Home / Spyware Encyclopedia / Clicker.BHO.k << Back

Recommendation to Automatically remove Clicker.BHO.k


Our products can remove Clicker.BHO.k and thousands of other Virus and Spyware automatically and instantly.

Clicker.BHO.k Details


  • Category Clicker
  • Discovered 6/26/2020 2:09:43 AM
  • Modified 6/26/2020 1:22:15 PM
  • Threat Level Low
  • Category Description
    This family of Trojans redirects victim machines to specified websites or other Internet resources. Clickers either send the necessary commands to the browser or replace system files where standard Internet urls are stored. Clickers are used: 1. To raise the hit-count of a specific site for advertising purposes. 2. To organize a DoS attack on a specified server or site. 3. To lead the victim to an infected resource where the machine will be attacked by other malware (viruses or Trojans).

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
6260915e51b89e60aaa01685457a7ae2.exe 450564  6260915e51b89e60aaa01685457a7ae2 
trojan-clicker.win32.bho.k.exe 253444  19c44e43a77a552bf2d7d873ef53ddbb23/01/2020
cf48944de92e02adbfddb662483f507d.exe 253956  cf48944de92e02adbfddb662483f507d21/08/2020
912aa186380db21e9e65b1c2c6ac31af.vir.exe 450564  912aa186380db21e9e65b1c2c6ac31af 
8b6c2d631f3d6ca1e1dd12f9cadbd1c2.vir.exe 450564  8b6c2d631f3d6ca1e1dd12f9cadbd1c2 
6fedf3ff3bd6c8439eb9bbc4fa31cda2.vir.exe 446464  6fedf3ff3bd6c8439eb9bbc4fa31cda2 
19084605000aff29d90ac6bde574cd0685a2d4d92fee84ab64975a0de8023c89a0344d3b4e9f7e063f12681380d5b.exe 673972  51a3617bbadb1c0062ef5999668f0f0d 
cf48944de92e02adbfddb662483f507d.exe 253956  cf48944de92e02adbfddb662483f507d 
d93b965e8677f698dc3fda4f3d783303b901a3ae2cda99e2ee3edf6e6f038dec.exe 253956  87fad7bf1b7ab205f82c5c56e5877622 
0b8ef89bb79bceb65ce5ed371253fac1.exe 260612  0b8ef89bb79bceb65ce5ed371253fac1 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware