PropertyValue
rdf:type
rdfs:label
  • CMOSDead
rdfs:comment
  • Virus.DOS.CMOSDead is an extremely dangerous memory resident encrypted virus on DOS. There are 5 variants having 2 different alias: * Virus.DOS.CMOSDead.4792 * Virus.DOS.CMOSDead.5154 * Virus.DOS.ILoveDos.3618 * Virus.DOS.ILoveDos.3622 * Virus.DOS.ILoveDos.3710
  • The CMOSDead virus and activates destructively whenever it feels like it. After infecting .COM files, it will randomly run the payload routine where it displays a truly high-pitched sound and scary visual payload, while at the same time corrupting the CMOS memory (which will cause the system to lose the current time and hard drive controller settings, which must be re-entered manually by the user). However, this virus contains another payload, where if the user presses CTRL+ALT+DEL (to restart the computer) during the payload, then the virus will format the hard drive.
dcterms:subject
dbkwik:malware/property/wikiPageUsesTemplate
Date
  • 1989
Platform
  • MS-DOS
Name
  • CMOSDead
Type
  • Virus
PL
  • Assembly
filetype
  • *DOS executable *MZ executable
AKA
  • *CMOSDead *CMOS_Dead *ILoveDOS
Creator
  • Grisoft
abstract
  • Virus.DOS.CMOSDead is an extremely dangerous memory resident encrypted virus on DOS. There are 5 variants having 2 different alias: * Virus.DOS.CMOSDead.4792 * Virus.DOS.CMOSDead.5154 * Virus.DOS.ILoveDos.3618 * Virus.DOS.ILoveDos.3622 * Virus.DOS.ILoveDos.3710
  • The CMOSDead virus and activates destructively whenever it feels like it. After infecting .COM files, it will randomly run the payload routine where it displays a truly high-pitched sound and scary visual payload, while at the same time corrupting the CMOS memory (which will cause the system to lose the current time and hard drive controller settings, which must be re-entered manually by the user). However, this virus contains another payload, where if the user presses CTRL+ALT+DEL (to restart the computer) during the payload, then the virus will format the hard drive.