Home / Spyware Encyclopedia / Rootkit.Protector.x << Back

Recommendation to Automatically remove Rootkit.Protector.x


Our products can remove Rootkit.Protector.x and thousands of other Virus and Spyware automatically and instantly.

Rootkit.Protector.x Details


  • Category Rootkit
  • Discovered 8/8/2023 1:37:35 PM
  • Modified 8/9/2023 3:12:31 PM
  • Threat Level Low
  • Category Description
    A Rootkit is a collection of tools (programs) that enable administrator-level (root) access to a computer or computer network. A Rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection. They are usually hidden and difficult to clean as they ingranulate deeply within the Registry and system files.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
afj04.sys 30848  960451ff667d4911091f2029ac6addcf 
36eb30599195fcf7f386451329bb054fff81c2e24ded1b6a932b4d5f37bd3067.exe 30848  0ab63a712a9309f88ba696c7f9d392b923/01/2020
2b31e20a65b55d48ff641505a0f241fcd93058e33c8bafb3ef412a6daa07b980.exe 30848  e4d01ece0e5408831d29027cd7e8d3e023/01/2020
55c29b85e3e6f3b933f2356ddb0cbce82eb0e1589f40853b9d3d4f25afeaed58.exe 0  33b18f74353f68891e8212d856b6ee2d23/01/2020
211f96c0f31e0bfc55b90334875791da.vir.sys 30848  211f96c0f31e0bfc55b90334875791da 
ecc68c2d34da0637494c324a8c78cb3c.vir.sys 30720  ecc68c2d34da0637494c324a8c78cb3c 
b8645a6032bb2185a6093ee5d2d62633.vir.sys 30848  b8645a6032bb2185a6093ee5d2d62633 
0e1ec1df12be284f8452fe260706a335.vir.sys 30848  0e1ec1df12be284f8452fe260706a335 
f3b19578fd1d8bd369c2514fba66e915.sys 30720  f3b19578fd1d8bd369c2514fba66e915 
afdb7edbf095dd5aa70facb8039da1b0.sys 30848  afdb7edbf095dd5aa70facb8039da1b0 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware