• Home
  • About 404TS
  • Contact

404 Tech Support

Where IT Help is Found

  • Articles
    • Code
    • Entertainment
    • Going Green
    • Hardware, Gadgets, and Products
    • Management
    • Network
    • News
    • Operating Systems
    • Security and Privacy
    • Software
    • System Administration
    • Talking Points
    • Tech Solutions
    • Web
    • Webmaster
  • Reviews
  • Media
    • Infographics
    • Videos
  • Tech Events
  • Tools
    • How do I find my IP address?
    • Browser and plugin tests
  • Get a Technical Consultation
You are here: Home / Articles / Security and Privacy / Get a second opinion on a suspicious file

Get a second opinion on a suspicious file

2013-07-19 by Jason

I have seen more than my fair share of malware infected PCs. Fortunately it’s not due to infecting my own computers but working on client computers. After seeing enough of them, you know some trends that virus families tend to share. For example, an executable file in the user’s profile folder or a jibberish name in the AppData folder with an executable or dll file in it that is started at logon through the Registry… those are usually suspect and related to the malware infection. They might not always be malicious files though, so it would be nice to be able to check the file to know for sure. You can typically right-click on the file and run a scan on the file with your antivirus (You do have an antivirus installed, right?) but this is the same antivirus that let the file in in the first place.

You can get more than a second opinion on the file through the website VirusTotal. Just visit the website and upload the suspicious file (up to 64 MB in size) and submit it. After the file uploads the server, it will hash the file and search its database to see if it has seen the file before. If a recent scan has been run on it, you can jump directly to the report, saving you and the site time from running a scan again.

virustotal

If VirusTotal has not seen the file before or you elect to run an updated scan on a previous report, the site will check the file against 46 different antivirus programs. The report will tell you if any antivirus programs detected the file as bad and using which antivirus definition. Instead of relying on just one antivirus, you can use the site to check the file against the majority of other security software packages out there.

virustotal report

Even if a file is not suspicious but you just want to double-check it before you run the file, VirusTotal works great. The site is also good if you suspect your AV is throwing a false positive for a file. I should also mention that it is a free service. In addition to scanning files, you can scan URLs using the VirusTotal URL Scanner. It utilizes 33 different URL scanners to check if a website is suspicious or has a bad reputation.

I have had a few instances when VirusTotal would not work or didn’t like the file I was trying to upload or perhaps the installed malware was blocking the upload from even completing correctly. Scary! At those times, I have searched around for other multi-AV scanners and found a few alternatives which confirmed that indeed the file was a known bad guy. Some others you might try out include: VirSCAN and Jotti.

“Two heads are better than one!” The same can be said about antivirus engines.

Filed Under: Security and Privacy

Trending

  • Doing More With Less: Links and Shortcuts
    In Media, Software, Tech Solutions
  • The Xbox One Controller
    In Infographics
  • Dell uses closed-loop recycling for OptiPlex 3030 All-in-One
    In Infographics

Latest Media Posts

Find Out Where To Download SNES ROMs

Find Out Where To Download SNES ROMs

Multifunctional Video Conversion Tools – Wondershare Video Converter

Multifunctional Video Conversion Tools – Wondershare Video Converter

  • Popular
  • Latest
  • Today Week Month All
  • How to ‘Unblock’ multiple files at a time with PowerShell How to 'Unblock' multiple files at a time with PowerShell
  • Command line to take ownership and change permissions Command line to take ownership and change permissions
  • Increase IIS Private Memory Limit to improve WSUS availability Increase IIS Private Memory Limit to improve WSUS availability
  • SOLVED: “This modification is not allowed because the selection is locked.” SOLVED: "This modification is not allowed because the selection is locked."
  • Read the Event Logs on Windows Server Core Read the Event Logs on Windows Server Core
  • Making Distributed Software Development Work: Strategies and Best Practices for Managing Remote Teams Making Distributed Software Development Work: Strategies and Best Practices for Managing Remote Teams
  • customer contactless payment for drink with mobile phon at cafe counter bar,seller coffee shop accept payment by mobile.new normal lifestyle concept The Latest Innovations In Payment Technology
  • How Digital Technology Brought the Rise of the CMO   How Digital Technology Brought the Rise of the CMO  
  • How to Purchase Cryptocurrencies? How to Purchase Cryptocurrencies?
  • Top 6 necessary aspects to consider when hiring Angular developers Top 6 necessary aspects to consider when hiring Angular developers
Ajax spinner

Elevator Pitch

404 Tech Support documents solutions to IT problems, shares worthwhile software and websites, and reviews hardware, consumer electronics, and technology-related books.

Subscribe to 404TS articles by email.

Recent Posts

  • Making Distributed Software Development Work: Strategies and Best Practices for Managing Remote Teams
  • The Latest Innovations In Payment Technology
  • How Digital Technology Brought the Rise of the CMO  

Search

FTC Disclaimer

404TechSupport is an Amazon.com affiliate; when you click on an Amazon link from 404TS, the site gets a cut of the proceeds from whatever you buy. This site also uses Skimlinks for smart monetization of other affiliate links.
Use of this site requires displaying and viewing ads as they are presented.

Copyright © 2023 · Magazine Pro Theme on Genesis Framework · WordPress · Log in