RogueKiller (64 bit) Background
RogueKiller (64 bit) Icon

Scan and kill malicious processes on your Windows PC.

402
Downloads
-
0 Ratings
All Versions
402
Total Downloads
0
Downloads Last Week
Current Version
0
Total Downloads
0
Downloads Last Week
Downloads Last 10 Weeks
All Versions
-
0 Ratings
5
4
3
2
1
Current Version
-
0 Ratings
5
4
3
2
1

RogueKiller (64 bit)Overview

RogueKiller is a tool written in C++, which scans the running processes, and kills those which are malicious. It developed based on speed execution, which will clean the running processes before being killed, and on demand will clean the registry in order to make a faster and safer disinfection then with the usual tools. The tool does not remove files (except malicious .lnk in the startup folder), so you will have to clean then with MBAM (Malwarebytes Anti-Malware).

New

Added detections.
...

RogueKiller (64 bit)Tech Specs

Version
12.11.5
Date
07.03.17
License
Free
Language
English
File Size
25.23MB
Category
SubCategory
Operating Systems
Windows 2000/XP/Vista/7/8
System Requirements
No additional system requirements.

SelectedFor You

Windows Defender Icon
Microsoft Corporation
Windows Defender protect your files and personal settings, and protect password.
WinPatrol Icon
BillP Studios
WinPatrol offers very powerful protection.
SuperAntiSpyware Free Edition Icon
SUPERAntiSpyware
Detect and remove spyware, malware, rootkits, trojans, hijackers, and other malicious threats.
Spybot - Search & Destroy Icon
Safer Networking Ltd.
Detect and remove a multitude of adware files and modules from your computer.
SpywareBlaster Icon
Javacool Software LLC.
SpywareBlaster - anti spyware,clean spyware,provide protection solution.
Spyware Doctor Starter Edition Icon
PC Tools
This software provides advanced technologh designed for all the people.
Spyware Terminator Icon
PCRx.com
Free real-time protection against spyware and adware.
Malwarebytes Anti-Exploit Icon
Malwarebytes
Wrap three layers of security around popular browsers and applications, preventing exploits from compromising vulnerable code.