0% found this document useful (0 votes)
19 views1 page

Rkill

Rkill 2.9.1, developed by Lawrence Abrams, was executed on a Windows 10 Home system and found no malware services or processes to terminate. The program reset file associations in the Windows Registry and identified several reparse points with unknown targets, but no critical issues were detected. The HOSTS file contained standard entries related to Docker without any significant problems noted.

Uploaded by

avilash1234
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views1 page

Rkill

Rkill 2.9.1, developed by Lawrence Abrams, was executed on a Windows 10 Home system and found no malware services or processes to terminate. The program reset file associations in the Windows Registry and identified several reparse points with unknown targets, but no critical issues were detected. The HOSTS file contained standard entries related to Docker without any significant problems noted.

Uploaded by

avilash1234
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 1

Rkill 2.9.

1 by Lawrence Abrams (Grinler)


http://www.bleepingcomputer.com/
Copyright 2008-2025 BleepingComputer.com
More Information about Rkill can be found at this link:
http://www.bleepingcomputer.com/forums/topic308364.html

Program started at: 04/10/2025 02:07:27 AM in x64 mode.


Windows Version: Windows 10 Home Single Language

Checking for Windows services to stop:

* No malware services found to stop.

Checking for processes to terminate:

* No malware processes found to kill.

Checking Registry for malware related settings:

* No issues found in the Registry.

Resetting .EXE, .COM, & .BAT associations in the Windows Registry.

Performing miscellaneous checks:

* Reparse Point/Junctions Found (These may be legitimate)!

* C:\WINDOWS\ServiceProfiles\LocalService\AppData\Local\Intel\ipfsrv\
ipfsrv.dptf => <Unknown Target> [File]
* C:\WINDOWS\ServiceProfiles\LocalService\AppData\Local\Intel\ipfsrv\
ipfsrv.dptftcs => <Unknown Target> [File]
* C:\WINDOWS\ServiceProfiles\LocalService\AppData\Local\Intel\ipfsrv\
ipfsrv.dptfui => <Unknown Target> [File]
* C:\WINDOWS\ServiceProfiles\LocalService\AppData\Local\Intel\ipfsrv\
ipfsrv.elevated => <Unknown Target> [File]
* C:\WINDOWS\ServiceProfiles\LocalService\AppData\Local\Intel\ipfsrv\
ipfsrv.icst => <Unknown Target> [File]
* C:\WINDOWS\ServiceProfiles\LocalService\AppData\Local\Intel\ipfsrv\
ipfsrv.ipfui => <Unknown Target> [File]
* C:\WINDOWS\ServiceProfiles\LocalService\AppData\Local\Intel\ipfsrv\
ipfsrv.public => <Unknown Target> [File]

Searching for Missing Digital Signatures:

* No issues found.

Checking HOSTS File:

* HOSTS file entries found:

# Copyright (c) 1993-2009 Microsoft Corp.


192.168.29.222 host.docker.internal
192.168.29.222 gateway.docker.internal
127.0.0.1 kubernetes.docker.internal

Program finished at: 04/10/2025 02:07:34 AM


Execution time: 0 hours(s), 0 minute(s), and 6 seconds(s)

You might also like