
The Malware Museum
Mikko Hypponen
The Malware Museum is a collection of malware programs, usually viruses, that were distributed in the 1980s and 1990s on home computers. Once they infected a system, they would sometimes show animation or messages that you had been infected.
Share This Collection
eye
Title
Date Archived
Creator
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 3 reviews )
favoritefavoritefavoritefavoritefavorite ( 3 reviews )
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 6 reviews )
favoritefavoritefavoritefavorite ( 6 reviews )
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 4 reviews )
favoritefavoritefavoritefavoritefavorite ( 4 reviews )
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
( 2 reviews )
( 2 reviews )
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 3 reviews )
favoritefavoritefavoritefavorite ( 3 reviews )
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 2 reviews )
favoritefavoritefavoritefavoritefavorite ( 2 reviews )
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 6 reviews )
favoritefavoritefavoritefavoritefavorite ( 6 reviews )
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 6 reviews )
favoritefavoritefavoritefavoritefavorite ( 6 reviews )
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 4 reviews )
favoritefavoritefavoritefavoritefavorite ( 4 reviews )
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 2 reviews )
favoritefavoritefavoritefavoritefavorite ( 2 reviews )
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 2 reviews )
favoritefavoritefavoritefavorite ( 2 reviews )
A quick presentation on Virus History by Daniel White at Project Cyber Virus, held on May 5th, 2015 at Swissnex San Francisco. In 2004, Daniel White’s computer was infected with the Sasser worm, a fast-spreading autonomous worm that made millions of computers around the world reboot continuously. Fascinated by the concept of malware, he spent the following years learning everything he could about the subject, from general malware news to specific details of every virus, becoming a self-taught...
favoritefavoritefavoritefavoritefavorite ( 4 reviews )
Topics: Virus, History, Malware
favoritefavoritefavoritefavoritefavorite ( 4 reviews )
Topics: Virus, History, Malware
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 6 reviews )
favoritefavoritefavoritefavoritefavorite ( 6 reviews )
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 2 reviews )
favoritefavoritefavoritefavoritefavorite ( 2 reviews )
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
Presented at DEF CON 19 in Las Vegas, Nevada in 2011. "It's 2011, so this year it's going to be 25 years since Brain.A, the first PC virus, Join Mikko Hypponen as he talks about the history and evolution of computer viruses. From Brain to Stuxnet, he's spent his career tracking malware and will give a pretty good rundown on what has happened, when and why it mattered. Mikko Hypponen is based in Helsinki, Finland. He has been analysing computer viruses for more than 20 years. He has written...
Malware Example: PPSCARE.COM *PPSCARE.COM - upon invocation, PingPongScare (tm) will become resident and clutter the screen with the characteristic "bouncing ball" of the PingPong boot block infector. Computing can continue while PingPongScare is in effect.
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 3 reviews )
favoritefavoritefavoritefavoritefavorite ( 3 reviews )
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 1 reviews )
favoritefavoritefavoritefavorite ( 1 reviews )
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
( 1 reviews )
( 1 reviews )
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 2 reviews )
favoritefavoritefavoritefavoritefavorite ( 2 reviews )
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 3 reviews )
favoritefavoritefavoritefavoritefavorite ( 3 reviews )
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
( 1 reviews )
( 1 reviews )
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavorite ( 1 reviews )
favoritefavoritefavorite ( 1 reviews )
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
This paper categorizes different types of virus activation routines which are found in existing viruses and also discusses what triggers these activation routines. Common viruses are used as examples where possible. This paper also covers why it is important to know what a virus exactly does if you are infected by one. Some horror stories of the worst possible activation routine in a virus are also included. The scope of this paper is limited to PC compatible machines.
Topics: virus, viruses, activation, routines, routine, antivirus, user, mosaic, hard, machine, activation...
Topics: virus, viruses, activation, routines, routine, antivirus, user, mosaic, hard, machine, activation...
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 2 reviews )
favoritefavoritefavoritefavoritefavorite ( 2 reviews )
Malware Example: JERSCARE.COM *JERSCARE.COM - upon invocation, JerusalemScare (tm) becomes resident. After a short period of time - about a minute on most systems - Jerusa- lemScare will effect the characteristic Jerusalem virus system slowdown and scrolling black window effect on the left side of the monitor.
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
Malware Example: CASCARE.COM *CASCARE.COM - upon invocation, CascadeScare (tm) will become resident. After a brief pause, the characteristic rat-a-tat sound of the Cascade virus and its nifty falling letters effect will be seen. This will continue intermittently, for as long as CascadeScare is resident. If the computer is in graphics mode, only the rat-a-tat sound effect will be noticed.
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 1 reviews )
favoritefavoritefavoritefavorite ( 1 reviews )
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 1 reviews )
favoritefavoritefavoritefavorite ( 1 reviews )
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 3 reviews )
favoritefavoritefavoritefavoritefavorite ( 3 reviews )
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavorite ( 1 reviews )
favoritefavoritefavorite ( 1 reviews )
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 1 reviews )
favoritefavoritefavoritefavorite ( 1 reviews )
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
( 1 reviews )
( 1 reviews )
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 2 reviews )
favoritefavoritefavoritefavoritefavorite ( 2 reviews )
This paper will discuss methods viruses use or might use in the future to attack anti-virus programs. Attacks of this kind are becoming more common, as virus writers seem to be constantly looking for ways to make their viruses more efficient and vigorous. This paper also suggests how to make antivirus products more resistant against such attacks. The scope of this paper is limited to PC compatible machines
Topics: virus, program, viruses, attack, vims, scanner, programs, code, retrovirus, resident, virus...
Topics: virus, program, viruses, attack, vims, scanner, programs, code, retrovirus, resident, virus...
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 1 reviews )
favoritefavoritefavoritefavorite ( 1 reviews )
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 1 reviews )
favoritefavoritefavoritefavorite ( 1 reviews )
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 1 reviews )
favoritefavoritefavoritefavorite ( 1 reviews )
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 1 reviews )
favoritefavoritefavoritefavorite ( 1 reviews )
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 2 reviews )
favoritefavoritefavoritefavoritefavorite ( 2 reviews )
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
Fetching more results

DESCRIPTION
The Malware Museum is a collection of malware programs, usually viruses, that were distributed in the 1980s and 1990s on home computers. Once they infected a system, they would sometimes show animation or messages that you had been infected.Through the use of emulations, and additionally removing any destructive routines within the viruses, this collection allows you to experience virus infection of decades ago with safety.
Collection Info
- Addeddate
- 2016-02-05 03:32:35
- Collection
- softwarehistory
software
- Creator
- Mikko Hypponen
- Identifier
- malwaremuseum
- Mediatype
- collection
- Publicdate
- 2016-02-05 03:32:35
- Title
- The Malware Museum
Created on
February 5
2016
2016
Jason Scott
Archivist
Archivist
ITEMS
Total Items 87 (Older Stats)
TOP REGIONS (LAST 30 DAYS)
(data not available)