Home / Spyware Encyclopedia / Clicker.Costrat.z << Back

Recommendation to Automatically remove Clicker.Costrat.z


Our products can remove Clicker.Costrat.z and thousands of other Virus and Spyware automatically and instantly.

Clicker.Costrat.z Details


  • Category Clicker
  • Discovered 10/17/2012 8:26:54 AM
  • Modified 8/3/2023 5:33:17 PM
  • Threat Level Low
  • Category Description
    This family of Trojans redirects victim machines to specified websites or other Internet resources. Clickers either send the necessary commands to the browser or replace system files where standard Internet urls are stored. Clickers are used: 1. To raise the hit-count of a specific site for advertising purposes. 2. To organize a DoS attack on a specified server or site. 3. To lead the victim to an infected resource where the machine will be attacked by other malware (viruses or Trojans).

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
6d8fb615b98b234463573874f3bf68e3.exe 22400  6d8fb615b98b234463573874f3bf68e3 
a8117adacab3d9ceefa569813fe18adf071e7fc6.bin.exe 98304  b358b539d8bdcf844a81f714c258390a 
70eac83920b340cd07070d09885056a1.exe 17424  70eac83920b340cd07070d09885056a1 
bc9076e7cac3cedf7aaccb72ed8e135764c2de450494ae7309f617a7927da446.exe 71540  0605cdbfad492ec041a242cbb21b5fc4 
0c6b2c95139c3f20871659ae6907dfdc.dll.exe 74764  0c6b2c95139c3f20871659ae6907dfdc 
8cfeb692e63abf184c051aaecb3a1656.exe 98304  8cfeb692e63abf184c051aaecb3a1656 
10172b004083d6db53f144235e598be858d5a84971ae27bf9ef1689072a062ab.exe 28381  2a4b826fcf41a0f2daa94e506f5f2f04 
4b4509ebec1f2929b5efff168c934df9.exe 74240  4b4509ebec1f2929b5efff168c934df9 
trojan-clicker.win32.costrat.z.dll 69550  4dae2d4022d5016db549eecf244309bc23/01/2020
bc9076e7cac3cedf7aaccb72ed8e135764c2de450494ae7309f617a7927da446.exe 71540  0605cdbfad492ec041a242cbb21b5fc403/08/2023

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware