Home / Spyware Encyclopedia / Clicker.Agent.jh << Back

Recommendation to Automatically remove Clicker.Agent.jh


Our products can remove Clicker.Agent.jh and thousands of other Virus and Spyware automatically and instantly.

Clicker.Agent.jh Details


  • Category Clicker
  • Discovered 4/17/2012 3:26:16 PM
  • Modified 10/14/2024 11:31:05 AM
  • Threat Level Low
  • Category Description
    This family of Trojans redirects victim machines to specified websites or other Internet resources. Clickers either send the necessary commands to the browser or replace system files where standard Internet urls are stored. Clickers are used: 1. To raise the hit-count of a specific site for advertising purposes. 2. To organize a DoS attack on a specified server or site. 3. To lead the victim to an infected resource where the machine will be attacked by other malware (viruses or Trojans).

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
cc5b9a3febdf332293d36efcd250ea88.exe 99093  cc5b9a3febdf332293d36efcd250ea88 
2cd347c213905f97eec2b98150c862d5.exe 98976  2cd347c213905f97eec2b98150c862d5 
p000499_000037404-68b678dd_4cc2429a7db080cad0af4a721202fd63.exe 37404  4cc2429a7db080cad0af4a721202fd63 
0018167_000099399-9cfa52aa_38d1b33688bb09bfc80d20a5c3164f2c.exe 99399  38d1b33688bb09bfc80d20a5c3164f2c 
p000499_000036878-dbe175ff_f489dc2b952c6775837df5679e009d84.exe 36878  f489dc2b952c6775837df5679e009d84 
423e80ec72328171cde15eb43cb54048.exe 99788  423e80ec72328171cde15eb43cb54048 
f80522b5e0c6eb26cfd1f5467e9801c0.exe 99152  f80522b5e0c6eb26cfd1f5467e9801c0 
a4451354c3c497836cd4026cccc7973b69f7ac67054220979d1484bf663e12b5e5f4edf083f5906bfd0e63a782d0c571804.exe 99463  205aed3473721d236a0d8209ec1ba2f7 
ed29876b639fedddc694013187f13f04.exe 99070  ed29876b639fedddc694013187f13f04 
289482450027b0264d648647ca0d4fbb.exe 37872  289482450027b0264d648647ca0d4fbb 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware