System Files Reference Book

by Lucia Danes - - Updated | Type: All

A file is usually described as a storage unit filled with data, information, settings, or commands about a program. The computer system consists of various files that use a different amount of its resources. Each PC system is filled with thousands of filenames located in different locations. The most popular types of files are system files, program files, data files, executable files, text files and directory files. You can identify them with the help of their extensions (short additions that are added to the end of their name). No matter which OS is installed on your computer, files are organized with the help of folders. They are stored on a hard drive and other storage devices. You can change or rename the most of your files.

There are two groups of files – harmless and malicious. Harmless files are totally reliable system components that are needed for a proper PC’s functionality. They are related to legitimate applications, so you shouldn't remove them from your computer. The most important ones are system files. They are critically related to a normal functionality of a computer. After deleting or modifying such files, you can seriously injure it.

Malicious files can pose serious harm to your computer. They can significantly decrease system’s speed, stability, and functionality because they tend to consume lots of memory and a disk space. Beware that it’s very hard to spot the malicious file without the help of security software because malware creators use various tricks for hiding them in the system. For example, they can use the filenames that are almost identical to the ones that are used by legitimate applications. In addition, they can try to hide them in different locations. At first, the name of such file may seem very similar to the name of a legitimate file. However, after looking at it closer, it becomes clear that it is written with some spelling mistakes. The easiest way to know whether your PC system is filled with malicious files or not, is to scan it with the reliable anti-spyware.

For helping you to see the difference between malicious and legitimate files, we created the Files section. Here, you can find hundreds of different files that are related to either legitimate applications or computer viruses. They all can be identified by their extensions. The most popular of them are .exe, .dll, .db and .lnk. Of course, these are more malicious files than legitimate files in this section because our aim is to help you identify an infected PC system.

Each of files added to Files section has a description and a verdict (or a status of the file). This rating is the most important thing that you should check if you have no time to read the whole description of a file. In addition, you can see a list of tools that are recommended for computer’s diagnosis. If you see that you are dealing with the malicious file, you should select one of our recommended programs and remove it from your computer.

Latest Files Added to the Database

What is the function of dllhost.exe

The original Dllhost.exe is a legitimate Windows file Dllhost.exe is a legitimate process, which belongs to Microsoft Windows Operating System.This executable process is popularly known as COM surrogate, which manages DLL based applications.< a class="more_link" href="">More
Files System files   July 25, 2017

Define mshta.exe file. Do I need it?

How does Mshta.exe file work? Mshta.exe file is an executable file which can be found on Windows operating systems, specifically, in the C:WindowsSystem32 directory.< a class="more_link" href="">More
Files   July 21, 2017

Do I need arp.exe file?

Arp.exe stands for Address Resolution Protocol command. The latter serves for transferring Internet layer to link layer addresses.< a class="more_link" href="">More
Application files Files   July 13, 2017

Information updated: 2017-05-11

Like us on Facebook