Your download link is at the very bottom of the page... always.

Processed through Paypal
No account required.

Donate Bitcoin to this wallet:
Donate Ethereum to this wallet:
Donate Litecoin to this wallet:

Buying our over-priced stuff helps us keep things running. Peruse here.

Join our Facebook groupFollow us on TwitterFollow us on InstagramOur RSS Feed

 Home » Freeware Downloads » Searching Files   
Search Results
  File Name Rating Downloads
Last Update/Developer
Kaspersky CapperKiller
Kaspersky CapperKiller The CapperKiller utility is designed for treating the aftermaths of a Trojan-Banker.Win32.Capper infection. 1. Signs of infection The given piece of malware changes proxy settings in the following browsers (if installed on the host): Internet Explorer, Mozilla Firefox, Opera, Google Chrome (uses Internet Explorer settings). It adds a special URL to the Use automatic configuration script option in the Internet connection settings. A reboot may be required after the treatment. The CapperKiller utility performs the following: Detects and fixes proxy settings in all browsers. Detects and deletes malicious exec files.
5/5 3,757 Nov 13, 2019
Kaspersky Lab
Kaspersky FippKiller 1.0.2
There is a special utility for curing an active Worm.Win32.Fipp.a infection. Infection symptoms: Significantly increased RDP traffic (brute-force attack). Antivirus software performance degradation on many hosts in local network. Infected hosts attempt to access URLs like *.ppift.* How to disinfect an infected system: Download the FippKiller.exe file. Launch the FippKiller.exe file on the infected (or potentially infected) host. It is recommended not to reboot hosts after using the utility until the network has been successfully disinfected. Command line options to use with the utility: -p <path> - scan a particular host; -n – scan network volumes; -r - scan flash drives, and removable USB / FireWire hard disks; -y – close the window once the utility completes; -s – scan in silent mode (without displaying the console window); -l <file_name> - log file name; -v – create a detailed log file (should be used with -l); -m – system infection protection monitoring mode; -q – scan the system, activate monitoring mode once the scan completes.
5/5 6,646 Nov 13, 2019
Kaspersky Password Manager
Kaspersky Password Manager It’s unwise to use the same password for multiple accounts… but multiple passwords are difficult to remember. Kaspersky Password Manager securely stores all your passwords, addresses &amp; credit card details – and synchronizes them across your PC, Mac, Android phone &amp; tablet, iPhone &amp; iPad… so you only need to remember one master password – to access all your individual passwords &amp; data.
5/5 2,961 Sep 29, 2017
Kaspersky Labs
Kaspersky PC Cleaner
Kaspersky PC Cleaner Make your PC run smoothly &amp; effectively, by cleaning it from junk files &amp; temporary items - and tune up your digital privacy.
5/5 3,072 Sep 29, 2017
Kaspersky Labs
Kaspersky Products Remover v1.0.1641
Kaspersky Products Remover v1.0.1641 If an error occurs when uninstalling a Kaspersky Lab product with Windows (Control Panel --> Programs and Features), then download and launch the free tool KAVremover. In order to fully remove the product, perform the following actions: 1: Download Kavremover. 2: Boot your computer in Safe Mode. 3: Run Kavremover. 4: Restart your computer after the utility completes. This utility deletes all activation data. You will need to activate your product after reinstalling. Click here to visit the author's website.
5/5 4,376 Mar 19, 2021
Kaspersky Lab
Kaspersky RakhniDecryptor
Kaspersky RakhniDecryptor RakhniDecryptor utility for removing Trojan-Ransom.Win32.Rakhni malicious software (.oshit and others) The malicious programs Trojan-Ransom.Win32.Rakhni, Trojan-Ransom.Win32.Agent.iih, Trojan-Ransom.Win32.Aura, Trojan-Ransom.Win32.Autoit, and Trojan-Ransom.AndroidOS.Pletor are used by malefactors to encrypt files so that their extensions are changed as follows: <filename>.<original_extension>.<locked> <filename>.<original_extension>.<kraken> <filename>.<original_extension>.<darkness> <filename>.<original_extension>.<nochance> <filename>.<original_extension>.<oshit> <filename>.<original_extension>.<oplata@qq_com> <filename>.<original_extension>.<relock@qq_com> <filename>.<original_extension>.<crypto> <filename>.<original_extension>.<> <filename>.<original_extension>.<pizda@qq_com> <filename>.<original_extension>.<dyatel@qq_com> <filename>.<original_extension>_crypt <filename>.<original_extension>.<nalog@qq_com> <filename>.<original_extension>.<chifrator@qq_com> <filename>.<original_extension>.<gruzin@qq_com> <filename>.<original_extension>.<troyancoder@qq_com> <filename>.<original_extension>.<encrypted> <filename>.<original_extension>.<cry> <filename>.<original_extension>.<AES256> <filename>.<original_extension>.<enc> <filename>.<original_extension>.<coderksu@gmail_com_id371> <filename>.<original_extension>.<coderksu@gmail_com_id372> <filename>.<original_extension>.<coderksu@gmail_com_id374> <filename>.<original_extension>.<coderksu@gmail_com_id375> <filename>.<original_extension>.<coderksu@gmail_com_id376> <filename>.<original_extension>.<coderksu@gmail_com_id392> <filename>.<original_extension>.<coderksu@gmail_com_id357> <filename>.<original_extension>.<coderksu@gmail_com_id356> <filename>.<original_extension>.<coderksu@gmail_com_id358> <filename>.<original_extension>.<coderksu@gmail_com_id359> <filename>.<original_extension>.<coderksu@gmail_com_id360> <filename>.<original_extension>.<coderksu@gmail_com_id20> <filename>> <filename>.<original_extension>.<hb15> For example: Before: file.doc / After: file.doc.locked Before: 1.doc / After: 1.dochb15 To regain control over the files encrypted by Trojan-Ransom.Win32.Rakhni, Trojan-Ransom.Win32.Aura, Trojan-Ransom.Win32.Agent.iih, Trojan-Ransom.Win32.Autoit, and Trojan-Ransom.AndroidOS.Pletor, use the RakhniDecryptor utility developed by Kaspersky Lab specialists. 1. How to work with the utility IMPORTANT: Trojan-Ransom.Win32.Rakhni creates the exit.hhr.oshit file that contains an encrypted password to user's files. If this file remains on the computer, it will make decryption with the RakhniDecryptor utility faster. If the file has been removed, it can be recovered with file recovery utilities. After the file is recovered, put it into %APPDATA% and run the scan with the utility once again. The exit.hhr.oshit file has the following path: Windows XP: C:\Documents and Settings\<username>\Application Data Windows 7/8: C:\Users\<username>\AppData\Roaming To decrypt ...
5/5 6,731 Nov 13, 2019
Kaspersky Lab
Kaspersky RannohDecryptor
Kaspersky RannohDecryptor If the system is infected by a malicious program of the family Trojan-Ransom.Win32.Rannoh , Trojan-Ransom.Win32.AutoIt, Trojan-Ransom.Win32.Fury, or Trojan-Ransom.Win32.Cryakl, all files on the computer will be encrypted in the following way: In case of a Trojan-Ransom.Win32.Rannoh infection, file names and extensions will be changed according to the template locked-<original name>.<four random letters>. In case of a Trojan-Ransom.Win32.Cryakl infection, the tag {CRYPTENDBLACKDC} is added to the end of file names. In case of a Trojan-Ransom.Win32.AutoIt infection, extensions will be changed according to the template <original name>@<mail server>_.<random set of characters>. Example: ioblomov@india.com_RZWDTDIC. To decrypt files affected by Trojan-Ransom.Win32.Rannoh, Trojan-Ransom.Win32.AutoIt, Trojan-Ransom.Win32.Fury, Trojan-Ransom.Win32.Crybola or Trojan-Ransom.Win32.Cryakl, use the RannohDecryptor utility.
5/5 4,200 Nov 13, 2019
Kaspersky Lab
Kaspersky RectorDecryptor
Kaspersky RectorDecryptor Cybercriminals use Trojan-Ransom.Win32.Rector for disrupting normal performance of computers and for unauthorized modification of data making it unusable. Once the data has been “taken hostage” (blocked), its owner (user) receives a ransom demand. The victim is supposed to deliver the ransom in exchange for pirate's promise to send a utility that would restore the data or repair the PC. Kaspersky Lab specialists have developed a special utility for decrypting the data encrypted by Trojan-Ransom.Win32.Rector. The utility has a GUI. Do the following to decrypt files encrypted by Trojan-Ransom.Win32.Rector: Download the utility to an infected computer; Extract its content using an archiver (WinZip, e.g.); Run the file RectorDecryptor.exe; The utility starts working by clicking the button Start scan. It finds and decrypts encrypted files. Select the option Delete crypted files after decryption to delete copies of encrypted files with extensions .vscrypt, .infected, .bloc, .korrektor, etc. after successful decryption.
5/5 6,684 Nov 13, 2019
Kaspersky Lab
Kaspersky Rescue Disk v18.0.11.3c
Kaspersky Rescue Disk v18.0.11.3c Boot from the Kaspersky Rescue Disk (CD or USB) to scan and remove threats from an infected computer without the risk of infecting other files or computers. Burn: Burn this ISO image to a CD, insert it into the infected system's CD-ROM drive, enter the PC's BIOS, set it to boot from the CD and reboot the computer. OR... Use Rufus to create a bootable flash drive using the Rescue Disk ISO file you are about to download. Get Rufus Here.. Click here to visit the author's website.
5/5 7,407 Nov 28, 2021
Kaspersky ScatterDecryptor
Kaspersky ScatterDecryptor If your computer is infected with Trojan-Ransom.BAT.Scatter, use the ScatterDecryptor utility for restoring encrypted files. Trojan-Ransom.BAT.Scatter encrypts user files with a public key and changes their extensions. The files can only be decrypted with a unique secret key. ScatterDecryptor restores the files only if the utility contains a certain Trojan-Ransom.BAT.Scatter modification's secret key.
5/5 5,294 Nov 13, 2019
Kaspersky Labs International Ltd.
Kaspersky ScraperDecryptor
Kaspersky ScraperDecryptor The malicious program Trojan-Ransom.Win32.Scraper encrypts user files to block access to them. After the data has been blocked, the user is required to pay a ransom. To decrypt files affected by Trojan-Ransom.Win32.Scraper, use the ScraperDecryptor utility developed by Kaspersky Lab engineers.
5/5 4,360 Nov 13, 2019
Kaspersky Lab
Kaspersky Security Cloud Free v21.3.10.391
Kaspersky Security Cloud Free v21.3.10.391 Kaspersky Security Cloud – Free comes with top-rated security technologies – and auto-analyses real-time data on new threats – to help protect your PC, mobiles and tablets, including your iPad, from a range of dangers. Gives you free antivirus and more As a free antivirus scanner and cleaner, Kaspersky Security Cloud – Free software defends your PC and mobile devices, including your iPhone, against viruses, infected files, dangerous applications and suspicious sites. Secures… Without slowing you down Our security is designed to protect your devices – without getting in your way. And because Kaspersky Security Cloud – Free receives automatic updates, you can be sure your antivirus program is always up to date. This download is for the Windows version. If you need the iPhone and iPad version, download here. If you need the Android phones and tablets version, download here. Click here to visit the author's website.
5/5 1,528 Jun 24, 2021
Kaspersky Labs
Kaspersky ShadowHammer Check Tool
Kaspersky ShadowHammer Check Tool About ShadowHammer from Kaspersky: Operation ShadowHammer Earlier today, Motherboard published a story by Kim Zetter on Operation ShadowHammer, a newly discovered supply chain attack that leveraged ASUS Live Update software. While the investigation is still in progress and full results and technical paper will be published during SAS 2019 conference in Singapore, we would like to share some important details about the attack. In January 2019, we discovered a sophisticated supply chain attack involving the ASUS Live Update Utility. The attack took place between June and November 2018 and according to our telemetry, it affected a large number of users. ASUS Live Update is an utility that is pre-installed on most ASUS computers and is used to automatically update certain components such as BIOS, UEFI, drivers and applications. According to Gartner, ASUS is the world’s 5th-largest PC vendor by 2017 unit sales. This makes it an extremely attractive target for APT groups that might want to take advantage of their userbase. Based on our statistics, over 57,000 Kaspersky users have downloaded and installed the backdoored version of ASUS Live Update at some point in time. We are not able to calculate the total count of affected users based only on our data; however, we estimate that the real scale of the problem is much bigger and is possibly affecting over a million users worldwide. The goal of the attack was to surgically target an unknown pool of users, which were identified by their network adapters’ MAC addresses. To achieve this, the attackers had hardcoded a list of MAC addresses in the trojanized samples and this list was used to identify the actual intended targets of this massive operation. We were able to extract more than 600 unique MAC addresses from over 200 samples used in this attack. Of course, there might be other ...
5/5 2,137 Nov 13, 2019
Kaspersky TDSSKiller v3.1.0.28
Kaspersky TDSSKiller v3.1.0.28 A rootkit is a program or a program kit that hides the presence of malware in the system. A rootkit for Windows systems is a program that penetrates into the system and intercepts the system functions (Windows API). It can effectively hide its presence by intercepting and modifying low-level API functions. Moreover it can hide the presence of particular processes, folders, files and registry keys. Some rootkits install its own drivers and services in the system (they also remain “invisible”). Kaspersky Lab has developed the TDSSKiller utility that allows removing rootkits. The utility supports 32-bit and 64-bit operation systems. The utility can be run in Normal Mode and Safe Mode. The TDSSKiller tool is designed to detect and remove malware from the Rootkit.Win32.TDSS family, as well as bootkits and rootkits. These include the following malicious applications: Backdoor.Win32.Phanta.a,b Backdoor.Win32.Sinowal.knf,kmy Backdoor.Win32.Trup.a,b Rootkit.Boot.Mebusta.a Rootkit.Boot.Backboot.c Rootkit.Boot.Aeon.a Rootkit.Boot.Adrasteia.a Rootkit.Boot.Backboot.a Rootkit.Boot.Batan.a Rootkit.Boot.Bootkor.a Rootkit.Boot.Clones.a Rootkit.Boot.CPD.a,b Rootkit.Boot.Fisp.a Rootkit.Boot.Geth.a Rootkit.Boot.Goodkit.a Rootkit.Boot.Harbinger.a Rootkit.Boot.Krogan.a Rootkit.Boot.Lapka.a Rootkit.Boot.MyBios.b Rootkit.Boot.Nimnul.a Rootkit.Boot.Nix.a Rootkit.Boot.Pihar.a,b,c Rootkit.Boot.Plite.a Rootkit.Boot.Prothean.a Rootkit.Boot.Qvod.a Rootkit.Boot.Sawlam.a Rootkit.Boot.Smitnyl.a Rootkit.Boot.SST.a,b Rootkit.Boot.SST.b Rootkit.Boot.Wistler.a Rootkit.Boot.Xpaj.a Rootkit.Boot.Yurn.a Rootkit.Win32.PMax.gen Rootkit.Win32.Stoned.d Rootkit.Win32.TDSS Rootkit.Win32.TDSS.mbr Rootkit.Win32.ZAccess.aml,c,e,f,g,h,i,j,k Trojan-Clicker.Win32.Wistler.a,b,c Trojan-Dropper.Boot.Niwa.a Trojan-Ransom.Boot.Mbro.d,e Trojan-Ransom.Boot.Mbro.f ...
5/5 8,723 Nov 13, 2019
Kaspersky Lab
Kaspersky Virus Removal Tool v20.0.10.0
Kaspersky Virus Removal Tool v20.0.10.0 Kaspersky Virus Removal Tool is a utility designed to remove all types of threats from computers. Kaspersky Virus Removal Tool uses the effective detection algorithms realized in Kaspersky Anti-Virus and AVZ. Kaspersky Virus Removal Tool does not provide resident protection for your computer. After disinfecting a computer, you are supposed to remove the tool and install a full version of antivirus software. Advantages: Simplified interface. Can be installed to an infected computer (Safe Mode supported). Composite scan and disinfection system: signature detection and heuristic analyzer. Gathering system information and interactive creation of scripts for disinfection. General functions: Automatic and manual removal of virus, Trojans and worms. Automatic and manual removal of Spyware and Adware modules. Automatic and manual removal of all types of rootkits. Support rules for Kaspersky Virus Removal Tool: Technical support is provided only for users of Kaspersky Anti-Virus and Kaspersky Internet Security. If you are not a user of a Kaspersky Lab product, then in order to get technical support available for the tool, visit Kaspersky Lab The tool should be used for disinfection purpose under expert guidance via the service Unguided creation of scripts can result in a data loss or crippled computer. Having virus on your computer is always a risk of crippling it or losing data. Kaspersky Lab does not take any responsibility for the possible harm inflicted by virus during disinfection. Click here to visit the author's website.
5/5 7,720 Nov 28, 2021
Kaspersky Lab
Kaspersky XoristDecryptor
Kaspersky XoristDecryptor Malware of the family Trojan-Ransom.Win32.Xorist is designed for unauthorized modification of data on a victim computer. It makes computers uncontrollable or blocks its normal performance. After taking the data as a “hostage” (blocking it), a ransom is demanded from the user. The victim is supposed to deliver the ransom to the pirate, who is promising to send in return a program which would release the data or restore normal performance of the computer. There is a utility to confront malware of the family Trojan-Ransom.Win32.Xorist - XoristDecryptor.exe. The utility XoristDecryptor.exe is provided with a GUI. Disinfection of an infected system: Download the to an infected computer. Extract the utility using an archiver program, WinZip for example. Run the XoristDecryptor.exe file. Click the Start scan button to execute the utility . The utility will prompt you to enter path of at least one encrypted file to begin the decryption process. The trojan program encrypts all files with the following extensions: doc, xls, docx, xlsx, db, mp3, waw, jpg, jpeg, txt, rtf, pdf, rar, zip, psd, msi, tif, wma, lnk, gif, bmp, ppt, pptx, docm, xlsm, pps, ppsx, ppd, tiff, eps, png, ace, djvu, xml, cdr, max, wmv, avi, wav, mp4, pdd, html, css, php, aac, ac3, amf, amr, mid, midi, mmf, mod, mp1, mpa, mpga, mpu, nrt, oga, ogg, pbf, ra, ram, raw, saf, val, wave, wow, wpk, 3g2, 3gp, 3gp2, 3mm, amx, avs, bik, bin, dir, divx, dvx, evo, flv, qtq, tch, rts, rum, rv, scn, srt, stx, svi, swf, trp, vdo, wm, wmd, wmmp, wmx, wvx, xvid, 3d, 3d4, 3df8, pbs, adi, ais, amu, arr, bmc, bmf, cag, cam, dng, ink, jif, jiff, jpc, jpf, jpw, mag, mic, mip, msp, nav, ncd, odc, odi, opf, qif, qtiq, srf, xwd, abw, act, adt, aim, ans, asc, ase, bdp, bdr, bib, boc, crd, diz, dot, dotm, dotx, dvi, ...
5/5 6,618 Nov 13, 2019
Kaspersky Lab
Showing rows 1 to 16 of 16 Showing Page 1 of 1  1 

Copyright (c) 2021

Tweets by @GeekOnTheLoose