Home Malware Programs

Malware Programs

What is Malware?

Malware programs are harmful software applications designed to access a computer without the computer owner’s consent while remaining undetected. We’re able to classify programs into malware or safe programs based on our threat assessment policy. Safe programs that are listed in our database do not
pose a threat, and they may be allowed to run on your system. The goal of this malware program list is to assist you with determining which program is malware (harmful) or if a specific program has been verified as being a safe program.

The major problem that Internet users face today is distinguishing what is harmful or safe software. Malware authors have taken great lengths to blur the line between what is real and what is disguised to look real. Internet users should take it into their own hands and research a program in order to reduce the risk of loss of online privacy and security due to a malware infection. Even programs that Internet users confidently assume were secure can be infected. Social networking websites, cloud computing, and URL shortening services can now be expected as new malware contamination venues; therefore, Internet users are at a greater risk of becoming victims of malware attacks by simply falling for a socially-engineered malware trick.

Malware is not to be trusted, and it is advisable to remove it from your PC immediately after encountering it. Depending on the type of malware and the intentions of its creator, malware can download additional malware onto your machine, install unwanted toolbars, dial extremely expensive phone numbers, make your entire system behave sluggish or bombard you with excessive pop-ups and pop-under advertisements. Malware creators may also be interested in collecting your personally identifiable information, such as passwords, credit card numbers, and bank information. They steal this information with the help of trojans and keyloggers. If a program detected on your system has been classified as malware, we recommend to disable or delete the program with a reliable anti-malware program.

Top Malware (Past 7 Days)


Name Level Alias Detection count Date submitted
Maturetube.me 2/10 - 5 July 21, 2023
Doods.pro 2/10 - 3,881 September 1, 2023
FinSpy 8/10 - 20 March 14, 2013
1xlite-178009.top 2/10 - 208 December 28, 2023
Win-bigdrip.top 2/10 - 379 December 14, 2023
XFirefox.exe - - March 22, 2017
Networkrush.co.in 2/10 - 1,007 February 29, 2024
Googlesyndication - - January 8, 2021
Xxxvibeo.com 2/10 - 23 July 23, 2023
Findcams.live 2/10 - 822 October 27, 2023
Subromoze.co.in 2/10 - 159 February 29, 2024
Wrilabliquanis.co.in 2/10 - 94 February 7, 2024
Theync.com 2/10 - 1,038 October 18, 2023
Grapsicsterth.co.in 2/10 - 112 February 19, 2024
Xerxes Malware - - July 21, 2020
Counter.Yadro.ru - - May 2, 2014
SUTRA TDS 2/10 - 60 December 24, 2011
Loasov.co.in 2/10 - 43 December 14, 2023
GayBoyLove 1/10 - 94 July 24, 2009
7starhd.tools 2/10 - 34 July 24, 2023
1xlite-773181.top 2/10 - 54 January 19, 2024
Runicforgecrafter.com 2/10 - 860 March 6, 2024
Azogelestopan.co.in 2/10 - 98 February 29, 2024
Duciantremeth.co.in 2/10 - 56 February 29, 2024
Javsecrets.com 2/10 - 267 December 22, 2023
Finderfinding.com 2/10 - 21 March 6, 2024
Trojan.Script.Heuristic-js.iacgm 9/10 - 16 October 24, 2013
Trustmicapp.com 2/10 - 20 December 31, 2023
Fapmove.com 2/10 - 255 October 22, 2023
1xlite-846907.top 2/10 - 28 March 1, 2024
How to Remove DLL Files - - June 6, 2006
Ikuwyz.com 2/10 - 44 December 14, 2023
Creative.rmhfrtnd.com 2/10 - 1,377 January 3, 2024
W32.Fixflo 2/10 - 54,639 September 4, 2012
Nonremid.com 2/10 - 2,689 October 11, 2023
Trojan.Atraxbot 9/10 - 14 August 15, 2013
Worm.Python.Agent 5/10 - 29,628 July 15, 2017
Kts.vasstycom.com 2/10 - 88 December 28, 2023
Win32/Helompy 5/10 - 967 December 14, 2011
Macmagi.co.in 2/10 - 473 December 17, 2023
Ardamax Keylogger 8/10 ArdamaxKeylogger,
not-a-virus:Monitor.Win32.Ardamax.24,
Not-A-Virus.Monitor.Win32.Ardamax.24
34 March 28, 2006
Worm.Folstart.A 5/10 Worm.Generic.311224,
Worm.Generic.320405,
Worm/Generic_r.JV
595 May 31, 2011
Brob.co.in 2/10 - 391 February 5, 2024
ClipBanker Trojan 8/10 - 92,878 February 26, 2016
Shovelocresubes.co.in 2/10 - 40 February 26, 2024
Hotleak.vip 2/10 - 724 June 30, 2023
Hollymediaa.biz 2/10 - 518 December 11, 2023
Dateforlocals.com 2/10 - 309 November 1, 2023
SocGholish - - December 21, 2020
DNS Unlocker 2/10 - 1,077,122 June 15, 2015

Click on the links below to learn more about a particular malware program. The malware program list is divided into major different malware categories which allow you to quickly search for a particular type of malware. On our malware program list, you'll find detailed malware information such as its definition, symptoms, related files, harmful registry keys, as well as manual and automatic removal methods.

Malware Programs by Category:

There are currently 42,621 program(s) in our database.

Type Description
Advanced Persistent Threat (APT)
Adware Adware is any program with the primary function of displaying advertisements. As a result, any particular adware program can only be as dangerous as the danger or safety of the (typically third-party) advertisements that it's designed to...
Annoyances Annoyances are Trojans that do not cause damage but may irritate you by making your mouse motions erratic or by turning the view on your computer screen upside down.
AOL Parasites AOL Parasites are pests that were specifically created for America OnLine users. AOL Parasites have an ability to capture your personal identifiable information, such as passwords. AOL Parasites may also do harm by arranging Service...
Backdoors Backdoors is a term describing unauthorized access to your computer system. Usually a backdoor lies in the program code and is created by a programmer. Backdoors in your computer may be accessed by attackers without your knowledge or...
Bad Toolbars Bad Toolbars are malicious toolbars that secretly install without the computer user's permission or knowledge. A bad toolbar, or malware toolbar, may come packaged with other unwanted programs. Bad Toolbars can either track every action...
Botnets A botnet is a group of computers compromised with the intention of instructing them to perform malicious actions. Botnets are usually controlled through a network protocol, such as an IRC (Internet Relay Chat), via the Internet. Systems...
Browser Helper Objects Browser Helper Objects are objects installed on your browser as a toolbar or search bar. Browser Helper Object may infect your system without your knowledge and consent just by visting unsolicited websites or with the help of Trojan...
Browser Hijackers Browser Hijackers are malicious applications that infect your computer system without your knowledge or consent. Browser hijackers have the ability to change your default homepage and search result pages as well as install additional...
Browser Plugins Browser Plugins are applications that may perform malicious tasks on your browser. Browser Plugins may have an ability to change banner advertisements of the website you are viewing, change your Home page or Search page. Once, a Browser...
Carding Carding refers to programs specifically created to perform credit card fraud. Carding may monitor your Internet shopping activities and track your credit card information. There are some carding applications that provide attackers with...
Crack/Activator bad
Dialers Dialers are applications that may dial higher rate telephone numbers without your knowledge or consent. A dialer can only start functioning and achieve its malicious task, only if you are using a dial-up modem.
Downloaders Downloaders are applications which may download and install additional malware on your system. The downloaded malware may have the ability to re-install itself, which makes it difficult to remove manually.
Droppers Droppers are programs designed to install hostile code onto the system of the targeted computer without you being aware of it. Most often the Dropper comes bundled with a Trojan.
Fake Warning Messages Fake warning messages, or fake security alerts, are deceptive messages that usually come in the form of a pop-up or a web page. "Fake warning messages" are known to be associated with fraudulent security software such as rogue...
Flooders Flooders are applications that may overload your Internet or Network connection with a help of fast pinging or DoS attacks.
Hacktool
Hacktools Hacktools are used to infiltrate a computer and allow a remote user to access the compromised system. A hacktool may be composed of different programs and scripts. Various hacktools have rootkit characteristics allowing the malware to...
Hijackers Hijackers are applications that may take control of your browser's settings in order to redirect you to other websites. Hijacker may cause your browser to behave sluggish.
Hoaxes Online hoaxes are used to mislead or frighten computer users. Usually an online hoax or scam are sent through emails or come in the form of an executable application that could put a system at risk of being compromised. Various hoax...
Keyloggers Keyloggers are malicious applications that tend to monitor your keyboard typing activities. Once inside your machine, keyloggers may keep a track of every keystroke you make and save it in a separate file. Once saved, this file can be...
Mac Malware
Mail Bombers Mail Bombers are applications that may flood its victim's email box with enormous number of spam or other unwanted messages. Mail Bomber applications also have an ability to hide the source of the received messages.
Malware Malware is an umbrella classification for any type of malicious application, including both PC threats with independent files and viruses that insert themselves into other files. While malware also is often used to refer to suspicious...
Misleading Programs Misleading Programs are applications that deliberately misrepresent the current security status or condition of a computer. Misleading programs usually notify the computer user of a potentially unsafe security risk, unwanted application...
Nukers Nukers are applications that can perform TCP/IP DoS attacks or disable a machine by damaging the registry, key files or other system components. Nukers may affect the machines that don't have firewalls intalled.
Potentially Unwanted Programs (PUPs) A Potentially Unwanted Program or PUP is an application that's noted for characteristics that may make it undesirable even if it's not overtly malicious or harmful to your PC. PUPs often overlap with adware , which may install...
Proxy Proxy is a firewall that blocks and re-creates a connection between two points. Proxy has an ability to hide a user from the outside world or an attacker from a user. For malicious purposes a proxy may be used to make a connection...
Ransomware Ransomware is a sub-category of trojan that locks down your computer by interfering with its interface, blocking other programs or encrypting its files (a process that makes these files unusable until they're decrypted). During this...
Remote Administration Tools Remote Administration Tools are tools that can provide you with remote access of a computer. This type of spyware can enable you to fix computer problems or any similar software tasks without being in the same location with the computer....
Rogue Anti-Spyware Programs Rogue Anti-Spyware Programs are fake applications that are cleverly disguised to behave like legitimate spyware removal programs. Rogue anti-spyware programs are usually created by hackers with the sole purpose of rendering a sale for...
Rogue Anti-Virus Programs Rogue Anti-Virus Programs are fake programs that are designed to disguise and behave just like a legitimate virus removal application. Rogue anti-virus programs are usually created by hackers who attempt to take your money through...
Rogue Defragmenter Programs Rogue defragmenter programs are applications designed to mimic optimization programs or legitimate hard drive defragment tools. Rogue defragmenter programs use extortion tactics to get computer users to purchase a full version of the...
Rogue Optimizer Programs A rogue optimizer program, or a fake PC optimization tool, is an application created by cybercrooks to impersonate an application that is capable of optimizing a PC's performance through hard disk defragmentation or other system...
Rogue Registry Cleaners Rogue Registry Cleaners are deceitful and unreliable registry cleaner programs that pretend to fix or clean a computer's registry. Rogue registry cleaners use deceptive security alerts and bogus registry scans as a method to get computer...
Rootkits Rootkits are infections that contain a program or a group of programs usually programmed to go undetected in order to take control of a computer. In some cases, a rootkit may come in the form of a Trojan presented in a way that makes...
Search Hijackers Search Hijackers are malicious applications that may modify your search page and display unwanted advertisements on your computer screen. The hijacking technique enables the attacker to have control over your browser. A search hijacker...
Sniffers Sniffers are applications that may eavesdrop on computer networks and can search for clear-text or password hashes in the network or Internet connection.
Spam Tools Spam Tools are tools designed to spread spam. Spam Tools may keep a track of email addresses from various websites and may include malicious programs that spams users with emails or instant messages. Spam Tools may also tend to remove...
Spyware Spyware is a classification of malicious software that's based on the ultimate consequence of their attacks: theft of information from your PC, especially private or potentially profitable data. Spyware is often designed to steal...
Tracking Cookies Tracking Cookies are cookies that are shared among websites in order to track your Internet browsing habits. Every time user visits a website, the computer accepts a cookie and every other time the recognition becomes easier. However,...
Trackware Trackware is a software application that may send your personal identifiable information by the means of Internet connection.
Trojan Sources Trojan Sources are source code written by a programmer in a sophisticated language which can be read only by people. Source code must be converted to object code or machine language in order to make it readable by a computer or...
Trojans Trojans are malicious files that don't have any type of included distribution technique (unlike viruses or worms ). Although some trojans are disguised as benevolent files that are distributed via spam and social networking routes,...
Virus Creation Tools Virus Creation Tools are applications designed to create viruses. The tool is able to generate a large number of different viruses.
Viruses A virus is hostile software that replicates its own code inside unrelated files, especially executable or .exe files. In casual parlance, although the term 'virus' is also used to refer to trojans , browser hijackers and other types...
Vulnerability A vulnerability threat may not be an actual malware parasite but a series of flaws or lack of proper security within a system or its software that could be exploited by hackers or cybercriminals. In some instances, a vulnerability threat...
Worms Worms are malicious programs that replicate or execute over computer networks or hard drives. The main difference between a worm and a virus is that a virus piggy-backs on other applications whereas a worm depends on computer networks to...