Home / Spyware Encyclopedia / Rootkit.KillProc.aj << Back

Recommendation to Automatically remove Rootkit.KillProc.aj


Our products can remove Rootkit.KillProc.aj and thousands of other Virus and Spyware automatically and instantly.

Rootkit.KillProc.aj Details


  • Category Rootkit
  • Discovered 9/25/2017 9:12:17 AM
  • Modified 8/1/2023 3:50:14 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
421fc060b5ecad2abff9e2f31130178eba57aeb187994684712ba45efcb41493.sys 68446  05f954a9a9cd80333dbeb83d7f605077 
144545074120b27ac2075bf69eeb5875653dd053eaf6c206fa22486368dad22bb2ddb3657f5535596c35dfb40ed1c.sys 65040  d5d3e4ba5adf5794dfb0b7f89e808f59 
36d38eb40520c903852143950a818581.vir.sys 62428  36d38eb40520c903852143950a818581 
2de81990e065658b3abf08d45d382326.vir.sys 15836  2de81990e065658b3abf08d45d382326 
e9cffb7eae4128562ed788dfc599e834.vir.sys 25052  e9cffb7eae4128562ed788dfc599e834 
31084d64539e36602ce4adb1adbf5036.vir.sys 25068  31084d64539e36602ce4adb1adbf5036 
de3fa4cf0f1e7c39e4c318f194e200d1.vir.sys 62428  de3fa4cf0f1e7c39e4c318f194e200d1 
a3d709778285bfa1c534449f7fb313853bd87f8a169209f2c38aba2128f0b43b.exe 67003  94889ef5b5661233308ead1432dc913603/05/2023
rootkit.win32.killproc.aj-f4a2c214705b943ff6c23657cd26d06c8065571f534de560d5826f5d379ca399.exe 64431  7f187891995051e30352b03e8b7d21cb24/07/2023

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware