Home / Spyware Encyclopedia / Clicker.Costrat.e << Back

Recommendation to Automatically remove Clicker.Costrat.e


Our products can remove Clicker.Costrat.e and thousands of other Virus and Spyware automatically and instantly.

Clicker.Costrat.e Details


  • Category Clicker
  • Discovered 8/31/2011 10:26:18 PM
  • Modified 7/31/2023 5:21:56 PM
  • Threat Level Low
  • Category Description
    This family of Trojans redirects victim machines to specified websites or other Internet resources. Clickers either send the necessary commands to the browser or replace system files where standard Internet urls are stored. Clickers are used: 1. To raise the hit-count of a specific site for advertising purposes. 2. To organize a DoS attack on a specified server or site. 3. To lead the victim to an infected resource where the machine will be attacked by other malware (viruses or Trojans).

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
382022c16c64d8b7c67bd3d82a394905.exe 81408  382022c16c64d8b7c67bd3d82a394905 
1ab0f7c7dfaf61a0f625769bd9fc37cbdaa7a08b97f62735fb563e2e860c6dcf.exe 270336  b1bcaf90c9a196f506f939bafd535c52 
ab7b487b19a2ad63ec01e772b764c1682da35e1931870021f845c9e09d5c870d.exe 27487  2d275c7026d6bd04f375ab71732c7f19 
39abb2c4c6109a5b96ee9f9e41ba8dc9.vir.exe 13312  39abb2c4c6109a5b96ee9f9e41ba8dc9 
e94e91039035c658f95e975ab6c2a368.vir.exe 740938  e94e91039035c658f95e975ab6c2a368 
48f945b1c1ce6a679d678c62e0a6cdf8.vir 61040  48f945b1c1ce6a679d678c62e0a6cdf8 
7a35e7e3bc814a841cab39b24c909e8f.vir.exe 80386  7a35e7e3bc814a841cab39b24c909e8f 
1ab0f7c7dfaf61a0f625769bd9fc37cbdaa7a08b97f62735fb563e2e860c6dcf.exe 270336  b1bcaf90c9a196f506f939bafd535c5218/07/2023
4efbb5b1cf6594e23d50fec13fbc02a97091e2b975756d67dd65d7dcf40b658c.dll 61088  ca844fb5787d28fb2684b79f0fd9417208/08/2023
f0399d2408546792a0351f8e03b81c12.vir.exe 77312  f0399d2408546792a0351f8e03b81c12 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware