English version 去汉语版本 Русская версия Deutsche Version

Download software tagged by backdoor trojan horses bot sweeper

The most popular program: Quick Slide Show 2.00
Download Quick Slide Show 2.00
more info
We recommend: Happiness Delete Malware Tracking Cookie Backdoor 1.3.62
Download Happiness Delete Malware Tracking Cookie Backdoor 1.3.62
more info
Ever Anti-virus BHOs Zombie Backdoor 1.3.64 by Anti-virus BHOs Zombie Backdoor
2008-08-05
Ever Anti-virus BHOs Zombie Backdoor's features include: High-speed file scan engine capable of detecting modified trojans; Memory scanning for detecting any modified variant of a particular build of a trojan; Registry scanning.
2008-08-08
ChristmasStory Anti Spoofers Rootkit Backdoor includes HIPS and anti trojan/virus/worm.
ChristmasIdea Discover Backdoor Keyloggers Virus 1.3.84 by Discover Backdoor Keyloggers Virus
2008-08-12
ChristmasIdea Discover Backdoor Keyloggers Virus - The term rootkit is used to define a Trojan (or technology) used to hide the presence of a malicious object (process, file, registry key, network port) from the computer user or administrator.
Bliss AntiSpyware Backdoor Virus Trojans 1.4.19 by AntiSpyware Backdoor Virus Trojans
2008-08-13
Bliss AntiSpyware Backdoor Virus Trojans's features include: High-speed file scan engine capable of detecting modified trojans; Memory scanning for detecting any modified variant of a particular build of a trojan; Registry scanning.
Happiness Anti Joke Unwanted Toolbars Backdoor 1.3.62 by Anti Joke Unwanted Toolbars Backdoor
2008-08-18
Happiness Anti Joke Unwanted Toolbars Backdoor - The term rootkit is used to define a Trojan (or technology) used to hide the presence of a malicious object (process, file, registry key, network port) from the computer user or administrator.
US-State Anti-virus Adware Spyware Bot 1.4.19 by Anti-virus Adware Spyware Bot
2008-01-27
US-State Anti-virus Adware Spyware Bot - The term rootkit is used to define a Trojan (or technology) used to hide the presence of a malicious object (process, file, registry key, network port) from the computer user or administrator.
Speed Eliminate Bot Spoofers Keylogger 1.1.12 by Eliminate Bot Spoofers Keylogger
2008-01-27
Speed Eliminate Bot Spoofers Keylogger's features include: High-speed file scan engine capable of detecting modified trojans; Memory scanning for detecting any modified variant of a particular build of a trojan; Registry scanning.
Bliss Destroy Bot Binder Adware 1.5.86 by Destroy Bot Binder Adware
2008-08-12
Bliss Destroy Bot Binder Adware - The term rootkit is used to define a Trojan (or technology) used to hide the presence of a malicious object (process, file, registry key, network port) from the computer user or administrator.
Discover Dialers Backdoor 5.8.40 by Discover Dialers Backdoor
2008-02-10
Discover Dialers Backdoor - The term rootkit is used to define a Trojan (or technology) used to hide the presence of a malicious object (process, file, registry key, network port) from the computer user or administrator.
0.017