Malware Programs


What is Malware?

Malware programs are harmful software applications designed to access a computer without the computer owner's consent while remaining undetected. We're able to classify programs into malware or safe programs based on our threat assessment policy. Safe programs that are listed in our database do not pose a threat, and they may be allowed to run on your system. The goal of this malware program list is to assist you with determining which program is malware (harmful) or if a specific program has been verified as being a safe program.

The major problem that Internet users face today is distinguishing what is harmful or safe software. Malware authors have taken great lengths to blur the line between what is real and what is disguised to look real. Internet users should take it into their own hands and research a program in order to reduce the risk of loss of online privacy and security due to a malware infection. Even programs that Internet users confidently assume were secure can be infected. Social networking websites, cloud computing, and URL shortening services can now be expected as new malware contamination venues; therefore, Internet users are at a greater risk of becoming victims of malware attacks by simply falling for a socially-engineered malware trick.

Malware is not to be trusted, and it is advisable to remove it from your PC immediately after encountering it. Depending on the type of malware and the intentions of its creator, malware can download additional malware onto your machine, install unwanted toolbars, dial extremely expensive phone numbers, make your entire system behave sluggish or bombard you with excessive pop-ups and pop-under advertisements. Malware creators may also be interested in collecting your personally identifiable information, such as passwords, credit card numbers, and bank information. They steal this information with the help of trojans and keyloggers. If a program detected on your system has been classified as malware, we recommend to disable or delete the program with a reliable anti-malware program.

Top Malware (Past 7 Days)

Parasite Name Threat Level Alias Name Detection Count Date Submitted
9/10 N/A 3 2016-05-09 11:07:13 EST
9/10 N/A 83,130 2015-08-31 12:36:38 EST
10/10 N/A 60,457 2016-03-04 10:42:36 EST
9/10 N/A 19,165 2014-03-04 16:23:14 EST
9/10 (Suspicious) - DNAScan
a variant of Win32/Adware.MarketScore.A
a variant of Win32/Adware.RK
85,096 2005-04-08 08:59:48 EST
9/10 N/A 22 2016-03-16 11:22:10 EST
9/10 Adware ( 004d2a5f1 )
1,407,558 2015-04-01 05:07:56 EST
9/10 EmailWorm
77 2010-12-06 03:48:07 EST
9/10 N/A 113,805 2013-07-24 12:55:25 EST
9/10 N/A 663 2016-06-14 11:44:41 EST
10/10 N/A 0 2016-08-05 10:10:52 EST
9/10 (Suspicious) - DNAScan
a variant of Win32/Injector.AHM
a variant of Win32/Injector.ANO
5,694 2008-12-05 17:34:31 EST
9/10 N/A 297 2013-07-23 14:21:32 EST
9/10 N/A 18,404 2015-08-31 12:18:39 EST
9/10 N/A 265 2006-02-13 11:30:05 EST
9/10 N/A N/A 2013-09-24 13:00:07 EST
9/10 N/A 198,210 2016-03-16 07:10:05 EST
9/10 N/A 300 2015-02-12 15:41:25 EST
9/10 N/A 89,098 2016-03-08 05:58:35 EST
9/10 N/A 300 2013-08-07 17:28:02 EST
9/10 (Suspicious) - DNAScan
High Risk Fraudulent Security Program
241 2010-10-11 08:24:48 EST
9/10 N/A 41,092 2016-03-08 06:32:54 EST

Click on the links below to learn more about a particular malware program. The malware program list is divided into major different malware categories which allow you to quickly search for a particular type of malware. On our malware program list, you'll find detailed malware information such as its definition, symptoms, related files, harmful registry keys, as well as manual and automatic removal methods.

Malware Programs by Category:

There are currently 26997 programs in our database.

Type Description

Adware is any program with the primary function of displaying advertisements. As a result, any particular adware program can only be as dangerous as the danger or safety of the (typically...

Annoyances are Trojans that do not cause damage but may irritate you by making your mouse motions erratic or by turning the view on your computer screen upside down.
AOL Parasites

AOL Parasites are pests that were specifically created for America OnLine users. AOL Parasites have an ability to capture your personal identifiable information, such as passwords. AOL...

Backdoors is a term describing unauthorized access to your computer system. Usually a backdoor lies in the program code and is created by a programmer. Backdoors in your computer may be...
Bad Toolbars

Bad Toolbars are malicious toolbars that secretly install without the computer user's permission or knowledge. A bad toolbar, or malware toolbar, may come packaged with other unwanted...

A botnet is a group of computers compromised with the intention of instructing them to perform malicious actions. Botnets are usually controlled through a network protocol, such as an IRC...
Browser Helper Objects

Browser Helper Objects are objects installed on your browser as a toolbar or search bar. Browser Helper Object may infect your system without your knowledge and consent just by visting...
Browser Hijackers

Browser Hijackers are malicious applications that infect your computer system without your knowledge or consent. Browser hijackers have the ability to change your default homepage and...
Browser Plugins

Browser Plugins are applications that may perform malicious tasks on your browser. Browser Plugins may have an ability to change banner advertisements of the website you are viewing,...

Carding refers to programs specifically created to perform credit card fraud. Carding may monitor your Internet shopping activities and track your credit card information. There are some...

Dialers are applications that may dial higher rate telephone numbers without your knowledge or consent. A dialer can only start functioning and achieve its malicious task, only if you are...

Downloaders are applications which may download and install additional malware on your system. The downloaded malware may have the ability to re-install itself, which makes it difficult...

Droppers are programs designed to install hostile code onto the system of the targeted computer without you being aware of it. Most often the Dropper comes bundled with a Trojan.

Flooders are applications that may overload your Internet or Network connection with a help of fast pinging or DoS attacks.

Hacktools are used to infiltrate a computer and allow a remote user to access the compromised system. A hacktool may be composed of different programs and scripts. Various hacktools have...

Hijackers are applications that may take control of your browser's settings in order to redirect you to other websites. Hijacker may cause your browser to behave sluggish.

Online hoaxes are used to mislead or frighten computer users. Usually an online hoax or scam are sent through emails or come in the form of an executable application that could put a...

Keyloggers are malicious applications that tend to monitor your keyboard typing activities. Once inside your machine, keyloggers may keep a track of every keystroke you make and save it...
Low Risk Adware

Low Risk Adware is advertising-supported software that shows targeted advertisements based on the user behavior it is monitoring, but it poses a low risk of damaging your computer, your...
Mail Bombers

Mail Bombers are applications that may flood its victim's email box with enormous number of spam or other unwanted messages. Mail Bomber applications also have an ability to hide the...

Malware is an umbrella classification for any type of malicious application, including both PC threats with independent files and viruses that insert themselves into other files. While...
Misleading Programs

Misleading Programs are applications that deliberately misrepresent the current security status or condition of a computer. Misleading programs usually notify the computer user of a...

Nukers are applications that can perform TCP/IP DoS attacks or disable a machine by damaging the registry, key files or other system components. Nukers may affect the machines that don't...
Potentially Unwanted Programs (PUPs)

A Potentially Unwanted Program or PUP is an application that's noted for characteristics that may make it undesirable even if it's not overtly malicious or harmful to your PC. PUPs often...

Proxy is a firewall that blocks and re-creates a connection between two points. Proxy has an ability to hide a user from the outside world or an attacker from a user. For malicious...

Ransomware is a sub-category of trojan that locks down your computer by interfering with its interface, blocking other programs or encrypting its files (a process that makes these files...
Remote Administration Tools

Remote Administration Tools are tools that can provide you with remote access of a computer. This type of spyware can enable you to fix computer problems or any similar software tasks...
Rogue Anti-Spyware Programs

Rogue Anti-Spyware Programs are fake applications that are cleverly disguised to behave like legitimate spyware removal programs. Rogue anti-spyware programs are usually created by...
Rogue Anti-Virus Programs

Rogue Anti-Virus Programs are fake programs that are designed to disguise and behave just like a legitimate virus removal application. Rogue anti-virus programs are usually created by...
Rogue Defragmenter Programs

Rogue defragmenter programs are applications designed to mimic optimization programs or legitimate hard drive defragment tools. Rogue defragmenter programs use extortion tactics to get...
Rogue Optimizer Programs

A rogue optimizer program, or a fake PC optimization tool, is an application created by cybercrooks to impersonate an application that is capable of optimizing a PC's performance through...
Rogue Registry Cleaners

Rogue Registry Cleaners are deceitful and unreliable registry cleaner programs that pretend to fix or clean a computer's registry. Rogue registry cleaners use deceptive security alerts...

Rootkits are infections that contain a program or a group of programs usually programmed to go undetected in order to take control of a computer. In some cases, a rootkit may come in the...
Search Hijackers

Search Hijackers are malicious applications that may modify your search page and display unwanted advertisements on your computer screen. The hijacking technique enables the attacker to...

Sniffers are applications that may eavesdrop on computer networks and can search for clear-text or password hashes in the network or Internet connection.
Spam Tools

Spam Tools are tools designed to spread spam. Spam Tools may keep a track of email addresses from various websites and may include malicious programs that spams users with emails...

Spyware is a classification of malicious software that's based on the ultimate consequence of their attacks: theft of information from your PC, especially private or potentially...
Tracking Cookies

Tracking Cookies are cookies that are shared among websites in order to track your Internet browsing habits. Every time user visits a website, the computer accepts a cookie and every...

Trackware is a software application that may send your personal identifiable information by the means of Internet connection.
Trojan Sources

Trojan Sources are source code written by a programmer in a sophisticated language which can be read only by people. Source code must be converted to object code or machine language in...

Trojans are malicious files that don't have any type of included distribution technique (unlike viruses or
Virus Creation Tools

Virus Creation Tools are applications designed to create viruses. The tool is able to generate a large number of different viruses.

A virus is hostile software that replicates its own code inside unrelated files, especially executable or .exe files. In casual parlance, although the term 'virus' is also used to refer...

Worms are malicious programs that replicate or execute over computer networks or hard drives. The main difference between a worm and a virus is that a virus piggy-backs on other...
Home Malware Programs