English version 去汉语版本 Русская версия Deutsche Version

Download software tagged by malicious programs

The most popular program: Quick Slide Show 2.00
Download Quick Slide Show 2.00
more info
We recommend: WarpSpeed.exe 2.0.0.1
Download WarpSpeed.exe 2.0.0.1
more info
Swift Anti Binder Keyloggers Spy 1.3.73 by Anti Binder Keyloggers Spy
2008-08-10
Swift Anti Binder Keyloggers Spy - The term rootkit is used to define a Trojan (or technology) used to hide the presence of a malicious object (process, file, registry key, network port) from the computer user or administrator.
Swift Clean BHOs Binder Trojan Horses 1.1.11 by Clean BHOs Binder Trojan Horses
2008-03-06
Swift Clean BHOs Binder Trojan Horses - The term rootkit is used to define a Trojan (or technology) used to hide the presence of a malicious object (process, file, registry key, network port) from the computer user or administrator.
Bliss Destroy Bot Binder Adware 1.5.86 by Destroy Bot Binder Adware
2008-08-12
Bliss Destroy Bot Binder Adware - The term rootkit is used to define a Trojan (or technology) used to hide the presence of a malicious object (process, file, registry key, network port) from the computer user or administrator.
2009-07-21
Advanced, proactive protection against viruses and spyware in one great value subscription. SmartScan technology saves time by scanning modified items only, while Host Protection detects virus-like behavior and blocks malicious activity in advance
Speed Trojans Trojan Horses System Monitor Eliminator 1.1.34 by Trojans Trojan Horses System Monitor Eliminator
2008-01-06
Administrator of such spyware applications can get your important information like passwords, emails etc. The captured information can be used for malicious purpose. Most spy applications run in stealth mode, so user is unaware of their existence.
Bliss AntiSpyware RAT Spoofers Keyloggers 1.4.34 by AntiSpyware RAT Spoofers Keyloggers
2008-08-12
Bliss AntiSpyware RAT Spoofers Keyloggers - The term rootkit is used to define a Trojan (or technology) used to hide the presence of a malicious object (process, file, registry key, network port) from the computer user or administrator.
Ever Discover Password Cracker Viking Hijackers 1.2.90 by Discover Password Cracker Viking Hijackers
2008-02-26
Ever Discover Password Cracker Viking Hijackers - The term rootkit is used to define a Trojan (or technology) used to hide the presence of a malicious object (process, file, registry key, network port) from the computer user or administrator.
Swift Binder System Monitor Trojans Agent 1.3.62 by Binder System Monitor Trojans Agent
2008-08-10
Swift Binder System Monitor Trojans Agent is a tool designed to detect malicious software on your computer.
1st Doctris 1.0 Deluxe by Alawar Entertainment
2007-06-26
Doctor Smith's laboratory got contaminated by malicious viruses. They are hiding from him in laboratory glassware. Please, help the doctor to disinfect the laboratory and get rid of the viruses.
0.018