Home / Spyware Encyclopedia / Clicker.Costrat.l << Back

Recommendation to Automatically remove Clicker.Costrat.l


Our products can remove Clicker.Costrat.l and thousands of other Virus and Spyware automatically and instantly.

Clicker.Costrat.l Details


  • Category Clicker
  • Discovered 12/3/2012 11:59:13 PM
  • Modified 8/3/2023 5:33:19 PM
  • Threat Level Low
  • Category Description
    This family of Trojans redirects victim machines to specified websites or other Internet resources. Clickers either send the necessary commands to the browser or replace system files where standard Internet urls are stored. Clickers are used: 1. To raise the hit-count of a specific site for advertising purposes. 2. To organize a DoS attack on a specified server or site. 3. To lead the victim to an infected resource where the machine will be attacked by other malware (viruses or Trojans).

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
88b59e13301a14eed6c399b0206fb5c9b92d27bfcc24c50942286dc2af6c6fdc.exe 73818  41e1b6baf791f6e9d88f4171e9bb5cb9 
a0c170103d32cc7a992f2c4258500784.dll.exe 77777  a0c170103d32cc7a992f2c4258500784 
239c680fbeca7d9135eaa1b202f5da3e.exe 77824  239c680fbeca7d9135eaa1b202f5da3e 
3f0f02475141391cbd9533ac95741038.exe 77824  3f0f02475141391cbd9533ac95741038 
c3f9a418bec2d525b4776cae40477611.dll.exe 28710  c3f9a418bec2d525b4776cae40477611 
3eaa5b1faefd9ac793de245cbcc69ff5.vir.exe 70391  3eaa5b1faefd9ac793de245cbcc69ff5 
dfe2ab63607e5a447c00166e50460a95.vir.exe 74240  dfe2ab63607e5a447c00166e50460a95 
1056dcbb8bb973dc0bfcde286e0edc2a.vir.exe 73728  1056dcbb8bb973dc0bfcde286e0edc2a 
344f71c0fd648fb26a73259a1ade5b3f.vir.exe 73728  344f71c0fd648fb26a73259a1ade5b3f 
64abbbe4bf658b97bfca7ecf4a4c31eb.vir.exe 77824  64abbbe4bf658b97bfca7ecf4a4c31eb 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware