For example, if CHKDISK were typed in at the command line, a bogus CHKDISK.COM file would be executed before the legitimate CHKDISK.EXE. In many cases, the companion virus also runs the legitimate ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results