Home / Spyware Encyclopedia / Clicker.agent.zpf << Back

Recommendation to Automatically remove Clicker.agent.zpf


Our products can remove Clicker.agent.zpf and thousands of other Virus and Spyware automatically and instantly.

Clicker.agent.zpf Details


  • Category Clicker
  • Discovered 5/4/2016 3:32:44 AM
  • Modified 7/29/2023 3:39:43 PM
  • Threat Level Low
  • Category Description
    This family of Trojans redirects victim machines to specified websites or other Internet resources. Clickers either send the necessary commands to the browser or replace system files where standard Internet urls are stored. Clickers are used: 1. To raise the hit-count of a specific site for advertising purposes. 2. To organize a DoS attack on a specified server or site. 3. To lead the victim to an infected resource where the machine will be attacked by other malware (viruses or Trojans).

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
8556e77417ee16abb6310ecad4021494b9b882ef22918b30d6f74b21e617fbcc.exe 17376 1, 0, 0, 1e59001e327b258844a481fab4e494593 
062c56777c4e8258813572e73704a307.exe 17376 1, 0, 0, 1062c56777c4e8258813572e73704a307 
0b5cd34b42b485a80d56505f1af15712.vir.exe 17376 1, 0, 0, 10b5cd34b42b485a80d56505f1af15712 
f45fbf49ff0db37f88f30d04715a5dd0.vir.exe 30176 1, 0, 0, 1f45fbf49ff0db37f88f30d04715a5dd029/07/2023
9e4b140209f78819106f6e3a4536f408.vir 30176 1, 0, 0, 19e4b140209f78819106f6e3a4536f408 
5420e0f79d65f017161ff4f095e94111.vir.exe 30176 1, 0, 0, 15420e0f79d65f017161ff4f095e94111 
c8d21b6b9e8c28d9a78ed1421288b233.vir.exe 30176 1, 0, 0, 1c8d21b6b9e8c28d9a78ed1421288b233 
8bff2088b6f56709d2aa2c36643daa1f.vir.exe 30176 1, 0, 0, 18bff2088b6f56709d2aa2c36643daa1f 
294d0b97996846d8d76be8b5c201deb4.vir.exe 30176 1, 0, 0, 1294d0b97996846d8d76be8b5c201deb4 
f45fbf49ff0db37f88f30d04715a5dd0.vir.exe 30176 1, 0, 0, 1f45fbf49ff0db37f88f30d04715a5dd0 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware