0 Members and 1 Guest are viewing this topic.
-kill PID NNNN <-- Terminate the process having the pid NNNN-kill WIN some_window_name_* <-- Terminate the process linked to the windows title some_window_name_*-kill PROC some_process_name.* <-- Terminate the process named some_process_name.-kill SVC svc_name <-- Terminate the Windows Service named svc_name-kill REG "HKEY_LOCAL_MACHINE\<some_key>\<subkey>" <-- Delete the the Registry key HKEY_LOCAL_MACHINE\<some_key>\<subkey>-kill REG "HKEY_LOCAL_MACHINE\<some_key>\<subkey>:<value>" <-- Delete the value <value> of the Registry key HKEY_LOCAL_MACHINE\<some_key>\<subkey>-kill REG "HKEY_LOCAL_MACHINE\<some_key>\<subkey>:(default) <-- Delete the default value (default) of the Registry key HKEY_LOCAL_MACHINE\<some_key>\<subkey>-kill ADS "C:\somefolder\somefile" <-- Delete the Alternate Data Stream linked to the file "somefile".-list PROC <-- Display all running processes-list SVC <-- Display all running services-list REG "HKEY_LOCAL_MACHINE\<some_key>\<subkey>" <-- Display the content of Registry key HKEY_LOCAL_MACHINE\<some_key>\<subkey>-list ADS "C:\somefolder\somefile" <-- Display the content of the Alternate Data Stream linked to the file "somefile".-dump ADS "C:\somefolder\somefile" "C:\targetpath" <-- Dump the content of the Alternate Data Stream linked to the file "somefile" to "targetpath"-scan <-- Start a scan in interactive mode-scan -quickscan <-- Start a scan in interactive Fast mode-scan -no_interact <-- Start a scan in automatic mode-scan "-<any_roguekiller_switch>" <-- Any switches used by RogueKiller V13-activate <license_id> <license_key> <-- Activate RogueKillerCMD premium features-debuglog "C:\targetpath" <-- Start RogueKillerCMD in debug mode and output in "targetpath"