Home / Spyware Encyclopedia / Clicker.BHO.h << Back

Recommendation to Automatically remove Clicker.BHO.h


Our products can remove Clicker.BHO.h and thousands of other Virus and Spyware automatically and instantly.

Clicker.BHO.h Details


  • Category Clicker
  • Discovered 1/22/2010 9:44:26 AM
  • Modified 5/27/2024 12:09:35 PM
  • Threat Level Low
  • Category Description
    This family of Trojans redirects victim machines to specified websites or other Internet resources. Clickers either send the necessary commands to the browser or replace system files where standard Internet urls are stored. Clickers are used: 1. To raise the hit-count of a specific site for advertising purposes. 2. To organize a DoS attack on a specified server or site. 3. To lead the victim to an infected resource where the machine will be attacked by other malware (viruses or Trojans).

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
trojan-clicker.win32.bho.h 220164  6af7f408b9c4e01812d40abddcd2775b 
6167caa8ee38a2267397584560a45ee0.exe_3809.exe.SBOX.exe 225796  59d935a24f2d6bdfe7863b7c89f575d0 
9c349cc38fa5eb8e7d63db3b1c3cc1d2993f8fbf87146c4d43d49fb55a067940e2994f8bcdb80fa411e9b2949e47e01e25f.exe 225796  1cd6e43bc5af3917b118ba0e77806c86 
4f370e08ae1c343b792c2ef0dd55adfc.exe 253444  4f370e08ae1c343b792c2ef0dd55adfc 
19301704307f7c20d27dd384a93627f5659f5987fefa4196ac0aee1f06e69af32658369f1638682ac87c2ca06a453.exe 232452  88fdffe345c2edfdb2d9288a09e15af9 
def23476c96c9fce2f48f6409a21b0ce.vir.exe 323588  def23476c96c9fce2f48f6409a21b0ce 
647e9e6f1a8573b30fe7df5d31feddfe.vir.exe 442368  647e9e6f1a8573b30fe7df5d31feddfe 
2c35df916ea0f4ba9bb2739393a57beb.vir.exe 446464  2c35df916ea0f4ba9bb2739393a57beb 
4ea3e8be1f0dc3b9299baaaa65c0db9c.vir.exe 325891  4ea3e8be1f0dc3b9299baaaa65c0db9c 
4f370e08ae1c343b792c2ef0dd55adfc.exe 253444  4f370e08ae1c343b792c2ef0dd55adfc20/02/2020

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware