Home / Spyware Encyclopedia / Clicker.BHO.n << Back

Recommendation to Automatically remove Clicker.BHO.n


Our products can remove Clicker.BHO.n and thousands of other Virus and Spyware automatically and instantly.

Clicker.BHO.n Details


  • Category Clicker
  • Discovered 6/18/2013 8:48:42 PM
  • Modified 1/2/2024 10:35:02 AM
  • Threat Level Low
  • Category Description
    This family of Trojans redirects victim machines to specified websites or other Internet resources. Clickers either send the necessary commands to the browser or replace system files where standard Internet urls are stored. Clickers are used: 1. To raise the hit-count of a specific site for advertising purposes. 2. To organize a DoS attack on a specified server or site. 3. To lead the victim to an infected resource where the machine will be attacked by other malware (viruses or Trojans).

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
76b4a6a1d50c0ff153eb893a541574e55825e8aa.exe 364055  30f50f3b239227b894ece13681d9530e 
030674be1e80e8f660dfc23a42e3a40b.exe 114619  030674be1e80e8f660dfc23a42e3a40b 
1006240718140e4b45a39dbe63f257dd64694d5239ef42ad7adda66fb6cf33f0894c840f5a5caf7df0b75b21f98c5.exe 96256 4.0.4.683b2930a2ddf3a7fa759c760ffc90dfba 
14eb5a929dc2fbf51cc6dcbadff56797.exe 274400  14eb5a929dc2fbf51cc6dcbadff56797 
1f40de1eed0fd63e8cf4834240939405.dll 210944  1f40de1eed0fd63e8cf4834240939405 
7d7295ae78276abd9a90a16fab786d46c3f91c89.bin.exe 109485  1131563557082ffffc65c29ec186d5ca 
14442207182a4e6ee396b3980fa91349847b734328e6782c816aecf51c07163a894d4c8910d5de72a185d58b9b686.dll 204800  70247b09f20427ff2d78a58a0392fb1d 
00b0abb61c1e8a8e1e534de62ee4d638.vir.dll 204288  00b0abb61c1e8a8e1e534de62ee4d638 
687c61b25e00c7543d869c22c10758a9.vir.exe 983044中国互联网络信息中心2.5.0.22687c61b25e00c7543d869c22c10758a9 
trojan-clicker.win32.bho.n.58197f8a7a5847b36fdec6966f9ecbfb.exe 425359  58197f8a7a5847b36fdec6966f9ecbfb19/08/2020

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware