Malware MD5 or file search


File MD5 Hash:

simply put the hash in the search box

This service allows you to query their database of many unique malware samples for a computed MD5 hash of a file. If it is malware and they know about, they return the last time they have seen it along.

The security of the MD5 hash function is severely compromised. We use several hashes in ACE, but search by MD5 have more popular with people. MD5 hash database should not be intended as a substitute for an security/antivirus solution, instead it provides you an additional layer of detection, allowing you to identify known suspicious files.