is a miniature application that serves to eliminate rogue processes which profess to be registry cleaners, antivirus programs or even malware cleaners. It is portable and compatible with32 and 64 bit versions of Windows.
On first launch of RogueKiller
, it will search for services and processes that might be hidden on your computer. It scans fast and will rapidly quarantine anything suspicious.
What is more, the Windows Registry does not get new entries, and leftover files do not stay on the hard disk after removing the program.
The interface is based on a standard window with seemingly cluttered options, where a pre-scan mode automatically starts at initialization and kills any suspicious processes. The file list shows the status, type, process ID, name, and path for each item.
The application also has the ability to scan the registry, Hosts file, proxy, DNS, drivers, MBR, and shortcuts. It's possible for you to disable RogueKiller
from scanning the MBR, verifying fake items, and running the anti-rootkit service. It provides options for deleting selected items and repairing services, MBR, Hosts, proxy, DNS and shortcuts.
The program's other characteristics allow RogueKiller
to undo the damage caused by fake antivirus tools, like repairing host files, proxies, DNS and shortcuts. You will even be able to read the Roguekiller developer's opinions on why you most likely got infected.
It is also possible to restore files or shortcuts that were hidden by Fake HDD rogues.
is a straightforward, minimalist program that discovers rogueware of all kinds. It is not for beginners though.
Download and install RogueKiller
safely and without concerns.
RogueKiller highlights and features:
Kill malicious processes
Stop malicious services
Unload malicious DLLs from processes
Kill malicious hidden processes
Find and remove malicious autostart entries
Read / Fix DNS Hijacks (DNS Fix button)
Read / Fix Proxy Hijacks (Proxy Fix button)
Read / Fix Hosts Hijacks (Hosts Fix button)
Restore shortcuts / files hidden by rogues of type "Fake HDD"
Read / Fix malicious Master Boot Record (MBR) -- Even hidden by rootkit
List / Fix SSDT - Shadow SSDT - IRP Hooks (Even with inline hooks)
Find and restore system files patched / faked by a rootkit