Home / Spyware Encyclopedia / Clicker.Agent.h << Back

Recommendation to Automatically remove Clicker.Agent.h


Our products can remove Clicker.Agent.h and thousands of other Virus and Spyware automatically and instantly.

Clicker.Agent.h Details


  • Category Clicker
  • Discovered 8/2/2023 12:30:53 AM
  • Modified 8/2/2023 6:04:44 PM
  • Threat Level High
  • Category Description
    This family of Trojans redirects victim machines to specified websites or other Internet resources. Clickers either send the necessary commands to the browser or replace system files where standard Internet urls are stored. Clickers are used: 1. To raise the hit-count of a specific site for advertising purposes. 2. To organize a DoS attack on a specified server or site. 3. To lead the victim to an infected resource where the machine will be attacked by other malware (viruses or Trojans).

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
2f38d38ccc49cdfda54fa9cef344b2bb 23904  2f38d38ccc49cdfda54fa9cef344b2bb 
b897652c51238a62aba01c3c3ac8cbe5 23414  b897652c51238a62aba01c3c3ac8cbe5 
8006ab02c4a3ce1c917e351f99883c2b 12702  8006ab02c4a3ce1c917e351f99883c2b 
d6853f651008c114e597772fa8476aec2156e98f.bin 965  8e565fbcf9c1c9f38739c36959bc7b6b 
a5af6ec5f915bc05648b2d3edaa89109.exe 209603  a5af6ec5f915bc05648b2d3edaa89109 
134119051558d8640a6bdea31e3939b4aff53cea0cf13537ccf4befe941733a8faeb10b79e592ecc0e8d7b81aed31.dll 410112  e135abef6139e90138e3f1870903de12 
823322d528e5c60b8e24df1fc8d0cb35 699  823322d528e5c60b8e24df1fc8d0cb35 
759e17d64e714b2d53bde83d945b0e22 692  759e17d64e714b2d53bde83d945b0e22 
ecdd4725ca4c0f96338b825003216028 715  ecdd4725ca4c0f96338b825003216028 
b7076e9cbaf6ae1b2a10d59ab3c8af8f 694  b7076e9cbaf6ae1b2a10d59ab3c8af8f 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware