List of computer viruses (all)
Encyclopedia
The following is an extensive list of computer viruses. Please note that new computer viruses are being made all the time,so we cannot list every one the moment it appears.
List of computer viruses
Name | Alias(es) | Type | Subtype | Isolation Date | Isolation | Origin | Author | Notes | |||||||
1260 1260 (computer virus) 1260, or V2PX, was a computer virus written in 1989 by Mark Washburn that used a form of polymorphic encryption. Derived from Ralph Burger's publication of the disassembled Vienna virus source code, the 1260 altered its signature by randomizing and obfuscating its decryption algorithm in an effort... |
MS-DOS MS-DOS MS-DOS is an operating system for x86-based personal computers. It was the most commonly used member of the DOS family of operating systems, and was the main operating system for IBM PC compatible personal computers during the 1980s to the mid 1990s, until it was gradually superseded by operating... |
1990 | Mark Washburn, Ralf Burger | First virus to use polymorphic encryption Polymorphic code In computer terminology, polymorphic code is code that uses a polymorphic engine to mutate while keeping the original algorithm intact. That is, the code changes itself each time it runs, but the function of the code will not change at all... |
|||||||||||
4K 4K (computer virus) 4k is a computer virus which infects COM files and EXE files. The virus was one of the first to employ stealth tactics. Infected systems will hang, after September 22 every year, which is also the date of birth Bilbo Baggins, a character from the The Lord of the Rings... |
4096 | MS-DOS MS-DOS MS-DOS is an operating system for x86-based personal computers. It was the most commonly used member of the DOS family of operating systems, and was the main operating system for IBM PC compatible personal computers during the 1980s to the mid 1990s, until it was gradually superseded by operating... |
January 1990 | unknown | The first virus to use stealth | ||||||||||
5lo 5lo 5lo is a computer virus that increases file size and does little more than replicate. Size: 1,032 bytes-Infection:5lo infects resident .EXE files only... |
MS-DOS MS-DOS MS-DOS is an operating system for x86-based personal computers. It was the most commonly used member of the DOS family of operating systems, and was the main operating system for IBM PC compatible personal computers during the 1980s to the mid 1990s, until it was gradually superseded by operating... |
October 1992 | unknown | Infects .EXE files only | |||||||||||
A and A | MS-DOS MS-DOS MS-DOS is an operating system for x86-based personal computers. It was the most commonly used member of the DOS family of operating systems, and was the main operating system for IBM PC compatible personal computers during the 1980s to the mid 1990s, until it was gradually superseded by operating... Windows 95 Windows 95 Windows 95 is a consumer-oriented graphical user interface-based operating system. It was released on August 24, 1995 by Microsoft, and was a significant progression from the company's previous Windows products... , Windows 98 Windows 98 Windows 98 is a graphical operating system by Microsoft. It is the second major release in the Windows 9x line of operating systems. It was released to manufacturing on 15 May 1998 and to retail on 25 June 1998. Windows 98 is the successor to Windows 95. Like its predecessor, it is a hybrid... |
unknown | unknown | ||||||||||||
A-403 | MS-DOS MS-DOS MS-DOS is an operating system for x86-based personal computers. It was the most commonly used member of the DOS family of operating systems, and was the main operating system for IBM PC compatible personal computers during the 1980s to the mid 1990s, until it was gradually superseded by operating... Windows 95 Windows 95 Windows 95 is a consumer-oriented graphical user interface-based operating system. It was released on August 24, 1995 by Microsoft, and was a significant progression from the company's previous Windows products... , Windows 98 Windows 98 Windows 98 is a graphical operating system by Microsoft. It is the second major release in the Windows 9x line of operating systems. It was released to manufacturing on 15 May 1998 and to retail on 25 June 1998. Windows 98 is the successor to Windows 95. Like its predecessor, it is a hybrid... |
1998 | unknown | ||||||||||||
Abraxas Abraxas (computer virus) Abraxas, also known as Abraxas5, discovered in April 1993, is an encrypted, overwriting, file infecting computer virus which infects .COM and .EXE files, although it does not infect command.com. It does not become memory resident... |
MS-DOS MS-DOS MS-DOS is an operating system for x86-based personal computers. It was the most commonly used member of the DOS family of operating systems, and was the main operating system for IBM PC compatible personal computers during the 1980s to the mid 1990s, until it was gradually superseded by operating... Windows 95 Windows 95 Windows 95 is a consumer-oriented graphical user interface-based operating system. It was released on August 24, 1995 by Microsoft, and was a significant progression from the company's previous Windows products... , Windows 98 Windows 98 Windows 98 is a graphical operating system by Microsoft. It is the second major release in the Windows 9x line of operating systems. It was released to manufacturing on 15 May 1998 and to retail on 25 June 1998. Windows 98 is the successor to Windows 95. Like its predecessor, it is a hybrid... |
April 1993 | unknown | Infects COM file COM file In many computer operating systems, a COM file is a type of executable file; the name is derived from the file name extension .COM. Originally, the term stood for "Command file", a text file containing commands to be issued to the operating system , on many of the Digital Equipment Corporation mini... . Disk directory listing will be set to the system date and time when infection occurred. |
|||||||||||
Acid Acid (computer virus) Acid is a computer virus which infects .COM and .EXE files including command.com. Each time an infected file is executed, Acid infects all of the .EXE files in the current directory. Later, if an infected file is executed, it infects the .COM files in the current directory... |
MS-DOS MS-DOS MS-DOS is an operating system for x86-based personal computers. It was the most commonly used member of the DOS family of operating systems, and was the main operating system for IBM PC compatible personal computers during the 1980s to the mid 1990s, until it was gradually superseded by operating... Windows 95 Windows 95 Windows 95 is a consumer-oriented graphical user interface-based operating system. It was released on August 24, 1995 by Microsoft, and was a significant progression from the company's previous Windows products... , Windows 98 Windows 98 Windows 98 is a graphical operating system by Microsoft. It is the second major release in the Windows 9x line of operating systems. It was released to manufacturing on 15 May 1998 and to retail on 25 June 1998. Windows 98 is the successor to Windows 95. Like its predecessor, it is a hybrid... |
1992 | Corp-$MZU | Infects COM file COM file In many computer operating systems, a COM file is a type of executable file; the name is derived from the file name extension .COM. Originally, the term stood for "Command file", a text file containing commands to be issued to the operating system , on many of the Digital Equipment Corporation mini... . Disk directory listing will not be altered. |
|||||||||||
Acme Acme (computer virus) Acme is a computer virus which infects EXE files. Each time an infected file is executed, Acme may infect an EXE in the current directory by creating a hidden 247 byte long read-only COM file with the same base name... |
Upon executing infected EXE EXE EXE is the common filename extension denoting an executable file in the DOS, OpenVMS, Microsoft Windows, Symbian, and OS/2 operating systems.... , this infects another EXE in current directory by making a hidden COM file COM file In many computer operating systems, a COM file is a type of executable file; the name is derived from the file name extension .COM. Originally, the term stood for "Command file", a text file containing commands to be issued to the operating system , on many of the Digital Equipment Corporation mini... with same base name. |
||||||||||||||
ABC ABC (computer virus) ABC, discovered in October 1992, is a memory-resident, file-infecting computer virus which infects EXE files and may alter both COM and EXE files. ABC activates on the 13th day of every month.... |
|||||||||||||||
A ctifed Actifed (computer virus) Actifed is a G2-generated encrypted computer virus which infects .COM and .EXE files but not command.com. The virus is loaded into memory by executing an infected program and then affects the computer's run-time operation and corrupts program files.... |
h | ||||||||||||||
Ada Ada (computer virus) Ada is a computer virus that can affect any of the DOS operating systems. Ada was first discovered in 1991.-Virus Characteristics:Ada is a memory resident virus that infects files... |
|||||||||||||||
Agena Agena (computer virus) AGENA is a memory resident, file infecting computer virus which infects .COM and .EXE files, including command.com. It was discovered in Spain in September, 1992. Upon infection, Agena becomes memory resident at the top of system memory but below the 640K DOS boundary. Once it is memory resident,... |
|||||||||||||||
AGI-Plan AGI-Plan (computer virus) For information on the African consulting company, see Agiplan .AGI-Plan was a memory resident DOS file infector first isolated at the Agiplan software company in Germany. Because of CARO standards that dictate that viruses should not be named after companies, AGI-Plan's technical name is Month 4-6... |
|||||||||||||||
Ah Ah (computer virus) Ah is a very buggy computer virus which infects COM files including command.com. Ah is based on the V1024 virus, and originated in Italy in May 1991. When the first program infected with Ah is executed, Ah will install itself memory resident at the top of system memory, but below the 640K DOS... |
|||||||||||||||
AI AI (computer virus) AI is a computer virus which infects .EXE files. The virus is loaded into memory by executing an infected program and then effects the computer's run time operation and corrupts program or overlay files. It does not appear to work with all .EXE files but does infect standard DOS files easily... |
|||||||||||||||
AIDS AIDS (computer virus) AIDS is a computer virus written in Turbo Pascal 3.01a which overwrites com files. AIDS is the first virus known to exploit the MS-DOS "corresponding file" vulnerability. In MS-DOS, if both foo.com and foo.exe exist, then foo.com will always be executed first... |
|||||||||||||||
AIDS II AIDS II (computer virus) AIDS II is a companion computer virus, which infects COM files. It was first discovered in April 1990, and is a variant of AIDS. Unlike other generic file infectors, AIDS II was the first known virus to employ what could be called a "corresponding file technique" of infection so that the original... |
|||||||||||||||
AirCop | Air cop-B | MS-DOS MS-DOS MS-DOS is an operating system for x86-based personal computers. It was the most commonly used member of the DOS family of operating systems, and was the main operating system for IBM PC compatible personal computers during the 1980s to the mid 1990s, until it was gradually superseded by operating... |
Jan 1990 | ||||||||||||
Ajax | |||||||||||||||
Alabama Alabama (computer virus) Alabama is a computer virus, discovered October 1989 on the campus of Hebrew University in Jerusalem.-Infection:Alabama is a fairly standard file infector outside its odd behaviour of deciding what files to infect. When an infected file is executed, Alabama goes memory resident. Whenever a .EXE... |
|||||||||||||||
Albanet | |||||||||||||||
Alcon Alcon (computer virus) Alcon, or RSY , is a computer virus that was discovered to be spreading in Europe in 1997. It is a boot virus.-Infection:Alcon is a standard boot sector virus that spreads via floppies... |
|||||||||||||||
Alien | |||||||||||||||
Ambulance Ambulance (computer virus) Ambulance is a file infecting computer virus and it does not become memory resident. It will only infect one .COM file in any given directory, but will not infect the first one. This means there must be at least two .COM files in the directory for it to spread.... |
|||||||||||||||
Amstrad | |||||||||||||||
Ancient | |||||||||||||||
Andre | |||||||||||||||
Andre2 | |||||||||||||||
Andromeda | |||||||||||||||
Angelina | |||||||||||||||
Anna | |||||||||||||||
Anna Kournikova Anna Kournikova (computer virus) The Anna Kournikova computer virus was a computer virus authored by Dutch programmer Jan de Wit on February 11, 2001. It was designed to trick email users into opening a mail message purportedly containing a picture of tennis player Anna Kournikova, while actually hiding a malicious program... |
Email VBScript VBScript VBScript is an Active Scripting language developed by Microsoft that is modeled on Visual Basic. It is designed as a “lightweight” language with a fast interpreter for use in a wide variety of Microsoft environments... |
Jan de Wit | |||||||||||||
Anninja | |||||||||||||||
ANT | |||||||||||||||
Ant-Cow | |||||||||||||||
Anthrax - Boot | |||||||||||||||
Anthrax - File | |||||||||||||||
ANTI | 2-1989 | Does not spread under MultiFinder. | |||||||||||||
AntiCMOS AntiCMOS (computer virus) AntiCMOS is a boot virus. Its first discovery was at Lenart, Slovenia, which led to its alias of Lenart. It was isolated in Hong Kong several times at the beginning of 1994, but did not become common until it spread to North America in the Spring of 1995... |
|||||||||||||||
AntiHeuristica | It's payload is opposite of Cascade DOS virus, instead of the letters being pushed down, it pushes it upwards. | ||||||||||||||
Anti-D | |||||||||||||||
Anti-Daf | |||||||||||||||
Anti-MIT | |||||||||||||||
Anti-Pascal II | |||||||||||||||
Anti-Pascal | |||||||||||||||
Anti-Tel | |||||||||||||||
Anti-Telefonica | |||||||||||||||
Apadana | |||||||||||||||
Apost.exe | |||||||||||||||
Arab | |||||||||||||||
Aragon | |||||||||||||||
Aragorn | |||||||||||||||
ARCV-n ARCV-n (computer virus) ARCV-n is a term for a large family of viruses authored by the ARCV group through October - November 1992 and polymorphed with the PS-MPC virus generation tool . ARCV-n viruses seem to infect COM and/or EXE files rapidly, but do not damage the compromised machine, instead displaying various text... |
|||||||||||||||
Argentina | |||||||||||||||
Arka | |||||||||||||||
Arma | |||||||||||||||
Armagedon The Greek | |||||||||||||||
Armagedon | |||||||||||||||
Arriba | |||||||||||||||
Arusiek | |||||||||||||||
ASC | |||||||||||||||
Ash | |||||||||||||||
ASP-472 | |||||||||||||||
Astra | |||||||||||||||
AT 144 | |||||||||||||||
AT 149 | |||||||||||||||
Atas | |||||||||||||||
Atas3321 | |||||||||||||||
Atas-400 | |||||||||||||||
Atom Atom The atom is a basic unit of matter that consists of a dense central nucleus surrounded by a cloud of negatively charged electrons. The atomic nucleus contains a mix of positively charged protons and electrically neutral neutrons... |
|||||||||||||||
Atomic1A | |||||||||||||||
Atomic1b | |||||||||||||||
Atomic2A | |||||||||||||||
Atomic2b | |||||||||||||||
Atte-629 | |||||||||||||||
August 16 | |||||||||||||||
AusPar | |||||||||||||||
Australian | |||||||||||||||
Azusa | |||||||||||||||
B Ugly | |||||||||||||||
B3 | |||||||||||||||
B-52 | |||||||||||||||
BA101 | |||||||||||||||
Back Time | |||||||||||||||
Bacros | |||||||||||||||
Badass | |||||||||||||||
Bad Boy | |||||||||||||||
Bad Brains | |||||||||||||||
Bad Command | |||||||||||||||
Bad Guy | |||||||||||||||
Bad Sectors 1.2 Bad Sectors 1.2 (computer virus) On the Windows operating system, Bad Sectors 1.2 is a boot virus that infects users computers mainly by email. However, it may also infect a computer if the user visits certain web sites.-Overview:... |
|||||||||||||||
Bad-389 | |||||||||||||||
Bak | |||||||||||||||
Bamestra | |||||||||||||||
Banana | |||||||||||||||
Bandit | |||||||||||||||
Baobab 731 | |||||||||||||||
Barcelona | |||||||||||||||
Barrotes 2 | |||||||||||||||
Barrotes | |||||||||||||||
Basil | |||||||||||||||
Bat | |||||||||||||||
Beach | |||||||||||||||
Beaches | |||||||||||||||
Beast | |||||||||||||||
BeBe | |||||||||||||||
Beeper | |||||||||||||||
Beer | |||||||||||||||
Benoit | |||||||||||||||
Real PvP Flava | |||||||||||||||
Berlin | |||||||||||||||
Best Wishes | |||||||||||||||
Beta | |||||||||||||||
Beva-32 | |||||||||||||||
Beva-33 | |||||||||||||||
Beva-96 | |||||||||||||||
Beware | |||||||||||||||
BFD | |||||||||||||||
Big 2000 | |||||||||||||||
Bit Addict | |||||||||||||||
BlackDeath | |||||||||||||||
Black Knight | Blackworm |
||||||||||||||
Black Monday | |||||||||||||||
Blackjack | |||||||||||||||
Black Pegasus | |||||||||||||||
Blaze | |||||||||||||||
Bljec | |||||||||||||||
Blood Lust | |||||||||||||||
Blood Rage | |||||||||||||||
Blood | |||||||||||||||
Blood-2 | |||||||||||||||
Bob | |||||||||||||||
Bomber Bomber (computer virus) Bomber is a DOS polymorphic computer virus known for its technique of "patchy infection". Contrary to the usual method of infecting executables , it inserts several fragments of its code in random places inside the file... |
|||||||||||||||
Boot Killer | |||||||||||||||
Bounce | Windows | Upon activation, it makes message boxes on screen and the mouse cursor "bounce" up and down. It does no other damage. | |||||||||||||
Bouncing Dot | |||||||||||||||
Bow | |||||||||||||||
Boys | |||||||||||||||
Brainy | |||||||||||||||
BrO AcT | Windows XP | This virus will block most anti-virus programs and disable 'regedit', 'msconfig', and 'task manager' | |||||||||||||
Brotherhood | |||||||||||||||
Brothers | |||||||||||||||
Browser Enhancement | Claims to enhance browser experience, but when computer is re-booted, displays a fake anti-piracy warning claiming to need to pay to drop charges, but steals your credit card number. | ||||||||||||||
Bryansk | |||||||||||||||
Bubbles 2 | |||||||||||||||
Bubbles | |||||||||||||||
Bubonic | |||||||||||||||
Budo | |||||||||||||||
Burger | |||||||||||||||
Burghofer | |||||||||||||||
Busted | |||||||||||||||
Butterfly | |||||||||||||||
Butthole | |||||||||||||||
Byte Bandit Byte Bandit Byte Bandit is a boot sector computer virus created for the Commodore Amiga. It first appeared in January 1988, and was created by SCA.It was one of the most feared Amiga viruses until the infamous Lamer Exterminator because not only did it spread from system to system automatically, it was also... |
Amiga, Bootsector virus | January 1988 | Swiss Cracking Association | ||||||||||||
Byte Warrior | Amiga, Boot sector virus | ||||||||||||||
(c)Brain | Pakistani flu, | January 1986 | Lahore Lahore Lahore is the capital of the Pakistani province of Punjab and the second largest city in the country. With a rich and fabulous history dating back to over a thousand years ago, Lahore is no doubt Pakistan's cultural capital. One of the most densely populated cities in the world, Lahore remains a... , Pakistan Pakistan Pakistan , officially the Islamic Republic of Pakistan is a sovereign state in South Asia. It has a coastline along the Arabian Sea and the Gulf of Oman in the south and is bordered by Afghanistan and Iran in the west, India in the east and China in the far northeast. In the north, Tajikistan... |
Basit and Amjad Farooq Alvi | Considered to be the first computer virus Computer virus A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly but erroneously used to refer to other types of malware, including but not limited to adware and spyware programs that do not have the reproductive ability... for the PC Personal computer A personal computer is any general-purpose computer whose size, capabilities, and original sales price make it useful for individuals, and which is intended to be operated directly by an end-user with no intervening computer operator... |
||||||||||
C | |||||||||||||||
Cabanas | |||||||||||||||
Caco-Daemon | |||||||||||||||
CAD Kill | |||||||||||||||
C-A-D | |||||||||||||||
Cannabis | |||||||||||||||
Cansu | |||||||||||||||
Capital | |||||||||||||||
Cara | |||||||||||||||
Caribe | |||||||||||||||
Carioca | |||||||||||||||
CaroEvil | |||||||||||||||
Cartuja | |||||||||||||||
Casc1621 | |||||||||||||||
Casc-2 | |||||||||||||||
Cascade Cascade (computer virus) The Cascade virus was a resident computer virus written in assembler, that was widespread in the 1980s and early 1990s. It infected COM files and had the effect of making text on the screen fall down and form a heap in the bottom of the screen. It was notable for using an encryption algorithm to... |
|||||||||||||||
Casino Casino (computer virus) The casino computer virus is a malicious virus that upon running the infected file, copies the FAT to RAM, then deletes the FAT from the hard disk. It challenges you to a game of Jackpot of which you have 5 credits to play with, hence the name. If you fail to win, the computer shuts down, thereby... |
|||||||||||||||
Casper | |||||||||||||||
Casteggio | |||||||||||||||
Caterpillar | 1575 | MS-DOS MS-DOS MS-DOS is an operating system for x86-based personal computers. It was the most commonly used member of the DOS family of operating systems, and was the main operating system for IBM PC compatible personal computers during the 1980s to the mid 1990s, until it was gradually superseded by operating... |
|||||||||||||
Catman | |||||||||||||||
Catphish | |||||||||||||||
Caz | |||||||||||||||
CB-1530 | |||||||||||||||
CD | |||||||||||||||
CDEF | 8-1990 | ||||||||||||||
CDFL Mac | |||||||||||||||
CD-10 | |||||||||||||||
Century | |||||||||||||||
Cerburus | |||||||||||||||
CFSK | |||||||||||||||
Chad | |||||||||||||||
Chang | |||||||||||||||
Chaos | |||||||||||||||
Chaser | |||||||||||||||
Chasna | |||||||||||||||
Chcc | |||||||||||||||
Cheeba | |||||||||||||||
Cheesy | |||||||||||||||
Chemist | |||||||||||||||
Chemnitz | |||||||||||||||
Chernobyl | |||||||||||||||
Chile Mediera | |||||||||||||||
Chinese Blood | |||||||||||||||
Chr-869 | |||||||||||||||
Chrisj13 | |||||||||||||||
Christmas Tree | |||||||||||||||
Christmas Violator | |||||||||||||||
CIH CIH (computer virus) CIH, also known as Chernobyl or Spacefiller, is a Microsoft Windows computer virus written by Chen Ing Hau of Travian... |
|||||||||||||||
Cinderella | |||||||||||||||
Civil Service | |||||||||||||||
Civil War II | |||||||||||||||
Civil War III | |||||||||||||||
Civil War IV | |||||||||||||||
Civil War V | |||||||||||||||
Civil War | |||||||||||||||
CkSum | |||||||||||||||
Clagger | |||||||||||||||
Clint | |||||||||||||||
Clonewar 2 | |||||||||||||||
Clonewar | |||||||||||||||
Clust | |||||||||||||||
Coahuila | |||||||||||||||
CODE 1 | 11-1993 | Renames the hard drive to "Trent Saburo" on any October 31st. | |||||||||||||
CODE 252 | 4-1992 | ||||||||||||||
Code Zero | |||||||||||||||
Coffee Shop | |||||||||||||||
Collor de Mello | |||||||||||||||
Color | |||||||||||||||
Com16850 | |||||||||||||||
Com2S | |||||||||||||||
Comdex | |||||||||||||||
Commentator | |||||||||||||||
Commwarrior | most common mobile phone virus for nokia mobile phones, transmits via bluetooth wireless. | ||||||||||||||
Como | |||||||||||||||
Compiler2 | |||||||||||||||
Comspec | |||||||||||||||
Conficker Conficker Conficker, also known as Downup, Downadup and Kido, is a computer worm targeting the Microsoft Windows operating system that was first detected in November 2008... |
|||||||||||||||
Cop-Mpl | |||||||||||||||
Copyright | |||||||||||||||
Copyr-ug | |||||||||||||||
Coruna | |||||||||||||||
Coruna3 | |||||||||||||||
Cossiga No Grazie | |||||||||||||||
Cossiga | |||||||||||||||
Costeau | |||||||||||||||
CPXK | |||||||||||||||
Cracker Jack | |||||||||||||||
Cracky | |||||||||||||||
Crash | |||||||||||||||
Crasher | |||||||||||||||
Crazy Eddie | |||||||||||||||
Crazy Imp | |||||||||||||||
CrazyI B | |||||||||||||||
CRF | |||||||||||||||
Cross Over | |||||||||||||||
Crystal | |||||||||||||||
CSL | |||||||||||||||
CV4 | |||||||||||||||
D1 | |||||||||||||||
DKid | |||||||||||||||
Dada | |||||||||||||||
Damage | |||||||||||||||
Danny | |||||||||||||||
Dark Apocalypse | |||||||||||||||
Dark Avenger Dark Avenger Dark Avenger was a pseudonym of a computer virus writer from Sofia, Bulgaria. He gained considerable popularity during the early 1990s, as some of his viruses spread not only nationwide, but across Europe as well, even reaching the United States.... |
|||||||||||||||
Dark End | |||||||||||||||
DataLock | |||||||||||||||
Datos | |||||||||||||||
Davis | |||||||||||||||
D-Day | |||||||||||||||
Death | |||||||||||||||
Deathead | |||||||||||||||
Deceide 2 | |||||||||||||||
Dedicated | |||||||||||||||
Deicide | |||||||||||||||
Demolition | |||||||||||||||
Demon | |||||||||||||||
Den Zuk | |||||||||||||||
Dennis | |||||||||||||||
Deranged | |||||||||||||||
Diablo | |||||||||||||||
Dial | |||||||||||||||
DigiDeliver | |||||||||||||||
Dima | |||||||||||||||
Disk Killer | |||||||||||||||
Dismember | |||||||||||||||
Dodgy 1024 | |||||||||||||||
Dodo 2456 | |||||||||||||||
Dodo | |||||||||||||||
Doodle | |||||||||||||||
Dorn | |||||||||||||||
Dose-A | |||||||||||||||
Druid | |||||||||||||||
Dudley | |||||||||||||||
Dutch Tiny | |||||||||||||||
Dutch | Scare Worm This virus deletes all users, all data, and s the worst virus yet. | Earthday | |||||||||||||
Eclypse | |||||||||||||||
ECV | |||||||||||||||
Ed | |||||||||||||||
Edcl | |||||||||||||||
EDV | |||||||||||||||
Egg | Egg is a computer virus that affects the COM. and EXE files. | ||||||||||||||
Eggdrop | |||||||||||||||
Ein Volk | |||||||||||||||
Einstein | |||||||||||||||
Ekoterror | |||||||||||||||
E1ectr0n | |||||||||||||||
Eliza Eliza (computer virus) - Overview :Eliza is a computer virus which infects COM files including Command.com. It has been reported that it is defective, yet destroys the .EXE files it creates. The .COM files do not get deleted. The date of the file will not be altered by the infection to avoid detection, infected files... |
DOS DOS DOS, short for "Disk Operating System", is an acronym for several closely related operating systems that dominated the IBM PC compatible market between 1981 and 1995, or until about 2000 if one includes the partially DOS-based Microsoft Windows versions 95, 98, and Millennium Edition.Related... |
Dec 1991 | |||||||||||||
Elk Cloner | Apple II Apple II The Apple II is an 8-bit home computer, one of the first highly successful mass-produced microcomputer products, designed primarily by Steve Wozniak, manufactured by Apple Computer and introduced in 1977... |
Richard Skrenta | The first virus observed "in the wild" | ||||||||||||
Elvirus | |||||||||||||||
Elvira | |||||||||||||||
EMF 625 | |||||||||||||||
EMF | |||||||||||||||
Emmie | |||||||||||||||
EMO | |||||||||||||||
Empire | |||||||||||||||
End-of | |||||||||||||||
Enemy | |||||||||||||||
Enigma | |||||||||||||||
Enola | |||||||||||||||
Error 412 virus | |||||||||||||||
Error | |||||||||||||||
Essex | |||||||||||||||
Estepa | |||||||||||||||
ETC | |||||||||||||||
Europe-92 | |||||||||||||||
Evil Genius | |||||||||||||||
Exper416 | |||||||||||||||
Explode | |||||||||||||||
Exploration | |||||||||||||||
Exterminator | |||||||||||||||
Eziarch | |||||||||||||||
Family Q | |||||||||||||||
Farcus | |||||||||||||||
Father Christmas | |||||||||||||||
Faust | |||||||||||||||
Fax Free | |||||||||||||||
Fear | |||||||||||||||
Feist | |||||||||||||||
Fellowship | |||||||||||||||
Fich | |||||||||||||||
Fich897 | |||||||||||||||
Filedate | |||||||||||||||
Filename | |||||||||||||||
Filler | |||||||||||||||
Fingers | |||||||||||||||
Finn-357 | |||||||||||||||
Fish 1100 | |||||||||||||||
Fish 2 | |||||||||||||||
Fish 2420 | |||||||||||||||
Fish Boot | |||||||||||||||
Fish | |||||||||||||||
Flagyll | |||||||||||||||
Flash | |||||||||||||||
Flex | |||||||||||||||
Flip | |||||||||||||||
Flower | |||||||||||||||
Flu-2 | |||||||||||||||
Fly11 | |||||||||||||||
Fone Sex | |||||||||||||||
Fotomoto | |||||||||||||||
Forger2 | |||||||||||||||
Form Form (computer virus) Form was a boot sector virus isolated in Switzerland in the summer of 1990 which became very common worldwide. The origin of Form is widely listed as Switzerland, but this may be an assumption based on its isolation locale... |
|||||||||||||||
Fortran | |||||||||||||||
Frajer | |||||||||||||||
Francois | |||||||||||||||
Frankie | Macintosh emulator | Targeted pirated versions of the Aladdin emulator. | |||||||||||||
Fratricide | |||||||||||||||
Free | |||||||||||||||
Frere Jacques | |||||||||||||||
Fri13-nz | |||||||||||||||
Friday 13th COM | |||||||||||||||
Friday 13th | |||||||||||||||
Friday the 13th - Version A | |||||||||||||||
Frodo Soft | |||||||||||||||
Frodo-458 | |||||||||||||||
Frogs | |||||||||||||||
Fu Manchu | |||||||||||||||
Fune | |||||||||||||||
Fun.exe virus Fun.exe virus The Fun.Exe virus is of the w32.Assarm family of computer viruses. According to Symantec it registers itself as a windows system process then periodically sends mail with spreading attachments as a response to any unopened emails in outlook express.... |
w32.Assarm | Windows | XP | 6-23-2008 | |||||||||||
Fvhs-a | |||||||||||||||
Fvhs-B | |||||||||||||||
F-Word | |||||||||||||||
paul eduard | |||||||||||||||
G | |||||||||||||||
Galicia | |||||||||||||||
Ganeu | |||||||||||||||
Gedza | |||||||||||||||
Geek | |||||||||||||||
Gergana | |||||||||||||||
Germ | |||||||||||||||
Get Password 1 | |||||||||||||||
Ghost Boot | |||||||||||||||
Ghost COM | |||||||||||||||
Ghost Dos-62 | |||||||||||||||
Gijon | |||||||||||||||
Gliss | |||||||||||||||
Goblin | |||||||||||||||
Gomb | |||||||||||||||
Gorlovka | |||||||||||||||
Gotch 4 | |||||||||||||||
Gotcha 1 | |||||||||||||||
Gotcha 2 | |||||||||||||||
Gotcha 3 | |||||||||||||||
Gotcha 9e | |||||||||||||||
Gotcha | Created from original identity 'Gotchix' | Spread on Facebook through 'add friend' linkage | |||||||||||||
Got-you | |||||||||||||||
Grapje | |||||||||||||||
Graveyard | |||||||||||||||
Graybird Graybird Graybird is a Trojan horse that hides its presence on the compromised computer and downloads files from remote Web sites. There are many variations of this virus such as Backdoor.Graybird.P .-References:... (Backdoor Graybird, Backdoor Graybird P) |
|||||||||||||||
Green | |||||||||||||||
Grog31 | |||||||||||||||
Groovy | |||||||||||||||
Growing Block | |||||||||||||||
Grue | |||||||||||||||
Grunt | |||||||||||||||
Grunt-3 | |||||||||||||||
Guppy | |||||||||||||||
H-2 | |||||||||||||||
H-457 | |||||||||||||||
HA | |||||||||||||||
Happy virus | |||||||||||||||
Hack-83 | |||||||||||||||
HACKER | |||||||||||||||
Hacktic | |||||||||||||||
Hafen | |||||||||||||||
Haifa | |||||||||||||||
Hallo | |||||||||||||||
Halloechen | |||||||||||||||
Halloween | |||||||||||||||
Hammer | |||||||||||||||
Happy N. Y. | |||||||||||||||
Happy | |||||||||||||||
Hara | |||||||||||||||
Harakiri | |||||||||||||||
Hare Hare (computer virus) The Hare Virus is a destructive computer virus which infected MS-DOS and Windows 95 machines in August 1996. It was also known as Hare.7610, Krsna and HD Euthanasia.... |
MS-DOS MS-DOS MS-DOS is an operating system for x86-based personal computers. It was the most commonly used member of the DOS family of operating systems, and was the main operating system for IBM PC compatible personal computers during the 1980s to the mid 1990s, until it was gradually superseded by operating... Windows 95 Windows 95 Windows 95 is a consumer-oriented graphical user interface-based operating system. It was released on August 24, 1995 by Microsoft, and was a significant progression from the company's previous Windows products... , Windows 98 Windows 98 Windows 98 is a graphical operating system by Microsoft. It is the second major release in the Windows 9x line of operating systems. It was released to manufacturing on 15 May 1998 and to retail on 25 June 1998. Windows 98 is the successor to Windows 95. Like its predecessor, it is a hybrid... |
August 1996 | Unknown | Famous for press coverage which blew its destructiveness out of proportion | |||||||||||
Harm | |||||||||||||||
Hary | |||||||||||||||
Hastings | |||||||||||||||
Hate | |||||||||||||||
HBT | |||||||||||||||
Heevahava | |||||||||||||||
Hello | |||||||||||||||
Hellween 1182 | |||||||||||||||
Hellween | |||||||||||||||
Here | |||||||||||||||
Hero | |||||||||||||||
Hero-394 | |||||||||||||||
Hi | |||||||||||||||
Hidrag | |||||||||||||||
Highland | |||||||||||||||
Hiperion | |||||||||||||||
Hitchcock | |||||||||||||||
Hitler | |||||||||||||||
Holland Girl | |||||||||||||||
Holo/Holocaust | |||||||||||||||
Holiday | |||||||||||||||
Horror | |||||||||||||||
Horse Boot | |||||||||||||||
Horse | |||||||||||||||
HS | |||||||||||||||
Huge | |||||||||||||||
Hungarian | |||||||||||||||
Hybrid | |||||||||||||||
Hymn | |||||||||||||||
IB Demonic | |||||||||||||||
I-B | |||||||||||||||
Ice 9 | |||||||||||||||
ICE9-159 | |||||||||||||||
ICE9-199 | |||||||||||||||
ICE9-224 | |||||||||||||||
Ice9-250 | |||||||||||||||
Icelandic II | |||||||||||||||
Icelandic | |||||||||||||||
Icelandic-3 | |||||||||||||||
IDF | |||||||||||||||
Idle | |||||||||||||||
Ieronim | |||||||||||||||
IKV528 | |||||||||||||||
Ill | |||||||||||||||
ILOVEYOU | |||||||||||||||
Incom | |||||||||||||||
Infinity | |||||||||||||||
INIT 17 | 4-1993 | ||||||||||||||
INIT 29 | 1988 | ||||||||||||||
INIT 1984 INIT 1984 (computer virus) INIT 1984 is a computer virus that setup to trigger on Macintosh computers running the classic Mac OS on any given Friday the 13th. The virus was first discovered and isolated in March, 1992. It functions by infecting startup files, then modifying or deleting those files upon startup on Friday the... |
13-3-1992 | Malicious, triggered on Friday the 13th. | |||||||||||||
INIT 9403 | SysX | 3-1994 | Very destructive, destroys all data. Found only on Italian systems so far. | ||||||||||||
INIT-M | 4-1993 | Malicious, triggered on Friday the 13th. | |||||||||||||
Inofensivo | |||||||||||||||
Inrud-B | |||||||||||||||
Internal | |||||||||||||||
Intruder | |||||||||||||||
Invader | |||||||||||||||
Invisible Man | |||||||||||||||
Invitation | |||||||||||||||
Invol | |||||||||||||||
IOU | |||||||||||||||
Iranian | |||||||||||||||
Iraqi Warrior | |||||||||||||||
IT | |||||||||||||||
IVP EX1 | |||||||||||||||
IVP EX2 | |||||||||||||||
IVP | |||||||||||||||
Japan | |||||||||||||||
Jeefo | |||||||||||||||
Jeff | |||||||||||||||
Jerk | |||||||||||||||
Jeru-1663 | |||||||||||||||
Jerusalem Jerusalem (computer virus) Jerusalem is a DOS virus first detected in Jerusalem, Israel, in October 1987. On infection, the Jerusalem virus becomes memory resident , and then infects every executable file run, except for COMMAND.COM. .COM files grow by 1,813 bytes when infected by Jerusalem and are not re-infected. .EXE... |
|||||||||||||||
Joanna | |||||||||||||||
Jobbie | |||||||||||||||
John | |||||||||||||||
JoJo | |||||||||||||||
Joke | |||||||||||||||
Joker | |||||||||||||||
Joker-1602 | |||||||||||||||
Joker3 | |||||||||||||||
Jonathan (malware) | |||||||||||||||
Joshi | |||||||||||||||
Joshua | |||||||||||||||
July 13th | |||||||||||||||
July 26 | |||||||||||||||
June 16th | |||||||||||||||
June1530 | |||||||||||||||
Junky | |||||||||||||||
Justice | |||||||||||||||
Kamasutra | |||||||||||||||
Kak worm Kak worm KAK is 1999 a JavaScript worm that uses a bug in Outlook Express to spread itself.On the first day of every month, at 5:00 pm, the worm uses shutdown.exe to initiate a shutdown and show a popup with text "Kagou-anti-Kro$oft says not today!". A minimized window often appears on startup with the... |
|||||||||||||||
killerjeff.exe | |||||||||||||||
L1 | Infects .COM files. Affects the computers runtime operation and corrupts data files. | ||||||||||||||
Label | h1n1 | ||||||||||||||
Lamer Exterminator | Amiga, Boot sector virus | October 1989 | Germany Germany Germany , officially the Federal Republic of Germany , is a federal parliamentary republic in Europe. The country consists of 16 states while the capital and largest city is Berlin. Germany covers an area of 357,021 km2 and has a largely temperate seasonal climate... |
Random encryption, fills random sector with "LAMER" | |||||||||||
Lanc | |||||||||||||||
Lanc5476 | |||||||||||||||
Lanc5882 | |||||||||||||||
Larry | |||||||||||||||
Lazy | |||||||||||||||
LCV | |||||||||||||||
Leapfrog | |||||||||||||||
Leech | |||||||||||||||
Lehigh | |||||||||||||||
Leper AOD | |||||||||||||||
Leprosy | Infects COM.And EXE. Files after its visual payload on DOS | ||||||||||||||
Les | |||||||||||||||
Lib1172 | |||||||||||||||
Liberty | |||||||||||||||
Liquid Code - 2 | |||||||||||||||
Liquid Code | |||||||||||||||
Lisbon | |||||||||||||||
Little Brother | |||||||||||||||
Little Girl | |||||||||||||||
Little Pieces | |||||||||||||||
Little | |||||||||||||||
LixoNuke | |||||||||||||||
Loa Duong | |||||||||||||||
LockJaw | |||||||||||||||
Lockz | |||||||||||||||
LPT-OFF | |||||||||||||||
Lycee | |||||||||||||||
Mabuhay | |||||||||||||||
Macedonia | |||||||||||||||
MacMag MacMag (computer virus) The MacMag virus, also known by various other names, was a computer virus introduced in 1988 by Richard Brandow, who at the time was editor and publisher of MacMag computer magazine in Montréal.-Operation of the virus:... |
Drew, Bradow, Aldus, Peace | 12-1987 | |||||||||||||
Madcow | |||||||||||||||
Magnitogorski 3 | |||||||||||||||
Magnum | |||||||||||||||
Malage | |||||||||||||||
Malaise | |||||||||||||||
Malign | |||||||||||||||
Malmsey Habitat v3.b | |||||||||||||||
Malmsey2 | |||||||||||||||
Malmsey | |||||||||||||||
Maltese Amoeba | |||||||||||||||
Malware Defense | |||||||||||||||
Mannequin | |||||||||||||||
Manola | |||||||||||||||
Manta | |||||||||||||||
Many Fingers | |||||||||||||||
Marauder | |||||||||||||||
Mardi Bros . | |||||||||||||||
MAS Mas Mas or Más may refer to:* Mas , a surnameIn arts:* Más , an album by Spanish singer Alejandro Sanz* "Más", a song by Kinky from their 2002 album Kinky... |
|||||||||||||||
Mark II | |||||||||||||||
Marzia | |||||||||||||||
Math Test | |||||||||||||||
Matura | |||||||||||||||
Mayak | |||||||||||||||
Mazor | Trojan | worm/virus | 2-2008 | infects .exe files | |||||||||||
MBDF | 2-1992 | ||||||||||||||
MCWH1022 | |||||||||||||||
McWhale | |||||||||||||||
MDEF MDEF (computer virus) MDEF was a computer virus affecting Macintosh machines. There are four known strains. The first, MDEF A , was discovered in May 1990. Strains B , C, and D were discovered in August 1990, October 1990, and January 1991, respectively.... |
Garfield, Top Cat | 5-1990 | |||||||||||||
Meditation | |||||||||||||||
MegM | |||||||||||||||
Melissa Melissa (computer worm) The Melissa virus, also known as "Mailissa", "Simpsons", "Kwyjibo", or "Kwejeebo", is a mass-mailing macro virus. As it is not a standalone program, it is not a worm.-History:... |
1999 | part macro virus and part worm | |||||||||||||
Memory Lapse | |||||||||||||||
MG | |||||||||||||||
Michelangelo Michelangelo (computer virus) The Michelangelo virus is a computer virus first discovered in April 1991 in New Zealand. The virus was designed to infect DOS systems, but did not engage the operating system or make any OS calls. Michelangelo, like all boot sector viruses, basically operated at the BIOS level. Each year, the... |
April 1991 | New Zealand New Zealand New Zealand is an island country in the south-western Pacific Ocean comprising two main landmasses and numerous smaller islands. The country is situated some east of Australia across the Tasman Sea, and roughly south of the Pacific island nations of New Caledonia, Fiji, and Tonga... |
Ran March 6 (Michelangelo Michelangelo Michelangelo di Lodovico Buonarroti Simoni , commonly known as Michelangelo, was an Italian Renaissance painter, sculptor, architect, poet, and engineer who exerted an unparalleled influence on the development of Western art... 's birthday) |
||||||||||||
Michelangelo II | |||||||||||||||
Mindless | |||||||||||||||
Mini | |||||||||||||||
Mini-125 | |||||||||||||||
Mini-132 | |||||||||||||||
Mini-195 | |||||||||||||||
Mini-207 | |||||||||||||||
Minimax | |||||||||||||||
Minimite | |||||||||||||||
Minsk-GH | |||||||||||||||
Mir | |||||||||||||||
Mirror | |||||||||||||||
Missouri | |||||||||||||||
Mix2 | |||||||||||||||
Moctezuma | |||||||||||||||
Monika | |||||||||||||||
Monkey | |||||||||||||||
Mono | |||||||||||||||
Monxla | |||||||||||||||
Monxla-B | |||||||||||||||
More | |||||||||||||||
Mosquito | |||||||||||||||
Mozkin | |||||||||||||||
Mr. G | |||||||||||||||
Mr. Vir | |||||||||||||||
MS Antivirus MS Antivirus (malware) MS Antivirus is a scareware rogue anti-virus which claims to remove fake virus infections found on a computer running Microsoft Windows. It attempts to scam the user into purchasing a "full version" of the software.... |
|||||||||||||||
Msk | |||||||||||||||
Mudd | Script | Atomical | |||||||||||||
Mugshot | |||||||||||||||
Mule | |||||||||||||||
Multi | |||||||||||||||
Multi-11 | |||||||||||||||
Multi-2 | |||||||||||||||
Mummy | |||||||||||||||
Munich | |||||||||||||||
Murphy | |||||||||||||||
Music Bug | |||||||||||||||
Mutant | |||||||||||||||
Mutating Interrupt | |||||||||||||||
Mutation Engine | |||||||||||||||
Mystic | |||||||||||||||
NAPC | |||||||||||||||
Navidad Navidad virus W32.Navidad is a mass-mailing worm program or virus designed to spread through email clients such as Microsoft Outlook.It replies to all emails with an attachment using the original subject line.-Source:*... |
|||||||||||||||
Nazi | |||||||||||||||
Natas Natas (computer virus) Natas is a virus written by James Gentile, a then-18-year-old hacker from San Diego, California who went by the alias of "Little Loc" and later "Priest". It is a memory-resident stealth virus that is highly polymorphic. The virus first appeared in Mexico City in May 1992, spread by a consultant... |
Multipartite, stealth, polymorphic | 1994 | "Priest" | ||||||||||||
N-Beta | |||||||||||||||
NCU Li | |||||||||||||||
Necro | |||||||||||||||
Necrophilia | |||||||||||||||
Necrosoft | |||||||||||||||
NED | |||||||||||||||
New Sunday | |||||||||||||||
New Zealand | |||||||||||||||
Vesion 1.0.0.0 | |||||||||||||||
New-1701 | |||||||||||||||
NewBug | |||||||||||||||
Newcom | |||||||||||||||
Next Generation | |||||||||||||||
Neznamy | |||||||||||||||
Night Grawler | |||||||||||||||
Nina | |||||||||||||||
Nines Compliment | |||||||||||||||
Ninja | |||||||||||||||
No Par | |||||||||||||||
No Wednesday | |||||||||||||||
Nobock | |||||||||||||||
NoCopy | |||||||||||||||
No-Int | |||||||||||||||
Nomenclature | |||||||||||||||
NOP | |||||||||||||||
NoStart | |||||||||||||||
Not-586 | |||||||||||||||
Nov17 | |||||||||||||||
NPox 2.0 | |||||||||||||||
NPox 2.1 | |||||||||||||||
Null | |||||||||||||||
Number 6 | |||||||||||||||
Number of The Beast | |||||||||||||||
numgame.vbs | |||||||||||||||
nVIR NVIR (computer virus) nVIR is an obsolete computer virus which can replicate on Macintosh computers running any System version from 4.1 to OS 8. The source code to the original nVIR has been made widely available, and so numerous variants have arisen... |
1987 | ||||||||||||||
Nygus-KL | |||||||||||||||
Nutty Mouse | Malfunctions the mouse while putting itself to the system. | ||||||||||||||
Offspring | |||||||||||||||
Off Stealth | |||||||||||||||
Ohio | |||||||||||||||
Omega | |||||||||||||||
Omt | |||||||||||||||
OneHalf OneHalf (computer virus) OneHalf is a DOS-based polymorphic computer virus . It is also known as Slovak Bomber, Freelove or Explosion-II. It infects master boot record of the hard disk, COM files and executable files. It will not infect files that have SCAN, CLEAN, FINDVIRU, GUARD, NOD, VSAFE, MSAV or CHKDSK in the name... |
|||||||||||||||
Ontario.1024 Ontario.1024 (computer virus) Ontario.1024 is a computer virus, discovered in October 1991, over a year after the isolation of the first Ontario virus, Ontario.512. Relative to Ontario.512, most additions involve making the virus harder to detect.-Infection:... |
|||||||||||||||
Ontario.2048 Ontario.2048 (computer virus) Ontario.2048 is a computer virus, discovered in September 1992. It is the third and final known variant of the Ontario family, both chronologically and in complexity... |
|||||||||||||||
Ontario Ontario (computer virus) Ontario.512 is a computer virus, discovered in July 1990. It is named after its point of isolation, the Canadian province of Ontario. Because Ontario.1024 was also discovered in Ontario, it is likely that both viruses originate from within the province... |
1990 | ||||||||||||||
Oropax | |||||||||||||||
Otto-415 | |||||||||||||||
Over4032 | |||||||||||||||
Oxana | |||||||||||||||
P1 | |||||||||||||||
P-45 | |||||||||||||||
P529 | |||||||||||||||
PA-5792 | |||||||||||||||
Page B | |||||||||||||||
Page | |||||||||||||||
Parite | |||||||||||||||
Parity B | |||||||||||||||
Payday | |||||||||||||||
PC Cyborg | |||||||||||||||
PC Flu | |||||||||||||||
PCBB11 | |||||||||||||||
PCBB3072 | |||||||||||||||
PCBB5B | |||||||||||||||
PCV | |||||||||||||||
PE2 | |||||||||||||||
Peach | |||||||||||||||
Peek | |||||||||||||||
Pegg | |||||||||||||||
Peking | |||||||||||||||
Penis Size | |||||||||||||||
Pentagon | |||||||||||||||
Penza | |||||||||||||||
Perfume | |||||||||||||||
Phantom | |||||||||||||||
Phoenix | |||||||||||||||
PI | |||||||||||||||
Pig | |||||||||||||||
Pikachu virus Pikachu virus The Pikachu virus is believed to be the first computer virus targeted towards children. It contains the character "Pikachu" from the Pokémon series, and is in the form of an e-mail titled "Pikachu " with the message: "Pikachu is your friend."... |
|||||||||||||||
Ping-pong Ping-Pong virus The Ping-Pong virus is a boot sector virus discovered on March 1, 1988 at the University of Turin in Italy... |
Boot, Bouncing Ball, Bouncing Dot, Italian, Italian-A, VeraCruz | Boot sector virus | Harmless to most computers | ||||||||||||
Pizelun | |||||||||||||||
PL | |||||||||||||||
Platinum | |||||||||||||||
PLO | |||||||||||||||
Popular | |||||||||||||||
Porridge | |||||||||||||||
Poshkill | |||||||||||||||
Possessed | |||||||||||||||
Predator Dropper | |||||||||||||||
Prabhagaran | |||||||||||||||
Predator | |||||||||||||||
Pregnant | |||||||||||||||
Prime Evil B | |||||||||||||||
Prime | |||||||||||||||
Print Monster | |||||||||||||||
Print Screen | |||||||||||||||
Prism | |||||||||||||||
Prob-734 | |||||||||||||||
Problem | |||||||||||||||
Proto-T | |||||||||||||||
Prudents | |||||||||||||||
Quamo | |||||||||||||||
Rabbit | Infects the operational memory. It's one of the fastest copying viruses and makes the computer totally unuseful. | ||||||||||||||
Random | |||||||||||||||
Rattle | |||||||||||||||
Raubkopi | |||||||||||||||
RavMonE.exe RavMonE.exe RavMonE, known more correctly as RJump, is a Trojan that opens a backdoor on computers running Microsoft Windows. Once a computer is infected, the virus allows unauthorized users to gain access to the computer's contents... |
RJump.A, Rajump, Jisx | Worm | 2006-06-20 | Once distributed in Apple iPods IPod iPod is a line of portable media players created and marketed by Apple Inc. The product line-up currently consists of the hard drive-based iPod Classic, the touchscreen iPod Touch, the compact iPod Nano, and the ultra-compact iPod Shuffle... , but a Windows-only virus |
|||||||||||
Reaper | |||||||||||||||
Reader s | A malware that infects a computer and damages system core files, sometimes making BSOD BSoD BSoD is an initialism. It may stand for:* Blue Screen of Death* Black Screen of Death... and disabling anti-viruses. This is a high-risk computer virus. |
||||||||||||||
Rebo-715 | |||||||||||||||
Red Cross | |||||||||||||||
Redemption | |||||||||||||||
Red Team | |||||||||||||||
RedX | |||||||||||||||
Reklama | |||||||||||||||
Relzfu | |||||||||||||||
Replicator | |||||||||||||||
Reset | |||||||||||||||
Revelation | |||||||||||||||
Rigel | |||||||||||||||
Romanian | |||||||||||||||
Russian Tiny | |||||||||||||||
S-847 | Trojan horse | ||||||||||||||
Sabath | vindu | ||||||||||||||
Sacramento | |||||||||||||||
Saddam | |||||||||||||||
Sadist | |||||||||||||||
Sair | |||||||||||||||
Sakora | |||||||||||||||
San Diego | |||||||||||||||
Sandra | |||||||||||||||
Sandwich | |||||||||||||||
Saratoga | |||||||||||||||
Satan | |||||||||||||||
Saturday 14th | |||||||||||||||
Saturday | |||||||||||||||
Sayha Waptpu | |||||||||||||||
SBC | |||||||||||||||
SCA SCA (computer virus) The SCA virus is the first computer virus created for the Commodore Amiga and one of the first to gain public notoriety. It appeared in November 1987. The SCA virus is a boot sector virus... |
Amiga, Boot sector virus | November 1987 | Switzerland Switzerland Switzerland name of one of the Swiss cantons. ; ; ; or ), in its full name the Swiss Confederation , is a federal republic consisting of 26 cantons, with Bern as the seat of the federal authorities. The country is situated in Western Europe,Or Central Europe depending on the definition.... |
Swiss Cracking Association | Puts a message on screen. Harmless except it might destroy a legitimate non-standard boot block. | ||||||||||
Schrunch | |||||||||||||||
Scores Scores (computer virus) Scores was a computer virus affecting Macintosh machines. It was first discovered in Spring 1988. It was written by a disgruntled programmer and specifically attacks two applications that were under development at his former company. These programs were never released to the public.Scores infects... |
Eric, Vult, NASA, San Jose Flu | Spring 1988 | Designed to attack two specific applications which were never released. | ||||||||||||
Scott's Valley Scott's Valley (computer virus) is a computer virus, a member of the Slow virus family and distantly related to the Jerusalem virus family. It was discovered in September 1990 in Scotts Valley, California.... |
|||||||||||||||
Scream 2 | |||||||||||||||
Screaming Fist | |||||||||||||||
Scribble | |||||||||||||||
Scroll | |||||||||||||||
SCT | |||||||||||||||
Scythe2D | |||||||||||||||
Sdir | |||||||||||||||
Secrets | |||||||||||||||
Selectronics | |||||||||||||||
Semtex | |||||||||||||||
Sentinel | |||||||||||||||
Sentinel-X | |||||||||||||||
Seoul | |||||||||||||||
Serena | |||||||||||||||
Sergeant | |||||||||||||||
SevenDust SevenDust (computer virus) SevenDust was a computer virus that affected computers running certain versions of Mac OS. It was discovered in 1998. It was originally referred to as 666.- External links :*, by Symantec*, by McAfee*, by McAfee... |
|||||||||||||||
Sh | |||||||||||||||
Shadow | |||||||||||||||
Shake | |||||||||||||||
Shaman | |||||||||||||||
Shanghai | |||||||||||||||
Shankar's Virus Shankar's Virus Shankar's Virus is a Polymorphic Computer Virus that infects Microsoft Word documents and templates. It was discovered June 3, 1999. It was created by Sam Rogers.-Effects:... |
W97M.Marker.o | Polymorphic Virus | Infects Word Documents | ||||||||||||
Shatin | |||||||||||||||
Shiny Happy | |||||||||||||||
Shock Therapy | |||||||||||||||
Shoerec Shoerec (computer virus) Win9x.Shoerec is a Win32 encrypted parasitic computer virus. It is a direct action virus.- Effects :The virus activates its payload after three to four months from the first infection... |
|||||||||||||||
Show Game | |||||||||||||||
Silence | |||||||||||||||
Silent Banker | |||||||||||||||
Silly Willy | |||||||||||||||
Silver Dollar | |||||||||||||||
Silver3b | |||||||||||||||
Simile Simile (computer virus) Win32/Simile is a metamorphic computer virus written in assembly language for Microsoft Windows. The virus was released in the most recent version in early March 2002. It was written by the virus writer Mental Driller... |
The Mental Driller | ||||||||||||||
Simple 1992 | |||||||||||||||
Simulati | |||||||||||||||
Sis | |||||||||||||||
Sk | |||||||||||||||
Sk1 | |||||||||||||||
Skeleton | |||||||||||||||
Skew 469 | |||||||||||||||
Skism 808 | |||||||||||||||
Skism | |||||||||||||||
SkyTap Gen | |||||||||||||||
Slant | |||||||||||||||
Slayer | |||||||||||||||
Slovak | |||||||||||||||
Slow | |||||||||||||||
Sma-108a | |||||||||||||||
Small 129 | |||||||||||||||
Small 132B | |||||||||||||||
Small 146 | |||||||||||||||
Small 157 | |||||||||||||||
Small 178 | |||||||||||||||
Small 185 | |||||||||||||||
Small 187 | |||||||||||||||
Small | |||||||||||||||
Small-38 | |||||||||||||||
Smash | |||||||||||||||
Smily | |||||||||||||||
Smithsonian | |||||||||||||||
Solano | Soup Delete (computer virus) Simple format C drive | ||||||||||||||
Something | |||||||||||||||
Snow White and the Seven Dwarfs | |||||||||||||||
Soupy | |||||||||||||||
Sov | |||||||||||||||
Soyun | |||||||||||||||
Spanish April Fool | |||||||||||||||
Spanish | |||||||||||||||
Spanz | |||||||||||||||
Spar | |||||||||||||||
Sparta | |||||||||||||||
Sp0rk3h | |||||||||||||||
Spyer | |||||||||||||||
SQR | |||||||||||||||
Squawk | |||||||||||||||
Squeaker | |||||||||||||||
Squisher | |||||||||||||||
SRE | |||||||||||||||
Staf | |||||||||||||||
Stahl Platte | |||||||||||||||
Stealth C | Boot Sector Virus | Stealth_C causes the total system and available free memory, to decrease by 4,096 bytes. | |||||||||||||
Stoned Stoned (computer virus) Stoned is the name of a boot sector computer virus created in 1987.Notable for being an early boot sector virus, it was thought to have been written by a university student in Wellington, New Zealand - and by 1989 it had spread widely in New Zealand and Australia... |
|||||||||||||||
Striker | |||||||||||||||
Stupid | |||||||||||||||
Subliminal | |||||||||||||||
SubZero | |||||||||||||||
Suicide | |||||||||||||||
Sunday Sunday (computer virus) Sunday is a computer virus, a member of the Jerusalem virus family. It was discovered in November 1989 after a number of simultaneous reports from Seattle, Washington, United States, and surrounding areas. Several other Seattle outbreaks, including AirCop, were later traced to... |
|||||||||||||||
Sunday-2 | |||||||||||||||
Sundevil | |||||||||||||||
Suriv 402 | |||||||||||||||
Suriv A | |||||||||||||||
Suriv B | |||||||||||||||
Surrender | |||||||||||||||
Susan | |||||||||||||||
SVC 5.0/6.0 | |||||||||||||||
Sverdlov | |||||||||||||||
SVir | |||||||||||||||
Swap Boot | |||||||||||||||
Swen - "News" spelled backwards | |||||||||||||||
Swiss 143 | |||||||||||||||
Swiss Phoenix | |||||||||||||||
SX | |||||||||||||||
Sylvia | |||||||||||||||
Sys | |||||||||||||||
Syslock/3551 | |||||||||||||||
saplad, roberto | |||||||||||||||
T-1 | |||||||||||||||
T4 | 6-1992 | Included in GoMoku 2.0 and 2.1. | |||||||||||||
T297 | |||||||||||||||
Tabulero 2 | |||||||||||||||
Taiwan | |||||||||||||||
Taiwan3 | |||||||||||||||
Taiwan4 | |||||||||||||||
Taocheng | |||||||||||||||
Techno Techno (computer virus) The Techno.com virus, more commonly known as the "Techno Virus", is a computer virus that infects Windows DOS. It infects .COM files including COMMAND.COM. The Virus is loaded into the memory by executing an infected program and then affects the computer's runtime and corrupts program or overlay... |
|||||||||||||||
Tecla | |||||||||||||||
Telecom Boot | |||||||||||||||
Telecom File | |||||||||||||||
Telekom | |||||||||||||||
Teletype | |||||||||||||||
Teletype-2 | |||||||||||||||
Tentacle | |||||||||||||||
Tequila | |||||||||||||||
Terror | |||||||||||||||
Tester | |||||||||||||||
Tigraa | Poland Poland Poland , officially the Republic of Poland , is a country in Central Europe bordered by Germany to the west; the Czech Republic and Slovakia to the south; Ukraine, Belarus and Lithuania to the east; and the Baltic Sea and Kaliningrad Oblast, a Russian exclave, to the north... |
Piotr Bania aka Lord Yup aka dis69, 29A group member | Peter Ferrie's analysis | ||||||||||||
TMTM | |||||||||||||||
TP | |||||||||||||||
Tremor2 | |||||||||||||||
TridenT | |||||||||||||||
Triple Shot | |||||||||||||||
Troi Two | |||||||||||||||
Tschantches | |||||||||||||||
T-series | |||||||||||||||
TU-482 | |||||||||||||||
Tuesday | |||||||||||||||
Tula | |||||||||||||||
Tumen V0.5 | |||||||||||||||
Tumen V2.0 | |||||||||||||||
Tumen | |||||||||||||||
Turbo | |||||||||||||||
Turkey | |||||||||||||||
Tver | |||||||||||||||
Twin Peaks | |||||||||||||||
Twin-351 | |||||||||||||||
twoneight | |||||||||||||||
Typo Boot | |||||||||||||||
Ucender | |||||||||||||||
Ugur | |||||||||||||||
Undressed | |||||||||||||||
Unk | |||||||||||||||
Uriel | |||||||||||||||
Uruk 300 | |||||||||||||||
Uruk 361 | |||||||||||||||
Uruk-Hai | Unknown | ||||||||||||||
USSR | |||||||||||||||
USSR 1049 | |||||||||||||||
USSR 2144 | windows extract | ||||||||||||||
USSR 256 | |||||||||||||||
USSR 257 | |||||||||||||||
USSR 3103 | |||||||||||||||
USSR 311 | |||||||||||||||
USSR 394 | |||||||||||||||
USSR-394 | |||||||||||||||
USSR 492 | |||||||||||||||
USSR 516 | |||||||||||||||
USSR 600 | |||||||||||||||
USSR 696 | |||||||||||||||
USSR 707 | |||||||||||||||
USSR 711 | |||||||||||||||
USSR 830 | |||||||||||||||
USSR 948 | |||||||||||||||
V1 0 | |||||||||||||||
V1 1 | |||||||||||||||
V1028 | |||||||||||||||
V125 | |||||||||||||||
V1463 | |||||||||||||||
V163 | |||||||||||||||
V1-Not | |||||||||||||||
V2 0 | |||||||||||||||
V2000 | |||||||||||||||
V2100 | |||||||||||||||
V270X | |||||||||||||||
V299 | |||||||||||||||
V2P2 | |||||||||||||||
V2P6 | |||||||||||||||
V-351 | |||||||||||||||
V-388 | |||||||||||||||
V400 | |||||||||||||||
V483 | |||||||||||||||
V5 | |||||||||||||||
V600 | |||||||||||||||
V800 | |||||||||||||||
V801 | |||||||||||||||
V82 | |||||||||||||||
V914 | |||||||||||||||
V961 | |||||||||||||||
VA | |||||||||||||||
Vacsina | |||||||||||||||
VCL | |||||||||||||||
VCL-HEEvE | |||||||||||||||
Vcomm | |||||||||||||||
VCS | |||||||||||||||
VDV-853 | |||||||||||||||
VHP | |||||||||||||||
VHP-2 | |||||||||||||||
V-Label | |||||||||||||||
VM | |||||||||||||||
VP | |||||||||||||||
VTS | |||||||||||||||
VVF-34 | |||||||||||||||
Venge-E | |||||||||||||||
Vera Cruz | |||||||||||||||
Victor | |||||||||||||||
Vienna/648 | |||||||||||||||
Vietnamese | |||||||||||||||
Violator | |||||||||||||||
Viper | |||||||||||||||
Viperizer B | |||||||||||||||
Viral Messiah | |||||||||||||||
Virdem | |||||||||||||||
Virflop | |||||||||||||||
virus-101 | |||||||||||||||
virus-90 | |||||||||||||||
Voco | |||||||||||||||
Vootie | |||||||||||||||
Voronezh | |||||||||||||||
Vote/Vote1000 | |||||||||||||||
Vriest | |||||||||||||||
W13 | |||||||||||||||
WAVE | |||||||||||||||
Warbiest Terminator | 2008 | For Windows XP Only. | |||||||||||||
Warbiest Terminator v.2.0 | 2009 | For Windows XP and Vista. | |||||||||||||
WWT | |||||||||||||||
Walkabout | |||||||||||||||
Walker | |||||||||||||||
Warez | |||||||||||||||
Warrior 2 | |||||||||||||||
Warrior | |||||||||||||||
Wazoo | |||||||||||||||
WDEF | 12-1989 | Affects only Macintosh System 6. | |||||||||||||
Weak | |||||||||||||||
Whale Whale (computer virus) The Whale virus is a computer virus discovered on July 1, 1990. The file size, at 9,216 bytes, was for its time the largest virus ever discovered. It was written by German programmer R. Horner... |
|||||||||||||||
Wharps | |||||||||||||||
WhoCares | |||||||||||||||
Why win | |||||||||||||||
Wilbur 3 | |||||||||||||||
Wild trojan Wild Thing A |
|||||||||||||||
Willistrover III | |||||||||||||||
Willow | |||||||||||||||
Willow 2 | |||||||||||||||
WinAble | 2004 | Windows systems only. | Disrupts system performance by displaying pop-ups. Starts only when computer is on, and slows internet performance as well. | ||||||||||||
Windmill | |||||||||||||||
WinNuke | |||||||||||||||
Winvir | |||||||||||||||
Wisconsin | |||||||||||||||
Wizard 3.0 | |||||||||||||||
Wolfman | |||||||||||||||
Wonder | |||||||||||||||
Word Atom Macro | |||||||||||||||
Word Color Macro | |||||||||||||||
Word Concept Macro | |||||||||||||||
Word Hot Macro | |||||||||||||||
Wordswap | |||||||||||||||
World Peace | w32.myzor.FK@yf | ||||||||||||||
Wsnpoem | |||||||||||||||
X-1 | |||||||||||||||
X-2 | |||||||||||||||
X-3A | |||||||||||||||
X-3B | |||||||||||||||
X77 | |||||||||||||||
Xabaras | |||||||||||||||
Xpeh | |||||||||||||||
XTAC | |||||||||||||||
Xuxa | |||||||||||||||
Yale | |||||||||||||||
Yan2505a | |||||||||||||||
Yankee | |||||||||||||||
Yankee - 2 | |||||||||||||||
Yap | |||||||||||||||
Year 1993 | |||||||||||||||
Yerg | |||||||||||||||
Youth | |||||||||||||||
Yukon | |||||||||||||||
Z10 | |||||||||||||||
ZK900 | |||||||||||||||
ZRK | |||||||||||||||
ZU1 | |||||||||||||||
Zak2 | |||||||||||||||
Zaragosa | |||||||||||||||
Zeppelin | |||||||||||||||
Zero Bug | |||||||||||||||
Zero Time | |||||||||||||||
ZeroHunt | |||||||||||||||
ZMist ZMist (computer virus) Zmist is a metamorphic computer virus created by the Russian virus writer known as Zombie. It was the first virus to use a technique known as "code integration"... |
ZMistfall, Zombie.Mistfall | Z0mbie | |||||||||||||
Zoda | |||||||||||||||
Zohra |
Related lists
- List of computer worms
- Timeline of notable computer viruses and wormsTimeline of notable computer viruses and wormsThis is a timeline of noteworthy computer viruses, worms and Trojan horses.- 1966 :* The work of John von Neumann on the "Theory of self-reproducing automata" is published...
- Palm OS virusesPalm OS VirusesWhile some viruses do exist for Palm OS based devices, very few have ever been designed. Typically, mobile devices are difficult for virus writers to target, since their simplicity provides fewer security holes to target compared to a desktop.-Viruses for Palm OS:...
Other types of malware
- AdwareAdwareAdware, or advertising-supported software, is any software package which automatically plays, displays, or downloads advertisements to a computer. These advertisements can be in the form of a pop-up. They may also be in the user interface of the software or on a screen presented to the user during...
- MalwareMalwareMalware, short for malicious software, consists of programming that is designed to disrupt or deny operation, gather information that leads to loss of privacy or exploitation, or gain unauthorized access to system resources, or that otherwise exhibits abusive behavior...
- SpamSpam (electronic)Spam is the use of electronic messaging systems to send unsolicited bulk messages indiscriminately...
- SpywareSpywareSpyware is a type of malware that can be installed on computers, and which collects small pieces of information about users without their knowledge. The presence of spyware is typically hidden from the user, and can be difficult to detect. Typically, spyware is secretly installed on the user's...
- Computer WormsComputer wormA computer worm is a self-replicating malware computer program, which uses a computer network to send copies of itself to other nodes and it may do so without any user intervention. This is due to security shortcomings on the target computer. Unlike a computer virus, it does not need to attach...
- Trojan horseTrojan horse (computing)A Trojan horse, or Trojan, is software that appears to perform a desirable function for the user prior to run or install, but steals information or harms the system. The term is derived from the Trojan Horse story in Greek mythology.-Malware:A destructive program that masquerades as a benign...
Notable instances
- Storm WormStorm WormThe Storm Worm is a backdoor Trojan horse that affects computers using Microsoft operating systems, discovered on January 17, 2007...
- A WindowsMicrosoft WindowsMicrosoft Windows is a series of operating systems produced by Microsoft.Microsoft introduced an operating environment named Windows on November 20, 1985 as an add-on to MS-DOS in response to the growing interest in graphical user interfaces . Microsoft Windows came to dominate the world's personal...
trojan horse that forms the Storm botnetStorm botnetThe Storm botnet or Storm worm botnet is a remotely controlled network of "zombie" computers that have been linked by the Storm Worm, a Trojan horse spread through e-mail spam... - ILOVEYOUILOVEYOUILOVEYOU, also known as Love Letter, is a computer worm that successfully attacked tens of millions of computers in 2000 when it was sent as an attachment to a user with the text "ILOVEYOU" in the subject line. The worm arrived e-mail on and after May 4, 2000 with the simple subject of "ILOVEYOU"...
- ConfickerConfickerConficker, also known as Downup, Downadup and Kido, is a computer worm targeting the Microsoft Windows operating system that was first detected in November 2008...
- Creeper virusCreeper virusCreeper was an experimental self-replicating program written by Bob Thomas at BBN in 1971. It was designed not to damage but to demonstrate a mobile application. It is generally accepted to be the first computer worm, although the notion of a "computer virus" did not exist in the 1970s. Creeper...
- The first malware that ran on ARPANET - Leap virusLeap virusThe Leap or Oompa-Loompa computer virus is an application-infecting, LAN-spreading worm for Mac OS X discovered in February 2006.Leap cannot spread over the Internet, and can only spread over a local area network reachable using the Bonjour protocol...
- Mac OS X virus