System Files Reference Book

by - - | Type: All

A file is usually described as a storage unit filled with data, information, settings, or commands about a program. The computer system consists of various files that use a different amount of its resources. Each PC system is filled with thousands of filenames located in different locations. The most popular types of files are system files, program files, data files, executable files, text files and directory files. You can identify them with the help of their extensions (short additions that are added to the end of their name). No matter which OS is installed on your computer, files are organized with the help of folders. They are stored on a hard drive and other storage devices. You can change or rename the most of your files.

There are two groups of files - harmless and malicious. Harmless files are totally reliable system components that are needed for a proper PC’s functionality. They are related to legitimate applications, so you shouldn't remove them from your computer. The most important ones are system files. They are critically related to a normal functionality of a computer. After deleting or modifying such files, you can seriously injure it.

Malicious files can pose serious harm to your computer. They can significantly decrease system’s speed, stability, and functionality because they tend to consume lots of memory and a disk space. Beware that it’s very hard to spot the malicious file without the help of security software because malware creators use various tricks for hiding them in the system. For example, they can use the filenames that are almost identical to the ones that are used by legitimate applications. In addition, they can try to hide them in different locations. At first, the name of such file may seem very similar to the name of a legitimate file. However, after looking at it closer, it becomes clear that it is written with some spelling mistakes. The easiest way to know whether your PC system is filled with malicious files or not, is to scan it with the reliable anti-spyware.

For helping you to see the difference between malicious and legitimate files, we created the Files section. Here, you can find hundreds of different files that are related to either legitimate applications or computer viruses. They all can be identified by their extensions. The most popular of them are .exe, .dll, .db and .lnk. Of course, these are more malicious files than legitimate files in this section because our aim is to help you identify an infected PC system.

Each of files added to Files section has a description and a verdict (or a status of the file). This rating is the most important thing that you should check if you have no time to read the whole description of a file. In addition, you can see a list of tools that are recommended for computer’s diagnosis. If you see that you are dealing with the malicious file, you should select one of our recommended programs and remove it from your computer.

Latest Files Added to The Database:

How to restore files.hta information

What information does How to restore files.hta file hide? How to restore files.hta is an HTML application that informs about ransomware infection. Nevertheless, this file is not malicious itself; it is related to Apocalypse and Globe ransomware viruses. More
 April 03, 2017
Gup.exe information

Gup.exe information

What gup.exe versions are out there? gup.exe is a legitimate executable file, which is also known as GUP or a free Generic Updater. More
 March 27, 2017

What is the function of cookies.sqlite

What is the purpose of cookies.sqlite? cookies.sqlite is a legitimate Mozilla Firefox data file that stores cookies in the Firefox profile folder. A cookie is a small piece of information that is sent by visited websites and stored on the user's computer. More
 March 20, 2017

Information updated: 2015-10-27

Like us on Facebook