Home / Spyware Encyclopedia / Clicker.Agent.ypy << Back

Recommendation to Automatically remove Clicker.Agent.ypy


Our products can remove Clicker.Agent.ypy and thousands of other Virus and Spyware automatically and instantly.

Clicker.Agent.ypy Details


  • Category Clicker
  • Discovered 7/20/2012 9:29:02 PM
  • Modified 7/12/2023 5:41:12 PM
  • Threat Level Low
  • Category Description
    This family of Trojans redirects victim machines to specified websites or other Internet resources. Clickers either send the necessary commands to the browser or replace system files where standard Internet urls are stored. Clickers are used: 1. To raise the hit-count of a specific site for advertising purposes. 2. To organize a DoS attack on a specified server or site. 3. To lead the victim to an infected resource where the machine will be attacked by other malware (viruses or Trojans).

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
3bb9052442115054a656eb1497389414.exe 159744  3bb9052442115054a656eb1497389414 
cbe01038ee414adb20cc102c47ad7e3e.exe 61440  cbe01038ee414adb20cc102c47ad7e3e 
bf7eef1b93c43032c4f6a1fa152f394d.vir.exe 49152  bf7eef1b93c43032c4f6a1fa152f394d 
afecf7311b718e57fd5c39748cd2f224.vir.exe 49152  afecf7311b718e57fd5c39748cd2f224 
4f0804bbbb1a30edad049ba7a82e5b77.vir.exe 81920  4f0804bbbb1a30edad049ba7a82e5b77 
163020042476152e34f002f878a1578a6050727009af6d9f299bca495787c1e4923da5f9878a52b326dd3e058694a.exe 49152  5d382ce840d72a597b8f77c036b42eb3 
a15414fa62cf2653ed67b9d8635b3fa14757d71d.bin.exe 61440  15b85d006ca433f93361fdc25bb59e19 
da346b40f7ab001652673195476082d7994af43b.bin.exe 32381  c36dde3f0655126e2603b3726f7a2ad9 
d834bacbf83f80c0a16e2f5c12ce9ab7e7014847ad1d5e10b82037ba1533f257.exe 49152  b47fcf34bd66bb63a92cbee83b01b120 
488154333d36a7d2407bdd8f8681328a5455061e07f706c3ebf9576ce993f004.exe 49152  0370d87f3a764c725d45bd6fc90f3877 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware