Home / Spyware Encyclopedia / Clicker.BHO.jv << Back

Recommendation to Automatically remove Clicker.BHO.jv


Our products can remove Clicker.BHO.jv and thousands of other Virus and Spyware automatically and instantly.

Clicker.BHO.jv Details


  • Category Clicker
  • Discovered 8/14/2023 12:49:51 PM
  • Modified 8/14/2023 3:13:50 PM
  • Threat Level Low
  • Category Description
    This family of Trojans redirects victim machines to specified websites or other Internet resources. Clickers either send the necessary commands to the browser or replace system files where standard Internet urls are stored. Clickers are used: 1. To raise the hit-count of a specific site for advertising purposes. 2. To organize a DoS attack on a specified server or site. 3. To lead the victim to an infected resource where the machine will be attacked by other malware (viruses or Trojans).

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
13a14c942ab587dc1f9e23cf3c0535ab.vir.dll 83456 1, 0, 11, 141213a14c942ab587dc1f9e23cf3c0535ab 
d4b6e872a2289c23c6ace8de7243b65f.vir.dll 83456 1, 0, 11, 1412d4b6e872a2289c23c6ace8de7243b65f 
124062869fca645992d8a4a854771df8.vir.dll 83456 1, 0, 11, 1412124062869fca645992d8a4a854771df8 
080b9200ac3b2fb48a4c45a88f461ccb.vir.dll 83456 1, 0, 11, 1412080b9200ac3b2fb48a4c45a88f461ccb 
014c39b8aab12a06efd96110c5819782.vir.dll 83456 1, 0, 11, 1412014c39b8aab12a06efd96110c5819782 
06b594f16494eb41cc00a4c1ce82f5c0.vir.dll 83456 1, 0, 11, 141206b594f16494eb41cc00a4c1ce82f5c0 
11d35f038fb0df5be95f7640b61df899.vir.dll 83456 1, 0, 11, 141211d35f038fb0df5be95f7640b61df899 
182d70ba29b7793e23a4ecea8030c072.vir.dll 83456 1, 0, 11, 1412182d70ba29b7793e23a4ecea8030c072 
6ff8c99c359af2c757edf5b2b8af26a0.vir.dll 83456 1, 0, 11, 14126ff8c99c359af2c757edf5b2b8af26a0 
091ea947b7b2331f389ccdb5c53dd510.vir.dll 180273 1, 0, 11, 1412091ea947b7b2331f389ccdb5c53dd510 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware