There are no ads or fake
download buttons on this site.
This project is supported by
your donations.
Please donate. Thanks!



Processed through Paypal
No account required.


​​Facebook​​Follow @GeekOnTheLoose


CLICK HERE TO SEARCH

 Home » OlderGeeks.com Freeware Downloads » Anti-Virus, Anti-Spyware and Anti-Malware Utilities   
Files
  File Name Rating Downloads
Last Update/Developer
AdwCleaner 6.0.47
AdwCleaner 6.0.47 AdwCleaner is a free removal tool for : Adware (ads softwares) PUP/LPI (Potentially Undesirable Program) Toolbars Hijacker (Hijack of the browser's homepage) It works with a Search and Delete mode. It can be easily uninstalled using the mode "Uninstall". It's compatible with Windows XP, Vista, 7, 8, 8.1, 10 in 32 & 64 bits. Changelog AdwCleaner 6.0.47 [UPD] - Database 2017-05-19.1 [ADD] - Add informative message for Chrome synchronization
5/5 11,514 May 19, 2017
Malwarebytes
AlternateStreamView 32bit 1.51
AlternateStreamView 32bit 1.51 AlternateStreamView is a small utility that allows you to scan your NTFS drive, and find all hidden alternate streams stored in the file system. After scanning and finding the alternate streams, you can extract these streams into the specified folder, delete unwanted streams, or save the streams list into text/html/csv/xml file. System Requirements This utility works on any version of Windows starting from Windows 2000 and up to Windows 10. Both 32-bit and 64-bit systems are supported. Known Issues It seems that starting from Windows 7, the standard 'Open With' dialog-box of Windows stopped working with alternate streams, and thus the 'Open Selected Stream With...' option provided by AlternateStreamView also doesn't work... Versions History Version 1.51: Added 'Run As Administrator' option (Ctrl+F11), which allows you to easily run AlternateStreamView as administrator on Windows Vista/7/8/10/2008/2012. About Alternate Streams in NTFS File System NTFS system has a feature that allows you to add multiple streams in addition to the main file stream. When you open or view the file, only the main file stream is visible, while other additional streams are hidden from the user. Here's 3 examples of alternate streams usage in Windows operating system: Favorites of Internet Explorer: When You add a Web site link into your 'Favorites', a .url file containing the url and description is created. However, if the Web site also have an icon (favicon), the icon is saved as alternate stream for the same url file. The stream name of the icon is :favicon:$DATA Downloaded files of Internet Explorer: When you download and save a file with Internet Explorer, it automatically add a zone information for the saved file. This zone information is used for identifying the file as downloaded file from the ...
5/5 3,618 Dec 02, 2016
Nir Sofer
AlternateStreamView 64bit 1.51
AlternateStreamView 64bit 1.51 AlternateStreamView is a small utility that allows you to scan your NTFS drive, and find all hidden alternate streams stored in the file system. After scanning and finding the alternate streams, you can extract these streams into the specified folder, delete unwanted streams, or save the streams list into text/html/csv/xml file. System Requirements This utility works on any version of Windows starting from Windows 2000 and up to Windows 10. Both 32-bit and 64-bit systems are supported. Known Issues It seems that starting from Windows 7, the standard 'Open With' dialog-box of Windows stopped working with alternate streams, and thus the 'Open Selected Stream With...' option provided by AlternateStreamView also doesn't work... Versions History Version 1.51: Added 'Run As Administrator' option (Ctrl+F11), which allows you to easily run AlternateStreamView as administrator on Windows Vista/7/8/10/2008/2012. About Alternate Streams in NTFS File System NTFS system has a feature that allows you to add multiple streams in addition to the main file stream. When you open or view the file, only the main file stream is visible, while other additional streams are hidden from the user. Here's 3 examples of alternate streams usage in Windows operating system: Favorites of Internet Explorer: When You add a Web site link into your 'Favorites', a .url file containing the url and description is created. However, if the Web site also have an icon (favicon), the icon is saved as alternate stream for the same url file. The stream name of the icon is :favicon:$DATA Downloaded files of Internet Explorer: When you download and save a file with Internet Explorer, it automatically add a zone information for the saved file. This zone information is used for identifying the file as downloaded file from the ...
5/5 3,655 Dec 02, 2016
Nir Sofer
Antivirus Live CD 20.0-0.99.2
Antivirus Live CD 20.0-0.99.2 Antivirus Live CD is a 4MLinux fork including the ClamAV scanner. It's designed for users who need a lightweight live CD, which will help them to protect their computers against viruses. Both Ethernet (including Wi-Fi) and dial-up (including fast USB modems) Internet connections are supported to enable automatic updates of the virus signature database. All partitions are mounted automatically during boot so that they can be scanned by ClamAV (the supported filesystems are: btrfs, ext2, ext3, ext4, f2fs, fat16, fat32, hfs, hfs+, jfs, nilfs2, ntfs, reiser4, reiserfs, and xfs). Antivirus Live CD images are fully compatible with UNetbootin, which can be used to create an easy-to-use Antivirus Live USB.
5/5 1,413 Oct 03, 2016
zk1234
Antivirus Remover 2.35
Antivirus Remover 2.35 Antivirus Remover is a simple to use application that enables you to remove the antivirus software installed on your computer and clean any trace from the system registry or temporary files. Antivirus Remover is a reliable security tool and allows you to make sure your former antivirus is not in conflict with a new one. Antivirus Remover will download and run most if not all third party uninstallers. Changelog: Added: Windows Defender (only for Windows Vista and Windows 7) Change: Dialog wording of detected antivirus that is installed, Instead of saying "remove" has been changed to DOWNLOAD"
4/5 2,549 Feb 14, 2016
Brocke
Attack Surface Analyzer 1.0.0.0 32bit
Attack Surface Analyzer 1.0.0.0 32bit Attack Surface Analyzer takes a snapshot of your system state before and after the installation of product(s) and displays the changes to a number of key elements of the Windows attack surface. Attack Surface Analyzer is developed by the Trustworthy Computing Security group. It is the same tool used by Microsoft's internal product groups to catalogue changes made to operating system attack surface by the installation of new software. This allows: - Developers to view changes in the attack surface resulting from the introduction of their code on to the Windows platform - IT Professionals to assess the aggregate Attack Surface change by the installation of an organization's line of business applications - IT Security Auditors evaluate the risk of a particular piece of software installed on the Windows platform during threat risk reviews - IT Security Incident Responders to gain a better understanding of the state of a systems security during investigations (if a baseline scan was taken of the system during the deployment phase) Supported Operating System Windows 7, Windows 8, Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, Windows Vista Collection of Attack Surface data: Windows Vista, Windows 7, Windows 8, Windows Server 2008, Windows Server 2008 R2, Windows Server 2012 Analysis of Attack Surface data and report generation: Windows 7, Windows 8, Windows Server 2008 R2, Windows Server 2012. Microsoft .NET Framework 4 is required. Note: To run Attack Surface Analyzer, you will require Administrator privileges on the computer. Collecting attack surface information with .NET Framework 4 installed C1. Download and install Attack Surface Analyzer on a machine with a freshly installed version of a supported operating system, as listed in the System Requirements section. Attack Surface Analyzer works best with a clean (freshly built) system. Not running the Attack Surface Analyzer ...
5/5 604 Mar 11, 2016
Microsoft
Attack Surface Analyzer 1.0.0.0 64bit
Attack Surface Analyzer 1.0.0.0 64bit Attack Surface Analyzer takes a snapshot of your system state before and after the installation of product(s) and displays the changes to a number of key elements of the Windows attack surface. Attack Surface Analyzer is developed by the Trustworthy Computing Security group. It is the same tool used by Microsoft's internal product groups to catalogue changes made to operating system attack surface by the installation of new software. This allows: - Developers to view changes in the attack surface resulting from the introduction of their code on to the Windows platform - IT Professionals to assess the aggregate Attack Surface change by the installation of an organization's line of business applications - IT Security Auditors evaluate the risk of a particular piece of software installed on the Windows platform during threat risk reviews - IT Security Incident Responders to gain a better understanding of the state of a systems security during investigations (if a baseline scan was taken of the system during the deployment phase) Supported Operating System Windows 7, Windows 8, Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, Windows Vista Collection of Attack Surface data: Windows Vista, Windows 7, Windows 8, Windows Server 2008, Windows Server 2008 R2, Windows Server 2012 Analysis of Attack Surface data and report generation: Windows 7, Windows 8, Windows Server 2008 R2, Windows Server 2012. Microsoft .NET Framework 4 is required. Note: To run Attack Surface Analyzer, you will require Administrator privileges on the computer. Collecting attack surface information with .NET Framework 4 installed C1. Download and install Attack Surface Analyzer on a machine with a freshly installed version of a supported operating system, as listed in the System Requirements section. Attack Surface Analyzer works best with a clean (freshly built) system. Not running the Attack Surface Analyzer ...
5/5 618 Mar 11, 2016
Microsoft
Avast Browser Cleanup 12.1.2272.125
Avast Browser Cleanup 12.1.2272.125 Restore your browser to its initial, clean state. Get rid of dangerous and annoying extensions, toolbars, or hijacked searches. Remove bad add-ons It makes you safer, and it can substantially speed up your browser and the whole PC. Browser Cleanup removes only add-ons with bad reputations. You can continue to enjoy the good ones.. Restore search settings See untampered results and stop funding obscure software vendors. How do they hack your browser? Intrusive extensions often get added on during the installation of an otherwise legitimate program, without you even noticing. Bad add-ons… Track what you do online They see all the websites you’ve visited or will visit. Your browsing data means money for them. See data in your computer It’s as easy as that. Maybe you don’t want everyone to see your photos from last summer. Manipulate your search results They can inject false results into your search pages – and they get paid for it. Slow down your browser They run in the background no matter whether you’re browsing the Web or not. Are difficult to remove They contain measures that make it hard for you to get them out of your computer.
5/5 1,050 Oct 03, 2016
AVAST Software s.r.o.
Avast! Free Edition 17.3.3443
Avast! Free Edition 17.3.3443 Avast! is a package of applications that aim to protect your computer from a possible virus infection or other malware threat. If you use it correctly, and in combination with other programs such as data backup utilities, it will significantly reduce the risk of your computer being attacked or infected by a virus, and thus the risk of losing important or private data. Based on the award-winning avast! antivirus engine, avast! antivirus contains all of the features you would expect in a modern antivirus program. It incorporates anti-spyware technology certified by West Coast Labs' Checkmark process, as well as anti-rootkit and strong self-protection capabilities, but now provides even faster scanning with improved detection ability. It contains several real-time "Shields" which continuously monitor your email and internet connections and check the files on your computer whenever they are opened or closed. avast! antivirus now also comes with a completely revamped user interface for easier scanning. avast! Pro antivirus offers a number of additional features, including a script shield and a process virtualization module, while avast! Internet Security comes with an antispam filter and built-in firewall. Once installed, avast! runs silently in the background to protect your computer against all known forms of malware. You don't need to do anything else - just install and forget!
5/5 3,844 May 03, 2017
ALWIL Software
AVG AntiVirus Free Edition 2016 32bit Build 7797
AVG AntiVirus Free Edition 2016 32bit Build 7797 AVG Anti-Virus FREE Edition is the well-known anti-virus protection tool. AVG Anti-Virus FREE is available free-of-charge to home users for the life of the product! Rapid virus database updates are available for the lifetime of the product, thereby providing the high-level of detection capability that millions of users around the world trust to protect their computers. AVG Anti-Virus FREE is easy-to-use and will not slow your system down (low system resource requirements). AVG Anti-Virus Free Edition is for private, non-commercial, single home computer use only. Use of AVG Free Edition within any organization or for commercial purposes is strictly prohibited. Your use of AVG Free Edition shall be in accordance with and is subject to the terms and conditions set forth in the AVG Free Edition License Agreement which accompanies AVG Free Edition. Features: Surf, and search with confidence, while LinkScanner® keeps you safe from harmful sites Get online and offline protection from viruses, spyware, and other nasties Enjoy consistently high-speed PC performance with our new enhanced virus scanner Automatic updates keep your protection current Compatible with Windows XP, Vista, and Windows 7 Protection against identity theft AVG’s unique Identity Protection technology ensures that when you shop and bank online, your bank account information, passwords, and other important personally-identifiable information can’t be stolen. As a bonus, Identity Protection also keeps you safe against new and unknown threats before they can cause harm. Protection from hackers AVG’s enhanced firewall keeps hackers’ prying eyes out of your private business. These remote trespassers can view or steal information, take control of your computer for nefarious purposes like botnets and spamming. It even includes a game mode to keep you protected without interrupting your play. Protection against spammers and scammers AVG’s anti-spam protection makes sure your email inbox is kept clear of unwanted junk mail, offers for products you don’t ...
5/5 3,314 Sep 06, 2016
AVG Technologies
AVG AntiVirus Free Edition 2016 64bit Build 7797
AVG AntiVirus Free Edition 2016 64bit Build 7797 AVG Anti-Virus FREE Edition is the well-known anti-virus protection tool. AVG Anti-Virus FREE is available free-of-charge to home users for the life of the product! Rapid virus database updates are available for the lifetime of the product, thereby providing the high-level of detection capability that millions of users around the world trust to protect their computers. AVG Anti-Virus FREE is easy-to-use and will not slow your system down (low system resource requirements). AVG Anti-Virus Free Edition is for private, non-commercial, single home computer use only. Use of AVG Free Edition within any organization or for commercial purposes is strictly prohibited. Your use of AVG Free Edition shall be in accordance with and is subject to the terms and conditions set forth in the AVG Free Edition License Agreement which accompanies AVG Free Edition. Features: Surf, and search with confidence, while LinkScanner® keeps you safe from harmful sites Get online and offline protection from viruses, spyware, and other nasties Enjoy consistently high-speed PC performance with our new enhanced virus scanner Automatic updates keep your protection current Compatible with Windows XP, Vista, and Windows 7 Protection against identity theft AVG’s unique Identity Protection technology ensures that when you shop and bank online, your bank account information, passwords, and other important personally-identifiable information can’t be stolen. As a bonus, Identity Protection also keeps you safe against new and unknown threats before they can cause harm. Protection from hackers AVG’s enhanced firewall keeps hackers’ prying eyes out of your private business. These remote trespassers can view or steal information, take control of your computer for nefarious purposes like botnets and spamming. It even includes a game mode to keep you protected without interrupting your play. Protection against spammers and scammers AVG’s anti-spam protection makes sure your email inbox is kept clear of unwanted junk mail, offers for products you don’t ...
4/5 1,494 Sep 06, 2016
AVG Technologies
AVG LinkScanner 2014.4335
AVG LinkScanner 2014.4335 Nowadays, there are far more threats out there than plain viruses. You have probably come across the term spyware as well, however, authors of malicious codes and dangerous websites are very innovative, and new kinds of threats emerge quite often, the vast majority of which are on the Internet. Here are some of the most common: Exploit is a malicious code that takes advantage of a flaw or vulnerability in an operating system, Internet browser, or other essential program. Social engineering is a common term for various techniques used to trick people into giving away their personal information (passwords, bank account details, credit card numbers etc.). A typical example of social engineering is phishing – an attempt to acquire sensitive personal data by shamming a trustworthy and well-known organization. Usually, the potential victims are contacted by a bulk e-mail asking them to e.g. update their bank account details. In order to do that, they are invited to follow the link provided which then leads to a fake website of the bank. Scam can be also considered a kind of social engineering; it includes false job offers, or ones that will abuse the workers for illegal activities, summons to withdraw a large sum of money, fraudulent lotteries and the like. Hoax is a bulk e-mail containing dangerous, alarming or just bothering and useless information. Many of the above threats use hoax e-mail messages to spread. Finally, malicious websites are ones that deliberately install malicious software on your computer, and hacked sites do just the same, only these are legitimate websites that have been compromised into infecting visitors. AVG LinkScanner is here to protect you from all these online threats. AVG LinkScanner is up and running immediately from the moment of installation. All basic settings have been pre-set by the manufacturer, so most of the ...
4/5 3,357 Dec 02, 2016
AVG Technologies
AVG Rescue CD (for CD creation) 120.160420
AVG Rescue CD (for CD creation) 120.160420 You’ have installed AVG protection to help ensure you don’t get infected servers or workstations. However, if the unthinkable has already occurred, you need the AVG Rescue CD; a powerful must-have toolkit to assist with the rescue and repair of infected machines. This software provides essential utilities for system administrators and other IT professionals and includes the following features: A comprehensive administration toolkit System recovery from virus and spyware infections Adaptability for the recovery of both MS Windows and Linux operating systems (FAT32 and NTFS file systems) Ability to perform a clean boot from a CD or USB stick Free support and service for paid license holders of any AVG product FAQ and Free Forum self-help online support for AVG Free users What you get: Key technologies Anti-virus: protection against viruses, worms and Trojans Anti-spyware: protection against spyware, adware and identity theft Administration toolkit: system recovery tools The AVG Rescue CD is essentially a portable version of AVG Anti-Virus supplied through Linux distribution. It can be used in the form of a bootable CD or bootable USB flash drive to recover your computer when the system cannot be loaded normally, such as after an extensive or deep-rooted virus infection. In short, the AVG Rescue CD enables you to fully remove infections from an otherwise inoperable PC and render the system bootable again. Apart from the usual AVG functions (malware detection and removal, updates from internet or external device, etc.), the AVG Rescue CD also contains the following set of administration tools: Midnight Commander - a two-panel file manager Windows Registry Editor– simple registry editor for more experienced users TestDisk - powerful hard drive recovery tool Ping - tests the availability of network resources (servers, domains, IP addresses) Common Linux programs and services– vi text editor, OpenSSH daemon, ntfsprogs etc. Free of charge The AVG Rescue CD is a free product that anyone can download. It ...
5/5 3,337 Dec 02, 2016
AVG Technologies
AVG Rescue CD (for USB stick) 120.160420
AVG Rescue CD (for USB stick) 120.160420 You’ have installed AVG protection to help ensure you don’t get infected servers or workstations. However, if the unthinkable has already occurred, you need the AVG Rescue CD; a powerful must-have toolkit to assist with the rescue and repair of infected machines. This software provides essential utilities for system administrators and other IT professionals and includes the following features: A comprehensive administration toolkit System recovery from virus and spyware infections Adaptability for the recovery of both MS Windows and Linux operating systems (FAT32 and NTFS file systems) Ability to perform a clean boot from a CD or USB stick Free support and service for paid license holders of any AVG product FAQ and Free Forum self-help online support for AVG Free users What you get: Key technologies Anti-virus: protection against viruses, worms and Trojans Anti-spyware: protection against spyware, adware and identity theft Administration toolkit: system recovery tools The AVG Rescue CD is essentially a portable version of AVG Anti-Virus supplied through Linux distribution. It can be used in the form of a bootable CD or bootable USB flash drive to recover your computer when the system cannot be loaded normally, such as after an extensive or deep-rooted virus infection. In short, the AVG Rescue CD enables you to fully remove infections from an otherwise inoperable PC and render the system bootable again. Apart from the usual AVG functions (malware detection and removal, updates from internet or external device, etc.), the AVG Rescue CD also contains the following set of administration tools: Midnight Commander - a two-panel file manager Windows Registry Editor– simple registry editor for more experienced users TestDisk - powerful hard drive recovery tool Ping - tests the availability of network resources (servers, domains, IP addresses) Common Linux programs and services– vi text editor, OpenSSH daemon, ntfsprogs etc. Free of charge The AVG Rescue CD is a free product that anyone can download. It ...
5/5 3,351 Dec 02, 2016
AVG Technologies
Avira Free Antivirus 15.0.20.59
Avira Free Antivirus 15.0.20.59 Avira AntiVir Personal FREE Antivirus was developed to be a reliable free antivirus solution, that constantly and rapidly scans your computer for malicious programs such as viruses, Trojans, backdoor programs, hoaxes, worms, dialers etc. Monitors every action executed by the user or the operating system and reacts promptly when a malicious program is detected. Avira AntiVir Personal is a comprehensive, easy to use antivirus program, designed to offer reliable free of charge virus protection to home-users, for personal use only, and is not for business or commercial use. Avira AntiVir Personal gives you the following functions: Control Center for monitoring, administering and controlling the entire program Central configuration with user-friendly standard and advanced options and context-sensitive help Scanner (On-Demand Scan) with profile-controlled and configurable search for all known types of virus and malware Integration into the Windows Vista User Account Control allows you to carry out tasks requiring administrator rights Guard (On-Access Scan) for continuous monitoring of all file access attempts Integrated quarantine management to isolate and process suspicious files Rootkit protection for detecting hidden malware installed in your computer system (rootkits) (Only for 32-bit systems) Direct access to detailed information on the detected viruses and malware via the Internet Simple and quick updates to the program, virus definitions, and search engine through Single File Update and incremental VDF updates via a webserver on the Internet Integrated Scheduler to plan one-off or recurring tasks, such as updates or test runs Very high rates of virus and malware detection using innovative search technologies (search engines) and heuristic search processes Detection of all common archive types, including detection of nested archives and smart extensions High-performance multithreading function (simultaneous high-speed scanning of multiple files) Features: AntiVir protection against viruses, worms and Trojans AntiDialer protection against expensive dialers AntiRootkit protection against hidden rootkits Faster Scanning up to 20% faster AntiPhishing protection against phishing AntiSpyware protection against spyware and adware NetbookSupport for ...
5/5 3,817 Sep 06, 2016
Avira
Avira Rescue System 2016.09.14
Avira Rescue System 2016.09.14 The Avira Rescue System scans and repairs malware-infected computers that no longer boot or are generally unresponsive. Running on both Windows and Linux operating systems, our integrated scan and repair Wizard is highly intuitive and easy to use. Are you concerned about recovering data from your system? If so, the Avira Rescue System is the ideal tool for you. And if for some reason you need outside assistance, the Rescue System can establish a remote desktop connection with Avira Support. The Avira Rescue System is updated daily so that the most recent security updates are always available. To use the Rescue System burn it to a CD or copy it to a bootable USB stick and then boot your system from that CD or USB stick. Booting Avira Rescue System from a USB Stick Avira offers the product Avira Rescue System, which can be used to start, scan and repair a computer. The product needs to be downloaded and burned on a CD, in order to boot from it.. However, there are Netbooks without an optical drive. In this case, it is recommended to use therefor a re-writable medium (e.g. USB stick). How to start the Avira Rescue System from a USB stick, will be explained in the following steps: Download the Avira Rescue System as ISO file Download the program Unetbootin Plug in the USB stick and format it as FAT32 Doubleclick the downloaded "unetbootin.exe" file Select the options "Diskimage", "ISO" and the "rescue-system.iso" file you have downloaded The USB drive should be selected under "Type" and make sure, that the correct USB stick is selected, under "Drive" Press OK. The files are copied and the bootable USB is created. Now you ...
4/5 1,497 Sep 15, 2016
Avira
BGPKiller - Your Avira Ad Killer 0.96
BGPKiller - Your Avira Ad Killer 0.96 BGPKiller is an ad killer (or blocker) for your Avira Antivir antivirus. The application is designed to stop popup windows (i.e. ads) coming from Avira. It monitors the unwanted Avira processes responsible for ads, and silently kills Avira popups and ads before they show up. BGPKiller runs alongside Avira Free Antivirus, in your System Tray, and tells you each time it kills! The benefits of this utility are : No more Avira ad windows popping up (never!) No CPU usage coming from Avira ad processes And the best thing about it, ... it is free! Why such a utility? The Avira Free antivirus (Free edition) is known for its very good virus detection rate and reliability. This is one of the best antivirus on the market. However, it is also known for its annoying popup ads. But because this is such a good antivirus, these ads were usually tolerated by their users. However, in late 2014, a new bug made these ads even more unbearable : the CPU usage often reached 100% after an ad was displayed! And closing the Avira ad window was not enough. The only way to stop this high CPU usage was to manually kill the problematic ad processes or reboot the computer. If you didn't, your CPU could overheat to the point to affect your computer's longevity. This was obviously a very serious bug! So I decided to write this small utility to monitor and kill all unwanted Avira ads. This way, I solved this bug and made sure my CPU would not overheat because of Avira ads. But as an added benefit, I realized how great it was to never see Avira ads anymore!! No more ad windows popping up; no more ...
3/5 929 Sep 22, 2015
AviraJoe
Bitdefender Adware Removal Tool 1.1.8.1668
Bitdefender Adware Removal Tool 1.1.8.1668 Bitdefender Adware Removal Tool for PC frees your computer from annoying adware, malicious hijacker programs, unwanted toolbars and other browser add-ons installed with or without your consent. How it works It scans your computer for adware, and produces a list of apps marked for removal. You will be able to choose what to keep on your computer. Step 1 Download and install the tool on your computer. Step 2 The tool scans your computer for adware. Step 3 You can review the list of applications to be removed, and select those applications you want to remove. Step 4 The tool removes unwanted adware. Completely free You don’t need expensive solutions to get rid of shady adware. Bitdefender Adware Removal Tool for PC will eliminate all the clutter at zero cost. Identify shady adware installed on your PC It’s not always easy to localize all the junk apps your computer might have picked up on the web. Adware Removal Tool for PC will find all the adware you need to erase. Get rid of annoying ads that slow down your computer Adware apps slow you down and try to trick you into clicking on dubious links. Bitdefender Adware Removal Tool for PC eliminates the source of those annoying ads and lets you enjoy your computer without frustrating interruptions.
5/5 664 Mar 04, 2016
BitDefender Labs
Bitdefender Adware Removal Tool for Mac 1.1.8.1668
Bitdefender Adware Removal Tool for Mac 1.1.8.1668 Free your Mac from annoying adware. Simple and non-intrusive adware scan Completely removes Genieo for Mac and Vsearch Totally free Step 1 Download the tool Step 2 Unzip and run it on your Mac Step 3 Enjoy your Mac adware-free Minimal system requirements: Intel-based Macintosh computers with Mac OS X version 10.7 or later;
5/5 120 Nov 04, 2016
BitDefender Labs
Bitdefender Anti-Ransomware 1.0.12.151
Bitdefender Anti-Ransomware 1.0.12.151 Bitdefender anti-malware researchers have released a new vaccine tool which can protect against known and possible future versions of the CTB-Locker, Locky and TeslaCrypt crypto ransomware families by exploiting flaws in their spreading methods. “The new tool is an outgrowth of the Cryptowall vaccine program, in a way.” Chief Security Strategist Catalin Cosoi explained. “We had been looking at ways to prevent this ransomware from encrypting files even on computers that were not protected by Bitdefender antivirus and we realized we could extend the idea.” A study conducted by Bitdefender in November 2015 on 3,009 Internet users from the US, France, Germany, Denmark, the UK and Romania offers a victim’s perspective on data loss through crypto-ransomware: 50% of users can’t accurately identify ransomware as a type of threat that prevents or limits access to computer data. Half of victims are willing to pay up to $500 to recover encrypted data. Personal documents rank first among user priorities. UK consumers would pay most to retrieve files US users are the main target for ransomware.
5/5 1,043 Apr 24, 2017
BitDefender Labs
BitDefender Free Edition
BitDefender Free Edition Powerful protection, the light way. We make the Internet safe for you We got your back. You can be sure all threats are taken care of when you browse the web. We use advanced technologies such as machine learning to protect you from phishing and other types of fraudulent content. Live your digital life at full speed We know speed and performance are vital, so we engineered our free antivirus solution to be light on system resources. Our product learns how you use your computer so it avoids slowdowns when scanning files for malware. Full Features List Virus Scanning and Removal On-demand & on-access scanning - powerful scan engines ensure detection and removal of all viruses.. Ultra-fast Scanning With SmartScan, Bitdefender Antivirus Free Edition 2016 learns how you use your computer so it avoids slowing you down when scanning files for malware. Improve the performance of your device The innovative Photon technology optimizes scanning processes in relation to your PC configuration so speed and performance remain unaffected. System Requirements - Operating system: Windows 7 Service Pack 1, Windows 8, Windows 8.1, Windows 10 - Hard disk space: 2 GB available free hard disk space (at least 800 MB on the system drive) - Intel CORE Duo (2 GHz) or equivalent processor - Software requirements: Internet Explorer 10 or higher
5/5 3,717 Dec 02, 2016
BitDefender Labs
Bitdefender Rootkit Remover 32bit 3.0.2.1
Bitdefender Rootkit Remover 32bit 3.0.2.1 The Bitdefender Rootkit Remover deals with known rootkits quickly and effectively making use of award-winning Bitdefender malware removal technology. Unlike other similar tools, Bitdefender Rootkit Remover can be launched immediately, without the need to reboot into safe mode first (although a reboot may be required for complete cleanup). Rootkit Remover deals easily with Mebroot, all TDL families (TDL/SST/Pihar), Mayachok, Mybios, Plite, XPaj, Whistler, Alipop, Cpd, Fengd, Fips, Guntior, MBR Locker, Mebratix, Niwa, Ponreb, Ramnit, Stoned, Yoddos, Yurn, Zegost and also cleans infections with Necurs (the last rootkit standing). Please note that the list is a bit outdated - new rootkit families are added as they become known.
5/5 2,919 Dec 02, 2016
BitDefender Labs
Bitdefender Rootkit Remover 64bit 3.0.2.1
Bitdefender Rootkit Remover 64bit 3.0.2.1 The Bitdefender Rootkit Remover deals with known rootkits quickly and effectively making use of award-winning Bitdefender malware removal technology. Unlike other similar tools, Bitdefender Rootkit Remover can be launched immediately, without the need to reboot into safe mode first (although a reboot may be required for complete cleanup). Rootkit Remover deals easily with Mebroot, all TDL families (TDL/SST/Pihar), Mayachok, Mybios, Plite, XPaj, Whistler, Alipop, Cpd, Fengd, Fips, Guntior, MBR Locker, Mebratix, Niwa, Ponreb, Ramnit, Stoned, Yoddos, Yurn, Zegost and also cleans infections with Necurs (the last rootkit standing). Please note that the list is a bit outdated - new rootkit families are added as they become known.
5/5 2,965 Dec 02, 2016
BitDefender Labs
Check Browsers' LNK 2.2.0.8
Check Browsers' LNK 2.2.0.8 Check Browsers' LNK checks usual (*.LNK) and the Internet (*.URL) shortcuts to detect harmful links aimed to show undesirable ads in browsers. Usage: 1) Disable temporarily your antivirus. 2) Run the file Check Browsers LNK.exe 3) Wait the completing of the work…* After scanning, the folder “LOG” will be opened near the program and the report Check_Browsers_LNK.log that is to be placed in the theme of helping you. Some prefixes description: >>> - shortcuts recommended to be cured. When drag & drop the log to program ClearLNK, they will be cured automatically. - (minus) - shortcuts that will be excluded from the list of ClearLNK program handling. If you need to cure some of them, just copy line to the main window of ClearLNK and press 'Cure'. !!! – files needed special attention The developers: - Pol’shyn Stanislav (Alex Dragokas) - regist Translations maded by: English: Ganna Khatser. French: Fr33tux (fr33tux.org). German: Natalia Ishyna. Changelog: 2.2.0.8 - add Last time the program was damaged when uploading to the server. Sorry for inconvenience. 2.2.0.8 Added support with Windows 2000 and Windows Server with Terminal services. File search engine replaced by MFT version (NTFS only). Scan speed will have been significantly increased on machines with slow drives and drives with large number of files. Added key /allDrives - to check all hard drives of PC. Added translation into German. You can forcibly switch to this language by specifying key /Lang DE or by renaming program file into "Check Browsers LNK_DE.exe". Added recognising of user profiles root folder if it was moved during OS installing stage by 'sysprep' or by symlink method. Fixed false marks "NOT profile". Fixed bug when mounted disk is recognised as disconnected. Added getting target of associated network resource. [LNK] Fixed bug with parsing of unicode name of folder for FTP-LNK. [LNK] Improved parsing of shortcuts with 64-bit environment variables. [LNK] To the sub-section "Target does not exist" ...
5/5 10 Feb 06, 2017
Alex Dragokas
ClamWin Antivirus Portable 0.99.1
ClamWin Antivirus Portable 0.99.1 Portable ClamWin is a portable app, so you can take your antivirus with you to scan files on the go. ClamWin Free Antivirus is used by more than 600,000 users worldwide on a daily basis. It comes with an easy installer and open source code. You may download and use it absolutely free of charge. Features: High detection rates for viruses and spyware; Scanning Scheduler; Automatic downloads of regularly updated Virus Database. Standalone virus scanner and right-click menu integration to Microsoft Windows Explorer; Addin to Microsoft Outlook to remove virus-infected attachments automatically. Please note that ClamWin Free Antivirus does not include an on-access real-time scanner. You need to manually scan a file in order to detect a virus or spyware. ClamWin Free Antivirus is based on ClamAV engine and uses GNU General Public License by the Free Software Foundation, and is free (as in freedom) software. To find out more about GNU GPL, please visit http://www.gnu.org/philosophy/
5/5 1,362 Dec 02, 2016
Portable Apps
ClamWin Free Antivirus 0.99.1
ClamWin Free Antivirus 0.99.1 ClamWin is a Free Antivirus program for Microsoft Windows 10 / 8 / 7 / Vista / XP / Me / 2000 / 98 and Windows Server 2012, 2008 and 2003. ClamWin Free Antivirus is used by more than 600,000 users worldwide on a daily basis. It comes with an easy installer and open source code. You may download and use it absolutely free of charge. It features: High detection rates for viruses and spyware; Scanning Scheduler; Automatic downloads of regularly updated Virus Database. Standalone virus scanner and right-click menu integration to Microsoft Windows Explorer; Addin to Microsoft Outlook to remove virus-infected attachments automatically. The latest version of Clamwin Free Antivirus is 0.99.1 Please note that ClamWin Free Antivirus does not include an on-access real-time scanner. You need to manually scan a file in order to detect a virus or spyware. ClamWin Free Antivirus is based on ClamAV engine and uses GNU General Public License by the Free Software Foundation, and is free (as in freedom) software. To find out more about GNU GPL, please visit the following link: Philosophy of the GNU Project - Free Software Foundation.
5/5 3,414 Dec 02, 2016
ClamWin Free Antivirus
Combofix 17.5.16.14
Combofix 17.5.16.14 ComboFix is a program, created by sUBs, that scans your computer for known malware, and when found, attempts to clean these infections automatically. In addition to being able to remove a large amount of the most common and current malware, ComboFix also displays a report that can be used by trained helpers to remove malware that is not automatically removed by the program. Please note that running this program without supervision can cause your computer to not operate correctly. Therefore only run this program at the request of an experienced helper.
5/5 5,122 Jun 16, 2017
sUBs
CryptoPrevent 8.0.4.2
CryptoPrevent 8.0.4.2 CryptoPrevent is a tiny utility to lock down any Windows OS (XP, Vista, 7, 8, 8.1, and 10) to prevent infection by the Cryptolocker malware or ‘ransomware’, which encrypts personal files and then offers decryption for a paid ransom. YES, this is the original CryptoLocker prevention tool you’ve read about, designed to prevent infection from the first “ransomware” threat which emerged in late 2013, encrypting valuable data on the infected PC and offering decryption in exchange for large payment. Within a few months of it’s release it created quite a buzz with features from Brian Krebs security blog (among many others) and by educators everywhere such as Kim Komando, Ken Dwight ‘The Virus Doctor’, the infamous Britec09 on Youtube, and ultimately reaching televised news such as CNBC and The Today Show. We are proud to announce the release of CryptoPrevent Version 8! We’ve re-written CryptoPrevent from the ground up, incorporating new features to bring you the latest protections from crypto-style ransomware and all other forms of malware! New Features in v8 (Free and Premium Editions) New: Folder Watch – Monitors and protects common folders from items that match malware definitions. New: Submit Malicious Files – This will allow you to submit malicious files (which are not in our malware definitions) to review for inclusion in the default definitions. Improved: Program Filtering Protection – The original ‘BETA’ program filtering protections were very effective, but caused issues with running certain programs; now it offers vastly improved reliability as it is based on the new code platform of the coming 3rd generation ‘d7x’ PC technician utilities, it is thoroughly tested, and recommended for mass usage! Improved: SRP Protection – The original protection method since CryptoPrevent version 1 was automatically created “SRP” rules (aka “Software Restriction Policies” which are normally only available in “Professional” editions ...
5/5 2,860 Jun 05, 2017
FoolishTech
Crystal Security (PORTABLE) 3.5.0.134
Crystal Security (PORTABLE) 3.5.0.134 Crystal Security is a cloud-based system that detects and removes malicious programs (malware) from your computer. Its technology provides fast detection against malware and lets you know about the changes on your computer in real time. Anti-Malware Crystal Security is an easy to use application that was created in order to help you quickly detect and remove malware that might affect your computer. Cloud Based The cloud based Crystal Security gathers data from millions of participating users systems around the world to help defend you from the very latest viruses and malware attacks. Freeware Cloud based malware detection, easy to use, user-friendly interface, automatic/manual updates, no installations, supports multiple languages and many other features. Compatibility Microsoft Windows XP, Vista, 7, 8, 8.1, 10, Server 2003, 2008 32/64-bit Requires .NET Framework 3.5 July 9th, 2015 Crystal Security 3.5.0.134 - What's new FIXED: bug in Active protection, bug in Shell integration, several other minor bugs. UPDATED: embedded heuristic database.
4/5 1,087 Jul 10, 2015
Kardo Kristal
Crystal Security 3.5.0.134
Crystal Security 3.5.0.134 Crystal Security is a cloud-based system that detects and removes malicious programs (malware) from your computer. Its technology provides fast detection against malware and lets you know about the changes on your computer in real time. Anti-Malware Crystal Security is an easy to use application that was created in order to help you quickly detect and remove malware that might affect your computer. Cloud Based The cloud based Crystal Security gathers data from millions of participating users systems around the world to help defend you from the very latest viruses and malware attacks. Freeware Cloud based malware detection, easy to use, user-friendly interface, automatic/manual updates, no installations, supports multiple languages and many other features. Compatibility Microsoft Windows XP, Vista, 7, 8, 8.1, 10, Server 2003, 2008 32/64-bit Requires .NET Framework 3.5 July 9th, 2015 Crystal Security 3.5.0.134 - What's new FIXED: bug in Active protection, bug in Shell integration, several other minor bugs. UPDATED: embedded heuristic database.
4/5 1,070 Jul 10, 2015
Kardo Kristal
Cybereason RansomFree 2.2.7.0
Cybereason RansomFree 2.2.7.0 Keep your important files safe from ransomware RansomFree protects computers and servers running Windows. The only free tool that stops 99% of ransomware strains, including never-before-seen types. Simple installation, immediate protection Download and install RansomFree in less than 5 minutes, by following our simple step-by-step installation wizard. Eliminating Cyber Crime Cybereason’s mission is to put an end to cyber crime. And in order to put an end to one of the most profitable cyber operations of the recent years – ransomware – we have to make it unprofitable for the criminals. That’s why we are launching RansomFree: free, easy-to-install ransomware protection software, available for download for every individual and business that lacks the budget and skills to fight back. About Cybereason Cybereason is a company of elite, former military cyber-security experts. Our deep experience in offensive cyber operations helped us build military-grade technologies that enable companies to stop attacks in real time. Cybereason raised over 90 million dollars from investors like Lockheed Martin and the Japanese telecommunication giant Softbank. The company and its technology were featured in Fortune and Forbes. https://s3.amazonaws.com/ransomfree-cybereason/Ransomfree.mp4?_=1
5/5 139 May 09, 2017
Cybereason
DDS
DDS DDS is a program that will scan your computer and create logs that can be used to display various startup, configuration, and file information from your computer. This program is used in security forums to provide a detailed overview of what programs are automatically starting when you start Windows. The program will also display information about the computer that will allow experts to quickly ascertain whether or not malware may be running on your computer. To use DDS, simply download the executable and save it to your desktop or other location on your computer. You should then double-click on the DDS.com icon to launch the program. DDS will then start to scan your computer and compile the information found into two log files. When DDS has finished it will launch the two Notepad windows that display the contents of these log files. The contents of these log files can then be attached to a reply in virus removal forums so that an expert can analyze them.
5/5 892 Jan 20, 2017
sUBs
Emsisoft Emergency Kit 11.9.0.6508
Emsisoft Emergency Kit 11.9.0.6508 The Emsisoft Emergency Kit contains a collection of programs that can be used without software installation to scan for malware and clean infected computers: Emsisoft Emergency Kit Scanner and Emsisoft Commandline Scanner. Emsisoft Emergency Kit Scanner The Emsisoft Emergency Kit Scanner includes the powerful Emsisoft Scanner complete with graphical user interface. Scan the infected PC for Viruses, Trojans, Spyware, Adware, Worms, Dialers, Keyloggers and other malicious programs. Emsisoft Commandline Scanner This scanner contains the same functionality as the Emergency Kit Scanner but without a graphical user interface. The commandline tool is made for professional users and is perfect for batch jobs. To run the Emsisoft Commandline Scanner, perform the following actions: - Open a command prompt window (Run: cmd.exe) - Switch to the drive of the USB Stick (e.g.: f:), then to the folder of the executable files (e.g.: cd run) - Run the scanner by typing: a2cmd.exe Next you will see a help page describing all available parameters. The following parameter is an example of scanning drive c:\ with Memory, Traces (Registry) scan enabled, and archive support active. Detected Malware is moved to quarantine. a2cmd.exe /f="c:\" /m /t /a /q="c:\quarantine\" Emsisoft Emergency Kit is free for private use. Will it run on my PC? Unless you have a rather outdated PC from the late 90s, the answer is most likely yes, assuming that you’re using Windows 7, 8 or 10 - with the latest service pack installed. All features are fully functional on x64 systems too. While running, Emsisoft Emergency Kit uses about 200 MB of your RAM which is quite low considering the 10 million signatures that it must load. If your PC has at least 1 GB of RAM, this will be perfect.
5/5 3,899 Oct 03, 2016
Emsisoft
ESET EternalBlue Checker 1.0.0.1
ESET EternalBlue Checker 1.0.0.1 ESET has released a free tool to help determine whether your Windows machine is patched against EternalBlue. If the tool finds a vulnerability in your system due to missing Microsoft patches, Your computer is vulnerable will be displayed. Press any key to open the Microsoft Windows update page. Click Microsoft Update Catalog in Method 2: Microsoft update Catalog section. On the Microsoft Update Catalog page, find your operating system in the Products column and click the Download button next to your system. Click the link in the Download window to download the security update for your system. After the security update has been installed, restart your computer. After the computer has restarted, run ESETEternalBlueChecker.exe again to verify that the security update installed correctly and your system is no longer at risk. If the security update was installed correctly, Your computer is safe, Microsoft security update is already installed will be displayed. Warn colleagues who frequently receive emails from external sources – for instance financial departments or Human Resources. Regularly back up your data. In the event of infection, this will help you recover all data. Do not leave external storage used for backups connected to your computer to eliminate the risk of infecting your backups. If your system requires Windows Updates to receive the patch for this exploit, create new backups after applying the patch. Disable or restrict Remote Desktop Protocol (RDP) access Disable macros in Microsoft Office. If you are using Windows XP, disable SMBv1.
5/5 23 May 22, 2017
ESET
ESET TeslaCrypt Decryptor 1.1.0.1
ESET TeslaCrypt Decryptor 1.1.0.1 ESET® released a decryptor for recent variants of the TeslaCrypt ransomware. If you have been infected by one of the new variants (v3 or v4) of the notorious ransomware TeslaCrypt and the encrypted files have the extensions .xxx, .ttt, .micro, .mp3 or remained unchanged, then ESET has good news for you. Recently, TeslaCrypt’s operators have announced they are wrapping up their malicious activities. On this occasion, one of ESET’s analysts anonymously contacted the group, using the official support channel offered to the ransomware victims by the TeslaCrypt’s operators and requested the universal master decryption key. Surprisingly, they made it public. This has allowed ESET to promptly create a free decrypting tool capable of unlocking files affected by all variants of this ransomware. How do I clean a TeslaCrypt infection using the ESET TeslaCrypt decrypter? Issue Your personal files became encrypted and the following information may be displayed in your computer, or in a .txt, .html or .png file Your ESET product detects the infection Win32/Filecoder.TeslaCrypt How to decrypt your files using the ESETTeslaCryptDecryptor.exe tool Solution Download the ESETTeslaCryptDecryptor.exe tool and save the file to your Desktop. Click Start → All Programs → Accessories, right-click Command prompt and then select Run as administrator from the context menu. Windows 8 / 8.1 / 10 users: press the Windows key + Q to search for applications, type Command prompt into the Search field, right-click Command prompt and then select Run as administrator from the context menu. Type the command cd %userprofile%\Desktop (do not replace "userprofile" with your username–type the command ...
5/5 452 May 31, 2016
ESET
Farbar Recovery Scan Tool 32bit 12.06.2017
Farbar Recovery Scan Tool 32bit 12.06.2017 Farbar Recovery Scan Tool, or FRST, is a portable application designed to run on Windows XP, Windows Vista, Windows 7 and Windows 8 in normal or safe mode to diagnose malware issues. It is also possible to run FRST in the Windows Recovery Environment in order to diagnose and fix boot issues. If you are using Windows XP and have boot issue, the system should boot to the Recovery Environment using a PE Boot CD and then you can run FRST This program will display detailed information about the Windows Registry loading points, services, driver services, Netsvcs entries, known DLLs, drives, and partition specifications. It will also list some important system files that could be patched by malware. Note: There are both 32-bit and 64-bit versions of Farbar Recovery Scan Tool available. Please pick the version that matches your operating system's bit type. If you don't know which version matches your system, you may try both of them. Only one of them will run on your system.
5/5 1,534 Jun 12, 2017
Farbar
Farbar Recovery Scan Tool 64bit 12.06.2017
Farbar Recovery Scan Tool 64bit 12.06.2017 Farbar Recovery Scan Tool, or FRST, is a portable application designed to run on Windows XP, Windows Vista, Windows 7 and Windows 8 in normal or safe mode to diagnose malware issues. It is also possible to run FRST in the Windows Recovery Environment in order to diagnose and fix boot issues. If you are using Windows XP and have boot issue, the system should boot to the Recovery Environment using a PE Boot CD and then you can run FRST This program will display detailed information about the Windows Registry loading points, services, driver services, Netsvcs entries, known DLLs, drives, and partition specifications. It will also list some important system files that could be patched by malware. Note: There are both 32-bit and 64-bit versions of Farbar Recovery Scan Tool available. Please pick the version that matches your operating system's bit type. If you don't know which version matches your system, you may try both of them. Only one of them will run on your system.
5/5 1,679 Jun 12, 2017
Farbar
FileASSASSIN 1.06
FileASSASSIN 1.06 FileASSASSIN can eradicate any type of locked files from your computer. If you use a computer, you've probably come across at least one of the following messages: Cannot delete file: Access is denied Make sure the disk is not full or write-protected and that the file is not currently in use The source or destination file may be in use The file is in use by another program or user These messages commonly appear when you're trying to delete files deposited by a malware infection, though occasionally a file just goes on lockdown. Whatever the reason for the file, FileASSASSIN can remove it Advanced programming techniques unload modules, close remote handles, and terminate processes in order to remove the particular locked file. Warning: Please use caution with FileASSASSIN as deleting critical system files may cause system errors. Usage Start FileASSASSIN and select a file by dragging it onto the text area or selecting it using the (...) button. Select a removal method from the list Click Execute and the removal process will commence
5/5 3,730 Nov 12, 2016
Malwarebytes
FreeFixer 1.14
FreeFixer 1.14 FreeFixer is a general purpose removal tool which will help you to delete potentially unwanted software, such as adware, spyware, trojans, viruses and worms. FreeFixer works by scanning a large number of locations where unwanted software has a known record of appearing or leaving traces. The scan locations include the programs that run on your computer, the programs that starts when you reboot your computer, your browser's plug-ins, your home page setting, etc. FreeFixer does not know what is unwanted, so it presents the scan result and it's up to you decide if some file should be removed and if some settings should restored to their default value. Please be careful! If you delete a legitimate file you may damage your computer. To assist you when determining if anything should be removed you can find more information at FreeFixer's web site for each item in the scan result. You can for example see what other users chose to do in the same situation. You can also save log file of your scan result and consult the volunteers in one of the FreeFixer helper forums. Release Notes What's New in FreeFixer 1.14 When scanning the LAN proxy settings FreeFixer will now figure out the path to the file containing the proxy code, if the proxy running on the local machine. If the proxy is running as a service inside svchost.exe FreeFixer will also display the service name in the scan result. Improved performance in the FreeFixer scan by caching results from the process enumeration. This decreased the scan time by approximately 35%. The number of memory allocations was reduced by 50%. Fixed bug in the Autorun.inf files scan which occured when there was a network mount on the local machine, pointing to ...
5/5 3,181 Jan 20, 2017
Roger Karlsson
Ghostpress 1.3.422
Ghostpress 1.3.422 Ghostpress is a free anti-keylogging software that prevent malicious software from capturing your keyboard presses. Full system wide key press protection Desktop widget or favicon 12 Languages(Croatian, Czech, Dutch, English, French, German, Indonesian, Italian, Korean, Latvian, Polish and Spanish) Ultra fast performance Process protection Anti low-level keylogger Completely free Changelog: March 9, 2017 1.3 +Portable parameter (settings wont be saved) +Romanian translation (Thanks to Arthur) +Portugese translation #Animated widget will go partly transparent when no key was pressed within the last 10 seconds #Moved update system to new domain with encryption enforced #Fixed minor update check bug #Fixed non-administrator bug for adding autostart #Minor UI changes
5/5 186 Mar 10, 2017
Hendrik Schiffer
GMER 2.2.19882
GMER 2.2.19882 GMER is an application that detects and removes rootkits . It scans for: hidden processes hidden threads hidden modules hidden services hidden files hidden disk sectors (MBR) hidden Alternate Data Streams hidden registry keys drivers hooking SSDT drivers hooking IDT drivers hooking IRP calls inline hooks GMER runs on Windows XP/VISTA/7/8/10 Version History: This is list of changes for each release of GMER: 2.2 - Added support for Windows 10 - Improved files & disk scanning FAQ Frequently Asked Questions Question: Do I have a rootkit? Answer: You can scan the system for rootkits using GMER. Run gmer.exe, select Rootkit tab and click the "Scan" button. If you don't know how to interpret the output, please Save the log and send it to my email address. Warning ! Please, do not select the "Show all" checkbox during the scan. Question: How to create "3rd party" log ? Answer: Tick "3rd party" option and then click the "Scan" button. After the scan you can use "Remove signed" and "Remove duplicates" options to filter the scan results. Question: How to install the GMER software ? Answer: Just run gmer.exe. All required files will be copied to the system during the first lanuch. Question: How to uninstall/remove the GMER software from my machine ? Answer: Just delete the exe file. Question: My computer is infected and GMER won't start: Answer: Try to rename gmer.exe to iexplore.exe and then run it. Question: How do I remove the Rustock rootkit ? Answer: When GMER detects hidden service click "Delete the service" and answer YES to all questions. Question: How do I show all NTFS Streams ? Answer: On the "Rootkit Tab" select only: Files + ADS + Show all options and then click the Scan button. Question: Can I launch GMER in Safe Mode ? Answer: Yes, you can launch GMER in Safe Mode, however rootkits which don't work in Safe Mode won't be detected. Question: I am confused as to use delete or disable the hidden "service". Answer: Sometimes "delete ...
5/5 3,843 Dec 02, 2016
Gmer
HijackThis 2.0.5
HijackThis 2.0.5 HijackThis is a free utility that generates an in depth report of registry and file settings from your computer. HijackThis makes no separation between safe and unsafe settings in its scan results giving you the ability to selectively remove items from your machine. In addition to this scan and remove capability HijackThis comes with several tools useful in manually removing malware from a computer. IMPORTANT: HijackThis does not determine what is good or bad. Do not make any changes to your computer settings unless you are an expert computer user. Advanced users can use HijackThis to remove unwanted settings or files.
5/5 3,712 Sep 22, 2016
TrendMicro
Immunet FREE Antivirus 5.0.2.10301
Immunet FREE Antivirus 5.0.2.10301 Fast Antivirus Protection leverages the speed of cloud computing to deliver real-time protection to your PC. Stay protected against over 13 million viruses and thousands of new threats daily without ever downloading another virus detection file again. Simply stay connected to the Immunet Cloud to keep all virus detections up to date. Immunet FREE Antivirus is ideal for consumers who want fast protection that doesn't slow down their PC, including students, families, and netbook users. Features: Fast Antivirus Protection - Won't slow down your PC Community-Based - Protect your closest contacts Realtime Detection - NO virus updates required Companion Antivirus - Compatible with existing antivirus (2.0 Companion Products list) Strength in Numbers - Powered by Collective Immunity™ Intelligent Scans - Fast, configurable smart scans Additional Features: Silent / Gamer Mode History / Report Logging Registry Startup Scan
5/5 2,520 Jan 20, 2017
Immunet
Junkware Removal Tool 8.1.3
Junkware Removal Tool 8.1.3 Scrubs out the bad, keeps the good Is your PC running slow? It could be infected with potentially unwanted programs (PUPs), adware, or other junkware. Junkware Removal Tool (JRT) by Malwarebytes sweeps up and removes all traces of irritating hitchhikers. How it works for you Removes adware that spawn popup ads, such as Conduit Uninstalls unwanted toolbars and browser helper objects, including the Ask and Babylon toolbars Removes potentially unwanted programs (PUPs) Cleans up traces left behind by PUPs What it does for you Toolbar removal functionality Browser extension removal functionality (Google Chrome, Firefox, Internet Explorer) PUPs and adware removal functionality Light footprint Portable application—no installation necessary What makes Junkware Removal Tool different? Offers comprehensive junkware removal Junkware Removal Tool is custom built to detect and remove over 250 junkware variants, including adware and unwanted toolbars. Moves with you Junkware Removal Tool is portable. There’s no need to install it on your computer—simply load it on a USB, plug the USB into your computer, and start cleaning. Combines fast scanning with seamless removal Got coffee? Junkware Removal Tool will typically disinfect a computer in under five minutes, so your machine is clean and pristine in the time it takes you to brew another cup. Spells simplicity “CLI” Junkware Removal Tool operates through a lean but flexible Command Line Interface (CLI) to reduce its system footprint and simplify operation. Maintains a low profile Junkware Removal Tool self-extracts and installs itself in the Temp folder. It’s unobtrusive, out of the way, and is easy to remove when the job is done. Tech Specs Version 8.1.3 Languages Available English Hardware Requirements 1024MB of RAM (256MB for Windows XP) ...
5/5 5,917 Apr 11, 2017
Malwarebytes
Kaspersky CapperKiller 1.0.12.0
Kaspersky CapperKiller 1.0.12.0 The CapperKiller utility is designed for treating the aftermaths of a Trojan-Banker.Win32.Capper infection. 1. Signs of infection The given piece of malware changes proxy settings in the following browsers (if installed on the host): Internet Explorer, Mozilla Firefox, Opera, Google Chrome (uses Internet Explorer settings). It adds a special URL to the Use automatic configuration script option in the Internet connection settings. A reboot may be required after the treatment. The CapperKiller utility performs the following: Detects and fixes proxy settings in all browsers. Detects and deletes malicious exec files.
5/5 771 Jan 24, 2017
Kaspersky Lab
Kaspersky FippKiller 1.0.2
There is a special utility for curing an active Worm.Win32.Fipp.a infection. Infection symptoms: Significantly increased RDP traffic (brute-force attack). Antivirus software performance degradation on many hosts in local network. Infected hosts attempt to access URLs like *.ppift.* How to disinfect an infected system: Download the FippKiller.exe file. Launch the FippKiller.exe file on the infected (or potentially infected) host. It is recommended not to reboot hosts after using the utility until the network has been successfully disinfected. Command line options to use with the utility: -p <path> - scan a particular host; -n – scan network volumes; -r - scan flash drives, and removable USB / FireWire hard disks; -y – close the window once the utility completes; -s – scan in silent mode (without displaying the console window); -l <file_name> - log file name; -v – create a detailed log file (should be used with -l); -m – system infection protection monitoring mode; -q – scan the system, activate monitoring mode once the scan completes.
5/5 3,667 Jan 24, 2017
Kaspersky
Kaspersky RakhniDecryptor 1.14.0.0
Kaspersky RakhniDecryptor 1.14.0.0 RakhniDecryptor utility for removing Trojan-Ransom.Win32.Rakhni malicious software (.oshit and others) The malicious programs Trojan-Ransom.Win32.Rakhni, Trojan-Ransom.Win32.Agent.iih, Trojan-Ransom.Win32.Aura, Trojan-Ransom.Win32.Autoit, and Trojan-Ransom.AndroidOS.Pletor are used by malefactors to encrypt files so that their extensions are changed as follows: <filename>.<original_extension>.<locked> <filename>.<original_extension>.<kraken> <filename>.<original_extension>.<darkness> <filename>.<original_extension>.<nochance> <filename>.<original_extension>.<oshit> <filename>.<original_extension>.<oplata@qq_com> <filename>.<original_extension>.<relock@qq_com> <filename>.<original_extension>.<crypto> <filename>.<original_extension>.<helpdecrypt@ukr.net> <filename>.<original_extension>.<pizda@qq_com> <filename>.<original_extension>.<dyatel@qq_com> <filename>.<original_extension>_crypt <filename>.<original_extension>.<nalog@qq_com> <filename>.<original_extension>.<chifrator@qq_com> <filename>.<original_extension>.<gruzin@qq_com> <filename>.<original_extension>.<troyancoder@qq_com> <filename>.<original_extension>.<encrypted> <filename>.<original_extension>.<cry> <filename>.<original_extension>.<AES256> <filename>.<original_extension>.<enc> <filename>.<original_extension>.<coderksu@gmail_com_id371> <filename>.<original_extension>.<coderksu@gmail_com_id372> <filename>.<original_extension>.<coderksu@gmail_com_id374> <filename>.<original_extension>.<coderksu@gmail_com_id375> <filename>.<original_extension>.<coderksu@gmail_com_id376> <filename>.<original_extension>.<coderksu@gmail_com_id392> <filename>.<original_extension>.<coderksu@gmail_com_id357> <filename>.<original_extension>.<coderksu@gmail_com_id356> <filename>.<original_extension>.<coderksu@gmail_com_id358> <filename>.<original_extension>.<coderksu@gmail_com_id359> <filename>.<original_extension>.<coderksu@gmail_com_id360> <filename>.<original_extension>.<coderksu@gmail_com_id20> <filename>.crypt@india.com.random_characters> <filename>.<original_extension>.<hb15> For example: Before: file.doc / After: file.doc.locked Before: 1.doc / After: 1.dochb15 To regain control over the files encrypted by Trojan-Ransom.Win32.Rakhni, Trojan-Ransom.Win32.Aura, Trojan-Ransom.Win32.Agent.iih, Trojan-Ransom.Win32.Autoit, and Trojan-Ransom.AndroidOS.Pletor, use the RakhniDecryptor utility developed by Kaspersky Lab specialists. 1. How to work with the utility IMPORTANT: Trojan-Ransom.Win32.Rakhni creates the exit.hhr.oshit file that contains an encrypted password to user's files. If this file remains on the computer, it will make decryption with the RakhniDecryptor utility faster. If the file has been removed, it can be recovered with file recovery utilities. After the file is recovered, put it into %APPDATA% and run the scan with the utility once again. The exit.hhr.oshit file has the following path: Windows XP: C:\Documents and Settings\<username>\Application Data Windows 7/8: C:\Users\<username>\AppData\Roaming To decrypt ...
5/5 3,680 Jul 23, 2015
Kaspersky Lab
Kaspersky RannohDecryptor 1.8.0.0
Kaspersky RannohDecryptor 1.8.0.0 If the system is infected by a malicious program of the family Trojan-Ransom.Win32.Rannoh , Trojan-Ransom.Win32.AutoIt, Trojan-Ransom.Win32.Fury, or Trojan-Ransom.Win32.Cryakl, all files on the computer will be encrypted in the following way: In case of a Trojan-Ransom.Win32.Rannoh infection, file names and extensions will be changed according to the template locked-<original name>.<four random letters>. In case of a Trojan-Ransom.Win32.Cryakl infection, the tag {CRYPTENDBLACKDC} is added to the end of file names. In case of a Trojan-Ransom.Win32.AutoIt infection, extensions will be changed according to the template <original name>@<mail server>_.<random set of characters>. Example: ioblomov@india.com_RZWDTDIC. To decrypt files affected by Trojan-Ransom.Win32.Rannoh, Trojan-Ransom.Win32.AutoIt, Trojan-Ransom.Win32.Fury, Trojan-Ransom.Win32.Crybola or Trojan-Ransom.Win32.Cryakl, use the RannohDecryptor utility.
5/5 1,186 Jan 24, 2017
Kaspersky Lab
Kaspersky RectorDecryptor 2.6.35.0
Kaspersky RectorDecryptor 2.6.35.0 Cybercriminals use Trojan-Ransom.Win32.Rector for disrupting normal performance of computers and for unauthorized modification of data making it unusable. Once the data has been “taken hostage” (blocked), its owner (user) receives a ransom demand. The victim is supposed to deliver the ransom in exchange for pirate's promise to send a utility that would restore the data or repair the PC. Kaspersky Lab specialists have developed a special utility for decrypting the data encrypted by Trojan-Ransom.Win32.Rector. The utility has a GUI. Do the following to decrypt files encrypted by Trojan-Ransom.Win32.Rector: Download the utility RectorDecryptor.zip to an infected computer; Extract its content using an archiver (WinZip, e.g.); Run the file RectorDecryptor.exe; The utility starts working by clicking the button Start scan. It finds and decrypts encrypted files. Select the option Delete crypted files after decryption to delete copies of encrypted files with extensions .vscrypt, .infected, .bloc, .korrektor, etc. after successful decryption.
5/5 3,728 Jan 24, 2017
Kaspersky Lab
Kaspersky Rescue Disk 10.0.32.17
Kaspersky Rescue Disk 10.0.32.17 Boot from the Kaspersky Rescue Disk to scan and remove threats from an infected computer without the risk of infecting other files or computers. If your computer is infected with the ransom malware, then use a special Kaspersky WindowsUnlocker utility. Ransom malware blocks access to data so that the user can no longer use it and prevents the computer from running correctly. Once the data has been blocked or encrypted, the user will receive a ransom demand. In order to disinfect the registry using Kaspersky WindowsUnlocker, perform the following actions: If you booted Kaspersky Rescue Disk in the graphic mode, click the button К ; in the bottom right corner of the screen and in the menu select Terminal. In the command prompt enter the command windowsunlocker and press Enter on the keyboard. Burn this ISO image to a CD, insert it into the infected system's CD-ROM drive, enter the PC's BIOS, set it to boot from the CD and reboot the computer. This lists the Gentoo-specific options, along with a few options that are built-in to the kernel, but that have been proven very useful to our users. Also, all options that start with "do" have a "no" inverse, that does the opposite. For example, "doscsi" enables SCSI support in the initial ramdisk boot, while "noscsi" disables it. Easily remove malicious objects from your computer without the risk of getting infected.
5/5 3,936 Jan 27, 2017
Kaspersky
Kaspersky ScatterDecryptor 1.0.0.0
Kaspersky ScatterDecryptor 1.0.0.0 If your computer is infected with Trojan-Ransom.BAT.Scatter, use the ScatterDecryptor utility for restoring encrypted files. Trojan-Ransom.BAT.Scatter encrypts user files with a public key and changes their extensions. The files can only be decrypted with a unique secret key. ScatterDecryptor restores the files only if the utility contains a certain Trojan-Ransom.BAT.Scatter modification's secret key.
5/5 2,326 Jan 24, 2017
Kaspersky Labs International Ltd.
Kaspersky ScraperDecryptor 1.0.0.0
Kaspersky ScraperDecryptor 1.0.0.0 The malicious program Trojan-Ransom.Win32.Scraper encrypts user files to block access to them. After the data has been blocked, the user is required to pay a ransom. To decrypt files affected by Trojan-Ransom.Win32.Scraper, use the ScraperDecryptor utility developed by Kaspersky Lab engineers.
5/5 1,414 Jan 20, 2015
Kaspersky Lab
Kaspersky TDSSKiller 3.1.0.15
Kaspersky TDSSKiller 3.1.0.15 A rootkit is a program or a program kit that hides the presence of malware in the system. A rootkit for Windows systems is a program that penetrates into the system and intercepts the system functions (Windows API). It can effectively hide its presence by intercepting and modifying low-level API functions. Moreover it can hide the presence of particular processes, folders, files and registry keys. Some rootkits install its own drivers and services in the system (they also remain “invisible”). Kaspersky Lab has developed the TDSSKiller utility that allows removing rootkits. The utility supports 32-bit and 64-bit operation systems. The utility can be run in Normal Mode and Safe Mode. List of malicious programs the utility fights The TDSSKiller utility fights malware family Rootkit.Win32.TDSS, bootkits and rootkits: Backdoor.Win32.Phanta.a,b Backdoor.Win32.Sinowal.knf,kmy Backdoor.Win32.Trup.a,b Rootkit.Boot.Aeon.a Rootkit.Boot.Adrasteia.a Rootkit.Boot.Backboot.a Rootkit.Boot.Backboot.c Rootkit.Boot.Batan.a Rootkit.Boot.Bootkor.a Rootkit.Boot.Clones.a Rootkit.Boot.CPD.a,b Rootkit.Boot.Fisp.a Rootkit.Boot.Geth.a Rootkit.Boot.Goodkit.a Rootkit.Boot.Harbinger.a Rootkit.Boot.Krogan.a Rootkit.Boot.Lapka.a Rootkit.Boot.Mebusta.a Rootkit.Boot.MyBios.b Rootkit.Boot.Nimnul.a Rootkit.Boot.Nix.a Rootkit.Boot.Pihar.a,b,c Rootkit.Boot.Plite.a Rootkit.Boot.Prothean.a Rootkit.Boot.Qvod.a Rootkit.Boot.Sawlam.a Rootkit.Boot.Smitnyl.a Rootkit.Boot.SST.a,b Rootkit.Boot.SST.b Rootkit.Boot.Wistler.a Rootkit.Boot.Xpaj.a Rootkit.Boot.Yurn.a Rootkit.Win32.PMax.gen Rootkit.Win32.Stoned.d Rootkit.Win32.TDSS Rootkit.Win32.TDSS.mbr Rootkit.Win32.ZAccess.aml,c,e,f,g,h,i,j,k Trojan-Clicker.Win32.Wistler.a,b,c Trojan-Dropper.Boot.Niwa.a Trojan-Ransom.Boot.Mbro.d,e Trojan-Ransom.Boot.Mbro.f Trojan-Ransom.Boot.Siob.a Trojan-Spy.Win32.ZBot Virus.Win32.Cmoser.a ...
5/5 5,456 Apr 19, 2017
Kaspersky Lab
Kaspersky Virus Removal Tool 2017.04.05
Kaspersky Virus Removal Tool 2017.04.05 Kaspersky Virus Removal Tool is a utility designed to remove all types of threats from computers. Kaspersky Virus Removal Tool uses the effective detection algorithms realized in Kaspersky Anti-Virus and AVZ. Kaspersky Virus Removal Tool does not provide resident protection for your computer. After disinfecting a computer, you are supposed to remove the tool and install a full version of antivirus software. Advantages: Simplified interface. Can be installed to an infected computer (Safe Mode supported). Composite scan and disinfection system: signature detection and heuristic analyzer. Gathering system information and interactive creation of scripts for disinfection. General functions: Automatic and manual removal of virus, Trojans and worms. Automatic and manual removal of Spyware and Adware modules. Automatic and manual removal of all types of rootkits. Known issues: System memory scan is unavailable in x64 versions of Windows XP / Vista / 7 due to specific features of application system drivers. Impossible to rename application folder if User Account Control is enabled in Windows Vista settings and application Self-Defence disabled. Support rules for Kaspersky Virus Removal Tool: Technical support is provided only for users of Kaspersky Anti-Virus and Kaspersky Internet Security. If you are not a user of a Kaspersky Lab product, then in order to get technical support available for the tool, visit Kaspersky Lab The tool should be used for disinfection purpose under expert guidance via the service http://kaspersky-911.com. Unguided creation of scripts can result in a data loss or crippled computer. Having virus on your computer is always a risk of crippling it or losing data. Kaspersky Lab does not take any responsibility for the possible harm inflicted by virus during disinfection.
5/5 3,980 Apr 05, 2017
Kaspersky Lab
Kaspersky XoristDecryptor 2.3.45.0
Kaspersky XoristDecryptor 2.3.45.0 Malware of the family Trojan-Ransom.Win32.Xorist is designed for unauthorized modification of data on a victim computer. It makes computers uncontrollable or blocks its normal performance. After taking the data as a “hostage” (blocking it), a ransom is demanded from the user. The victim is supposed to deliver the ransom to the pirate, who is promising to send in return a program which would release the data or restore normal performance of the computer. There is a utility to confront malware of the family Trojan-Ransom.Win32.Xorist - XoristDecryptor.exe. The utility XoristDecryptor.exe is provided with a GUI. Disinfection of an infected system: Download the XoristDecryptor.zip to an infected computer. Extract the utility using an archiver program, WinZip for example. Run the XoristDecryptor.exe file. Click the Start scan button to execute the utility . The utility will prompt you to enter path of at least one encrypted file to begin the decryption process. The trojan program encrypts all files with the following extensions: doc, xls, docx, xlsx, db, mp3, waw, jpg, jpeg, txt, rtf, pdf, rar, zip, psd, msi, tif, wma, lnk, gif, bmp, ppt, pptx, docm, xlsm, pps, ppsx, ppd, tiff, eps, png, ace, djvu, xml, cdr, max, wmv, avi, wav, mp4, pdd, html, css, php, aac, ac3, amf, amr, mid, midi, mmf, mod, mp1, mpa, mpga, mpu, nrt, oga, ogg, pbf, ra, ram, raw, saf, val, wave, wow, wpk, 3g2, 3gp, 3gp2, 3mm, amx, avs, bik, bin, dir, divx, dvx, evo, flv, qtq, tch, rts, rum, rv, scn, srt, stx, svi, swf, trp, vdo, wm, wmd, wmmp, wmx, wvx, xvid, 3d, 3d4, 3df8, pbs, adi, ais, amu, arr, bmc, bmf, cag, cam, dng, ink, jif, jiff, jpc, jpf, jpw, mag, mic, mip, msp, nav, ncd, odc, odi, opf, qif, qtiq, srf, xwd, abw, act, adt, aim, ans, asc, ase, bdp, bdr, bib, boc, crd, diz, dot, dotm, dotx, dvi, ...
5/5 3,678 Jan 24, 2017
Kaspersky Lab
Malwarebytes Anti-Exploit 1.9.1.1334
Malwarebytes Anti-Exploit 1.9.1.1334 Malwarebytes Anti-Exploit protects you against the security vulnerabilities in the code, which make up your software programs. Your software contains millions of lines of code, which unfortunately some people want to exploit. Malwarebytes Anti-Exploit protects you from these vulnerabilities which people can manipulate in order to infect your system with malware. The software gives you three layers of security protection around popular browsers and applications, thereby preventing the vulnerable code from being exploited. The software is not an antivirus product in itself, but it is compatible with most antivirus software. KEY FEATURES INCLUDE It protects browsers and their add-ons Protects browser components Protects media players and PDF readers Allows you to manage custom shields Best of all, it's free!
5/5 3,786 Feb 16, 2017
Malwarebytes
Malwarebytes Anti-Malware 3.1.2.1733-10139
Malwarebytes Anti-Malware 3.1.2.1733-10139 Malwarebytes 3.0. Four layers of malware-crushing tech. Smarter detection. Specialized ransomware protection. It's the security you’ve been looking for. What it does for you Malwarebytes Premium protects you from advanced threats Protects you from advanced threats Detects and removes malware in real-time with advanced anti-malware, anti-spyware, and anti-rootkit technology. Scans for the newest and most dangerous threats automatically, so you’re protected without having to even think about it. Malwarebytes Premium protects your files from being locked and held for ransom Protects your files from being locked and held for ransom Stops unknown and known ransomware with proprietary next-gen technology that works proactively to shield your files. This is a powerful, comprehensive defense that blocks ransomware, and not a simple decryption tool. So you’re protected from tomorrow’s “Ransomware Attack!” headlines today. Malwarebytes Premium Prevents your programs from being used against you Prevents your programs from being used against you Wraps your browser and software programs in four layers of defense, stopping attacks that use vulnerabilities in those programs to infect your computer. Malwarebytes Premium protects you from fake and infected websites Protects you from fake and infected websites Detects and prevents contact with fake websites and malicious links. You are proactively protected from downloading malware, hacking attempts, and infected advertising. Worried about wandering into a “bad” Internet neighborhood? Now you don’t have to be. Malwarebytes Premium scans faster, scans smarter Scans faster, scans smarter Lightning-fast Hyper Scan mode targets only the threats that are currently active. Faster analysis. Still gets results. Run a scan in the background while you boot up your favorite game. It's done by the time you're ready to play. Full protection or simple disinfection? Download Malwarebytes 3.0 for free and you get 14 days of full real-time protection. After the 14 days are up, Malwarebytes 3.0 reverts to a very limited but still free version that will only disinfect your computer after an attack. ...
5/5 6,647 Jun 01, 2017
Malwarebytes.org
Malwarebytes Anti-Ransomware beta8 - build 0.9.17.661
Malwarebytes Anti-Ransomware beta8 - build 0.9.17.661 Malwarebytes Anti-Ransomware uses advanced proactive technology that monitors what ransomware is doing and stops it cold before it even touches your files. It has no shot at encrypting. And it does not rely on signatures or heuristics, so it’s light and completely compatible with antivirus. These methods proved to be so successful at stopping ransomware that Malwarebytes Anti-Ransomware detected all of the latest and most dangerous ransomware variants right out of development and into beta 1. This means when running Malwarebytes Anti-Ransomware, you do not have to worry about getting infected by CryptoLocker, CryptoWall, or CTBLocker. Better yet, it can defeat new ransomware the moment it is released, proactively protecting you from ransomware that’s never even been seen before. Malwarebytes Anti-Ransomware open beta starts today and is available for anyone to install and try out. Please keep in mind that this is the first beta and there may be some bugs or issues that need to be worked out, so we encourage you to try it out in a non-production environment first.
5/5 763 Sep 09, 2016
Malwarebytes
Malwarebytes Anti-Rootkit 1.9.3.1001
Malwarebytes Anti-Rootkit 1.9.3.1001 Malwarebytes Anti-Rootkit is a handy and reliable application designed to scan, detect and clean malicious rootkits that reside on your computer. The archive also includes a handy utility that repairs the damage caused by the presence of rootkits. This operation requires a reboot in order to apply the fixes.
5/5 3,813 Jan 24, 2017
Malwarebytes
Malwarebytes Chameleon 3.1.33
Malwarebytes Chameleon 3.1.33 Malwarebytes Chameleon technologies gets Malwarebytes Anti-Malware installed and running even when blocked by malicious programs. This program contains all up-to-date versions of Malwarebytes Anti-Malware. There are certain variants of malware that are designed to stop security programs from being installed and run on infected systems. Simply put, Chameleon is a tool that disguises Malwarebytes Anti-Malware (MBAM) so it can avoid the active infection designed to stop it allowing MBAM to be installed and run. Chameleon will also kill any known bad processes that are actively stopping MBAM from installing or running. If at any time your machine is infected and you try and install MBAM but you are unable to do so, or if you already have the program installed and try to run it but you are unable to do so, then it could be an infection preventing the installation or execution of the program. This is when Chameleon should be deployed, Chameleon will install its own driver and start to run, it will update MBAM to the latest definitions, (if already installed), kill any known malicious processes that are preventing MBAM from being installed or run, it will then launch MBAM automatically and a scan will begin.
5/5 2,654 Jan 02, 2017
Malwarebytes
Malwarebytes FileASSASSIN 1.06
Malwarebytes FileASSASSIN 1.06 FileASSASSIN can eradicate any type of locked files from your computer. If you use a computer, you've probably come across at least one of the following messages: Cannot delete file: Access is denied Make sure the disk is not full or write-protected and that the file is not currently in use The source or destination file may be in use The file is in use by another program or user These messages commonly appear when you're trying to delete files deposited by a malware infection, though occasionally a file just goes on lockdown. Whatever the reason for the file, FileASSASSIN can remove it Advanced programming techniques unload modules, close remote handles, and terminate processes in order to remove the particular locked file. Warning: Please use caution with FileASSASSIN as deleting critical system files may cause system errors. Usage Start FileASSASSIN and select a file by dragging it onto the text area or selecting it using the (...) button. Select a removal method from the list Click Execute and the removal process will commence
5/5 698 Feb 02, 2016
Malwarebytes
McAfee Rootkit Remover 0.8.9.175
McAfee Rootkit Remover 0.8.9.175 McAfee Rootkit Remover is a stand-alone utility used to detect and remove complex rootkits and associated malware. Currently it can detect and remove ZeroAccess, Necurs and TDSS family of rootkits. McAfee Labs plans to add coverage for more rootkit families in future versions of the tool. How do you use RootkitRemover? Download the latest version of RootkitRemover When prompted, choose to save the file to a convenient location on your hard disk, such as your Desktop folder. When the download is complete, navigate to the folder that contains the downloaded RootkitRemover file, and run it. It is best to run the tool in Administrator mode. The tool then runs a window which shows the status of the process. The various stages are: Initializing Scanning Cleaning When the process is completed, it prompts the user to press any key to exit the tool. It is recommended to reboot the system and perform a full scan with the McAfee VirusScan to remove remnants of the infection that might still be left on the system. Frequently Asked Questions Q: What is the need for the RootkitRemover tool? A: RootkitRemover is not a substitute for a full anti-virus scanner. It is designed to detect and remove specific rootkit infections. Q: How to use the RootkitRemover tool? A: The tool can be run by either double clicking it or through the command-line. It is advisable to run a full system scan using McAfee VirusScan after removing any infection with the tool. Q: How do I save the scan results to a log file? A: The tool is designed to automatically save the report in the same folder as the tool is placed. Q: Why do I need to rescan with McAfee VirusScan? Would I ...
5/5 1,028 Jan 24, 2017
McAfee Labs
McAfee Stinger 32bit with Real Protect 12.1.0.2388
McAfee Stinger 32bit with Real Protect 12.1.0.2388 McAfee Stinger is a standalone utility used to detect and remove specific viruses. It is not a substitute for full anti-virus protection, but a specialized tool to assist administrators and users when dealing with infected system. Details on new or enhanced signatures added with each Stinger build are listed in the Readme details. Stinger now includes Raptor - a real-time behavior detection technology that monitors suspicious activity on an endpoint. Raptor leverages machine learning and automated behavioral based classification in the cloud to detect zero-day malware in real-time. Changelog Stinger Release Notes Build Number: 12.1.0.2388 Build Date: 31-May-2017 Stinger 32bit MD5: 99dd93168893b34eb7eae41a0d26fc30 SHA1: 0b3c428dad3a301424987ae6d5c62218125bf0d2 Stinger-ePO 32bit MD5: 4ece9ae57c4d42bd0c7d96892e55d739 SHA1: 3f27d994beef6d07d9d8480c2b7ecf73d2dbf7cd Stinger 64bit MD5: d44a08eeac175208b4d350f4097196f3 SHA1: a14f34837dea1a5a472773c17605921947fef865 Stinger-ePO 64bit MD5: 894a1666e4ef73cdb5a197c57a91ebcd SHA1: 253fc7ebec31e873a98ecceac9c0561af2b1e9f0 Enhanced detections are those that have been ...
5/5 4,377 May 31, 2017
McAfee Security Products and Services
McAfee Stinger 64bit with Real Protect 12.1.0.2388
McAfee Stinger 64bit with Real Protect 12.1.0.2388 McAfee Stinger is a standalone utility used to detect and remove specific viruses. It is not a substitute for full anti-virus protection, but a specialized tool to assist administrators and users when dealing with infected system. Details on new or enhanced signatures added with each Stinger build are listed in the Readme details. Stinger now includes Raptor - a real-time behavior detection technology that monitors suspicious activity on an endpoint. Raptor leverages machine learning and automated behavioral based classification in the cloud to detect zero-day malware in real-time. Changelog Stinger Release Notes Build Number: 12.1.0.2388 Build Date: 31-May-2017 Stinger 32bit MD5: 99dd93168893b34eb7eae41a0d26fc30 SHA1: 0b3c428dad3a301424987ae6d5c62218125bf0d2 Stinger-ePO 32bit MD5: 4ece9ae57c4d42bd0c7d96892e55d739 SHA1: 3f27d994beef6d07d9d8480c2b7ecf73d2dbf7cd Stinger 64bit MD5: d44a08eeac175208b4d350f4097196f3 SHA1: a14f34837dea1a5a472773c17605921947fef865 Stinger-ePO 64bit MD5: 894a1666e4ef73cdb5a197c57a91ebcd SHA1: 253fc7ebec31e873a98ecceac9c0561af2b1e9f0 Enhanced detections are those that have been ...
5/5 4,105 May 31, 2017
McAfee Security Products and Services
Metadefender Cloud Client
Metadefender Cloud Client Metadefender Cloud Client is the most thorough free malware analysis tool available. By running data through Metadefender Cloud, Cloud Client performs a deep endpoint forensic analysis for malware using several unique methods. Look for threats and assess the security state of your endpoint if you think it may be compromised. Methods: Memory Module Multi-Scanning: process and dynamic link library (DLL) analysis using over 40 anti-malware engines Local Anti-malware Analysis: a unique and effective analysis of anti-malware log files Rogue IP Detection: ensuring there are no network connections to a rogue IP address using several IP reputation sources Memory Module Multi-Scanning Running over 40 anti-malware engines that use heuristic detection, Metadefender Cloud Client analyzes all running processes and loaded memory modules. It performs a deep scan, analyzing the DLLs accessed by these processes for malware as well. This results in a deeper analysis than that of other free tools like Process Explorer or VirusTotal. And it does all this quickly – in just a few minutes. When you run it, Metadefender Cloud Client begins scanning all processes and DLL files for any threat. Once the analysis is complete, you’ll see a summary at the top of the window of how many potential threats of all kinds were identified. You’re able to click on each individual result and see the specific processes and DLLs that may be infected. Cloud Client is unique in allowing you to review the results on such a granular level. Highlight a process to see the results of the analysis. Click the arrow next to it in order to see the libraries accessed by the application while it runs. Then, click on individual DLL files to see the threats identified, and which specific anti-malware engines identified them. You can also see a list of potentially infected ...
5/5 16 Feb 09, 2017
OPSWAT, Inc.
Microsoft Malicious Software Removal Tool 32bit 5.8
Microsoft Malicious Software Removal Tool 32bit 5.8 The Microsoft Windows Malicious Software Removal Tool checks Windows computers for and helps remove infections by specific, prevalent malicious software; including Blaster, Sasser, and Mydoom. When the detection and removal process is complete, the tool displays a report describing the outcome, including which, if any, malicious software was detected and removed. The tool creates a log file named mrt.log in the %WINDIR%\debug folder.
5/5 3,663 Jan 24, 2017
Microsoft
Microsoft Malicious Software Removal Tool 64bit 5.8
Microsoft Malicious Software Removal Tool 64bit 5.8 The Microsoft Windows Malicious Software Removal Tool checks Windows computers for and helps remove infections by specific, prevalent malicious software; including Blaster, Sasser, and Mydoom. When the detection and removal process is complete, the tool displays a report describing the outcome, including which, if any, malicious software was detected and removed. The tool creates a log file named mrt.log in the %WINDIR%\debug folder.
5/5 3,676 Jan 24, 2017
Microsoft
Norton Power Eraser 5.2.0.9
Norton Power Eraser 5.2.0.9 Norton Power Eraser is a powerful removal tool that may help you clean up certain types of difficult to remove security risks. If a program has hijacked your computer and you are having difficulty detecting or removing it, Norton Power Eraser may be able to clean your computer. Norton Power Eraser includes detection and removal capabilities for security risks that impersonate legitimate applications (for example, fake antivirus software), often known as "scareware", "rogueware" or "scamware". The tool uses more aggressive techniques than your Norton security product, hence there is a risk that it will flag legitimate programs for removal. You should carefully review the scan results page before removing any files. Scanning and Cleaning with Norton Power Eraser You do not need to install Norton Power Eraser. When the download is complete, just double click the icon on your desktop and the tool will start. You will need to accept the End User License Agreement before running a scan. Settings Click Settings on the main Norton Power Eraser screen to set up a network proxy or adjust log settings. If you choose to delete log history, you cannot undo any previous fix sessions. Click OK or Cancel to return to the main screen. View Scan Logs During every System Scan, Norton Power Eraser creates a log of important system information such as: The operating system present on the computer The installed drivers The processes and the services running on the computer The startup items The browser plug-ins The files detected as risks and the actions taken To see the log, click the View Log link at the bottom of the screen. The log is in XML format, so for best results, you should use an XML viewer. Restoring a Previous Session To restore previously removed files, click the REVIEW button found on the main Window.
5/5 2,488 Jan 24, 2017
Symantec
NoScript 5.0.4
NoScript 5.0.4 The NoScript Firefox extension provides extra protection for Firefox, Flock, Seamonkey and other mozilla-based browsers. NoScript's unique whitelist based pre-emptive script blocking approach prevents exploitation of security vulnerabilities (known and even not known yet!) with no loss of functionality... You can enable JavaScript/Java execution for sites you trust with a simple left-click on the NoScript status bar icon (look at the picture), or using the contextual menu, for easier operation in popup statusbar-less windows. Change Info: v 5.0.4 ============================================================= + [XSS] Added countermeasures against several vectors exploiting client-side JavaScript templating frameworks (thanks Krzysztof Kotowicz and Sebastian Lekies for their research) x [XSS] Fixed e10s-related regression in window.name sanitization (thanks Krzysztof Kotowicz for reporting) x Fixed "Allow local links" breaking file:/// URL loading in Gecko 53 and above x Fixed JSON viewer working only on JavaScript-enabled URLs
5/5 3,584 May 11, 2017
InformAction
OTL 3.2.69.0
OTL 3.2.69.0 OTL, or OldTimer ListIt, is a tool that is used to diagnose a computer for a possible malware presence and to provide system diagnostics information that can by someone working on a computer. When run, OTL will scan your computer for a variety of information and then generate a report with a tremendous amount of information about your computer's hardware, programs, files, and running environment.
5/5 1,363 Apr 23, 2017
OldTimer
Panda Cloud Cleaner 1.1.10
Panda Cloud Cleaner 1.1.10 An advanced disinfector that detects malware that traditional security solutions cannot detect. A second opinion on the security of your PC. Greater detection capacity than traditional antivirus solutions thanks to its latest generation technologies. Online detection of all types of malware, vulnerabilities and unknown threats. Easy to use from your browser and always up-to-date against the latest threats. A free report about threats detected and the status of the security protection installed on your computer. Compatible with any installed antivirus, the most popular browsers and the latest versions of Windows, including Windows 10.
5/5 3,706 Dec 10, 2016
Panda Security
Phrozen ADS (Alternate Data Stream) Revealer 1.0.5642
Phrozen ADS (Alternate Data Stream) Revealer 1.0.5642 Phrozen ADS (Alternate Data Stream) Revealer is a Microsoft Windows program, especially designed to reveal possible malicious ADS files in your file system. Since the Alternate Data Stream functionality is only available for NTFS (New Technology File System), the program is able to scan and detect this kind of files only for this type of file system (Physical Hard Drive/Virtual Hard Drive/Physical Removable Device/Virtual Removable Device). If some ADS Files are detected during the scan you then can decide wether or not you want to keep them or to back them up. You can also have a content preview to detect in one glance if it looks legitemate or not. Phrozen ADS Revealer is the perfect tool to sanitize your NTFS file systems against bloated content or hidden malwares. Another great tool to put in your collection and 100% free. What are Alternate Data Stream Alternate data streams allow more than one data stream to be associated with a filename, using the format "filename:streamname" (e.g., "text.txt:extrastream"). NTFS Streams were introduced in Windows NT 3.1, to enable Services for Macintosh (SFM) to store resource forks. Although current versions of Windows Server no longer include SFM, third-party Apple Filing Protocol (AFP) products (such as GroupLogic's ExtremeZ-IP) still use this feature of the file system. Very small ADS (called Zone.Identifier) are added by Internet Explorer and recently by other browsers to mark files downloaded from external sites as possibly unsafe to run; the local shell would then require user confirmation before opening them.[21] When the user indicates that they no longer want this confirmation dialog, this ADS is deleted. Alternate streams are not listed in Windows Explorer, and their size is not included in the file's size. They are ignored when the file is copied or moved ...
5/5 707 Jan 16, 2016
PHROZEN SAS
RansomNoteCleaner 0.9.4.0
RansomNoteCleaner 0.9.4.0 RansomNoteCleaner (beta) is a program I have created to help remove pesky ransom notes left behind by known ransomware variants. This program is powered by my service ID Ransomware, and thus is always updated with definitions on the latest known ransomwares and their ransom notes. This also allows it to be flexible in detecting the ransom notes, as it uses the exact same data ID Ransomware uses for identifying variants. When RansomNoteCleaner is first launched, it will contact the website, and pull down the latest information on known ransom notes; this is the only network activity done with the program, and no information about your system is uploaded or stored at all. If you have a network issue with reaching the website, the "Refresh Network" button is available to try again. Clicking the "Select Ransomware(s)" button allows for selecting the exact variant(s) to clean ransom notes from. This is recommended if you have already identified the ransomware, as it will take much less time to search for the notes. Once the ransomware variant(s) have been confirmed, you may press the "Search for Ransom Notes" button to select a directory (or whole drive), and start the search for known ransom notes. Once the scan has completed, the "Clean!" button will be available. A final window will display all found ransom notes before continuing with deletion. I highly recommend double-checking the file list before confirming the deletion. I am not responsible for loss of data if you confirm this step. A full log of deleted ransom notes will be saved to a file "RansomNoteCleaner.log" in the same directory RansomNoteCleaner is run from. Please note that this program does not decrypt data. It is simply a tool for removing the pesky ransom notes that are littered on the system after a ransomware attack. Please also ...
5/5 9 Feb 17, 2017
Demonslay335
RegRun Reanimator 8.60.0.560
RegRun Reanimator 8.60.0.560 What is RegRun Reanimator? Reanimator is a software for removing Trojans/Adware/Spyware/Malware and some of the rootkits. Reanimator does not contain any adware/spyware modules. Supported Windows 95/98/Me/NT4/2000/XP/2003/VISTA/Seven/Windows8/10 32 and 64 bit Compatible with all known antiviral software. Reanimator is free of charge for personal (non-commercial using). What is Reanimator's purpose? The main purpose of the Reanimator is remote malicious program removal. A user sends his Reanimator report to the support team File Name: regrunlog.txt Greatis Support team analyzes the user's report and creates the cure file "RNR.RNR". The user opens RNR.RNR and executes removal procedure Getting Started 1. Save downloaded reanimator.zip to your hard drive. 2. Unzip reanimator.zip to any folder on your hard drive. 3. Open ReanimatorStart.exe and proceed installation. If you have installed UnHackMe you will be prompted for updating UnHackMe Reanimator. 4. Click Next. 5. Click Send Report. Wait for a coulpe of seconds... 6. Choose Yes. After that click "OK". 7. Wait for connection with Greatis Software Support Center via your Internet browser. 8. Fill in the ticket form. Click Browse and locate "regrunlog.txt" on your desktop. Do not paste the regrunlog.txt contents directly to the Message box. Please, describe your problem in detail in the Message field. 9. You will receive our confirmation e-mail message to your e-mail box. Later you can logon to the Support Center using your Ticket ID and your e-mail. 10. You will get an answer from the Greatis Software Support Team within 1-2 working days. Please, set up your spam filter for allowing to receive messages from greatissoftware.com and from greatis.com. RegRun Reanimator - Automatic Malware Removal Reanimator allows you to automatically delete malware using the special command files called RNR files, received from Greatis Software support team or made by a user. After receiving response to your open ticket from support team, you will see "regrunlog.rnr" file attached to your ticket. Also, you can receive "rnr" file attached to the mail message or download from web ...
5/5 13 Feb 08, 2017
Greatis Software
Rem-VBSworm 7.0.0
Rem-VBSworm 7.0.0 A small tool that will aid you to remove VBS malware (and unhide your files) from a machine or in a network. The tool is written entirely in batch. Instructions on using Rem-VBSworm You should run the script in the following sequence, at least on a normal machine: Plug in your infected USB (if any) and choose A, then B and afterwards C. After these steps, perform a full scan with your installed antivirus product or perform an online scan. Some tips and tricks: Using option A, the tool will attempt to clean the infection. It will also fix any registry changes made by the malware. (for example it will re-enable Task Manager should it be disabled). ! When you use option B, be sure to type only the letter of your USB drive! So if you have a USB drive named G:\, you should only type G This option will eradicate any related malware on the USB drive, as well as unhide your files (make them visible again). With option C you can download Panda USB Vaccine to prevent any other autorun malware entering your computer. With option D you have the possibility to disable or re-enable the Windows Script Host (WSH), to prevent any malware abusing it. I advise to end the script with Q as to ensure proper logfile closing. A logfile will open automatically, but is also created by default on the C:\ drive. (C:\Rem-VBS.log) When the tool is running, do not use the machine for anything else. (it takes about 30 seconds to run) If VBS malware is found, it will be automatically removed and a copy ...
5/5 721 Mar 12, 2016
Bart Blaze
RKill 2.8.4.0
RKill 2.8.4.0 RKill is a program that was developed at BleepingComputer.com that attempts to terminate known malware processes so that your normal security software can then run and clean your computer of infections. When RKill runs it will kill malware processes and then import a Registry file that removes incorrect file associations and fixes policies that stop us from using certain tools. When finished it will display a log file that shows the processes that were terminated while the program was running. As RKill only terminates a program's running process, and does not delete any files, after running it you should not reboot your computer as any malware processes that are configured to start automatically will just be started again. Instead, after running RKill you should immediately scan your computer using some sort of anti-malware or anti-virus program so that the infections can be properly removed.
5/5 3,314 Apr 09, 2016
Bleeping Computer
RogueKiller 12.11.3 32bit
RogueKiller 12.11.3 32bit RogueKiller is an anti-malware program written in C++ and able to detect and remove generic malwares and some advanced threats such as rootkits, rogues, worms, … Based on generic ways to find malwares by their behaviour (heuristics), on classic anti-malware analysis (signature finding) and on undocumented hacks, RogueKiller can find/remove most of the basic malwares (rogues, trojans, …) and some advanced threats like ZeroAccess or TDSS that behave more like rootkits. RogueKiller is a tiny anti-malware maintained by a small team, and thus new detections are based on “most spread threats“. We react quickly to integrate detection and removal of what we think can be a global threat and affect a big amount of users across the world. Here’s a little summary of what RogueKiller is able to do: Kill malicious processes Stop malicious services Unload malicious DLLs from processes Find/Kill malicious hidden processes Find and remove malicious autostart entries, including : Registry keys (RUN/RUNONCE, …) Tasks Scheduler (1.0/2.0) Startup folders Find and remove registry hijacks, including : Shell / Load entries Extension association hijacks DLL hijacks Many, many others … Read / Fix DNS Hijacks (DNS Fix button) Read / Fix Proxy Hijacks (Proxy Fix button) Read / Fix Hosts Hijacks (Hosts Fix button) Restore shortcuts / files hidden by rogues of type “Fake HDD“ Read / ...
5/5 7,259 Jun 20, 2017
RogueKiller
RogueKiller 12.11.3 64bit
RogueKiller 12.11.3 64bit RogueKiller is an anti-malware program written in C++ and able to detect and remove generic malwares and some advanced threats such as rootkits, rogues, worms, … Based on generic ways to find malwares by their behaviour (heuristics), on classic anti-malware analysis (signature finding) and on undocumented hacks, RogueKiller can find/remove most of the basic malwares (rogues, trojans, …) and some advanced threats like ZeroAccess or TDSS that behave more like rootkits. RogueKiller is a tiny anti-malware maintained by a small team, and thus new detections are based on “most spread threats“. We react quickly to integrate detection and removal of what we think can be a global threat and affect a big amount of users across the world. Here’s a little summary of what RogueKiller is able to do: Kill malicious processes Stop malicious services Unload malicious DLLs from processes Find/Kill malicious hidden processes Find and remove malicious autostart entries, including : Registry keys (RUN/RUNONCE, …) Tasks Scheduler (1.0/2.0) Startup folders Find and remove registry hijacks, including : Shell / Load entries Extension association hijacks DLL hijacks Many, many others … Read / Fix DNS Hijacks (DNS Fix button) Read / Fix Proxy Hijacks (Proxy Fix button) Read / Fix Hosts Hijacks (Hosts Fix button) Restore shortcuts / files hidden by rogues of type “Fake HDD“ Read / ...
5/5 5,217 Jun 20, 2017
RogueKiller
RogueKillerCMD 12.11.3 32bit
RogueKillerCMD 12.11.3 32bit RogueKillerCMD is the console version of RogueKiller, designed for automation, power users, or when no UI is available (safe mode with command line for example). Apart from scanning for malware, RogueKillerCMD provides several helpers to list and play with processes, services, registry keys... Operating System Windows XP, Vista, 7, 8, 8.1, 10. 32/64 bits Changelog: V12.11.3 06/19/2017 ================= - Added detections - Minor fixes
5/5 13 Jun 20, 2017
Adlice Software
RogueKillerCMD 12.11.3 64bit
RogueKillerCMD 12.11.3 64bit RogueKillerCMD is the console version of RogueKiller, designed for automation, power users, or when no UI is available (safe mode with command line for example). Apart from scanning for malware, RogueKillerCMD provides several helpers to list and play with processes, services, registry keys... Operating System Windows XP, Vista, 7, 8, 8.1, 10. 32/64 bits Changelog: V12.11.3 06/19/2017 ================= - Added detections - Minor fixes
5/5 13 Jun 20, 2017
Adlice Software
RunPE Detector 2.0
RunPE Detector 2.0 Phrozen RunPE Detector is a security program, especially designed to detect and defeat some suspicious processes using a generic method. We at Phrozen Software do things differently, more creatively. So, when we set ourselves the task of creating a novel way of detecting, disabling and removing RATs, we didn't want to take the route every other anti-virus company has done before us. Phrozen Software studied the behaviour of RATs and discovered that hackers virtually always use a technique called RunPE. This technique spawns a legitimate process – often the default browser or a Microsoft system process – and replace it with a malicious program code directly in memory. Your computer is thus tricked and treats the malicious code as a legitimate process. The user and his anti-virus program have no idea that his default browser is effectively turned into a virus. RunPE is a technique that is used in several malicious ways. The two most common are : [1] FWB (Firewall Bypass): As its name suggests, this technique is implemented to bypass or disable the Application Firewall or the Firewall rules. Since most malware needs to connect to a remote Command-and-Control (C&amp;C) Server, it needs to connect to the Internet via the Firewall. Since most users are connected to the Internet at home, normally the installed Firewall would prevent the malware from connecting to the Internet. Using the RunPE technique to hijack a legitimate process that is authorized to reach Internet, any malware could subsequently connect to the C&amp;C without being detected by the Firewall. [2] Malware Packer or Crypter: Generally script kiddies – immature hackers - use a well-known type of malware that is already detected by most anti-virus programs. They then try the obfuscate this malware to evade ...
5/5 720 Jun 22, 2017
PHROZEN SAS
Shortcut Cleaner 1.4.9.0
Shortcut Cleaner 1.4.9.0 Shortcut Cleaner is a utility that will scan your computer for Windows shortcuts that have been hijacked by unwanted or malicious software. When Shortcut Cleaner finds bad shortcuts, it will automatically clean them so that they do not open unwanted programs. When run, Shortcut Cleaner will scan various locations on your computer for Windows shortcuts. When a shortcut is detected it will check properties for a possible hijacking. If one is detected, it will automatically clean the shortcut so that it no longer opens the offending program or web site. When the Shortcut Cleaner has finished scanning your hard drive it will create a log file on your desktop called sc-cleaner.txt and then display it. This log file will contains a list of all the shortcuts that were detected and cleaned. As of version 1.2.3, Shortcut Cleaner will also clean hijacked Registry entries associated with known hijackers. This tool is currently used to clean shortcuts hijacked by the following domains: widdit.com searchcompletion.com certified-toolbar.com complitly.com newhometab.com dtinstaller.com chipinstaller.com homebase-apps.com helperbar.com 22find.com qvo6.com hotstartsearch.com dosearches.com v9.com 22apple.com portaldosites.com delta-homes.com nationzoom.com do-search.com awesomehp.com aartemis.com sweet-page.com webssearches.com key-find.com qone8.com omiga-plus.com www-search.net safesear.ch istartsurf.com istartpageing.com
5/5 3,803 Jun 14, 2017
Lawrence Abrams
Should I Remove It? 1.0.4.36591
Should I Remove It? 1.0.4.36591 Remove adware, bloatware and crapware with one click, 100% FREE. Ever wonder how to clean out your computer? Many people do, because it’s not unusual to have your PC filled with adware, toolbars and other programs you no longer need or probably never intended to install in the first place. But like most people, what programs should you remove is the tough question. Well, we have your answer, simply download the award winning "Should I Remove It?" app and wonder no more. The app is a tiny, lightweight program designed to show you what programs you have installed on your computer and quickly determine what programs you can safely remove. Supports Windows 10, 8, 7, Vista and XP
5/5 32 Jan 13, 2017
Reason Software
SigcheckGUI 1.1.3
SigcheckGUI 1.1.3 GUI front-end for sigcheck.exe from Sysinternals. Scans for fake Root Certificates in Windows that malware uses to infect a computer. Supports: Win7 x32,Win7 x64,Win98,WinVista,WinVista x64,WinXP v1.1.3 - 2016-11-04 + SigcheckGUI now handles passed files and folders. (Thanks, zxhtrzdg) + Added "Clear unknown" to the Clear menu. * Changed/added some icons. * Verified SigcheckGUI works with sigcheck.exe v2.54.
5/5 20 Feb 20, 2017
Jody Holmes
Simple Software-restriction Policy 2.10
Simple Software-restriction Policy 2.10 A software policy makes a powerful addition to Microsoft Windows' malware protection. In particular, it is more effective against ransomware than traditional approaches to security. If you know about the Linux 'execute permission' bit then you'll understand what this is for. The mode of operation is somewhat different in that execute permission is granted to folders and subfolders rather than individual files, but the intention is the same, to stop undesirable or unknown software from launching unless you OK it. Additionally, it is possible to specify that certain executables (typically browsers and email clients) are run with reduced rights. This is a valuable damage-limitation measure against browser plugin vulns, etc. The protection can be turned off without a reboot whilst installing legitimate software, and will automatically reactivate after a specified time
5/5 193 Oct 04, 2016
IWR Consultancy
Spybot Search and Destroy 2.6.46
Spybot Search and Destroy 2.6.46 Spybot – Search and Destroy is a set of tools for finding and removing malicious software. The ‘immunization’ feature preemptively protects the browser against threats. System scans and file scans detect spyware and other malicious software and eradicates it. Spyware is a kind of threat not always detected by anti-virus applications. Spyware silently tracks your Internet activity to create a profile about you. This information can then be used for example by marketing and advertising companies. Spybot – Search &amp; Destroy is designed for use by either novice or experienced users. Novices can choose to view additional information on the available features while experienced users have additional tools and settings. It is fully functional and free for personal use! Spybot 2 – Feature Overview Malware Detection &amp; Prevention Malware Scan &amp; Fix Rootkits Scan &amp; Fix Adware and Toolbar Scan &amp; Fix iPhone® Profile Scan Network Drives Scan &amp; Fix System Immunization Tools Startup Analysis and Editing Registry Repair Secure Shredding Report and Log Creation OpenSBI Detection Rule Editor Protected Repair Environment (Premium) Spybot Boot CD Creation (Premium) Improvements New User Interface Faster Startup and Scanning Whitelisting Windows Security Center Integration Additional Assistance Dialogues Automatic Updates (Premium) Command Line Edition (Premium) Spybot 2.6 is here! June 19th, 2017 We at Safer-Networking Ltd. are pleased to announce the release of version 2.6 of our popular anti-malware software ‘Spybot – Search &amp; Destroy’. This version contains not only bug fixes but we have also improved security using Extended Validation (EV) Code Signing Certificates. We now offer full support for Microsoft SmartScreen and users will no longer receive warnings of possible Live Protection and Security Center Service conflicts. If you were affected by these issues, we would like to apologise for any inconvenience and hope that you will benefit from this upgrade to the latest version. This version is recommended for all users of Windows 7 and above. If you are a user of our software it is recommended that ...
5/5 3,472 Jun 20, 2017
Safer Networking Ltd.
SpywareBlaster 5.5
SpywareBlaster 5.5 Powerful protection against spyware, adware, browser hijackers, dialers and other potentially unwanted software. Trusted and effective. Why SpywareBlaster? Spyware, adware, browser hijackers, and dialers are some of the most annoying and pervasive threats on the Internet today. By simply browsing a web page, you could find your computer to be the brand-new host of one of these unwanted fiends! The most important step you can take is to secure your system. And SpywareBlaster is the most powerful protection program available. Multi-Angle Protection Prevent the installation of ActiveX-based spyware and other potentially unwanted programs. Block spying / tracking via cookies. Restrict the actions of potentially unwanted or dangerous web sites. No-Nonsense Security SpywareBlaster can help keep your system secure, without interfering with the "good side" of the web. And unlike other programs, SpywareBlaster does not have to remain running in the background. It works alongside the programs you have to help secure your system.
5/5 1,087 Jun 07, 2016
Brightfort
SUPERAntiSpyware Free 6.0.1244
SUPERAntiSpyware Free 6.0.1244 SUPERAntiSpyware is the most thorough scanner on the market. Our Multi-Dimensional Scanning and Process Interrogation Technology will detect spyware that other products miss! SUPERAntiSpyware will remove Spyware, NOT just the easy ones! Benefits and Features Quick, Complete and Custom Scanning of Hard Drives, Removable Drives, Memory, Registry, Individual Folders and More! Includes Trusting Items and Excluding Folders for complete customization of scanning! Detect and Remove Spyware, Adware, Malware, Trojans, Dialers, Worms, KeyLoggers, HiJackers and many other types of threats. Stop unwanted pop-ups and ads caused by malware with integrated SUPERAdBlocker® Technology. Repair broken Internet Connections, Desktops, Registry Editing, Task Manager and more with our unique Repair System! Spyware applications often disable system components to prevent removal - SUPERAntiSpyware resets and restores these items in seconds! Quarantine items detected and removed for complete protection. Items in the quarantine may be restored to your computer if desired. Detailed scan logs with complete information about detected and removed threats and their locations within your computer. Scan logs allow you to review scheduled scan results at any time. Advanced Detection and Removal Multi-Dimensional Scanning SUPERAntiSpyware is a next generation scanning system that goes beyond the typical rules based scanning methods. Our Multi-Dimensional Scanning system detects existing threats as well as threats of the future by analyzing threat characteristics in addition to code patterns. Process Interrogation Technology SUPERAntiSpyware features our unique Process Interrogation Technology (PIT) that allows threats ...
5/5 345 Jun 12, 2017
SUPERAntiSpyware
TeslaDecoder 1.0.1
TeslaDecoder 1.0.1 TeslaDecoder has the ability to decrypt all variants of the TeslaCrypt ransomware. This includes the following extensions: .micro, .xxx, .ttt, .mp3, and also encrypted files that have not had their file extensions changed. For older versions of the TeslaCrypt ransomware, when run TeslaDecoder, it will search for particular Windows registry keys, the storage.bin file, or key.dat file, and if it finds these keys, it will attempt to extract the decryption key. If a decryption key is extracted it can then decrypt all of the files in a designated folder or all files on a system. Some victim's of this ransomeware have had the decryption key stripped from the data files. In this case, TeslaDecoder will not be able to help you decrypt your files. For the newest versions of the TeslaCrypt ransomeware (The most common), read the instructions contained in the download package to decrypt your files. Changelog for TeslaDecoder, TeslaViewer and TeslaRefactor --------------------------------------------------------- **************** * TeslaDecoder * **************** ========== = 1.0.1 = ========== - Removed check of a value at offset 0x08 for TeslaCrypt 3/4 encrypted files ========== = 1.0.0 = ========== - Added 4th PrivateKyTesla into TeslaDecoder. All files encrypted by TeslaCrypt 3.0.0 - 4.2 can be decrypted. The key is predefined when extension of TeslaCrypt 3/4 is choosen in Set key dialog. ========== = 0.0.91 = ========== - Decrypt list - If listed file doesn't have TeslaCrypt extension, the file extension is not changed. ========== = 0.0.90 = ========== - Added support for listing encrypted files and decryption of listed files in the list file. - GUI changes - Log changes - Internal changes - README.txt rewritten ========== = 0.0.85 = ========== - Added support for TeslaCrypt 4.0 with the same extension as the original file. ========== = 0.0.84 = ========== - Fixed and issue when PublicKeyBC in exx files is shorter than 64 characters ========== = 0.0.83 = ========== - Fixed a bug when all files were skipped if decryption of xxx, ttt, micro, mp3 files was selected and ...
5/5 465 May 23, 2016
BloodDolly
Trend Micro Anti-Threat Toolkit 32bit 1.62.0.1157
Trend Micro Anti-Threat Toolkit 32bit 1.62.0.1157 Using the Trend Micro Anti-Threat Toolkit to analyze malware issues and clean infections - For Home and Home Office users Learn how to use the Trend Micro Anti-Threat Toolkit (ATTK) to perform system forensic scans and clean the following infections: General malware infection Master boot record Infection CIDOX/ RODNIX infection Rootkit infection Zbot infection Cryptolocker infection
5/5 1,397 Aug 13, 2016
Trend Micro Inc.
Trend Micro Anti-Threat Toolkit 64bit 1.62.0.1157
Trend Micro Anti-Threat Toolkit 64bit 1.62.0.1157 Using the Trend Micro Anti-Threat Toolkit to analyze malware issues and clean infections - For Home and Home Office users Learn how to use the Trend Micro Anti-Threat Toolkit (ATTK) to perform system forensic scans and clean the following infections: General malware infection Master boot record Infection CIDOX/ RODNIX infection Rootkit infection Zbot infection Cryptolocker infection
5/5 1,415 Aug 13, 2016
Trend Micro Inc.
Trend Micro HouseCall 32bit 8.0
Trend Micro HouseCall 32bit 8.0 Think your PC is infected? HouseCall can quickly identify and fix a wide range of threats including viruses, worms, Trojans, and spyware. Features: Easy-to-use interface makes scanning your computer for viruses a snap Custom Scan lets you specify which folders to scan Quick Scan reduces software scan times to a few minutes Stand-alone eliminates compatibility issues associated with browser-activated scanners Smart Scan delivers the latest antivirus protection while reducing download times Smart Feedback shares threat information to quickly discover new threats Review and Restore lets you check and compare scan results and recover files Enhanced Detection and Cleanup addresses rootkits and other sophisticated threats Enhanced Scanning performance speeds threat detection
5/5 3,333 Apr 23, 2017
Trend Micro
Trend Micro HouseCall 64bit 8.0
Trend Micro HouseCall 64bit 8.0 Think your PC is infected? HouseCall can quickly identify and fix a wide range of threats including viruses, worms, Trojans, and spyware. Features: Easy-to-use interface makes scanning your computer for viruses a snap Custom Scan lets you specify which folders to scan Quick Scan reduces software scan times to a few minutes Stand-alone eliminates compatibility issues associated with browser-activated scanners Smart Scan delivers the latest antivirus protection while reducing download times Smart Feedback shares threat information to quickly discover new threats Review and Restore lets you check and compare scan results and recover files Enhanced Detection and Cleanup addresses rootkits and other sophisticated threats Enhanced Scanning performance speeds threat detection
5/5 3,345 Apr 23, 2017
Trend Micro
Trend Micro Rescue Disk 3.0.0.1020
Trend Micro Rescue Disk 3.0.0.1020 Trend Micro Rescue Disk allows you to use a CD, DVD, or USB drive to examine your computer without launching Microsoft Windows. It finds and removes persistent or difficult-to-clean security threats that can lurk deep within your operating system. Rescue Disk does not need to load potentially-infected system files into memory before trying to remove them. It can scan hidden files, system drivers, and the Master Boot Record (MBR) of your computer’s hard drive without disturbing the operating system. Getting Started Click Download to begin. If prompted, click Save or Save As, and save the file on your computer’s desktop. While the installer downloads, prepare one of the following: Blank CD or DVD (do not use a rewritable disc) Empty USB Drive (128MB or larger) NOTE: The drive will be reformatted before creating Rescue Disk, and anything already on the USB drive will be lost. Please back up any important files before using a USB drive for Trend Micro Rescue Disk. When you have finished downloading the file, double-click the Trend Micro Rescue Disk icon to start the installer. To launch your computer from a CD or DVD, you must set the BIOS to boot from a different device. While the exact procedure differs from computer to computer, the overall process is usually like this: Insert the disc or USB drive into the computer. Restart the computer. When the computer powers up again, look for a BIOS setup message, which often looks like “Press [KEY] to run ...
5/5 1,424 Feb 10, 2017
Trend Micro Incorporated
Trend Micro Rootkit Buster 32bit 5.00.1203
Trend Micro Rootkit Buster 32bit 5.00.1203 Trend Micro RootkitBuster scans hidden files, registry entries, processes, drivers, services, ports, and the master boot record (MBR) to identify and remove rootkits. Malicious software called rootkits can manipulate the components of the Microsoft Windows operating system to conceal how they cause harm. Rootkits can hide drivers, processes, and registry entries from tools using common system application programming interfaces (APIs). What's New ======================================================================== a. RootkitBuster now works on computers running Microsoft Windows 10. b. New enhancements now prevent some known scanning errors.
5/5 941 Apr 23, 2017
Trend Micro Inc.
Trend Micro Rootkit Buster 64bit 5.00.1203
Trend Micro Rootkit Buster 64bit 5.00.1203 Trend Micro RootkitBuster scans hidden files, registry entries, processes, drivers, services, ports, and the master boot record (MBR) to identify and remove rootkits. Malicious software called rootkits can manipulate the components of the Microsoft Windows operating system to conceal how they cause harm. Rootkits can hide drivers, processes, and registry entries from tools using common system application programming interfaces (APIs). What's New ======================================================================== a. RootkitBuster now works on computers running Microsoft Windows 10. b. New enhancements now prevent some known scanning errors.
5/5 963 Apr 23, 2017
Trend Micro Inc.
Trojan.Kotver Removal Tool 32bit 2.4.0.1
Trojan.Kotver Removal Tool 32bit 2.4.0.1 This tool removes Trojan.Kotver infections. Trojan.Kotver is a Trojan horse that performs click-fraud operations on the compromised computer. Discovered: September 23, 2015 Type: Removal Information This tool is designed to remove the infection of Trojan.Kotver. How to download and run the tool Important: Selecting "Run as administrator" will result in an incomplete repair. You must be logged in to the Administrator account and all other users must be logged out in order for the tool to work correctly. There are two versions of this tool, one designed to run on 32-bit computers and one designed to run on 64-bit computers. To find out if your computer is running a 32-bit or 64-bit version of Windows, please read the following Microsoft Knowledge Base article: How to determine whether a computer is running a 32-bit version or 64-bit version of the Windows operating system Note for network administrators: If you are running MS Exchange 2000 Server, we recommend that you exclude the M drive from the scan by running the tool from a command line, with the Exclude switch. For more information, read the Microsoft Knowledge Base article: Issues caused by a back up or a scan of the Exchange 2000 M drive Follow these steps to download and run the tool: Download FixToolKotver64.exe for 64-bit computers and FixToolKotver32.exe for 32-bit computers. Save the file to a convenient location, such as your Windows desktop. If you are sure that you are downloading this tool from the Security Response website, you can skip this step. If you are not sure, or are a network administrator and need to authenticate the files before deployment, follow the steps in the Digital Signature section before proceeding ...
5/5 551 Mar 24, 2016
Symantec
Trojan.Kotver Removal Tool 64bit 2.4.0.1
Trojan.Kotver Removal Tool 64bit 2.4.0.1 This tool removes Trojan.Kotver infections. Trojan.Kotver is a Trojan horse that performs click-fraud operations on the compromised computer. Discovered: September 23, 2015 Type: Removal Information This tool is designed to remove the infection of Trojan.Kotver. How to download and run the tool Important: Selecting "Run as administrator" will result in an incomplete repair. You must be logged in to the Administrator account and all other users must be logged out in order for the tool to work correctly. There are two versions of this tool, one designed to run on 32-bit computers and one designed to run on 64-bit computers. To find out if your computer is running a 32-bit or 64-bit version of Windows, please read the following Microsoft Knowledge Base article: How to determine whether a computer is running a 32-bit version or 64-bit version of the Windows operating system Note for network administrators: If you are running MS Exchange 2000 Server, we recommend that you exclude the M drive from the scan by running the tool from a command line, with the Exclude switch. For more information, read the Microsoft Knowledge Base article: Issues caused by a back up or a scan of the Exchange 2000 M drive Follow these steps to download and run the tool: Download FixToolKotver64.exe for 64-bit computers and FixToolKotver32.exe for 32-bit computers. Save the file to a convenient location, such as your Windows desktop. If you are sure that you are downloading this tool from the Security Response website, you can skip this step. If you are not sure, or are a network administrator and need to authenticate the files before deployment, follow the steps in the Digital Signature section before proceeding ...
5/5 590 Mar 24, 2016
Symantec
Tweaking.com - Repair Missing Start Menu Icons Removed By Infections v1.7.4
==Official Mirror== Tweaking.com - Repair Missing Start Menu Icons Removed By Infections v1.7.4 Repair Missing Start Menu Icons Removed By Infections: This repair will put back the missing icons in the start menu, quick launch, and desktop that are moved by a rouge virus. All the icons by the virus are moved to the temp folder under the folder SMTMP. This tool is also a part of Windows Repair (All In One) SMTMP folder XP - C:\Documents and Settings\(Your Username)\Local Settings\Temp\SMTMP Vista/7 - C:\Users\(Your Username)\AppData\Local\Temp\SMTMP Folder 1 contains the All Users Start Menu shortcuts XP - C:\Documents and Settings\All Users\Start Menu Vista/7 - C:\Program Data\Microsoft\Windows\Start Menu Folder 2 contains the Quick Launch shortcuts XP - C:\Documents and Settings\(Your Username)\Application Data\Microsoft\Internet Explorer\Quick Launch Vista/7 - C:\Users\(Your Username)\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch Folder 3 contains Windows 7 Taskbar icons (not needed in Windows XP) XP - N/A Vista/7 - C:\Users\(Your Username)\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar Folder 4 does have Desktop icons XP - C:\Documents and Settings\All Users\Desktop Vista/7 - C:\Users\Public\Public Desktop
0/5 3,650 Dec 21, 2013
Tweaking.com
Unchecky 1.0.2
Unchecky 1.0.2 Unchecky aims to keep potentially unwanted programs out of your computer. Have you ever felt, while installing software, that the installer tries to push additional unwanted programs at all cost? Ever missed a checkbox, and spent hours afterwards removing adware? Ever opened your browser after an installation, only to find out that you have a new homepage, a new search engine, or even a new browser? Nowadays it’s a reality that many software installations are bundled with potentially unwanted programs, such as toolbars or scareware system cleaners. If you’re a power user, you probably know that you have to be very careful while installing software, because if you miss a checkbox you might spend hours afterwards cleaning up the mess. If you’re an average PC user, you possibly leave everything by default, thus installing lots of additional unwanted programs without even knowing it. Unchecky’s primary feature is automatic unchecking of unrelated offers, such as potentially unwanted programs, offers to change your homepage or your search engine. With Unchecky, these offers become opt-in instead of opt-out, i.e. they will be installed only if you explicitly choose you want them (you usually don’t). Another important feature of Unchecky is that it warns when you accept a potentially unwanted offer. Installers often provide them as a natural part of the installation, so they can easily be accepted by mistake. With Unchecky, it’s less likely to accidentally accept such offers. Unchecky is not an universal solution, and might not support installers which were not released yet. Thus, it’s worth noting that Unchecky updates automatically, so you don’t have to worry about running the latest version. Changelog v1.0.2 (January 29, 2017) Added support for Winaero Software. Improved support for μTorrent. Improved support for CCleaner. Improved support for FileZilla. ...
5/5 3,819 Jan 29, 2017
Reason Software Company Inc
   
 
Showing rows 1 to 100 of 106 Showing Page 1 of 2  1  2  » 

Search - Statistics & RSS - Contact Admin - -
PHCDownload 1.1.2 - Copyright (c) 2005 - 2017 - 0.1262 seconds


Tweets by @GeekOnTheLoose