Malware Files

Share:

What are Malware Files?


Malware files are basically files identified as malicious or suspicious and are used to gain access to vulnerable systems. Most malware files are typically executable and do not require permission to enter a computer system or to run devious functions in the background of your computer. In order to trick users into downloading them, malware files are typically disguised as legitimate or trustworthy software downloads. They can also spread via spammed e-mails or through the exploitation of system or software vulnerabilities. Hackers use malware to monitor a victim's activities and steal sensitive information including passwords, credit card numbers, and online banking details.

What are the Symptoms of a Malware File?


One way for malware to gain control of a PC is to modify or create commonly used file extensions such as .exe, .dll and other infectable files. The characteristics of an infected file include:

  • Allows malware to operate invisibly in the background.
  • Records your credit card numbers, bank passwords, and other personal information.
  • Executes an unknown payload at startup of Windows rendering illicit pop-up messages or system warnings.
  • Loads specific strings that delete other legitimate system files.
  • Falselys represents files and place them in the wrong system folder.
  • Facilitate unauthorized access to an infected computer from a remote source.
  • Lays dormant or hidden until executed either through running an associated malware program or other circumstances that causes the code to be executed by the infected computer.
  • Difficult to remove even when using a particular anti-virus program.

Once you're infected with malicious files, it is advised, especially for novice computer users, to rely on an anti-virus program to at least detect the file path and malware program associated with it. With this piece of information, you can research more on the Web on how to remove the malicious files or choose to have the anti-virus program delete it for you. Since malware has the ability to bypass certain anti-virus programs, you should try different anti-virus programs until you've found the one that works for you.

Top Malware Files By Detection Count


Name Threat Level Detection Count First Detected Last Detected
2/10 154,274 08/28/2012 05:03:35 EST 03/05/2013 11:49:19 EST
1/10 109,716 02/26/2014 07:47:44 EST 04/11/2014 05:37:14 EST
1/10 104,198 11/20/2013 06:47:43 EST 02/21/2014 01:16:55 EST
2/10 79,168 11/07/2012 07:23:28 EST 02/07/2014 12:59:20 EST
1/10 42,896 04/03/2013 11:44:21 EST 10/30/2013 05:52:09 EST
2/10 42,282 01/25/2014 10:10:20 EST 03/10/2014 06:52:42 EST
2/10 36,146 04/27/2014 01:50:30 EST 05/15/2014 08:42:32 EST
1/10 35,497 07/29/2013 12:54:26 EST 11/15/2013 02:12:29 EST
2/10 35,305 12/12/2012 06:55:05 EST 01/31/2013 11:47:49 EST
1/10 35,164 08/03/2010 05:57:00 EST 02/17/2014 06:38:07 EST

The Dangers of Malware Files


Once a malware file is inside a system, it will launch computer threats such as trojans, viruses, adware or even rogueware. Depending on the type of malware file, it may also flood your screen with pop-up security alerts or advertisements; it may install corrupt toolbars as well as slow down the speed of your computer system.

Our malware files list provides you with information on malware files including its threat level, file size, file path, among other details. You can check the latest malware files below or search by letter or number.

Latest Malware Files


There are currently 112,096 malware files in our database.

File Name Threat Level Detection Count First Detected Last Detected
KeyPlayerV0.exe
2/10 72 07/29/2014 04:13:09 EST N/A
EGLug.x64.dll
2/10 231 07/25/2014 07:41:06 EST 07/25/2014 07:41:06 EST
0n.exe
2/10 5 07/24/2014 12:30:47 EST 07/24/2014 12:30:48 EST
winvnt32.exe
2/10 248 07/23/2014 20:43:59 EST 07/29/2014 12:25:30 EST
1d47d9cb-6231-4d32-abdf-dcfb883b99eb-11.exe
7/10 37 07/21/2014 13:04:54 EST 07/21/2014 13:04:54 EST
TheTorntv V10-bho.dll
7/10 5 07/21/2014 10:59:40 EST 07/21/2014 13:35:14 EST
3273c73f-99bb-470d-94fd-24a02ec3aa15-11.exe
7/10 5 07/21/2014 10:59:40 EST 07/21/2014 13:35:14 EST
92a411f9-bdce-4676-b566-af6550048374-3.exe
7/10 5 07/21/2014 10:08:21 EST 07/21/2014 14:13:22 EST
92a411f9-bdce-4676-b566-af6550048374-4.exe
7/10 5 07/21/2014 10:08:20 EST 07/21/2014 14:13:22 EST
2f2c7e6e-db6a-40a8-970e-6cb44137e9ac-4.exe
7/10 256 07/21/2014 04:55:08 EST 07/21/2014 04:55:08 EST
2f2c7e6e-db6a-40a8-970e-6cb44137e9ac-11.exe
7/10 250 07/21/2014 04:55:07 EST 07/21/2014 04:55:07 EST
004d8d5b-1779-4352-ba15-f9ee38bb42da-3.exe
7/10 16 07/20/2014 06:59:33 EST 07/20/2014 06:59:33 EST
d9503c84-2293-468d-8eb7-12ba4f5c7b46-4.exe
7/10 14 07/19/2014 13:03:01 EST 07/21/2014 12:37:05 EST
2aa1772a-2c85-4293-91e4-48d808a6d9cf-4.exe
7/10 5 07/19/2014 08:58:53 EST 07/19/2014 08:58:55 EST
TheTorntv V10-bho64.dll
7/10 128 07/19/2014 08:58:52 EST 07/19/2014 08:58:52 EST
2aa1772a-2c85-4293-91e4-48d808a6d9cf-11.exe
7/10 5 07/19/2014 08:58:52 EST 07/19/2014 08:58:54 EST
3591f84d-d448-49ac-89c2-bf96a9734b03-4.exe
7/10 5 07/18/2014 09:45:13 EST 07/19/2014 10:11:15 EST
3591f84d-d448-49ac-89c2-bf96a9734b03-11.exe
7/10 5 07/18/2014 09:45:12 EST 07/19/2014 10:11:15 EST
Hyper - Browser.exe
2/10 597 07/16/2014 15:20:20 EST 07/23/2014 10:27:03 EST
{ed7eb956-75ed-460d-8f69-29a93b07afd1}t.sys
2/10 78 07/14/2014 19:13:02 EST 07/14/2014 19:13:02 EST

How Can I Avoid Getting Infected with Malware Files?


It is always advisable to practice caution when browsing the Internet. You should be careful what you download, open or plug into your PC. Using a reliable anti-virus/anti-spyware program is a good method to detect and remove malware files before they can cause further damage to a PC. Keep your anti-virus/anti-spyware software up-to-date to stay protected against the latest malware threats.

Search by Letter:
A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  
Home Malware Files