Home / Spyware Encyclopedia / Clicker.Agent.jh << Back

Recommendation to Automatically remove Clicker.Agent.jh


Our products can remove Clicker.Agent.jh and thousands of other Virus and Spyware automatically and instantly.

Clicker.Agent.jh Details


  • Category Clicker
  • Discovered 10/3/2011 7:36:02 PM
  • Modified 4/4/2024 11:01:58 AM
  • Threat Level Low
  • Category Description
    This family of Trojans redirects victim machines to specified websites or other Internet resources. Clickers either send the necessary commands to the browser or replace system files where standard Internet urls are stored. Clickers are used: 1. To raise the hit-count of a specific site for advertising purposes. 2. To organize a DoS attack on a specified server or site. 3. To lead the victim to an infected resource where the machine will be attacked by other malware (viruses or Trojans).

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
0018167_000099399-9cfa52aa_38d1b33688bb09bfc80d20a5c3164f2c.exe 99399  38d1b33688bb09bfc80d20a5c3164f2c 
p000499_000037404-68b678dd_4cc2429a7db080cad0af4a721202fd63.exe 37404  4cc2429a7db080cad0af4a721202fd63 
2cd347c213905f97eec2b98150c862d5.exe 98976  2cd347c213905f97eec2b98150c862d5 
4412984138f708953877ac42057704cb7eb3da70488302f134d03f3d750a63c3e55402e44580128951e48138904d82fcf5d.exe 37281  32b65fd26c8a86c08e744d2ef431d7a9 
16ded83fd5ce4d0aa81cf6b0ad988a21.exe 37711  16ded83fd5ce4d0aa81cf6b0ad988a21 
3d8433e77ccd88d90a12ba67a04382d6.exe 99690  3d8433e77ccd88d90a12ba67a04382d6 
a7d04e8aea1a85dab15fc9389b24e927.exe 37131  a7d04e8aea1a85dab15fc9389b24e927 
883ce9f7aa72c64073aa7fd49a24a7e0.exe 37034  883ce9f7aa72c64073aa7fd49a24a7e0 
64e2604501edf25416e288458ce9f700cd17cf79f92bf20a08f0d930cec86865.exe 37360  2c944e2ed3423c6d52a0f6df4f2cf936 
0072a3b0a35748bad567dfff24866225ea99cf6a09fa361755069f8d40fab6ad.exe 36921  5fe8790d3df2155f2d4f7831563438f8 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware