Home / Spyware Encyclopedia / Clicker.Agent.jh << Back

Recommendation to Automatically remove Clicker.Agent.jh


Our products can remove Clicker.Agent.jh and thousands of other Virus and Spyware automatically and instantly.

Clicker.Agent.jh Details


  • Category Clicker
  • Discovered 10/3/2011 7:36:02 PM
  • Modified 4/4/2024 11:01:58 AM
  • Threat Level Low
  • Category Description
    This family of Trojans redirects victim machines to specified websites or other Internet resources. Clickers either send the necessary commands to the browser or replace system files where standard Internet urls are stored. Clickers are used: 1. To raise the hit-count of a specific site for advertising purposes. 2. To organize a DoS attack on a specified server or site. 3. To lead the victim to an infected resource where the machine will be attacked by other malware (viruses or Trojans).

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
cc5b9a3febdf332293d36efcd250ea88.exe 99093  cc5b9a3febdf332293d36efcd250ea88 
2cd347c213905f97eec2b98150c862d5.exe 98976  2cd347c213905f97eec2b98150c862d5 
0018167_000099399-9cfa52aa_38d1b33688bb09bfc80d20a5c3164f2c.exe 99399  38d1b33688bb09bfc80d20a5c3164f2c 
p000499_000037404-68b678dd_4cc2429a7db080cad0af4a721202fd63.exe 37404  4cc2429a7db080cad0af4a721202fd63 
p000499_000036878-dbe175ff_f489dc2b952c6775837df5679e009d84.exe 36878  f489dc2b952c6775837df5679e009d84 
0353365_000099640-26aa857f_c65f827fcae589240bf603dc934d9b44.exe 99640  c65f827fcae589240bf603dc934d9b44 
p000499_000037518-d1c29dac_5a2343bd3aecb734498b3e85895e5d78.exe 37518  5a2343bd3aecb734498b3e85895e5d78 
p000499_000037125-71002ec0_f86dcba2d528f99820935d0d3523fa1d.exe 37125  f86dcba2d528f99820935d0d3523fa1d 
61749ea50c4a3def7376c98bc58d7212.vxe.exe 99783  61749ea50c4a3def7376c98bc58d7212 
d0b362b2b44940df5552208aabe7d9d6.vxe.exe 99322  d0b362b2b44940df5552208aabe7d9d6 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware