This HTML5 document contains 21 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

PrefixNamespace IRI
n17http://dbkwik.webdatacommons.org/ontology/
dctermshttp://purl.org/dc/terms/
n14http://dbkwik.webdatacommons.org/resource/WeoR4rhgZ16Tiitl2E-wuw==
n5http://dbkwik.webdatacommons.org/resource/fjhK2NtWd-DYQaiHs-iOZA==
n2http://dbkwik.webdatacommons.org/resource/1FJJ2g1cJvXZdgfxkBV0DQ==
n13http://dbkwik.webdatacommons.org/resource/bKdAIw7L0fzSxUz9zhHqKw==
n12http://dbkwik.webdatacommons.org/resource/-8mJVhZ4OC-pKkFNvxkIAg==
n10http://dbkwik.webdatacommons.org/resource/NeUSOUMmOzRLF40A7sulFw==
n6http://dbkwik.webdatacommons.org/malware/property/
rdfshttp://www.w3.org/2000/01/rdf-schema#
n11http://dbkwik.webdatacommons.org/resource/y7N6dOb_opo9zPXNFFfdtA==
n7http://dbkwik.webdatacommons.org/resource/Cteci1yq58wDC25geOK15A==
n16http://dbkwik.webdatacommons.org/resource/uazuHg3wEfJ5Uid5iYR3Jw==
n15http://dbkwik.webdatacommons.org/resource/dhn4Tc-C_Pnm-Sc8BHA5QQ==
n20http://dbkwik.webdatacommons.org/resource/IctOJfNpe_kVRwfzKv6V9g==
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
n9http://dbkwik.webdatacommons.org/resource/EBTk8fB32gpdlsr7xXF73Q==
n8http://dbkwik.webdatacommons.org/resource/FBDHD3NYLre4A0ULYYdn4w==
n22http://dbkwik.webdatacommons.org/resource/3QpRw4mH54TRBp6Zqy3erg==
n19http://dbkwik.webdatacommons.org/resource/RiaMY-W7ua567zJeXjY1LA==
n21http://dbkwik.webdatacommons.org/resource/3s7u7VSgzsZU2HcaUdoshA==
xsdhhttp://www.w3.org/2001/XMLSchema#
n18http://dbkwik.webdatacommons.org/resource/m5268hoCy0FopVdhvAYd7w==
Subject Item
n2:
rdf:type
n16:
rdfs:label
CMOSDead
rdfs:comment
The CMOSDead virus and activates destructively whenever it feels like it. After infecting .COM files, it will randomly run the payload routine where it displays a truly high-pitched sound and scary visual payload, while at the same time corrupting the CMOS memory (which will cause the system to lose the current time and hard drive controller settings, which must be re-entered manually by the user). However, this virus contains another payload, where if the user presses CTRL+ALT+DEL (to restart the computer) during the payload, then the virus will format the hard drive. Virus.DOS.CMOSDead is an extremely dangerous memory resident encrypted virus on DOS. There are 5 variants having 2 different alias: * Virus.DOS.CMOSDead.4792 * Virus.DOS.CMOSDead.5154 * Virus.DOS.ILoveDos.3618 * Virus.DOS.ILoveDos.3622 * Virus.DOS.ILoveDos.3710
dcterms:subject
n5: n12: n13: n20: n21: n22:
n6:wikiPageUsesTemplate
n7:
n9:
1989
n15:
MS-DOS
n18:
CMOSDead
n19:
Virus
n8:
Assembly
n10:
*DOS executable *MZ executable
n14:
*CMOSDead *CMOS_Dead *ILoveDOS
n11:
Grisoft
n17:abstract
Virus.DOS.CMOSDead is an extremely dangerous memory resident encrypted virus on DOS. There are 5 variants having 2 different alias: * Virus.DOS.CMOSDead.4792 * Virus.DOS.CMOSDead.5154 * Virus.DOS.ILoveDos.3618 * Virus.DOS.ILoveDos.3622 * Virus.DOS.ILoveDos.3710 The CMOSDead virus and activates destructively whenever it feels like it. After infecting .COM files, it will randomly run the payload routine where it displays a truly high-pitched sound and scary visual payload, while at the same time corrupting the CMOS memory (which will cause the system to lose the current time and hard drive controller settings, which must be re-entered manually by the user). However, this virus contains another payload, where if the user presses CTRL+ALT+DEL (to restart the computer) during the payload, then the virus will format the hard drive.