Home / Spyware Encyclopedia / Clicker.Costrat.e << Back

Recommendation to Automatically remove Clicker.Costrat.e


Our products can remove Clicker.Costrat.e and thousands of other Virus and Spyware automatically and instantly.

Clicker.Costrat.e Details


  • Category Clicker
  • Discovered 8/31/2011 10:26:18 PM
  • Modified 7/31/2023 5:21:56 PM
  • Threat Level Low
  • Category Description
    This family of Trojans redirects victim machines to specified websites or other Internet resources. Clickers either send the necessary commands to the browser or replace system files where standard Internet urls are stored. Clickers are used: 1. To raise the hit-count of a specific site for advertising purposes. 2. To organize a DoS attack on a specified server or site. 3. To lead the victim to an infected resource where the machine will be attacked by other malware (viruses or Trojans).

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
e94e91039035c658f95e975ab6c2a368.vir.exe 740938  e94e91039035c658f95e975ab6c2a368 
60833d568b8c7ae0a7de0381e47b3e82.vir.exe 26112  60833d568b8c7ae0a7de0381e47b3e82 
4efbb5b1cf6594e23d50fec13fbc02a97091e2b975756d67dd65d7dcf40b658c.dll 61088  ca844fb5787d28fb2684b79f0fd9417208/08/2023
1ab0f7c7dfaf61a0f625769bd9fc37cbdaa7a08b97f62735fb563e2e860c6dcf.exe 270336  b1bcaf90c9a196f506f939bafd535c5218/07/2023
f0399d2408546792a0351f8e03b81c12.vir.exe 77312  f0399d2408546792a0351f8e03b81c12 
7a35e7e3bc814a841cab39b24c909e8f.vir.exe 80386  7a35e7e3bc814a841cab39b24c909e8f 
16538b82cfa86538fe9d1de5ef07f1a9.vir.exe 15806  16538b82cfa86538fe9d1de5ef07f1a9 
48f945b1c1ce6a679d678c62e0a6cdf8.vir 61040  48f945b1c1ce6a679d678c62e0a6cdf8 
ef7c1fbee4e5c339b41d23ae6ef0e09e.vir.exe 75776  ef7c1fbee4e5c339b41d23ae6ef0e09e 
2f4d33d22628e58737640b096b70b95a0bd70b433650323a52340df687f2171e.exe 27335  3e70e9d14bc30558929c85c3715e140c 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware