Home / Spyware Encyclopedia / Trojan.Autoit.fkl << Back

Recommendation to Automatically remove Trojan.Autoit.fkl


Our products can remove Trojan.Autoit.fkl and thousands of other Virus and Spyware automatically and instantly.

Trojan.Autoit.fkl Details


  • Category Trojan
  • Discovered 11/15/2023 6:37:19 PM
  • Modified 11/16/2023 11:10:26 AM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
963669a72c0aebeb5eee7775d5a3f580.vir.exe 835944  963669a72c0aebeb5eee7775d5a3f580 
1f0542141724c64ff5b84fdc15c4f3e0fad63e9ef722b468a5f5c68f1f00bb0d.bin.exe 868057  a8770ec685f12a924d01b4e7fa80924112/05/2022
80dac3f8531aa2f5ca6b8bd6cd9fafad88a208e54a2bae011c5b3afb733a6440.exe 754093  2cea3a041d6f9f8b9ceed15fcc78175c29/11/2019
6850d56e0b751aeae78e00b9b47bec74.exe 1598399X82YW77YU69IX75AR79KY67F6850d56e0b751aeae78e00b9b47bec74 
e1afb378338377d88f8957d953788666.exe 876391  e1afb378338377d88f8957d953788666 
77f87ca27f4ada7c9569b400a25999fa.exe 1457378  77f87ca27f4ada7c9569b400a25999fa 
00280599f4096357b79b5e192a4e6ea107eada16b605b2362e57357894f63250.exe 868989  e30889ae2735fb2f2585d6e5575ffaac 
06c34315d4d3c6efbc002807ed403f6c7675482c85fe8343adc004a40989a106.exe 867748  98e08fdd038aacfb4e8dfead582bf19f 
961384ee54b5e8394d3a8a008e6d300c.exe 738437  961384ee54b5e8394d3a8a008e6d300c27/04/2022
560c5dcb8e15a0a163abc11c6ff70c04.vir.exe 788453  560c5dcb8e15a0a163abc11c6ff70c04 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware