List of computer viruses (all)
Encyclopedia
The following is an extensive list of computer viruses. Please note that new computer viruses are being made all the time,so we cannot list every one the moment it appears.

List of computer viruses

Name Alias(es) Type Subtype Isolation Date Isolation Origin Author Notes
1260
1260 (computer virus)
1260, or V2PX, was a computer virus written in 1989 by Mark Washburn that used a form of polymorphic encryption. Derived from Ralph Burger's publication of the disassembled Vienna virus source code, the 1260 altered its signature by randomizing and obfuscating its decryption algorithm in an effort...

MS-DOS
MS-DOS
MS-DOS is an operating system for x86-based personal computers. It was the most commonly used member of the DOS family of operating systems, and was the main operating system for IBM PC compatible personal computers during the 1980s to the mid 1990s, until it was gradually superseded by operating...


1990 Mark Washburn, Ralf Burger First virus to use polymorphic encryption
Polymorphic code
In computer terminology, polymorphic code is code that uses a polymorphic engine to mutate while keeping the original algorithm intact. That is, the code changes itself each time it runs, but the function of the code will not change at all...

4K
4K (computer virus)
4k is a computer virus which infects COM files and EXE files. The virus was one of the first to employ stealth tactics. Infected systems will hang, after September 22 every year, which is also the date of birth Bilbo Baggins, a character from the The Lord of the Rings...

4096 MS-DOS
MS-DOS
MS-DOS is an operating system for x86-based personal computers. It was the most commonly used member of the DOS family of operating systems, and was the main operating system for IBM PC compatible personal computers during the 1980s to the mid 1990s, until it was gradually superseded by operating...


January 1990 unknown The first virus to use stealth
5lo
5lo
5lo is a computer virus that increases file size and does little more than replicate. Size: 1,032 bytes-Infection:5lo infects resident .EXE files only...

MS-DOS
MS-DOS
MS-DOS is an operating system for x86-based personal computers. It was the most commonly used member of the DOS family of operating systems, and was the main operating system for IBM PC compatible personal computers during the 1980s to the mid 1990s, until it was gradually superseded by operating...


October 1992 unknown Infects .EXE files only
A and A MS-DOS
MS-DOS
MS-DOS is an operating system for x86-based personal computers. It was the most commonly used member of the DOS family of operating systems, and was the main operating system for IBM PC compatible personal computers during the 1980s to the mid 1990s, until it was gradually superseded by operating...


Windows 95
Windows 95
Windows 95 is a consumer-oriented graphical user interface-based operating system. It was released on August 24, 1995 by Microsoft, and was a significant progression from the company's previous Windows products...

, Windows 98
Windows 98
Windows 98 is a graphical operating system by Microsoft. It is the second major release in the Windows 9x line of operating systems. It was released to manufacturing on 15 May 1998 and to retail on 25 June 1998. Windows 98 is the successor to Windows 95. Like its predecessor, it is a hybrid...

unknown unknown
A-403 MS-DOS
MS-DOS
MS-DOS is an operating system for x86-based personal computers. It was the most commonly used member of the DOS family of operating systems, and was the main operating system for IBM PC compatible personal computers during the 1980s to the mid 1990s, until it was gradually superseded by operating...


Windows 95
Windows 95
Windows 95 is a consumer-oriented graphical user interface-based operating system. It was released on August 24, 1995 by Microsoft, and was a significant progression from the company's previous Windows products...

, Windows 98
Windows 98
Windows 98 is a graphical operating system by Microsoft. It is the second major release in the Windows 9x line of operating systems. It was released to manufacturing on 15 May 1998 and to retail on 25 June 1998. Windows 98 is the successor to Windows 95. Like its predecessor, it is a hybrid...

1998 unknown
Abraxas
Abraxas (computer virus)
Abraxas, also known as Abraxas5, discovered in April 1993, is an encrypted, overwriting, file infecting computer virus which infects .COM and .EXE files, although it does not infect command.com. It does not become memory resident...

MS-DOS
MS-DOS
MS-DOS is an operating system for x86-based personal computers. It was the most commonly used member of the DOS family of operating systems, and was the main operating system for IBM PC compatible personal computers during the 1980s to the mid 1990s, until it was gradually superseded by operating...


Windows 95
Windows 95
Windows 95 is a consumer-oriented graphical user interface-based operating system. It was released on August 24, 1995 by Microsoft, and was a significant progression from the company's previous Windows products...

, Windows 98
Windows 98
Windows 98 is a graphical operating system by Microsoft. It is the second major release in the Windows 9x line of operating systems. It was released to manufacturing on 15 May 1998 and to retail on 25 June 1998. Windows 98 is the successor to Windows 95. Like its predecessor, it is a hybrid...

April 1993 unknown Infects COM file
COM file
In many computer operating systems, a COM file is a type of executable file; the name is derived from the file name extension .COM. Originally, the term stood for "Command file", a text file containing commands to be issued to the operating system , on many of the Digital Equipment Corporation mini...

. Disk directory listing will be set to the system date and time when infection occurred.
Acid
Acid (computer virus)
Acid is a computer virus which infects .COM and .EXE files including command.com. Each time an infected file is executed, Acid infects all of the .EXE files in the current directory. Later, if an infected file is executed, it infects the .COM files in the current directory...

MS-DOS
MS-DOS
MS-DOS is an operating system for x86-based personal computers. It was the most commonly used member of the DOS family of operating systems, and was the main operating system for IBM PC compatible personal computers during the 1980s to the mid 1990s, until it was gradually superseded by operating...


Windows 95
Windows 95
Windows 95 is a consumer-oriented graphical user interface-based operating system. It was released on August 24, 1995 by Microsoft, and was a significant progression from the company's previous Windows products...

, Windows 98
Windows 98
Windows 98 is a graphical operating system by Microsoft. It is the second major release in the Windows 9x line of operating systems. It was released to manufacturing on 15 May 1998 and to retail on 25 June 1998. Windows 98 is the successor to Windows 95. Like its predecessor, it is a hybrid...

1992 Corp-$MZU Infects COM file
COM file
In many computer operating systems, a COM file is a type of executable file; the name is derived from the file name extension .COM. Originally, the term stood for "Command file", a text file containing commands to be issued to the operating system , on many of the Digital Equipment Corporation mini...

. Disk directory listing will not be altered.
Acme
Acme (computer virus)
Acme is a computer virus which infects EXE files. Each time an infected file is executed, Acme may infect an EXE in the current directory by creating a hidden 247 byte long read-only COM file with the same base name...

Upon executing infected EXE
EXE
EXE is the common filename extension denoting an executable file in the DOS, OpenVMS, Microsoft Windows, Symbian, and OS/2 operating systems....

, this infects another EXE in current directory by making a hidden COM file
COM file
In many computer operating systems, a COM file is a type of executable file; the name is derived from the file name extension .COM. Originally, the term stood for "Command file", a text file containing commands to be issued to the operating system , on many of the Digital Equipment Corporation mini...

 with same base name.
ABC
ABC (computer virus)
ABC, discovered in October 1992, is a memory-resident, file-infecting computer virus which infects EXE files and may alter both COM and EXE files. ABC activates on the 13th day of every month....

A ctifed
Actifed (computer virus)
Actifed is a G2-generated encrypted computer virus which infects .COM and .EXE files but not command.com. The virus is loaded into memory by executing an infected program and then affects the computer's run-time operation and corrupts program files....

h
Ada
Ada (computer virus)
Ada is a computer virus that can affect any of the DOS operating systems. Ada was first discovered in 1991.-Virus Characteristics:Ada is a memory resident virus that infects files...

Agena
Agena (computer virus)
AGENA is a memory resident, file infecting computer virus which infects .COM and .EXE files, including command.com. It was discovered in Spain in September, 1992. Upon infection, Agena becomes memory resident at the top of system memory but below the 640K DOS boundary. Once it is memory resident,...

AGI-Plan
AGI-Plan (computer virus)
For information on the African consulting company, see Agiplan .AGI-Plan was a memory resident DOS file infector first isolated at the Agiplan software company in Germany. Because of CARO standards that dictate that viruses should not be named after companies, AGI-Plan's technical name is Month 4-6...

Ah
Ah (computer virus)
Ah is a very buggy computer virus which infects COM files including command.com. Ah is based on the V1024 virus, and originated in Italy in May 1991. When the first program infected with Ah is executed, Ah will install itself memory resident at the top of system memory, but below the 640K DOS...

AI
AI (computer virus)
AI is a computer virus which infects .EXE files. The virus is loaded into memory by executing an infected program and then effects the computer's run time operation and corrupts program or overlay files. It does not appear to work with all .EXE files but does infect standard DOS files easily...

AIDS
AIDS (computer virus)
AIDS is a computer virus written in Turbo Pascal 3.01a which overwrites com files. AIDS is the first virus known to exploit the MS-DOS "corresponding file" vulnerability. In MS-DOS, if both foo.com and foo.exe exist, then foo.com will always be executed first...

AIDS II
AIDS II (computer virus)
AIDS II is a companion computer virus, which infects COM files. It was first discovered in April 1990, and is a variant of AIDS. Unlike other generic file infectors, AIDS II was the first known virus to employ what could be called a "corresponding file technique" of infection so that the original...

AirCop Air cop-B MS-DOS
MS-DOS
MS-DOS is an operating system for x86-based personal computers. It was the most commonly used member of the DOS family of operating systems, and was the main operating system for IBM PC compatible personal computers during the 1980s to the mid 1990s, until it was gradually superseded by operating...

Jan 1990
Ajax
Alabama
Alabama (computer virus)
Alabama is a computer virus, discovered October 1989 on the campus of Hebrew University in Jerusalem.-Infection:Alabama is a fairly standard file infector outside its odd behaviour of deciding what files to infect. When an infected file is executed, Alabama goes memory resident. Whenever a .EXE...

Albanet
Alcon
Alcon (computer virus)
Alcon, or RSY , is a computer virus that was discovered to be spreading in Europe in 1997. It is a boot virus.-Infection:Alcon is a standard boot sector virus that spreads via floppies...

Alien
Ambulance
Ambulance (computer virus)
Ambulance is a file infecting computer virus and it does not become memory resident. It will only infect one .COM file in any given directory, but will not infect the first one. This means there must be at least two .COM files in the directory for it to spread....

Amstrad
Ancient
Andre
Andre2
Andromeda
Angelina
Anna
Anna Kournikova
Anna Kournikova (computer virus)
The Anna Kournikova computer virus was a computer virus authored by Dutch programmer Jan de Wit on February 11, 2001. It was designed to trick email users into opening a mail message purportedly containing a picture of tennis player Anna Kournikova, while actually hiding a malicious program...

Email
VBScript
VBScript
VBScript is an Active Scripting language developed by Microsoft that is modeled on Visual Basic. It is designed as a “lightweight” language with a fast interpreter for use in a wide variety of Microsoft environments...

Jan de Wit
Anninja
ANT
Ant-Cow
Anthrax - Boot
Anthrax - File
ANTI 2-1989 Does not spread under MultiFinder.
AntiCMOS
AntiCMOS (computer virus)
AntiCMOS is a boot virus. Its first discovery was at Lenart, Slovenia, which led to its alias of Lenart. It was isolated in Hong Kong several times at the beginning of 1994, but did not become common until it spread to North America in the Spring of 1995...

AntiHeuristica It's payload is opposite of Cascade DOS virus, instead of the letters being pushed down, it pushes it upwards.
Anti-D
Anti-Daf
Anti-MIT
Anti-Pascal II
Anti-Pascal
Anti-Tel
Anti-Telefonica
Apadana
Apost.exe
Arab
Aragon
Aragorn
ARCV-n
ARCV-n (computer virus)
ARCV-n is a term for a large family of viruses authored by the ARCV group through October - November 1992 and polymorphed with the PS-MPC virus generation tool . ARCV-n viruses seem to infect COM and/or EXE files rapidly, but do not damage the compromised machine, instead displaying various text...

Argentina
Arka
Arma
Armagedon The Greek
Armagedon
Arriba
Arusiek
ASC
Ash
ASP-472
Astra
AT 144
AT 149
Atas
Atas3321
Atas-400
Atom
Atom
The atom is a basic unit of matter that consists of a dense central nucleus surrounded by a cloud of negatively charged electrons. The atomic nucleus contains a mix of positively charged protons and electrically neutral neutrons...

Atomic1A
Atomic1b
Atomic2A
Atomic2b
Atte-629
August 16
AusPar
Australian
Azusa
B Ugly
B3
B-52
BA101
Back Time
Bacros
Badass
Bad Boy
Bad Brains
Bad Command
Bad Guy
Bad Sectors 1.2
Bad Sectors 1.2 (computer virus)
On the Windows operating system, Bad Sectors 1.2 is a boot virus that infects users computers mainly by email. However, it may also infect a computer if the user visits certain web sites.-Overview:...

Bad-389
Bak
Bamestra
Banana
Bandit
Baobab 731
Barcelona
Barrotes 2
Barrotes
Basil
Bat
Beach
Beaches
Beast
BeBe
Beeper
Beer
Benoit
Real PvP Flava
Berlin
Best Wishes
Beta
Beva-32
Beva-33
Beva-96
Beware
BFD
Big 2000
Bit Addict
BlackDeath
Black Knight
Blackworm
Black Monday
Blackjack
Black Pegasus
Blaze
Bljec
Blood Lust
Blood Rage
Blood
Blood-2
Bob
Bomber
Bomber (computer virus)
Bomber is a DOS polymorphic computer virus known for its technique of "patchy infection". Contrary to the usual method of infecting executables , it inserts several fragments of its code in random places inside the file...

Boot Killer
Bounce Windows Upon activation, it makes message boxes on screen and the mouse cursor "bounce" up and down. It does no other damage.
Bouncing Dot
Bow
Boys
Brainy
BrO AcT Windows XP This virus will block most anti-virus programs and disable 'regedit', 'msconfig', and 'task manager'
Brotherhood
Brothers
Browser Enhancement Claims to enhance browser experience, but when computer is re-booted, displays a fake anti-piracy warning claiming to need to pay to drop charges, but steals your credit card number.
Bryansk
Bubbles 2
Bubbles
Bubonic
Budo
Burger
Burghofer
Busted
Butterfly
Butthole
Byte Bandit
Byte Bandit
Byte Bandit is a boot sector computer virus created for the Commodore Amiga. It first appeared in January 1988, and was created by SCA.It was one of the most feared Amiga viruses until the infamous Lamer Exterminator because not only did it spread from system to system automatically, it was also...

Amiga, Bootsector virus January 1988 Swiss Cracking Association
Byte Warrior Amiga, Boot sector virus
(c)Brain Pakistani flu, January 1986 Lahore
Lahore
Lahore is the capital of the Pakistani province of Punjab and the second largest city in the country. With a rich and fabulous history dating back to over a thousand years ago, Lahore is no doubt Pakistan's cultural capital. One of the most densely populated cities in the world, Lahore remains a...

, Pakistan
Pakistan
Pakistan , officially the Islamic Republic of Pakistan is a sovereign state in South Asia. It has a coastline along the Arabian Sea and the Gulf of Oman in the south and is bordered by Afghanistan and Iran in the west, India in the east and China in the far northeast. In the north, Tajikistan...

Basit and Amjad Farooq Alvi Considered to be the first computer virus
Computer virus
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly but erroneously used to refer to other types of malware, including but not limited to adware and spyware programs that do not have the reproductive ability...

 for the PC
Personal computer
A personal computer is any general-purpose computer whose size, capabilities, and original sales price make it useful for individuals, and which is intended to be operated directly by an end-user with no intervening computer operator...

C
Cabanas
Caco-Daemon
CAD Kill
C-A-D
Cannabis
Cansu
Capital
Cara
Caribe
Carioca
CaroEvil
Cartuja
Casc1621
Casc-2
Cascade
Cascade (computer virus)
The Cascade virus was a resident computer virus written in assembler, that was widespread in the 1980s and early 1990s. It infected COM files and had the effect of making text on the screen fall down and form a heap in the bottom of the screen. It was notable for using an encryption algorithm to...

Casino
Casino (computer virus)
The casino computer virus is a malicious virus that upon running the infected file, copies the FAT to RAM, then deletes the FAT from the hard disk. It challenges you to a game of Jackpot of which you have 5 credits to play with, hence the name. If you fail to win, the computer shuts down, thereby...

Casper
Casteggio
Caterpillar 1575 MS-DOS
MS-DOS
MS-DOS is an operating system for x86-based personal computers. It was the most commonly used member of the DOS family of operating systems, and was the main operating system for IBM PC compatible personal computers during the 1980s to the mid 1990s, until it was gradually superseded by operating...

Catman
Catphish
Caz
CB-1530
CD
CDEF 8-1990
CDFL Mac
CD-10
Century
Cerburus
CFSK
Chad
Chang
Chaos
Chaser
Chasna
Chcc
Cheeba
Cheesy
Chemist
Chemnitz
Chernobyl
Chile Mediera
Chinese Blood
Chr-869
Chrisj13
Christmas Tree
Christmas Violator
CIH
CIH (computer virus)
CIH, also known as Chernobyl or Spacefiller, is a Microsoft Windows computer virus written by Chen Ing Hau of Travian...

Cinderella
Civil Service
Civil War II
Civil War III
Civil War IV
Civil War V
Civil War
CkSum
Clagger
Clint
Clonewar 2
Clonewar
Clust
Coahuila
CODE 1 11-1993 Renames the hard drive to "Trent Saburo" on any October 31st.
CODE 252 4-1992
Code Zero
Coffee Shop
Collor de Mello
Color
Com16850
Com2S
Comdex
Commentator
Commwarrior most common mobile phone virus for nokia mobile phones, transmits via bluetooth wireless.
Como
Compiler2
Comspec
Conficker
Conficker
Conficker, also known as Downup, Downadup and Kido, is a computer worm targeting the Microsoft Windows operating system that was first detected in November 2008...

Cop-Mpl
Copyright
Copyr-ug
Coruna
Coruna3
Cossiga No Grazie
Cossiga
Costeau
CPXK
Cracker Jack
Cracky
Crash
Crasher
Crazy Eddie
Crazy Imp
CrazyI B
CRF
Cross Over
Crystal
CSL
CV4
D1
DKid
Dada
Damage
Danny
Dark Apocalypse
Dark Avenger
Dark Avenger
Dark Avenger was a pseudonym of a computer virus writer from Sofia, Bulgaria. He gained considerable popularity during the early 1990s, as some of his viruses spread not only nationwide, but across Europe as well, even reaching the United States....

Dark End
DataLock
Datos
Davis
D-Day
Death
Deathead
Deceide 2
Dedicated
Deicide
Demolition
Demon
Den Zuk
Dennis
Deranged
Diablo
Dial
DigiDeliver
Dima
Disk Killer
Dismember
Dodgy 1024
Dodo 2456
Dodo
Doodle
Dorn
Dose-A
Druid
Dudley
Dutch Tiny
Dutch Scare Worm  This virus deletes all users, all data, and s the worst virus yet. Earthday
Eclypse
ECV
Ed
Edcl
EDV
Egg Egg is a computer virus that affects the COM. and EXE files.
Eggdrop
Ein Volk
Einstein
Ekoterror
E1ectr0n
Eliza
Eliza (computer virus)
- Overview :Eliza is a computer virus which infects COM files including Command.com. It has been reported that it is defective, yet destroys the .EXE files it creates. The .COM files do not get deleted. The date of the file will not be altered by the infection to avoid detection, infected files...

DOS
DOS
DOS, short for "Disk Operating System", is an acronym for several closely related operating systems that dominated the IBM PC compatible market between 1981 and 1995, or until about 2000 if one includes the partially DOS-based Microsoft Windows versions 95, 98, and Millennium Edition.Related...

Dec 1991
Elk Cloner Apple II
Apple II
The Apple II is an 8-bit home computer, one of the first highly successful mass-produced microcomputer products, designed primarily by Steve Wozniak, manufactured by Apple Computer and introduced in 1977...

Richard Skrenta The first virus observed "in the wild"
Elvirus
Elvira
EMF 625
EMF
Emmie
EMO
Empire
End-of
Enemy
Enigma
Enola
Error 412 virus
Error
Essex
Estepa
ETC
Europe-92
Evil Genius
Exper416
Explode
Exploration
Exterminator
Eziarch
Family Q
Farcus
Father Christmas
Faust
Fax Free
Fear
Feist
Fellowship
Fich
Fich897
Filedate
Filename
Filler
Fingers
Finn-357
Fish 1100
Fish 2
Fish 2420
Fish Boot
Fish
Flagyll
Flash
Flex
Flip
Flower
Flu-2
Fly11
Fone Sex
Fotomoto
Forger2
Form
Form (computer virus)
Form was a boot sector virus isolated in Switzerland in the summer of 1990 which became very common worldwide. The origin of Form is widely listed as Switzerland, but this may be an assumption based on its isolation locale...

Fortran
Frajer
Francois
Frankie Macintosh emulator Targeted pirated versions of the Aladdin emulator.
Fratricide
Free
Frere Jacques
Fri13-nz
Friday 13th COM
Friday 13th
Friday the 13th - Version A
Frodo Soft
Frodo-458
Frogs
Fu Manchu
Fune
Fun.exe virus
Fun.exe virus
The Fun.Exe virus is of the w32.Assarm family of computer viruses. According to Symantec it registers itself as a windows system process then periodically sends mail with spreading attachments as a response to any unopened emails in outlook express....

w32.Assarm Windows XP 6-23-2008
Fvhs-a
Fvhs-B
F-Word
paul eduard
G
Galicia
Ganeu
Gedza
Geek
Gergana
Germ
Get Password 1
Ghost Boot
Ghost COM
Ghost Dos-62
Gijon
Gliss
Goblin
Gomb
Gorlovka
Gotch 4
Gotcha 1
Gotcha 2
Gotcha 3
Gotcha 9e
Gotcha Created from original identity 'Gotchix' Spread on Facebook through 'add friend' linkage
Got-you
Grapje
Graveyard
Graybird
Graybird
Graybird is a Trojan horse that hides its presence on the compromised computer and downloads files from remote Web sites. There are many variations of this virus such as Backdoor.Graybird.P .-References:...

 (Backdoor Graybird, Backdoor Graybird P)
Green
Grog31
Groovy
Growing Block
Grue
Grunt
Grunt-3
Guppy
H-2
H-457
HA
Happy virus
Hack-83
HACKER
Hacktic
Hafen
Haifa
Hallo
Halloechen
Halloween
Hammer
Happy N. Y.
Happy
Hara
Harakiri
Hare
Hare (computer virus)
The Hare Virus is a destructive computer virus which infected MS-DOS and Windows 95 machines in August 1996. It was also known as Hare.7610, Krsna and HD Euthanasia....

MS-DOS
MS-DOS
MS-DOS is an operating system for x86-based personal computers. It was the most commonly used member of the DOS family of operating systems, and was the main operating system for IBM PC compatible personal computers during the 1980s to the mid 1990s, until it was gradually superseded by operating...


Windows 95
Windows 95
Windows 95 is a consumer-oriented graphical user interface-based operating system. It was released on August 24, 1995 by Microsoft, and was a significant progression from the company's previous Windows products...

, Windows 98
Windows 98
Windows 98 is a graphical operating system by Microsoft. It is the second major release in the Windows 9x line of operating systems. It was released to manufacturing on 15 May 1998 and to retail on 25 June 1998. Windows 98 is the successor to Windows 95. Like its predecessor, it is a hybrid...

August 1996 Unknown Famous for press coverage which blew its destructiveness out of proportion
Harm
Hary
Hastings
Hate
HBT
Heevahava
Hello
Hellween 1182
Hellween
Here
Hero
Hero-394
Hi
Hidrag
Highland
Hiperion
Hitchcock
Hitler
Holland Girl
Holo/Holocaust
Holiday
Horror
Horse Boot
Horse
HS
Huge
Hungarian
Hybrid
Hymn
IB Demonic
I-B
Ice 9
ICE9-159
ICE9-199
ICE9-224
Ice9-250
Icelandic II
Icelandic
Icelandic-3
IDF
Idle
Ieronim
IKV528
Ill
ILOVEYOU
Incom
Infinity
INIT 17 4-1993
INIT 29 1988
INIT 1984
INIT 1984 (computer virus)
INIT 1984 is a computer virus that setup to trigger on Macintosh computers running the classic Mac OS on any given Friday the 13th. The virus was first discovered and isolated in March, 1992. It functions by infecting startup files, then modifying or deleting those files upon startup on Friday the...

13-3-1992 Malicious, triggered on Friday the 13th.
INIT 9403 SysX 3-1994 Very destructive, destroys all data. Found only on Italian systems so far.
INIT-M 4-1993 Malicious, triggered on Friday the 13th.
Inofensivo
Inrud-B
Internal
Intruder
Invader
Invisible Man
Invitation
Invol
IOU
Iranian
Iraqi Warrior
IT
IVP EX1
IVP EX2
IVP
Japan
Jeefo
Jeff
Jerk
Jeru-1663
Jerusalem
Jerusalem (computer virus)
Jerusalem is a DOS virus first detected in Jerusalem, Israel, in October 1987. On infection, the Jerusalem virus becomes memory resident , and then infects every executable file run, except for COMMAND.COM. .COM files grow by 1,813 bytes when infected by Jerusalem and are not re-infected. .EXE...

Joanna
Jobbie
John
JoJo
Joke
Joker
Joker-1602
Joker3
Jonathan (malware)
Joshi
Joshua
July 13th
July 26
June 16th
June1530
Junky
Justice
Kamasutra
Kak worm
Kak worm
KAK is 1999 a JavaScript worm that uses a bug in Outlook Express to spread itself.On the first day of every month, at 5:00 pm, the worm uses shutdown.exe to initiate a shutdown and show a popup with text "Kagou-anti-Kro$oft says not today!". A minimized window often appears on startup with the...

killerjeff.exe
L1 Infects .COM files. Affects the computers runtime operation and corrupts data files.
Label h1n1
Lamer Exterminator Amiga, Boot sector virus October 1989 Germany
Germany
Germany , officially the Federal Republic of Germany , is a federal parliamentary republic in Europe. The country consists of 16 states while the capital and largest city is Berlin. Germany covers an area of 357,021 km2 and has a largely temperate seasonal climate...

Random encryption, fills random sector with "LAMER"
Lanc
Lanc5476
Lanc5882
Larry
Lazy
LCV
Leapfrog
Leech
Lehigh
Leper AOD
Leprosy Infects COM.And EXE. Files after its visual payload on DOS
Les
Lib1172
Liberty
Liquid Code - 2
Liquid Code
Lisbon
Little Brother
Little Girl
Little Pieces
Little
LixoNuke
Loa Duong
LockJaw
Lockz
LPT-OFF
Lycee
Mabuhay
Macedonia
MacMag
MacMag (computer virus)
The MacMag virus, also known by various other names, was a computer virus introduced in 1988 by Richard Brandow, who at the time was editor and publisher of MacMag computer magazine in Montréal.-Operation of the virus:...

Drew, Bradow, Aldus, Peace 12-1987
Madcow
Magnitogorski 3
Magnum
Malage
Malaise
Malign
Malmsey Habitat v3.b
Malmsey2
Malmsey
Maltese Amoeba
Malware Defense
Mannequin
Manola
Manta
Many Fingers
Marauder
Mardi Bros .
MAS
Mas
Mas or Más may refer to:* Mas , a surnameIn arts:* Más , an album by Spanish singer Alejandro Sanz* "Más", a song by Kinky from their 2002 album Kinky...

Mark II
Marzia
Math Test
Matura
Mayak
Mazor Trojan worm/virus 2-2008 infects .exe files
MBDF 2-1992
MCWH1022
McWhale
MDEF
MDEF (computer virus)
MDEF was a computer virus affecting Macintosh machines. There are four known strains. The first, MDEF A , was discovered in May 1990. Strains B , C, and D were discovered in August 1990, October 1990, and January 1991, respectively....

Garfield, Top Cat 5-1990
Meditation
MegM
Melissa
Melissa (computer worm)
The Melissa virus, also known as "Mailissa", "Simpsons", "Kwyjibo", or "Kwejeebo", is a mass-mailing macro virus. As it is not a standalone program, it is not a worm.-History:...

1999 part macro virus and part worm
Memory Lapse
MG
Michelangelo
Michelangelo (computer virus)
The Michelangelo virus is a computer virus first discovered in April 1991 in New Zealand. The virus was designed to infect DOS systems, but did not engage the operating system or make any OS calls. Michelangelo, like all boot sector viruses, basically operated at the BIOS level. Each year, the...

April 1991 New Zealand
New Zealand
New Zealand is an island country in the south-western Pacific Ocean comprising two main landmasses and numerous smaller islands. The country is situated some east of Australia across the Tasman Sea, and roughly south of the Pacific island nations of New Caledonia, Fiji, and Tonga...

Ran March 6 (Michelangelo
Michelangelo
Michelangelo di Lodovico Buonarroti Simoni , commonly known as Michelangelo, was an Italian Renaissance painter, sculptor, architect, poet, and engineer who exerted an unparalleled influence on the development of Western art...

's birthday)
Michelangelo II
Mindless
Mini
Mini-125
Mini-132
Mini-195
Mini-207
Minimax
Minimite
Minsk-GH
Mir
Mirror
Missouri
Mix2
Moctezuma
Monika
Monkey
Mono
Monxla
Monxla-B
More
Mosquito
Mozkin
Mr. G
Mr. Vir
MS Antivirus
MS Antivirus (malware)
MS Antivirus is a scareware rogue anti-virus which claims to remove fake virus infections found on a computer running Microsoft Windows. It attempts to scam the user into purchasing a "full version" of the software....

Msk
Mudd Script Atomical
Mugshot
Mule
Multi
Multi-11
Multi-2
Mummy
Munich
Murphy
Music Bug
Mutant
Mutating Interrupt
Mutation Engine
Mystic
NAPC
Navidad
Navidad virus
W32.Navidad is a mass-mailing worm program or virus designed to spread through email clients such as Microsoft Outlook.It replies to all emails with an attachment using the original subject line.-Source:*...

Nazi
Natas
Natas (computer virus)
Natas is a virus written by James Gentile, a then-18-year-old hacker from San Diego, California who went by the alias of "Little Loc" and later "Priest". It is a memory-resident stealth virus that is highly polymorphic. The virus first appeared in Mexico City in May 1992, spread by a consultant...

Multipartite, stealth, polymorphic 1994 "Priest"
N-Beta
NCU Li
Necro
Necrophilia
Necrosoft
NED
New Sunday
New Zealand
Vesion 1.0.0.0
New-1701
NewBug
Newcom
Next Generation
Neznamy
Night Grawler
Nina
Nines Compliment
Ninja
No Par
No Wednesday
Nobock
NoCopy
No-Int
Nomenclature
NOP
NoStart
Not-586
Nov17
NPox 2.0
NPox 2.1
Null
Number 6
Number of The Beast
numgame.vbs
nVIR
NVIR (computer virus)
nVIR is an obsolete computer virus which can replicate on Macintosh computers running any System version from 4.1 to OS 8. The source code to the original nVIR has been made widely available, and so numerous variants have arisen...

1987
Nygus-KL
Nutty Mouse Malfunctions the mouse while putting itself to the system.
Offspring
Off Stealth
Ohio
Omega
Omt
OneHalf
OneHalf (computer virus)
OneHalf is a DOS-based polymorphic computer virus . It is also known as Slovak Bomber, Freelove or Explosion-II. It infects master boot record of the hard disk, COM files and executable files. It will not infect files that have SCAN, CLEAN, FINDVIRU, GUARD, NOD, VSAFE, MSAV or CHKDSK in the name...

Ontario.1024
Ontario.1024 (computer virus)
Ontario.1024 is a computer virus, discovered in October 1991, over a year after the isolation of the first Ontario virus, Ontario.512. Relative to Ontario.512, most additions involve making the virus harder to detect.-Infection:...

Ontario.2048
Ontario.2048 (computer virus)
Ontario.2048 is a computer virus, discovered in September 1992. It is the third and final known variant of the Ontario family, both chronologically and in complexity...

Ontario
Ontario (computer virus)
Ontario.512 is a computer virus, discovered in July 1990. It is named after its point of isolation, the Canadian province of Ontario. Because Ontario.1024 was also discovered in Ontario, it is likely that both viruses originate from within the province...

 
1990
Oropax
Otto-415
Over4032
Oxana
P1
P-45
P529
PA-5792
Page B
Page
Parite
Parity B
Payday
PC Cyborg
PC Flu
PCBB11
PCBB3072
PCBB5B
PCV
PE2
Peach
Peek
Pegg
Peking
Penis Size
Pentagon
Penza
Perfume
Phantom
Phoenix
PI
Pig
Pikachu virus
Pikachu virus
The Pikachu virus is believed to be the first computer virus targeted towards children. It contains the character "Pikachu" from the Pokémon series, and is in the form of an e-mail titled "Pikachu " with the message: "Pikachu is your friend."...

Ping-pong
Ping-Pong virus
The Ping-Pong virus is a boot sector virus discovered on March 1, 1988 at the University of Turin in Italy...

Boot, Bouncing Ball, Bouncing Dot, Italian, Italian-A, VeraCruz Boot sector virus Harmless to most computers
Pizelun
PL
Platinum
PLO
Popular
Porridge
Poshkill
Possessed
Predator Dropper
Prabhagaran
Predator
Pregnant
Prime Evil B
Prime
Print Monster
Print Screen
Prism
Prob-734
Problem
Proto-T
Prudents
Quamo
Rabbit Infects the operational memory. It's one of the fastest copying viruses and makes the computer totally unuseful.
Random
Rattle
Raubkopi
RavMonE.exe
RavMonE.exe
RavMonE, known more correctly as RJump, is a Trojan that opens a backdoor on computers running Microsoft Windows. Once a computer is infected, the virus allows unauthorized users to gain access to the computer's contents...

RJump.A, Rajump, Jisx Worm 2006-06-20 Once distributed in Apple iPods
IPod
iPod is a line of portable media players created and marketed by Apple Inc. The product line-up currently consists of the hard drive-based iPod Classic, the touchscreen iPod Touch, the compact iPod Nano, and the ultra-compact iPod Shuffle...

, but a Windows-only virus
Reaper
Reader s A malware that infects a computer and damages system core files, sometimes making BSOD
BSoD
BSoD is an initialism. It may stand for:* Blue Screen of Death* Black Screen of Death...

 and disabling anti-viruses. This is a high-risk computer virus.
Rebo-715
Red Cross
Redemption
Red Team
RedX
Reklama
Relzfu
Replicator
Reset
Revelation
Rigel
Romanian
Russian Tiny
S-847 Trojan horse
Sabath vindu
Sacramento
Saddam
Sadist
Sair
Sakora
San Diego
Sandra
Sandwich
Saratoga
Satan
Saturday 14th
Saturday
Sayha Waptpu
SBC
SCA
SCA (computer virus)
The SCA virus is the first computer virus created for the Commodore Amiga and one of the first to gain public notoriety. It appeared in November 1987. The SCA virus is a boot sector virus...

Amiga, Boot sector virus November 1987 Switzerland
Switzerland
Switzerland name of one of the Swiss cantons. ; ; ; or ), in its full name the Swiss Confederation , is a federal republic consisting of 26 cantons, with Bern as the seat of the federal authorities. The country is situated in Western Europe,Or Central Europe depending on the definition....

Swiss Cracking Association Puts a message on screen. Harmless except it might destroy a legitimate non-standard boot block.
Schrunch
Scores
Scores (computer virus)
Scores was a computer virus affecting Macintosh machines. It was first discovered in Spring 1988. It was written by a disgruntled programmer and specifically attacks two applications that were under development at his former company. These programs were never released to the public.Scores infects...

Eric, Vult, NASA, San Jose Flu Spring 1988 Designed to attack two specific applications which were never released.
Scott's Valley
Scott's Valley (computer virus)
is a computer virus, a member of the Slow virus family and distantly related to the Jerusalem virus family. It was discovered in September 1990 in Scotts Valley, California....

Scream 2
Screaming Fist
Scribble
Scroll
SCT
Scythe2D
Sdir
Secrets
Selectronics
Semtex
Sentinel
Sentinel-X
Seoul
Serena
Sergeant
SevenDust
SevenDust (computer virus)
SevenDust was a computer virus that affected computers running certain versions of Mac OS. It was discovered in 1998. It was originally referred to as 666.- External links :*, by Symantec*, by McAfee*, by McAfee...

Sh
Shadow
Shake
Shaman
Shanghai
Shankar's Virus
Shankar's Virus
Shankar's Virus is a Polymorphic Computer Virus that infects Microsoft Word documents and templates. It was discovered June 3, 1999. It was created by Sam Rogers.-Effects:...

W97M.Marker.o Polymorphic Virus Infects Word Documents
Shatin
Shiny Happy
Shock Therapy
Shoerec
Shoerec (computer virus)
Win9x.Shoerec is a Win32 encrypted parasitic computer virus. It is a direct action virus.- Effects :The virus activates its payload after three to four months from the first infection...

Show Game
Silence
Silent Banker
Silly Willy
Silver Dollar
Silver3b
Simile
Simile (computer virus)
Win32/Simile is a metamorphic computer virus written in assembly language for Microsoft Windows. The virus was released in the most recent version in early March 2002. It was written by the virus writer Mental Driller...

The Mental Driller
Simple 1992
Simulati
Sis
Sk
Sk1
Skeleton
Skew 469
Skism 808
Skism
SkyTap Gen
Slant
Slayer
Slovak
Slow
Sma-108a
Small 129
Small 132B
Small 146
Small 157
Small 178
Small 185
Small 187
Small
Small-38
Smash
Smily
Smithsonian
Solano Soup Delete (computer virus) Simple format C drive
Something
Snow White and the Seven Dwarfs
Soupy
Sov
Soyun
Spanish April Fool
Spanish
Spanz
Spar
Sparta
Sp0rk3h
Spyer
SQR
Squawk
Squeaker
Squisher
SRE
Staf
Stahl Platte
Stealth C Boot Sector Virus Stealth_C causes the total system and available free memory, to decrease by 4,096 bytes.
Stoned
Stoned (computer virus)
Stoned is the name of a boot sector computer virus created in 1987.Notable for being an early boot sector virus, it was thought to have been written by a university student in Wellington, New Zealand - and by 1989 it had spread widely in New Zealand and Australia...

Striker
Stupid
Subliminal
SubZero
Suicide
Sunday
Sunday (computer virus)
Sunday is a computer virus, a member of the Jerusalem virus family. It was discovered in November 1989 after a number of simultaneous reports from Seattle, Washington, United States, and surrounding areas. Several other Seattle outbreaks, including AirCop, were later traced to...

Sunday-2
Sundevil
Suriv 402
Suriv A
Suriv B
Surrender
Susan
SVC 5.0/6.0
Sverdlov
SVir
Swap Boot
Swen - "News" spelled backwards
Swiss 143
Swiss Phoenix
SX
Sylvia
Sys
Syslock/3551
saplad, roberto
T-1
T4 6-1992 Included in GoMoku 2.0 and 2.1.
T297
Tabulero 2
Taiwan
Taiwan3
Taiwan4
Taocheng
Techno
Techno (computer virus)
The Techno.com virus, more commonly known as the "Techno Virus", is a computer virus that infects Windows DOS. It infects .COM files including COMMAND.COM. The Virus is loaded into the memory by executing an infected program and then affects the computer's runtime and corrupts program or overlay...

Tecla
Telecom Boot
Telecom File
Telekom
Teletype
Teletype-2
Tentacle
Tequila
Terror
Tester
Tigraa Poland
Poland
Poland , officially the Republic of Poland , is a country in Central Europe bordered by Germany to the west; the Czech Republic and Slovakia to the south; Ukraine, Belarus and Lithuania to the east; and the Baltic Sea and Kaliningrad Oblast, a Russian exclave, to the north...

Piotr Bania aka Lord Yup aka dis69, 29A group member Peter Ferrie's analysis
TMTM
TP
Tremor2
TridenT
Triple Shot
Troi Two
Tschantches
T-series
TU-482
Tuesday
Tula
Tumen V0.5
Tumen V2.0
Tumen
Turbo
Turkey
Tver
Twin Peaks
Twin-351
twoneight
Typo Boot
Ucender
Ugur
Undressed
Unk
Uriel
Uruk 300
Uruk 361
Uruk-Hai Unknown
USSR
USSR 1049
USSR 2144 windows extract
USSR 256
USSR 257
USSR 3103
USSR 311
USSR 394
USSR-394
USSR 492
USSR 516
USSR 600
USSR 696
USSR 707
USSR 711
USSR 830
USSR 948
V1 0
V1 1
V1028
V125
V1463
V163
V1-Not
V2 0
V2000
V2100
V270X
V299
V2P2
V2P6
V-351
V-388
V400
V483
V5
V600
V800
V801
V82
V914
V961
VA
Vacsina
VCL
VCL-HEEvE
Vcomm
VCS
VDV-853
VHP
VHP-2
V-Label
VM
VP
VTS
VVF-34
Venge-E
Vera Cruz
Victor
Vienna/648
Vietnamese
Violator
Viper
Viperizer B
Viral Messiah
Virdem
Virflop
virus-101
virus-90
Voco
Vootie
Voronezh
Vote/Vote1000
Vriest
W13
WAVE
Warbiest Terminator 2008 For Windows XP Only.
Warbiest Terminator v.2.0 2009 For Windows XP and Vista.
WWT
Walkabout
Walker
Warez
Warrior 2
Warrior
Wazoo
WDEF 12-1989 Affects only Macintosh System 6.
Weak
Whale
Whale (computer virus)
The Whale virus is a computer virus discovered on July 1, 1990. The file size, at 9,216 bytes, was for its time the largest virus ever discovered. It was written by German programmer R. Horner...

Wharps
WhoCares
Why win
Wilbur 3
Wild trojan
Wild Thing A
Willistrover III
Willow
Willow 2
WinAble 2004 Windows systems only. Disrupts system performance by displaying pop-ups. Starts only when computer is on, and slows internet performance as well.
Windmill
WinNuke
Winvir
Wisconsin
Wizard 3.0
Wolfman
Wonder
Word Atom Macro
Word Color Macro
Word Concept Macro
Word Hot Macro
Wordswap
World Peace w32.myzor.FK@yf
Wsnpoem
X-1
X-2
X-3A
X-3B
X77
Xabaras
Xpeh
XTAC
Xuxa
Yale
Yan2505a
Yankee
Yankee - 2
Yap
Year 1993
Yerg
Youth
Yukon
Z10
ZK900
ZRK
ZU1
Zak2
Zaragosa
Zeppelin
Zero Bug
Zero Time
ZeroHunt
ZMist
ZMist (computer virus)
Zmist is a metamorphic computer virus created by the Russian virus writer known as Zombie. It was the first virus to use a technique known as "code integration"...

ZMistfall, Zombie.Mistfall Z0mbie
Zoda
Zohra

Related lists

  • List of computer worms
  • Timeline of notable computer viruses and worms
    Timeline of notable computer viruses and worms
    This is a timeline of noteworthy computer viruses, worms and Trojan horses.- 1966 :* The work of John von Neumann on the "Theory of self-reproducing automata" is published...

  • Palm OS viruses
    Palm OS Viruses
    While some viruses do exist for Palm OS based devices, very few have ever been designed. Typically, mobile devices are difficult for virus writers to target, since their simplicity provides fewer security holes to target compared to a desktop.-Viruses for Palm OS:...


Other types of malware

  • Adware
    Adware
    Adware, or advertising-supported software, is any software package which automatically plays, displays, or downloads advertisements to a computer. These advertisements can be in the form of a pop-up. They may also be in the user interface of the software or on a screen presented to the user during...

  • Malware
    Malware
    Malware, short for malicious software, consists of programming that is designed to disrupt or deny operation, gather information that leads to loss of privacy or exploitation, or gain unauthorized access to system resources, or that otherwise exhibits abusive behavior...

  • Spam
    Spam (electronic)
    Spam is the use of electronic messaging systems to send unsolicited bulk messages indiscriminately...

  • Spyware
    Spyware
    Spyware is a type of malware that can be installed on computers, and which collects small pieces of information about users without their knowledge. The presence of spyware is typically hidden from the user, and can be difficult to detect. Typically, spyware is secretly installed on the user's...

  • Computer Worms
    Computer worm
    A computer worm is a self-replicating malware computer program, which uses a computer network to send copies of itself to other nodes and it may do so without any user intervention. This is due to security shortcomings on the target computer. Unlike a computer virus, it does not need to attach...

  • Trojan horse
    Trojan horse (computing)
    A Trojan horse, or Trojan, is software that appears to perform a desirable function for the user prior to run or install, but steals information or harms the system. The term is derived from the Trojan Horse story in Greek mythology.-Malware:A destructive program that masquerades as a benign...


Notable instances

  • Storm Worm
    Storm Worm
    The Storm Worm is a backdoor Trojan horse that affects computers using Microsoft operating systems, discovered on January 17, 2007...

     - A Windows
    Microsoft Windows
    Microsoft Windows is a series of operating systems produced by Microsoft.Microsoft introduced an operating environment named Windows on November 20, 1985 as an add-on to MS-DOS in response to the growing interest in graphical user interfaces . Microsoft Windows came to dominate the world's personal...

     trojan horse that forms the Storm botnet
    Storm botnet
    The Storm botnet or Storm worm botnet is a remotely controlled network of "zombie" computers that have been linked by the Storm Worm, a Trojan horse spread through e-mail spam...

  • ILOVEYOU
    ILOVEYOU
    ILOVEYOU, also known as Love Letter, is a computer worm that successfully attacked tens of millions of computers in 2000 when it was sent as an attachment to a user with the text "ILOVEYOU" in the subject line. The worm arrived e-mail on and after May 4, 2000 with the simple subject of "ILOVEYOU"...

  • Conficker
    Conficker
    Conficker, also known as Downup, Downadup and Kido, is a computer worm targeting the Microsoft Windows operating system that was first detected in November 2008...

  • Creeper virus
    Creeper virus
    Creeper was an experimental self-replicating program written by Bob Thomas at BBN in 1971. It was designed not to damage but to demonstrate a mobile application. It is generally accepted to be the first computer worm, although the notion of a "computer virus" did not exist in the 1970s. Creeper...

     - The first malware that ran on ARPANET
  • Leap virus
    Leap virus
    The Leap or Oompa-Loompa computer virus is an application-infecting, LAN-spreading worm for Mac OS X discovered in February 2006.Leap cannot spread over the Internet, and can only spread over a local area network reachable using the Bonjour protocol...

    - Mac OS X virus
The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK