RogueKiller

RogueKiller 14.7

Free
Find and remove viruses, spyware, adware, rootkits, and other malware
4.5  (2 votes)
14.7.3 (See all)

While traditional antivirus tools use virus signatures to detect and remove malware programs, RogueKiller uses behavioral patterns to detect the viruses that other similar tools tend to ignore or simply fail to identify. The program covers all kind of malware, from adware to rootkits and spyware, unmasking all those files that shouldn’t be there on your PC regardless of how harmful they may or may not be.

RogueKiller offers you three scan types – a Standard Scan that checks every single file and folder on your disks, a Quick Scan that searches only in the most commonly used locations, and a Custom Scan, where you can define which areas will be checked for malware. This third option, however, is only available in the paid versions of the program, Personal and Technician. In this sense, this free utility also lacks other interesting functions available in the other plans, such as real-time malware protection, a portable configuration file for portable scans, and document protection against ransomware. Anti-rootkit protection and removal of whatever threats the program may find are fully functional, though. As an extra, RogueKiller keeps a history of all the scan reports produced, as well as the events and the files put in quarantine.

And this is basically what you can expect from this free tool. Despite its simplicity and its limited features, this is a fully functional tool. While other similar tools offer a free version that merely identifies the threats (false positives included) and ask you to upgrade to remove them, you can rest assured that even RogueKiller’s costless plan will detect “and” remove malware programs that traditional antivirus tools tend to ignore or overlook.

Francisco Martínez
Editor rating:

Review summary

Pros

  • Provides three types of scans
  • Produces detailed scan reports
  • Can protect your PC against malware programs
  • Uses predictive behavioral engines to detect threats

Cons

  • Does not include real-time protection
Info updated on: