Home Malware Programs Viruses


A virus is hostile software that replicates its own code inside unrelated files, especially executable or .exe files. In casual parlance, although the term ‘virus’ is also used to refer to trojans, browser hijackers and other types of PC threats, this usage is inaccurate in a technical sense unless the PC threat in question also utilizes file-infecting techniques. In fact, some viruses lack any ability other than reproduction via spreading their code to other files. Viruses were some of the earliest PC threats to be developed, and, as such, have gotten a significant amount of attention from news media.

Viruses don’t have a single type of payload or set of attacks that define them, although our malware researchers have found that many viruses are designed to cause security vulnerabilities. Many of the earliest viruses that were observed were designed to include destructive payloads that damaged files or even the operating system. However, modern viruses, like other types of malicious software, trend towards attacks that generate illegal profit while minimizing system damage that could cause the infection to be noticed.

Although viruses are capable of infecting huge amounts of files over a computer and other accessible resources (such as USB drives), virus infection tactics should be distinguished from other types of code injection attacks. Many types of PC threats, especially spyware, will load their code into the memory processes of other programs during system startup. This differs from virus-based propagation in that the virus’s addition is permanent whereas startup code injection is temporary. Usually, our malware researchers have also found that the latter attack will restrict itself to targeting operating system or web browser processes, while viruses tend to be indiscriminate in their targets.

Common Symptoms of Virus Attacks

Viruses can be detected indirectly by a permanent increase in file size for infected files, although this change may be very small (a matter of kilobytes or even bytes). Typically, using anti-malware programs to detect a virus is the most practical solution. Our malware experts emphasize the fact that virus attacks often fail to exhibit visible symptoms or create system changes that would be detectable without a tediously thorough inspection of the infected PC.

The triggering mechanism for a virus can be roughly categorized into ‘subtle’ and ‘unsubtle’ variants. Unsubtle viruses will strive to infect as many files as they can access once the initially-infected file is launched on a new computer, although this makes it easy for anti-malware programs to detect them. Subtle viruses will sacrifice quantity for safety and may only infect files as they’re accessed by the PC user, the operating system or an application. While the latter type of virus is less prolific than the former, our malware researchers note that it poses a special danger during anti-virus scans. Anti-virus software that scans a PC without detecting and eradicating the relevant virus may grant the virus access to all files that it scans – in essence, practically everything on your computer.

Although .exe files are a favored target of viruses, some types of viruses exist that target other file types. Of these viruses, the most notable is the macro virus, which exploits Microsoft Office vulnerabilities to infect spreadsheets, text documents and similar types of ‘harmless’ files.

The Consequences of a Virus Infection

While some viruses limit their attacks to reproduction, the majority of viruses are designed to take additional actions. Many viruses, particularly old variants, may deliberately delete or mutilate files on your computer. Viruses may also be used for a wide range of other attacks, such as modifying your web browser’s settings to redirect you to malicious sites or disabling security-related features. A virus may act alone or be a single part of a multiple-threat attack against your computer. Our malware analysts have found that advanced families of rootkits and rogue security products are especially guilty of using virus-based components for browser redirect attacks and other purposes.

Poorly-written viruses may also damage the files that they infect permanently, which causes the files in question to be worthless unless they can be restored from a backup. Thankfully, most viruses are coded well enough to avoid such obvious symptoms, and anti-malware programs can delete virus-related code without damaging the files that the code is using as a hiding place.

Is Your PC Infected with Viruses?

To safely & quickly detect Viruses, we highly recommend you click below to run SpyHunter's up-to-date malware scanner.

Download SpyHunter's* Spyware Scanner

Note: SpyHunter's free version is only for malware detection. If SpyHunter detects malware on your PC, you will need to purchase SpyHunter's malware tool to remove the malware threats. Learn more on SpyHunter. If you would like to uninstall SpyHunter for any reason, please follow these uninstall instructions. To learn more about our policies and practices, visit our EULA, Privacy Policy and Threat Assessment Criteria .

There are currently 1,018 viruses program(s) in our database.

Name Date
‘Complete an offer to continue’ Virus April 16, 2013
‘Unlock this Page to Continue!’ Virus December 15, 2012
‘White Trader’ Virus June 11, 2013
‘You Shall Not Pass’ Virus May 20, 2013
101 Lyrics Virus April 8, 2014
19521332.exe April 21, 2011
A-Bomb.878 March 28, 2006
Acy.790 April 14, 2010
Ada April 14, 2010
Agentdoc.c June 22, 2011
ALS.Bursted.C November 26, 2012
Alureon.K April 18, 2011
AntiAntivirus March 28, 2006
AntiExe August 24, 2007
AntiVirus Pro May 30, 2007
Arcam March 28, 2006
Arestocrat Virus June 4, 2013
Assilem August 27, 2007
AutoRun.ad July 24, 2009
AutoRun.agq July 24, 2009
AutoRun.ez July 24, 2009
AutoRun.fb July 24, 2009
Backdoor.Agent July 24, 2009
Backdoor.Bifrose.gen!E January 30, 2012
Backdoor.Bot July 17, 2009
1 2 3 4 5 6 7 8 9 10 11 41

Search by Letter:
A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  0  1  2  3  4  5  6  7  8  9