Malware Programs

What is Malware?

Malware programs are harmful software applications designed to access a computer without the computer owner’s consent while remaining undetected. We’re able to classify programs into malware or safe programs based on our threat assessment policy. Safe programs that are listed in our database do not
pose a threat, and they may be allowed to run on your system. The goal of this malware program list is to assist you with determining which program is malware (harmful) or if a specific program has been verified as being a safe program.

The major problem that Internet users face today is distinguishing what is harmful or safe software. Malware authors have taken great lengths to blur the line between what is real and what is disguised to look real. Internet users should take it into their own hands and research a program in order to reduce the risk of loss of online privacy and security due to a malware infection. Even programs that Internet users confidently assume were secure can be infected. Social networking websites, cloud computing, and URL shortening services can now be expected as new malware contamination venues; therefore, Internet users are at a greater risk of becoming victims of malware attacks by simply falling for a socially-engineered malware trick.

Malware is not to be trusted, and it is advisable to remove it from your PC immediately after encountering it. Depending on the type of malware and the intentions of its creator, malware can download additional malware onto your machine, install unwanted toolbars, dial extremely expensive phone numbers, make your entire system behave sluggish or bombard you with excessive pop-ups and pop-under advertisements. Malware creators may also be interested in collecting your personally identifiable information, such as passwords, credit card numbers, and bank information. They steal this information with the help of trojans and keyloggers. If a program detected on your system has been classified as malware, we recommend to disable or delete the program with a reliable anti-malware program.

Top Malware (Past 7 Days)


Name Level Alias Detection count Date submitted
GayFreeVideos 1/10 N/A 80 July 24, 2009
Search Pulse N/A N/A N/A March 28, 2018
Bot Ransomware N/A N/A N/A October 29, 2019
Dr Games Ads 2/10 N/A 57 November 16, 2015
QSnatch N/A N/A N/A October 31, 2019
Microsoft Security Essentials Alert Virus 10/10 N/A 61 August 21, 2012
COCKROACH_LOCKER Ransomware N/A N/A N/A October 28, 2019
MDRL Ransomware N/A N/A N/A August 1, 2019
Worm:VBS/Jenxcus.A 5/10 N/A 5,335 May 24, 2013
Servedby.flashtalking.com N/A N/A N/A December 5, 2013
UDS:DangerousObject.Multi.Generic 7/10 JS.Downloader.BSO,
VBS/Dldr.Rowm.A,
VBS.Siggen.7444
1,761,198 June 26, 2013
Traffic.outbrain.com N/A N/A N/A October 3, 2013
Virus.Xorer.gen!I 8/10 Trj/Pagepif.A,
Generic2.NSM,
W32/Agent.ABJ!tr
464 February 5, 2013
SMSS-DoOoM 5/10 N/A 91 January 5, 2015
Bad Image Virus N/A N/A N/A February 1, 2012
_readme Ransomware N/A N/A N/A November 13, 2018
Buddy Ransomware 10/10 N/A 68 February 3, 2016
CryptPKO Ransomware 10/10 N/A 27 July 30, 2015
Dharma Ransomware 10/10 N/A 17,517 November 17, 2016
DuckDuckGo N/A N/A N/A September 24, 2013
GandCrab Ransomware N/A N/A N/A January 29, 2018
Search Dimension 8/10 N/A 10,029 March 28, 2017
‘Unlock11@protonmail.com' Ransomware N/A N/A N/A June 13, 2019
VIPXXXVideo 1/10 N/A 5 July 24, 2009
Virus.Win32.Neshta.a 8/10 Neshta.C,
Heuristic.BehavesLike.Win32.Suspicious.D,
Heuristic.BehavesLike.Win32.Suspicious.L
1,234 February 1, 2011
Virus.Win32.Pioneer.bl 8/10 N/A 27 March 11, 2013
Xda Ransomware N/A N/A N/A October 29, 2019
Backdoor:Win32/Zegost.H 6/10 N/A 1,241 October 13, 2011
BUYUNLOCKCODE N/A N/A N/A January 2, 2015
From Doc to Pdf Toolbar 1/10 N/A 721,226 July 24, 2013
Hermes837 Ransomware N/A N/A N/A September 18, 2019
Landing.savetubevideo.com 6/10 BackDoor.Generic14.AFUT,
Trojan.Win32.Generic.12893B1C,
Trojan.Gen
14 March 1, 2012
Mespinoza Ransomware N/A N/A N/A October 30, 2019
Phobos Ransomware 10/10 Win32.Trojan.Obfuscated.gx.3,
Downloader.Obfuskated,
Trojan.Crypt.XPACK.Gen
110 October 23, 2017
SIFRELI Ransowmare N/A N/A N/A November 1, 2019
Snake Rootkit 10/10 N/A 60 March 13, 2014
Trident File Locker 8/10 N/A 65 March 23, 2017
W32/Child-Porn.PROXY/Server 8/10 N/A 45 December 28, 2011
Adware.Laflurla 2/10 N/A 1,101 March 14, 2014
Backdoor.Bot 8/10 Generic16.CDTS,
Trojan.Win32.Midgare,
Trojan.Win32.Inject.flr
9 July 17, 2009
BURAN Ransomware N/A N/A N/A June 5, 2019
Cry36 Ransomware 8/10 N/A 71 June 8, 2017
Decrypme Ransomware N/A N/A N/A November 1, 2019
Drunk-Party-Porn 1/10 N/A 1 July 15, 2007
Encryptd Ransomware N/A N/A N/A October 30, 2019
EoRezo 2/10 Adware/BHO,
Adware/EoRezo.A.72,
Application.Generic.384998
1,700,292 November 7, 2011
Hermes 2.1 Ransomware 10/10 N/A 66 November 6, 2017
Mal/HTMLGen-A 6/10 N/A 55 April 24, 2012
Qsearch.com N/A N/A N/A November 21, 2011
Spidey Bot N/A N/A N/A October 25, 2019

Click on the links below to learn more about a particular malware program. The malware program list is divided into major different malware categories which allow you to quickly search for a particular type of malware. On our malware program list, you'll find detailed malware information such as its definition, symptoms, related files, harmful registry keys, as well as manual and automatic removal methods.

Malware Programs by Category:

There are currently 32,074 program(s) in our database.

Type Description
Adware Adware is any program with the primary function of displaying advertisements. As a result, any particular adware program can only be as dangerous as the danger or safety of the (typically third-party) advertisements that it's designed to...
Annoyances Annoyances are Trojans that do not cause damage but may irritate you by making your mouse motions erratic or by turning the view on your computer screen upside down.
AOL Parasites AOL Parasites are pests that were specifically created for America OnLine users. AOL Parasites have an ability to capture your personal identifiable information, such as passwords. AOL Parasites may also do harm by arranging Service...
Backdoors Backdoors is a term describing unauthorized access to your computer system. Usually a backdoor lies in the program code and is created by a programmer. Backdoors in your computer may be accessed by attackers without your knowledge or...
Bad Toolbars Bad Toolbars are malicious toolbars that secretly install without the computer user's permission or knowledge. A bad toolbar, or malware toolbar, may come packaged with other unwanted programs. Bad Toolbars can either track every action...
Botnets A botnet is a group of computers compromised with the intention of instructing them to perform malicious actions. Botnets are usually controlled through a network protocol, such as an IRC (Internet Relay Chat), via the Internet. Systems...
Browser Helper Objects Browser Helper Objects are objects installed on your browser as a toolbar or search bar. Browser Helper Object may infect your system without your knowledge and consent just by visting unsolicited websites or with the help of Trojan...
Browser Hijackers Browser Hijackers are malicious applications that infect your computer system without your knowledge or consent. Browser hijackers have the ability to change your default homepage and search result pages as well as install additional...
Browser Plugins Browser Plugins are applications that may perform malicious tasks on your browser. Browser Plugins may have an ability to change banner advertisements of the website you are viewing, change your Home page or Search page. Once, a Browser...
Carding Carding refers to programs specifically created to perform credit card fraud. Carding may monitor your Internet shopping activities and track your credit card information. There are some carding applications that provide attackers with...
Dialers Dialers are applications that may dial higher rate telephone numbers without your knowledge or consent. A dialer can only start functioning and achieve its malicious task, only if you are using a dial-up modem.
Downloaders Downloaders are applications which may download and install additional malware on your system. The downloaded malware may have the ability to re-install itself, which makes it difficult to remove manually.
Droppers Droppers are programs designed to install hostile code onto the system of the targeted computer without you being aware of it. Most often the Dropper comes bundled with a Trojan.
Flooders Flooders are applications that may overload your Internet or Network connection with a help of fast pinging or DoS attacks.
Hacktools Hacktools are used to infiltrate a computer and allow a remote user to access the compromised system. A hacktool may be composed of different programs and scripts. Various hacktools have rootkit characteristics allowing the malware to...
Hijackers Hijackers are applications that may take control of your browser's settings in order to redirect you to other websites. Hijacker may cause your browser to behave sluggish.
Hoaxes Online hoaxes are used to mislead or frighten computer users. Usually an online hoax or scam are sent through emails or come in the form of an executable application that could put a system at risk of being compromised. Various hoax...
Keyloggers Keyloggers are malicious applications that tend to monitor your keyboard typing activities. Once inside your machine, keyloggers may keep a track of every keystroke you make and save it in a separate file. Once saved, this file can be...
Mail Bombers Mail Bombers are applications that may flood its victim's email box with enormous number of spam or other unwanted messages. Mail Bomber applications also have an ability to hide the source of the received messages.
Malware Malware is an umbrella classification for any type of malicious application, including both PC threats with independent files and viruses that insert themselves into other files. While malware also is often used to refer to suspicious...
Misleading Programs Misleading Programs are applications that deliberately misrepresent the current security status or condition of a computer. Misleading programs usually notify the computer user of a potentially unsafe security risk, unwanted application...
Nukers Nukers are applications that can perform TCP/IP DoS attacks or disable a machine by damaging the registry, key files or other system components. Nukers may affect the machines that don't have firewalls intalled.
Potentially Unwanted Programs (PUPs) A Potentially Unwanted Program or PUP is an application that's noted for characteristics that may make it undesirable even if it's not overtly malicious or harmful to your PC. PUPs often overlap with adware , which may install...
Proxy Proxy is a firewall that blocks and re-creates a connection between two points. Proxy has an ability to hide a user from the outside world or an attacker from a user. For malicious purposes a proxy may be used to make a connection...
Ransomware Ransomware is a sub-category of trojan that locks down your computer by interfering with its interface, blocking other programs or encrypting its files (a process that makes these files unusable until they're decrypted). During this...
Remote Administration Tools Remote Administration Tools are tools that can provide you with remote access of a computer. This type of spyware can enable you to fix computer problems or any similar software tasks without being in the same location with the computer....
Rogue Anti-Spyware Programs Rogue Anti-Spyware Programs are fake applications that are cleverly disguised to behave like legitimate spyware removal programs. Rogue anti-spyware programs are usually created by hackers with the sole purpose of rendering a sale for...
Rogue Anti-Virus Programs Rogue Anti-Virus Programs are fake programs that are designed to disguise and behave just like a legitimate virus removal application. Rogue anti-virus programs are usually created by hackers who attempt to take your money through...
Rogue Defragmenter Programs Rogue defragmenter programs are applications designed to mimic optimization programs or legitimate hard drive defragment tools. Rogue defragmenter programs use extortion tactics to get computer users to purchase a full version of the...
Rogue Optimizer Programs A rogue optimizer program, or a fake PC optimization tool, is an application created by cybercrooks to impersonate an application that is capable of optimizing a PC's performance through hard disk defragmentation or other system...
Rogue Registry Cleaners Rogue Registry Cleaners are deceitful and unreliable registry cleaner programs that pretend to fix or clean a computer's registry. Rogue registry cleaners use deceptive security alerts and bogus registry scans as a method to get computer...
Rootkits Rootkits are infections that contain a program or a group of programs usually programmed to go undetected in order to take control of a computer. In some cases, a rootkit may come in the form of a Trojan presented in a way that makes...
Search Hijackers Search Hijackers are malicious applications that may modify your search page and display unwanted advertisements on your computer screen. The hijacking technique enables the attacker to have control over your browser. A search hijacker...
Sniffers Sniffers are applications that may eavesdrop on computer networks and can search for clear-text or password hashes in the network or Internet connection.
Spam Tools Spam Tools are tools designed to spread spam. Spam Tools may keep a track of email addresses from various websites and may include malicious programs that spams users with emails or instant messages. Spam Tools may also tend to remove...
Spyware Spyware is a classification of malicious software that's based on the ultimate consequence of their attacks: theft of information from your PC, especially private or potentially profitable data. Spyware is often designed to steal...
Tracking Cookies Tracking Cookies are cookies that are shared among websites in order to track your Internet browsing habits. Every time user visits a website, the computer accepts a cookie and every other time the recognition becomes easier. However,...
Trackware Trackware is a software application that may send your personal identifiable information by the means of Internet connection.
Trojan Sources Trojan Sources are source code written by a programmer in a sophisticated language which can be read only by people. Source code must be converted to object code or machine language in order to make it readable by a computer or...
Trojans Trojans are malicious files that don't have any type of included distribution technique (unlike viruses or worms ). Although some trojans are disguised as benevolent files that are distributed via spam and social networking routes,...
Virus Creation Tools Virus Creation Tools are applications designed to create viruses. The tool is able to generate a large number of different viruses.
Viruses A virus is hostile software that replicates its own code inside unrelated files, especially executable or .exe files. In casual parlance, although the term 'virus' is also used to refer to trojans , browser hijackers and other types...
Vulnerability A vulnerability threat may not be an actual malware parasite but a series of flaws or lack of proper security within a system or its software that could be exploited by hackers or cybercriminals. In some instances, a vulnerability threat...
Worms Worms are malicious programs that replicate or execute over computer networks or hard drives. The main difference between a worm and a virus is that a virus piggy-backs on other applications whereas a worm depends on computer networks to...

Search by Letter:
A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  0  1  2  3  4  5  6  7  8  9  

Home Malware Programs