You are viewing our Forum Archives. To view or take place in current topics click here.
Fully Explained VIRUSES YOU CAN GET
Posted:

Fully Explained VIRUSES YOU CAN GETPosted:

AnneFrank
  • TTG Senior
Status: Offline
Joined: Sep 07, 201013Year Member
Posts: 1,619
Reputation Power: 65
Status: Offline
Joined: Sep 07, 201013Year Member
Posts: 1,619
Reputation Power: 65
Mostly Every Virus Listed Here With descriptions.


Note I have encouraged myself to get a sticky so i am going to list every description for 1080 viruses and a spoil so it looks nice going to take a lot of time but im going to do it.




FIRST OFF YOU MAY NOT KNOW WHAT A COMPUTER VIRUS FULLY IS HERE IT IS

A computer virus is a computer program that can copy itself and infect a computer. The term "virus" is also commonly but erroneously used to refer to other types of malware, including but not limited to adware and spyware programs that do not have the reproductive ability. A true virus can spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive.










1260MS-DOS 1260

is an encrypting, file infecting virus that affects .COM files but does not stay resident in memory.








ABC

ABC discovered in October 1992, is a memory-resident, file-infecting computer virus which infects EXE files and may alter both COM and EXE files. ABC activates on the 13th day of every month.





Actifed

Actifed is a G2-generated encrypted computer virus which infects .COM and .EXE files but not command.com. The virus is loaded into memory by executing an infected program and then affects the computer's runtime operation and corrupts program files.







Ada

Ada is a memory resident (stays in the memory of the computer it infects after the program it infect executes) virus that infects files. The Ada virus mainly targets .COM files, specifically COMMAND.COM.





Agena

AGENA is a memory resident, file infecting computer virus which infects .COM and .EXE files, including command.com. It was discovered in Spain in September, 1992. Upon infection, Agena becomes memory resident at the top of system memory but below the 640K DOS boundary. Once it is memory resident, Agena infects .COM and .EXE files as they are executed. Infected programs will have a file length increase of 723 to 738 bytes with the virus being located at the end of the file. An infected file's date and time in the DOS disk directory listing are not altered. Total system and available free memory, as indicated by the DOS CHKDSK program, will have decreased by 1,296 bytes. Interrupts 20 and 21 are hooked by the virus. It is unknown what Agena may do besides replicate. No text strings are visible within the viral code in infected programs.







AGI-Plan

AGI-Plan was a memory resident DOS file infector first isolated at the Agiplan software company in Germany. Because of CARO standards that dictate that viruses should not be named after companies, AGI-Plan's technical name is Month 4-6. This name also violates CARO standards, but a more minor rule involving syntax. AGI-Plan is related to the Zero Bug virus, as both it and AGI-Plan prepend 1,536 bytes to files they infect.







Ah

Ah (also known as Tuesday and Jerusalem.Ah) is a very buggy computer virus which infects COM files including command.com. Ah is based on the V1024 virus, and originated in Italy in May 1991. When the first program infected with Ah is executed, Ah will install itself memory resident at the top of system memory, but below the 640K DOS boundary. After it is memory resident, Ah will infect .COM programs over 1K in length when they are executed. Infected programs will increase in size by 1,173 bytes, though the file length increase will be hidden if Ah is resident. Their date and time in the DOS directory will appear to be unaltered, though if the program's original time was 12:00a, it will now be blank. The virus will be located at the beginning of infected programs. Total system and available free memory, as indicated by the DOS CHKDSK program, will decrease by 1,216 bytes. Interrupts 08 and 21 will be hooked by the virus. Systems infected with Ah will experience frequent system hangs. These hangs occur when the user attempts to execute a .COM program which is infected with Ah. They may also occur when the virus attempts to infect an uninfected program. System hangs occur so frequently with Ah that the virus is very noticeable. The Ah virus activates on Tuesdays, at which time it will attempt to format the first few tracks of the system hard disk.







AI

AI is a computer virus which infects .EXE files. The virus is loaded into memory by executing an infected program and then effects the computer's runtime operation and corrupts program or overlay files. It does not appear to work with all .EXE files but does infect standard DOS files easily. AI adds meaningless garbage bytes to the end of the host file.







AIDS

AIDS is a computer virus written in Turbo Pascal 3.01a which overwrites com files. AIDS is the first virus known to exploit the MS-DOS "corresponding file" vulnerability. In MS-DOS, if both foo.com and foo.exe exist, then foo.com will always be executed first. Thus, by creating infected com files, AIDS code will always be executed before the intended exe code.





AIDS II

AIDS II is a companion computer virus, which infects COM files. It was first discovered in April 1990, and is a variant of AIDS. Unlike other generic file infectors, AIDS II was the first known virus to employ what could be called a "corresponding file technique" of infection so that the original target EXE file is never changed. The virus takes advantage of the DOS feature where if a file exists in both COM and EXE form, the COM file is executed. When an "infected" file is executed, since a corresponding COM file exists, the COM file containing the viral code is executed. The virus first locates an uninfected EXE file in the current directory and creates a corresponding (or companion) COM file with the viral code. These COM files will always be 8,064 bytes in length with a file date/time of the date/time of infection. After creating the new COM file, the virus then plays a melody and displays the following messag







AirCop

Aircop is a computer virus which infects the Boot Sectors of Floppy Disks. Every eight or so times that it infects a new diskette, it displays the message "RED STATE, Germ offensing --Aircop" (presumably an attempt to say "Condition red, virus attack"). This virus is incapable of infecting hard drives.







Alabama

Alabama is a fairly standard file infector outside its odd behaviour of deciding what files to infect. When an infected file is executed, Alabama goes memory resident. Whenever a .EXE file is executed from this point on, Alabama will search out for another file to infect. This is probably intended to place blame on the file that is being executed instead of the virus itself. Files infected by Alabama increase in size by 1,560 bytes.







Alcon

Alcon is a standard boot sector virus that spreads via floppies. Instead of the MBR, it infects the DBR, making some antivirus programs miss it.







Ambulance

Ambulance is a file infecting computer virus and it does not become memory resident. It will only infect one .COM file in any given directory, but will not infect the first one. This means there must be at least two .COM files in the directory for it to spread.






Anna

The Anna Kournikova computer virus was a computer virus authored by Dutch programmer Jan de Wit on Feb 11, 2001. It was designed to trick email users into opening a mail message purportedly containing a picture of tennis player Anna Kournikova, while actually hiding a malicious program







Anthrax - Boot

On the first time a file infected with Anthrax is executed, the virus writes itself to the hard disk partition table as well as the last few sectors of the hard disk. For this initial infection, it will not infect any files or become memory resident.






AntiCMOS

AntiCMOS.C is a boot virus and very minor variant of the AntiCMOS family. Unlike AntiCMOS and AntiCMOS.B, AntiCMOS.C remained in the field for a very short period of time, and is now considered entirely obsolete.







AntiHeuristica


Most antivirus programs that utilize heuristic analysis perform this function by executing the programming commands of a questionable program or script within a specialized virtual machine, thereby allowing the anti-virus program to internally simulate what would happen if the suspicious file were to be executed while keeping the suspicious code isolated from the real-world machine. It then analyzes the commands as they are performed, monitoring for common viral activities such as replication, file overwrites, and attempts to hide the existence of the suspicious file. If one or more virus-like actions are detected, the suspicious file is flagged as a potential virus, and the user alerted.










ARCV-n

ARCV-n is a term for a large family of viruses authored by the ARCV group through October - November 1992 and polymorphed with the PS-MPC virus generation tool (hence they are very similar). ARCV-n viruses seem to infect COM (perhaps command.com) and/or EXE files rapidly, but do not damage the compromised machine, instead displaying various text messages to the user. An infected file will have the ARCV-n virus appended to the end of it.







Armagedon

The Armageddon virus was a computer virus which a group of Earth cyberterrorists used at some point before 2009 in an attempt to bring down the entire international banking network. They were stopped by the FBI, and afterwards the unusualy potent virus was apparently circulated under security experts. When Mr Smith tried to destroy Earth, Alan Jackson used this virus to erase his memory








B Ugly


The B Ugly Virus is a computer virus which infects .COM files including COMMAND.COM. The virus is loaded into memory by executing an infected program and then affects the computer's runtime operation and corrupts program or overlay files.








B3

The B3 Virus is a computer virus which infects .COM files including COMMAND. COM. The virus is loaded into memory by executing an infected program







BA101

The BA101 Virus is a VCL generated computer virus which infects .COM files including COMMAND.COM. The virus is loaded into memory by executing an infected program and then affects the computer's runtime operation and corrupts program files.







Bad Brains

Brain affects the IBM PC computer by replacing the boot sector of a floppy disk with a copy of the virus. The real boot sector is moved to another sector and marked as bad. Infected disks usually have five kilobytes of bad sectors. The disk label is changed to Brain, and the following text can be seen in infected boot sectors.







Bad Command

The Bad Command Virus is a VCL generated computer virus which infects .COM files including COMMAND. COM by overwriting the original file with itself. The virus is loaded into memory by executing an infected program and then affects the computer's runtime operation and corrupts program files.







Bad Guy

The Bad Guy Virus is a computer virus which infects .COM files including COMMAND.COM. The virus is loaded into memory by executing an infected program and then affects the computer's runtime operation.








Bad Sectors 1.2


The Bad Sectors 1.2 Virus is a computer virus which uses stealth techniques to avoid detection and which infects .COM and .EXE files including COMMAND. COM. The virus is loaded into memory by executing an infected program and then affects the computer's runtime operation and corrupts program or overlay files.








Bad-389

The Bad-389 Virus is a computer virus which infects .COM files including COMMAND.COM. The virus is loaded into memory by executing an infected program and then affects the computer's runtime operation and corrupts program or overlay files.








Bak


The Bak Virus is a computer virus which infects .COM and .EXE files. The virus is loaded into memory by executing an infected program and then affects the computer's runtime operation and corrupts program or overlay files.







