SlideShare a Scribd company logo
Agnitum Outpost Сlean<br />Cleaner32Cleaner64Инструкции <br />Avira Uninstall Tools<br />Утилита для чистки реестра после удаления продуктов AviraВНИМАНИЕ! Не явяется основным инструментом удаленя.Avira AntiVir RegistryCleanerКак удалить ПО Avira Software?Инструкция для удаления вручную <br />Аvast! - Alwil Software Uninstall Utility<br />aswClear5aswClearИнструкция <br />AVG Software Remover Utility<br />AVG Remover x32AVG Remover x64AVG Identity Protection Remover <br />BitDefender Uninstall Tool<br />Uninstall ToolИнструкция <br />Comodo Uninstall Tool<br />CIS Clean-up ToolCIS Clean-up Tool (Зеркало)Инструкция <br />Dr.Web Anti-virus Remover<br />Аварийное средство, предназначенное для удаления «остатков» от некорректных/поврежденных инсталляций ПО Dr.Web for Windows версий 4.33, 4.44, 5.0, 6.0 и клиентской части Dr.Web Enterprise Suite тех же версий в тех случаях, когда применение штатных средств удаления недоступно или не работает. Утилита не предназначена для использования в качестве основного стандартного средства деинсталляции ПО Dr.WebDRW Remover.exe <br />F-Secure Uninstallation Tool<br />RemoverИнструкция <br />Kaspersky Lab products<br />RemoverИнструкция по удалению KIS2010Инструкция по удалению KIS2011 <br />McAfee Cleanup<br />RemoverИнструкция <br />Symantec: Norton Removal Tool<br />СкачатьИнструкции по удалению корпоративных продуктов Symantec<br /> <br />NOD32 Antivirus Removal<br />ESETUninstallernod32removal.exe <br />Trend Micro<br />Trend Micro Diagnostic Toolkit x32Trend Micro Diagnostic Toolkit x64Инструкция для Win XPИнструкция для Vista & Win7 <br />Panda<br />Remover <br />ZoneAlarm Removal Tool<br />cpes_clean.exe <br />Sunbelt CounterSpy & Viper<br />Agent removal <br />G Data<br />AVKCleaner <br />Webroot Spysweeper Removal Tool<br />RemoverИнструкция <br />eScan<br />Esremove <br />Uninstall Norman Virus Control<br />Delnvc5.exeИнструкция <br />QuickHeal Removal Tool<br />Remover <br />K7 Total Security<br />K7 Removal tool <br />BullGuard<br />BG UninstallИнструкция <br />Malwarebytes Anti-Malware<br />MBAM Clean <br />IObit Removal Tool<br />BitRemover <br />Windows Live OneCare Cleanup Tool<br />OneCare CleanUp <br />Microsoft Security Essentials<br />Инструкция <br />F-PROT Antivirus for Windows<br />Инструкция <br />Sophos<br />Инструкция <br />PC Tools Antivirus<br />Инструкция <br />LavaSoft<br />Инструкция <br />ParetoLogic<br />Инструкция <br />AppRemover<br />Неофициальная утилита для удаления продуктов<br />Скачать<br />Список удаляемых антивирусных продуктов:<br />LegendVerified Supported by OPSWAT LabsVerified Supported through Community FeedbackVendorProductWinXPVistaWin7x32x64x32x64x32x64AhnLab, Inc.AhnLab V3 Internet Security 8.0 8.xALWIL Softwareavast! Free Antivirus 6.0.1000ALWIL Softwareavast! Free Antivirus 5.xALWIL Softwareavast! Free Antivirus 5.0.xALWIL Softwareavast! Internet Security 5.xALWIL Softwareavast! Antivirus 4.8.xALWIL Softwareavast! Antivirus Professional 4.8.xAnonymizer, Inc.Anonymizer Anti-Spyware 3.xAVG TechnologiesAVG 8.0 [AntiSpyware] 8.5.xAVG TechnologiesAVG Internet Security 8.5.xAVG TechnologiesAVG Anti-Virus Free 8.5.xAVG TechnologiesAVG Anti-Virus Free 9.xAVG TechnologiesAVG LinkScanner 9.xAVG TechnologiesAVG LinkScanner 8.5.xAVG TechnologiesAVG 9 [AntiVirus] 9.xAVG TechnologiesAVG 8.0 [AntiVirus] 8.5.xAVG TechnologiesAVG 10 [AntiVirus] 10.0.1153AVG TechnologiesAVG Anti-Virus Free [AntiSpyware] 9.xAVG TechnologiesAVG Anti-Virus Free [AntiSpyware] 8.5.xAVG TechnologiesAVG Identity Protection 9.xAVG TechnologiesAVG Identity Protection 8.5.xAVG TechnologiesAVG 9 [AntiSpyware] 9.xAvira GmbHAvira AntiVir Personal - Free Antivirus 9.xAvira GmbHAvira AntiVir Personal - Free Antivirus 10.xAvira GmbHAvira AntiVir Premium 10.0.0.603Avira GmbHAvira AntiVir Premium 9.xAvira GmbHAvira Premium Security Suite 9.xAvira GmbHAvira AntiVir Professional 9.xAvira GmbHAvira AntiVir Professional 10.0.0.911Beijing Rising Technology Corp. Ltd.Rising AntiVirus 23.00.13.41Beijing Rising Technology Corp. Ltd.Rising Internet Security 21.30.30BullGuard Ltd.Bullguard Internet Security Suite 8.5BullGuard Ltd.Bullguard Internet Security Suite 8.7Cat Computer Services Pvt. Ltd.Quick Heal Total Security [AntiSpyware] 10.xCat Computer Services Pvt. Ltd.Quick Heal Total Security 10.xCentral Command, Inc.Vexira Antivirus 6.3.14CJSC Returnil SoftwareReturnil System Safe 3.2.12385.5757ClamWinClamWin Free Antivirus 0.97Computer Associates International, Inc.CA eTrustITM Agent 8.xComputer Associates International, Inc.CA Anti-Virus Plus 2.xComputer Associates International, Inc.CA Anti-Virus Plus 3.0.0.99Computer Associates International, Inc.CA eTrust Internet Security Suite AntiSpyware 10.xComputer Associates International, Inc.CA Anti-Virus 9.xComputer Associates International, Inc.CA eTrust Antivirus 7.1.192Coranti, Inc.Coranti 2010 [Antivirus] 1.003.00001CyberDefender Corp.CyberDefender AntiVirus 6.08.26.01eEye Digital SecurityeEye Digital Security Blink Professional 4.6.5eEye Digital SecurityeEye Digital Security Blink Professional 4.4.2Emsi Software GmbHEmsisoft Mamutu 3.0.0.18Eset SoftwareNOD32 antivirus system 2.xEset SoftwareESET Smart Security 4.xEset SoftwareESET Smart Security 3.xEset SoftwareESET NOD32 Antivirus 3.xEset SoftwareESET NOD32 Antivirus 4.xESTsoft Corp.ALYac 2.5.0.2F-Secure Corp.F-Secure Anti-Virus (AntiSpyware) 9.xF-Secure Corp.F-Secure Internet Security 9.xF-Secure Corp.F-Secure Internet Security (AntiSpyware) 9.xF-Secure Corp.F-Secure Anti-Virus 8.xF-Secure Corp.F-Secure Anti-Virus 9.xFortinet Inc.FortiClient 4.1.3.143Frisk Software InternationalF-PROT Antivirus for Windows 6.0.9.3GData Software AGG DATA AntiVirus 2011 21.0.2.1HAURI, Inc.ViRobot Desktop 5.5IObitAdvanced System Care 3.xK7 Computing Pvt. Ltd.ウイルスセキュリティ 9.xK7 Computing Pvt. Ltd.ウイルスセキュリティ 10.xKaspersky LabsKaspersky Internet Security 8.0 8.xKaspersky LabsKaspersky Anti-Virus 6.0 6.xKaspersky LabsKaspersky Anti-Virus 2009 8.xKaspersky LabsKaspersky Internet Security 9.xKaspersky LabsKaspersky Anti-Virus 9.xKephyrBazooka Scanner 1.xKingsoft Corp.Kingsoft AntiVirus 2010.08.22.247Kingsoft Corp.Kingsoft AntiVirus 2010.07.08.909Lavasoft, Inc.Ad-Aware 8.xMalwarebytes CorporationMalwarebytes Anti-Malware 1.xMcAfee, Inc.McAfee VirusScan Enterprise 7.1.0.xMcAfee, Inc.McAfee VirusScan Enterprise 8.7.xMcAfee, Inc.McAfee VirusScan Enterprise 8.5.xMcAfee, Inc.McAfee VirusScan AS 13.xMcAfee, Inc.McAfee VirusScan AS 12.xMcAfee, Inc.McAfee VirusScan 9.xMcAfee, Inc.McAfee VirusScan 13.xMcAfee, Inc.McAfee VirusScan 12.xMcAfee, Inc.McAfee VirusScan 8.xMcAfee, Inc.McAfee VirusScan 10.xMicroSmarts LLCSpyware Begone V7.30 7.30.xMicrosoft Corp.Microsoft Security Essentials [Antivirus] 1.xMicrosoft Corp.Windows Defender 1.xMicrosoft Corp.Microsoft Security Essentials [Antispyware] 1.xMicrosoft Corp.Windows Live OneCare 2.xNorman ASANorman Virus Control 5.99Panda SoftwarePanda Cloud Antivirus 1.04Panda SoftwarePanda ActiveScan 2.0 01.xPanda SoftwarePanda Internet Security 2007 11.xPanda SoftwarePanda Antivirus Pro 2010 9.xPanda SoftwarePanda Internet Security 2010 15.xPC Tools SoftwarePC Tools AntiVirus 2009 6.xPC Tools SoftwarePC Tools AntiVirus Free 2010 7.0.0.545Quick Heal Technologies (P) Ltd.Quick Heal Total Security 12.00SOFTWINBitDefender Total Security 2009 12.xSOFTWINBitDefender Internet Security 2010 13.xSOFTWINBitDefender Antivirus v10 10.xSOFTWINBitDefender Antivirus 2010 13.0.19.347SOFTWINBitDefender Antivirus 2010 13.0.21.347SOFTWINBitDefender Antivirus v10 AS 10.xSOFTWINBitDefender Total Security 2010 13.xSophos Plc.Sophos Anti-Virus 9.0.4Sophos Plc.Sophos Anti-Virus 9.xSophos Plc.Sophos Anti-Virus 7.xSUPERAntiSpyware.comSUPERAntiSpyware Free Edition 4.xSymantec Corp.Symantec Hosted Endpoint Protection 2.01.10.1371Symantec Corp.Symantec AntiVirus Win64 10.xSymantec Corp.Norton 360 (Symantec Corporation) 3.xSymantec Corp.Norton 360 (Symantec Corporation) 1.xSymantec Corp.Norton 360 (Symantec Corporation) 2.xSymantec Corp.Symantec AntiVirus 10.xSymantec Corp.Norton 360 4.0.0.127Symantec Corp.Symantec Endpoint Protection 11.xSymantec Corp.Symantec Endpoint Protection 12.xSymantec Corp.Norton AntiVirus [AntiSpyware] 16.xSymantec Corp.Norton AntiVirus [AntiSpyware] 17.xSymantec Corp.Norton 360 [AntiSpyware] 3.xSymantec Corp.Symantec AntiVirus Client 8.xSymantec Corp.Norton AntiVirus 14.xSymantec Corp.Norton AntiVirus 17.xSymantec Corp.Norton AntiVirus 18.1.0.37Symantec Corp.Norton Internet Security [AntiSpyware] 16.xSymantec Corp.Norton Internet Security 17.xSymantec Corp.Norton Internet Security 16.xTenebril Inc.SpyCatcher 5.xTrend Micro, Inc.Trend Micro PC-cillin Internet Security 2005 12.xTrend Micro, Inc.Trend Micro PC-cillin Internet Security 2006 14.xTrend Micro, Inc.Trend Micro Anti-Virus 17.xTrend Micro, Inc.Trend Micro OfficeScan Client 10.xTrend Micro, Inc.Trend Micro OfficeScan Client 8.xTrend Micro, Inc.Trend Micro Internet Security 17.xTrend Micro, Inc.Trend Micro OfficeScan Client (AntiSpyware) 10.xTrustPort, a.s.TrustPort Antivirus 5.0.0.4127VirusBuster Ltd.VirusBuster Personal 6.3.14Webroot Software, Inc.Webroot AntiVirus 7.0.9.22Yahoo!, Inc.CA Yahoo! Anti-Spy 2.x<br />
инструкции и утилиты для удаления остатков антивирусных программ
инструкции и утилиты для удаления остатков антивирусных программ
инструкции и утилиты для удаления остатков антивирусных программ
инструкции и утилиты для удаления остатков антивирусных программ
инструкции и утилиты для удаления остатков антивирусных программ
инструкции и утилиты для удаления остатков антивирусных программ
инструкции и утилиты для удаления остатков антивирусных программ
инструкции и утилиты для удаления остатков антивирусных программ

More Related Content

What's hot

Web Application Frewall
Web Application FrewallWeb Application Frewall
Web Application Frewall
Abhishek Singh
 
Web Intrusion Detection
Web Intrusion Detection Web Intrusion Detection
Web Intrusion Detection
Abhishek Singh
 
ACSAC2020 "Return-Oriented IoT" by Kuniyasu Suzaki
ACSAC2020 "Return-Oriented IoT" by Kuniyasu SuzakiACSAC2020 "Return-Oriented IoT" by Kuniyasu Suzaki
ACSAC2020 "Return-Oriented IoT" by Kuniyasu Suzaki
Kuniyasu Suzaki
 
Hackcon 2017
Hackcon 2017Hackcon 2017
Hackcon 2017
Olav Tvedt
 
WAFEC
WAFECWAFEC
Catching Multilayered Zero-Day Attacks on MS Office
Catching Multilayered Zero-Day Attacks on MS OfficeCatching Multilayered Zero-Day Attacks on MS Office
Catching Multilayered Zero-Day Attacks on MS Office
Kaspersky
 
January2017 patchtuesdayshavlik
January2017 patchtuesdayshavlikJanuary2017 patchtuesdayshavlik
January2017 patchtuesdayshavlik
LANDESK
 
How We Stopped Being Just Antivirus and Became a Unique Industrial Infrastruc...
How We Stopped Being Just Antivirus and Became a Unique Industrial Infrastruc...How We Stopped Being Just Antivirus and Became a Unique Industrial Infrastruc...
How We Stopped Being Just Antivirus and Became a Unique Industrial Infrastruc...
Kaspersky
 
DEF CON 27 - workshop ANTHONY ROSE - introduction to amsi bypasses and sandbo...
DEF CON 27 - workshop ANTHONY ROSE - introduction to amsi bypasses and sandbo...DEF CON 27 - workshop ANTHONY ROSE - introduction to amsi bypasses and sandbo...
DEF CON 27 - workshop ANTHONY ROSE - introduction to amsi bypasses and sandbo...
Felipe Prado
 
Avira 2015 防毒軟體商業政府教育解決方案
Avira 2015 防毒軟體商業政府教育解決方案Avira 2015 防毒軟體商業政府教育解決方案
Avira 2015 防毒軟體商業政府教育解決方案
Cheer Chain Enterprise Co., Ltd.
 
Secure Coding for Java - An Introduction
Secure Coding for Java - An IntroductionSecure Coding for Java - An Introduction
Secure Coding for Java - An Introduction
Sebastien Gioria
 
Security Testing
Security TestingSecurity Testing
Security Testing
BJ Edward Taduran
 
April 2017 patch tuesday ivanti
April 2017 patch tuesday ivantiApril 2017 patch tuesday ivanti
April 2017 patch tuesday ivanti
Chris Goettl
 
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Symantec
 
100%-ный контроль для 100%-ной безопасности
100%-ный контроль для 100%-ной безопасности100%-ный контроль для 100%-ной безопасности
100%-ный контроль для 100%-ной безопасности
Альбина Минуллина
 
RISC-V-Day-Tokyo2018-suzaki
RISC-V-Day-Tokyo2018-suzakiRISC-V-Day-Tokyo2018-suzaki
RISC-V-Day-Tokyo2018-suzaki
Kuniyasu Suzaki
 
Astaro Orange Paper Oss Myths Dispelled
Astaro Orange Paper Oss Myths DispelledAstaro Orange Paper Oss Myths Dispelled
Astaro Orange Paper Oss Myths Dispelled
losalamos
 
Presentatie McAfee: Optimale Endpoint Protection 26062015
Presentatie McAfee: Optimale Endpoint Protection 26062015Presentatie McAfee: Optimale Endpoint Protection 26062015
Presentatie McAfee: Optimale Endpoint Protection 26062015
SLBdiensten
 

What's hot (18)

Web Application Frewall
Web Application FrewallWeb Application Frewall
Web Application Frewall
 
Web Intrusion Detection
Web Intrusion Detection Web Intrusion Detection
Web Intrusion Detection
 
ACSAC2020 "Return-Oriented IoT" by Kuniyasu Suzaki
ACSAC2020 "Return-Oriented IoT" by Kuniyasu SuzakiACSAC2020 "Return-Oriented IoT" by Kuniyasu Suzaki
ACSAC2020 "Return-Oriented IoT" by Kuniyasu Suzaki
 
Hackcon 2017
Hackcon 2017Hackcon 2017
Hackcon 2017
 
WAFEC
WAFECWAFEC
WAFEC
 
Catching Multilayered Zero-Day Attacks on MS Office
Catching Multilayered Zero-Day Attacks on MS OfficeCatching Multilayered Zero-Day Attacks on MS Office
Catching Multilayered Zero-Day Attacks on MS Office
 
January2017 patchtuesdayshavlik
January2017 patchtuesdayshavlikJanuary2017 patchtuesdayshavlik
January2017 patchtuesdayshavlik
 
How We Stopped Being Just Antivirus and Became a Unique Industrial Infrastruc...
How We Stopped Being Just Antivirus and Became a Unique Industrial Infrastruc...How We Stopped Being Just Antivirus and Became a Unique Industrial Infrastruc...
How We Stopped Being Just Antivirus and Became a Unique Industrial Infrastruc...
 
DEF CON 27 - workshop ANTHONY ROSE - introduction to amsi bypasses and sandbo...
DEF CON 27 - workshop ANTHONY ROSE - introduction to amsi bypasses and sandbo...DEF CON 27 - workshop ANTHONY ROSE - introduction to amsi bypasses and sandbo...
DEF CON 27 - workshop ANTHONY ROSE - introduction to amsi bypasses and sandbo...
 
Avira 2015 防毒軟體商業政府教育解決方案
Avira 2015 防毒軟體商業政府教育解決方案Avira 2015 防毒軟體商業政府教育解決方案
Avira 2015 防毒軟體商業政府教育解決方案
 
Secure Coding for Java - An Introduction
Secure Coding for Java - An IntroductionSecure Coding for Java - An Introduction
Secure Coding for Java - An Introduction
 
Security Testing
Security TestingSecurity Testing
Security Testing
 
April 2017 patch tuesday ivanti
April 2017 patch tuesday ivantiApril 2017 patch tuesday ivanti
April 2017 patch tuesday ivanti
 
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
 
100%-ный контроль для 100%-ной безопасности
100%-ный контроль для 100%-ной безопасности100%-ный контроль для 100%-ной безопасности
100%-ный контроль для 100%-ной безопасности
 
RISC-V-Day-Tokyo2018-suzaki
RISC-V-Day-Tokyo2018-suzakiRISC-V-Day-Tokyo2018-suzaki
RISC-V-Day-Tokyo2018-suzaki
 
Astaro Orange Paper Oss Myths Dispelled
Astaro Orange Paper Oss Myths DispelledAstaro Orange Paper Oss Myths Dispelled
Astaro Orange Paper Oss Myths Dispelled
 
Presentatie McAfee: Optimale Endpoint Protection 26062015
Presentatie McAfee: Optimale Endpoint Protection 26062015Presentatie McAfee: Optimale Endpoint Protection 26062015
Presentatie McAfee: Optimale Endpoint Protection 26062015
 

Viewers also liked

сказки про «полезные» оптимизаторы памяти
сказки про «полезные» оптимизаторы памятисказки про «полезные» оптимизаторы памяти
сказки про «полезные» оптимизаторы памятиbelhonka
 
Технические результаты всего дня 4 февраля 2011 года работы Робота Челенджер...
Технические результаты всего дня 4 февраля 2011 года  работы Робота Челенджер...Технические результаты всего дня 4 февраля 2011 года  работы Робота Челенджер...
Технические результаты всего дня 4 февраля 2011 года работы Робота Челенджер...
belhonka
 
Working 4 yourself
Working 4 yourselfWorking 4 yourself
Working 4 yourself
Trevor Galley
 
Проект «Домашняя студия»
Проект «Домашняя студия»Проект «Домашняя студия»
Проект «Домашняя студия»belhonka
 
Ob m5,m6,m7
Ob m5,m6,m7Ob m5,m6,m7

Viewers also liked (6)

сказки про «полезные» оптимизаторы памяти
сказки про «полезные» оптимизаторы памятисказки про «полезные» оптимизаторы памяти
сказки про «полезные» оптимизаторы памяти
 
Технические результаты всего дня 4 февраля 2011 года работы Робота Челенджер...
Технические результаты всего дня 4 февраля 2011 года  работы Робота Челенджер...Технические результаты всего дня 4 февраля 2011 года  работы Робота Челенджер...
Технические результаты всего дня 4 февраля 2011 года работы Робота Челенджер...
 
Working 4 yourself
Working 4 yourselfWorking 4 yourself
Working 4 yourself
 
monleon-corredor
monleon-corredormonleon-corredor
monleon-corredor
 
Проект «Домашняя студия»
Проект «Домашняя студия»Проект «Домашняя студия»
Проект «Домашняя студия»
 
Ob m5,m6,m7
Ob m5,m6,m7Ob m5,m6,m7
Ob m5,m6,m7
 

Similar to инструкции и утилиты для удаления остатков антивирусных программ

Win av as_pm_de_3_6_10363_2
Win av as_pm_de_3_6_10363_2Win av as_pm_de_3_6_10363_2
Win av as_pm_de_3_6_10363_2
Bloombase
 
The Various Classes of Antivirus!
The Various Classes of Antivirus!The Various Classes of Antivirus!
The Various Classes of Antivirus!
Enetfix (Pairsys, Inc.)
 
Top 10 antiviruses
Top 10 antivirusesTop 10 antiviruses
Top 10 antiviruses
university of education,Lahore
 
Adware
AdwareAdware
Adware
zelkan19
 
Adware
AdwareAdware
Adware
zelkan19
 
Avast Antivirus
Avast AntivirusAvast Antivirus
Avast Antivirus
Mizamk
 
Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2
Bloombase
 
List of Malwares
List of MalwaresList of Malwares
List of Malwares
Vishalya Dulam
 
Top 10 antivirus 2017 by mohsin a li dahar khairpur
Top 10 antivirus 2017 by mohsin a li dahar khairpurTop 10 antivirus 2017 by mohsin a li dahar khairpur
Top 10 antivirus 2017 by mohsin a li dahar khairpur
Mohsin Dahar
 
Venkasure Antivirus + Internet Security
Venkasure Antivirus + Internet SecurityVenkasure Antivirus + Internet Security
Venkasure Antivirus + Internet Security
venkasureantivirus
 
Venka sure Antivirus+Internet Security
Venka sure Antivirus+Internet SecurityVenka sure Antivirus+Internet Security
Venka sure Antivirus+Internet Security
Venkasys Technologies Pvt. Ltd.
 
Kaspersky antivirus ppt
Kaspersky antivirus pptKaspersky antivirus ppt
Kaspersky antivirus ppt
Dipak Bamugade
 
Cansecwest - The Death of AV defence in depth
Cansecwest - The Death of AV defence in depthCansecwest - The Death of AV defence in depth
Cansecwest - The Death of AV defence in depth
Thierry Zoller
 
10 security enhancements
10 security enhancements10 security enhancements
10 security enhancements
Vishal Gurujuwada
 
Avc report25
Avc report25Avc report25
Avc report25
Era Brown
 
Avast product brochure
Avast product brochureAvast product brochure
Avast product brochure
ptoone
 
Antivirus test-wholedynamic2010
Antivirus test-wholedynamic2010Antivirus test-wholedynamic2010
Antivirus test-wholedynamic2010
nuttakorn nakkerd
 
Colby_Sawyer_white_paper final 2
Colby_Sawyer_white_paper final 2Colby_Sawyer_white_paper final 2
Colby_Sawyer_white_paper final 2
Scott Brown
 
Spyware and adware
Spyware and  adwareSpyware and  adware
Spyware and adware
Raja Kiran
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
Sejahtera Affif
 

Similar to инструкции и утилиты для удаления остатков антивирусных программ (20)

Win av as_pm_de_3_6_10363_2
Win av as_pm_de_3_6_10363_2Win av as_pm_de_3_6_10363_2
Win av as_pm_de_3_6_10363_2
 
The Various Classes of Antivirus!
The Various Classes of Antivirus!The Various Classes of Antivirus!
The Various Classes of Antivirus!
 
Top 10 antiviruses
Top 10 antivirusesTop 10 antiviruses
Top 10 antiviruses
 
Adware
AdwareAdware
Adware
 
Adware
AdwareAdware
Adware
 
Avast Antivirus
Avast AntivirusAvast Antivirus
Avast Antivirus
 
Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2
 
List of Malwares
List of MalwaresList of Malwares
List of Malwares
 
Top 10 antivirus 2017 by mohsin a li dahar khairpur
Top 10 antivirus 2017 by mohsin a li dahar khairpurTop 10 antivirus 2017 by mohsin a li dahar khairpur
Top 10 antivirus 2017 by mohsin a li dahar khairpur
 
Venkasure Antivirus + Internet Security
Venkasure Antivirus + Internet SecurityVenkasure Antivirus + Internet Security
Venkasure Antivirus + Internet Security
 
Venka sure Antivirus+Internet Security
Venka sure Antivirus+Internet SecurityVenka sure Antivirus+Internet Security
Venka sure Antivirus+Internet Security
 
Kaspersky antivirus ppt
Kaspersky antivirus pptKaspersky antivirus ppt
Kaspersky antivirus ppt
 
Cansecwest - The Death of AV defence in depth
Cansecwest - The Death of AV defence in depthCansecwest - The Death of AV defence in depth
Cansecwest - The Death of AV defence in depth
 
10 security enhancements
10 security enhancements10 security enhancements
10 security enhancements
 
Avc report25
Avc report25Avc report25
Avc report25
 
Avast product brochure
Avast product brochureAvast product brochure
Avast product brochure
 
Antivirus test-wholedynamic2010
Antivirus test-wholedynamic2010Antivirus test-wholedynamic2010
Antivirus test-wholedynamic2010
 
Colby_Sawyer_white_paper final 2
Colby_Sawyer_white_paper final 2Colby_Sawyer_white_paper final 2
Colby_Sawyer_white_paper final 2
 
Spyware and adware
Spyware and  adwareSpyware and  adware
Spyware and adware
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
 

Recently uploaded

Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 

Recently uploaded (20)

Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 

инструкции и утилиты для удаления остатков антивирусных программ

  • 1. Agnitum Outpost Сlean<br />Cleaner32Cleaner64Инструкции <br />Avira Uninstall Tools<br />Утилита для чистки реестра после удаления продуктов AviraВНИМАНИЕ! Не явяется основным инструментом удаленя.Avira AntiVir RegistryCleanerКак удалить ПО Avira Software?Инструкция для удаления вручную <br />Аvast! - Alwil Software Uninstall Utility<br />aswClear5aswClearИнструкция <br />AVG Software Remover Utility<br />AVG Remover x32AVG Remover x64AVG Identity Protection Remover <br />BitDefender Uninstall Tool<br />Uninstall ToolИнструкция <br />Comodo Uninstall Tool<br />CIS Clean-up ToolCIS Clean-up Tool (Зеркало)Инструкция <br />Dr.Web Anti-virus Remover<br />Аварийное средство, предназначенное для удаления «остатков» от некорректных/поврежденных инсталляций ПО Dr.Web for Windows версий 4.33, 4.44, 5.0, 6.0 и клиентской части Dr.Web Enterprise Suite тех же версий в тех случаях, когда применение штатных средств удаления недоступно или не работает. Утилита не предназначена для использования в качестве основного стандартного средства деинсталляции ПО Dr.WebDRW Remover.exe <br />F-Secure Uninstallation Tool<br />RemoverИнструкция <br />Kaspersky Lab products<br />RemoverИнструкция по удалению KIS2010Инструкция по удалению KIS2011 <br />McAfee Cleanup<br />RemoverИнструкция <br />Symantec: Norton Removal Tool<br />СкачатьИнструкции по удалению корпоративных продуктов Symantec<br /> <br />NOD32 Antivirus Removal<br />ESETUninstallernod32removal.exe <br />Trend Micro<br />Trend Micro Diagnostic Toolkit x32Trend Micro Diagnostic Toolkit x64Инструкция для Win XPИнструкция для Vista & Win7 <br />Panda<br />Remover <br />ZoneAlarm Removal Tool<br />cpes_clean.exe <br />Sunbelt CounterSpy & Viper<br />Agent removal <br />G Data<br />AVKCleaner <br />Webroot Spysweeper Removal Tool<br />RemoverИнструкция <br />eScan<br />Esremove <br />Uninstall Norman Virus Control<br />Delnvc5.exeИнструкция <br />QuickHeal Removal Tool<br />Remover <br />K7 Total Security<br />K7 Removal tool <br />BullGuard<br />BG UninstallИнструкция <br />Malwarebytes Anti-Malware<br />MBAM Clean <br />IObit Removal Tool<br />BitRemover <br />Windows Live OneCare Cleanup Tool<br />OneCare CleanUp <br />Microsoft Security Essentials<br />Инструкция <br />F-PROT Antivirus for Windows<br />Инструкция <br />Sophos<br />Инструкция <br />PC Tools Antivirus<br />Инструкция <br />LavaSoft<br />Инструкция <br />ParetoLogic<br />Инструкция <br />AppRemover<br />Неофициальная утилита для удаления продуктов<br />Скачать<br />Список удаляемых антивирусных продуктов:<br />LegendVerified Supported by OPSWAT LabsVerified Supported through Community FeedbackVendorProductWinXPVistaWin7x32x64x32x64x32x64AhnLab, Inc.AhnLab V3 Internet Security 8.0 8.xALWIL Softwareavast! Free Antivirus 6.0.1000ALWIL Softwareavast! Free Antivirus 5.xALWIL Softwareavast! Free Antivirus 5.0.xALWIL Softwareavast! Internet Security 5.xALWIL Softwareavast! Antivirus 4.8.xALWIL Softwareavast! Antivirus Professional 4.8.xAnonymizer, Inc.Anonymizer Anti-Spyware 3.xAVG TechnologiesAVG 8.0 [AntiSpyware] 8.5.xAVG TechnologiesAVG Internet Security 8.5.xAVG TechnologiesAVG Anti-Virus Free 8.5.xAVG TechnologiesAVG Anti-Virus Free 9.xAVG TechnologiesAVG LinkScanner 9.xAVG TechnologiesAVG LinkScanner 8.5.xAVG TechnologiesAVG 9 [AntiVirus] 9.xAVG TechnologiesAVG 8.0 [AntiVirus] 8.5.xAVG TechnologiesAVG 10 [AntiVirus] 10.0.1153AVG TechnologiesAVG Anti-Virus Free [AntiSpyware] 9.xAVG TechnologiesAVG Anti-Virus Free [AntiSpyware] 8.5.xAVG TechnologiesAVG Identity Protection 9.xAVG TechnologiesAVG Identity Protection 8.5.xAVG TechnologiesAVG 9 [AntiSpyware] 9.xAvira GmbHAvira AntiVir Personal - Free Antivirus 9.xAvira GmbHAvira AntiVir Personal - Free Antivirus 10.xAvira GmbHAvira AntiVir Premium 10.0.0.603Avira GmbHAvira AntiVir Premium 9.xAvira GmbHAvira Premium Security Suite 9.xAvira GmbHAvira AntiVir Professional 9.xAvira GmbHAvira AntiVir Professional 10.0.0.911Beijing Rising Technology Corp. Ltd.Rising AntiVirus 23.00.13.41Beijing Rising Technology Corp. Ltd.Rising Internet Security 21.30.30BullGuard Ltd.Bullguard Internet Security Suite 8.5BullGuard Ltd.Bullguard Internet Security Suite 8.7Cat Computer Services Pvt. Ltd.Quick Heal Total Security [AntiSpyware] 10.xCat Computer Services Pvt. Ltd.Quick Heal Total Security 10.xCentral Command, Inc.Vexira Antivirus 6.3.14CJSC Returnil SoftwareReturnil System Safe 3.2.12385.5757ClamWinClamWin Free Antivirus 0.97Computer Associates International, Inc.CA eTrustITM Agent 8.xComputer Associates International, Inc.CA Anti-Virus Plus 2.xComputer Associates International, Inc.CA Anti-Virus Plus 3.0.0.99Computer Associates International, Inc.CA eTrust Internet Security Suite AntiSpyware 10.xComputer Associates International, Inc.CA Anti-Virus 9.xComputer Associates International, Inc.CA eTrust Antivirus 7.1.192Coranti, Inc.Coranti 2010 [Antivirus] 1.003.00001CyberDefender Corp.CyberDefender AntiVirus 6.08.26.01eEye Digital SecurityeEye Digital Security Blink Professional 4.6.5eEye Digital SecurityeEye Digital Security Blink Professional 4.4.2Emsi Software GmbHEmsisoft Mamutu 3.0.0.18Eset SoftwareNOD32 antivirus system 2.xEset SoftwareESET Smart Security 4.xEset SoftwareESET Smart Security 3.xEset SoftwareESET NOD32 Antivirus 3.xEset SoftwareESET NOD32 Antivirus 4.xESTsoft Corp.ALYac 2.5.0.2F-Secure Corp.F-Secure Anti-Virus (AntiSpyware) 9.xF-Secure Corp.F-Secure Internet Security 9.xF-Secure Corp.F-Secure Internet Security (AntiSpyware) 9.xF-Secure Corp.F-Secure Anti-Virus 8.xF-Secure Corp.F-Secure Anti-Virus 9.xFortinet Inc.FortiClient 4.1.3.143Frisk Software InternationalF-PROT Antivirus for Windows 6.0.9.3GData Software AGG DATA AntiVirus 2011 21.0.2.1HAURI, Inc.ViRobot Desktop 5.5IObitAdvanced System Care 3.xK7 Computing Pvt. Ltd.ウイルスセキュリティ 9.xK7 Computing Pvt. Ltd.ウイルスセキュリティ 10.xKaspersky LabsKaspersky Internet Security 8.0 8.xKaspersky LabsKaspersky Anti-Virus 6.0 6.xKaspersky LabsKaspersky Anti-Virus 2009 8.xKaspersky LabsKaspersky Internet Security 9.xKaspersky LabsKaspersky Anti-Virus 9.xKephyrBazooka Scanner 1.xKingsoft Corp.Kingsoft AntiVirus 2010.08.22.247Kingsoft Corp.Kingsoft AntiVirus 2010.07.08.909Lavasoft, Inc.Ad-Aware 8.xMalwarebytes CorporationMalwarebytes Anti-Malware 1.xMcAfee, Inc.McAfee VirusScan Enterprise 7.1.0.xMcAfee, Inc.McAfee VirusScan Enterprise 8.7.xMcAfee, Inc.McAfee VirusScan Enterprise 8.5.xMcAfee, Inc.McAfee VirusScan AS 13.xMcAfee, Inc.McAfee VirusScan AS 12.xMcAfee, Inc.McAfee VirusScan 9.xMcAfee, Inc.McAfee VirusScan 13.xMcAfee, Inc.McAfee VirusScan 12.xMcAfee, Inc.McAfee VirusScan 8.xMcAfee, Inc.McAfee VirusScan 10.xMicroSmarts LLCSpyware Begone V7.30 7.30.xMicrosoft Corp.Microsoft Security Essentials [Antivirus] 1.xMicrosoft Corp.Windows Defender 1.xMicrosoft Corp.Microsoft Security Essentials [Antispyware] 1.xMicrosoft Corp.Windows Live OneCare 2.xNorman ASANorman Virus Control 5.99Panda SoftwarePanda Cloud Antivirus 1.04Panda SoftwarePanda ActiveScan 2.0 01.xPanda SoftwarePanda Internet Security 2007 11.xPanda SoftwarePanda Antivirus Pro 2010 9.xPanda SoftwarePanda Internet Security 2010 15.xPC Tools SoftwarePC Tools AntiVirus 2009 6.xPC Tools SoftwarePC Tools AntiVirus Free 2010 7.0.0.545Quick Heal Technologies (P) Ltd.Quick Heal Total Security 12.00SOFTWINBitDefender Total Security 2009 12.xSOFTWINBitDefender Internet Security 2010 13.xSOFTWINBitDefender Antivirus v10 10.xSOFTWINBitDefender Antivirus 2010 13.0.19.347SOFTWINBitDefender Antivirus 2010 13.0.21.347SOFTWINBitDefender Antivirus v10 AS 10.xSOFTWINBitDefender Total Security 2010 13.xSophos Plc.Sophos Anti-Virus 9.0.4Sophos Plc.Sophos Anti-Virus 9.xSophos Plc.Sophos Anti-Virus 7.xSUPERAntiSpyware.comSUPERAntiSpyware Free Edition 4.xSymantec Corp.Symantec Hosted Endpoint Protection 2.01.10.1371Symantec Corp.Symantec AntiVirus Win64 10.xSymantec Corp.Norton 360 (Symantec Corporation) 3.xSymantec Corp.Norton 360 (Symantec Corporation) 1.xSymantec Corp.Norton 360 (Symantec Corporation) 2.xSymantec Corp.Symantec AntiVirus 10.xSymantec Corp.Norton 360 4.0.0.127Symantec Corp.Symantec Endpoint Protection 11.xSymantec Corp.Symantec Endpoint Protection 12.xSymantec Corp.Norton AntiVirus [AntiSpyware] 16.xSymantec Corp.Norton AntiVirus [AntiSpyware] 17.xSymantec Corp.Norton 360 [AntiSpyware] 3.xSymantec Corp.Symantec AntiVirus Client 8.xSymantec Corp.Norton AntiVirus 14.xSymantec Corp.Norton AntiVirus 17.xSymantec Corp.Norton AntiVirus 18.1.0.37Symantec Corp.Norton Internet Security [AntiSpyware] 16.xSymantec Corp.Norton Internet Security 17.xSymantec Corp.Norton Internet Security 16.xTenebril Inc.SpyCatcher 5.xTrend Micro, Inc.Trend Micro PC-cillin Internet Security 2005 12.xTrend Micro, Inc.Trend Micro PC-cillin Internet Security 2006 14.xTrend Micro, Inc.Trend Micro Anti-Virus 17.xTrend Micro, Inc.Trend Micro OfficeScan Client 10.xTrend Micro, Inc.Trend Micro OfficeScan Client 8.xTrend Micro, Inc.Trend Micro Internet Security 17.xTrend Micro, Inc.Trend Micro OfficeScan Client (AntiSpyware) 10.xTrustPort, a.s.TrustPort Antivirus 5.0.0.4127VirusBuster Ltd.VirusBuster Personal 6.3.14Webroot Software, Inc.Webroot AntiVirus 7.0.9.22Yahoo!, Inc.CA Yahoo! Anti-Spy 2.x<br />