Home / Spyware Encyclopedia / Clicker.Agent.iul << Back

Recommendation to Automatically remove Clicker.Agent.iul


Our products can remove Clicker.Agent.iul and thousands of other Virus and Spyware automatically and instantly.

Clicker.Agent.iul Details


  • Category Clicker
  • Discovered 11/4/2011 12:23:13 AM
  • Modified 2/22/2019 12:24:16 PM
  • Threat Level Low
  • Category Description
    This family of Trojans redirects victim machines to specified websites or other Internet resources. Clickers either send the necessary commands to the browser or replace system files where standard Internet urls are stored. Clickers are used: 1. To raise the hit-count of a specific site for advertising purposes. 2. To organize a DoS attack on a specified server or site. 3. To lead the victim to an infected resource where the machine will be attacked by other malware (viruses or Trojans).

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
bdba09f73acc6e956e16bdb37fc20063.dll 257536  bdba09f73acc6e956e16bdb37fc20063 
db77a8982d894f62049852beea114740.dll 257536  db77a8982d894f62049852beea114740 
c7958e48d6aac94f0335c8c5d3a56af2.dll 257536  c7958e48d6aac94f0335c8c5d3a56af2 
b0ac1dda0e3e1aec3d4ac8832d8de944.dll 257536  b0ac1dda0e3e1aec3d4ac8832d8de944 
2b57cf7cd3b85878a00cb7f6f2dbcbe2.dll 257536  2b57cf7cd3b85878a00cb7f6f2dbcbe2 
36f5bf2a19aebdbee967027b0f2d323e.vir.dll 257536  36f5bf2a19aebdbee967027b0f2d323e 
19131700620ae13044267fbbc6e3d0a3e4777620904dfc302d9e17e704c4ae7daf3f933dec63bf8d7eb76737aabb9.dll 257536  f3b57b94c0644639336314209267b6c9 
2c0cd27c24cc028e3a67bfb9193e7b8c.vir.dll 257536  2c0cd27c24cc028e3a67bfb9193e7b8c 
17003108900d3c3ef06c8f185bdc5f12b1774a148b88d33f6b0dd771f8f2dee38273deb13b767e3c97e41ab9e84de.dll 257536  ffd363af0eb85b987c19dcb062aa864d 
787f708710da435a5bc77c96a4f32ac0.vir.dll 257536  787f708710da435a5bc77c96a4f32ac0 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware