Home / Spyware Encyclopedia / Clicker.Agent.ip << Back

Recommendation to Automatically remove Clicker.Agent.ip


Our products can remove Clicker.Agent.ip and thousands of other Virus and Spyware automatically and instantly.

Clicker.Agent.ip Details


  • Category Clicker
  • Discovered 9/29/2011 10:17:54 PM
  • Modified 4/17/2024 10:45:47 AM
  • Threat Level Low
  • Category Description
    This family of Trojans redirects victim machines to specified websites or other Internet resources. Clickers either send the necessary commands to the browser or replace system files where standard Internet urls are stored. Clickers are used: 1. To raise the hit-count of a specific site for advertising purposes. 2. To organize a DoS attack on a specified server or site. 3. To lead the victim to an infected resource where the machine will be attacked by other malware (viruses or Trojans).

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
trojan-clicker.win32.agent.ip 32536  58517dd820df269390f325b685114e33 
0064942_000099040-a69e9741_1d1e67321db145bff8ea1c2097fec51c.exe 99040  1d1e67321db145bff8ea1c2097fec51c 
5d450a7bbbe02fc97e96008d3f9b921b7fe171e1feba6ce935ced916e4cd47a5.exe 37088  0805bff53d90aa2d7f9b8e900b746da0 
9ee6e7f6178158bd6d338b136574b79dfdf4b536435de2cb5cb0d460fbbe7c5d.exe 44256  fbda1b10b9974cce76383b3ac57ed933 
b61c312daca2662d45d1a1d1aa096844.vir.exe 136192  b61c312daca2662d45d1a1d1aa096844 
trojan-clicker.win32.agent.ip-09290af28ded52f3242b3e42fe8289e85be1acac31bfd540306c78b25bce3990.exe 37088  769a2b15f5869cfc3820192c4c75fd4804/08/2023
ef40a3435c34045dbfb2afefea46ac2b 93232  ef40a3435c34045dbfb2afefea46ac2b 
be57ed39d71df9797b38b667d57d54a0 93233  be57ed39d71df9797b38b667d57d54a0 
b90d061fb84c321cb37889a9152be753 93233  b90d061fb84c321cb37889a9152be753 
0319614_000117609-1391DA64_4e56dc88eb261a39e749e293d8be41b9.EXE 0  4e56dc88eb261a39e749e293d8be41b908/08/2023

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware