Home / Spyware Encyclopedia / Clicker.BHO.jv << Back

Recommendation to Automatically remove Clicker.BHO.jv


Our products can remove Clicker.BHO.jv and thousands of other Virus and Spyware automatically and instantly.

Clicker.BHO.jv Details


  • Category Clicker
  • Discovered 8/14/2023 12:49:51 PM
  • Modified 8/14/2023 3:13:50 PM
  • Threat Level Low
  • Category Description
    This family of Trojans redirects victim machines to specified websites or other Internet resources. Clickers either send the necessary commands to the browser or replace system files where standard Internet urls are stored. Clickers are used: 1. To raise the hit-count of a specific site for advertising purposes. 2. To organize a DoS attack on a specified server or site. 3. To lead the victim to an infected resource where the machine will be attacked by other malware (viruses or Trojans).

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
20c0b40502ca8231c7d293e1ac7ee1de.vir 83456 1, 0, 11, 141220c0b40502ca8231c7d293e1ac7ee1de 
0e9631bf656fec8f16f2f4100b20146c.vir.dll 83456 1, 0, 11, 14120e9631bf656fec8f16f2f4100b20146c 
8011bf453558a289134fba351e55b47d.vir.dll 83456 1, 0, 11, 14128011bf453558a289134fba351e55b47d 
091ea947b7b2331f389ccdb5c53dd510.vir.dll 180273 1, 0, 11, 1412091ea947b7b2331f389ccdb5c53dd510 
6172d0b2ddb668b91a63770b50b2b2fe.vir.dll 83456 1, 0, 11, 14126172d0b2ddb668b91a63770b50b2b2fe 
20b4dd983e23dad726e1c2d27ad60cb9.vir.dll 83456 1, 0, 11, 141220b4dd983e23dad726e1c2d27ad60cb9 
5a43601367bad76710e6ce47d3e56924.vir.dll 180224 1, 0, 11, 14125a43601367bad76710e6ce47d3e56924 
1425a9a7aa5fcf292018d3a925544a6f.vir.dll 83456 1, 0, 11, 14121425a9a7aa5fcf292018d3a925544a6f 
0051f61eba2c66aab3663725926902d3.vir.dll 83456 1, 0, 11, 14120051f61eba2c66aab3663725926902d3 
182d70ba29b7793e23a4ecea8030c072.vir.dll 83456 1, 0, 11, 1412182d70ba29b7793e23a4ecea8030c072 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware