Malware Programs

What is Malware?

Malware programs are harmful software applications designed to access a computer without the computer owner’s consent while remaining undetected. We’re able to classify programs into malware or safe programs based on our threat assessment policy. Safe programs that are listed in our database do not
pose a threat, and they may be allowed to run on your system. The goal of this malware program list is to assist you with determining which program is malware (harmful) or if a specific program has been verified as being a safe program.

The major problem that Internet users face today is distinguishing what is harmful or safe software. Malware authors have taken great lengths to blur the line between what is real and what is disguised to look real. Internet users should take it into their own hands and research a program in order to reduce the risk of loss of online privacy and security due to a malware infection. Even programs that Internet users confidently assume were secure can be infected. Social networking websites, cloud computing, and URL shortening services can now be expected as new malware contamination venues; therefore, Internet users are at a greater risk of becoming victims of malware attacks by simply falling for a socially-engineered malware trick.

Malware is not to be trusted, and it is advisable to remove it from your PC immediately after encountering it. Depending on the type of malware and the intentions of its creator, malware can download additional malware onto your machine, install unwanted toolbars, dial extremely expensive phone numbers, make your entire system behave sluggish or bombard you with excessive pop-ups and pop-under advertisements. Malware creators may also be interested in collecting your personally identifiable information, such as passwords, credit card numbers, and bank information. They steal this information with the help of trojans and keyloggers. If a program detected on your system has been classified as malware, we recommend to disable or delete the program with a reliable anti-malware program.

Top Malware (Past 7 Days)

Name Level Alias Detection count Date submitted
GayFreeVideos 1/10 N/A 131 July 24, 2009
NiceHash Miner N/A N/A N/A April 15, 2019 N/A N/A N/A February 12, 2021
Random Music Playing Virus 8/10 N/A 68 October 8, 2013
FluBot Android Malware N/A N/A N/A March 9, 2021 N/A N/A N/A May 2, 2014
GayBoyLove 1/10 N/A 75 July 24, 2009
Mimikatz N/A N/A N/A April 12, 2019
Spidey Bot N/A N/A N/A October 25, 2019
Gamut Botnet N/A N/A N/A May 28, 2020
SpyNote RAT N/A N/A N/A September 19, 2019
Acuna Ransomware N/A N/A N/A March 22, 2021
Minergate 1/10 N/A 34,188 October 17, 2017
Avalanche Botnet N/A N/A N/A April 11, 2019
Exploit.js/mult.dc 8/10 N/A 94 April 17, 2012
QuicklookPI N/A N/A N/A February 16, 2021
Virus.Win32.Neshta.a 8/10 Neshta.C,
4,209 February 1, 2011 8/10 N/A 27 March 11, 2013
AhMyth RAT N/A N/A N/A August 3, 2020
Spyrix N/A N/A N/A October 29, 2018
Win32.LocalInfect.2 8/10 N/A 32 October 27, 2014
EternalBlue N/A N/A N/A April 12, 2019
Hiddad N/A N/A N/A October 11, 2019
SMSS-DoOoM 5/10 N/A 110 January 5, 2015
UnityMiner Malware N/A N/A N/A March 10, 2021
AndroRAT N/A N/A N/A May 21, 2020
Backdoor.Ingreslock Ransomware 8/10 N/A 5 December 28, 2015
Mal/HTMLGen-A 6/10 N/A 55 April 24, 2012
Omegle Phishing Virus N/A N/A N/A August 8, 2019
W97M/Downloader N/A N/A N/A May 24, 2019
Lemon_Duck N/A N/A N/A October 7, 2019 1/10 N/A 2,408 October 26, 2017
StealRat 7/10 N/A 95 July 23, 2013
Kinsing N/A N/A N/A April 6, 2020
M88P Ransomware N/A N/A N/A January 15, 2021
Nginx Virus N/A N/A N/A July 11, 2012
Windows PC Aid 10/10 N/A 82 June 5, 2012
Worm.Python.Agent 5/10 N/A 5,115 July 15, 2017
Worm:Win32/Brontok.AS@mm 5/10 Email-Worm.Brontok.Q,
96 January 14, 2013
‘’ Pop-Ups N/A N/A N/A December 4, 2015
Misleading:Win32/Lodi!MSR N/A N/A N/A December 10, 2019
Phobos Ransomware 10/10 Win32.Trojan.Obfuscated.gx.3,
115 October 23, 2017
'Press Allow to watch the video' Notification Page N/A N/A N/A March 13, 2020
Worm:VBS/Jenxcus.A 5/10 N/A 9,286 May 24, 2013
'.alien File Extension' Ransomware N/A N/A N/A January 29, 2019
Bad Image Virus N/A N/A N/A February 1, 2012
JackPOS 1/10 N/A 80 February 14, 2014
RelevantKnowledge 2/10 ApplicUnwnt,
Unwanted-Program ( 00454f261 )
688,849 April 8, 2005
W32.Virut.G 8/10 Suspicious file,
Suspicion: unknown virus,
8 January 2, 2012
ACAD/Medre.A 5/10 N/A 75 June 22, 2012

Click on the links below to learn more about a particular malware program. The malware program list is divided into major different malware categories which allow you to quickly search for a particular type of malware. On our malware program list, you'll find detailed malware information such as its definition, symptoms, related files, harmful registry keys, as well as manual and automatic removal methods.

Malware Programs by Category:

There are currently 34,889 program(s) in our database.

Type Description
Advanced Persistent Threat (APT)
Adware Adware is any program with the primary function of displaying advertisements. As a result, any particular adware program can only be as dangerous as the danger or safety of the (typically third-party) advertisements that it's designed to...
Annoyances Annoyances are Trojans that do not cause damage but may irritate you by making your mouse motions erratic or by turning the view on your computer screen upside down.
AOL Parasites AOL Parasites are pests that were specifically created for America OnLine users. AOL Parasites have an ability to capture your personal identifiable information, such as passwords. AOL Parasites may also do harm by arranging Service...
Backdoors Backdoors is a term describing unauthorized access to your computer system. Usually a backdoor lies in the program code and is created by a programmer. Backdoors in your computer may be accessed by attackers without your knowledge or...
Bad Toolbars Bad Toolbars are malicious toolbars that secretly install without the computer user's permission or knowledge. A bad toolbar, or malware toolbar, may come packaged with other unwanted programs. Bad Toolbars can either track every action...
Botnets A botnet is a group of computers compromised with the intention of instructing them to perform malicious actions. Botnets are usually controlled through a network protocol, such as an IRC (Internet Relay Chat), via the Internet. Systems...
Browser Helper Objects Browser Helper Objects are objects installed on your browser as a toolbar or search bar. Browser Helper Object may infect your system without your knowledge and consent just by visting unsolicited websites or with the help of Trojan...
Browser Hijackers Browser Hijackers are malicious applications that infect your computer system without your knowledge or consent. Browser hijackers have the ability to change your default homepage and search result pages as well as install additional...
Browser Plugins Browser Plugins are applications that may perform malicious tasks on your browser. Browser Plugins may have an ability to change banner advertisements of the website you are viewing, change your Home page or Search page. Once, a Browser...
Carding Carding refers to programs specifically created to perform credit card fraud. Carding may monitor your Internet shopping activities and track your credit card information. There are some carding applications that provide attackers with...
Dialers Dialers are applications that may dial higher rate telephone numbers without your knowledge or consent. A dialer can only start functioning and achieve its malicious task, only if you are using a dial-up modem.
Downloaders Downloaders are applications which may download and install additional malware on your system. The downloaded malware may have the ability to re-install itself, which makes it difficult to remove manually.
Droppers Droppers are programs designed to install hostile code onto the system of the targeted computer without you being aware of it. Most often the Dropper comes bundled with a Trojan.
Flooders Flooders are applications that may overload your Internet or Network connection with a help of fast pinging or DoS attacks.
Hacktools Hacktools are used to infiltrate a computer and allow a remote user to access the compromised system. A hacktool may be composed of different programs and scripts. Various hacktools have rootkit characteristics allowing the malware to...
Hijackers Hijackers are applications that may take control of your browser's settings in order to redirect you to other websites. Hijacker may cause your browser to behave sluggish.
Hoaxes Online hoaxes are used to mislead or frighten computer users. Usually an online hoax or scam are sent through emails or come in the form of an executable application that could put a system at risk of being compromised. Various hoax...
Keyloggers Keyloggers are malicious applications that tend to monitor your keyboard typing activities. Once inside your machine, keyloggers may keep a track of every keystroke you make and save it in a separate file. Once saved, this file can be...
Mac Malware
Mail Bombers Mail Bombers are applications that may flood its victim's email box with enormous number of spam or other unwanted messages. Mail Bomber applications also have an ability to hide the source of the received messages.
Malware Malware is an umbrella classification for any type of malicious application, including both PC threats with independent files and viruses that insert themselves into other files. While malware also is often used to refer to suspicious...
Misleading Programs Misleading Programs are applications that deliberately misrepresent the current security status or condition of a computer. Misleading programs usually notify the computer user of a potentially unsafe security risk, unwanted application...
Nukers Nukers are applications that can perform TCP/IP DoS attacks or disable a machine by damaging the registry, key files or other system components. Nukers may affect the machines that don't have firewalls intalled.
Potentially Unwanted Programs (PUPs) A Potentially Unwanted Program or PUP is an application that's noted for characteristics that may make it undesirable even if it's not overtly malicious or harmful to your PC. PUPs often overlap with adware , which may install...
Proxy Proxy is a firewall that blocks and re-creates a connection between two points. Proxy has an ability to hide a user from the outside world or an attacker from a user. For malicious purposes a proxy may be used to make a connection...
Ransomware Ransomware is a sub-category of trojan that locks down your computer by interfering with its interface, blocking other programs or encrypting its files (a process that makes these files unusable until they're decrypted). During this...
Remote Administration Tools Remote Administration Tools are tools that can provide you with remote access of a computer. This type of spyware can enable you to fix computer problems or any similar software tasks without being in the same location with the computer....
Rogue Anti-Spyware Programs Rogue Anti-Spyware Programs are fake applications that are cleverly disguised to behave like legitimate spyware removal programs. Rogue anti-spyware programs are usually created by hackers with the sole purpose of rendering a sale for...
Rogue Anti-Virus Programs Rogue Anti-Virus Programs are fake programs that are designed to disguise and behave just like a legitimate virus removal application. Rogue anti-virus programs are usually created by hackers who attempt to take your money through...
Rogue Defragmenter Programs Rogue defragmenter programs are applications designed to mimic optimization programs or legitimate hard drive defragment tools. Rogue defragmenter programs use extortion tactics to get computer users to purchase a full version of the...
Rogue Optimizer Programs A rogue optimizer program, or a fake PC optimization tool, is an application created by cybercrooks to impersonate an application that is capable of optimizing a PC's performance through hard disk defragmentation or other system...
Rogue Registry Cleaners Rogue Registry Cleaners are deceitful and unreliable registry cleaner programs that pretend to fix or clean a computer's registry. Rogue registry cleaners use deceptive security alerts and bogus registry scans as a method to get computer...
Rootkits Rootkits are infections that contain a program or a group of programs usually programmed to go undetected in order to take control of a computer. In some cases, a rootkit may come in the form of a Trojan presented in a way that makes...
Search Hijackers Search Hijackers are malicious applications that may modify your search page and display unwanted advertisements on your computer screen. The hijacking technique enables the attacker to have control over your browser. A search hijacker...
Sniffers Sniffers are applications that may eavesdrop on computer networks and can search for clear-text or password hashes in the network or Internet connection.
Spam Tools Spam Tools are tools designed to spread spam. Spam Tools may keep a track of email addresses from various websites and may include malicious programs that spams users with emails or instant messages. Spam Tools may also tend to remove...
Spyware Spyware is a classification of malicious software that's based on the ultimate consequence of their attacks: theft of information from your PC, especially private or potentially profitable data. Spyware is often designed to steal...
Tracking Cookies Tracking Cookies are cookies that are shared among websites in order to track your Internet browsing habits. Every time user visits a website, the computer accepts a cookie and every other time the recognition becomes easier. However,...
Trackware Trackware is a software application that may send your personal identifiable information by the means of Internet connection.
Trojan Sources Trojan Sources are source code written by a programmer in a sophisticated language which can be read only by people. Source code must be converted to object code or machine language in order to make it readable by a computer or...
Trojans Trojans are malicious files that don't have any type of included distribution technique (unlike viruses or worms ). Although some trojans are disguised as benevolent files that are distributed via spam and social networking routes,...
Virus Creation Tools Virus Creation Tools are applications designed to create viruses. The tool is able to generate a large number of different viruses.
Viruses A virus is hostile software that replicates its own code inside unrelated files, especially executable or .exe files. In casual parlance, although the term 'virus' is also used to refer to trojans , browser hijackers and other types...
Vulnerability A vulnerability threat may not be an actual malware parasite but a series of flaws or lack of proper security within a system or its software that could be exploited by hackers or cybercriminals. In some instances, a vulnerability threat...
Worms Worms are malicious programs that replicate or execute over computer networks or hard drives. The main difference between a worm and a virus is that a virus piggy-backs on other applications whereas a worm depends on computer networks to...

Search by Letter:
A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  0  1  2  3  4  5  6  7  8  9  

Home Malware Programs