English version 去汉语版本 Русская версия Deutsche Version

Download software tagged by exploit viking rootkit reporter

The most popular program: Quick Slide Show 2.00
Download Quick Slide Show 2.00
more info
We recommend: Earnhardt Viking Trojan Horses Trackware Eliminator 1.1.52
Download Earnhardt Viking Trojan Horses Trackware Eliminator 1.1.52
more info
2008-08-05
ChristmasStory Delete Viking Spies Virus - The term rootkit is used to define a Trojan (or technology) used to hide the presence of a malicious object (process, file, registry key, network port) from the computer user or administrator.
ChristmasIdea Destroy Viking Spoofers Web Bug 1.3.92 by Destroy Viking Spoofers Web Bug
2008-08-12
ChristmasIdea Destroy Viking Spoofers Web Bug is a rootkit scanner that offers ability to scan for hidden files, registry entries, processes, drivers and hooked system service.
Professional Anti-virus Web Bug Viking Keyloggers 1.3.78 by Anti-virus Web Bug Viking Keyloggers
2008-10-29
Professional Anti-virus Web Bug Viking Keyloggers - The term rootkit is used to define a Trojan (or technology) used to hide the presence of a malicious object (process, file, registry key, network port) from the computer user or administrator.
Merry AntiSpy Exploit Spoofers Worm 1.3.78 by AntiSpy Exploit Spoofers Worm
2008-07-21
Merry AntiSpy Exploit Spoofers Worm - The term rootkit is used to define a Trojan (or technology) used to hide the presence of a malicious object (process, file, registry key, network port) from the computer user or administrator.
Swift Dialers RAT Exploit Hunter 1.3.62 by Dialers RAT Exploit Hunter
2008-07-23
Swift Dialers RAT Exploit Hunter is a rootkit scanner that offers ability to scan for hidden files, registry entries, processes, drivers and hooked system service. It also includes the cleaning capability for hidden files and registry entries.
Digital AntiAdware BHOs Web Bug Exploit 1.3.62 by AntiAdware BHOs Web Bug Exploit
2008-07-25
Digital AntiAdware BHOs Web Bug Exploit - The term rootkit is used to define a Trojan (or technology) used to hide the presence of a malicious object (process, file, registry key, network port) from the computer user or administrator.
Bliss Keylogger Exploit Popups Agent 1.3.67 by Keylogger Exploit Popups Agent
2008-07-25
Bliss Keylogger Exploit Popups Agent - The term rootkit is used to define a Trojan (or technology) used to hide the presence of a malicious object (process, file, registry key, network port) from the computer user or administrator.
ChristmasIdea Viking Spy Password Cracker Remover 1.4.11 by Viking Spy Password Cracker Remover
2008-08-07
ChristmasIdea Viking Spy Password Cracker Remover is a rootkit scanner that offers ability to scan for hidden files, registry entries, processes, drivers and hooked system service.
Merry Viking Trojan Horses Trackware Eliminator 1.3.64 by Viking Trojan Horses Trackware Eliminator
2008-08-10
Merry Viking Trojan Horses Trackware Eliminator - The term rootkit is used to define a Trojan (or technology) used to hide the presence of a malicious object (process, file, registry key, network port) from the computer user or administrator.
0.017