Home / Spyware Encyclopedia / Clicker.BHO.n << Back

Recommendation to Automatically remove Clicker.BHO.n


Our products can remove Clicker.BHO.n and thousands of other Virus and Spyware automatically and instantly.

Clicker.BHO.n Details


  • Category Clicker
  • Discovered 6/18/2013 8:48:42 PM
  • Modified 1/2/2024 10:35:02 AM
  • Threat Level Low
  • Category Description
    This family of Trojans redirects victim machines to specified websites or other Internet resources. Clickers either send the necessary commands to the browser or replace system files where standard Internet urls are stored. Clickers are used: 1. To raise the hit-count of a specific site for advertising purposes. 2. To organize a DoS attack on a specified server or site. 3. To lead the victim to an infected resource where the machine will be attacked by other malware (viruses or Trojans).

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
045d96fc2392a399c32b01e9676101fa.exe 541937  045d96fc2392a399c32b01e9676101fa 
3c6b001870182500e48e5cd7d9c5746c4c97a89d110999fd83410ab5dd043073.exe 191732  00f963f5f10db9c3eb1db52b4afb8481 
d1d03362f547d057911f377899e9f3afe65cc5816048154e1e4bd9e598cf56b8.dll 540160  e63ac0bc5a6214f3c5cd40300e008c88 
f0b24b9530f9ff9d1f6b00af245cf46b.exe 397316中国互联网络信息中心2.5.0.22f0b24b9530f9ff9d1f6b00af245cf46b 
1f40de1eed0fd63e8cf4834240939405.dll 210944  1f40de1eed0fd63e8cf4834240939405 
14442207182a4e6ee396b3980fa91349847b734328e6782c816aecf51c07163a894d4c8910d5de72a185d58b9b686.dll 204800  70247b09f20427ff2d78a58a0392fb1d 
96b0f6f130977e728133ac154fb651b2.vir.exe 311296  96b0f6f130977e728133ac154fb651b2 
29fada1155a8b4bbeb52984449d4e172.vir.dll 569344  29fada1155a8b4bbeb52984449d4e172 
687c61b25e00c7543d869c22c10758a9.vir.exe 983044中国互联网络信息中心2.5.0.22687c61b25e00c7543d869c22c10758a9 
virusshare_a4be7d8b885e0aafb46e0f0ed5d2be70.exe 397828中国互联网络信息中心2.5.0.22a4be7d8b885e0aafb46e0f0ed5d2be7030/07/2023

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware