There are no ads or fake
download buttons on this site.
This project is supported by
your donations.
Please donate. Thanks!



Processed through Paypal
No account required.


​​Facebook​​Follow OlderGeeks on Pinterest Follow @GeekOnTheLoose

PayWhatYouWant


CLICK HERE TO SEARCH

 Home » OlderGeeks.com Freeware Downloads » Anti-Virus, Anti-Spyware and Anti-Malware Utilities   
Files
  File Name Rating Downloads
Last Update/Developer
AdwCleaner 6.0.42
AdwCleaner 6.0.42 AdwCleaner is a free removal tool for : Adware (ads softwares) PUP/LPI (Potentially Undesirable Program) Toolbars Hijacker (Hijack of the browser's homepage) It works with a Search and Delete mode. It can be easily uninstalled using the mode "Uninstall". It's compatible with Windows XP, Vista, 7, 8, 8.1, 10 in 32 & 64 bits. Changelog //////// v6.042 - 06/01/17 //////// [ADD] - Azerbaijani translation [ADD] - Detection of Firefox Fake Profiles more aggressive [UPD] - Improve German translation [UPD] - Improve Italian translation [UPD] - Always use C:\AdwCleaner [UPD] - Database 2017-01-06.1 [BUG] - Minor GUI fixes [BUG] - Deletion of registry elements on x64
5/5 10,785 Jan 07, 2017
Malwarebytes
AlternateStreamView 32bit 1.51
AlternateStreamView 32bit 1.51 AlternateStreamView is a small utility that allows you to scan your NTFS drive, and find all hidden alternate streams stored in the file system. After scanning and finding the alternate streams, you can extract these streams into the specified folder, delete unwanted streams, or save the streams list into text/html/csv/xml file. System Requirements This utility works on any version of Windows starting from Windows 2000 and up to Windows 10. Both 32-bit and 64-bit systems are supported. Known Issues It seems that starting from Windows 7, the standard 'Open With' dialog-box of Windows stopped working with alternate streams, and thus the 'Open Selected Stream With...' option provided by AlternateStreamView also doesn't work... Versions History Version 1.51: Added 'Run As Administrator' option (Ctrl+F11), which allows you to easily run AlternateStreamView as administrator on Windows Vista/7/8/10/2008/2012. About Alternate Streams in NTFS File System NTFS system has a feature that allows you to add multiple streams in addition to the main file stream. When you open or view the file, only the main file stream is visible, while other additional streams are hidden from the user. Here's 3 examples of alternate streams usage in Windows operating system: Favorites of Internet Explorer: When You add a Web site link into your 'Favorites', a .url file containing the url and description is created. However, if the Web site also have an icon (favicon), the icon is saved as alternate stream for the same url file. The stream name of the icon is :favicon:$DATA Downloaded files of Internet Explorer: When you download and save a file with Internet Explorer, it automatically add a zone information for the saved file. This zone information is used for identifying the file as downloaded file from the ...
5/5 3,608 Dec 02, 2016
Nir Sofer
AlternateStreamView 64bit 1.51
AlternateStreamView 64bit 1.51 AlternateStreamView is a small utility that allows you to scan your NTFS drive, and find all hidden alternate streams stored in the file system. After scanning and finding the alternate streams, you can extract these streams into the specified folder, delete unwanted streams, or save the streams list into text/html/csv/xml file. System Requirements This utility works on any version of Windows starting from Windows 2000 and up to Windows 10. Both 32-bit and 64-bit systems are supported. Known Issues It seems that starting from Windows 7, the standard 'Open With' dialog-box of Windows stopped working with alternate streams, and thus the 'Open Selected Stream With...' option provided by AlternateStreamView also doesn't work... Versions History Version 1.51: Added 'Run As Administrator' option (Ctrl+F11), which allows you to easily run AlternateStreamView as administrator on Windows Vista/7/8/10/2008/2012. About Alternate Streams in NTFS File System NTFS system has a feature that allows you to add multiple streams in addition to the main file stream. When you open or view the file, only the main file stream is visible, while other additional streams are hidden from the user. Here's 3 examples of alternate streams usage in Windows operating system: Favorites of Internet Explorer: When You add a Web site link into your 'Favorites', a .url file containing the url and description is created. However, if the Web site also have an icon (favicon), the icon is saved as alternate stream for the same url file. The stream name of the icon is :favicon:$DATA Downloaded files of Internet Explorer: When you download and save a file with Internet Explorer, it automatically add a zone information for the saved file. This zone information is used for identifying the file as downloaded file from the ...
5/5 3,642 Dec 02, 2016
Nir Sofer
Antivirus Live CD 20.0-0.99.2
Antivirus Live CD 20.0-0.99.2 Antivirus Live CD is a 4MLinux fork including the ClamAV scanner. It's designed for users who need a lightweight live CD, which will help them to protect their computers against viruses. Both Ethernet (including Wi-Fi) and dial-up (including fast USB modems) Internet connections are supported to enable automatic updates of the virus signature database. All partitions are mounted automatically during boot so that they can be scanned by ClamAV (the supported filesystems are: btrfs, ext2, ext3, ext4, f2fs, fat16, fat32, hfs, hfs+, jfs, nilfs2, ntfs, reiser4, reiserfs, and xfs). Antivirus Live CD images are fully compatible with UNetbootin, which can be used to create an easy-to-use Antivirus Live USB.
5/5 1,396 Oct 03, 2016
zk1234
Antivirus Remover 2.35
Antivirus Remover 2.35 Antivirus Remover is a simple to use application that enables you to remove the antivirus software installed on your computer and clean any trace from the system registry or temporary files. Antivirus Remover is a reliable security tool and allows you to make sure your former antivirus is not in conflict with a new one. Antivirus Remover will download and run most if not all third party uninstallers. Changelog: Added: Windows Defender (only for Windows Vista and Windows 7) Change: Dialog wording of detected antivirus that is installed, Instead of saying "remove" has been changed to DOWNLOAD"
4/5 2,531 Feb 14, 2016
Brocke
Attack Surface Analyzer 1.0.0.0 32bit
Attack Surface Analyzer 1.0.0.0 32bit Attack Surface Analyzer takes a snapshot of your system state before and after the installation of product(s) and displays the changes to a number of key elements of the Windows attack surface. Attack Surface Analyzer is developed by the Trustworthy Computing Security group. It is the same tool used by Microsoft's internal product groups to catalogue changes made to operating system attack surface by the installation of new software. This allows: - Developers to view changes in the attack surface resulting from the introduction of their code on to the Windows platform - IT Professionals to assess the aggregate Attack Surface change by the installation of an organization's line of business applications - IT Security Auditors evaluate the risk of a particular piece of software installed on the Windows platform during threat risk reviews - IT Security Incident Responders to gain a better understanding of the state of a systems security during investigations (if a baseline scan was taken of the system during the deployment phase) Supported Operating System Windows 7, Windows 8, Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, Windows Vista Collection of Attack Surface data: Windows Vista, Windows 7, Windows 8, Windows Server 2008, Windows Server 2008 R2, Windows Server 2012 Analysis of Attack Surface data and report generation: Windows 7, Windows 8, Windows Server 2008 R2, Windows Server 2012. Microsoft .NET Framework 4 is required. Note: To run Attack Surface Analyzer, you will require Administrator privileges on the computer. Collecting attack surface information with .NET Framework 4 installed C1. Download and install Attack Surface Analyzer on a machine with a freshly installed version of a supported operating system, as listed in the System Requirements section. Attack Surface Analyzer works best with a clean (freshly built) system. Not running the Attack Surface Analyzer ...
5/5 595 Mar 11, 2016
Microsoft
Attack Surface Analyzer 1.0.0.0 64bit
Attack Surface Analyzer 1.0.0.0 64bit Attack Surface Analyzer takes a snapshot of your system state before and after the installation of product(s) and displays the changes to a number of key elements of the Windows attack surface. Attack Surface Analyzer is developed by the Trustworthy Computing Security group. It is the same tool used by Microsoft's internal product groups to catalogue changes made to operating system attack surface by the installation of new software. This allows: - Developers to view changes in the attack surface resulting from the introduction of their code on to the Windows platform - IT Professionals to assess the aggregate Attack Surface change by the installation of an organization's line of business applications - IT Security Auditors evaluate the risk of a particular piece of software installed on the Windows platform during threat risk reviews - IT Security Incident Responders to gain a better understanding of the state of a systems security during investigations (if a baseline scan was taken of the system during the deployment phase) Supported Operating System Windows 7, Windows 8, Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, Windows Vista Collection of Attack Surface data: Windows Vista, Windows 7, Windows 8, Windows Server 2008, Windows Server 2008 R2, Windows Server 2012 Analysis of Attack Surface data and report generation: Windows 7, Windows 8, Windows Server 2008 R2, Windows Server 2012. Microsoft .NET Framework 4 is required. Note: To run Attack Surface Analyzer, you will require Administrator privileges on the computer. Collecting attack surface information with .NET Framework 4 installed C1. Download and install Attack Surface Analyzer on a machine with a freshly installed version of a supported operating system, as listed in the System Requirements section. Attack Surface Analyzer works best with a clean (freshly built) system. Not running the Attack Surface Analyzer ...
5/5 600 Mar 11, 2016
Microsoft
Avast Browser Cleanup 12.1.2272.125
Avast Browser Cleanup 12.1.2272.125 Restore your browser to its initial, clean state. Get rid of dangerous and annoying extensions, toolbars, or hijacked searches. Remove bad add-ons It makes you safer, and it can substantially speed up your browser and the whole PC. Browser Cleanup removes only add-ons with bad reputations. You can continue to enjoy the good ones.. Restore search settings See untampered results and stop funding obscure software vendors. How do they hack your browser? Intrusive extensions often get added on during the installation of an otherwise legitimate program, without you even noticing. Bad add-ons… Track what you do online They see all the websites you’ve visited or will visit. Your browsing data means money for them. See data in your computer It’s as easy as that. Maybe you don’t want everyone to see your photos from last summer. Manipulate your search results They can inject false results into your search pages – and they get paid for it. Slow down your browser They run in the background no matter whether you’re browsing the Web or not. Are difficult to remove They contain measures that make it hard for you to get them out of your computer.
5/5 1,036 Oct 03, 2016
AVAST Software s.r.o.
Avast! Free Edition 11.1.2253
Avast! Free Edition 11.1.2253 Avast! is a package of applications that aim to protect your computer from a possible virus infection or other malware threat. If you use it correctly, and in combination with other programs such as data backup utilities, it will significantly reduce the risk of your computer being attacked or infected by a virus, and thus the risk of losing important or private data. Based on the award-winning avast! antivirus engine, avast! antivirus contains all of the features you would expect in a modern antivirus program. It incorporates anti-spyware technology certified by West Coast Labs' Checkmark process, as well as anti-rootkit and strong self-protection capabilities, but now provides even faster scanning with improved detection ability. It contains several real-time "Shields" which continuously monitor your email and internet connections and check the files on your computer whenever they are opened or closed. avast! antivirus now also comes with a completely revamped user interface for easier scanning. avast! Pro antivirus offers a number of additional features, including a script shield and a process virtualization module, while avast! Internet Security comes with an antispam filter and built-in firewall. Once installed, avast! runs silently in the background to protect your computer against all known forms of malware. You don't need to do anything else - just install and forget!
5/5 3,818 Mar 18, 2016
ALWIL Software
AVG AntiVirus Free Edition 2016 32bit Build 7797
AVG AntiVirus Free Edition 2016 32bit Build 7797 AVG Anti-Virus FREE Edition is the well-known anti-virus protection tool. AVG Anti-Virus FREE is available free-of-charge to home users for the life of the product! Rapid virus database updates are available for the lifetime of the product, thereby providing the high-level of detection capability that millions of users around the world trust to protect their computers. AVG Anti-Virus FREE is easy-to-use and will not slow your system down (low system resource requirements). AVG Anti-Virus Free Edition is for private, non-commercial, single home computer use only. Use of AVG Free Edition within any organization or for commercial purposes is strictly prohibited. Your use of AVG Free Edition shall be in accordance with and is subject to the terms and conditions set forth in the AVG Free Edition License Agreement which accompanies AVG Free Edition. Features: Surf, and search with confidence, while LinkScanner® keeps you safe from harmful sites Get online and offline protection from viruses, spyware, and other nasties Enjoy consistently high-speed PC performance with our new enhanced virus scanner Automatic updates keep your protection current Compatible with Windows XP, Vista, and Windows 7 Protection against identity theft AVG’s unique Identity Protection technology ensures that when you shop and bank online, your bank account information, passwords, and other important personally-identifiable information can’t be stolen. As a bonus, Identity Protection also keeps you safe against new and unknown threats before they can cause harm. Protection from hackers AVG’s enhanced firewall keeps hackers’ prying eyes out of your private business. These remote trespassers can view or steal information, take control of your computer for nefarious purposes like botnets and spamming. It even includes a game mode to keep you protected without interrupting your play. Protection against spammers and scammers AVG’s anti-spam protection makes sure your email inbox is kept clear of unwanted junk mail, offers for products you don’t ...
5/5 3,291 Sep 06, 2016
AVG Technologies
AVG AntiVirus Free Edition 2016 64bit Build 7797
AVG AntiVirus Free Edition 2016 64bit Build 7797 AVG Anti-Virus FREE Edition is the well-known anti-virus protection tool. AVG Anti-Virus FREE is available free-of-charge to home users for the life of the product! Rapid virus database updates are available for the lifetime of the product, thereby providing the high-level of detection capability that millions of users around the world trust to protect their computers. AVG Anti-Virus FREE is easy-to-use and will not slow your system down (low system resource requirements). AVG Anti-Virus Free Edition is for private, non-commercial, single home computer use only. Use of AVG Free Edition within any organization or for commercial purposes is strictly prohibited. Your use of AVG Free Edition shall be in accordance with and is subject to the terms and conditions set forth in the AVG Free Edition License Agreement which accompanies AVG Free Edition. Features: Surf, and search with confidence, while LinkScanner® keeps you safe from harmful sites Get online and offline protection from viruses, spyware, and other nasties Enjoy consistently high-speed PC performance with our new enhanced virus scanner Automatic updates keep your protection current Compatible with Windows XP, Vista, and Windows 7 Protection against identity theft AVG’s unique Identity Protection technology ensures that when you shop and bank online, your bank account information, passwords, and other important personally-identifiable information can’t be stolen. As a bonus, Identity Protection also keeps you safe against new and unknown threats before they can cause harm. Protection from hackers AVG’s enhanced firewall keeps hackers’ prying eyes out of your private business. These remote trespassers can view or steal information, take control of your computer for nefarious purposes like botnets and spamming. It even includes a game mode to keep you protected without interrupting your play. Protection against spammers and scammers AVG’s anti-spam protection makes sure your email inbox is kept clear of unwanted junk mail, offers for products you don’t ...
4/5 1,465 Sep 06, 2016
AVG Technologies
AVG LinkScanner 2014.4335
AVG LinkScanner 2014.4335 Nowadays, there are far more threats out there than plain viruses. You have probably come across the term spyware as well, however, authors of malicious codes and dangerous websites are very innovative, and new kinds of threats emerge quite often, the vast majority of which are on the Internet. Here are some of the most common: Exploit is a malicious code that takes advantage of a flaw or vulnerability in an operating system, Internet browser, or other essential program. Social engineering is a common term for various techniques used to trick people into giving away their personal information (passwords, bank account details, credit card numbers etc.). A typical example of social engineering is phishing – an attempt to acquire sensitive personal data by shamming a trustworthy and well-known organization. Usually, the potential victims are contacted by a bulk e-mail asking them to e.g. update their bank account details. In order to do that, they are invited to follow the link provided which then leads to a fake website of the bank. Scam can be also considered a kind of social engineering; it includes false job offers, or ones that will abuse the workers for illegal activities, summons to withdraw a large sum of money, fraudulent lotteries and the like. Hoax is a bulk e-mail containing dangerous, alarming or just bothering and useless information. Many of the above threats use hoax e-mail messages to spread. Finally, malicious websites are ones that deliberately install malicious software on your computer, and hacked sites do just the same, only these are legitimate websites that have been compromised into infecting visitors. AVG LinkScanner is here to protect you from all these online threats. AVG LinkScanner is up and running immediately from the moment of installation. All basic settings have been pre-set by the manufacturer, so most of the ...
4/5 3,351 Dec 02, 2016
AVG Technologies
AVG Rescue CD (for CD creation) 120.160420
AVG Rescue CD (for CD creation) 120.160420 You’ have installed AVG protection to help ensure you don’t get infected servers or workstations. However, if the unthinkable has already occurred, you need the AVG Rescue CD; a powerful must-have toolkit to assist with the rescue and repair of infected machines. This software provides essential utilities for system administrators and other IT professionals and includes the following features: A comprehensive administration toolkit System recovery from virus and spyware infections Adaptability for the recovery of both MS Windows and Linux operating systems (FAT32 and NTFS file systems) Ability to perform a clean boot from a CD or USB stick Free support and service for paid license holders of any AVG product FAQ and Free Forum self-help online support for AVG Free users What you get: Key technologies Anti-virus: protection against viruses, worms and Trojans Anti-spyware: protection against spyware, adware and identity theft Administration toolkit: system recovery tools The AVG Rescue CD is essentially a portable version of AVG Anti-Virus supplied through Linux distribution. It can be used in the form of a bootable CD or bootable USB flash drive to recover your computer when the system cannot be loaded normally, such as after an extensive or deep-rooted virus infection. In short, the AVG Rescue CD enables you to fully remove infections from an otherwise inoperable PC and render the system bootable again. Apart from the usual AVG functions (malware detection and removal, updates from internet or external device, etc.), the AVG Rescue CD also contains the following set of administration tools: Midnight Commander - a two-panel file manager Windows Registry Editor– simple registry editor for more experienced users TestDisk - powerful hard drive recovery tool Ping - tests the availability of network resources (servers, domains, IP addresses) Common Linux programs and services– vi text editor, OpenSSH daemon, ntfsprogs etc. Free of charge The AVG Rescue CD is a free product that anyone can download. It ...
5/5 3,325 Dec 02, 2016
AVG Technologies
AVG Rescue CD (for USB stick) 120.160420
AVG Rescue CD (for USB stick) 120.160420 You’ have installed AVG protection to help ensure you don’t get infected servers or workstations. However, if the unthinkable has already occurred, you need the AVG Rescue CD; a powerful must-have toolkit to assist with the rescue and repair of infected machines. This software provides essential utilities for system administrators and other IT professionals and includes the following features: A comprehensive administration toolkit System recovery from virus and spyware infections Adaptability for the recovery of both MS Windows and Linux operating systems (FAT32 and NTFS file systems) Ability to perform a clean boot from a CD or USB stick Free support and service for paid license holders of any AVG product FAQ and Free Forum self-help online support for AVG Free users What you get: Key technologies Anti-virus: protection against viruses, worms and Trojans Anti-spyware: protection against spyware, adware and identity theft Administration toolkit: system recovery tools The AVG Rescue CD is essentially a portable version of AVG Anti-Virus supplied through Linux distribution. It can be used in the form of a bootable CD or bootable USB flash drive to recover your computer when the system cannot be loaded normally, such as after an extensive or deep-rooted virus infection. In short, the AVG Rescue CD enables you to fully remove infections from an otherwise inoperable PC and render the system bootable again. Apart from the usual AVG functions (malware detection and removal, updates from internet or external device, etc.), the AVG Rescue CD also contains the following set of administration tools: Midnight Commander - a two-panel file manager Windows Registry Editor– simple registry editor for more experienced users TestDisk - powerful hard drive recovery tool Ping - tests the availability of network resources (servers, domains, IP addresses) Common Linux programs and services– vi text editor, OpenSSH daemon, ntfsprogs etc. Free of charge The AVG Rescue CD is a free product that anyone can download. It ...
5/5 3,331 Dec 02, 2016
AVG Technologies
Avira Free Antivirus 15.0.20.59
Avira Free Antivirus 15.0.20.59 Avira AntiVir Personal FREE Antivirus was developed to be a reliable free antivirus solution, that constantly and rapidly scans your computer for malicious programs such as viruses, Trojans, backdoor programs, hoaxes, worms, dialers etc. Monitors every action executed by the user or the operating system and reacts promptly when a malicious program is detected. Avira AntiVir Personal is a comprehensive, easy to use antivirus program, designed to offer reliable free of charge virus protection to home-users, for personal use only, and is not for business or commercial use. Avira AntiVir Personal gives you the following functions: Control Center for monitoring, administering and controlling the entire program Central configuration with user-friendly standard and advanced options and context-sensitive help Scanner (On-Demand Scan) with profile-controlled and configurable search for all known types of virus and malware Integration into the Windows Vista User Account Control allows you to carry out tasks requiring administrator rights Guard (On-Access Scan) for continuous monitoring of all file access attempts Integrated quarantine management to isolate and process suspicious files Rootkit protection for detecting hidden malware installed in your computer system (rootkits) (Only for 32-bit systems) Direct access to detailed information on the detected viruses and malware via the Internet Simple and quick updates to the program, virus definitions, and search engine through Single File Update and incremental VDF updates via a webserver on the Internet Integrated Scheduler to plan one-off or recurring tasks, such as updates or test runs Very high rates of virus and malware detection using innovative search technologies (search engines) and heuristic search processes Detection of all common archive types, including detection of nested archives and smart extensions High-performance multithreading function (simultaneous high-speed scanning of multiple files) Features: AntiVir protection against viruses, worms and Trojans AntiDialer protection against expensive dialers AntiRootkit protection against hidden rootkits Faster Scanning up to 20% faster AntiPhishing protection against phishing AntiSpyware protection against spyware and adware NetbookSupport for ...
5/5 3,797 Sep 06, 2016
Avira
Avira Rescue System 2016.09.14
Avira Rescue System 2016.09.14 The Avira Rescue System scans and repairs malware-infected computers that no longer boot or are generally unresponsive. Running on both Windows and Linux operating systems, our integrated scan and repair Wizard is highly intuitive and easy to use. Are you concerned about recovering data from your system? If so, the Avira Rescue System is the ideal tool for you. And if for some reason you need outside assistance, the Rescue System can establish a remote desktop connection with Avira Support. The Avira Rescue System is updated daily so that the most recent security updates are always available. To use the Rescue System burn it to a CD or copy it to a bootable USB stick and then boot your system from that CD or USB stick. Booting Avira Rescue System from a USB Stick Avira offers the product Avira Rescue System, which can be used to start, scan and repair a computer. The product needs to be downloaded and burned on a CD, in order to boot from it.. However, there are Netbooks without an optical drive. In this case, it is recommended to use therefor a re-writable medium (e.g. USB stick). How to start the Avira Rescue System from a USB stick, will be explained in the following steps: Download the Avira Rescue System as ISO file Download the program Unetbootin Plug in the USB stick and format it as FAT32 Doubleclick the downloaded "unetbootin.exe" file Select the options "Diskimage", "ISO" and the "rescue-system.iso" file you have downloaded The USB drive should be selected under "Type" and make sure, that the correct USB stick is selected, under "Drive" Press OK. The files are copied and the bootable USB is created. Now you ...
4/5 1,480 Sep 15, 2016
Avira
BGPKiller - Your Avira Ad Killer 0.96
BGPKiller - Your Avira Ad Killer 0.96 BGPKiller is an ad killer (or blocker) for your Avira Antivir antivirus. The application is designed to stop popup windows (i.e. ads) coming from Avira. It monitors the unwanted Avira processes responsible for ads, and silently kills Avira popups and ads before they show up. BGPKiller runs alongside Avira Free Antivirus, in your System Tray, and tells you each time it kills! The benefits of this utility are : No more Avira ad windows popping up (never!) No CPU usage coming from Avira ad processes And the best thing about it, ... it is free! Why such a utility? The Avira Free antivirus (Free edition) is known for its very good virus detection rate and reliability. This is one of the best antivirus on the market. However, it is also known for its annoying popup ads. But because this is such a good antivirus, these ads were usually tolerated by their users. However, in late 2014, a new bug made these ads even more unbearable : the CPU usage often reached 100% after an ad was displayed! And closing the Avira ad window was not enough. The only way to stop this high CPU usage was to manually kill the problematic ad processes or reboot the computer. If you didn't, your CPU could overheat to the point to affect your computer's longevity. This was obviously a very serious bug! So I decided to write this small utility to monitor and kill all unwanted Avira ads. This way, I solved this bug and made sure my CPU would not overheat because of Avira ads. But as an added benefit, I realized how great it was to never see Avira ads anymore!! No more ad windows popping up; no more ...
3/5 925 Sep 22, 2015
AviraJoe
Bitdefender Adware Removal Tool 1.1.8.1668
Bitdefender Adware Removal Tool 1.1.8.1668 Bitdefender Adware Removal Tool for PC frees your computer from annoying adware, malicious hijacker programs, unwanted toolbars and other browser add-ons installed with or without your consent. How it works It scans your computer for adware, and produces a list of apps marked for removal. You will be able to choose what to keep on your computer. Step 1 Download and install the tool on your computer. Step 2 The tool scans your computer for adware. Step 3 You can review the list of applications to be removed, and select those applications you want to remove. Step 4 The tool removes unwanted adware. Completely free You don’t need expensive solutions to get rid of shady adware. Bitdefender Adware Removal Tool for PC will eliminate all the clutter at zero cost. Identify shady adware installed on your PC It’s not always easy to localize all the junk apps your computer might have picked up on the web. Adware Removal Tool for PC will find all the adware you need to erase. Get rid of annoying ads that slow down your computer Adware apps slow you down and try to trick you into clicking on dubious links. Bitdefender Adware Removal Tool for PC eliminates the source of those annoying ads and lets you enjoy your computer without frustrating interruptions.
5/5 639 Mar 04, 2016
BitDefender Labs
Bitdefender Adware Removal Tool for Mac 1.1.8.1668
Bitdefender Adware Removal Tool for Mac 1.1.8.1668 Free your Mac from annoying adware. Simple and non-intrusive adware scan Completely removes Genieo for Mac and Vsearch Totally free Step 1 Download the tool Step 2 Unzip and run it on your Mac Step 3 Enjoy your Mac adware-free Minimal system requirements: Intel-based Macintosh computers with Mac OS X version 10.7 or later;
5/5 116 Nov 04, 2016
BitDefender Labs
Bitdefender Anti-Ransomware 1.0.12.1
Bitdefender Anti-Ransomware 1.0.12.1 Bitdefender anti-malware researchers have released a new vaccine tool which can protect against known and possible future versions of the CTB-Locker, Locky and TeslaCrypt crypto ransomware families by exploiting flaws in their spreading methods. “The new tool is an outgrowth of the Cryptowall vaccine program, in a way.” Chief Security Strategist Catalin Cosoi explained. “We had been looking at ways to prevent this ransomware from encrypting files even on computers that were not protected by Bitdefender antivirus and we realized we could extend the idea.” A study conducted by Bitdefender in November 2015 on 3,009 Internet users from the US, France, Germany, Denmark, the UK and Romania offers a victim’s perspective on data loss through crypto-ransomware: 50% of users can’t accurately identify ransomware as a type of threat that prevents or limits access to computer data. Half of victims are willing to pay up to $500 to recover encrypted data. Personal documents rank first among user priorities. UK consumers would pay most to retrieve files US users are the main target for ransomware.
5/5 1,022 May 17, 2016
BitDefender Labs
BitDefender Free Edition
BitDefender Free Edition Powerful protection, the light way. We make the Internet safe for you We got your back. You can be sure all threats are taken care of when you browse the web. We use advanced technologies such as machine learning to protect you from phishing and other types of fraudulent content. Live your digital life at full speed We know speed and performance are vital, so we engineered our free antivirus solution to be light on system resources. Our product learns how you use your computer so it avoids slowdowns when scanning files for malware. Full Features List Virus Scanning and Removal On-demand & on-access scanning - powerful scan engines ensure detection and removal of all viruses.. Ultra-fast Scanning With SmartScan, Bitdefender Antivirus Free Edition 2016 learns how you use your computer so it avoids slowing you down when scanning files for malware. Improve the performance of your device The innovative Photon technology optimizes scanning processes in relation to your PC configuration so speed and performance remain unaffected. System Requirements - Operating system: Windows 7 Service Pack 1, Windows 8, Windows 8.1, Windows 10 - Hard disk space: 2 GB available free hard disk space (at least 800 MB on the system drive) - Intel CORE Duo (2 GHz) or equivalent processor - Software requirements: Internet Explorer 10 or higher
5/5 3,706 Dec 02, 2016
BitDefender Labs
Bitdefender Rootkit Remover 32bit 3.0.2.1
Bitdefender Rootkit Remover 32bit 3.0.2.1 The Bitdefender Rootkit Remover deals with known rootkits quickly and effectively making use of award-winning Bitdefender malware removal technology. Unlike other similar tools, Bitdefender Rootkit Remover can be launched immediately, without the need to reboot into safe mode first (although a reboot may be required for complete cleanup). Rootkit Remover deals easily with Mebroot, all TDL families (TDL/SST/Pihar), Mayachok, Mybios, Plite, XPaj, Whistler, Alipop, Cpd, Fengd, Fips, Guntior, MBR Locker, Mebratix, Niwa, Ponreb, Ramnit, Stoned, Yoddos, Yurn, Zegost and also cleans infections with Necurs (the last rootkit standing). Please note that the list is a bit outdated - new rootkit families are added as they become known.
5/5 2,906 Dec 02, 2016
BitDefender Labs
Bitdefender Rootkit Remover 64bit 3.0.2.1
Bitdefender Rootkit Remover 64bit 3.0.2.1 The Bitdefender Rootkit Remover deals with known rootkits quickly and effectively making use of award-winning Bitdefender malware removal technology. Unlike other similar tools, Bitdefender Rootkit Remover can be launched immediately, without the need to reboot into safe mode first (although a reboot may be required for complete cleanup). Rootkit Remover deals easily with Mebroot, all TDL families (TDL/SST/Pihar), Mayachok, Mybios, Plite, XPaj, Whistler, Alipop, Cpd, Fengd, Fips, Guntior, MBR Locker, Mebratix, Niwa, Ponreb, Ramnit, Stoned, Yoddos, Yurn, Zegost and also cleans infections with Necurs (the last rootkit standing). Please note that the list is a bit outdated - new rootkit families are added as they become known.
5/5 2,944 Dec 02, 2016
BitDefender Labs
ClamWin Antivirus Portable 0.99.1
ClamWin Antivirus Portable 0.99.1 Portable ClamWin is a portable app, so you can take your antivirus with you to scan files on the go. ClamWin Free Antivirus is used by more than 600,000 users worldwide on a daily basis. It comes with an easy installer and open source code. You may download and use it absolutely free of charge. Features: High detection rates for viruses and spyware; Scanning Scheduler; Automatic downloads of regularly updated Virus Database. Standalone virus scanner and right-click menu integration to Microsoft Windows Explorer; Addin to Microsoft Outlook to remove virus-infected attachments automatically. Please note that ClamWin Free Antivirus does not include an on-access real-time scanner. You need to manually scan a file in order to detect a virus or spyware. ClamWin Free Antivirus is based on ClamAV engine and uses GNU General Public License by the Free Software Foundation, and is free (as in freedom) software. To find out more about GNU GPL, please visit http://www.gnu.org/philosophy/
5/5 1,350 Dec 02, 2016
Portable Apps
ClamWin Free Antivirus 0.99.1
ClamWin Free Antivirus 0.99.1 ClamWin is a Free Antivirus program for Microsoft Windows 10 / 8 / 7 / Vista / XP / Me / 2000 / 98 and Windows Server 2012, 2008 and 2003. ClamWin Free Antivirus is used by more than 600,000 users worldwide on a daily basis. It comes with an easy installer and open source code. You may download and use it absolutely free of charge. It features: High detection rates for viruses and spyware; Scanning Scheduler; Automatic downloads of regularly updated Virus Database. Standalone virus scanner and right-click menu integration to Microsoft Windows Explorer; Addin to Microsoft Outlook to remove virus-infected attachments automatically. The latest version of Clamwin Free Antivirus is 0.99.1 Please note that ClamWin Free Antivirus does not include an on-access real-time scanner. You need to manually scan a file in order to detect a virus or spyware. ClamWin Free Antivirus is based on ClamAV engine and uses GNU General Public License by the Free Software Foundation, and is free (as in freedom) software. To find out more about GNU GPL, please visit the following link: Philosophy of the GNU Project - Free Software Foundation.
5/5 3,404 Dec 02, 2016
ClamWin Free Antivirus
Combofix 17.1.13.1
Combofix 17.1.13.1 ComboFix is a program, created by sUBs, that scans your computer for known malware, and when found, attempts to clean these infections automatically. In addition to being able to remove a large amount of the most common and current malware, ComboFix also displays a report that can be used by trained helpers to remove malware that is not automatically removed by the program. Please note that running this program without supervision can cause your computer to not operate correctly. Therefore only run this program at the request of an experienced helper.
5/5 4,993 Jan 14, 2017
sUBs
CryptoPrevent 8.0.2.1
CryptoPrevent 8.0.2.1 CryptoPrevent is a tiny utility to lock down any Windows OS (XP, Vista, 7, 8, 8.1, and 10) to prevent infection by the Cryptolocker malware or ‘ransomware’, which encrypts personal files and then offers decryption for a paid ransom. YES, this is the original CryptoLocker prevention tool you’ve read about, designed to prevent infection from the first “ransomware” threat which emerged in late 2013, encrypting valuable data on the infected PC and offering decryption in exchange for large payment. Within a few months of it’s release it created quite a buzz with features from Brian Krebs security blog (among many others) and by educators everywhere such as Kim Komando, Ken Dwight ‘The Virus Doctor’, the infamous Britec09 on Youtube, and ultimately reaching televised news such as CNBC and The Today Show. We are proud to announce the release of CryptoPrevent Version 8! We’ve re-written CryptoPrevent from the ground up, incorporating new features to bring you the latest protections from crypto-style ransomware and all other forms of malware! New Features in v8 (Free and Premium Editions) New: Folder Watch – Monitors and protects common folders from items that match malware definitions. New: Submit Malicious Files – This will allow you to submit malicious files (which are not in our malware definitions) to review for inclusion in the default definitions. Improved: Program Filtering Protection – The original ‘BETA’ program filtering protections were very effective, but caused issues with running certain programs; now it offers vastly improved reliability as it is based on the new code platform of the coming 3rd generation ‘d7x’ PC technician utilities, it is thoroughly tested, and recommended for mass usage! Improved: SRP Protection – The original protection method since CryptoPrevent version 1 was automatically created “SRP” rules (aka “Software Restriction Policies” which are normally only available in “Professional” editions ...
5/5 2,826 Jan 19, 2017
FoolishTech
Crystal Security (PORTABLE) 3.5.0.134
Crystal Security (PORTABLE) 3.5.0.134 Crystal Security is a cloud-based system that detects and removes malicious programs (malware) from your computer. Its technology provides fast detection against malware and lets you know about the changes on your computer in real time. Anti-Malware Crystal Security is an easy to use application that was created in order to help you quickly detect and remove malware that might affect your computer. Cloud Based The cloud based Crystal Security gathers data from millions of participating users systems around the world to help defend you from the very latest viruses and malware attacks. Freeware Cloud based malware detection, easy to use, user-friendly interface, automatic/manual updates, no installations, supports multiple languages and many other features. Compatibility Microsoft Windows XP, Vista, 7, 8, 8.1, 10, Server 2003, 2008 32/64-bit Requires .NET Framework 3.5 July 9th, 2015 Crystal Security 3.5.0.134 - What's new FIXED: bug in Active protection, bug in Shell integration, several other minor bugs. UPDATED: embedded heuristic database.
4/5 1,080 Jul 10, 2015
Kardo Kristal
Crystal Security 3.5.0.134
Crystal Security 3.5.0.134 Crystal Security is a cloud-based system that detects and removes malicious programs (malware) from your computer. Its technology provides fast detection against malware and lets you know about the changes on your computer in real time. Anti-Malware Crystal Security is an easy to use application that was created in order to help you quickly detect and remove malware that might affect your computer. Cloud Based The cloud based Crystal Security gathers data from millions of participating users systems around the world to help defend you from the very latest viruses and malware attacks. Freeware Cloud based malware detection, easy to use, user-friendly interface, automatic/manual updates, no installations, supports multiple languages and many other features. Compatibility Microsoft Windows XP, Vista, 7, 8, 8.1, 10, Server 2003, 2008 32/64-bit Requires .NET Framework 3.5 July 9th, 2015 Crystal Security 3.5.0.134 - What's new FIXED: bug in Active protection, bug in Shell integration, several other minor bugs. UPDATED: embedded heuristic database.
4/5 1,067 Jul 10, 2015
Kardo Kristal
DDS
DDS DDS is a program that will scan your computer and create logs that can be used to display various startup, configuration, and file information from your computer. This program is used in security forums to provide a detailed overview of what programs are automatically starting when you start Windows. The program will also display information about the computer that will allow experts to quickly ascertain whether or not malware may be running on your computer. To use DDS, simply download the executable and save it to your desktop or other location on your computer. You should then double-click on the DDS.com icon to launch the program. DDS will then start to scan your computer and compile the information found into two log files. When DDS has finished it will launch the two Notepad windows that display the contents of these log files. The contents of these log files can then be attached to a reply in virus removal forums so that an expert can analyze them.
5/5 885 Jan 20, 2017
sUBs
Emsisoft Emergency Kit 11.9.0.6508
Emsisoft Emergency Kit 11.9.0.6508 The Emsisoft Emergency Kit contains a collection of programs that can be used without software installation to scan for malware and clean infected computers: Emsisoft Emergency Kit Scanner and Emsisoft Commandline Scanner. Emsisoft Emergency Kit Scanner The Emsisoft Emergency Kit Scanner includes the powerful Emsisoft Scanner complete with graphical user interface. Scan the infected PC for Viruses, Trojans, Spyware, Adware, Worms, Dialers, Keyloggers and other malicious programs. Emsisoft Commandline Scanner This scanner contains the same functionality as the Emergency Kit Scanner but without a graphical user interface. The commandline tool is made for professional users and is perfect for batch jobs. To run the Emsisoft Commandline Scanner, perform the following actions: - Open a command prompt window (Run: cmd.exe) - Switch to the drive of the USB Stick (e.g.: f:), then to the folder of the executable files (e.g.: cd run) - Run the scanner by typing: a2cmd.exe Next you will see a help page describing all available parameters. The following parameter is an example of scanning drive c:\ with Memory, Traces (Registry) scan enabled, and archive support active. Detected Malware is moved to quarantine. a2cmd.exe /f="c:\" /m /t /a /q="c:\quarantine\" Emsisoft Emergency Kit is free for private use. Will it run on my PC? Unless you have a rather outdated PC from the late 90s, the answer is most likely yes, assuming that you’re using Windows 7, 8 or 10 - with the latest service pack installed. All features are fully functional on x64 systems too. While running, Emsisoft Emergency Kit uses about 200 MB of your RAM which is quite low considering the 10 million signatures that it must load. If your PC has at least 1 GB of RAM, this will be perfect.
5/5 3,886 Oct 03, 2016
Emsisoft
ESET TeslaCrypt Decryptor 1.1.0.1
ESET TeslaCrypt Decryptor 1.1.0.1 ESET® released a decryptor for recent variants of the TeslaCrypt ransomware. If you have been infected by one of the new variants (v3 or v4) of the notorious ransomware TeslaCrypt and the encrypted files have the extensions .xxx, .ttt, .micro, .mp3 or remained unchanged, then ESET has good news for you. Recently, TeslaCrypt’s operators have announced they are wrapping up their malicious activities. On this occasion, one of ESET’s analysts anonymously contacted the group, using the official support channel offered to the ransomware victims by the TeslaCrypt’s operators and requested the universal master decryption key. Surprisingly, they made it public. This has allowed ESET to promptly create a free decrypting tool capable of unlocking files affected by all variants of this ransomware. How do I clean a TeslaCrypt infection using the ESET TeslaCrypt decrypter? Issue Your personal files became encrypted and the following information may be displayed in your computer, or in a .txt, .html or .png file Your ESET product detects the infection Win32/Filecoder.TeslaCrypt How to decrypt your files using the ESETTeslaCryptDecryptor.exe tool Solution Download the ESETTeslaCryptDecryptor.exe tool and save the file to your Desktop. Click Start → All Programs → Accessories, right-click Command prompt and then select Run as administrator from the context menu. Windows 8 / 8.1 / 10 users: press the Windows key + Q to search for applications, type Command prompt into the Search field, right-click Command prompt and then select Run as administrator from the context menu. Type the command cd %userprofile%\Desktop (do not replace "userprofile" with your username–type the command ...
5/5 442 May 31, 2016
ESET
Farbar Recovery Scan Tool 32bit 22.01.2017
Farbar Recovery Scan Tool 32bit 22.01.2017 Farbar Recovery Scan Tool, or FRST, is a portable application designed to run on Windows XP, Windows Vista, Windows 7 and Windows 8 in normal or safe mode to diagnose malware issues. It is also possible to run FRST in the Windows Recovery Environment in order to diagnose and fix boot issues. If you are using Windows XP and have boot issue, the system should boot to the Recovery Environment using a PE Boot CD and then you can run FRST This program will display detailed information about the Windows Registry loading points, services, driver services, Netsvcs entries, known DLLs, drives, and partition specifications. It will also list some important system files that could be patched by malware. Note: There are both 32-bit and 64-bit versions of Farbar Recovery Scan Tool available. Please pick the version that matches your operating system's bit type. If you don't know which version matches your system, you may try both of them. Only one of them will run on your system.
5/5 1,488 Jan 23, 2017
Farbar
Farbar Recovery Scan Tool 64bit 22.01.2017
Farbar Recovery Scan Tool 64bit 22.01.2017 Farbar Recovery Scan Tool, or FRST, is a portable application designed to run on Windows XP, Windows Vista, Windows 7 and Windows 8 in normal or safe mode to diagnose malware issues. It is also possible to run FRST in the Windows Recovery Environment in order to diagnose and fix boot issues. If you are using Windows XP and have boot issue, the system should boot to the Recovery Environment using a PE Boot CD and then you can run FRST This program will display detailed information about the Windows Registry loading points, services, driver services, Netsvcs entries, known DLLs, drives, and partition specifications. It will also list some important system files that could be patched by malware. Note: There are both 32-bit and 64-bit versions of Farbar Recovery Scan Tool available. Please pick the version that matches your operating system's bit type. If you don't know which version matches your system, you may try both of them. Only one of them will run on your system.
5/5 1,618 Jan 23, 2017
Farbar
FileASSASSIN 1.06
FileASSASSIN 1.06 FileASSASSIN can eradicate any type of locked files from your computer. If you use a computer, you've probably come across at least one of the following messages: Cannot delete file: Access is denied Make sure the disk is not full or write-protected and that the file is not currently in use The source or destination file may be in use The file is in use by another program or user These messages commonly appear when you're trying to delete files deposited by a malware infection, though occasionally a file just goes on lockdown. Whatever the reason for the file, FileASSASSIN can remove it Advanced programming techniques unload modules, close remote handles, and terminate processes in order to remove the particular locked file. Warning: Please use caution with FileASSASSIN as deleting critical system files may cause system errors. Usage Start FileASSASSIN and select a file by dragging it onto the text area or selecting it using the (...) button. Select a removal method from the list Click Execute and the removal process will commence
5/5 3,719 Nov 12, 2016
Malwarebytes
FreeFixer 1.14
FreeFixer 1.14 FreeFixer is a general purpose removal tool which will help you to delete potentially unwanted software, such as adware, spyware, trojans, viruses and worms. FreeFixer works by scanning a large number of locations where unwanted software has a known record of appearing or leaving traces. The scan locations include the programs that run on your computer, the programs that starts when you reboot your computer, your browser's plug-ins, your home page setting, etc. FreeFixer does not know what is unwanted, so it presents the scan result and it's up to you decide if some file should be removed and if some settings should restored to their default value. Please be careful! If you delete a legitimate file you may damage your computer. To assist you when determining if anything should be removed you can find more information at FreeFixer's web site for each item in the scan result. You can for example see what other users chose to do in the same situation. You can also save log file of your scan result and consult the volunteers in one of the FreeFixer helper forums. Release Notes What's New in FreeFixer 1.14 When scanning the LAN proxy settings FreeFixer will now figure out the path to the file containing the proxy code, if the proxy running on the local machine. If the proxy is running as a service inside svchost.exe FreeFixer will also display the service name in the scan result. Improved performance in the FreeFixer scan by caching results from the process enumeration. This decreased the scan time by approximately 35%. The number of memory allocations was reduced by 50%. Fixed bug in the Autorun.inf files scan which occured when there was a network mount on the local machine, pointing to ...
5/5 3,162 Jan 20, 2017
Roger Karlsson
Ghostpress 1.2.407
Ghostpress 1.2.407 Ghostpress is a free anti-keylogging software that prevent malicious software from capturing your keyboard presses. Full system wide key press protection Desktop widget or favicon 12 Languages(Croatian, Czech, Dutch, English, French, German, Indonesian, Italian, Korean, Latvian, Polish and Spanish) Ultra fast performance Process protection Anti low-level keylogger Completely free
5/5 173 Oct 12, 2016
Hendrik Schiffer
GMER 2.2.19882
GMER 2.2.19882 GMER is an application that detects and removes rootkits . It scans for: hidden processes hidden threads hidden modules hidden services hidden files hidden disk sectors (MBR) hidden Alternate Data Streams hidden registry keys drivers hooking SSDT drivers hooking IDT drivers hooking IRP calls inline hooks GMER runs on Windows XP/VISTA/7/8/10 Version History: This is list of changes for each release of GMER: 2.2 - Added support for Windows 10 - Improved files & disk scanning FAQ Frequently Asked Questions Question: Do I have a rootkit? Answer: You can scan the system for rootkits using GMER. Run gmer.exe, select Rootkit tab and click the "Scan" button. If you don't know how to interpret the output, please Save the log and send it to my email address. Warning ! Please, do not select the "Show all" checkbox during the scan. Question: How to create "3rd party" log ? Answer: Tick "3rd party" option and then click the "Scan" button. After the scan you can use "Remove signed" and "Remove duplicates" options to filter the scan results. Question: How to install the GMER software ? Answer: Just run gmer.exe. All required files will be copied to the system during the first lanuch. Question: How to uninstall/remove the GMER software from my machine ? Answer: Just delete the exe file. Question: My computer is infected and GMER won't start: Answer: Try to rename gmer.exe to iexplore.exe and then run it. Question: How do I remove the Rustock rootkit ? Answer: When GMER detects hidden service click "Delete the service" and answer YES to all questions. Question: How do I show all NTFS Streams ? Answer: On the "Rootkit Tab" select only: Files + ADS + Show all options and then click the Scan button. Question: Can I launch GMER in Safe Mode ? Answer: Yes, you can launch GMER in Safe Mode, however rootkits which don't work in Safe Mode won't be detected. Question: I am confused as to use delete or disable the hidden "service". Answer: Sometimes "delete ...
5/5 3,768 Dec 02, 2016
Gmer
HijackThis 2.0.5
HijackThis 2.0.5 HijackThis is a free utility that generates an in depth report of registry and file settings from your computer. HijackThis makes no separation between safe and unsafe settings in its scan results giving you the ability to selectively remove items from your machine. In addition to this scan and remove capability HijackThis comes with several tools useful in manually removing malware from a computer. IMPORTANT: HijackThis does not determine what is good or bad. Do not make any changes to your computer settings unless you are an expert computer user. Advanced users can use HijackThis to remove unwanted settings or files.
5/5 3,702 Sep 22, 2016
TrendMicro
Immunet FREE Antivirus 5.0.2.10301
Immunet FREE Antivirus 5.0.2.10301 Fast Antivirus Protection leverages the speed of cloud computing to deliver real-time protection to your PC. Stay protected against over 13 million viruses and thousands of new threats daily without ever downloading another virus detection file again. Simply stay connected to the Immunet Cloud to keep all virus detections up to date. Immunet FREE Antivirus is ideal for consumers who want fast protection that doesn't slow down their PC, including students, families, and netbook users. Features: Fast Antivirus Protection - Won't slow down your PC Community-Based - Protect your closest contacts Realtime Detection - NO virus updates required Companion Antivirus - Compatible with existing antivirus (2.0 Companion Products list) Strength in Numbers - Powered by Collective Immunity™ Intelligent Scans - Fast, configurable smart scans Additional Features: Silent / Gamer Mode History / Report Logging Registry Startup Scan
5/5 2,512 Jan 20, 2017
Immunet
Junkware Removal Tool 8.1.1
Junkware Removal Tool 8.1.1 Scrubs out the bad, keeps the good Is your PC running slow? It could be infected with potentially unwanted programs (PUPs), adware, or other junkware. Junkware Removal Tool (JRT) by Malwarebytes sweeps up and removes all traces of irritating hitchhikers. How it works for you Removes adware that spawn popup ads, such as Conduit Uninstalls unwanted toolbars and browser helper objects, including the Ask and Babylon toolbars Removes potentially unwanted programs (PUPs) Cleans up traces left behind by PUPs What it does for you Toolbar removal functionality Browser extension removal functionality (Google Chrome, Firefox, Internet Explorer) PUPs and adware removal functionality Light footprint Portable application—no installation necessary What makes Junkware Removal Tool different? Offers comprehensive junkware removal Junkware Removal Tool is custom built to detect and remove over 250 junkware variants, including adware and unwanted toolbars. Moves with you Junkware Removal Tool is portable. There’s no need to install it on your computer—simply load it on a USB, plug the USB into your computer, and start cleaning. Combines fast scanning with seamless removal Got coffee? Junkware Removal Tool will typically disinfect a computer in under five minutes, so your machine is clean and pristine in the time it takes you to brew another cup. Spells simplicity “CLI” Junkware Removal Tool operates through a lean but flexible Command Line Interface (CLI) to reduce its system footprint and simplify operation. Maintains a low profile Junkware Removal Tool self-extracts and installs itself in the Temp folder. It’s unobtrusive, out of the way, and is easy to remove when the job is done. Tech Specs Version 8.1.1 Languages Available English Hardware Requirements 1024MB of RAM (256MB for Windows XP) ...
5/5 5,650 Dec 29, 2016
Malwarebytes
Kaspersky CapperKiller 1.0.12.0
Kaspersky CapperKiller 1.0.12.0 The CapperKiller utility is designed for treating the aftermaths of a Trojan-Banker.Win32.Capper infection. 1. Signs of infection The given piece of malware changes proxy settings in the following browsers (if installed on the host): Internet Explorer, Mozilla Firefox, Opera, Google Chrome (uses Internet Explorer settings). It adds a special URL to the Use automatic configuration script option in the Internet connection settings. A reboot may be required after the treatment. The CapperKiller utility performs the following: Detects and fixes proxy settings in all browsers. Detects and deletes malicious exec files.
0/5 767 Dec 11, 2015
Kaspersky Lab
Kaspersky FippKiller 1.0.2
There is a special utility for curing an active Worm.Win32.Fipp.a infection. Infection symptoms: Significantly increased RDP traffic (brute-force attack). Antivirus software performance degradation on many hosts in local network. Infected hosts attempt to access URLs like *.ppift.* How to disinfect an infected system: Download the FippKiller.exe file. Launch the FippKiller.exe file on the infected (or potentially infected) host. It is recommended not to reboot hosts after using the utility until the network has been successfully disinfected. Command line options to use with the utility: -p <path> - scan a particular host; -n – scan network volumes; -r - scan flash drives, and removable USB / FireWire hard disks; -y – close the window once the utility completes; -s – scan in silent mode (without displaying the console window); -l <file_name> - log file name; -v – create a detailed log file (should be used with -l); -m – system infection protection monitoring mode; -q – scan the system, activate monitoring mode once the scan completes.
0/5 3,664 Jul 24, 2012
Kaspersky
Kaspersky RakhniDecryptor 1.14.0.0
Kaspersky RakhniDecryptor 1.14.0.0 RakhniDecryptor utility for removing Trojan-Ransom.Win32.Rakhni malicious software (.oshit and others) The malicious programs Trojan-Ransom.Win32.Rakhni, Trojan-Ransom.Win32.Agent.iih, Trojan-Ransom.Win32.Aura, Trojan-Ransom.Win32.Autoit, and Trojan-Ransom.AndroidOS.Pletor are used by malefactors to encrypt files so that their extensions are changed as follows: <filename>.<original_extension>.<locked> <filename>.<original_extension>.<kraken> <filename>.<original_extension>.<darkness> <filename>.<original_extension>.<nochance> <filename>.<original_extension>.<oshit> <filename>.<original_extension>.<oplata@qq_com> <filename>.<original_extension>.<relock@qq_com> <filename>.<original_extension>.<crypto> <filename>.<original_extension>.<helpdecrypt@ukr.net> <filename>.<original_extension>.<pizda@qq_com> <filename>.<original_extension>.<dyatel@qq_com> <filename>.<original_extension>_crypt <filename>.<original_extension>.<nalog@qq_com> <filename>.<original_extension>.<chifrator@qq_com> <filename>.<original_extension>.<gruzin@qq_com> <filename>.<original_extension>.<troyancoder@qq_com> <filename>.<original_extension>.<encrypted> <filename>.<original_extension>.<cry> <filename>.<original_extension>.<AES256> <filename>.<original_extension>.<enc> <filename>.<original_extension>.<coderksu@gmail_com_id371> <filename>.<original_extension>.<coderksu@gmail_com_id372> <filename>.<original_extension>.<coderksu@gmail_com_id374> <filename>.<original_extension>.<coderksu@gmail_com_id375> <filename>.<original_extension>.<coderksu@gmail_com_id376> <filename>.<original_extension>.<coderksu@gmail_com_id392> <filename>.<original_extension>.<coderksu@gmail_com_id357> <filename>.<original_extension>.<coderksu@gmail_com_id356> <filename>.<original_extension>.<coderksu@gmail_com_id358> <filename>.<original_extension>.<coderksu@gmail_com_id359> <filename>.<original_extension>.<coderksu@gmail_com_id360> <filename>.<original_extension>.<coderksu@gmail_com_id20> <filename>.crypt@india.com.random_characters> <filename>.<original_extension>.<hb15> For example: Before: file.doc / After: file.doc.locked Before: 1.doc / After: 1.dochb15 To regain control over the files encrypted by Trojan-Ransom.Win32.Rakhni, Trojan-Ransom.Win32.Aura, Trojan-Ransom.Win32.Agent.iih, Trojan-Ransom.Win32.Autoit, and Trojan-Ransom.AndroidOS.Pletor, use the RakhniDecryptor utility developed by Kaspersky Lab specialists. 1. How to work with the utility IMPORTANT: Trojan-Ransom.Win32.Rakhni creates the exit.hhr.oshit file that contains an encrypted password to user's files. If this file remains on the computer, it will make decryption with the RakhniDecryptor utility faster. If the file has been removed, it can be recovered with file recovery utilities. After the file is recovered, put it into %APPDATA% and run the scan with the utility once again. The exit.hhr.oshit file has the following path: Windows XP: C:\Documents and Settings\<username>\Application Data Windows 7/8: C:\Users\<username>\AppData\Roaming To decrypt ...
No Votes 3,675 Jul 23, 2015
Kaspersky Lab
Kaspersky RannohDecryptor 1.8.0.0
Kaspersky RannohDecryptor 1.8.0.0 If the system is infected by a malicious program of the family Trojan-Ransom.Win32.Rannoh , Trojan-Ransom.Win32.AutoIt, Trojan-Ransom.Win32.Fury, or Trojan-Ransom.Win32.Cryakl, all files on the computer will be encrypted in the following way: In case of a Trojan-Ransom.Win32.Rannoh infection, file names and extensions will be changed according to the template locked-<original name>.<four random letters>. In case of a Trojan-Ransom.Win32.Cryakl infection, the tag {CRYPTENDBLACKDC} is added to the end of file names. In case of a Trojan-Ransom.Win32.AutoIt infection, extensions will be changed according to the template <original name>@<mail server>_.<random set of characters>. Example: ioblomov@india.com_RZWDTDIC. To decrypt files affected by Trojan-Ransom.Win32.Rannoh, Trojan-Ransom.Win32.AutoIt, Trojan-Ransom.Win32.Fury, Trojan-Ransom.Win32.Crybola or Trojan-Ransom.Win32.Cryakl, use the RannohDecryptor utility.
0/5 1,180 May 20, 2015
Kaspersky Lab
Kaspersky RectorDecryptor 2.6.35.0
Kaspersky RectorDecryptor 2.6.35.0 Cybercriminals use Trojan-Ransom.Win32.Rector for disrupting normal performance of computers and for unauthorized modification of data making it unusable. Once the data has been “taken hostage” (blocked), its owner (user) receives a ransom demand. The victim is supposed to deliver the ransom in exchange for pirate's promise to send a utility that would restore the data or repair the PC. Kaspersky Lab specialists have developed a special utility for decrypting the data encrypted by Trojan-Ransom.Win32.Rector. The utility has a GUI. Do the following to decrypt files encrypted by Trojan-Ransom.Win32.Rector: Download the utility RectorDecryptor.zip to an infected computer; Extract its content using an archiver (WinZip, e.g.); Run the file RectorDecryptor.exe; The utility starts working by clicking the button Start scan. It finds and decrypts encrypted files. Select the option Delete crypted files after decryption to delete copies of encrypted files with extensions .vscrypt, .infected, .bloc, .korrektor, etc. after successful decryption.
0/5 3,724 Jun 16, 2015
Kaspersky Lab
Kaspersky Rescue Disk + WindowsUnlocker 1.2.2
Kaspersky Rescue Disk + WindowsUnlocker 1.2.2 Boot from the Kaspersky Rescue Disk to scan and remove threats from an infected computer without the risk of infecting other files or computers. If your computer is infected with the ransom malware, then use a special Kaspersky WindowsUnlocker utility. Ransom malware blocks access to data so that the user can no longer use it and prevents the computer from running correctly. Once the data has been blocked or encrypted, the user will receive a ransom demand. In order to disinfect the registry using Kaspersky WindowsUnlocker, perform the following actions: If you booted Kaspersky Rescue Disk in the graphic mode, click the button К ; in the bottom right corner of the screen and in the menu select Terminal. In the command prompt enter the command windowsunlocker and press Enter on the keyboard. Burn this ISO image to a CD, insert it into the infected system's CD-ROM drive, enter the PC's BIOS, set it to boot from the CD and reboot the computer. This lists the Gentoo-specific options, along with a few options that are built-in to the kernel, but that have been proven very useful to our users. Also, all options that start with "do" have a "no" inverse, that does the opposite. For example, "doscsi" enables SCSI support in the initial ramdisk boot, while "noscsi" disables it. Easily remove malicious objects from your computer without the risk of getting infected.
5/5 3,858 May 05, 2016
Kaspersky
Kaspersky ScatterDecryptor 1.0.0.0
Kaspersky ScatterDecryptor 1.0.0.0 If your computer is infected with Trojan-Ransom.BAT.Scatter, use the ScatterDecryptor utility for restoring encrypted files. Trojan-Ransom.BAT.Scatter encrypts user files with a public key and changes their extensions. The files can only be decrypted with a unique secret key. ScatterDecryptor restores the files only if the utility contains a certain Trojan-Ransom.BAT.Scatter modification's secret key.
0/5 2,324 Aug 01, 2014
Kaspersky Labs International Ltd.
Kaspersky ScraperDecryptor 1.0.0.0
Kaspersky ScraperDecryptor 1.0.0.0 The malicious program Trojan-Ransom.Win32.Scraper encrypts user files to block access to them. After the data has been blocked, the user is required to pay a ransom. To decrypt files affected by Trojan-Ransom.Win32.Scraper, use the ScraperDecryptor utility developed by Kaspersky Lab engineers.
No Votes 1,412 Jan 20, 2015
Kaspersky Lab
Kaspersky TDSSKiller 3.1.0.11
Kaspersky TDSSKiller 3.1.0.11 A rootkit is a program or a program kit that hides the presence of malware in the system. A rootkit for Windows systems is a program that penetrates into the system and intercepts the system functions (Windows API). It can effectively hide its presence by intercepting and modifying low-level API functions. Moreover it can hide the presence of particular processes, folders, files and registry keys. Some rootkits install its own drivers and services in the system (they also remain “invisible”). Kaspersky Lab has developed the TDSSKiller utility that allows removing rootkits. The utility supports 32-bit and 64-bit operation systems. The utility can be run in Normal Mode and Safe Mode. It detects and removes the following malware: malware family Rootkit.Win32.TDSS; bootkits; rootkits. List of malicious programs: Rootkit.Win32.TDSS, Rootkit.Win32.Stoned.d, Rootkit.Boot.Cidox.a, Rootkit.Boot.SST.a, Rootkit.Boot.Pihar.a,b,c, Rootkit.Boot.CPD.a, Rootkit.Boot.Bootkor.a, Rootkit.Boot.MyBios.b, Rootkit.Win32.TDSS.mbr, Rootkit.Boot.Wistler.a, Rootkit.Win32.ZAccess.aml,c,e,f,g,h,i,j,k, Rootkit.Boot.SST.b, Rootkit.Boot.Fisp.a, Rootkit.Boot.Nimnul.a, Rootkit.Boot.Batan.a, Rootkit.Boot.Lapka.a, Rootkit.Boot.Goodkit.a, Rootkit.Boot.Clones.a, Rootkit.Boot.Xpaj.a, Rootkit.Boot.Yurn.a, Rootkit.Boot.Prothean.a, Rootkit.Boot.Plite.a, Rootkit.Boot.Geth.a, Rootkit.Boot.CPD.b, Backdoor.Win32.Trup.a,b, Backdoor.Win32.Sinowal.knf,kmy, Backdoor.Win32.Phanta.a,b, Virus.Win32.TDSS.a,b,c,d,e, Virus.Win32.Rloader.a, Virus.Win32.Cmoser.a, Virus.Win32.Zhaba.a,b,c, Trojan-Clicker.Win32.Wistler.a,b,c, Trojan-Dropper.Boot.Niwa.a, Trojan-Ransom.Boot.Mbro.d, e, Trojan-Ransom.Boot.Siob.a, Trojan-Ransom.Boot.Mbro.f. How to disinfect a compromised system Download the TDSSKiller.exe file to a folder on the infected (or possibly infected) computer; Run the TDSSKiller.exe file; Wait until the scanning and disinfection completes. A reboot might require after the disinfection has been completed.
5/5 5,315 Aug 08, 2016
Kaspersky Lab
Kaspersky Virus Removal Tool 15.0.19.0
Kaspersky Virus Removal Tool 15.0.19.0 Kaspersky Virus Removal Tool is a utility designed to remove all types of threats from computers. Kaspersky Virus Removal Tool uses the effective detection algorithms realized in Kaspersky Anti-Virus and AVZ. Kaspersky Virus Removal Tool does not provide resident protection for your computer. After disinfecting a computer, you are supposed to remove the tool and install a full version of antivirus software. Advantages: Simplified interface. Can be installed to an infected computer (Safe Mode supported). Composite scan and disinfection system: signature detection and heuristic analyzer. Gathering system information and interactive creation of scripts for disinfection. General functions: Automatic and manual removal of virus, Trojans and worms. Automatic and manual removal of Spyware and Adware modules. Automatic and manual removal of all types of rootkits. Known issues: System memory scan is unavailable in x64 versions of Windows XP / Vista / 7 due to specific features of application system drivers. Impossible to rename application folder if User Account Control is enabled in Windows Vista settings and application Self-Defence disabled. Support rules for Kaspersky Virus Removal Tool: Technical support is provided only for users of Kaspersky Anti-Virus and Kaspersky Internet Security. If you are not a user of a Kaspersky Lab product, then in order to get technical support available for the tool, visit Kaspersky Lab The tool should be used for disinfection purpose under expert guidance via the service http://kaspersky-911.com. Unguided creation of scripts can result in a data loss or crippled computer. Having virus on your computer is always a risk of crippling it or losing data. Kaspersky Lab does not take any responsibility for the possible harm inflicted by virus during disinfection.
5/5 3,947 Dec 17, 2016
Kaspersky Lab
Kaspersky XoristDecryptor 2.3.45.0
Kaspersky XoristDecryptor 2.3.45.0 Malware of the family Trojan-Ransom.Win32.Xorist is designed for unauthorized modification of data on a victim computer. It makes computers uncontrollable or blocks its normal performance. After taking the data as a “hostage” (blocking it), a ransom is demanded from the user. The victim is supposed to deliver the ransom to the pirate, who is promising to send in return a program which would release the data or restore normal performance of the computer. There is a utility to confront malware of the family Trojan-Ransom.Win32.Xorist - XoristDecryptor.exe. The utility XoristDecryptor.exe is provided with a GUI. Disinfection of an infected system: Download the XoristDecryptor.zip to an infected computer. Extract the utility using an archiver program, WinZip for example. Run the XoristDecryptor.exe file. Click the Start scan button to execute the utility . The utility will prompt you to enter path of at least one encrypted file to begin the decryption process. The trojan program encrypts all files with the following extensions: doc, xls, docx, xlsx, db, mp3, waw, jpg, jpeg, txt, rtf, pdf, rar, zip, psd, msi, tif, wma, lnk, gif, bmp, ppt, pptx, docm, xlsm, pps, ppsx, ppd, tiff, eps, png, ace, djvu, xml, cdr, max, wmv, avi, wav, mp4, pdd, html, css, php, aac, ac3, amf, amr, mid, midi, mmf, mod, mp1, mpa, mpga, mpu, nrt, oga, ogg, pbf, ra, ram, raw, saf, val, wave, wow, wpk, 3g2, 3gp, 3gp2, 3mm, amx, avs, bik, bin, dir, divx, dvx, evo, flv, qtq, tch, rts, rum, rv, scn, srt, stx, svi, swf, trp, vdo, wm, wmd, wmmp, wmx, wvx, xvid, 3d, 3d4, 3df8, pbs, adi, ais, amu, arr, bmc, bmf, cag, cam, dng, ink, jif, jiff, jpc, jpf, jpw, mag, mic, mip, msp, nav, ncd, odc, odi, opf, qif, qtiq, srf, xwd, abw, act, adt, aim, ans, asc, ase, bdp, bdr, bib, boc, crd, diz, dot, dotm, dotx, dvi, ...
0/5 3,675 Jun 16, 2015
Kaspersky Lab
Malwarebytes Anti-Exploit 1.9.1.1291
Malwarebytes Anti-Exploit 1.9.1.1291 Malwarebytes Anti-Exploit protects you against the security vulnerabilities in the code, which make up your software programs. Your software contains millions of lines of code, which unfortunately some people want to exploit. Malwarebytes Anti-Exploit protects you from these vulnerabilities which people can manipulate in order to infect your system with malware. The software gives you three layers of security protection around popular browsers and applications, thereby preventing the vulnerable code from being exploited. The software is not an antivirus product in itself, but it is compatible with most antivirus software. KEY FEATURES INCLUDE It protects browsers and their add-ons Protects browser components Protects media players and PDF readers Allows you to manage custom shields Best of all, it's free!
5/5 3,764 Dec 16, 2016
Malwarebytes
Malwarebytes Anti-Malware 3.0.5.1299
Malwarebytes Anti-Malware 3.0.5.1299 Malwarebytes 3.0. Four layers of malware-crushing tech. Smarter detection. Specialized ransomware protection. It's the security you’ve been looking for. What it does for you Malwarebytes Premium protects you from advanced threats Protects you from advanced threats Detects and removes malware in real-time with advanced anti-malware, anti-spyware, and anti-rootkit technology. Scans for the newest and most dangerous threats automatically, so you’re protected without having to even think about it. Malwarebytes Premium protects your files from being locked and held for ransom Protects your files from being locked and held for ransom Stops unknown and known ransomware with proprietary next-gen technology that works proactively to shield your files. This is a powerful, comprehensive defense that blocks ransomware, and not a simple decryption tool. So you’re protected from tomorrow’s “Ransomware Attack!” headlines today. Malwarebytes Premium Prevents your programs from being used against you Prevents your programs from being used against you Wraps your browser and software programs in four layers of defense, stopping attacks that use vulnerabilities in those programs to infect your computer. Malwarebytes Premium protects you from fake and infected websites Protects you from fake and infected websites Detects and prevents contact with fake websites and malicious links. You are proactively protected from downloading malware, hacking attempts, and infected advertising. Worried about wandering into a “bad” Internet neighborhood? Now you don’t have to be. Malwarebytes Premium scans faster, scans smarter Scans faster, scans smarter Lightning-fast Hyper Scan mode targets only the threats that are currently active. Faster analysis. Still gets results. Run a scan in the background while you boot up your favorite game. It's done by the time you're ready to play. Full protection or simple disinfection? Download Malwarebytes 3.0 for free and you get 14 days of full real-time protection. After the 14 days are up, Malwarebytes 3.0 reverts to a very limited but still free version that will only disinfect your computer after an attack. ...
5/5 6,278 Dec 20, 2016
Malwarebytes.org
Malwarebytes Anti-Ransomware beta8 - build 0.9.17.661
Malwarebytes Anti-Ransomware beta8 - build 0.9.17.661 Malwarebytes Anti-Ransomware uses advanced proactive technology that monitors what ransomware is doing and stops it cold before it even touches your files. It has no shot at encrypting. And it does not rely on signatures or heuristics, so it’s light and completely compatible with antivirus. These methods proved to be so successful at stopping ransomware that Malwarebytes Anti-Ransomware detected all of the latest and most dangerous ransomware variants right out of development and into beta 1. This means when running Malwarebytes Anti-Ransomware, you do not have to worry about getting infected by CryptoLocker, CryptoWall, or CTBLocker. Better yet, it can defeat new ransomware the moment it is released, proactively protecting you from ransomware that’s never even been seen before. Malwarebytes Anti-Ransomware open beta starts today and is available for anyone to install and try out. Please keep in mind that this is the first beta and there may be some bugs or issues that need to be worked out, so we encourage you to try it out in a non-production environment first.
5/5 754 Sep 09, 2016
Malwarebytes
Malwarebytes Anti-Rootkit 1.9.3.1001
Malwarebytes Anti-Rootkit 1.9.3.1001 Malwarebytes Anti-Rootkit is a handy and reliable application designed to scan, detect and clean malicious rootkits that reside on your computer. The archive also includes a handy utility that repairs the damage caused by the presence of rootkits. This operation requires a reboot in order to apply the fixes.
0/5 3,802 Nov 15, 2015
Malwarebytes
Malwarebytes Chameleon 3.1.33
Malwarebytes Chameleon 3.1.33 Malwarebytes Chameleon technologies gets Malwarebytes Anti-Malware installed and running even when blocked by malicious programs. This program contains all up-to-date versions of Malwarebytes Anti-Malware. There are certain variants of malware that are designed to stop security programs from being installed and run on infected systems. Simply put, Chameleon is a tool that disguises Malwarebytes Anti-Malware (MBAM) so it can avoid the active infection designed to stop it allowing MBAM to be installed and run. Chameleon will also kill any known bad processes that are actively stopping MBAM from installing or running. If at any time your machine is infected and you try and install MBAM but you are unable to do so, or if you already have the program installed and try to run it but you are unable to do so, then it could be an infection preventing the installation or execution of the program. This is when Chameleon should be deployed, Chameleon will install its own driver and start to run, it will update MBAM to the latest definitions, (if already installed), kill any known malicious processes that are preventing MBAM from being installed or run, it will then launch MBAM automatically and a scan will begin.
5/5 2,643 Jan 02, 2017
Malwarebytes
Malwarebytes FileASSASSIN 1.06
Malwarebytes FileASSASSIN 1.06 FileASSASSIN can eradicate any type of locked files from your computer. If you use a computer, you've probably come across at least one of the following messages: Cannot delete file: Access is denied Make sure the disk is not full or write-protected and that the file is not currently in use The source or destination file may be in use The file is in use by another program or user These messages commonly appear when you're trying to delete files deposited by a malware infection, though occasionally a file just goes on lockdown. Whatever the reason for the file, FileASSASSIN can remove it Advanced programming techniques unload modules, close remote handles, and terminate processes in order to remove the particular locked file. Warning: Please use caution with FileASSASSIN as deleting critical system files may cause system errors. Usage Start FileASSASSIN and select a file by dragging it onto the text area or selecting it using the (...) button. Select a removal method from the list Click Execute and the removal process will commence
No Votes 693 Feb 02, 2016
Malwarebytes
McAfee Rootkit Remover 0.8.9.175
McAfee Rootkit Remover 0.8.9.175 McAfee Rootkit Remover is a stand-alone utility used to detect and remove complex rootkits and associated malware. Currently it can detect and remove ZeroAccess, Necurs and TDSS family of rootkits. McAfee Labs plans to add coverage for more rootkit families in future versions of the tool. How do you use RootkitRemover? Download the latest version of RootkitRemover When prompted, choose to save the file to a convenient location on your hard disk, such as your Desktop folder. When the download is complete, navigate to the folder that contains the downloaded RootkitRemover file, and run it. It is best to run the tool in Administrator mode. The tool then runs a window which shows the status of the process. The various stages are: Initializing Scanning Cleaning When the process is completed, it prompts the user to press any key to exit the tool. It is recommended to reboot the system and perform a full scan with the McAfee VirusScan to remove remnants of the infection that might still be left on the system. Frequently Asked Questions Q: What is the need for the RootkitRemover tool? A: RootkitRemover is not a substitute for a full anti-virus scanner. It is designed to detect and remove specific rootkit infections. Q: How to use the RootkitRemover tool? A: The tool can be run by either double clicking it or through the command-line. It is advisable to run a full system scan using McAfee VirusScan after removing any infection with the tool. Q: How do I save the scan results to a log file? A: The tool is designed to automatically save the report in the same folder as the tool is placed. Q: Why do I need to rescan with McAfee VirusScan? Would I ...
0/5 1,024 Aug 10, 2015
McAfee Labs
McAfee Stinger 32bit with Real Protect 12.1.0.2224
McAfee Stinger 32bit with Real Protect 12.1.0.2224 McAfee Stinger is a standalone utility used to detect and remove specific viruses. It is not a substitute for full anti-virus protection, but a specialized tool to assist administrators and users when dealing with infected system. Details on new or enhanced signatures added with each Stinger build are listed in the Readme details. Stinger now includes Raptor - a real-time behavior detection technology that monitors suspicious activity on an endpoint. Raptor leverages machine learning and automated behavioral based classification in the cloud to detect zero-day malware in real-time. Changelog Stinger Release Notes Build Number: 12.1.0.2224 Build Date: 10-Jan-2017 Stinger 32bit MD5: 0492e0b65c9c50f1e217cb39eb628492 SHA1: 7e84e1c1220257441de5dc8e9102824222eefe09 Stinger-ePO 32bit MD5: d26c11f02a9791f8a495acf3d3032c66 SHA1: 2cee23141246a683931e2444c4d96bcc03cf9f6b Stinger 64bit MD5: 72df4e016ea8ed5799e8d095f7c68e21 SHA1: 8900e95f7b6fbc5489f04f2e1f7fc671743e8358 Stinger-ePO 64bit MD5: 0fbe3f49425586280053371bef35b1d9 SHA1: d2f1650db4c643f84bd1fbd8e816389a4ebc6f83 Enhanced detections are those that have been ...
5/5 4,294 Jan 10, 2017
McAfee Security Products and Services
McAfee Stinger 64bit with Real Protect 12.1.0.2224
McAfee Stinger 64bit with Real Protect 12.1.0.2224 McAfee Stinger is a standalone utility used to detect and remove specific viruses. It is not a substitute for full anti-virus protection, but a specialized tool to assist administrators and users when dealing with infected system. Details on new or enhanced signatures added with each Stinger build are listed in the Readme details. Stinger now includes Raptor - a real-time behavior detection technology that monitors suspicious activity on an endpoint. Raptor leverages machine learning and automated behavioral based classification in the cloud to detect zero-day malware in real-time. Changelog Stinger Release Notes Build Number: 12.1.0.2224 Build Date: 10-Jan-2017 Stinger 32bit MD5: 0492e0b65c9c50f1e217cb39eb628492 SHA1: 7e84e1c1220257441de5dc8e9102824222eefe09 Stinger-ePO 32bit MD5: d26c11f02a9791f8a495acf3d3032c66 SHA1: 2cee23141246a683931e2444c4d96bcc03cf9f6b Stinger 64bit MD5: 72df4e016ea8ed5799e8d095f7c68e21 SHA1: 8900e95f7b6fbc5489f04f2e1f7fc671743e8358 Stinger-ePO 64bit MD5: 0fbe3f49425586280053371bef35b1d9 SHA1: d2f1650db4c643f84bd1fbd8e816389a4ebc6f83 Enhanced detections are those that have been ...
5/5 4,019 Jan 10, 2017
McAfee Security Products and Services
Microsoft Malicious Software Removal Tool 32bit 5.8
Microsoft Malicious Software Removal Tool 32bit 5.8 The Microsoft Windows Malicious Software Removal Tool checks Windows computers for and helps remove infections by specific, prevalent malicious software; including Blaster, Sasser, and Mydoom. When the detection and removal process is complete, the tool displays a report describing the outcome, including which, if any, malicious software was detected and removed. The tool creates a log file named mrt.log in the %WINDIR%\debug folder.
0/5 3,658 Jan 14, 2014
Microsoft
Microsoft Malicious Software Removal Tool 64bit 5.8
Microsoft Malicious Software Removal Tool 64bit 5.8 The Microsoft Windows Malicious Software Removal Tool checks Windows computers for and helps remove infections by specific, prevalent malicious software; including Blaster, Sasser, and Mydoom. When the detection and removal process is complete, the tool displays a report describing the outcome, including which, if any, malicious software was detected and removed. The tool creates a log file named mrt.log in the %WINDIR%\debug folder.
0/5 3,672 Jan 14, 2014
Microsoft
Norton Power Eraser 4.3.0.13
Norton Power Eraser 4.3.0.13 Norton Power Eraser is a powerful removal tool that may help you clean up certain types of difficult to remove security risks. If a program has hijacked your computer and you are having difficulty detecting or removing it, Norton Power Eraser may be able to clean your computer. Norton Power Eraser includes detection and removal capabilities for security risks that impersonate legitimate applications (for example, fake antivirus software), often known as "scareware", "rogueware" or "scamware". The tool uses more aggressive techniques than your Norton security product, hence there is a risk that it will flag legitimate programs for removal. You should carefully review the scan results page before removing any files. Scanning and Cleaning with Norton Power Eraser You do not need to install Norton Power Eraser. When the download is complete, just double click the icon on your desktop and the tool will start. You will need to accept the End User License Agreement before running a scan. Settings Click Settings on the main Norton Power Eraser screen to set up a network proxy or adjust log settings. If you choose to delete log history, you cannot undo any previous fix sessions. Click OK or Cancel to return to the main screen. View Scan Logs During every System Scan, Norton Power Eraser creates a log of important system information such as: The operating system present on the computer The installed drivers The processes and the services running on the computer The startup items The browser plug-ins The files detected as risks and the actions taken To see the log, click the View Log link at the bottom of the screen. The log is in XML format, so for best results, you should use an XML viewer. Restoring a Previous Session To restore previously removed files, click the REVIEW button found on the main Window.
0/5 2,458 Jul 10, 2014
Symantec
NoScript 2.9.0.11
NoScript 2.9.0.11 The NoScript Firefox extension provides extra protection for Firefox, Flock, Seamonkey and other mozilla-based browsers. NoScript's unique whitelist based pre-emptive script blocking approach prevents exploitation of security vulnerabilities (known and even not known yet!) with no loss of functionality... You can enable JavaScript/Java execution for sites you trust with a simple left-click on the NoScript status bar icon (look at the picture), or using the contextual menu, for easier operation in popup statusbar-less windows. Change Info: v 2.9.0.11 ============================================================= x [XSS] Fixed infrastructure issue preventing one filter from being automatically synchronized with Mozilla's source code as designed (thanks .mario and Maxim Rupp for reporting) x [XSS] Added filtering for a potential CSRF vector (thanks Masato Kinugawa for reporting)
5/5 3,572 Apr 22, 2016
InformAction
OTL 3.2.69.0
OTL 3.2.69.0 OTL, or OldTimer ListIt, is a tool that is used to diagnose a computer for a possible malware presence and to provide system diagnostics information that can by someone working on a computer. When run, OTL will scan your computer for a variety of information and then generate a report with a tremendous amount of information about your computer's hardware, programs, files, and running environment.
0/5 1,360 Feb 20, 2015
OldTimer
Panda Cloud Antivirus 3.0.1
Panda Cloud Antivirus 3.0.1 Download Panda Cloud Antivirus, the first free cloud-based antivirus thin-client. It consists of a lightweight antivirus agent that is connected in real-time to PandaLabs' online Collective Intelligence servers to protect faster against the newest malware variants while barely impacting PC performance. Thanks to Panda Security's Collective Intelligence malware and goodware online database, Panda Cloud Antivirus detects more malware than traditional signature-based solutions which take longer to detect the most recent, and therefore most dangerous, variants. Panda Cloud Antivirus protects you while you browse, play or work and you won't even notice it. It is extremely light as all the work is done online in the cloud. Panda Cloud Antivirus provides you with the fastest protection against the newest viruses thanks to its cloud-scanning from PandaLabs' servers. Panda Cloud Antivirus is truly install and forget. Don't worry about updates, configuration or complicated decisions ever again. Panda Cloud Antivirus will protect you while you browse, play or even work and you won’t even notice it running on your computer. Features: The fastest in detecting new viruses: Our network of Collective Intelligence servers identifies and processes viruses automatically in a fraction of the time required by laboratory technicians. Designed with you in mind: Now you can forget about tiresome antivirus products with incessant notifications and difficult questions. Panda Cloud Antivirus works for you without annoying you. Updates are history: The real key to Panda Cloud Antivirus is in the Collective Intelligence servers. That's why you'll always have maximum detection capacity without relying on traditional updates. Detects more than anyone else: The Panda servers have a database of millions of viruses allowing Panda Cloud Antivirus to detect the multitude of threats that appear every day.
0/5 3,669 Jun 11, 2014
Panda Security
Panda Cloud Cleaner 1.1.10
Panda Cloud Cleaner 1.1.10 An advanced disinfector that detects malware that traditional security solutions cannot detect. A second opinion on the security of your PC. Greater detection capacity than traditional antivirus solutions thanks to its latest generation technologies. Online detection of all types of malware, vulnerabilities and unknown threats. Easy to use from your browser and always up-to-date against the latest threats. A free report about threats detected and the status of the security protection installed on your computer. Compatible with any installed antivirus, the most popular browsers and the latest versions of Windows, including Windows 10.
5/5 3,701 Dec 10, 2016
Panda Security
Panda USB Vaccine 1.0.0.50
Panda USB Vaccine 1.0.0.50 Panda USB Vaccine - free antimalware to block malware spreading through USB drives. There is an increasing amount of malware which, like the dangerous Conficker worm, spreads via removable devices and drives such as memory sticks, MP3 players, digital cameras, etc. To do this, these malicious codes modify the AutoRun file on these devices. Panda USB Vaccine is a free solution designed to protect against this threat. It offers a double layer of preventive protection, allowing users to disable the AutoRun feature on computers as well as on USB drives and other devices: Vaccine for computers: This is a ‘vaccine' for computers to prevent any AutoRun file from running, regardless of whether the device (memory stick, CD, etc.) is infected or not. Vaccine for USB devices: This is a ‘vaccine' for removable USB devices, preventing the AutoRun file from becoming a source of infection. The tool disables this file so it cannot be read, modified or replaced by malicious code. This is a very useful tool as there is no simple way of disabling the AutoRun feature in Windows. This provides users with a simple way of disabling this feature, offering a high degree of protection against infections from removable drives and devices.
0/5 851 Nov 03, 2015
Panda Security
Phrozen ADS (Alternate Data Stream) Revealer 1.0.5642
Phrozen ADS (Alternate Data Stream) Revealer 1.0.5642 Phrozen ADS (Alternate Data Stream) Revealer is a Microsoft Windows program, especially designed to reveal possible malicious ADS files in your file system. Since the Alternate Data Stream functionality is only available for NTFS (New Technology File System), the program is able to scan and detect this kind of files only for this type of file system (Physical Hard Drive/Virtual Hard Drive/Physical Removable Device/Virtual Removable Device). If some ADS Files are detected during the scan you then can decide wether or not you want to keep them or to back them up. You can also have a content preview to detect in one glance if it looks legitemate or not. Phrozen ADS Revealer is the perfect tool to sanitize your NTFS file systems against bloated content or hidden malwares. Another great tool to put in your collection and 100% free. What are Alternate Data Stream Alternate data streams allow more than one data stream to be associated with a filename, using the format "filename:streamname" (e.g., "text.txt:extrastream"). NTFS Streams were introduced in Windows NT 3.1, to enable Services for Macintosh (SFM) to store resource forks. Although current versions of Windows Server no longer include SFM, third-party Apple Filing Protocol (AFP) products (such as GroupLogic's ExtremeZ-IP) still use this feature of the file system. Very small ADS (called Zone.Identifier) are added by Internet Explorer and recently by other browsers to mark files downloaded from external sites as possibly unsafe to run; the local shell would then require user confirmation before opening them.[21] When the user indicates that they no longer want this confirmation dialog, this ADS is deleted. Alternate streams are not listed in Windows Explorer, and their size is not included in the file's size. They are ignored when the file is copied or moved ...
No Votes 703 Jan 16, 2016
PHROZEN SAS
Protector Plus - Windows Vulnerability Scanner 4.3
Protector Plus - Windows Vulnerability Scanner 4.3 Protector Plus - Windows Vulnerability Scanner checks your system for Windows Vulnerabilities. It guides you to update with the right patch to make your system secure. This program is updated regularly by Proland Software to detect all the vulnerabilities discovered. Once the Scan is completed, Protector Plus - Windows Vulnerability Scanner lists the vulnerabilities detected, their risk level and the download location of the patch. It also creates the log file named Protector_Plus_Windows_Vulnerability_Scan.htm in the folder from where Protector Plus - Windows Vulnerability Scanner was executed.
0/5 3,278 May 22, 2014
Proland Software
RansomFree 2.2.2.0
RansomFree 2.2.2.0 Keep your important files safe from ransomware RansomFree protects computers and servers running Windows. The only free tool that stops 99% of ransomware strains, including never-before-seen types. Simple installation, immediate protection Download and install RansomFree in less than 5 minutes, by following our simple step-by-step installation wizard. Eliminating Cyber Crime Cybereason’s mission is to put an end to cyber crime. And in order to put an end to one of the most profitable cyber operations of the recent years – ransomware – we have to make it unprofitable for the criminals. That’s why we are launching RansomFree: free, easy-to-install ransomware protection software, available for download for every individual and business that lacks the budget and skills to fight back. About Cybereason Cybereason is a company of elite, former military cyber-security experts. Our deep experience in offensive cyber operations helped us build military-grade technologies that enable companies to stop attacks in real time. Cybereason raised over 90 million dollars from investors like Lockheed Martin and the Japanese telecommunication giant Softbank. The company and its technology were featured in Fortune and Forbes. https://s3.amazonaws.com/ransomfree-cybereason/Ransomfree.mp4?_=1
5/5 75 Jan 16, 2017
Cybereason
Rem-VBSworm 7.0.0
Rem-VBSworm 7.0.0 A small tool that will aid you to remove VBS malware (and unhide your files) from a machine or in a network. The tool is written entirely in batch. Instructions on using Rem-VBSworm You should run the script in the following sequence, at least on a normal machine: Plug in your infected USB (if any) and choose A, then B and afterwards C. After these steps, perform a full scan with your installed antivirus product or perform an online scan. Some tips and tricks: Using option A, the tool will attempt to clean the infection. It will also fix any registry changes made by the malware. (for example it will re-enable Task Manager should it be disabled). ! When you use option B, be sure to type only the letter of your USB drive! So if you have a USB drive named G:\, you should only type G This option will eradicate any related malware on the USB drive, as well as unhide your files (make them visible again). With option C you can download Panda USB Vaccine to prevent any other autorun malware entering your computer. With option D you have the possibility to disable or re-enable the Windows Script Host (WSH), to prevent any malware abusing it. I advise to end the script with Q as to ensure proper logfile closing. A logfile will open automatically, but is also created by default on the C:\ drive. (C:\Rem-VBS.log) When the tool is running, do not use the machine for anything else. (it takes about 30 seconds to run) If VBS malware is found, it will be automatically removed and a copy ...
5/5 718 Mar 12, 2016
Bart Blaze
RKill 2.8.4.0
RKill 2.8.4.0 RKill is a program that was developed at BleepingComputer.com that attempts to terminate known malware processes so that your normal security software can then run and clean your computer of infections. When RKill runs it will kill malware processes and then import a Registry file that removes incorrect file associations and fixes policies that stop us from using certain tools. When finished it will display a log file that shows the processes that were terminated while the program was running. As RKill only terminates a program's running process, and does not delete any files, after running it you should not reboot your computer as any malware processes that are configured to start automatically will just be started again. Instead, after running RKill you should immediately scan your computer using some sort of anti-malware or anti-virus program so that the infections can be properly removed.
5/5 3,306 Apr 09, 2016
Bleeping Computer
RogueKiller 12.9.4 32bit
RogueKiller 12.9.4 32bit RogueKiller is an anti-malware program written in C++ and able to detect and remove generic malwares and some advanced threats such as rootkits, rogues, worms, … Based on generic ways to find malwares by their behaviour (heuristics), on classic anti-malware analysis (signature finding) and on undocumented hacks, RogueKiller can find/remove most of the basic malwares (rogues, trojans, …) and some advanced threats like ZeroAccess or TDSS that behave more like rootkits. RogueKiller is a tiny anti-malware maintained by a small team, and thus new detections are based on “most spread threats“. We react quickly to integrate detection and removal of what we think can be a global threat and affect a big amount of users across the world. Here’s a little summary of what RogueKiller is able to do: Kill malicious processes Stop malicious services Unload malicious DLLs from processes Find/Kill malicious hidden processes Find and remove malicious autostart entries, including : Registry keys (RUN/RUNONCE, …) Tasks Scheduler (1.0/2.0) Startup folders Find and remove registry hijacks, including : Shell / Load entries Extension association hijacks DLL hijacks Many, many others … Read / Fix DNS Hijacks (DNS Fix button) Read / Fix Proxy Hijacks (Proxy Fix button) Read / Fix Hosts Hijacks (Hosts Fix button) Restore shortcuts / files hidden by rogues of type “Fake HDD“ Read / ...
5/5 7,202 Jan 17, 2017
RogueKiller
RogueKiller 12.9.4 64bit
RogueKiller 12.9.4 64bit RogueKiller is an anti-malware program written in C++ and able to detect and remove generic malwares and some advanced threats such as rootkits, rogues, worms, … Based on generic ways to find malwares by their behaviour (heuristics), on classic anti-malware analysis (signature finding) and on undocumented hacks, RogueKiller can find/remove most of the basic malwares (rogues, trojans, …) and some advanced threats like ZeroAccess or TDSS that behave more like rootkits. RogueKiller is a tiny anti-malware maintained by a small team, and thus new detections are based on “most spread threats“. We react quickly to integrate detection and removal of what we think can be a global threat and affect a big amount of users across the world. Here’s a little summary of what RogueKiller is able to do: Kill malicious processes Stop malicious services Unload malicious DLLs from processes Find/Kill malicious hidden processes Find and remove malicious autostart entries, including : Registry keys (RUN/RUNONCE, …) Tasks Scheduler (1.0/2.0) Startup folders Find and remove registry hijacks, including : Shell / Load entries Extension association hijacks DLL hijacks Many, many others … Read / Fix DNS Hijacks (DNS Fix button) Read / Fix Proxy Hijacks (Proxy Fix button) Read / Fix Hosts Hijacks (Hosts Fix button) Restore shortcuts / files hidden by rogues of type “Fake HDD“ Read / ...
5/5 4,948 Jan 17, 2017
RogueKiller
RunPE Detector 1.0.3
RunPE Detector 1.0.3 Phrozen RunPE Detector is a security program, especially designed to detect and defeat some suspicious processes using a generic method. We at Phrozen Software do things differently, more creatively. So, when we set ourselves the task of creating a novel way of detecting, disabling and removing RATs, we didn't want to take the route every other anti-virus company has done before us. Phrozen Software studied the behaviour of RATs and discovered that hackers virtually always use a technique called RunPE. This technique spawns a legitimate process – often the default browser or a Microsoft system process – and replace it with a malicious program code directly in memory. Your computer is thus tricked and treats the malicious code as a legitimate process. The user and his anti-virus program have no idea that his default browser is effectively turned into a virus. RunPE is a technique that is used in several malicious ways. The two most common are : [1] FWB (Firewall Bypass): As its name suggests, this technique is implemented to bypass or disable the Application Firewall or the Firewall rules. Since most malware needs to connect to a remote Command-and-Control (C&amp;C) Server, it needs to connect to the Internet via the Firewall. Since most users are connected to the Internet at home, normally the installed Firewall would prevent the malware from connecting to the Internet. Using the RunPE technique to hijack a legitimate process that is authorized to reach Internet, any malware could subsequently connect to the C&amp;C without being detected by the Firewall. [2] Malware Packer or Crypter: Generally script kiddies – immature hackers - use a well-known type of malware that is already detected by most anti-virus programs. They then try the obfuscate this malware to evade ...
No Votes 707 Jan 16, 2016
PHROZEN SAS
Shortcut Cleaner 1.4.2.0
Shortcut Cleaner 1.4.2.0 Shortcut Cleaner is a utility that will scan your computer for Windows shortcuts that have been hijacked by unwanted or malicious software. When Shortcut Cleaner finds bad shortcuts, it will automatically clean them so that they do not open unwanted programs. When run, Shortcut Cleaner will scan various locations on your computer for Windows shortcuts. When a shortcut is detected it will check properties for a possible hijacking. If one is detected, it will automatically clean the shortcut so that it no longer opens the offending program or web site. When the Shortcut Cleaner has finished scanning your hard drive it will create a log file on your desktop called sc-cleaner.txt and then display it. This log file will contains a list of all the shortcuts that were detected and cleaned. As of version 1.2.3, Shortcut Cleaner will also clean hijacked Registry entries associated with known hijackers. This tool is currently used to clean shortcuts hijacked by the following domains: widdit.com searchcompletion.com certified-toolbar.com complitly.com newhometab.com dtinstaller.com chipinstaller.com homebase-apps.com helperbar.com 22find.com qvo6.com hotstartsearch.com dosearches.com v9.com 22apple.com portaldosites.com delta-homes.com nationzoom.com do-search.com awesomehp.com aartemis.com sweet-page.com webssearches.com key-find.com qone8.com omiga-plus.com www-search.net safesear.ch istartsurf.com istartpageing.com
5/5 3,783 Aug 13, 2016
Lawrence Abrams
Should I Remove It? 1.0.4.36591
Should I Remove It? 1.0.4.36591 Remove adware, bloatware and crapware with one click, 100% FREE. Ever wonder how to clean out your computer? Many people do, because it’s not unusual to have your PC filled with adware, toolbars and other programs you no longer need or probably never intended to install in the first place. But like most people, what programs should you remove is the tough question. Well, we have your answer, simply download the award winning "Should I Remove It?" app and wonder no more. The app is a tiny, lightweight program designed to show you what programs you have installed on your computer and quickly determine what programs you can safely remove. Supports Windows 10, 8, 7, Vista and XP
5/5 18 Jan 13, 2017
Reason Software
Simple Software-restriction Policy 2.10
Simple Software-restriction Policy 2.10 A software policy makes a powerful addition to Microsoft Windows' malware protection. In particular, it is more effective against ransomware than traditional approaches to security. If you know about the Linux 'execute permission' bit then you'll understand what this is for. The mode of operation is somewhat different in that execute permission is granted to folders and subfolders rather than individual files, but the intention is the same, to stop undesirable or unknown software from launching unless you OK it. Additionally, it is possible to specify that certain executables (typically browsers and email clients) are run with reduced rights. This is a valuable damage-limitation measure against browser plugin vulns, etc. The protection can be turned off without a reboot whilst installing legitimate software, and will automatically reactivate after a specified time
5/5 187 Oct 04, 2016
IWR Consultancy
Spybot Search and Destroy 2.4.40
Spybot Search and Destroy 2.4.40 Spybot – Search and Destroy is a set of tools for finding and removing malicious software. The ‘immunization’ feature preemptively protects the browser against threats. System scans and file scans detect spyware and other malicious software and eradicates it. Spyware is a kind of threat not always detected by anti-virus applications. Spyware silently tracks your Internet activity to create a profile about you. This information can then be used for example by marketing and advertising companies. Spybot – Search &amp; Destroy is designed for use by either novice or experienced users. Novices can choose to view additional information on the available features while experienced users have additional tools and settings. It is fully functional and free for personal use! Spybot 2 – Feature Overview Malware Detection &amp; Prevention Malware Scan &amp; Fix Rootkits Scan &amp; Fix Adware and Toolbar Scan &amp; Fix iPhone® Profile Scan Network Drives Scan &amp; Fix System Immunization Tools Startup Analysis and Editing Registry Repair Secure Shredding Report and Log Creation OpenSBI Detection Rule Editor Protected Repair Environment (Premium) Spybot Boot CD Creation (Premium) Improvements New User Interface Faster Startup and Scanning Whitelisting Windows Security Center Integration Additional Assistance Dialogues Automatic Updates (Premium) Command Line Edition (Premium)
0/5 3,450 Aug 26, 2015
Safer Networking Ltd.
SpywareBlaster 5.5
SpywareBlaster 5.5 Powerful protection against spyware, adware, browser hijackers, dialers and other potentially unwanted software. Trusted and effective. Why SpywareBlaster? Spyware, adware, browser hijackers, and dialers are some of the most annoying and pervasive threats on the Internet today. By simply browsing a web page, you could find your computer to be the brand-new host of one of these unwanted fiends! The most important step you can take is to secure your system. And SpywareBlaster is the most powerful protection program available. Multi-Angle Protection Prevent the installation of ActiveX-based spyware and other potentially unwanted programs. Block spying / tracking via cookies. Restrict the actions of potentially unwanted or dangerous web sites. No-Nonsense Security SpywareBlaster can help keep your system secure, without interfering with the "good side" of the web. And unlike other programs, SpywareBlaster does not have to remain running in the background. It works alongside the programs you have to help secure your system.
5/5 1,075 Jun 07, 2016
Brightfort
SUPERAntiSpyware Free 6.0.1232
SUPERAntiSpyware Free 6.0.1232 SUPERAntiSpyware is the most thorough scanner on the market. Our Multi-Dimensional Scanning and Process Interrogation Technology will detect spyware that other products miss! SUPERAntiSpyware will remove Spyware, NOT just the easy ones! Benefits and Features Quick, Complete and Custom Scanning of Hard Drives, Removable Drives, Memory, Registry, Individual Folders and More! Includes Trusting Items and Excluding Folders for complete customization of scanning! Detect and Remove Spyware, Adware, Malware, Trojans, Dialers, Worms, KeyLoggers, HiJackers and many other types of threats. Stop unwanted pop-ups and ads caused by malware with integrated SUPERAdBlocker® Technology. Repair broken Internet Connections, Desktops, Registry Editing, Task Manager and more with our unique Repair System! Spyware applications often disable system components to prevent removal - SUPERAntiSpyware resets and restores these items in seconds! Quarantine items detected and removed for complete protection. Items in the quarantine may be restored to your computer if desired. Detailed scan logs with complete information about detected and removed threats and their locations within your computer. Scan logs allow you to review scheduled scan results at any time. Advanced Detection and Removal Multi-Dimensional Scanning SUPERAntiSpyware is a next generation scanning system that goes beyond the typical rules based scanning methods. Our Multi-Dimensional Scanning system detects existing threats as well as threats of the future by analyzing threat characteristics in addition to code patterns. Process Interrogation Technology SUPERAntiSpyware features our unique Process Interrogation Technology (PIT) that allows threats ...
5/5 187 Jan 06, 2017
SUPERAntiSpyware
TeslaDecoder 1.0.1
TeslaDecoder 1.0.1 TeslaDecoder has the ability to decrypt all variants of the TeslaCrypt ransomware. This includes the following extensions: .micro, .xxx, .ttt, .mp3, and also encrypted files that have not had their file extensions changed. For older versions of the TeslaCrypt ransomware, when run TeslaDecoder, it will search for particular Windows registry keys, the storage.bin file, or key.dat file, and if it finds these keys, it will attempt to extract the decryption key. If a decryption key is extracted it can then decrypt all of the files in a designated folder or all files on a system. Some victim's of this ransomeware have had the decryption key stripped from the data files. In this case, TeslaDecoder will not be able to help you decrypt your files. For the newest versions of the TeslaCrypt ransomeware (The most common), read the instructions contained in the download package to decrypt your files. Changelog for TeslaDecoder, TeslaViewer and TeslaRefactor --------------------------------------------------------- **************** * TeslaDecoder * **************** ========== = 1.0.1 = ========== - Removed check of a value at offset 0x08 for TeslaCrypt 3/4 encrypted files ========== = 1.0.0 = ========== - Added 4th PrivateKyTesla into TeslaDecoder. All files encrypted by TeslaCrypt 3.0.0 - 4.2 can be decrypted. The key is predefined when extension of TeslaCrypt 3/4 is choosen in Set key dialog. ========== = 0.0.91 = ========== - Decrypt list - If listed file doesn't have TeslaCrypt extension, the file extension is not changed. ========== = 0.0.90 = ========== - Added support for listing encrypted files and decryption of listed files in the list file. - GUI changes - Log changes - Internal changes - README.txt rewritten ========== = 0.0.85 = ========== - Added support for TeslaCrypt 4.0 with the same extension as the original file. ========== = 0.0.84 = ========== - Fixed and issue when PublicKeyBC in exx files is shorter than 64 characters ========== = 0.0.83 = ========== - Fixed a bug when all files were skipped if decryption of xxx, ttt, micro, mp3 files was selected and ...
5/5 457 May 23, 2016
BloodDolly
Trend Micro Anti-Threat Toolkit 32bit 1.62.0.1157
Trend Micro Anti-Threat Toolkit 32bit 1.62.0.1157 Using the Trend Micro Anti-Threat Toolkit to analyze malware issues and clean infections - For Home and Home Office users Learn how to use the Trend Micro Anti-Threat Toolkit (ATTK) to perform system forensic scans and clean the following infections: General malware infection Master boot record Infection CIDOX/ RODNIX infection Rootkit infection Zbot infection Cryptolocker infection
5/5 1,392 Aug 13, 2016
Trend Micro Inc.
Trend Micro Anti-Threat Toolkit 64bit 1.62.0.1157
Trend Micro Anti-Threat Toolkit 64bit 1.62.0.1157 Using the Trend Micro Anti-Threat Toolkit to analyze malware issues and clean infections - For Home and Home Office users Learn how to use the Trend Micro Anti-Threat Toolkit (ATTK) to perform system forensic scans and clean the following infections: General malware infection Master boot record Infection CIDOX/ RODNIX infection Rootkit infection Zbot infection Cryptolocker infection
5/5 1,404 Aug 13, 2016
Trend Micro Inc.
Trend Micro HouseCall 32bit 8.0
Trend Micro HouseCall 32bit 8.0 Think your PC is infected? HouseCall can quickly identify and fix a wide range of threats including viruses, worms, Trojans, and spyware. Features: Easy-to-use interface makes scanning your computer for viruses a snap Custom Scan lets you specify which folders to scan Quick Scan reduces software scan times to a few minutes Stand-alone eliminates compatibility issues associated with browser-activated scanners Smart Scan delivers the latest antivirus protection while reducing download times Smart Feedback shares threat information to quickly discover new threats Review and Restore lets you check and compare scan results and recover files Enhanced Detection and Cleanup addresses rootkits and other sophisticated threats Enhanced Scanning performance speeds threat detection
0/5 3,330 Feb 03, 2014
Trend Micro
Trend Micro HouseCall 64bit 8.0
Trend Micro HouseCall 64bit 8.0 Think your PC is infected? HouseCall can quickly identify and fix a wide range of threats including viruses, worms, Trojans, and spyware. Features: Easy-to-use interface makes scanning your computer for viruses a snap Custom Scan lets you specify which folders to scan Quick Scan reduces software scan times to a few minutes Stand-alone eliminates compatibility issues associated with browser-activated scanners Smart Scan delivers the latest antivirus protection while reducing download times Smart Feedback shares threat information to quickly discover new threats Review and Restore lets you check and compare scan results and recover files Enhanced Detection and Cleanup addresses rootkits and other sophisticated threats Enhanced Scanning performance speeds threat detection
0/5 3,334 Feb 03, 2014
Trend Micro
Trend Micro Rescue Disk 3.0.0.1018
Trend Micro Rescue Disk 3.0.0.1018 Trend Micro Rescue Disk allows you to use a CD, DVD, or USB drive to examine your computer without launching Microsoft Windows. It finds and removes persistent or difficult-to-clean security threats that can lurk deep within your operating system. Rescue Disk does not need to load potentially-infected system files into memory before trying to remove them. It can scan hidden files, system drivers, and the Master Boot Record (MBR) of your computer’s hard drive without disturbing the operating system. Getting Started Click Download to begin. If prompted, click Save or Save As, and save the file on your computer’s desktop. While the installer downloads, prepare one of the following: Blank CD or DVD (do not use a rewritable disc) Empty USB Drive (128MB or larger) NOTE: The drive will be reformatted before creating Rescue Disk, and anything already on the USB drive will be lost. Please back up any important files before using a USB drive for Trend Micro Rescue Disk. When you have finished downloading the file, double-click the Trend Micro Rescue Disk icon to start the installer. To launch your computer from a CD or DVD, you must set the BIOS to boot from a different device. While the exact procedure differs from computer to computer, the overall process is usually like this: Insert the disc or USB drive into the computer. Restart the computer. When the computer powers up again, look for a BIOS setup message, which often looks like “Press [KEY] to run ...
5/5 1,405 Feb 25, 2016
Trend Micro Incorporated
Trend Micro Rootkit Buster 32bit 5.00.1198
Trend Micro Rootkit Buster 32bit 5.00.1198 Trend Micro RootkitBuster scans hidden files, registry entries, processes, drivers, services, ports, and the master boot record (MBR) to identify and remove rootkits. Malicious software called rootkits can manipulate the components of the Microsoft Windows operating system to conceal how they cause harm. Rootkits can hide drivers, processes, and registry entries from tools using common system application programming interfaces (APIs). What's New ======================================================================== a. RootkitBuster now works on computers running Microsoft Windows 10. b. New enhancements now prevent some known scanning errors.
No Votes 935 Sep 16, 2015
Trend Micro Inc.
Trend Micro Rootkit Buster 64bit 5.00.1198
Trend Micro Rootkit Buster 64bit 5.00.1198 Trend Micro RootkitBuster scans hidden files, registry entries, processes, drivers, services, ports, and the master boot record (MBR) to identify and remove rootkits. Malicious software called rootkits can manipulate the components of the Microsoft Windows operating system to conceal how they cause harm. Rootkits can hide drivers, processes, and registry entries from tools using common system application programming interfaces (APIs). What's New ======================================================================== a. RootkitBuster now works on computers running Microsoft Windows 10. b. New enhancements now prevent some known scanning errors.
No Votes 945 Sep 16, 2015
Trend Micro Inc.
Trojan.Kotver Removal Tool 32bit 2.4.0.1
Trojan.Kotver Removal Tool 32bit 2.4.0.1 This tool removes Trojan.Kotver infections. Trojan.Kotver is a Trojan horse that performs click-fraud operations on the compromised computer. Discovered: September 23, 2015 Type: Removal Information This tool is designed to remove the infection of Trojan.Kotver. How to download and run the tool Important: Selecting "Run as administrator" will result in an incomplete repair. You must be logged in to the Administrator account and all other users must be logged out in order for the tool to work correctly. There are two versions of this tool, one designed to run on 32-bit computers and one designed to run on 64-bit computers. To find out if your computer is running a 32-bit or 64-bit version of Windows, please read the following Microsoft Knowledge Base article: How to determine whether a computer is running a 32-bit version or 64-bit version of the Windows operating system Note for network administrators: If you are running MS Exchange 2000 Server, we recommend that you exclude the M drive from the scan by running the tool from a command line, with the Exclude switch. For more information, read the Microsoft Knowledge Base article: Issues caused by a back up or a scan of the Exchange 2000 M drive Follow these steps to download and run the tool: Download FixToolKotver64.exe for 64-bit computers and FixToolKotver32.exe for 32-bit computers. Save the file to a convenient location, such as your Windows desktop. If you are sure that you are downloading this tool from the Security Response website, you can skip this step. If you are not sure, or are a network administrator and need to authenticate the files before deployment, follow the steps in the Digital Signature section before proceeding ...
5/5 548 Mar 24, 2016
Symantec
Trojan.Kotver Removal Tool 64bit 2.4.0.1
Trojan.Kotver Removal Tool 64bit 2.4.0.1 This tool removes Trojan.Kotver infections. Trojan.Kotver is a Trojan horse that performs click-fraud operations on the compromised computer. Discovered: September 23, 2015 Type: Removal Information This tool is designed to remove the infection of Trojan.Kotver. How to download and run the tool Important: Selecting "Run as administrator" will result in an incomplete repair. You must be logged in to the Administrator account and all other users must be logged out in order for the tool to work correctly. There are two versions of this tool, one designed to run on 32-bit computers and one designed to run on 64-bit computers. To find out if your computer is running a 32-bit or 64-bit version of Windows, please read the following Microsoft Knowledge Base article: How to determine whether a computer is running a 32-bit version or 64-bit version of the Windows operating system Note for network administrators: If you are running MS Exchange 2000 Server, we recommend that you exclude the M drive from the scan by running the tool from a command line, with the Exclude switch. For more information, read the Microsoft Knowledge Base article: Issues caused by a back up or a scan of the Exchange 2000 M drive Follow these steps to download and run the tool: Download FixToolKotver64.exe for 64-bit computers and FixToolKotver32.exe for 32-bit computers. Save the file to a convenient location, such as your Windows desktop. If you are sure that you are downloading this tool from the Security Response website, you can skip this step. If you are not sure, or are a network administrator and need to authenticate the files before deployment, follow the steps in the Digital Signature section before proceeding ...
5/5 581 Mar 24, 2016
Symantec
Tweaking.com - Repair Missing Start Menu Icons Removed By Infections v1.7.4
==Official Mirror== Tweaking.com - Repair Missing Start Menu Icons Removed By Infections v1.7.4 Repair Missing Start Menu Icons Removed By Infections: This repair will put back the missing icons in the start menu, quick launch, and desktop that are moved by a rouge virus. All the icons by the virus are moved to the temp folder under the folder SMTMP. This tool is also a part of Windows Repair (All In One) SMTMP folder XP - C:\Documents and Settings\(Your Username)\Local Settings\Temp\SMTMP Vista/7 - C:\Users\(Your Username)\AppData\Local\Temp\SMTMP Folder 1 contains the All Users Start Menu shortcuts XP - C:\Documents and Settings\All Users\Start Menu Vista/7 - C:\Program Data\Microsoft\Windows\Start Menu Folder 2 contains the Quick Launch shortcuts XP - C:\Documents and Settings\(Your Username)\Application Data\Microsoft\Internet Explorer\Quick Launch Vista/7 - C:\Users\(Your Username)\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch Folder 3 contains Windows 7 Taskbar icons (not needed in Windows XP) XP - N/A Vista/7 - C:\Users\(Your Username)\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar Folder 4 does have Desktop icons XP - C:\Documents and Settings\All Users\Desktop Vista/7 - C:\Users\Public\Public Desktop
0/5 3,647 Dec 21, 2013
Tweaking.com
Unchecky 1.0.1
Unchecky 1.0.1 Unchecky aims to keep potentially unwanted programs out of your computer. Have you ever felt, while installing software, that the installer tries to push additional unwanted programs at all cost? Ever missed a checkbox, and spent hours afterwards removing adware? Ever opened your browser after an installation, only to find out that you have a new homepage, a new search engine, or even a new browser? Nowadays it’s a reality that many software installations are bundled with potentially unwanted programs, such as toolbars or scareware system cleaners. If you’re a power user, you probably know that you have to be very careful while installing software, because if you miss a checkbox you might spend hours afterwards cleaning up the mess. If you’re an average PC user, you possibly leave everything by default, thus installing lots of additional unwanted programs without even knowing it. Unchecky’s primary feature is automatic unchecking of unrelated offers, such as potentially unwanted programs, offers to change your homepage or your search engine. With Unchecky, these offers become opt-in instead of opt-out, i.e. they will be installed only if you explicitly choose you want them (you usually don’t). Another important feature of Unchecky is that it warns when you accept a potentially unwanted offer. Installers often provide them as a natural part of the installation, so they can easily be accepted by mistake. With Unchecky, it’s less likely to accidentally accept such offers. Unchecky is not an universal solution, and might not support installers which were not released yet. Thus, it’s worth noting that Unchecky updates automatically, so you don’t have to worry about running the latest version. Changelog v1.0.1 (August 22, 2016) Hotfix: fixed a hang with NSIS installers.
5/5 3,808 Dec 29, 2016
Reason Software Company Inc
UsbFix 2016 8.184
UsbFix 2016 8.184 UsbFix is a free, malware removal tool that helps you to detect and remove infected USB memory sticks or any other USB removable devices such as external HDD (Hard Drive), phones, smartphones, digital cameras or anything else that connects to your computer or laptop via the USB port. The main advantages of using this utility is the excellent support and features (see below) that will help you to deal with infected USB devices. Famous malware (virus) threats such as Conficker have the ability to spread using removable devices by making their own DLL and autorun.inf files that will help them to infect any device that offers USB connectivity. Therefore, it doesn't matter if you reinstall your operating system - if your antivirus doesn't recognize the virus on the infected USB device, once you plug-in the USB - you will get the virus. The current version runs on almost all versions of Microsoft Windows such as XP, Vista, 7 and 8. Features - excellent support offered directly from the software interface - post your issues on the forum - great tutorial and articles that will show you how to use the program and deal with malware - it can detect and remove infections found on your removable devices - repairs the damaged files such as: registry, hidden files, task manager etc. - back-up support: it will backup your files and folders. - regurarly, updated database with latest infections that spreads via removable devices - Vaccination option: prevents future infections by creating new autorun.inf files on removable drives - offers protection for all USB peripherals (pendrives, external hard drives, smartphones, memory cards etc.) - detects and removes most common threats: VBS viruses, worms, trojans, keyloggers, other malware infections - opens automatically a log file (txt) after each scan or action.
0/5 1,205 Jan 27, 2016
UsbFix
VirusTotal Scanner 3.6
VirusTotal Scanner 3.6 VirusTotal.com is a free online scan service that analyzes suspicious files using 40+ Anti-virus applications. It facilitates the quick detection of viruses, worms, trojans, all kinds of malware and provides reliable results preventing any False Positive cases. 'VirusTotal Scanner' is the desktop tool which helps you to quickly scan your file using VirusTotal without actually uploading the file. It performs direct Hash based scan on VirusTotal thus reducing the time taken to upload the file. It comes with attractive &amp; user friendly interface making the VirusTotal scanning process simpler and quicker. You can simply right click on your file and start the scan. It is fully portable tool but also comes with Installer for local installation &amp; un-installation. It works on wide range of platforms starting from Windows XP to Windows7. Change Info: Fixed the minor name mismatch in manifest file. Also removed false positve issue with few AV scanners.
0/5 2,764 May 18, 2014
SecurityXploded
Windows Defender Offline 32bit
Windows Defender Offline 32bit What is Windows Defender Offline? Sometimes, malicious and other potentially unwanted software, including rootkits, try to install themselves on your PC. This can happen when you connect to the Internet or install some programs from a CD, DVD, or other media. Once on your PC, this software might run immediately, or it might run at unexpected times. Windows Defender Offline can help remove such hard to find malicious and potentially unwanted programs using definitions that recognize threats. Definitions are files that provide an encyclopedia of potential software threats. Because new threats appear daily, it's important to always have the most up-to-date definitions installed in Windows Defender Offline. Armed with definition files, Windows Defender Offline can detect malicious and potentially unwanted software, and then notify you of the risks. To use Windows Defender Offline, you need to follow four basic steps: 1) Download Windows Defender Offline and create a CD, DVD, or USB flash drive. 2) Restart your PC using the Windows Defender Offline media. 3) Scan your PC for malicious and other potentially unwanted software. 4) Remove any malware that is found from your PC. Windows Defender Offline will walk you through the details of these four steps when you're using the tool. If you've been prompted in Microsoft Security Essentials or Windows Defender to download and run Windows Defender Offline, it's important that you do so, to make sure that your data and your PC isn't compromised. To get started, find a blank CD, DVD, or USB flash drive with at least 250 MB of free space and then download and run the tool—the tool will help you create the removable media. Note We recommend that you download Windows Defender Offline and create the CD, DVD, or USB flash drive on a PC ...
5/5 596 Mar 03, 2016
Microsoft
Windows Defender Offline 64bit
Windows Defender Offline 64bit What is Windows Defender Offline? Sometimes, malicious and other potentially unwanted software, including rootkits, try to install themselves on your PC. This can happen when you connect to the Internet or install some programs from a CD, DVD, or other media. Once on your PC, this software might run immediately, or it might run at unexpected times. Windows Defender Offline can help remove such hard to find malicious and potentially unwanted programs using definitions that recognize threats. Definitions are files that provide an encyclopedia of potential software threats. Because new threats appear daily, it's important to always have the most up-to-date definitions installed in Windows Defender Offline. Armed with definition files, Windows Defender Offline can detect malicious and potentially unwanted software, and then notify you of the risks. To use Windows Defender Offline, you need to follow four basic steps: 1) Download Windows Defender Offline and create a CD, DVD, or USB flash drive. 2) Restart your PC using the Windows Defender Offline media. 3) Scan your PC for malicious and other potentially unwanted software. 4) Remove any malware that is found from your PC. Windows Defender Offline will walk you through the details of these four steps when you're using the tool. If you've been prompted in Microsoft Security Essentials or Windows Defender to download and run Windows Defender Offline, it's important that you do so, to make sure that your data and your PC isn't compromised. To get started, find a blank CD, DVD, or USB flash drive with at least 250 MB of free space and then download and run the tool—the tool will help you create the removable media. Note We recommend that you download Windows Defender Offline and create the CD, DVD, or USB flash drive on a PC ...
5/5 600 Mar 03, 2016
Microsoft
WinPatrol 34.11.2016.17
WinPatrol 34.11.2016.17 WinPatrol takes snapshot of your critical system resources and alerts you to any changes that may occur without your knowledge. WinPatrol was the pioneer in using a heuristic behavioral approach to detecting attacks and violations of your computing environment. Now, using our "Cloud" technology you can benefit from the experience of other WinPatrol users. WinPatrol continues to be the most powerful system monitor for its small memory footprint. WinPatrol's easy tabbed interface allows you to explore deep inside your computer without having to be a computer expert. A one-time investment in WinPatrol PLUS provides a unique experience you won't find in any other software. WinPatrol PLUS is a great investment! One Time fee includes for ALL future WinPatrol versions. No Hidden or Reoccurring Subscription Fees. Single License valid on all your personal desktops and laptops! No Toolbars or other unwanted software WinPatrol PLUS is quicker and faster. Upgrade Now with No Additional Download What's new in V34.11.2016.17 (posted November 17, 2016) Added new feature File Size Monitor Fixed issues in File Type Association, making it compatible with all Windows operating systems from XP SP3 through the latest Windows 10.
5/5 3,736 Nov 21, 2016
BillP Studios
   
 
Showing rows 1 to 100 of 101 Showing Page 1 of 2  1  2  » 

Search - Statistics & RSS - Contact Admin - -
PHCDownload 1.1.2 - Copyright (c) 2005 - 2017 - 0.1183 seconds


Tweets by @GeekOnTheLoose