Home / Spyware Encyclopedia / Clicker.Agent.ij << Back

Recommendation to Automatically remove Clicker.Agent.ij


Our products can remove Clicker.Agent.ij and thousands of other Virus and Spyware automatically and instantly.

Clicker.Agent.ij Details


  • Category Clicker
  • Discovered 10/3/2023 5:25:52 PM
  • Modified 10/4/2023 11:23:11 AM
  • Threat Level Low
  • Category Description
    This family of Trojans redirects victim machines to specified websites or other Internet resources. Clickers either send the necessary commands to the browser or replace system files where standard Internet urls are stored. Clickers are used: 1. To raise the hit-count of a specific site for advertising purposes. 2. To organize a DoS attack on a specified server or site. 3. To lead the victim to an infected resource where the machine will be attacked by other malware (viruses or Trojans).

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
trojan-clicker.win32.agent.aamh-c2b8e8a4698ea3f8a95fb84b7b8f410efcfec07a15756ff99e728c45392f46ad.exe 114658  f11493dbf68cee0d0340b8105c427d0621/07/2023
trojan-clicker.win32.agent.aamh-360373e43e85e008b108dfa05b0205db771eef20fcea7b4841bf39c81ae3f726.exe 114655  2b166c8757ab9e2bb1e2380e9cce19e027/07/2023
2ca3c949a77e3b9f211b27132d3c5ac2.vir.exe 111850  2ca3c949a77e3b9f211b27132d3c5ac2 
481c3858abb892d92aeeafbe7de7ac7b.exe 114656  481c3858abb892d92aeeafbe7de7ac7b 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware