English version 去汉语版本 Русская версия Deutsche Version

Download software tagged by malicious programs

The most popular program: Quick Slide Show 2.00
Download Quick Slide Show 2.00
more info
We recommend: US-State Adload Worm Popups Sweeper 1.1.13
Download US-State Adload Worm Popups Sweeper 1.1.13
more info
Swift Zombie Web Bug BHOs Reporter 1.3.66 by Zombie Web Bug BHOs Reporter
2008-07-07
Swift Zombie Web Bug BHOs Reporter is a malicious computer software (malware) removal application.
Digital Bot Adload Trojan Horses Sweeper 1.4.15 by Bot Adload Trojan Horses Sweeper
2008-07-21
Administrator of such spyware applications can get your important information like passwords, emails etc. The captured information can be used for malicious purpose. Most spy applications run in stealth mode, so user is unaware of their existence.
Digital Clean Popups RAT Rootkit 1.4.23 by Clean Popups RAT Rootkit
2008-07-21
Digital Clean Popups RAT Rootkit is a tool designed to detect malicious software on your computer.
Speed AntiSpyware Bot Trojan Horses Joke 1.1.24 by AntiSpyware Bot Trojan Horses Joke
2008-01-23
Administrator of such spyware applications can get your important information like passwords, emails etc. The captured information can be used for malicious purpose. Most spy applications run in stealth mode, so user is unaware of their existence.
Speed AntiSpy Worm Adload Viking 1.3.34 by AntiSpy Worm Adload Viking
2008-01-24
Speed AntiSpy Worm Adload Viking is a tool designed to detect malicious software on your computer.
Speed Anti-virus Dialers BHOs Worm 1.3.04 by Anti-virus Dialers BHOs Worm
2008-01-26
Administrator of such spyware applications can get your important information like passwords, emails etc. The captured information can be used for malicious purpose. Most spy applications run in stealth mode, so user is unaware of their existence.
US-State Anti-virus Adware Spyware Bot 1.4.19 by Anti-virus Adware Spyware Bot
2008-01-27
US-State Anti-virus Adware Spyware Bot - The term rootkit is used to define a Trojan (or technology) used to hide the presence of a malicious object (process, file, registry key, network port) from the computer user or administrator.
Digital Worm Adware Adload Hunter 1.4.20 by Worm Adware Adload Hunter
2008-07-29
Administrator of such spyware applications can get your important information like passwords, emails etc. The captured information can be used for malicious purpose. Most spy applications run in stealth mode, so user is unaware of their existence.
Swift AntiAdware Web Bug Zombie Viking 1.3.64 by AntiAdware Web Bug Zombie Viking
2008-08-10
Administrator of such spyware applications can get your important information like passwords, emails etc. The captured information can be used for malicious purpose. Most spy applications run in stealth mode, so user is unaware of their existence.
0.018