Home / Spyware Encyclopedia / Clicker.autoit.k << Back

Recommendation to Automatically remove Clicker.autoit.k


Our products can remove Clicker.autoit.k and thousands of other Virus and Spyware automatically and instantly.

Clicker.autoit.k Details


  • Category Clicker
  • Discovered 10/19/2012 12:03:51 PM
  • Modified 7/31/2023 5:22:23 PM
  • Threat Level High
  • Category Description
    This family of Trojans redirects victim machines to specified websites or other Internet resources. Clickers either send the necessary commands to the browser or replace system files where standard Internet urls are stored. Clickers are used: 1. To raise the hit-count of a specific site for advertising purposes. 2. To organize a DoS attack on a specified server or site. 3. To lead the victim to an infected resource where the machine will be attacked by other malware (viruses or Trojans).

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
16253803494b476584735b780674faeb8c7bff67e2e826e3867e459317c1e57215ccc932cae8ef229d13b4637d4f7.exe 792576w3i1.086d724103ee685eff887572852a5ce18 
1002-55db409ee55b4fde34c04a258e1d12b8f004add9.exe 417392  8477189977b93658ddc99599fc8bd66c13/02/2020
4a88d160.exe 792576w3i1.0618b1182aad2f41d92cf8003f19915e302/03/2021
f0d423a73977b15c56a88b79283000ed.exe 528384  f0d423a73977b15c56a88b79283000ed22/12/2021
trojan-clicker.win32.autoit.k-9fdde06631e3be88202e0d81c99d2bebb28a4f99.exe 689664  bec14769ed35b6d8ce35f3ee8677637808/08/2023
trojan-clicker.win32.autoit.k-829136f8b2eb12c46d7eb5a5958fedf5128cbe4f.exe 982528  dd66db56958f89461ce59f131cf4ac4408/08/2023
setup_00.exe 335872c4d6.0.3790.07731b19261ff954f274ae274289f8f5e08/08/2023
7d444729e1ad346db0f47ba5915f7ceb4230c1d266efd6107f1b9fd6882f3ed6.exe 5076992  9210f2056cc55b241e9ea5b52d6ac49e29/03/2023
70c957adbc70454cfb98b4a9925fc8a2ce98beecee5617b8442313c0ab9907e9.exe 7735808  e0b7eae44301b78c4b893d4b636d082e11/03/2023
a29e9a8ebc9c88315b58a52415e14ad21e4abb0e3148066792175be27d88f53a.exe 8114688  600513d3d3555dcfbb36553d807bb4c502/12/2022

The following Registry Entries were created:
..\Software\Microsoft\Windows\CurrentVersion\Run\\"eggs joy math type"\"%das.au.app data%\bind army eggs joy\hope bend.exe"
..\Software\Microsoft\internet explorer\searchscopes\{89566cd9-f413-0460-bd99-8ae6980911a3}\(Default)
..\Software\Classes\Installer\products\de2353a3121a7924aaf4076be0b46d13\(Default)
..\Software\Classes\Installer\features\de2353a3121a7924aaf4076be0b46d13\(Default)
..\Software\RecFree.com\(Default)
..\Software\Microsoft\Windows\CurrentVersion\Run\\"DASHANTE"\"%ROOT%\DOCUME~1\admin\APPLIC~1\ELSEPA~1\OOZE GREY BURN.exe"
..\Software\Plus Fast Software\Showmixmess\(Default)
..\Software\Plus Fast Software\(Default)
..\Software\Microsoft\Windows\CurrentVersion\Program Frag Grid\(Default)
..\Software\Microsoft\Windows\CurrentVersion\Run\\"eggs joy math type"\"%DAS.AU.APP DATA%\Bind army eggs joy\road shim.exe"

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware