
{"id":3066,"date":"2016-08-01T22:24:35","date_gmt":"2016-08-01T21:24:35","guid":{"rendered":"https:\/\/www.trucnet.com\/?p=3066"},"modified":"2016-08-01T22:24:35","modified_gmt":"2016-08-01T21:24:35","slug":"roguekiller-v11-0-4-21-portable-3264bits","status":"publish","type":"post","link":"https:\/\/www.trucnet.com\/en\/roguekiller-v11-0-4-21-portable-3264bits\/","title":{"rendered":"RogueKiller V11.0.4 21 + Portable (32\/64Bits)"},"content":{"rendered":"<p>RogueKiller is an anti-malware program written in C++ and capable of detecting and removing generic malware and some advanced threats such as rootkits.<\/p>\n<p><strong>DETECTION COLORS<\/strong><br \/>\nSince RogueKiler V9, detection colors are standardized. Please review this section before deciding what should be removed.<\/p>\n<p>Red: Known malware, high detection rate<br \/>\nOrange: Possible malware. Often has a suspicious path and is tagged PUP (Potentially Unwanted Program).<br \/>\nGray: Suspicious (Unchecked by default) Reserved for PUMs (Potentially Unwanted Modifications). This applies to proxies, DNS configurations, etc.<br \/>\nGreen: Not detected as malware. This means the item is displayed for informational purposes only, but is not intended to be deleted (unless you decide to do so).<\/p>\n<p>Based on generic methods for finding malware because of its behavior (heuristics), on generic anti-malware analyses (signature search) and on undocumented hacks, RogueKiller can find\/remove most basic malware (rogues, trojans) and some advanced threats like ZeroAccess or TDSS which behave more like rootkits.<br \/>\nRogueKiller is a lightweight anti-malware program maintained by a small team, and as such, its detections are based on the most widespread threats. We react quickly to integrate the detection and removal of what we believe to be a global threat that could affect the largest number of people as soon as possible.<\/p>\n<p><strong>Here is a summary of RogueKiller&#039;s capabilities:<\/strong><br \/>\nKill the malicious processes<br \/>\nStop the malicious services<br \/>\nUnload malicious DLLs from processes<br \/>\nFind\/Kill hidden processes<br \/>\nFind and remove malicious startup entries, including:<br \/>\nRegister entries (RUN\/RUNONCE)<br \/>\nScheduled tasks (1.0\/2.0)<br \/>\nStarter folders<br \/>\nFind and remove registry hijackings, including:<br \/>\nShell\/Load Inputs<br \/>\nFile association hijacking<br \/>\nDLL hijacking<br \/>\nMany other things<br \/>\nRead\/Delete DNS hijackings (Reset DNS button)<br \/>\nRead\/Remove malicious proxies (Clear Proxy button)<br \/>\nRead\/Delete malicious Hosts entries (Reset Hosts button)<br \/>\nRepairing shortcuts\/files hidden by Fake HDD rogues<br \/>\nReading\/Deleting malicious Master Boot Records (MBRs), even those hidden behind a rootkit<br \/>\nListing \/ Removing SSDT Shadow SSDT IRP hooks (even inline hooks)<br \/>\nSearching for and removing system files patched\/hidden by a rootkit<\/p>\n<p>\u2013 RogueKiller is an antivirus computer program written in C\/C++, which scans running Windows processes and kills those that are malicious.<br \/>\nThe program is based on threat targeting: it cleans up running processes and, on request, cleans the registry. It also has additional features (restoration of the Hosts file, Proxy and DNS configurations, recovery of hidden files).<br \/>\n\u2013 RogueKiller is capable of analyzing and removing malicious registry keys, as well as scheduled tasks, autostart folders, and suspicious or known file locations.<br \/>\n\u2013 RogueKiller&#039;s new version features a graphical interface. This makes it easier to choose which modes to use and to uncheck any false positives before deletion.<br \/>\n\u2013 RogueKiller also detects certain rootkits and their bypass methods such as SSDT hooks, Shadow SSDT, IRP, hidden processes, hidden registry keys and Master Boot Record (MBR) hijacking.<br \/>\n\u2013 RogueKiller also allows restoring functional internet access in certain cases such as DNS configuration hijacking, the installation of a malicious proxy, or hijacking of the use of the Hosts file.<br \/>\n\u2013 Finally, the program allows you to recover all files \/ folders as well as shortcuts hidden by rogues of type \u201cFake HDD\u201d (System Check, System Restore, System Fix, \u2026).<\/p>\n<p>RogueKiller is a GUI-based tool (since the new version), so it&#039;s easy to use. However, some people may have difficulty interpreting the results and knowing what to do next. This is normal; malware removal can sometimes be complicated. Contact support, or better yet, take the report and post it on the forum. They know how to interpret it and will guide you through the removal process (free of charge).<\/p>\n<p><strong>Configuration:<\/strong><br \/>\n\u2013 Windows: windows xp a 10 (32 and 64 bit)<br \/>\n\u2013 Intel Pentium 4 1GHz processor<br \/>\n\u2013 512 MB RAM<br \/>\n\u2013 Hard drive with a minimum of 50MB of available space<\/p>\n<p><strong>Facility:<\/strong><br \/>\n0) Important: Windows 8 users, disabling SmartScreen is mandatory<br \/>\n1) Run RogueKillerX64 or RogueKillerX86 depending on your system<br \/>\n2) or setup to install it<\/p>\n<ul>\n<li>Language: French<\/li>\n<li>Size: 72.5 MB<\/li>\n<\/ul>\n<p><a href=\"https:\/\/1fichier.com\/?53vayjs32h\" class=\"su-button su-button-style-flat\" style=\"color:#FFFFFF;background-color:#008A56;border-color:#006f45;border-radius:6px\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"color:#FFFFFF;padding:6px 18px;font-size:14px;line-height:21px;border-color:#4dae89;border-radius:6px;text-shadow:0px 0px 2px #000000\"><i class=\"sui sui-arrow-circle-down\" style=\"font-size:14px;color:#FFFFFF\"><\/i> DOWNLOAD<small style=\"padding-bottom:6px;color:#FFFFFF\">Server 1File<\/small><\/span><\/a><\/p>\n<p><a href=\"http:\/\/uptobox.com\/80x5dkfkwaa5\" class=\"su-button su-button-style-flat\" style=\"color:#FFFFFF;background-color:#008A56;border-color:#006f45;border-radius:6px\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"color:#FFFFFF;padding:6px 18px;font-size:14px;line-height:21px;border-color:#4dae89;border-radius:6px;text-shadow:0px 0px 2px #000000\"><i class=\"sui sui-arrow-circle-down\" style=\"font-size:14px;color:#FFFFFF\"><\/i> DOWNLOAD<small style=\"padding-bottom:6px;color:#FFFFFF\">Uptobox server<\/small><\/span><\/a><\/p>\n<p><a href=\"https:\/\/mega.nz\/#!V5VjGRQA!BpEsO3Cx3QnSl_vaZylp48kqIa2NdeKy4iH-eg6vwHc\" class=\"su-button su-button-style-flat\" style=\"color:#FFFFFF;background-color:#008A56;border-color:#006f45;border-radius:6px\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"color:#FFFFFF;padding:6px 18px;font-size:14px;line-height:21px;border-color:#4dae89;border-radius:6px;text-shadow:0px 0px 2px #000000\"><i class=\"sui sui-arrow-circle-down\" style=\"font-size:14px;color:#FFFFFF\"><\/i> DOWNLOAD<small style=\"padding-bottom:6px;color:#FFFFFF\">Mega Server<\/small><\/span><\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>RogueKiller est un programme anti-malware \u00e9crit en C++ et capable de d\u00e9tecter et supprimer des malware g\u00e9n\u00e9riques et quelques menaces avanc\u00e9es comme les rootkits COULEURS DE DETECTION Depuis RogueKiler V9, les couleurs de d\u00e9tection sont normalis\u00e9es. Merci de regarder cette section avant de d\u00e9cider ce qui doit \u00eatre supprimer ou pas Rouge: Malware connu Fort [&hellip;]<\/p>","protected":false},"author":1,"featured_media":3067,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_lmt_disableupdate":"no","_lmt_disable":"","_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[8,1749],"tags":[897,294,1783,564,899,1782,131,1784],"class_list":["post-3066","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-logiciels","category-securite","tag-anti-malware","tag-antivirus","tag-hack","tag-logiciel","tag-malware","tag-roguekiller","tag-securite","tag-unwanted"],"aioseo_notices":[],"modified_by":"Auteur","_links":{"self":[{"href":"https:\/\/www.trucnet.com\/en\/wp-json\/wp\/v2\/posts\/3066","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.trucnet.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.trucnet.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.trucnet.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.trucnet.com\/en\/wp-json\/wp\/v2\/comments?post=3066"}],"version-history":[{"count":0,"href":"https:\/\/www.trucnet.com\/en\/wp-json\/wp\/v2\/posts\/3066\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.trucnet.com\/en\/wp-json\/wp\/v2\/media\/3067"}],"wp:attachment":[{"href":"https:\/\/www.trucnet.com\/en\/wp-json\/wp\/v2\/media?parent=3066"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.trucnet.com\/en\/wp-json\/wp\/v2\/categories?post=3066"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.trucnet.com\/en\/wp-json\/wp\/v2\/tags?post=3066"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}