Home Malware Programs Trojans Trojan:Win32/Kilim.J

Trojan:Win32/Kilim.J

Posted: April 15, 2014

Threat Metric

Threat Level: 9/10
Infected PCs: 7
First Seen: April 15, 2014
Last Seen: June 12, 2022
OS(es) Affected: Windows


Trojan:Win32/Kilim.J is a Trojan that may execute numerous malicious actions on an infected computer system. Upon installation, Trojan:Win32/Kilim.J makes system changes by creating the potentially malicious files on a PC. Trojan:Win32/Kilim.J may contact the remote hosts in order to confirm Internet connectivity, receive configuration or other data, report a new infection to its author, receive instructions from a remote attacker, download and run files, involving updates or other malware infections, and upload data taken from the attacked PC.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



C:\Documents and Settings\<username>\application data\winregist.er File name: C:\Documents and Settings\<username>\application data\winregist.er
Mime Type: unknown/er
Group: Malware file
C:\Documents and Settings\<username>\application data\winconf.exe File name: C:\Documents and Settings\<username>\application data\winconf.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
C:\Documents and Settings\<username>\local settings\application data\google\chrome\user data\default\preferences File name: C:\Documents and Settings\<username>\local settings\application data\google\chrome\user data\default\preferences
Group: Malware file
C:\Documents and Settings\<username>\application data\extension.dll File name: C:\Documents and Settings\<username>\application data\extension.dll
File type: Dynamic link library
Mime Type: unknown/dll
Group: Malware file

Additional Information

The following URL's were detected:
Hitboxer.comWatchsvideo.com
Loading...