List of computer viruses (A-D)
Encyclopedia
Name | Alias(es) | Type | Subtype | Isolation Date | Isolation | Origin | Author | Notes | |
A and A | MS-DOS MS-DOS MS-DOS is an operating system for x86-based personal computers. It was the most commonly used member of the DOS family of operating systems, and was the main operating system for IBM PC compatible personal computers during the 1980s to the mid 1990s, until it was gradually superseded by operating... Windows 95 Windows 95 Windows 95 is a consumer-oriented graphical user interface-based operating system. It was released on August 24, 1995 by Microsoft, and was a significant progression from the company's previous Windows products... , Windows 98 Windows 98 Windows 98 is a graphical operating system by Microsoft. It is the second major release in the Windows 9x line of operating systems. It was released to manufacturing on 15 May 1998 and to retail on 25 June 1998. Windows 98 is the successor to Windows 95. Like its predecessor, it is a hybrid... |
unknown | unknown | ||||||
A-403 | MS-DOS MS-DOS MS-DOS is an operating system for x86-based personal computers. It was the most commonly used member of the DOS family of operating systems, and was the main operating system for IBM PC compatible personal computers during the 1980s to the mid 1990s, until it was gradually superseded by operating... Windows 95 Windows 95 Windows 95 is a consumer-oriented graphical user interface-based operating system. It was released on August 24, 1995 by Microsoft, and was a significant progression from the company's previous Windows products... , Windows 98 Windows 98 Windows 98 is a graphical operating system by Microsoft. It is the second major release in the Windows 9x line of operating systems. It was released to manufacturing on 15 May 1998 and to retail on 25 June 1998. Windows 98 is the successor to Windows 95. Like its predecessor, it is a hybrid... |
1998 | unknown | ||||||
Abraxas Abraxas (computer virus) Abraxas, also known as Abraxas5, discovered in April 1993, is an encrypted, overwriting, file infecting computer virus which infects .COM and .EXE files, although it does not infect command.com. It does not become memory resident... |
MS-DOS MS-DOS MS-DOS is an operating system for x86-based personal computers. It was the most commonly used member of the DOS family of operating systems, and was the main operating system for IBM PC compatible personal computers during the 1980s to the mid 1990s, until it was gradually superseded by operating... Windows 95 Windows 95 Windows 95 is a consumer-oriented graphical user interface-based operating system. It was released on August 24, 1995 by Microsoft, and was a significant progression from the company's previous Windows products... , Windows 98 Windows 98 Windows 98 is a graphical operating system by Microsoft. It is the second major release in the Windows 9x line of operating systems. It was released to manufacturing on 15 May 1998 and to retail on 25 June 1998. Windows 98 is the successor to Windows 95. Like its predecessor, it is a hybrid... |
April 1993 | unknown | Infects COM file COM file In many computer operating systems, a COM file is a type of executable file; the name is derived from the file name extension .COM. Originally, the term stood for "Command file", a text file containing commands to be issued to the operating system , on many of the Digital Equipment Corporation mini... . Disk directory listing will be set to the system date and time when infection occurred. |
|||||
Acid Acid (computer virus) Acid is a computer virus which infects .COM and .EXE files including command.com. Each time an infected file is executed, Acid infects all of the .EXE files in the current directory. Later, if an infected file is executed, it infects the .COM files in the current directory... |
MS-DOS MS-DOS MS-DOS is an operating system for x86-based personal computers. It was the most commonly used member of the DOS family of operating systems, and was the main operating system for IBM PC compatible personal computers during the 1980s to the mid 1990s, until it was gradually superseded by operating... Windows 95 Windows 95 Windows 95 is a consumer-oriented graphical user interface-based operating system. It was released on August 24, 1995 by Microsoft, and was a significant progression from the company's previous Windows products... , Windows 98 Windows 98 Windows 98 is a graphical operating system by Microsoft. It is the second major release in the Windows 9x line of operating systems. It was released to manufacturing on 15 May 1998 and to retail on 25 June 1998. Windows 98 is the successor to Windows 95. Like its predecessor, it is a hybrid... |
1992 | Corp-$MZU | Infects COM file COM file In many computer operating systems, a COM file is a type of executable file; the name is derived from the file name extension .COM. Originally, the term stood for "Command file", a text file containing commands to be issued to the operating system , on many of the Digital Equipment Corporation mini... . Disk directory listing will not be altered. |
|||||
Acme Acme (computer virus) Acme is a computer virus which infects EXE files. Each time an infected file is executed, Acme may infect an EXE in the current directory by creating a hidden 247 byte long read-only COM file with the same base name... |
Upon executing infected EXE EXE EXE is the common filename extension denoting an executable file in the DOS, OpenVMS, Microsoft Windows, Symbian, and OS/2 operating systems.... , this infects another EXE in current directory by making a hidden COM file COM file In many computer operating systems, a COM file is a type of executable file; the name is derived from the file name extension .COM. Originally, the term stood for "Command file", a text file containing commands to be issued to the operating system , on many of the Digital Equipment Corporation mini... with same base name. |
||||||||
ABC ABC (computer virus) ABC, discovered in October 1992, is a memory-resident, file-infecting computer virus which infects EXE files and may alter both COM and EXE files. ABC activates on the 13th day of every month.... |
|||||||||
Actifed Actifed (computer virus) Actifed is a G2-generated encrypted computer virus which infects .COM and .EXE files but not command.com. The virus is loaded into memory by executing an infected program and then affects the computer's run-time operation and corrupts program files.... |
|||||||||
Ada Ada (computer virus) Ada is a computer virus that can affect any of the DOS operating systems. Ada was first discovered in 1991.-Virus Characteristics:Ada is a memory resident virus that infects files... |
|||||||||
Agena Agena (computer virus) AGENA is a memory resident, file infecting computer virus which infects .COM and .EXE files, including command.com. It was discovered in Spain in September, 1992. Upon infection, Agena becomes memory resident at the top of system memory but below the 640K DOS boundary. Once it is memory resident,... |
|||||||||
AGI-Plan AGI-Plan (computer virus) For information on the African consulting company, see Agiplan .AGI-Plan was a memory resident DOS file infector first isolated at the Agiplan software company in Germany. Because of CARO standards that dictate that viruses should not be named after companies, AGI-Plan's technical name is Month 4-6... |
|||||||||
Ah Ah (computer virus) Ah is a very buggy computer virus which infects COM files including command.com. Ah is based on the V1024 virus, and originated in Italy in May 1991. When the first program infected with Ah is executed, Ah will install itself memory resident at the top of system memory, but below the 640K DOS... |
|||||||||
AI AI (computer virus) AI is a computer virus which infects .EXE files. The virus is loaded into memory by executing an infected program and then effects the computer's run time operation and corrupts program or overlay files. It does not appear to work with all .EXE files but does infect standard DOS files easily... |
|||||||||
AIDS AIDS (computer virus) AIDS is a computer virus written in Turbo Pascal 3.01a which overwrites com files. AIDS is the first virus known to exploit the MS-DOS "corresponding file" vulnerability. In MS-DOS, if both foo.com and foo.exe exist, then foo.com will always be executed first... |
|||||||||
AIDS II AIDS II (computer virus) AIDS II is a companion computer virus, which infects COM files. It was first discovered in April 1990, and is a variant of AIDS. Unlike other generic file infectors, AIDS II was the first known virus to employ what could be called a "corresponding file technique" of infection so that the original... |
|||||||||
AirCop | Air cop-B | MS-DOS MS-DOS MS-DOS is an operating system for x86-based personal computers. It was the most commonly used member of the DOS family of operating systems, and was the main operating system for IBM PC compatible personal computers during the 1980s to the mid 1990s, until it was gradually superseded by operating... |
Jan 1990 | ||||||
Ajax | |||||||||
Alabama Alabama (computer virus) Alabama is a computer virus, discovered October 1989 on the campus of Hebrew University in Jerusalem.-Infection:Alabama is a fairly standard file infector outside its odd behaviour of deciding what files to infect. When an infected file is executed, Alabama goes memory resident. Whenever a .EXE... |
|||||||||
Albanet | |||||||||
Alcon Alcon (computer virus) Alcon, or RSY , is a computer virus that was discovered to be spreading in Europe in 1997. It is a boot virus.-Infection:Alcon is a standard boot sector virus that spreads via floppies... |
|||||||||
Alien | |||||||||
Ambulance Ambulance (computer virus) Ambulance is a file infecting computer virus and it does not become memory resident. It will only infect one .COM file in any given directory, but will not infect the first one. This means there must be at least two .COM files in the directory for it to spread.... |
|||||||||
Amstrad | |||||||||
Ancient | |||||||||
Andre | |||||||||
Andre2 | |||||||||
Andromeda | |||||||||
Angelina | |||||||||
Anna | |||||||||
Anna Kournikova Anna Kournikova (computer virus) The Anna Kournikova computer virus was a computer virus authored by Dutch programmer Jan de Wit on February 11, 2001. It was designed to trick email users into opening a mail message purportedly containing a picture of tennis player Anna Kournikova, while actually hiding a malicious program... |
Email VBScript VBScript VBScript is an Active Scripting language developed by Microsoft that is modeled on Visual Basic. It is designed as a “lightweight” language with a fast interpreter for use in a wide variety of Microsoft environments... |
Jan de Wit | |||||||
Anninja | |||||||||
ANT | |||||||||
Ant-Cow | |||||||||
Anthrax - Boot | |||||||||
Anthrax - File | |||||||||
ANTI | 2-1989 | Does not spread under MultiFinder. | |||||||
AntiCMOS AntiCMOS (computer virus) AntiCMOS is a boot virus. Its first discovery was at Lenart, Slovenia, which led to its alias of Lenart. It was isolated in Hong Kong several times at the beginning of 1994, but did not become common until it spread to North America in the Spring of 1995... |
|||||||||
AntiHeuristica | It's payload is opposite of Cascade DOS virus, instead of the letters being pushed down, it pushes it upwards. | ||||||||
Anti-D | |||||||||
Anti-Daf | |||||||||
Anti-MIT | |||||||||
Anti-Pascal II | |||||||||
Anti-Pascal | |||||||||
Anti-Tel | |||||||||
Anti-Telefonica | |||||||||
Apadana | |||||||||
Arab | |||||||||
Aragon | |||||||||
Aragorn | |||||||||
ARCV-n ARCV-n (computer virus) ARCV-n is a term for a large family of viruses authored by the ARCV group through October - November 1992 and polymorphed with the PS-MPC virus generation tool . ARCV-n viruses seem to infect COM and/or EXE files rapidly, but do not damage the compromised machine, instead displaying various text... |
|||||||||
Argentina | |||||||||
Arka | |||||||||
Arma | |||||||||
Armagedon The Greek | |||||||||
Armagedon | |||||||||
Arriba | |||||||||
Arusiek | |||||||||
ASC | |||||||||
Ash | |||||||||
ASP-472 | |||||||||
Astra | |||||||||
AT 144 | |||||||||
AT 149 | |||||||||
Atas | |||||||||
Atas3321 | |||||||||
Atas-400 | |||||||||
Atom Atom The atom is a basic unit of matter that consists of a dense central nucleus surrounded by a cloud of negatively charged electrons. The atomic nucleus contains a mix of positively charged protons and electrically neutral neutrons... |
|||||||||
Atomic1A | |||||||||
Atomic1b | |||||||||
Atomic2A | |||||||||
Atomic2b | |||||||||
Atte-629 | |||||||||
August 16 | |||||||||
AusPar | |||||||||
Australian | |||||||||
Azusa | |||||||||
B Ugly | |||||||||
B3 | |||||||||
B-52 | |||||||||
BA101 | |||||||||
Back Time | |||||||||
Bacros | |||||||||
Bad Boy | |||||||||
Bad Brains | |||||||||
Bad Command | |||||||||
Bad Guy | |||||||||
Bad Sectors 1.2 Bad Sectors 1.2 (computer virus) On the Windows operating system, Bad Sectors 1.2 is a boot virus that infects users computers mainly by email. However, it may also infect a computer if the user visits certain web sites.-Overview:... |
|||||||||
Bad-389 | |||||||||
Bak | |||||||||
Bamestra | |||||||||
Banana | |||||||||
Bandit | |||||||||
Baobab 731 | |||||||||
Barcelona | |||||||||
Barrotes 2 | |||||||||
Barrotes | |||||||||
Basil | |||||||||
Bat | |||||||||
Beach | |||||||||
Beaches | |||||||||
Beast | |||||||||
BeBe | |||||||||
Beeper | |||||||||
Beer | |||||||||
Benoit | |||||||||
Real PvP Flava | |||||||||
Berlin | |||||||||
Best Wishes | |||||||||
Beta | |||||||||
Beva-32 | |||||||||
Beva-33 | |||||||||
Beva-96 | |||||||||
Beware | |||||||||
BFD | |||||||||
Big 2000 | |||||||||
Bit Addict | |||||||||
Black Knight | Blackworm |
||||||||
Black Monday | |||||||||
Blackjack | |||||||||
Black Pegasus | |||||||||
Blaze | |||||||||
Bljec | |||||||||
Blood Lust | |||||||||
Blood Rage | |||||||||
Blood | |||||||||
Blood-2 | |||||||||
Bob | |||||||||
Bomber Bomber (computer virus) Bomber is a DOS polymorphic computer virus known for its technique of "patchy infection". Contrary to the usual method of infecting executables , it inserts several fragments of its code in random places inside the file... |
|||||||||
Boot Killer | |||||||||
Bounce | Windows | Upon activation, it makes message boxes on screen and the mouse cursor "bounce" up and down. It does no other damage. | |||||||
Bouncing Dot | |||||||||
Bow | |||||||||
Boys | |||||||||
Brainy | |||||||||
BrO AcT | Windows XP | This virus will block most anti-virus programs and disable 'regedit', 'msconfig', and 'task manager' | |||||||
Brotherhood | |||||||||
Brothers | |||||||||
Browser Enhancement | Claims to enhance broweser experience, but when computer is re-booted, displays a fake anti-piracy warning claiming to need to pay to drop charges, but steals your credit card number. | ||||||||
Bryansk | |||||||||
Bubbles 2 | |||||||||
Bubbles | |||||||||
Bubonic | |||||||||
Budo | |||||||||
Burger | |||||||||
Burghofer | |||||||||
Busted | |||||||||
Butterfly | |||||||||
Butthole | |||||||||
Byte Bandit Byte Bandit Byte Bandit is a boot sector computer virus created for the Commodore Amiga. It first appeared in January 1988, and was created by SCA.It was one of the most feared Amiga viruses until the infamous Lamer Exterminator because not only did it spread from system to system automatically, it was also... |
Amiga, Bootsector virus | January 1988 | Swiss Cracking Association | ||||||
Byte Warrior | Amiga, Boot sector virus | ||||||||
(c)Brain | Pakistani flu, | January 1986 | Lahore Lahore Lahore is the capital of the Pakistani province of Punjab and the second largest city in the country. With a rich and fabulous history dating back to over a thousand years ago, Lahore is no doubt Pakistan's cultural capital. One of the most densely populated cities in the world, Lahore remains a... , Pakistan Pakistan Pakistan , officially the Islamic Republic of Pakistan is a sovereign state in South Asia. It has a coastline along the Arabian Sea and the Gulf of Oman in the south and is bordered by Afghanistan and Iran in the west, India in the east and China in the far northeast. In the north, Tajikistan... |
Basit and Amjad Farooq Alvi | Considered to be the first computer virus Computer virus A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly but erroneously used to refer to other types of malware, including but not limited to adware and spyware programs that do not have the reproductive ability... for the PC Personal computer A personal computer is any general-purpose computer whose size, capabilities, and original sales price make it useful for individuals, and which is intended to be operated directly by an end-user with no intervening computer operator... |
||||
C | |||||||||
Cabanas | |||||||||
Caco-Daemon | |||||||||
CAD Kill | |||||||||
C-A-D | |||||||||
Cannabis | |||||||||
Cansu | |||||||||
Capital | |||||||||
Cara | |||||||||
Caribe | |||||||||
Carioca | |||||||||
CaroEvil | |||||||||
Cartuja | |||||||||
Casc1621 | |||||||||
Casc-2 | |||||||||
Cascade Cascade (computer virus) The Cascade virus was a resident computer virus written in assembler, that was widespread in the 1980s and early 1990s. It infected COM files and had the effect of making text on the screen fall down and form a heap in the bottom of the screen. It was notable for using an encryption algorithm to... |
|||||||||
Casino Casino (computer virus) The casino computer virus is a malicious virus that upon running the infected file, copies the FAT to RAM, then deletes the FAT from the hard disk. It challenges you to a game of Jackpot of which you have 5 credits to play with, hence the name. If you fail to win, the computer shuts down, thereby... |
|||||||||
Casper | |||||||||
Casteggio | |||||||||
Caterpillar | 1575 | MS-DOS MS-DOS MS-DOS is an operating system for x86-based personal computers. It was the most commonly used member of the DOS family of operating systems, and was the main operating system for IBM PC compatible personal computers during the 1980s to the mid 1990s, until it was gradually superseded by operating... |
|||||||
Catman | |||||||||
Catphish | |||||||||
Caz | |||||||||
CB-1530 | |||||||||
CD | |||||||||
CDEF | 8-1990 | ||||||||
CDFL Mac | |||||||||
CD-10 | |||||||||
Century | |||||||||
Cerburus | |||||||||
CFSK | |||||||||
Chad | |||||||||
Chang | |||||||||
Chaos | |||||||||
Chaser | |||||||||
Chasna | |||||||||
Chcc | |||||||||
Cheeba | |||||||||
Cheesy | |||||||||
Chemist | |||||||||
Chemnitz | |||||||||
Chernobyl | |||||||||
Chile Mediera | |||||||||
Chinese Blood | |||||||||
Chr-869 | |||||||||
Chrisj13 | |||||||||
Christmas Tree | |||||||||
Christmas Violator | |||||||||
CIH CIH (computer virus) CIH, also known as Chernobyl or Spacefiller, is a Microsoft Windows computer virus written by Chen Ing Hau of Travian... |
|||||||||
Cinderella | |||||||||
Civil Service | |||||||||
Civil War II | |||||||||
Civil War III | |||||||||
Civil War IV | |||||||||
Civil War V | |||||||||
Civil War | |||||||||
CkSum | |||||||||
Clagger | |||||||||
Clint | |||||||||
Clonewar 2 | |||||||||
Clonewar | |||||||||
Clust | |||||||||
Coahuila | |||||||||
CODE 1 | 11-1993 | Renames the hard drive to "Trent Saburo" on any October 31st. | |||||||
CODE 252 | 4-1992 | ||||||||
Code Zero | |||||||||
Coffee Shop | |||||||||
Collor de Mello | |||||||||
Color | |||||||||
Com16850 | |||||||||
Com2S | |||||||||
Comdex | |||||||||
Commentator | |||||||||
Commwarrior | most common mobile phone virus for nokia mobile phones, transmits via bluetooth wireless. | ||||||||
Como | |||||||||
Compiler2 | |||||||||
Comspec | |||||||||
Conficker Conficker Conficker, also known as Downup, Downadup and Kido, is a computer worm targeting the Microsoft Windows operating system that was first detected in November 2008... |
|||||||||
Cop-Mpl | |||||||||
Copyright | |||||||||
Copyr-ug | |||||||||
Coruna | |||||||||
Coruna3 | |||||||||
Cossiga No Grazie | |||||||||
Cossiga | |||||||||
Costeau | |||||||||
CPXK | |||||||||
Cracker Jack | |||||||||
Cracky | |||||||||
Crash | |||||||||
Crasher | |||||||||
Crazy Eddie | |||||||||
Crazy Imp | |||||||||
CrazyI B | |||||||||
CRF | |||||||||
Cross Over | |||||||||
Crystal | |||||||||
CSL | |||||||||
CV4 | |||||||||
D1 | |||||||||
DKid | |||||||||
Dada | |||||||||
Damage | |||||||||
Danny | |||||||||
Dark Apocalypse | |||||||||
Dark Avenger Dark Avenger Dark Avenger was a pseudonym of a computer virus writer from Sofia, Bulgaria. He gained considerable popularity during the early 1990s, as some of his viruses spread not only nationwide, but across Europe as well, even reaching the United States.... |
|||||||||
Dark End | |||||||||
DataLock | |||||||||
Datos | |||||||||
Davis | |||||||||
D-Day | |||||||||
Death | |||||||||
Deathead | |||||||||
Deceide 2 | |||||||||
Dedicated | |||||||||
Deicide | |||||||||
Demolition | |||||||||
Demon | |||||||||
Den Zuk | |||||||||
Dennis | |||||||||
Deranged | |||||||||
Diablo | |||||||||
Dial | |||||||||
DigiDeliver | |||||||||
Dima | |||||||||
Disk Killer | |||||||||
Dismember | |||||||||
Dodgy 1024 | |||||||||
Dodo 2456 | |||||||||
Dodo | |||||||||
Doodle | |||||||||
Dorn | |||||||||
Dose-A | |||||||||
Druid | |||||||||
Dudley | |||||||||
Dutch Tiny | |||||||||
Dutch | Scare Worm This virus deletes all users, all data, and is the worst virus yet. |
Go on
List of viruses and related programs
- List of computer viruses
- List of computer viruses (Numeric)
- List of computer viruses (A–D)
- List of computer viruses (E-K)
- List of computer viruses (L-R)
- List of computer viruses (S-Z)
- Linux malwareLinux malwareLinux malware includes viruses, trojans, worms and other types of malware that affect the Linux operating system. Linux, Unix and other Unix-like computer operating systems are generally regarded as very well-protected, but not immune, from computer viruses...