homeAppSaved.com WINDOWSWINDOWS WEBWEB MACMAC IOSIOS ANDROIDANDROID LINUXLINUX

RogueKiller

search and prevent malware

thumb of RogueKiller
  • Publishers:
    Tigzy
  • License: Free
  • Capacity: 36,1 KB
  • Saved: 4901
  • Update:
  • System: Windows XP/Vista/7/8

RogueKiller 13.2.2 is an anti-malware application written in the C ++ programming language. It can detect and remove malware in general as well as advanced threats such as rootkits and worms through techniques such as diagnostics and signature detection.

Picture 1 of RogueKiller

The main interface of the RogueKiller system scanning software

This software looks for malware that prevents the launch and operation of certain applications and programs. The method of detection and removal of this tool is based on common ways of detecting malware: through heuristics, based on traditional analysis (looking for signs) and based on stealing information. save.

The tool is also capable of scanning registry, host files, proxies, DNS, drivers, MBRs and shortcuts. At the same time, users can deactivate MBR scanning, confirm counterfeit items and run rookit removal mode. RogueKiller provides options for deleting files and fixing operations, MBRs, host files, proxies, DNS and shortcuts.

The scanner also supports multiple user languages, while using less computer resources on the CPU and RAM. The malware scanning process is also very quick. After the scan is complete it will display a list of potential malware detected and allow you to remove them. RogueKiller also contains personal fixes including fixing shortcuts that are missing due to FakeHDD programs, fixing your server files and fixing proxy server hijackers.

Updated in RogueKiller version 11.0.7.0

  • Additional detection capabilities.
  • Fix file scan error when the path contains Unicode characters.
  • Fix license error not recognized due to no Internet connection.
  • Add the Country item in the user agent section of the statistics module.
  • Adjust the definition of AV.Killer. 

The main feature of the RogueKiller software

  • Destroy malicious processes.
  • Block harmful services.
  • Block the loading of malicious DLLs from processes.
  • Detect / destroy potential malicious processes
  • Find and remove malicious programs that run automatically, including:
    • Registry keys (RUN / RUNONCE, .)
    • Tasks Scheduler (1.0 / 2.0)
    • Startup folder
  • Find and remove registry hijackers, including:
    • Shell / Load items
    • The extended hijack
    • The hijack DLL
  • Read / fix DNS hijack ( DNS Fix button)
  • Read / fix proxy hijack ( Proxy Fix button)
  • Read / fix host hijack ( Hosts Fix button)
  • Restore hidden shortcuts / files with rogue type HDD rogue
  • Read / correct malicious MBRs, including hidden rookit MBRs
  • List / fix SSDT - Shadow SSDT - IRP Hook
  • Search and restore rookit system files forged

RogueKiller is a lightweight application, both installed and portable. It uses less CPU and RAM resources, does the job quickly.

RogueKiller supports languages: French,English,Chinese,Czech,German,Greek,Italian,Dutch,Portuguese,Russian,Spanish,Slovak.

In short, although the interface is not intuitive, or too attractive, RogueKiller is a quite powerful tool for detecting and removing suspicious activities from the system.

Instructions for using RogueKiller

If you download the Portable version, you just need to double-click the executable file to launch the application without going through the complicated installation steps as above.

If you download the installation, follow these steps:

Step 1 : After downloading RogueKiller to your computer, close all running programs.

Step 2 : For Windows Vista / 7, right-click, select Run as Administrator , and other versions of Windows simply double-click the file RogueKiller.exe.

Step 3 : When the message box appears, type 1 and confirm. When the report opens you save and send.

Step 4 : If the program has been blocked, you should try again a few times, if not, rename it to winlogon.exe , or rename to .com (for example   RogueKiller.com).

Attention:

  • When it detects a register key, and you are sure it belongs to Rogue, press Mode 2 .
  • If the HOST file is corrupted, select Mode 3 to restore a clean copy.
  • If you notice any strange proxies, run Mode 4 .
  • Detect malicious DNS, use Mode 5 .
  • Use Mode 6 for malicious shortcuts and startup folders.

Video introduction about RogueKiller