Home / Spyware Encyclopedia / Clicker.AutoIt.ac << Back

Recommendation to Automatically remove Clicker.AutoIt.ac


Our products can remove Clicker.AutoIt.ac and thousands of other Virus and Spyware automatically and instantly.

Clicker.AutoIt.ac Details


  • Category Clicker
  • Discovered 5/9/2024 8:19:14 AM
  • Modified 5/9/2024 4:56:56 PM
  • Threat Level Low
  • Category Description
    This family of Trojans redirects victim machines to specified websites or other Internet resources. Clickers either send the necessary commands to the browser or replace system files where standard Internet urls are stored. Clickers are used: 1. To raise the hit-count of a specific site for advertising purposes. 2. To organize a DoS attack on a specified server or site. 3. To lead the victim to an infected resource where the machine will be attacked by other malware (viruses or Trojans).

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
p000499_002931038-d61be5e0_8b35d04413bfd7ae6b6704c00f76f569.exe 2931038 3.2.12.18b35d04413bfd7ae6b6704c00f76f569 
webfettiinst.exe 384699 3.2.12.1006d6511ad29a47b494c1c91130665da 
59bd51faea03acd18c8129adbb6722d2.exe 569344 3, 2, 12, 159bd51faea03acd18c8129adbb6722d2 
661b62629f968e5a67a668a29e87ebdc.exe 968876 3, 2, 12, 1661b62629f968e5a67a668a29e87ebdc 
3dbb0d2b7138ad465bbd907a6158e410.exe 409295 3, 2, 12, 13dbb0d2b7138ad465bbd907a6158e410 
ffecaa3c2ff21fd312cda0e3b5a89bd8.vir.exe 565248 3, 2, 12, 1ffecaa3c2ff21fd312cda0e3b5a89bd8 
45bc6123d06627c9e8165c93a6e6f745.vir.exe 565248 3, 2, 12, 145bc6123d06627c9e8165c93a6e6f745 
330b2bec4722ce0000590920a5659f31.exe 2465447 3, 2, 12, 1330b2bec4722ce0000590920a5659f31 
f301a9115891ba2d1939766cb4e08bd4.vir.exe 675027 3, 2, 12, 1f301a9115891ba2d1939766cb4e08bd4 
wfsetup.exe 165888  4897a51671a747924d8467ffa813b97613/08/2020

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware