According to at least one embodiment, a computer-implemented method for managing malware for a computing device is described. In one embodiment, an attempt by a process to modify at least one file on the computing device may be identified. The identified process may be analyzed to estimate an age value associated with the identified process. The estimated age value of the identified process may be compared to an age value associated with the at least one file. The attempt to modify the at least one file may be prevented based at least in part on the comparison.