- Page 1 and 2:
Department of Energy CIAC Computer
- Page 3 and 4:
Table of Contents Introduction 1 Pu
- Page 5 and 6:
The CIAC Computer Virus Information
- Page 7 and 8:
Introduction (continued) While we i
- Page 9 and 10:
Anti-Virus Software Availability Av
- Page 11 and 12:
Macro Viruses A new class of viruse
- Page 13 and 14:
Macro Viruses (continued) Protectin
- Page 15 and 16:
Additional Information and Assistan
- Page 17 and 18:
Macro Viruses Macro Virus Table Nam
- Page 19 and 20:
Macro Viruses MACRO The Detox virus
- Page 21 and 22:
AutoClose Appder Macro Viruses Name
- Page 23 and 24:
Macro Viruses MACRO Name: WM.Bandun
- Page 25 and 26:
Macro Viruses MACRO time you startu
- Page 27 and 28:
Notes: See WM.Concept.A Inserts Mac
- Page 29 and 30:
This is a French language version o
- Page 31 and 32:
Notes: See WM.Concept.A Installs ma
- Page 33 and 34:
Macro Viruses MACRO This macro does
- Page 35 and 36:
Macro Viruses Name: WM.Gangsterz Al
- Page 37 and 38:
It is not damaging on the Macintosh
- Page 39 and 40:
Macro Viruses Name: WM.Infezione Al
- Page 41 and 42:
Macro Viruses Name: WM.LBYNJ.De Ali
- Page 43 and 44:
Macro Viruses Name: WM.NF Aliases:
- Page 45 and 46:
Damage: No damage, only replicates.
- Page 47 and 48:
FileSaveAs InsertPayload Payload Ma
- Page 49 and 50:
Macro Viruses Name: WM.PCW:De Alias
- Page 51 and 52:
Notes: This is a word macro virus.
- Page 53 and 54:
Macros installed: Dateisspeichern o
- Page 55 and 56:
Does not spread on the Macintosh. M
- Page 57 and 58:
Macro Viruses Name: WM.Wazzu.2 Alia
- Page 59 and 60:
Macro Viruses Name: WM.Wazzu.U Alia
- Page 61:
Macro Viruses MACRO Protection: Set
- Page 64 and 65:
MAC Macintosh Computer Viruses To d
- Page 66 and 67:
MAC Joy Macintosh Computer Viruses
- Page 68 and 69:
MAC Macintosh Computer Viruses some
- Page 70 and 71:
MAC Macintosh Computer Viruses Dama
- Page 72 and 73:
MAC Macintosh Computer Viruses file
- Page 74 and 75:
MAC Macintosh Computer Viruses Name
- Page 76 and 77:
MAC Macintosh Computer Viruses Note
- Page 78 and 79:
MAC Macintosh Computer Viruses Name
- Page 80 and 81:
MAC Macintosh Computer Viruses Note
- Page 82 and 83:
MAC Macintosh Computer Viruses Find
- Page 84 and 85:
MAC Macintosh Computer Viruses Name
- Page 86 and 87:
MAC Macintosh Computer Viruses Cana
- Page 89 and 90:
MS-DOS/PC-DOS Computer Viruses MS-D
- Page 91 and 92:
MS-DOS/PC-DOS Computer Viruses The
- Page 93 and 94:
MS-DOS/PC-DOS Computer Viruses (nam
- Page 95 and 96:
MS-DOS/PC-DOS Computer Viruses The
- Page 97 and 98:
MS-DOS/PC-DOS Computer Viruses Note
- Page 99 and 100:
MS-DOS/PC-DOS Computer Viruses Name
- Page 101 and 102:
MS-DOS/PC-DOS Computer Viruses The
- Page 103 and 104:
MS-DOS/PC-DOS Computer Viruses Name
- Page 105 and 106:
MS-DOS/PC-DOS Computer Viruses Dama
- Page 107 and 108:
Damage: Deletes or moves files. Int
- Page 109 and 110:
MS-DOS/PC-DOS Computer Viruses The
- Page 111 and 112:
MS-DOS/PC-DOS Computer Viruses purp
- Page 113 and 114:
MS-DOS/PC-DOS Computer Viruses If y
- Page 115 and 116:
MS-DOS/PC-DOS Computer Viruses Name
- Page 117 and 118:
MS-DOS/PC-DOS Computer Viruses Note
- Page 119 and 120:
MS-DOS/PC-DOS Computer Viruses Name
- Page 121 and 122:
MS-DOS/PC-DOS Computer Viruses the
- Page 123 and 124:
MS-DOS/PC-DOS Computer Viruses Name
- Page 125 and 126:
MS-DOS/PC-DOS Computer Viruses The
- Page 127 and 128:
MS-DOS/PC-DOS Computer Viruses Name
- Page 129 and 130:
MS-DOS/PC-DOS Computer Viruses unus
- Page 131 and 132:
MS-DOS/PC-DOS Computer Viruses Dama
- Page 133 and 134:
MS-DOS/PC-DOS Computer Viruses Name
- Page 135 and 136:
MS-DOS/PC-DOS Computer Viruses Corr
- Page 137 and 138:
MS-DOS/PC-DOS Computer Viruses Repe
- Page 139 and 140:
Notes: MS-DOS/PC-DOS Computer Virus
- Page 141 and 142:
MS-DOS/PC-DOS Computer Viruses Name
- Page 143 and 144:
MS-DOS/PC-DOS Computer Viruses Name
- Page 145 and 146:
MS-DOS/PC-DOS Computer Viruses Dama
- Page 147 and 148:
MS-DOS/PC-DOS Computer Viruses Name
- Page 149 and 150:
MS-DOS/PC-DOS Computer Viruses Name
- Page 151 and 152:
MS-DOS/PC-DOS Computer Viruses CHKL
- Page 153 and 154:
MS-DOS/PC-DOS Computer Viruses freq
- Page 155 and 156:
Damage: Does no damage, doesn’t a
- Page 157 and 158:
Damage: Corrupts a program or overl
- Page 159 and 160:
MS-DOS/PC-DOS Computer Viruses head
- Page 161 and 162:
MS-DOS/PC-DOS Computer Viruses it a
- Page 163 and 164:
MS-DOS/PC-DOS Computer Viruses The
- Page 165 and 166:
MS-DOS/PC-DOS Computer Viruses Note
- Page 167 and 168:
MS-DOS/PC-DOS Computer Viruses The
- Page 169 and 170:
MS-DOS/PC-DOS Computer Viruses Name
- Page 171 and 172:
MS-DOS/PC-DOS Computer Viruses comm
- Page 173 and 174:
MS-DOS/PC-DOS Computer Viruses Name
- Page 175 and 176:
MS-DOS/PC-DOS Computer Viruses v6-1
- Page 177 and 178:
MS-DOS/PC-DOS Computer Viruses file
- Page 179 and 180:
MS-DOS/PC-DOS Computer Viruses Name
- Page 181 and 182:
MS-DOS/PC-DOS Computer Viruses Name
- Page 183 and 184:
MS-DOS/PC-DOS Computer Viruses Name
- Page 185 and 186:
MS-DOS/PC-DOS Computer Viruses Note
- Page 187 and 188:
MS-DOS/PC-DOS Computer Viruses repl
- Page 189 and 190:
MS-DOS/PC-DOS Computer Viruses acce
- Page 191 and 192:
Damage: Trashes the hard disk. MS-D
- Page 193 and 194:
MS-DOS/PC-DOS Computer Viruses goes
- Page 195 and 196:
MS-DOS/PC-DOS Computer Viruses erro
- Page 197 and 198:
MS-DOS/PC-DOS Computer Viruses Corr
- Page 199 and 200:
MS-DOS/PC-DOS Computer Viruses ----
- Page 201 and 202:
MS-DOS/PC-DOS Computer Viruses Name
- Page 203 and 204:
MS-DOS/PC-DOS Computer Viruses real
- Page 205 and 206:
MS-DOS/PC-DOS Computer Viruses Name
- Page 207 and 208:
MS-DOS/PC-DOS Computer Viruses Corr
- Page 209 and 210:
EXE application. Damage: Corrupts a
- Page 211 and 212:
MS-DOS/PC-DOS Computer Viruses Name
- Page 213 and 214:
MS-DOS/PC-DOS Computer Viruses v6-1
- Page 215 and 216:
MS-DOS/PC-DOS Computer Viruses Name
- Page 217 and 218:
Damage: Interferes with a running a
- Page 219 and 220:
MS-DOS/PC-DOS Computer Viruses INTC
- Page 221 and 222:
Incredible how you can See right th
- Page 223 and 224:
MS-DOS/PC-DOS Computer Viruses Note
- Page 225 and 226:
MS-DOS/PC-DOS Computer Viruses Name
- Page 227 and 228:
MS-DOS/PC-DOS Computer Viruses infe
- Page 229 and 230:
MS-DOS/PC-DOS Computer Viruses Dama
- Page 231 and 232:
MS-DOS/PC-DOS Computer Viruses it a
- Page 233 and 234:
MS-DOS/PC-DOS Computer Viruses Dama
- Page 235 and 236:
MS-DOS/PC-DOS Computer Viruses Name
- Page 237 and 238:
MS-DOS/PC-DOS Computer Viruses end
- Page 239 and 240:
Damage: Unknown, not analyzed yet.
- Page 241 and 242:
MS-DOS/PC-DOS Computer Viruses or o
- Page 243 and 244:
MS-DOS/PC-DOS Computer Viruses > >"
- Page 245 and 246:
MS-DOS/PC-DOS Computer Viruses else
- Page 247 and 248:
MS-DOS/PC-DOS Computer Viruses Dama
- Page 249 and 250:
MS-DOS/PC-DOS Computer Viruses Mast
- Page 251 and 252:
MS-DOS/PC-DOS Computer Viruses The
- Page 253 and 254:
COMMAND.COM. Damage: Interferes wit
- Page 255 and 256:
MS-DOS/PC-DOS Computer Viruses file
- Page 257 and 258:
EXE application. Hard disk partitio
- Page 259 and 260:
MS-DOS/PC-DOS Computer Viruses infe
- Page 261 and 262:
MS-DOS/PC-DOS Computer Viruses When
- Page 263 and 264:
MS-DOS/PC-DOS Computer Viruses Name
- Page 265 and 266:
MS-DOS/PC-DOS Computer Viruses Name
- Page 267 and 268:
MS-DOS/PC-DOS Computer Viruses The
- Page 269 and 270:
MS-DOS/PC-DOS Computer Viruses a di
- Page 271 and 272:
MS-DOS/PC-DOS Computer Viruses runn
- Page 273 and 274:
MS-DOS/PC-DOS Computer Viruses The
- Page 275 and 276:
MS-DOS/PC-DOS Computer Viruses So f
- Page 277 and 278:
MS-DOS/PC-DOS Computer Viruses The
- Page 279 and 280:
MS-DOS/PC-DOS Computer Viruses sect
- Page 281 and 282:
MS-DOS/PC-DOS Computer Viruses Note
- Page 283 and 284:
MS-DOS/PC-DOS Computer Viruses or o
- Page 285 and 286:
MS-DOS/PC-DOS Computer Viruses Name
- Page 287 and 288:
MS-DOS/PC-DOS Computer Viruses Name
- Page 289 and 290:
MS-DOS/PC-DOS Computer Viruses Name
- Page 291 and 292:
MS-DOS/PC-DOS Computer Viruses VIRU
- Page 293 and 294:
MS-DOS/PC-DOS Computer Viruses Name
- Page 295 and 296:
MS-DOS/PC-DOS Computer Viruses and
- Page 297 and 298:
Damage: Corrupts a program or overl
- Page 299 and 300:
MS-DOS/PC-DOS Computer Viruses MBR
- Page 301 and 302:
MS-DOS/PC-DOS Computer Viruses Name
- Page 303 and 304:
MS-DOS/PC-DOS Computer Viruses Name
- Page 305 and 306:
MS-DOS/PC-DOS Computer Viruses Hard
- Page 307 and 308:
MS-DOS/PC-DOS Computer Viruses or 1
- Page 309 and 310:
MS-DOS/PC-DOS Computer Viruses used
- Page 311 and 312:
MS-DOS/PC-DOS Computer Viruses Name
- Page 313 and 314:
COM application. Damage: Unknown, n
- Page 315 and 316:
MS-DOS/PC-DOS Computer Viruses or o
- Page 317 and 318:
MS-DOS/PC-DOS Computer Viruses Name
- Page 319 and 320:
MS-DOS/PC-DOS Computer Viruses Name
- Page 321 and 322:
Damage: Corrupts a program or overl
- Page 323 and 324:
MS-DOS/PC-DOS Computer Viruses Dama
- Page 325 and 326:
MS-DOS/PC-DOS Computer Viruses v6-1
- Page 327 and 328:
MS-DOS/PC-DOS Computer Viruses Name
- Page 329 and 330:
MS-DOS/PC-DOS Computer Viruses V170
- Page 331 and 332:
or overlay files. Notes: MS-DOS/PC-
- Page 333 and 334: MS-DOS/PC-DOS Computer Viruses Dama
- Page 335 and 336: MS-DOS/PC-DOS Computer Viruses Note
- Page 337 and 338: MS-DOS/PC-DOS Computer Viruses Corr
- Page 339 and 340: MS-DOS/PC-DOS Computer Viruses The
- Page 341 and 342: MS-DOS/PC-DOS Computer Viruses Name
- Page 343 and 344: MS-DOS/PC-DOS Computer Viruses @ECH
- Page 345 and 346: MS-DOS/PC-DOS Computer Viruses Dama
- Page 347: MS-DOS/PC-DOS Computer Viruses Name
- Page 350 and 351: WINDOWS peaceful goodnight, hopeful
- Page 352 and 353: WINDOWS COM application. EXE applic
- Page 354 and 355: WINDOWS Windows Computer Viruses It
- Page 356 and 357: WINDOWS Windows Computer Viruses Na
- Page 358 and 359: WINDOWS Windows Computer Viruses It
- Page 360 and 361: AMIGA Amiga Computer Viruses 356 CI
- Page 362 and 363: ATARI mouse. Atari Computer Viruses
- Page 364 and 365: HOAXES Virus and Internet Hoaxes sh
- Page 366 and 367: HOAXES The text on the page is: Vir
- Page 368 and 369: HOAXES Virus and Internet Hoaxes We
- Page 370 and 371: HOAXES Virus and Internet Hoaxes Th
- Page 372 and 373: HOAXES Virus and Internet Hoaxes Na
- Page 374 and 375: HOAXES Virus and Internet Hoaxes No
- Page 376 and 377: HOAXES Virus and Internet Hoaxes Na
- Page 379 and 380: PC Virus Index MS-DOS/PC-DOS Cross
- Page 381 and 382: PC Virus Index PC INDEX Virus Name/
- Page 383: PC Virus Index PC INDEX Virus Name/
- Page 387 and 388: PC Virus Index PC INDEX Virus Name/
- Page 389 and 390: PC Virus Index PC INDEX Virus Name/
- Page 391 and 392: PC Virus Index PC INDEX Virus Name/
- Page 393 and 394: PC Virus Index PC INDEX Virus Name/
- Page 395 and 396: PC Virus Index PC INDEX Virus Name/
- Page 397 and 398: PC Virus Index PC INDEX Virus Name/
- Page 399 and 400: PC Virus Index PC INDEX Virus Name/
- Page 401 and 402: PC Virus Index PC INDEX Virus Name/
- Page 403: PC Virus Index PC INDEX Virus Name/
- Page 406 and 407: TYPE DEFS Type Definitions Table Tr
- Page 409 and 410: Disk Locations Definitions Table Di
- Page 411 and 412: Damage Definitions Table DAMAGE DEF
- Page 413 and 414: Reader Comments CIAC updates and en