List of computer viruses (S-Z)
Encyclopedia
Virus | Alias(es) | Type | Subtype | Isolation Date | Isolation | Origin | Author | Notes | |||||
S-847 | Weegee | Trojan horse | |||||||||||
Sabath | vindu | ||||||||||||
Sacramento | |||||||||||||
Saddam | |||||||||||||
Sadist | |||||||||||||
Sair | |||||||||||||
Sakora | |||||||||||||
San Diego | |||||||||||||
Sandra | |||||||||||||
Sandwich | |||||||||||||
Saratoga | |||||||||||||
Satan | |||||||||||||
Saturday 14th | |||||||||||||
Saturday | |||||||||||||
Sayha Waptpu | |||||||||||||
SBC | |||||||||||||
SCA SCA (computer virus) The SCA virus is the first computer virus created for the Commodore Amiga and one of the first to gain public notoriety. It appeared in November 1987. The SCA virus is a boot sector virus... |
Amiga, Boot sector virus | November 1987 | Switzerland Switzerland Switzerland name of one of the Swiss cantons. ; ; ; or ), in its full name the Swiss Confederation , is a federal republic consisting of 26 cantons, with Bern as the seat of the federal authorities. The country is situated in Western Europe,Or Central Europe depending on the definition.... |
Swiss Cracking Association | Puts a message on screen. Harmless except it might destroy a legitimate non-standard boot block. | ||||||||
Schrunch | |||||||||||||
Scores Scores (computer virus) Scores was a computer virus affecting Macintosh machines. It was first discovered in Spring 1988. It was written by a disgruntled programmer and specifically attacks two applications that were under development at his former company. These programs were never released to the public.Scores infects... |
Eric, Vult, NASA, San Jose Flu | Spring 1988 | Designed to attack two specific applications which were never released. | ||||||||||
Scott's Valley Scott's Valley (computer virus) is a computer virus, a member of the Slow virus family and distantly related to the Jerusalem virus family. It was discovered in September 1990 in Scotts Valley, California.... |
|||||||||||||
Scream 2 | |||||||||||||
Screaming Fist | |||||||||||||
Scribble | |||||||||||||
Scroll | |||||||||||||
SCT | |||||||||||||
Scythe2D | |||||||||||||
Sdir | search.completion | ||||||||||||
Secrets | |||||||||||||
Selectronics | |||||||||||||
Semtex | |||||||||||||
Sentinel | |||||||||||||
Sentinel-X | |||||||||||||
Seoul | |||||||||||||
Serena | |||||||||||||
Sergeant | |||||||||||||
SevenDust SevenDust (computer virus) SevenDust was a computer virus that affected computers running certain versions of Mac OS. It was discovered in 1998. It was originally referred to as 666.- External links :*, by Symantec*, by McAfee*, by McAfee... |
|||||||||||||
Sh | |||||||||||||
Shadow | |||||||||||||
Shake | |||||||||||||
Shaman | |||||||||||||
Shanghai | |||||||||||||
Shankar's Virus Shankar's Virus Shankar's Virus is a Polymorphic Computer Virus that infects Microsoft Word documents and templates. It was discovered June 3, 1999. It was created by Sam Rogers.-Effects:... |
W97M.Marker.o | Polymorphic Virus | Infects Word Documents | ||||||||||
Shatin | |||||||||||||
Shiny Happy | |||||||||||||
Shock Therapy | |||||||||||||
Shoerec Shoerec (computer virus) Win9x.Shoerec is a Win32 encrypted parasitic computer virus. It is a direct action virus.- Effects :The virus activates its payload after three to four months from the first infection... |
|||||||||||||
Show Game | |||||||||||||
Silence | |||||||||||||
Silent Banker | |||||||||||||
Silly Willy | |||||||||||||
Silver Dollar | |||||||||||||
Silver3b | |||||||||||||
Simile Simile (computer virus) Win32/Simile is a metamorphic computer virus written in assembly language for Microsoft Windows. The virus was released in the most recent version in early March 2002. It was written by the virus writer Mental Driller... |
The Mental Driller | ||||||||||||
Simple 1992 | |||||||||||||
Simulati | |||||||||||||
Sis | |||||||||||||
Sk | |||||||||||||
Sk1 | |||||||||||||
Skeleton | |||||||||||||
Skew 469 | |||||||||||||
Skism 808 | |||||||||||||
Skism | |||||||||||||
SkyTap Gen | |||||||||||||
Slant | |||||||||||||
Slayer | |||||||||||||
Slovak | |||||||||||||
Slow | |||||||||||||
Sma-108a | |||||||||||||
Small 129 | |||||||||||||
Small 132B | |||||||||||||
Small 146 | |||||||||||||
Small 157 | |||||||||||||
Small 178 | |||||||||||||
Small 185 | |||||||||||||
Small 187 | |||||||||||||
Small | |||||||||||||
Small-38 | |||||||||||||
Smily | |||||||||||||
Smithsonian | |||||||||||||
Solano | Soup Delete (computer virus) Simple format C drive | ||||||||||||
Something | |||||||||||||
Snow White and the Seven Dwarfs | |||||||||||||
Soupy | |||||||||||||
Sov | |||||||||||||
Soyun | |||||||||||||
Spanish April Fool | |||||||||||||
Spanish | |||||||||||||
Spanz | |||||||||||||
Spar | |||||||||||||
Sparta | |||||||||||||
Sp0rk3h | |||||||||||||
Spyer | |||||||||||||
SQR | |||||||||||||
Squawk | |||||||||||||
Squeaker | |||||||||||||
Squisher | |||||||||||||
SRE | |||||||||||||
Staf | |||||||||||||
Stahl Platte | |||||||||||||
Stealth C | Boot Sector Virus | Stealth_C causes the total system and available free memory, to decrease by 4,096 bytes. | |||||||||||
Stoned Stoned (computer virus) Stoned is the name of a boot sector computer virus created in 1987.Notable for being an early boot sector virus, it was thought to have been written by a university student in Wellington, New Zealand - and by 1989 it had spread widely in New Zealand and Australia... |
|||||||||||||
Striker | |||||||||||||
Stupid | |||||||||||||
Subliminal | |||||||||||||
SubZero | |||||||||||||
Suicide | |||||||||||||
Sunday Sunday (computer virus) Sunday is a computer virus, a member of the Jerusalem virus family. It was discovered in November 1989 after a number of simultaneous reports from Seattle, Washington, United States, and surrounding areas. Several other Seattle outbreaks, including AirCop, were later traced to... |
|||||||||||||
Sunday-2 | |||||||||||||
Sundevil | |||||||||||||
Suriv 402 | |||||||||||||
Suriv A | |||||||||||||
Suriv B | |||||||||||||
Surrender | |||||||||||||
Susan | |||||||||||||
SVC 5.0/6.0 | |||||||||||||
Sverdlov | |||||||||||||
SVir | |||||||||||||
Swap Boot | |||||||||||||
Swen - "News" spelled backwards | |||||||||||||
Swiss 143 | |||||||||||||
Swiss Phoenix | |||||||||||||
SX | |||||||||||||
Sylvia | |||||||||||||
Sys | |||||||||||||
Syslock/3551 | |||||||||||||
saplad, roberto | |||||||||||||
T-1 | |||||||||||||
T4 | 6-1992 | Included in GoMoku 2.0 and 2.1. | |||||||||||
T297 | |||||||||||||
Tabulero 2 | |||||||||||||
Taiwan | |||||||||||||
Taiwan3 | |||||||||||||
Taiwan4 | |||||||||||||
Taocheng | |||||||||||||
TDL-4 TDL-4 TDL-4 is a highly advanced, fourth generation botnet found worldwide and the name of the rootkit that runs the botnet . Over 4.5 million machines were infected with it in the first three months of 2011, and the botnet continues to grow as no effective measures have been found to prevent it... |
Botnet Botnet A botnet is a collection of compromised computers connected to the Internet. Termed "bots," they are generally used for malicious purposes. When a computer becomes compromised, it becomes a part of a botnet... |
||||||||||||
Techno Techno (computer virus) The Techno.com virus, more commonly known as the "Techno Virus", is a computer virus that infects Windows DOS. It infects .COM files including COMMAND.COM. The Virus is loaded into the memory by executing an infected program and then affects the computer's runtime and corrupts program or overlay... |
|||||||||||||
Tecla | |||||||||||||
Telecom Boot | |||||||||||||
Telecom File | |||||||||||||
Telekom | |||||||||||||
Teletype | |||||||||||||
Teletype-2 | |||||||||||||
Tentacle | |||||||||||||
Tequila | |||||||||||||
Terror | |||||||||||||
Tester | |||||||||||||
Tigraa | Poland Poland Poland , officially the Republic of Poland , is a country in Central Europe bordered by Germany to the west; the Czech Republic and Slovakia to the south; Ukraine, Belarus and Lithuania to the east; and the Baltic Sea and Kaliningrad Oblast, a Russian exclave, to the north... |
Piotr Bania aka Lord Yup aka dis69, 29A group member | Peter Ferrie's analysis | ||||||||||
TMTM | |||||||||||||
TP | |||||||||||||
Tremor2 | |||||||||||||
TridenT | |||||||||||||
Triple Shot | |||||||||||||
Troi Two | |||||||||||||
trusty hound | spyware | Spyware.TrustyHound!rem provides a search engine in the system tray and sends system information to a predetermined server. | |||||||||||
Tschantches | |||||||||||||
T-series | |||||||||||||
TU-482 | |||||||||||||
Tuesday | |||||||||||||
Tula | |||||||||||||
Tumen V0.5 | |||||||||||||
Tumen V2.0 | |||||||||||||
Tumen | |||||||||||||
Turbo | |||||||||||||
Turkey | |||||||||||||
Tver | |||||||||||||
Twin Peaks | |||||||||||||
Twin-351 | |||||||||||||
twoneight | |||||||||||||
Typo Boot | |||||||||||||
Ucender | |||||||||||||
Ugur | |||||||||||||
Undressed | |||||||||||||
Unk | |||||||||||||
Uriel | |||||||||||||
Uruk 300 | |||||||||||||
Uruk 361 | |||||||||||||
Uruk-Hai | Unknown | ||||||||||||
USSR | |||||||||||||
USSR 1049 | |||||||||||||
USSR 2144 | windows extract | ||||||||||||
USSR 256 | |||||||||||||
USSR 257 | |||||||||||||
USSR 3103 | |||||||||||||
USSR 311 | |||||||||||||
USSR 394 | |||||||||||||
USSR-394 | |||||||||||||
USSR 492 | |||||||||||||
USSR 516 | |||||||||||||
USSR 600 | |||||||||||||
USSR 696 | |||||||||||||
USSR 707 | |||||||||||||
USSR 711 | |||||||||||||
USSR 830 | |||||||||||||
USSR 948 | |||||||||||||
V1 0 | |||||||||||||
V1 1 | |||||||||||||
V1028 | |||||||||||||
V125 | |||||||||||||
V1463 | |||||||||||||
V163 | |||||||||||||
V1-Not | |||||||||||||
V2 0 | |||||||||||||
V2000 | |||||||||||||
V2100 | |||||||||||||
V270X | |||||||||||||
V299 | |||||||||||||
V2P2 | |||||||||||||
V2P6 | |||||||||||||
V-351 | |||||||||||||
V-388 | |||||||||||||
V400 | |||||||||||||
V483 | |||||||||||||
V5 | |||||||||||||
V600 | |||||||||||||
V800 | |||||||||||||
V801 | |||||||||||||
V82 | |||||||||||||
V914 | |||||||||||||
V961 | |||||||||||||
VA | |||||||||||||
Vacsina | |||||||||||||
VCL | |||||||||||||
VCL-HEEvE | |||||||||||||
Vcomm | |||||||||||||
VCS | |||||||||||||
VDV-853 | |||||||||||||
VHP | |||||||||||||
VHP-2 | |||||||||||||
V-Label | |||||||||||||
VM | |||||||||||||
VP | |||||||||||||
VTS | |||||||||||||
VVF-34 | |||||||||||||
Venge-E | |||||||||||||
Vera Cruz | |||||||||||||
Victor | |||||||||||||
Vienna/648 | |||||||||||||
Vietnamese | |||||||||||||
Violator | |||||||||||||
Viper | |||||||||||||
Viperizer B | |||||||||||||
Viral Messiah | |||||||||||||
Virdem | |||||||||||||
Virflop | |||||||||||||
virus-101 | |||||||||||||
virus-90 | |||||||||||||
Voco | |||||||||||||
Vootie | |||||||||||||
Voronezh | |||||||||||||
Vote/Vote1000 | |||||||||||||
Vriest | |||||||||||||
W13 | |||||||||||||
WAVE | |||||||||||||
Warbiest Terminator | 2008 | For Windows XP Only. | |||||||||||
Warbiest Terminator v.2.0 | 2009 | For Windows XP and Vista. | |||||||||||
WWT | |||||||||||||
Walkabout | |||||||||||||
Walker | |||||||||||||
Warez | |||||||||||||
Warrior 2 | |||||||||||||
Warrior | |||||||||||||
Wazoo | |||||||||||||
WDEF | 12-1989 | Affects only Macintosh System 4.1 to 6.0.8 System 6 System 6 is a graphical user interface-based operating system for Macintosh computers. It was released in 1988 by Apple Computer and was part of the Mac OS line of operating systems. System 6 was shipped with various Macintosh computers until it was succeeded by System 7 in 1991. The boxed... . |
|||||||||||
Weak | |||||||||||||
Whale Whale (computer virus) The Whale virus is a computer virus discovered on July 1, 1990. The file size, at 9,216 bytes, was for its time the largest virus ever discovered. It was written by German programmer R. Horner... |
|||||||||||||
Wharps | |||||||||||||
WhoCares | |||||||||||||
Why win | |||||||||||||
Wilbur 3 | |||||||||||||
Wild trojan Wild Thing A |
|||||||||||||
Willistrover III | |||||||||||||
Willow | |||||||||||||
Willow 2 | |||||||||||||
WinAble | 2004 | Windows systems only. | Disrupts system performance by displaying pop-ups. Starts only when computer is on, and slows internet performance as well. | ||||||||||
Windmill | |||||||||||||
Winvir | |||||||||||||
Wisconsin | |||||||||||||
Wizard 3.0 | |||||||||||||
Wolfman | |||||||||||||
Wonder | |||||||||||||
Word Atom Macro | |||||||||||||
Word Color Macro | |||||||||||||
Word Concept Macro | |||||||||||||
Word Hot Macro | |||||||||||||
Wordswap | |||||||||||||
World Peace | w32.myzor.FK@yf | ||||||||||||
Wsnpoem | |||||||||||||
X-1 | |||||||||||||
X-2 | |||||||||||||
X-3A | |||||||||||||
X-3B | |||||||||||||
X77 | |||||||||||||
Xabaras | |||||||||||||
Xpeh | |||||||||||||
XTAC | |||||||||||||
Xuxa | |||||||||||||
Yale | |||||||||||||
Yan2505a | |||||||||||||
Yankee | |||||||||||||
Yankee - 2 | |||||||||||||
Yap | |||||||||||||
Year 1993 | |||||||||||||
Yerg | |||||||||||||
Youth | |||||||||||||
Yukon | |||||||||||||
Z10 | |||||||||||||
ZK900 | |||||||||||||
ZRK | |||||||||||||
ZU1 | |||||||||||||
Zak2 | |||||||||||||
Zaragosa | |||||||||||||
Zeppelin | |||||||||||||
Zero Bug | |||||||||||||
Zero Time | |||||||||||||
ZeroHunt | |||||||||||||
ZMist ZMist (computer virus) Zmist is a metamorphic computer virus created by the Russian virus writer known as Zombie. It was the first virus to use a technique known as "code integration"... |
ZMistfall, Zombie.Mistfall | Z0mbie | |||||||||||
Zoda | |||||||||||||
Zohra |
Go on
Linux malware
Linux malware includes viruses, trojans, worms and other types of malware that affect the Linux operating system. Linux, Unix and other Unix-like computer operating systems are generally regarded as very well-protected, but not immune, from computer viruses...
List of viruses and related programs
- List of computer viruses
- List of computer viruses (Numeric)
- List of computer viruses (A-D)
- List of computer viruses (E-K)
- List of computer viruses (L-R)
- List of computer viruses (S-Z)
- Linux malwareLinux malwareLinux malware includes viruses, trojans, worms and other types of malware that affect the Linux operating system. Linux, Unix and other Unix-like computer operating systems are generally regarded as very well-protected, but not immune, from computer viruses...