USSR 1049 related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\TP46VIR.COM Infected by USSR 1049 related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\TP4VIR.COM Might be infected by DEMO.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- T Incorrect timestamp. Some viruses use this to mark infected files.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\TPE-GEN.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
-
- C:\VIRUSES\TPRELOC.COM Might be infected by DEMO.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\TRAC3066.COM Infected by Traceback (3066) Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\TRACBAC2.COM Infected by Traceback II (2930) Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\TRACBCK2.COM Infected by Traceback II (2930) Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\TRACE.COM Infected by Traceback (3066) Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\TRACEBAK.COM Infected by Traceback (3066) Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\TRACEBCK.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
-
- C:\VIRUSES\TRANS.COM Infected by TRANS.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
-
- C:\VIRUSES\TRAVELLR.COM Infected by Traveller Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\TRCBCKII.COM Infected by Traceback II (2930) Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\TREE.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
-
- C:\VIRUSES\TREK-1.EXE Infected by 1575 related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
- K Unusual stack. The program has a suspicious stack or an odd stack.
-
- C:\VIRUSES\TRIPS-B.COM Infected by Captain Trips Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\TRKSWAP.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
-
- C:\VIRUSES\TROJAN.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- D Disk write access. The program writes to disk without using DOS.
-
- C:\VIRUSES\TRV-30B.COM Might be infected by DC-C.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\TRV-45P.COM Infected by Minimal (Polish) Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
-
- C:\VIRUSES\TSD1.COM Infected by MUSICBUG.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- D Disk write access. The program writes to disk without using DOS.
-
- C:\VIRUSES\TSOTL.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- ! Invalid opcode (non-8088 instructions) or out-of-range branch.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\TSOTL2.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\TUMEN05.COM Infected by Tumen Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\TUMEN20.COM Infected by Tumen Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\TUQ_VIR.COM Infected by RVPS related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
-
- C:\VIRUSES\TURBO.COM Infected by Turbo 448 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- M Memory resident code. This program can be a TSR but also a virus.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\TURBOKUK.COM Infected by Turbo Kukac Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- M Memory resident code. This program can be a TSR but also a virus.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\TV.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\TWIN_351.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\TWOTIGER.COM Might be infected by Captain Trips Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\TXT2COM.COM Infected by TERROR.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- T Incorrect timestamp. Some viruses use this to mark infected files.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\TXT2READ.COM Infected by Vienna Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- T Incorrect timestamp. Some viruses use this to mark infected files.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\TYPO.COM Might be infected by Typo Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\TYPO-712.COM Might be infected by Typo Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\TYPO-COM.COM Might be infected by Typo Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\TYPO1.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\TYPO2.COM Might be infected by Typo Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\TYPOBOOT.COM Infected by MUSICBUG.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- D Disk write access. The program writes to disk without using DOS.
-
- C:\VIRUSES\T_133.COM Infected by Tiny Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\U1689.EXE Infected by SVC Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- M Memory resident code. This program can be a TSR but also a virus.
- T Incorrect timestamp. Some viruses use this to mark infected files.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\U1689.COM Infected by SVC Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- M Memory resident code. This program can be a TSR but also a virus.
- T Incorrect timestamp. Some viruses use this to mark infected files.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\U948.COM Infected by USSR 948 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\ULTRASIK.EXE Might be infected by Intruder Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
-
- C:\VIRUSES\UNK.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\UNLOCK.COM Infected by UNLOCK.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
-
- C:\VIRUSES\USSR-600.COM Infected by USSR 600 related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- M Memory resident code. This program can be a TSR but also a virus.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\USSR-696.COM Infected by USSR 696 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- D Disk write access. The program writes to disk without using DOS.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\USSR1049.COM Infected by USSR 1049 related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\USSR2144.COM Infected by USSR 2144 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- M Memory resident code. This program can be a TSR but also a virus.
-
- C:\VIRUSES\USSR311.COM Infected by USSR 311 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\USSR492.COM Infected by USSR 492 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\USSR600.COM Infected by USSR 600 related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- M Memory resident code. This program can be a TSR but also a virus.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\USSR707.COM Infected by USSR 707 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- M Memory resident code. This program can be a TSR but also a virus.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\USSR711.COM Infected by USSR 711 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\USSR948.COM Infected by USSR 948 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\V-13507B.COM Infected by Vienna Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\V-170XB.EXE Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- ? Inconsistent exeheader. Might be a virus but can also be a bug.
-
- C:\VIRUSES\V-2000G.COM Infected by V2000 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\V-353.COM Infected by Vienna Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\V-361.COM Infected by Vienna Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\V-367.COM Infected by Vienna Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\V-618.COM Infected by Vienna Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\V-621.COM Infected by Vienna Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\V-623.COM Infected by Vienna Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\V-625.COM Infected by Vienna Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\V-644A.COM Infected by Vienna Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\V-644B.COM Infected by Vienna Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\V-656.COM Infected by Vienna Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\V-696.COM Might be infected by USSR 696 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- D Disk write access. The program writes to disk without using DOS.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\V-699.COM Infected by USSR 711 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\V-712.COM Infected by Vienna Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\V-726.COM Infected by Vienna Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\V-733.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\V-757.COM Infected by Vienna Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\V-822.COM Infected by Vienna Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\V-948.EXE Infected by USSR 948 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- i Additional data found at end of file. Probably internal overlay.
-
- C:\VIRUSES\V-948.COM Infected by USSR 948 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\V-B645A.COM Infected by Vienna Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\V-B645B.COM Infected by Vienna Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\V-CHRVIO.COM Infected by Vienna Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- D Disk write access. The program writes to disk without using DOS.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\V-FATCHR.COM Infected by Vienna Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\V-LISBNA.COM Infected by Vienna Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\V-LISBNB.COM Infected by Vienna Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\V-PARA1.COM Infected by Vienna Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\V-PARA2B.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\V-STNE90.COM Infected by Vienna Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\V-VHP776.COM Infected by Vienna Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\V-VIOLA.COM Infected by Vienna Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\V1-NOT!.EXE Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- D Disk write access. The program writes to disk without using DOS.
- i Additional data found at end of file. Probably internal overlay.
-
- C:\VIRUSES\V10.COM Infected by Phantom Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\V101.EXE Might be infected by Joker Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- ? Inconsistent exeheader. Might be a virus but can also be a bug.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
- K Unusual stack. The program has a suspicious stack or an odd stack.
-
- C:\VIRUSES\V1024.COM Infected by Diamond Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\V1024-X.COM Infected by Diamond Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\V1075.COM Infected by Crash Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- M Memory resident code. This program can be a TSR but also a virus.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\V12.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\V1226.COM Infected by Phoenix related virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\V1226D.COM Infected by Phoenix related virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- D Disk write access. The program writes to disk without using DOS.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\V1226M.COM Infected by Phoenix related virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
-
- C:\VIRUSES\V1600.COM Infected by Happy New Year Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\V1700.COM Infected by Cascade Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- T Incorrect timestamp. Some viruses use this to mark infected files.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\V200.COM Infected by Amstrad Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\V2000.COM Infected by V2000 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- T Incorrect timestamp. Some viruses use this to mark infected files.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\V2100.COM Might be infected by V2000 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\V2480.COM Infected by Crew 2480 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
-
- C:\VIRUSES\V2P1.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\V2P1260A.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\V2P2.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\V2P6.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- ! Invalid opcode (non-8088 instructions) or out-of-range branch.
- T Incorrect timestamp. Some viruses use this to mark infected files.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\V2P6Z.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\V306.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\V4096.COM Infected by 4096 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- T Incorrect timestamp. Some viruses use this to mark infected files.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\V500.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\V512-B.COM Infected by 512 Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
-
- C:\VIRUSES\V512-D.COM Infected by 512 Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
-
- C:\VIRUSES\V600.COM Infected by USSR 600 related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- M Memory resident code. This program can be a TSR but also a virus.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\V651.COM Infected by V651 (Eddie 3) Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- T Incorrect timestamp. Some viruses use this to mark infected files.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\V800.COM Infected by V800 Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\V800M.COM Infected by V800 Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\V82.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- D Disk write access. The program writes to disk without using DOS.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\VAC-TP23.COM Infected by Vacsina Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\VACSINA.COM Might be infected by DEMO.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\VAL1.COM Might be infected by Captain Trips Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\VAL2.COM Might be infected by Captain Trips Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\VALERT.COM Infected by DEMO.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\VANSOFT.COM Infected by Dark Avenger related virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\VBASIC-A.COM Infected by 5120 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- M Memory resident code. This program can be a TSR but also a virus.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\VBASIC-B.COM Infected by 5120 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\VCL-YD2.COM Infected by VCL virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\VCLSORL1.COM Infected by VCL (encrypted) virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- D Disk write access. The program writes to disk without using DOS.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\VCLSORL2.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\VCOMM.EXE Might be infected by VComm Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- M Memory resident code. This program can be a TSR but also a virus.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\VCOMM-A.COM Might be infected by VComm Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- N Wrong name extension. Extension conflicts with program structure.
- M Memory resident code. This program can be a TSR but also a virus.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\VCS.EXE
- c No checksum / recovery information (Anti-Vir.Dat) available.
-
- C:\VIRUSES\VCS-100.COM Infected by a Virus created by the VCS
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\VCS_ENGL.EXE
- c No checksum / recovery information (Anti-Vir.Dat) available.
-
- C:\VIRUSES\VENG.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\VERSIKEE.EXE Might be infected by Intruder Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
-
- C:\VIRUSES\VERSION.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\VE_311.COM Infected by USSR 311 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\VE_535.COM Infected by Vienna Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\VFSI.COM Infected by VFSI (Happy Day) Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\VHP-623.COM Infected by Vienna Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\VHP-648.COM Infected by Vienna Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- T Incorrect timestamp. Some viruses use this to mark infected files.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\VHP-648D.COM Infected by Vienna Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- T Incorrect timestamp. Some viruses use this to mark infected files.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\VHPMUT.COM Infected by Vienna Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- T Incorrect timestamp. Some viruses use this to mark infected files.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\VICTOR.COM Infected by Victor Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\VIEN6.COM Infected by Vienna Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\VIEN648A.COM Infected by Vienna Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\VIEN822.COM Infected by Vienna Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\VIENNA.COM Infected by Vienna Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\VIENNA-D.COM Infected by Vienna Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\VIENNA2.COM Infected by Vienna Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\VIENNAX.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- ! Invalid opcode (non-8088 instructions) or out-of-range branch.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\VIOL-B.COM Infected by Vienna Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\VIOL-B2.COM Infected by Vienna Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\VIOL-B3.COM Infected by Vienna Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\VIOL-B4.COM Infected by Vienna Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- D Disk write access. The program writes to disk without using DOS.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\VIOL-C.COM Infected by Vienna Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\VIOLATE.COM Infected by Vienna Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\VIOLATOR.COM Infected by Vienna Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
- T Incorrect timestamp. Some viruses use this to mark infected files.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\VIOLITE.COM Infected by Vienna Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\VIOLTRB2.COM Infected by Vienna Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\VIP-B.COM Infected by Vienna Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\VIRD106G.COM Infected by Burger Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\VIRD1542.COM Infected by Burger Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\VIRD792.COM Infected by Burger Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\VIRUS.COM Might be infected by Captain Trips Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\VIRUS101.COM Infected by Virus-101
- c No checksum / recovery information (Anti-Vir.Dat) available.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\VIVALDI.EXE Infected by Shirley Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- ? Inconsistent exeheader. Might be a virus but can also be a bug.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\VMESSIAH.COM Infected by VCL virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
-
- C:\VIRUSES\VORO1600.COM Infected by Voronezh Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\VORO370.COM Infected by USSR 600 related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\VORO650.COM Infected by Chemist-650 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\VORONEZH.COM Infected by Voronezh Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\VORPAL.EXE Infected by VORPAL.EXE
- c No checksum / recovery information (Anti-Vir.Dat) available.
-
- C:\VIRUSES\VOTE.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
-
- C:\VIRUSES\VOTERASE.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
-
- C:\VIRUSES\VP.COM Infected by VP Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\VRIEST.COM Might be infected by XTRATANK.EXE
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\VVV3.COM Infected by VVV-252 Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
-
- C:\VIRUSES\VX1.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\V_LES1.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\V_LES2.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\W13.COM Infected by Vienna Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\W13-A.COM Infected by Vienna Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\WALKER.COM Infected by WALKER virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- M Memory resident code. This program can be a TSR but also a virus.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\WANDERER.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\WANT_NO!.COM Infected by TRANS.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- M Memory resident code. This program can be a TSR but also a virus.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\WAREZ.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
-
- C:\VIRUSES\WARPCOM.EXE Infected by WARPCOM.EXE
- c No checksum / recovery information (Anti-Vir.Dat) available.
-
- C:\VIRUSES\WARPCOM2.EXE Infected by WARPCOM2.EXE
- c No checksum / recovery information (Anti-Vir.Dat) available.
-
- C:\VIRUSES\WARRIOR.EXE Infected by Warrior Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- D Disk write access. The program writes to disk without using DOS.
-
- C:\VIRUSES\WBKG.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
-
- C:\VIRUSES\WESTWOOD.COM Infected by Jerusalem Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\WHALE13.COM Infected by Whale Mutant #13
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\WHARPS.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\WIGGER.COM Infected by Leprosy B Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
-
- C:\VIRUSES\WILD2.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\WILDTHNG.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\WIPEOUT.EXE Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- ? Inconsistent exeheader. Might be a virus but can also be a bug.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
- K Unusual stack. The program has a suspicious stack or an odd stack.
-
- C:\VIRUSES\WISCONSN.COM Infected by Wisconsin Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\WOLFMAN.COM Infected by Wolfman Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\WONDER.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
-
- C:\VIRUSES\WONDER-2.EXE Infected by Wolfman Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- N Wrong name extension. Extension conflicts with program structure.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\WORD1069.COM Infected by Word Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- M Memory resident code. This program can be a TSR but also a virus.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\WORD1085.COM Infected by Word Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\WORD1387.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\WORD1503.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\WRZ_D00D.COM Infected by TRANS.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- D Disk write access. The program writes to disk without using DOS.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\WS1069B.COM Infected by Word Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- M Memory resident code. This program can be a TSR but also a virus.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\WS1085B.COM Infected by Word Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\WS1503B.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\WVIR14.EXE Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\WW-217.COM Infected by Polish 217 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\WWT-01.COM Infected by WWT Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
-
- C:\VIRUSES\WWT-02.COM Infected by WWT Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
-
- C:\VIRUSES\X-2.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\X-3AD.EXE
- c No checksum / recovery information (Anti-Vir.Dat) available.
- D Disk write access. The program writes to disk without using DOS.
-
- C:\VIRUSES\X-3B.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\XABARAS.COM Might be infected by Leprosy B Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- D Disk write access. The program writes to disk without using DOS.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
-
- C:\VIRUSES\XCOPY.EXE Infected by FEXE 1.0 virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- ? Inconsistent exeheader. Might be a virus but can also be a bug.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\XIA.COM Might be infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- R Relocator. Program code will be relocated in a suspicious way.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\XMAS-J.COM Might be infected by Japanese Christmas Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\XMASTREE.COM Infected by Christmas (XA1) Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
-
- C:\VIRUSES\XPEH4928.EXE Infected by Wolfman Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- N Wrong name extension. Extension conflicts with program structure.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\XTRATANK.EXE Infected by XTRATANK.EXE
- c No checksum / recovery information (Anti-Vir.Dat) available.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- M Memory resident code. This program can be a TSR but also a virus.
-
- C:\VIRUSES\XTRATANK.COM Infected by XTRATANK.EXE
- c No checksum / recovery information (Anti-Vir.Dat) available.
- M Memory resident code. This program can be a TSR but also a virus.
-
- C:\VIRUSES\XYZ.COM Infected by VVV-252 Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\Y-BANDT2.EXE Infected by Wolfman Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- N Wrong name extension. Extension conflicts with program structure.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\Y-TP46.EXE Infected by Wolfman Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- N Wrong name extension. Extension conflicts with program structure.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- M Memory resident code. This program can be a TSR but also a virus.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\YALE.COM Dropper of Yale Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- D Disk write access. The program writes to disk without using DOS.
-
- C:\VIRUSES\YANKEE.COM Infected by USSR 1049 related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\YANKIE.COM Infected by USSR 1049 related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- A Suspicious Memory Allocation. The program uses a non-standard
- way to search for, and/or allocate memory.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- M Memory resident code. This program can be a TSR but also a virus.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\YANSHORT.COM Infected by Old Yankee Related Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- R Relocator. Program code will be relocated in a suspicious way.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- T Incorrect timestamp. Some viruses use this to mark infected files.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
-
- C:\VIRUSES\YAUNCH.EXE Infected by Wolfman Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- N Wrong name extension. Extension conflicts with program structure.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- D Disk write access. The program writes to disk without using DOS.
- G Garbage instructions. Contains code that seems to have no purpose
- other than encryption or avoiding recognition by virus scanners.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\Z10.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- D Disk write access. The program writes to disk without using DOS.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\Z10-B.COM Might be infected by ARCV-4 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- D Disk write access. The program writes to disk without using DOS.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\Z10-C.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- D Disk write access. The program writes to disk without using DOS.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\ZAPHOD.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\ZEPPELIN.COM Infected by TRANS.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
-
- C:\VIRUSES\ZERO-2-0.COM Infected by Zero Translator Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
-
- C:\VIRUSES\ZEROBUG.COM Infected by Zero Bug Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- M Memory resident code. This program can be a TSR but also a virus.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\ZEROHUNT.COM Infected by AIDSLOAD.EXE
- c No checksum / recovery information (Anti-Vir.Dat) available.
-
- C:\VIRUSES\ZHER1018.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\ZHER1023.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\ZHER1882.COM Infected by Zherkov-1882 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
-
- C:\VIRUSES\ZHER2968.COM Infected by (VB) Zherkov-2968 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
-
- C:\VIRUSES\ZHER2970.EXE Infected by (VB) Zherkov-2970 Virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- # Found an instruction decryption routine. This is common
- for viruses but also for some protected software.
- E Flexible Entry-point. The code seems to be designed to be linked
- on any location within an executable file. Common for viruses.
- ? Inconsistent exeheader. Might be a virus but can also be a bug.
-
- C:\VIRUSES\ZK900.COM Infected by ZK900 virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- L The program traps the loading of software. Might be
- a virus that intercepts program load to infect the software.
- M Memory resident code. This program can be a TSR but also a virus.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
- C:\VIRUSES\ZZT.COM Infected by VCL (encrypted) virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- S Contains a routine to search for executable (.COM or .EXE) files.
-
- C:\VIRUSES\_16850.COM
- c No checksum / recovery information (Anti-Vir.Dat) available.
-
- C:\VIRUSES\_2617.EXE
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
-
- C:\VIRUSES\_302.COM Probably infected by an unknown virus
- c No checksum / recovery information (Anti-Vir.Dat) available.
- F Suspicious file access. Might be able to infect a file.
- M Memory resident code. This program can be a TSR but also a virus.
- J Suspicious jump construct. Entry point via chained- or indirect
- jumps. This is unusual for normal software but common for viruses.
- U Undocumented interrupt/DOS call. The program might be just tricky
- but can also be a virus using a non-standard way to detect itself.
- Z EXE/COM determination. The program tries to check whether a file
- is a COM or EXE file. Viruses need to do this to infect a program.
- O Found code that can be used to overwrite/move a program in memory.
- B Back to entry point. Contains code to re-start the program after
- modifications at the entry-point are made. Very usual for viruses.
-
-
- 1709 files processed, 1615 infected files found.
-
-
-
-
-