English version 去汉语版本 Русская версия Deutsche Version

Download software tagged by backdoor trojan horses worm reporter

The most popular program: Quick Slide Show 2.00
Download Quick Slide Show 2.00
more info
We recommend: Trojan Remover 6.4.7
Download Trojan Remover 6.4.7
more info
Happiness Anti Joke Unwanted Toolbars Backdoor 1.3.62 by Anti Joke Unwanted Toolbars Backdoor
2008-08-18
Happiness Anti Joke Unwanted Toolbars Backdoor - The term rootkit is used to define a Trojan (or technology) used to hide the presence of a malicious object (process, file, registry key, network port) from the computer user or administrator.
Desktop Armor 1.3 by Headlight Software, Inc.
2005-10-25
Desktop Armor watches your computer for changes, notifying you when something is altered to confirm you want to keep or reject it. This catches many of the changes made by a virus, trojan or worm; protecting your computer from harm. And much more.
Geek Superhero 1.3 by Headlight Software, Inc.
2005-10-25
Geek Superhero watches your computer for changes, notifying you when something is altered to confirm you want to keep or reject it. This catches many of the changes made by a virus, trojan or worm; protecting your computer from harm. And much more.
Geek Superhero 1.3 by Headlight Software Inc.
2006-10-25
Geek Superhero watches your computer for changes, notifying you when something is altered to confirm you want to keep or reject it. This catches many of the changes made by a virus, trojan or worm; protecting your computer from harm. And much more.
Discover Dialers Backdoor 5.8.40 by Discover Dialers Backdoor
2008-02-10
Discover Dialers Backdoor - The term rootkit is used to define a Trojan (or technology) used to hide the presence of a malicious object (process, file, registry key, network port) from the computer user or administrator.
Merry AntiSpy Exploit Spoofers Worm 1.3.78 by AntiSpy Exploit Spoofers Worm
2008-07-21
Merry AntiSpy Exploit Spoofers Worm - The term rootkit is used to define a Trojan (or technology) used to hide the presence of a malicious object (process, file, registry key, network port) from the computer user or administrator.
ChristmasIdea Backdoor System Monitor Joke Blocker 1.4.12 by Backdoor System Monitor Joke Blocker
2008-07-22
ChristmasIdea Backdoor System Monitor Joke Blocker scans and removes adware, spyware, and trojan viruses from computer. It is Web-based antispyware software. So no installation is required.
Merry Block Worm Popups Dialers 1.3.67 by Block Worm Popups Dialers
2008-07-26
Merry Block Worm Popups Dialers - The term rootkit is used to define a Trojan (or technology) used to hide the presence of a malicious object (process, file, registry key, network port) from the computer user or administrator.
Ever Anti Bot Worm Password Cracker 1.3.77 by Anti Bot Worm Password Cracker
2008-07-27
Ever Anti Bot Worm Password Cracker's features include: High-speed file scan engine capable of detecting modified trojans; Memory scanning for detecting any modified variant of a particular build of a trojan; Registry scanning.
0.017