Malware Programs

What is Malware?

Malware programs are harmful software applications designed to access a computer without the computer owner’s consent while remaining undetected. We’re able to classify programs into malware or safe programs based on our threat assessment policy. Safe programs that are listed in our database do not
pose a threat, and they may be allowed to run on your system. The goal of this malware program list is to assist you with determining which program is malware (harmful) or if a specific program has been verified as being a safe program.

The major problem that Internet users face today is distinguishing what is harmful or safe software. Malware authors have taken great lengths to blur the line between what is real and what is disguised to look real. Internet users should take it into their own hands and research a program in order to reduce the risk of loss of online privacy and security due to a malware infection. Even programs that Internet users confidently assume were secure can be infected. Social networking websites, cloud computing, and URL shortening services can now be expected as new malware contamination venues; therefore, Internet users are at a greater risk of becoming victims of malware attacks by simply falling for a socially-engineered malware trick.

Malware is not to be trusted, and it is advisable to remove it from your PC immediately after encountering it. Depending on the type of malware and the intentions of its creator, malware can download additional malware onto your machine, install unwanted toolbars, dial extremely expensive phone numbers, make your entire system behave sluggish or bombard you with excessive pop-ups and pop-under advertisements. Malware creators may also be interested in collecting your personally identifiable information, such as passwords, credit card numbers, and bank information. They steal this information with the help of trojans and keyloggers. If a program detected on your system has been classified as malware, we recommend to disable or delete the program with a reliable anti-malware program.

Top Malware (Past 7 Days)


Name Level Alias Detection count Date submitted
GayFreeVideos 1/10 N/A 73 July 24, 2009
MDRL Ransomware N/A N/A N/A August 1, 2019
Search Pulse N/A N/A N/A March 28, 2018
Chameleon Malware 7/10 N/A 1 March 20, 2013
Bad Image Virus N/A N/A N/A February 1, 2012
Microsoft Security Essentials Alert Virus 10/10 N/A 61 August 21, 2012
GandCrab Ransomware N/A N/A N/A January 29, 2018
FinFisher 6/10 N/A 78 August 20, 2012
Mockba Ransomware N/A N/A N/A October 24, 2019
'.onion File Extension' Ransomware N/A N/A N/A April 20, 2017
Traffic.outbrain.com N/A N/A N/A October 3, 2013
AES-NI Ransomware 10/10 N/A 7 April 21, 2017
APT41 N/A N/A N/A October 22, 2019
Easy Coupons Access N/A N/A N/A January 11, 2018
MyStart by Incredibar 5/10 W32.Clodb46.Trojan.d01a,
Artemis!36C55F1CCDD6,
Win32.Troj.Generic.a.(kcloud)
78,488 January 18, 2012
OnlineMapFinder 1/10 N/A 225,235 March 4, 2014
‘A Problem with the Cooling System Has Been Detected’ Message N/A N/A N/A November 16, 2013
Spora Ransomware 10/10 N/A 307 January 11, 2017
WannaCryptor Ransomware (WanaCrypt0r Ransomware) 10/10 N/A 83 March 29, 2017
Antivirus Security Pro 10/10 N/A 789 August 22, 2013
Dr Games Ads 2/10 N/A 57 November 16, 2015
DuckDuckGo N/A N/A N/A September 24, 2013
LockerGoga Ransomware N/A N/A N/A March 31, 2019
Cerber Ransomware 10/10 N/A 4,082 March 4, 2016
CryptoWall Ransomware 10/10 N/A 5,759 May 12, 2014
GELCAPSULE N/A N/A N/A October 15, 2019
Ke3chang N/A N/A N/A October 24, 2019
Kiss Ransomware N/A N/A N/A October 21, 2019
MedusaLocker Ransomware N/A N/A N/A October 18, 2019
Muhstik Ransomware N/A N/A N/A October 9, 2019
Nautilus N/A N/A N/A October 22, 2019
Nols Ransomware N/A N/A N/A October 23, 2019
Search Baron N/A N/A N/A August 23, 2019
SLOWDRIFT N/A N/A N/A October 21, 2019
Sun Ransomware N/A N/A N/A October 18, 2019
Uta Ransomware N/A N/A N/A October 18, 2019
Wiki Ransomware N/A N/A N/A October 21, 2019
A.kaytri.com 2/10 N/A 99 June 10, 2013
AtoZManuals Toolbar 1/10 N/A 132,113 August 5, 2016
Backdoor.Winnti 6/10 N/A 67 November 4, 2011
BigSeekPro N/A N/A N/A August 23, 2011
Crack/Activator 0/10 Patched3_c.BLDE,
Hacktool.Win64.HackKMS.81,
Artemis!38DE5B216C33
63 April 2, 2013
Dharma Ransomware 10/10 N/A 16,081 November 17, 2016
FinSpy 8/10 N/A 20 March 14, 2013

Click on the links below to learn more about a particular malware program. The malware program list is divided into major different malware categories which allow you to quickly search for a particular type of malware. On our malware program list, you'll find detailed malware information such as its definition, symptoms, related files, harmful registry keys, as well as manual and automatic removal methods.

Malware Programs by Category:

There are currently 31,968 program(s) in our database.

Type Description
Adware Adware is any program with the primary function of displaying advertisements. As a result, any particular adware program can only be as dangerous as the danger or safety of the (typically third-party) advertisements that it's designed to...
Annoyances Annoyances are Trojans that do not cause damage but may irritate you by making your mouse motions erratic or by turning the view on your computer screen upside down.
AOL Parasites AOL Parasites are pests that were specifically created for America OnLine users. AOL Parasites have an ability to capture your personal identifiable information, such as passwords. AOL Parasites may also do harm by arranging Service...
Backdoors Backdoors is a term describing unauthorized access to your computer system. Usually a backdoor lies in the program code and is created by a programmer. Backdoors in your computer may be accessed by attackers without your knowledge or...
Bad Toolbars Bad Toolbars are malicious toolbars that secretly install without the computer user's permission or knowledge. A bad toolbar, or malware toolbar, may come packaged with other unwanted programs. Bad Toolbars can either track every action...
Botnets A botnet is a group of computers compromised with the intention of instructing them to perform malicious actions. Botnets are usually controlled through a network protocol, such as an IRC (Internet Relay Chat), via the Internet. Systems...
Browser Helper Objects Browser Helper Objects are objects installed on your browser as a toolbar or search bar. Browser Helper Object may infect your system without your knowledge and consent just by visting unsolicited websites or with the help of Trojan...
Browser Hijackers Browser Hijackers are malicious applications that infect your computer system without your knowledge or consent. Browser hijackers have the ability to change your default homepage and search result pages as well as install additional...
Browser Plugins Browser Plugins are applications that may perform malicious tasks on your browser. Browser Plugins may have an ability to change banner advertisements of the website you are viewing, change your Home page or Search page. Once, a Browser...
Carding Carding refers to programs specifically created to perform credit card fraud. Carding may monitor your Internet shopping activities and track your credit card information. There are some carding applications that provide attackers with...
Dialers Dialers are applications that may dial higher rate telephone numbers without your knowledge or consent. A dialer can only start functioning and achieve its malicious task, only if you are using a dial-up modem.
Downloaders Downloaders are applications which may download and install additional malware on your system. The downloaded malware may have the ability to re-install itself, which makes it difficult to remove manually.
Droppers Droppers are programs designed to install hostile code onto the system of the targeted computer without you being aware of it. Most often the Dropper comes bundled with a Trojan.
Flooders Flooders are applications that may overload your Internet or Network connection with a help of fast pinging or DoS attacks.
Hacktools Hacktools are used to infiltrate a computer and allow a remote user to access the compromised system. A hacktool may be composed of different programs and scripts. Various hacktools have rootkit characteristics allowing the malware to...
Hijackers Hijackers are applications that may take control of your browser's settings in order to redirect you to other websites. Hijacker may cause your browser to behave sluggish.
Hoaxes Online hoaxes are used to mislead or frighten computer users. Usually an online hoax or scam are sent through emails or come in the form of an executable application that could put a system at risk of being compromised. Various hoax...
Keyloggers Keyloggers are malicious applications that tend to monitor your keyboard typing activities. Once inside your machine, keyloggers may keep a track of every keystroke you make and save it in a separate file. Once saved, this file can be...
Mail Bombers Mail Bombers are applications that may flood its victim's email box with enormous number of spam or other unwanted messages. Mail Bomber applications also have an ability to hide the source of the received messages.
Malware Malware is an umbrella classification for any type of malicious application, including both PC threats with independent files and viruses that insert themselves into other files. While malware also is often used to refer to suspicious...
Misleading Programs Misleading Programs are applications that deliberately misrepresent the current security status or condition of a computer. Misleading programs usually notify the computer user of a potentially unsafe security risk, unwanted application...
Nukers Nukers are applications that can perform TCP/IP DoS attacks or disable a machine by damaging the registry, key files or other system components. Nukers may affect the machines that don't have firewalls intalled.
Potentially Unwanted Programs (PUPs) A Potentially Unwanted Program or PUP is an application that's noted for characteristics that may make it undesirable even if it's not overtly malicious or harmful to your PC. PUPs often overlap with adware , which may install...
Proxy Proxy is a firewall that blocks and re-creates a connection between two points. Proxy has an ability to hide a user from the outside world or an attacker from a user. For malicious purposes a proxy may be used to make a connection...
Ransomware Ransomware is a sub-category of trojan that locks down your computer by interfering with its interface, blocking other programs or encrypting its files (a process that makes these files unusable until they're decrypted). During this...
Remote Administration Tools Remote Administration Tools are tools that can provide you with remote access of a computer. This type of spyware can enable you to fix computer problems or any similar software tasks without being in the same location with the computer....
Rogue Anti-Spyware Programs Rogue Anti-Spyware Programs are fake applications that are cleverly disguised to behave like legitimate spyware removal programs. Rogue anti-spyware programs are usually created by hackers with the sole purpose of rendering a sale for...
Rogue Anti-Virus Programs Rogue Anti-Virus Programs are fake programs that are designed to disguise and behave just like a legitimate virus removal application. Rogue anti-virus programs are usually created by hackers who attempt to take your money through...
Rogue Defragmenter Programs Rogue defragmenter programs are applications designed to mimic optimization programs or legitimate hard drive defragment tools. Rogue defragmenter programs use extortion tactics to get computer users to purchase a full version of the...
Rogue Optimizer Programs A rogue optimizer program, or a fake PC optimization tool, is an application created by cybercrooks to impersonate an application that is capable of optimizing a PC's performance through hard disk defragmentation or other system...
Rogue Registry Cleaners Rogue Registry Cleaners are deceitful and unreliable registry cleaner programs that pretend to fix or clean a computer's registry. Rogue registry cleaners use deceptive security alerts and bogus registry scans as a method to get computer...
Rootkits Rootkits are infections that contain a program or a group of programs usually programmed to go undetected in order to take control of a computer. In some cases, a rootkit may come in the form of a Trojan presented in a way that makes...
Search Hijackers Search Hijackers are malicious applications that may modify your search page and display unwanted advertisements on your computer screen. The hijacking technique enables the attacker to have control over your browser. A search hijacker...
Sniffers Sniffers are applications that may eavesdrop on computer networks and can search for clear-text or password hashes in the network or Internet connection.
Spam Tools Spam Tools are tools designed to spread spam. Spam Tools may keep a track of email addresses from various websites and may include malicious programs that spams users with emails or instant messages. Spam Tools may also tend to remove...
Spyware Spyware is a classification of malicious software that's based on the ultimate consequence of their attacks: theft of information from your PC, especially private or potentially profitable data. Spyware is often designed to steal...
Tracking Cookies Tracking Cookies are cookies that are shared among websites in order to track your Internet browsing habits. Every time user visits a website, the computer accepts a cookie and every other time the recognition becomes easier. However,...
Trackware Trackware is a software application that may send your personal identifiable information by the means of Internet connection.
Trojan Sources Trojan Sources are source code written by a programmer in a sophisticated language which can be read only by people. Source code must be converted to object code or machine language in order to make it readable by a computer or...
Trojans Trojans are malicious files that don't have any type of included distribution technique (unlike viruses or worms ). Although some trojans are disguised as benevolent files that are distributed via spam and social networking routes,...
Virus Creation Tools Virus Creation Tools are applications designed to create viruses. The tool is able to generate a large number of different viruses.
Viruses A virus is hostile software that replicates its own code inside unrelated files, especially executable or .exe files. In casual parlance, although the term 'virus' is also used to refer to trojans , browser hijackers and other types...
Vulnerability A vulnerability threat may not be an actual malware parasite but a series of flaws or lack of proper security within a system or its software that could be exploited by hackers or cybercriminals. In some instances, a vulnerability threat...
Worms Worms are malicious programs that replicate or execute over computer networks or hard drives. The main difference between a worm and a virus is that a virus piggy-backs on other applications whereas a worm depends on computer networks to...

Search by Letter:
A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  0  1  2  3  4  5  6  7  8  9  

Home Malware Programs