Bamestra
Banana
Bandit
Baobab 731
Barcelona
Barrotes 2
Barrotes
Basil
Bat
Beach
Beaches
Beast
BeBe
Beeper
Beer
Benoit
Real PvP Flava
Berlin
Best Wishes
Beta
Beva-32
Beva-33
Beva-96
Beware
BFD
Big 2000
Bit Addict
Black Knight
Blackworm
Black Monday
Blackjack
Black Pegasus
Blaze
Bljec
Blood Lust
Blood Rage
Blood
Blood-2
Bob
Bomber
Boot Killer
Bounce Windows Upon activation, it makes message boxes on screen and the mouse cursor "bounce" up and down. It does no other damage.[1]
Bouncing Dot
Bow
Boys
Brainy
BrO_AcT Windows XP This virus will block most anti-virus programs and disable 'regedit', 'msconfig', and 'task manager'
Brotherhood
Brothers
Browser Enhancement Claims to enhance broweser experience, but when computer is re-booted, displays a fake anti-piracy warning claiming to need to pay to drop charges, but steals your credit card number.
Bryansk
Bubbles 2
Bubbles
Bubonic
Budo
Burger
Burghofer
Busted
Butterfly
Butthole
Byte Bandit Amiga, Bootsector virus January 1988 Swiss Cracking Association
Byte Warrior Amiga, Boot sector virus
(c)Brain Pakistani flu, January 1986 Lahore, Pakistan Basit and Amjad Farooq Alvi Considered to be the first computer virus for the PC
C
Cabanas
Caco-Daemon
CAD Kill
C-A-D
Cannabis
Cansu
Capital
Cara
Caribe
Carioca
CaroEvil
Cartuja
Casc1621
Casc-2
Cascade
Casino
Casper
Casteggio
Caterpillar 1575 MS-DOS
Catman
Catphish
Caz
CB-1530
CD
CDEF 8-1990
CDFL Mac
CD-10
Century
Cerburus
CFSK
Chad
Chang
Chaos
Chaser
Chasna
Chcc
Cheeba
Cheesy
Chemist
Chemnitz
Chernobyl
Chile Mediera
Chinese Blood
Chr-869
Chrisj13
Christmas Tree
Christmas Violator
CIH
Cinderella
Civil Service
Civil War II
Civil War III
Civil War IV
Civil War V
Civil War
CkSum
Clagger
Clint
Clonewar 2
Clonewar
Clust
Coahuila
CODE 1 11-1993 Renames the hard drive to "Trent Saburo" on any October 31st.
CODE 252 4-1992
Code Zero
Coffee Shop
Collor de Mello
Color
Com16850
Com2S
Comdex
Commentator
Commwarrior most common mobile phone virus for nokia mobile phones, transmits via bluetooth wireless.
Como
Compiler2
Comspec
Conficker
Cop-Mpl
Copyright
Copyr-ug
Coruna
Coruna3
Cossiga No Grazie
Cossiga
Costeau
CPXK
Cracker Jack
Cracky
Crash
Crasher
Crazy Eddie
Crazy Imp
CrazyI B
CRF
Cross Over
Crystal
CSL
CV4
D1
DKid
Dada
Damage
Danny
Dark Apocalypse
Dark Avenger
Dark End
DataLock
Datos
Davis
D-Day
Death
Deathead
Deceide 2
Dedicated
Deicide
Demolition
Demon
Den Zuk
Dennis
Deranged
Diablo
Dial
DigiDeliver
Dima
Disk Killer
Dismember
Dodgy 1024
Dodo 2456
Dodo
Doodle
Dorn
Dose-A
Druid
Dudley
Dutch Tiny
Dutch Scare Worm This virus deletes all users, all data, and s the worst virus yet. Earthday
Eclypse
ECV
Ed
Edcl
EDV
Egg Egg is a computer virus that affects the COM. and EXE files.
Eggdrop
Ein Volk
Einstein
Ekoterror
E1ectr0n
Eliza DOS Dec 1991
Elk Cloner Apple II Rich Skrenta The first virus observed "in the wild"
Elvirus
Elvira
EMF 625
EMF
Emmie
EMO
Empire
End-of
Enemy
Enigma
Enola
Error 412 virus
Error
Essex
Estepa
ETC
Europe-92
Evil Genius
Exper416
Explode
Exploration
Exterminator
Eziarch
Family Q
Farcus
Father Christmas
Faust
Fax Free
Fear
Feist
Fellowship
Fich
Fich897
Filedate
Filename
Filler
Fingers
Finn-357
Fish 1100
Fish 2
Fish 2420
Fish Boot
Fish
Flagyll
Flash
Flex
Flip
Flower
Flu-2
Fly11
Fone Sex
Fotomoto
Forger2
Form
Fortran
Frajer
Francois
Frankie Macintosh emulator Targeted pirated versions of the Aladdin emulator.
Fratricide
Free
Frere Jacques
Fri13-nz
Friday 13th COM
Friday 13th
Friday the 13th - Version A
Frodo Soft
Frodo-458
Frogs
Fu Manchu
Fune
Fun.exe virus w32.Assarm Windows XP 6-23-2008
Fvhs-a
Fvhs-B
F-Word
paul eduard
G
Galicia
Ganeu
Gedza
Geek
Gergana
Germ
Get Password 1
Ghost Boot
Ghost COM
Ghost Dos-62
Gijon
Gliss
Goblin
Gomb
Gorlovka
Gotch 4
Gotcha 1
Gotcha 2
Gotcha 3
Gotcha 9e
Gotcha Created from original identity 'Gotchix' Spread on Facebook through 'add friend' linkage
Got-you
Grapje
Graveyard
Graybird (Backdoor Graybird, Backdoor Graybird P)
Green
Grog31
Groovy
Growing Block
Grue
Grunt
Grunt-3
Guppy
H-2
H-457
HA
Happy virus
Hack-83
HACKER
Hacktic
Hafen
Haifa
Hallo
Halloechen
Halloween
Hammer
Happy N. Y.
Happy
Hara
Harakiri
Hare MS-DOS
Windows 95, Windows 98 August 1996 Unknown Famous for press coverage which blew its destructiveness out of proportion
Harm
Hary
Hastings
Hate
HBT
Heevahava
Hello
Hellween 1182
Hellween
Here
Hero
Hero-394
Hi
Hidrag
Highland
Hiperion
Hitchcock
Hitler
Holland Girl
Holo/Holocaust
Holiday
Horror
Horse Boot
Horse
HS
Huge
Hungarian
Hybrid
Hymn
IB Demonic
I-B
Ice 9
ICE9-159
ICE9-199
ICE9-224
Ice9-250
Icelandic II
Icelandic
Icelandic-3
IDF
Idle
Ieronim
IKV528
Ill
ILOVEYOU
Incom
Infinity
INIT 17 4-1993
INIT 29 1988
INIT 1984 13-3-1992 Malicious, triggered on Friday the 13th.
INIT 9403 SysX 3-1994 Very destructive, destroys all data. Found only on Italian systems so far.
INIT-M 4-1993 Malicious, triggered on Friday the 13th.
Inofensivo
Inrud-B
Internal
Intruder
Invader
Invisible Man
Invitation
Invol
IOU
Iranian
Iraqi Warrior
IT
IVP EX1
IVP EX2
IVP
Japan
Jeefo
Jeff
Jerk
Jeru-1663
Jerusalem
Joanna
Jobbie
John
JoJo
Joke
Joker
Joker-1602
Joker3
Jonathan (malware)
Joshi
Joshua
July 13th
July 26
June 16th
June1530
Junky
Justice
Kamasutra
Kak worm
killerjeff.exe
L1 Infects .COM files. Affects the computers runtime operation and corrupts data files.
Label h1n1
Lamer Exterminator Amiga, Boot sector virus October 1989 Germany Random encryption, fills random sector with "LAMER"
Lanc
Lanc5476
Lanc5882
Larry
Lazy
LCV
Leapfrog
Leech
Lehigh
Leper AOD
Leprosy Infects COM.And EXE. Files after its visual payload on DOS
Les
Lib1172
Liberty
Liquid Code - 2
Liquid Code
Lisbon
Little Brother
Little Girl
Little Pieces
Little
LixoNuke
Loa Duong
LockJaw
Lockz
LPT-OFF
Lycee
Mabuhay
Macedonia
MacMag Drew, Bradow, Aldus, Peace 12-1987
Madcow
Magnitogorski 3
Magnum
Malage
Malaise
Malign
Malmsey Habitat v3.b
Malmsey2
Malmsey
Maltese Amoeba
Malware Defense
Mannequin
Manola
Manta
Many Fingers
Marauder
Mardi Bros .
MAS
Mark II
Marzia
Math Test
Matura
Mayak
Mazor Trojan worm/virus 2-2008 infects .exe files
MBDF 2-1992
MCWH1022
McWhale
MDEF Garfield, Top Cat 5-1990
Meditation
MegM
Melissa 1999 part macro virus and part worm
Memory Lapse
MG
Michelangelo April 1991 New Zealand Ran March 6 (Michelangelo's birthday)
Michelangelo II
Mindless
Mini
Mini-125
Mini-132
Mini-195
Mini-207
Minimax
Minimite
Minsk-GH
Mir
Mirror
Missouri
Mix2
Moctezuma
Monika
Monkey
Mono
Monxla
Monxla-B
More
Mosquito
Mozkin
Mr. G
Mr. Vir
MS Antivirus
Msk
Mudd Script Atomical
Mugshot
Mule
Multi
Multi-11
Multi-2
Mummy
Munich
Murphy
Music Bug
Mutant
Mutating Interrupt
Mutation Engine
Mystic
NAPC
Navidad
Nazi
Natas Multipartite, stealth, polymorphic 1994 "Priest"
N-Beta
NCU Li
Necro
Necrophilia
Necrosoft
NED
New Sunday
New Zealand
Vesion 1.0.0.0
New-1701
NewBug
Newcom
Next Generation
Neznamy
Night Grawler
Nina
Nines Compliment
Ninja
No Par
No Wednesday
Nobock
NoCopy
No-Int
Nomenclature
NOP
Not-586
Nov17
NPox 2.0
NPox 2.1
Null
Number 6
Number of The Beast
nVIR 1987
Nygus-KL
Nutty Mouse Malfunctions the mouse while putting itself to the system.
Offspring
Off Stealth
Ohio
Omega
Omt
OneHalf
Ontario.1024
Ontario.2048
Ontario 1990
Oropax
Otto-415
Over4032
Oxana
P1
P-45
P529
PA-5792
Page B
Page
Parite
Parity B
Payday
PC Cyborg
PC Flu
PCBB11
PCBB3072
PCBB5B
PCV
PE2
Peach
Peek
Pegg
Peking
Penis Size
Pentagon
Penza
Perfume
Phantom
Phoenix
PI
Pig
Pikachu virus
Ping-pong Boot, Bouncing Ball, Bouncing Dot, Italian, Italian-A, VeraCruz Boot sector virus Harmless to most computers
Pizelun
PL
Platinum
PLO
Popular
Porridge
Poshkill
Possessed
Predator Dropper
Prabhagaran
Predator
Pregnant
Prime Evil B
Prime
Print Monster
Print Screen
Prism
Prob-734
Problem
Proto-T
Prudents
Quamo
Rabbit Infects the operational memory. It's one of the fastest copying viruses and makes the computer totally unuseful.
Random
Rattle
Raubkopi
RavMonE.exe RJump.A, Rajump, Jisx Worm 2006-06-20 Once distributed in Apple iPods, but a Windows-only virus
Reaper
Reader_s A malware that infects a computer and damages system core files, sometimes making BSOD and disabling anti-viruses. This is a high-risk computer virus.
Rebo-715
Red Cross
Red Team
RedX
Reklama
Relzfu
Replicator
Reset
Revelation
Romanian
Russian Tiny
S-847 Trojan horse
Sabath vindu
Sacramento
Saddam
Sadist
Sair
Sakora
San Diego
Sandra
Sandwich
Saratoga
Satan
Saturday 14th
Saturday
Sayha Waptpu
SBC
SCA Amiga, Boot sector virus November 1987 Switzerland Swiss Cracking Association Puts a message on screen. Harmless except it might destroy a legitimate non-standard boot block.
Schrunch
Scores Eric, Vult, NASA, San Jose Flu Spring 1988 Designed to attack two specific applications which were never released.
Scott's Valley
Scream 2
Screaming Fist
Scribble
Scroll
SCT
Scythe2D
Sdir
Secrets
Selectronics
Semtex
Sentinel
Sentinel-X
Seoul
Serena
Sergeant
SevenDust
Sh
Shadow
Shake
Shaman
Shanghai
Shankar's Virus W97M.Marker.o Polymorphic Virus Infects Word Documents
Shatin
Shiny Happy
Shock Therapy
Shoerec
Show Game
Silence
Silent Banker
Silly Willy
Silver Dollar
Silver3b
Simile The Mental Driller
Simple 1992
Simulati
Sis
Sk
Sk1
Skeleton
Skew 469
Skism 808
Skism
SkyTap Gen
Slant
Slayer
Slovak
Slow
Sma-108a
Small 129
Small 132B
Small 146
Small 157
Small 178
Small 185
Small 187
Small
Small-38
Smily
Smithsonian
Solano Soup Delete (computer virus) Simple format C drive
Something
Snow White and the Seven Dwarfs
Soupy
Sov
Soyun
Spanish April Fool
Spanish
Spanz
Spar
Sparta
Sp0rk3h
Spyer
SQR
Squawk
Squeaker
Squisher
SRE
Staf
Stahl Platte
Stealth_C Boot Sector Virus Stealth_C causes the total system and available free memory, to decrease by 4,096 bytes.
Stoned
Striker
Stupid
Subliminal
SubZero
Suicide
Sunday
Sunday-2
Sundevil
Suriv 402
Suriv A
Suriv B
Surrender
Susan
SVC 5.0/6.0
Sverdlov
SVir
Swap Boot
Swen - "News" spelled backwards
Swiss 143
Swiss Phoenix
SX
Sylvia
Sys
Syslock/3551
saplad, roberto
T-1
T4 6-1992 Included in GoMoku 2.0 and 2.1.
T297
Tabulero 2
Taiwan
Taiwan3
Taiwan4
Taocheng
Techno
Tecla
Telecom Boot
Telecom File
Telekom
Teletype
Teletype-2
Tentacle
Tequila
Terror
Tester
Tigraa Poland Piotr Bania aka Lord Yup aka dis69, 29A group member Peter Ferrie's analysis
TMTM
TP
Tremor2
TridenT
Triple Shot
Troi Two
Tschantches
T-series
TU-482
Tuesday
Tula
Tumen V0.5
Tumen V2.0
Tumen
Turbo
Turkey
Tver
Twin Peaks
Twin-351
twoneight
Typo Boot
Ucender
Ugur
Undressed
Unk
Uriel
Uruk 300
Uruk 361
Uruk-Hai Unknown
USSR
USSR 1049
USSR 2144 windows extract
USSR 256
USSR 257
USSR 3103
USSR 311
USSR 394
USSR-394
USSR 492
USSR 516
USSR 600
USSR 696
USSR 707
USSR 711
USSR 830
USSR 948
V1 0
V1 1
V1028
V125
V1463
V163
V1-Not
V2 0
V2000
V2100
V270X
V299
V2P2
V2P6
V-351
V-388
V400
V483
V5
V600
V800
V801
V82
V914
V961
VA
Vacsina
VCL
VCL-HEEvE
Vcomm
VCS
VDV-853
VHP
VHP-2
V-Label
VM
VP
VTS
VVF-34
Venge-E
Vera Cruz
Victor
Vienna/648
Vietnamese
Violator
Viper
Viperizer B
Viral Messiah
Virdem
Virflop
virus-101
virus-90
Voco
Vootie
Voronezh
Vote/Vote1000
Vriest
W13
WAVE
Warbiest Terminator 2008 For Windows XP Only.
Warbiest Terminator v.2.0 2009 For Windows XP and Vista.
WWT
Walkabout
Walker
Warez
Warrior 2
Warrior
Wazoo
WDEF 12-1989 Affects only Macintosh System 6.
Weak
Whale
Wharps
WhoCares
Why win
Wilbur 3
Wild trojan
Wild Thing A
Willistrover III
Willow
Willow 2
WinAble 2004 Windows systems only. Disrupts system performance by displaying pop-ups. Starts only when computer is on, and slows internet performance as well.
Windmill
Winvir
Wisconsin
Wizard 3.0
Wolfman
Wonder
Word Atom Macro
Word Color Macro
Word Concept Macro
Word Hot Macro
Wordswap
World Peace w32.myzor.FK@yf
Wsnpoem
X-1
X-2
X-3A
X-3B
X77
Xabaras
Xpeh
XTAC
Xuxa
Yale
Yan2505a
Yankee
Yankee - 2
Yap
Year 1993
Yerg
Youth
Yukon
Z10
ZK900
ZRK
ZU1
Zak2
Zaragosa
Zeppelin
Zero Bug
Zero Time
ZeroHunt
ZMist ZMistfall, Zombie.Mistfall Z0mbie
Zoda
Zohra


Last edited by AnneFrank ; edited 13 times in total
#2. Posted:
Her
  • Wise One
Status: Offline
Joined: Mar 07, 201113Year Member
Posts: 583
Reputation Power: 3
Status: Offline
Joined: Mar 07, 201113Year Member
Posts: 583
Reputation Power: 3
oh my golly gosh
this is insane
#3. Posted:
DREAM_
  • TTG Senior
Status: Offline
Joined: Feb 27, 201113Year Member
Posts: 1,070
Reputation Power: 76
Status: Offline
Joined: Feb 27, 201113Year Member
Posts: 1,070
Reputation Power: 76
THATS A TON OF VIRUESES!!!!
#4. Posted:
ImWyatt
  • TTG Fanatic
Status: Offline
Joined: Jan 31, 201014Year Member
Posts: 4,601
Reputation Power: 214
Status: Offline
Joined: Jan 31, 201014Year Member
Posts: 4,601
Reputation Power: 214
God i didnt realize there were so many
#5. Posted:
MrLookBehindUGuy
  • Challenger
Status: Offline
Joined: Feb 27, 201113Year Member
Posts: 184
Reputation Power: 8
Status: Offline
Joined: Feb 27, 201113Year Member
Posts: 184
Reputation Power: 8
Nice post if you post more info on all viruses should get stickied (:
#6. Posted:
Duhploy
  • TTG Senior
Status: Offline
Joined: Jul 06, 201013Year Member
Posts: 1,077
Reputation Power: 62
Status: Offline
Joined: Jul 06, 201013Year Member
Posts: 1,077
Reputation Power: 62
Damn Thats Alot Of Virus Omg
#7. Posted:
Powerrz
  • TTG Senior
Status: Offline
Joined: Nov 18, 201013Year Member
Posts: 1,023
Reputation Power: 39
Status: Offline
Joined: Nov 18, 201013Year Member
Posts: 1,023
Reputation Power: 39
Nice post.

Thanks. I see a sticky in your future.
#8. Posted:
AnneFrank
  • TTG Senior
Status: Offline
Joined: Sep 07, 201013Year Member
Posts: 1,619
Reputation Power: 65
Status: Offline
Joined: Sep 07, 201013Year Member
Posts: 1,619
Reputation Power: 65
MrLookBehindUGuy wrote Nice post if you post more info on all viruses should get stickied (:




that would only take me 6 days straight to do non stop theres like 300 viruses listed
#9. Posted:
GiantDROPSHOT
  • Ladder Climber
Status: Offline
Joined: Jul 17, 201013Year Member
Posts: 312
Reputation Power: 12
Status: Offline
Joined: Jul 17, 201013Year Member
Posts: 312
Reputation Power: 12
link to viruses... JK
#10. Posted:
MrLookBehindUGuy
  • Challenger
Status: Offline
Joined: Feb 27, 201113Year Member
Posts: 184
Reputation Power: 8
Status: Offline
Joined: Feb 27, 201113Year Member
Posts: 184
Reputation Power: 8
Heiwa wrote
MrLookBehindUGuy wrote Nice post if you post more info on all viruses should get stickied (:




that would only take me 6 days straight to do non stop theres like 300 viruses listed

Then do the most important ones or something i dont know but hope it gets stickied
Jump to:
You are viewing our Forum Archives. To view or take place in current topics click here.