Sample Data
20 Recent Samples
File Name Publisher ProductVersion Size (kb) Signed Time Stamp
PC Matic File Details
File Nametroj_generic_d089268bf2ceac40fe0034e5a58b571841c00f0025fdb285db5b0e69b9b29a96.exe
File Pathc:\Users\***\Downloads\troj_generic_d089268bf2ceac40fe0034e5a58b571841c00f0025fdb285db5b0e69b9b29a96.exe
MD5 Hash0xa8b88979c5e704dfa36ca9ce3c21672e
troj_generic_d089268bf2ce B<86:5=2:ADED@?;JJ;7CD= 842 10-26 05:00
PC Matic File Details
File Nametroj_generic_e2c94375582239ab3b468520d27a48cdcc3a08a2d0e9e19a1786a2f1d75fae15.exe
File Pathc:\Users\***\Downloads\troj_generic_e2c94375582239ab3b468520d27a48cdcc3a08a2d0e9e19a1786a2f1d75fae15.exe
MD5 Hash0x76c9b5acba0c0b26318d3260dcc8396a
troj_generic_e2c943755822 unknown vendor 266 10-26 05:00
PC Matic File Details
File Nameworm_0c17443b34f04ed37f2e50776bfc0a23adb6605bf69464b66223a50e0c46ca03.exe
File Pathc:\Users\***\Downloads\worm_0c17443b34f04ed37f2e50776bfc0a23adb6605bf69464b66223a50e0c46ca03.exe
MD5 Hash0x09c9821eb495a7219a33708daa497f0d
worm_0c17443b34f04ed37f2e unknown vendora2 3.57 77 10-26 05:00
PC Matic File Details
File Nameworm_8e6300231f44c97145d0eb9bdcea3f55e8890fbeb482e6d45a01a845485f2020.exe
File Pathc:\Users\***\Downloads\worm_8e6300231f44c97145d0eb9bdcea3f55e8890fbeb482e6d45a01a845485f2020.exe
MD5 Hash0xba56261275ebcf30c018e588d4148127
worm_8e6300231f44c97145d0 Xiang CorporationMicrosoft Firewall 1.00.0007 3508 10-26 04:59
PC Matic File Details
File Namehagabi.exe
File PathC:\PROGRA~2\COMMON~1\14D812~1\hagabi.exe
MD5 Hash0x8233f6a09c1edc669b8c87764fbc36c5
hagabi Igor Pavlov7-Zip 18.05 718 10-26 02:30
A Real-Time List of Recent Virus Samples

The 20 programs listed above are all viruses that PC Matic has blocked and trapped very recently (often in the same day as you are reading this) that traditional anti-virus has yet to discover. The time stamp is a good indication of the rate at which PC Matic collects new samples and also the degree to which PC Matic users enjoy superior protection over traditional AV.

You’ll see some familiar brand names in the “Publisher” and “Product” fields — all of which are false. Virus writers use trusted names to try and fool you and your AV software into thinking these are legitimate programs. Hover over the plus sign to get more information about the sample. Included is the MD5 hash, the directory from which the file tried to execute, and the complete name of the file itself.

The database is live so if you hit refresh, you can see the new viruses entering our database real time.

Viruses are just one element of the threat to computers. The new frontier is called “exploits.” Read more.