Home / Spyware Encyclopedia / Clicker.Agent.ijh << Back

Recommendation to Automatically remove Clicker.Agent.ijh


Our products can remove Clicker.Agent.ijh and thousands of other Virus and Spyware automatically and instantly.

Clicker.Agent.ijh Details


  • Category Clicker
  • Discovered 7/28/2023 6:43:22 AM
  • Modified 7/28/2023 4:07:08 PM
  • Threat Level Low
  • Category Description
    This family of Trojans redirects victim machines to specified websites or other Internet resources. Clickers either send the necessary commands to the browser or replace system files where standard Internet urls are stored. Clickers are used: 1. To raise the hit-count of a specific site for advertising purposes. 2. To organize a DoS attack on a specified server or site. 3. To lead the victim to an infected resource where the machine will be attacked by other malware (viruses or Trojans).

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
08083e626317025026962ddea8441ccb.vir.exe 299078  08083e626317025026962ddea8441ccb 
6bcc33b79496376b7f13a9bcec469a1e.vir.exe 327680  6bcc33b79496376b7f13a9bcec469a1e 
5513991dea268890767bc0e4eef93ecb.exe 430150  5513991dea268890767bc0e4eef93ecb08/08/2023
0b1169f06be99ae19ee8b948d3218613.co.exe 299008  0b1169f06be99ae19ee8b948d321861304/02/2020
20191029165609350106.exe 368710  ee25e5cdb2ac3a0cbee0a5cd2cf9154515/11/2019
e0d1c5168dc9d6753841a21435cd9941.exe 299008  e0d1c5168dc9d6753841a21435cd9941 
154100038130d87c2204315977be5b1b15f3b50c8b95dda300686237ae761c37162d2c58790d157a60516dc853b29.exe 299008  8ffe4854686e6fbc6a638a0fcf14578f 
03ac07801416eab66e0bab76d8933efd.exe 360448  03ac07801416eab66e0bab76d8933efd 
8b4101fcf3f8090de0bd73fe9978d3426d94879675ae669fedec9562387059a7.exe 299084  29952b4dc3128baf66081b27d84ce313 
d1af938a07831bf1ba8cbdea30e76344b05b3e1e255527e79ef75bd0225c406c.exe 299084  50ecdec9594c6d9b43d2443f56a4f53b 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware