SlideShare uma empresa Scribd logo
1 de 9
Agnitum Outpost Сlean<br />Cleaner32Cleaner64Инструкции <br />Avira Uninstall Tools<br />Утилита для чистки реестра после удаления продуктов AviraВНИМАНИЕ! Не явяется основным инструментом удаленя.Avira AntiVir RegistryCleanerКак удалить ПО Avira Software?Инструкция для удаления вручную <br />Аvast! - Alwil Software Uninstall Utility<br />aswClear5aswClearИнструкция <br />AVG Software Remover Utility<br />AVG Remover x32AVG Remover x64AVG Identity Protection Remover <br />BitDefender Uninstall Tool<br />Uninstall ToolИнструкция <br />Comodo Uninstall Tool<br />CIS Clean-up ToolCIS Clean-up Tool (Зеркало)Инструкция <br />Dr.Web Anti-virus Remover<br />Аварийное средство, предназначенное для удаления «остатков» от некорректных/поврежденных инсталляций ПО Dr.Web for Windows версий 4.33, 4.44, 5.0, 6.0 и клиентской части Dr.Web Enterprise Suite тех же версий в тех случаях, когда применение штатных средств удаления недоступно или не работает. Утилита не предназначена для использования в качестве основного стандартного средства деинсталляции ПО Dr.WebDRW Remover.exe <br />F-Secure Uninstallation Tool<br />RemoverИнструкция <br />Kaspersky Lab products<br />RemoverИнструкция по удалению KIS2010Инструкция по удалению KIS2011 <br />McAfee Cleanup<br />RemoverИнструкция <br />Symantec: Norton Removal Tool<br />СкачатьИнструкции по удалению корпоративных продуктов Symantec<br /> <br />NOD32 Antivirus Removal<br />ESETUninstallernod32removal.exe <br />Trend Micro<br />Trend Micro Diagnostic Toolkit x32Trend Micro Diagnostic Toolkit x64Инструкция для Win XPИнструкция для Vista & Win7 <br />Panda<br />Remover <br />ZoneAlarm Removal Tool<br />cpes_clean.exe <br />Sunbelt CounterSpy & Viper<br />Agent removal <br />G Data<br />AVKCleaner <br />Webroot Spysweeper Removal Tool<br />RemoverИнструкция <br />eScan<br />Esremove <br />Uninstall Norman Virus Control<br />Delnvc5.exeИнструкция <br />QuickHeal Removal Tool<br />Remover <br />K7 Total Security<br />K7 Removal tool <br />BullGuard<br />BG UninstallИнструкция <br />Malwarebytes Anti-Malware<br />MBAM Clean <br />IObit Removal Tool<br />BitRemover <br />Windows Live OneCare Cleanup Tool<br />OneCare CleanUp <br />Microsoft Security Essentials<br />Инструкция <br />F-PROT Antivirus for Windows<br />Инструкция <br />Sophos<br />Инструкция <br />PC Tools Antivirus<br />Инструкция <br />LavaSoft<br />Инструкция <br />ParetoLogic<br />Инструкция <br />AppRemover<br />Неофициальная утилита для удаления продуктов<br />Скачать<br />Список удаляемых антивирусных продуктов:<br />LegendVerified Supported by OPSWAT LabsVerified Supported through Community FeedbackVendorProductWinXPVistaWin7x32x64x32x64x32x64AhnLab, Inc.AhnLab V3 Internet Security 8.0 8.xALWIL Softwareavast! Free Antivirus 6.0.1000ALWIL Softwareavast! Free Antivirus 5.xALWIL Softwareavast! Free Antivirus 5.0.xALWIL Softwareavast! Internet Security 5.xALWIL Softwareavast! Antivirus 4.8.xALWIL Softwareavast! Antivirus Professional 4.8.xAnonymizer, Inc.Anonymizer Anti-Spyware 3.xAVG TechnologiesAVG 8.0 [AntiSpyware] 8.5.xAVG TechnologiesAVG Internet Security 8.5.xAVG TechnologiesAVG Anti-Virus Free 8.5.xAVG TechnologiesAVG Anti-Virus Free 9.xAVG TechnologiesAVG LinkScanner 9.xAVG TechnologiesAVG LinkScanner 8.5.xAVG TechnologiesAVG 9 [AntiVirus] 9.xAVG TechnologiesAVG 8.0 [AntiVirus] 8.5.xAVG TechnologiesAVG 10 [AntiVirus] 10.0.1153AVG TechnologiesAVG Anti-Virus Free [AntiSpyware] 9.xAVG TechnologiesAVG Anti-Virus Free [AntiSpyware] 8.5.xAVG TechnologiesAVG Identity Protection 9.xAVG TechnologiesAVG Identity Protection 8.5.xAVG TechnologiesAVG 9 [AntiSpyware] 9.xAvira GmbHAvira AntiVir Personal - Free Antivirus 9.xAvira GmbHAvira AntiVir Personal - Free Antivirus 10.xAvira GmbHAvira AntiVir Premium 10.0.0.603Avira GmbHAvira AntiVir Premium 9.xAvira GmbHAvira Premium Security Suite 9.xAvira GmbHAvira AntiVir Professional 9.xAvira GmbHAvira AntiVir Professional 10.0.0.911Beijing Rising Technology Corp. Ltd.Rising AntiVirus 23.00.13.41Beijing Rising Technology Corp. Ltd.Rising Internet Security 21.30.30BullGuard Ltd.Bullguard Internet Security Suite 8.5BullGuard Ltd.Bullguard Internet Security Suite 8.7Cat Computer Services Pvt. Ltd.Quick Heal Total Security [AntiSpyware] 10.xCat Computer Services Pvt. Ltd.Quick Heal Total Security 10.xCentral Command, Inc.Vexira Antivirus 6.3.14CJSC Returnil SoftwareReturnil System Safe 3.2.12385.5757ClamWinClamWin Free Antivirus 0.97Computer Associates International, Inc.CA eTrustITM Agent 8.xComputer Associates International, Inc.CA Anti-Virus Plus 2.xComputer Associates International, Inc.CA Anti-Virus Plus 3.0.0.99Computer Associates International, Inc.CA eTrust Internet Security Suite AntiSpyware 10.xComputer Associates International, Inc.CA Anti-Virus 9.xComputer Associates International, Inc.CA eTrust Antivirus 7.1.192Coranti, Inc.Coranti 2010 [Antivirus] 1.003.00001CyberDefender Corp.CyberDefender AntiVirus 6.08.26.01eEye Digital SecurityeEye Digital Security Blink Professional 4.6.5eEye Digital SecurityeEye Digital Security Blink Professional 4.4.2Emsi Software GmbHEmsisoft Mamutu 3.0.0.18Eset SoftwareNOD32 antivirus system 2.xEset SoftwareESET Smart Security 4.xEset SoftwareESET Smart Security 3.xEset SoftwareESET NOD32 Antivirus 3.xEset SoftwareESET NOD32 Antivirus 4.xESTsoft Corp.ALYac 2.5.0.2F-Secure Corp.F-Secure Anti-Virus (AntiSpyware) 9.xF-Secure Corp.F-Secure Internet Security 9.xF-Secure Corp.F-Secure Internet Security (AntiSpyware) 9.xF-Secure Corp.F-Secure Anti-Virus 8.xF-Secure Corp.F-Secure Anti-Virus 9.xFortinet Inc.FortiClient 4.1.3.143Frisk Software InternationalF-PROT Antivirus for Windows 6.0.9.3GData Software AGG DATA AntiVirus 2011 21.0.2.1HAURI, Inc.ViRobot Desktop 5.5IObitAdvanced System Care 3.xK7 Computing Pvt. Ltd.ウイルスセキュリティ 9.xK7 Computing Pvt. Ltd.ウイルスセキュリティ 10.xKaspersky LabsKaspersky Internet Security 8.0 8.xKaspersky LabsKaspersky Anti-Virus 6.0 6.xKaspersky LabsKaspersky Anti-Virus 2009 8.xKaspersky LabsKaspersky Internet Security 9.xKaspersky LabsKaspersky Anti-Virus 9.xKephyrBazooka Scanner 1.xKingsoft Corp.Kingsoft AntiVirus 2010.08.22.247Kingsoft Corp.Kingsoft AntiVirus 2010.07.08.909Lavasoft, Inc.Ad-Aware 8.xMalwarebytes CorporationMalwarebytes Anti-Malware 1.xMcAfee, Inc.McAfee VirusScan Enterprise 7.1.0.xMcAfee, Inc.McAfee VirusScan Enterprise 8.7.xMcAfee, Inc.McAfee VirusScan Enterprise 8.5.xMcAfee, Inc.McAfee VirusScan AS 13.xMcAfee, Inc.McAfee VirusScan AS 12.xMcAfee, Inc.McAfee VirusScan 9.xMcAfee, Inc.McAfee VirusScan 13.xMcAfee, Inc.McAfee VirusScan 12.xMcAfee, Inc.McAfee VirusScan 8.xMcAfee, Inc.McAfee VirusScan 10.xMicroSmarts LLCSpyware Begone V7.30 7.30.xMicrosoft Corp.Microsoft Security Essentials [Antivirus] 1.xMicrosoft Corp.Windows Defender 1.xMicrosoft Corp.Microsoft Security Essentials [Antispyware] 1.xMicrosoft Corp.Windows Live OneCare 2.xNorman ASANorman Virus Control 5.99Panda SoftwarePanda Cloud Antivirus 1.04Panda SoftwarePanda ActiveScan 2.0 01.xPanda SoftwarePanda Internet Security 2007 11.xPanda SoftwarePanda Antivirus Pro 2010 9.xPanda SoftwarePanda Internet Security 2010 15.xPC Tools SoftwarePC Tools AntiVirus 2009 6.xPC Tools SoftwarePC Tools AntiVirus Free 2010 7.0.0.545Quick Heal Technologies (P) Ltd.Quick Heal Total Security 12.00SOFTWINBitDefender Total Security 2009 12.xSOFTWINBitDefender Internet Security 2010 13.xSOFTWINBitDefender Antivirus v10 10.xSOFTWINBitDefender Antivirus 2010 13.0.19.347SOFTWINBitDefender Antivirus 2010 13.0.21.347SOFTWINBitDefender Antivirus v10 AS 10.xSOFTWINBitDefender Total Security 2010 13.xSophos Plc.Sophos Anti-Virus 9.0.4Sophos Plc.Sophos Anti-Virus 9.xSophos Plc.Sophos Anti-Virus 7.xSUPERAntiSpyware.comSUPERAntiSpyware Free Edition 4.xSymantec Corp.Symantec Hosted Endpoint Protection 2.01.10.1371Symantec Corp.Symantec AntiVirus Win64 10.xSymantec Corp.Norton 360 (Symantec Corporation) 3.xSymantec Corp.Norton 360 (Symantec Corporation) 1.xSymantec Corp.Norton 360 (Symantec Corporation) 2.xSymantec Corp.Symantec AntiVirus 10.xSymantec Corp.Norton 360 4.0.0.127Symantec Corp.Symantec Endpoint Protection 11.xSymantec Corp.Symantec Endpoint Protection 12.xSymantec Corp.Norton AntiVirus [AntiSpyware] 16.xSymantec Corp.Norton AntiVirus [AntiSpyware] 17.xSymantec Corp.Norton 360 [AntiSpyware] 3.xSymantec Corp.Symantec AntiVirus Client 8.xSymantec Corp.Norton AntiVirus 14.xSymantec Corp.Norton AntiVirus 17.xSymantec Corp.Norton AntiVirus 18.1.0.37Symantec Corp.Norton Internet Security [AntiSpyware] 16.xSymantec Corp.Norton Internet Security 17.xSymantec Corp.Norton Internet Security 16.xTenebril Inc.SpyCatcher 5.xTrend Micro, Inc.Trend Micro PC-cillin Internet Security 2005 12.xTrend Micro, Inc.Trend Micro PC-cillin Internet Security 2006 14.xTrend Micro, Inc.Trend Micro Anti-Virus 17.xTrend Micro, Inc.Trend Micro OfficeScan Client 10.xTrend Micro, Inc.Trend Micro OfficeScan Client 8.xTrend Micro, Inc.Trend Micro Internet Security 17.xTrend Micro, Inc.Trend Micro OfficeScan Client (AntiSpyware) 10.xTrustPort, a.s.TrustPort Antivirus 5.0.0.4127VirusBuster Ltd.VirusBuster Personal 6.3.14Webroot Software, Inc.Webroot AntiVirus 7.0.9.22Yahoo!, Inc.CA Yahoo! Anti-Spy 2.x<br />
инструкции и утилиты для удаления остатков антивирусных программ
инструкции и утилиты для удаления остатков антивирусных программ
инструкции и утилиты для удаления остатков антивирусных программ
инструкции и утилиты для удаления остатков антивирусных программ
инструкции и утилиты для удаления остатков антивирусных программ
инструкции и утилиты для удаления остатков антивирусных программ
инструкции и утилиты для удаления остатков антивирусных программ
инструкции и утилиты для удаления остатков антивирусных программ

Mais conteúdo relacionado

Mais procurados

Web Application Frewall
Web Application FrewallWeb Application Frewall
Web Application FrewallAbhishek Singh
 
Web Intrusion Detection
Web Intrusion Detection Web Intrusion Detection
Web Intrusion Detection Abhishek Singh
 
ACSAC2020 "Return-Oriented IoT" by Kuniyasu Suzaki
ACSAC2020 "Return-Oriented IoT" by Kuniyasu SuzakiACSAC2020 "Return-Oriented IoT" by Kuniyasu Suzaki
ACSAC2020 "Return-Oriented IoT" by Kuniyasu SuzakiKuniyasu Suzaki
 
Catching Multilayered Zero-Day Attacks on MS Office
Catching Multilayered Zero-Day Attacks on MS OfficeCatching Multilayered Zero-Day Attacks on MS Office
Catching Multilayered Zero-Day Attacks on MS OfficeKaspersky
 
January2017 patchtuesdayshavlik
January2017 patchtuesdayshavlikJanuary2017 patchtuesdayshavlik
January2017 patchtuesdayshavlikLANDESK
 
How We Stopped Being Just Antivirus and Became a Unique Industrial Infrastruc...
How We Stopped Being Just Antivirus and Became a Unique Industrial Infrastruc...How We Stopped Being Just Antivirus and Became a Unique Industrial Infrastruc...
How We Stopped Being Just Antivirus and Became a Unique Industrial Infrastruc...Kaspersky
 
DEF CON 27 - workshop ANTHONY ROSE - introduction to amsi bypasses and sandbo...
DEF CON 27 - workshop ANTHONY ROSE - introduction to amsi bypasses and sandbo...DEF CON 27 - workshop ANTHONY ROSE - introduction to amsi bypasses and sandbo...
DEF CON 27 - workshop ANTHONY ROSE - introduction to amsi bypasses and sandbo...Felipe Prado
 
Secure Coding for Java - An Introduction
Secure Coding for Java - An IntroductionSecure Coding for Java - An Introduction
Secure Coding for Java - An IntroductionSebastien Gioria
 
April 2017 patch tuesday ivanti
April 2017 patch tuesday ivantiApril 2017 patch tuesday ivanti
April 2017 patch tuesday ivantiChris Goettl
 
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...Symantec
 
100%-ный контроль для 100%-ной безопасности
100%-ный контроль для 100%-ной безопасности100%-ный контроль для 100%-ной безопасности
100%-ный контроль для 100%-ной безопасностиАльбина Минуллина
 
RISC-V-Day-Tokyo2018-suzaki
RISC-V-Day-Tokyo2018-suzakiRISC-V-Day-Tokyo2018-suzaki
RISC-V-Day-Tokyo2018-suzakiKuniyasu Suzaki
 
Astaro Orange Paper Oss Myths Dispelled
Astaro Orange Paper Oss Myths DispelledAstaro Orange Paper Oss Myths Dispelled
Astaro Orange Paper Oss Myths Dispelledlosalamos
 
Presentatie McAfee: Optimale Endpoint Protection 26062015
Presentatie McAfee: Optimale Endpoint Protection 26062015Presentatie McAfee: Optimale Endpoint Protection 26062015
Presentatie McAfee: Optimale Endpoint Protection 26062015SLBdiensten
 

Mais procurados (18)

Web Application Frewall
Web Application FrewallWeb Application Frewall
Web Application Frewall
 
Web Intrusion Detection
Web Intrusion Detection Web Intrusion Detection
Web Intrusion Detection
 
ACSAC2020 "Return-Oriented IoT" by Kuniyasu Suzaki
ACSAC2020 "Return-Oriented IoT" by Kuniyasu SuzakiACSAC2020 "Return-Oriented IoT" by Kuniyasu Suzaki
ACSAC2020 "Return-Oriented IoT" by Kuniyasu Suzaki
 
Hackcon 2017
Hackcon 2017Hackcon 2017
Hackcon 2017
 
WAFEC
WAFECWAFEC
WAFEC
 
Catching Multilayered Zero-Day Attacks on MS Office
Catching Multilayered Zero-Day Attacks on MS OfficeCatching Multilayered Zero-Day Attacks on MS Office
Catching Multilayered Zero-Day Attacks on MS Office
 
January2017 patchtuesdayshavlik
January2017 patchtuesdayshavlikJanuary2017 patchtuesdayshavlik
January2017 patchtuesdayshavlik
 
How We Stopped Being Just Antivirus and Became a Unique Industrial Infrastruc...
How We Stopped Being Just Antivirus and Became a Unique Industrial Infrastruc...How We Stopped Being Just Antivirus and Became a Unique Industrial Infrastruc...
How We Stopped Being Just Antivirus and Became a Unique Industrial Infrastruc...
 
DEF CON 27 - workshop ANTHONY ROSE - introduction to amsi bypasses and sandbo...
DEF CON 27 - workshop ANTHONY ROSE - introduction to amsi bypasses and sandbo...DEF CON 27 - workshop ANTHONY ROSE - introduction to amsi bypasses and sandbo...
DEF CON 27 - workshop ANTHONY ROSE - introduction to amsi bypasses and sandbo...
 
Avira 2015 防毒軟體商業政府教育解決方案
Avira 2015 防毒軟體商業政府教育解決方案Avira 2015 防毒軟體商業政府教育解決方案
Avira 2015 防毒軟體商業政府教育解決方案
 
Secure Coding for Java - An Introduction
Secure Coding for Java - An IntroductionSecure Coding for Java - An Introduction
Secure Coding for Java - An Introduction
 
Security Testing
Security TestingSecurity Testing
Security Testing
 
April 2017 patch tuesday ivanti
April 2017 patch tuesday ivantiApril 2017 patch tuesday ivanti
April 2017 patch tuesday ivanti
 
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
 
100%-ный контроль для 100%-ной безопасности
100%-ный контроль для 100%-ной безопасности100%-ный контроль для 100%-ной безопасности
100%-ный контроль для 100%-ной безопасности
 
RISC-V-Day-Tokyo2018-suzaki
RISC-V-Day-Tokyo2018-suzakiRISC-V-Day-Tokyo2018-suzaki
RISC-V-Day-Tokyo2018-suzaki
 
Astaro Orange Paper Oss Myths Dispelled
Astaro Orange Paper Oss Myths DispelledAstaro Orange Paper Oss Myths Dispelled
Astaro Orange Paper Oss Myths Dispelled
 
Presentatie McAfee: Optimale Endpoint Protection 26062015
Presentatie McAfee: Optimale Endpoint Protection 26062015Presentatie McAfee: Optimale Endpoint Protection 26062015
Presentatie McAfee: Optimale Endpoint Protection 26062015
 

Destaque

сказки про «полезные» оптимизаторы памяти
сказки про «полезные» оптимизаторы памятисказки про «полезные» оптимизаторы памяти
сказки про «полезные» оптимизаторы памятиbelhonka
 
Технические результаты всего дня 4 февраля 2011 года работы Робота Челенджер...
Технические результаты всего дня 4 февраля 2011 года  работы Робота Челенджер...Технические результаты всего дня 4 февраля 2011 года  работы Робота Челенджер...
Технические результаты всего дня 4 февраля 2011 года работы Робота Челенджер...belhonka
 
Проект «Домашняя студия»
Проект «Домашняя студия»Проект «Домашняя студия»
Проект «Домашняя студия»belhonka
 

Destaque (6)

сказки про «полезные» оптимизаторы памяти
сказки про «полезные» оптимизаторы памятисказки про «полезные» оптимизаторы памяти
сказки про «полезные» оптимизаторы памяти
 
Технические результаты всего дня 4 февраля 2011 года работы Робота Челенджер...
Технические результаты всего дня 4 февраля 2011 года  работы Робота Челенджер...Технические результаты всего дня 4 февраля 2011 года  работы Робота Челенджер...
Технические результаты всего дня 4 февраля 2011 года работы Робота Челенджер...
 
Working 4 yourself
Working 4 yourselfWorking 4 yourself
Working 4 yourself
 
monleon-corredor
monleon-corredormonleon-corredor
monleon-corredor
 
Проект «Домашняя студия»
Проект «Домашняя студия»Проект «Домашняя студия»
Проект «Домашняя студия»
 
Ob m5,m6,m7
Ob m5,m6,m7Ob m5,m6,m7
Ob m5,m6,m7
 

Semelhante a инструкции и утилиты для удаления остатков антивирусных программ

Win av as_pm_de_3_6_10363_2
Win av as_pm_de_3_6_10363_2Win av as_pm_de_3_6_10363_2
Win av as_pm_de_3_6_10363_2Bloombase
 
Avast Antivirus
Avast AntivirusAvast Antivirus
Avast AntivirusMizamk
 
Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2Bloombase
 
Top 10 antivirus 2017 by mohsin a li dahar khairpur
Top 10 antivirus 2017 by mohsin a li dahar khairpurTop 10 antivirus 2017 by mohsin a li dahar khairpur
Top 10 antivirus 2017 by mohsin a li dahar khairpurMohsin Dahar
 
Venkasure Antivirus + Internet Security
Venkasure Antivirus + Internet SecurityVenkasure Antivirus + Internet Security
Venkasure Antivirus + Internet Securityvenkasureantivirus
 
Kaspersky antivirus ppt
Kaspersky antivirus pptKaspersky antivirus ppt
Kaspersky antivirus pptDipak Bamugade
 
Cansecwest - The Death of AV defence in depth
Cansecwest - The Death of AV defence in depthCansecwest - The Death of AV defence in depth
Cansecwest - The Death of AV defence in depthThierry Zoller
 
Avc report25
Avc report25Avc report25
Avc report25Era Brown
 
Avast product brochure
Avast product brochureAvast product brochure
Avast product brochureptoone
 
Antivirus test-wholedynamic2010
Antivirus test-wholedynamic2010Antivirus test-wholedynamic2010
Antivirus test-wholedynamic2010nuttakorn nakkerd
 
Colby_Sawyer_white_paper final 2
Colby_Sawyer_white_paper final 2Colby_Sawyer_white_paper final 2
Colby_Sawyer_white_paper final 2Scott Brown
 
Spyware and adware
Spyware and  adwareSpyware and  adware
Spyware and adwareRaja Kiran
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesSejahtera Affif
 

Semelhante a инструкции и утилиты для удаления остатков антивирусных программ (20)

Win av as_pm_de_3_6_10363_2
Win av as_pm_de_3_6_10363_2Win av as_pm_de_3_6_10363_2
Win av as_pm_de_3_6_10363_2
 
The Various Classes of Antivirus!
The Various Classes of Antivirus!The Various Classes of Antivirus!
The Various Classes of Antivirus!
 
Top 10 antiviruses
Top 10 antivirusesTop 10 antiviruses
Top 10 antiviruses
 
Adware
AdwareAdware
Adware
 
Adware
AdwareAdware
Adware
 
Avast Antivirus
Avast AntivirusAvast Antivirus
Avast Antivirus
 
Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2
 
List of Malwares
List of MalwaresList of Malwares
List of Malwares
 
Top 10 antivirus 2017 by mohsin a li dahar khairpur
Top 10 antivirus 2017 by mohsin a li dahar khairpurTop 10 antivirus 2017 by mohsin a li dahar khairpur
Top 10 antivirus 2017 by mohsin a li dahar khairpur
 
Venkasure Antivirus + Internet Security
Venkasure Antivirus + Internet SecurityVenkasure Antivirus + Internet Security
Venkasure Antivirus + Internet Security
 
Venka sure Antivirus+Internet Security
Venka sure Antivirus+Internet SecurityVenka sure Antivirus+Internet Security
Venka sure Antivirus+Internet Security
 
Kaspersky antivirus ppt
Kaspersky antivirus pptKaspersky antivirus ppt
Kaspersky antivirus ppt
 
Cansecwest - The Death of AV defence in depth
Cansecwest - The Death of AV defence in depthCansecwest - The Death of AV defence in depth
Cansecwest - The Death of AV defence in depth
 
10 security enhancements
10 security enhancements10 security enhancements
10 security enhancements
 
Avc report25
Avc report25Avc report25
Avc report25
 
Avast product brochure
Avast product brochureAvast product brochure
Avast product brochure
 
Antivirus test-wholedynamic2010
Antivirus test-wholedynamic2010Antivirus test-wholedynamic2010
Antivirus test-wholedynamic2010
 
Colby_Sawyer_white_paper final 2
Colby_Sawyer_white_paper final 2Colby_Sawyer_white_paper final 2
Colby_Sawyer_white_paper final 2
 
Spyware and adware
Spyware and  adwareSpyware and  adware
Spyware and adware
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
 

Último

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 

Último (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

инструкции и утилиты для удаления остатков антивирусных программ

  • 1. Agnitum Outpost Сlean<br />Cleaner32Cleaner64Инструкции <br />Avira Uninstall Tools<br />Утилита для чистки реестра после удаления продуктов AviraВНИМАНИЕ! Не явяется основным инструментом удаленя.Avira AntiVir RegistryCleanerКак удалить ПО Avira Software?Инструкция для удаления вручную <br />Аvast! - Alwil Software Uninstall Utility<br />aswClear5aswClearИнструкция <br />AVG Software Remover Utility<br />AVG Remover x32AVG Remover x64AVG Identity Protection Remover <br />BitDefender Uninstall Tool<br />Uninstall ToolИнструкция <br />Comodo Uninstall Tool<br />CIS Clean-up ToolCIS Clean-up Tool (Зеркало)Инструкция <br />Dr.Web Anti-virus Remover<br />Аварийное средство, предназначенное для удаления «остатков» от некорректных/поврежденных инсталляций ПО Dr.Web for Windows версий 4.33, 4.44, 5.0, 6.0 и клиентской части Dr.Web Enterprise Suite тех же версий в тех случаях, когда применение штатных средств удаления недоступно или не работает. Утилита не предназначена для использования в качестве основного стандартного средства деинсталляции ПО Dr.WebDRW Remover.exe <br />F-Secure Uninstallation Tool<br />RemoverИнструкция <br />Kaspersky Lab products<br />RemoverИнструкция по удалению KIS2010Инструкция по удалению KIS2011 <br />McAfee Cleanup<br />RemoverИнструкция <br />Symantec: Norton Removal Tool<br />СкачатьИнструкции по удалению корпоративных продуктов Symantec<br /> <br />NOD32 Antivirus Removal<br />ESETUninstallernod32removal.exe <br />Trend Micro<br />Trend Micro Diagnostic Toolkit x32Trend Micro Diagnostic Toolkit x64Инструкция для Win XPИнструкция для Vista & Win7 <br />Panda<br />Remover <br />ZoneAlarm Removal Tool<br />cpes_clean.exe <br />Sunbelt CounterSpy & Viper<br />Agent removal <br />G Data<br />AVKCleaner <br />Webroot Spysweeper Removal Tool<br />RemoverИнструкция <br />eScan<br />Esremove <br />Uninstall Norman Virus Control<br />Delnvc5.exeИнструкция <br />QuickHeal Removal Tool<br />Remover <br />K7 Total Security<br />K7 Removal tool <br />BullGuard<br />BG UninstallИнструкция <br />Malwarebytes Anti-Malware<br />MBAM Clean <br />IObit Removal Tool<br />BitRemover <br />Windows Live OneCare Cleanup Tool<br />OneCare CleanUp <br />Microsoft Security Essentials<br />Инструкция <br />F-PROT Antivirus for Windows<br />Инструкция <br />Sophos<br />Инструкция <br />PC Tools Antivirus<br />Инструкция <br />LavaSoft<br />Инструкция <br />ParetoLogic<br />Инструкция <br />AppRemover<br />Неофициальная утилита для удаления продуктов<br />Скачать<br />Список удаляемых антивирусных продуктов:<br />LegendVerified Supported by OPSWAT LabsVerified Supported through Community FeedbackVendorProductWinXPVistaWin7x32x64x32x64x32x64AhnLab, Inc.AhnLab V3 Internet Security 8.0 8.xALWIL Softwareavast! Free Antivirus 6.0.1000ALWIL Softwareavast! Free Antivirus 5.xALWIL Softwareavast! Free Antivirus 5.0.xALWIL Softwareavast! Internet Security 5.xALWIL Softwareavast! Antivirus 4.8.xALWIL Softwareavast! Antivirus Professional 4.8.xAnonymizer, Inc.Anonymizer Anti-Spyware 3.xAVG TechnologiesAVG 8.0 [AntiSpyware] 8.5.xAVG TechnologiesAVG Internet Security 8.5.xAVG TechnologiesAVG Anti-Virus Free 8.5.xAVG TechnologiesAVG Anti-Virus Free 9.xAVG TechnologiesAVG LinkScanner 9.xAVG TechnologiesAVG LinkScanner 8.5.xAVG TechnologiesAVG 9 [AntiVirus] 9.xAVG TechnologiesAVG 8.0 [AntiVirus] 8.5.xAVG TechnologiesAVG 10 [AntiVirus] 10.0.1153AVG TechnologiesAVG Anti-Virus Free [AntiSpyware] 9.xAVG TechnologiesAVG Anti-Virus Free [AntiSpyware] 8.5.xAVG TechnologiesAVG Identity Protection 9.xAVG TechnologiesAVG Identity Protection 8.5.xAVG TechnologiesAVG 9 [AntiSpyware] 9.xAvira GmbHAvira AntiVir Personal - Free Antivirus 9.xAvira GmbHAvira AntiVir Personal - Free Antivirus 10.xAvira GmbHAvira AntiVir Premium 10.0.0.603Avira GmbHAvira AntiVir Premium 9.xAvira GmbHAvira Premium Security Suite 9.xAvira GmbHAvira AntiVir Professional 9.xAvira GmbHAvira AntiVir Professional 10.0.0.911Beijing Rising Technology Corp. Ltd.Rising AntiVirus 23.00.13.41Beijing Rising Technology Corp. Ltd.Rising Internet Security 21.30.30BullGuard Ltd.Bullguard Internet Security Suite 8.5BullGuard Ltd.Bullguard Internet Security Suite 8.7Cat Computer Services Pvt. Ltd.Quick Heal Total Security [AntiSpyware] 10.xCat Computer Services Pvt. Ltd.Quick Heal Total Security 10.xCentral Command, Inc.Vexira Antivirus 6.3.14CJSC Returnil SoftwareReturnil System Safe 3.2.12385.5757ClamWinClamWin Free Antivirus 0.97Computer Associates International, Inc.CA eTrustITM Agent 8.xComputer Associates International, Inc.CA Anti-Virus Plus 2.xComputer Associates International, Inc.CA Anti-Virus Plus 3.0.0.99Computer Associates International, Inc.CA eTrust Internet Security Suite AntiSpyware 10.xComputer Associates International, Inc.CA Anti-Virus 9.xComputer Associates International, Inc.CA eTrust Antivirus 7.1.192Coranti, Inc.Coranti 2010 [Antivirus] 1.003.00001CyberDefender Corp.CyberDefender AntiVirus 6.08.26.01eEye Digital SecurityeEye Digital Security Blink Professional 4.6.5eEye Digital SecurityeEye Digital Security Blink Professional 4.4.2Emsi Software GmbHEmsisoft Mamutu 3.0.0.18Eset SoftwareNOD32 antivirus system 2.xEset SoftwareESET Smart Security 4.xEset SoftwareESET Smart Security 3.xEset SoftwareESET NOD32 Antivirus 3.xEset SoftwareESET NOD32 Antivirus 4.xESTsoft Corp.ALYac 2.5.0.2F-Secure Corp.F-Secure Anti-Virus (AntiSpyware) 9.xF-Secure Corp.F-Secure Internet Security 9.xF-Secure Corp.F-Secure Internet Security (AntiSpyware) 9.xF-Secure Corp.F-Secure Anti-Virus 8.xF-Secure Corp.F-Secure Anti-Virus 9.xFortinet Inc.FortiClient 4.1.3.143Frisk Software InternationalF-PROT Antivirus for Windows 6.0.9.3GData Software AGG DATA AntiVirus 2011 21.0.2.1HAURI, Inc.ViRobot Desktop 5.5IObitAdvanced System Care 3.xK7 Computing Pvt. Ltd.ウイルスセキュリティ 9.xK7 Computing Pvt. Ltd.ウイルスセキュリティ 10.xKaspersky LabsKaspersky Internet Security 8.0 8.xKaspersky LabsKaspersky Anti-Virus 6.0 6.xKaspersky LabsKaspersky Anti-Virus 2009 8.xKaspersky LabsKaspersky Internet Security 9.xKaspersky LabsKaspersky Anti-Virus 9.xKephyrBazooka Scanner 1.xKingsoft Corp.Kingsoft AntiVirus 2010.08.22.247Kingsoft Corp.Kingsoft AntiVirus 2010.07.08.909Lavasoft, Inc.Ad-Aware 8.xMalwarebytes CorporationMalwarebytes Anti-Malware 1.xMcAfee, Inc.McAfee VirusScan Enterprise 7.1.0.xMcAfee, Inc.McAfee VirusScan Enterprise 8.7.xMcAfee, Inc.McAfee VirusScan Enterprise 8.5.xMcAfee, Inc.McAfee VirusScan AS 13.xMcAfee, Inc.McAfee VirusScan AS 12.xMcAfee, Inc.McAfee VirusScan 9.xMcAfee, Inc.McAfee VirusScan 13.xMcAfee, Inc.McAfee VirusScan 12.xMcAfee, Inc.McAfee VirusScan 8.xMcAfee, Inc.McAfee VirusScan 10.xMicroSmarts LLCSpyware Begone V7.30 7.30.xMicrosoft Corp.Microsoft Security Essentials [Antivirus] 1.xMicrosoft Corp.Windows Defender 1.xMicrosoft Corp.Microsoft Security Essentials [Antispyware] 1.xMicrosoft Corp.Windows Live OneCare 2.xNorman ASANorman Virus Control 5.99Panda SoftwarePanda Cloud Antivirus 1.04Panda SoftwarePanda ActiveScan 2.0 01.xPanda SoftwarePanda Internet Security 2007 11.xPanda SoftwarePanda Antivirus Pro 2010 9.xPanda SoftwarePanda Internet Security 2010 15.xPC Tools SoftwarePC Tools AntiVirus 2009 6.xPC Tools SoftwarePC Tools AntiVirus Free 2010 7.0.0.545Quick Heal Technologies (P) Ltd.Quick Heal Total Security 12.00SOFTWINBitDefender Total Security 2009 12.xSOFTWINBitDefender Internet Security 2010 13.xSOFTWINBitDefender Antivirus v10 10.xSOFTWINBitDefender Antivirus 2010 13.0.19.347SOFTWINBitDefender Antivirus 2010 13.0.21.347SOFTWINBitDefender Antivirus v10 AS 10.xSOFTWINBitDefender Total Security 2010 13.xSophos Plc.Sophos Anti-Virus 9.0.4Sophos Plc.Sophos Anti-Virus 9.xSophos Plc.Sophos Anti-Virus 7.xSUPERAntiSpyware.comSUPERAntiSpyware Free Edition 4.xSymantec Corp.Symantec Hosted Endpoint Protection 2.01.10.1371Symantec Corp.Symantec AntiVirus Win64 10.xSymantec Corp.Norton 360 (Symantec Corporation) 3.xSymantec Corp.Norton 360 (Symantec Corporation) 1.xSymantec Corp.Norton 360 (Symantec Corporation) 2.xSymantec Corp.Symantec AntiVirus 10.xSymantec Corp.Norton 360 4.0.0.127Symantec Corp.Symantec Endpoint Protection 11.xSymantec Corp.Symantec Endpoint Protection 12.xSymantec Corp.Norton AntiVirus [AntiSpyware] 16.xSymantec Corp.Norton AntiVirus [AntiSpyware] 17.xSymantec Corp.Norton 360 [AntiSpyware] 3.xSymantec Corp.Symantec AntiVirus Client 8.xSymantec Corp.Norton AntiVirus 14.xSymantec Corp.Norton AntiVirus 17.xSymantec Corp.Norton AntiVirus 18.1.0.37Symantec Corp.Norton Internet Security [AntiSpyware] 16.xSymantec Corp.Norton Internet Security 17.xSymantec Corp.Norton Internet Security 16.xTenebril Inc.SpyCatcher 5.xTrend Micro, Inc.Trend Micro PC-cillin Internet Security 2005 12.xTrend Micro, Inc.Trend Micro PC-cillin Internet Security 2006 14.xTrend Micro, Inc.Trend Micro Anti-Virus 17.xTrend Micro, Inc.Trend Micro OfficeScan Client 10.xTrend Micro, Inc.Trend Micro OfficeScan Client 8.xTrend Micro, Inc.Trend Micro Internet Security 17.xTrend Micro, Inc.Trend Micro OfficeScan Client (AntiSpyware) 10.xTrustPort, a.s.TrustPort Antivirus 5.0.0.4127VirusBuster Ltd.VirusBuster Personal 6.3.14Webroot Software, Inc.Webroot AntiVirus 7.0.9.22Yahoo!, Inc.CA Yahoo! Anti-Spy 2.x<br />