How to Remove “Counter.exe”

What is Counter.exe?

Counter.exe is a legitimate file process developed by Alex Buturuga. It is associated with program Counter. You can locate the file in C:\Program Files. The virus is created by malware authors and are named them after Counter.exe file.

Affected Platform: Windows OS

How to check if your computer is infected with Counter.exe malware?

Keep an eye for the following symptoms to check if your PC is infected with Counter.exe malware:

  • Unstable internet connection
  • Browser redirects to unwanted websites
  • PC performance slows down
  • Browser is bombarded with hordes of popup ads
  • System screen freezes repeatedly

If you find any of  the above mentioned symptoms, take the following steps to be sure about the malware infection:

1) Press CTRL+ALT+DEL keys to open Task Manager.

2) Go to the process tab and right-click on the Counter.exe file and open its location.

If the file is located outside C:\Program Files, then you should take measures to get rid of the malware.

How to remove Counter.exe malware from system with Comodo Cleaning Essentials?

Comodo Cleaning Essentials (CCE) incorporates antivirus software with unique features like auto-sandboxing to identify and obstruct every suspicious process running on an endpoint with a single click. To remove malwares using Counter.exe, follow the steps mentioned below:

Step 1: Download the CCE suite.

Step 2: To start the application, double-click on the CCE.exe file.

Step 3: It then probes the antivirus to initiate a full system scan to identify and remove any existing malicious files.

Step 4: If threats are found during the scanning, you will be prompted with an alert screen.

Step 5: Comodo Cleaning Essentials will remove Counter.exe malware from your computer including all other malwares!
 

8

Malware Entries

First Seen: 24 October 2011 at 5:58 pm
No. Company File Type SHA1 MD5 Malware
Name
Digitally
Signed
File
Version
Product
Version
Submitted
From
Malware Behavior
1 N/A Executable 6b0efff4687e227c
4522aff84521dfaa
b100050b
695f31f72bb63860
b76cbefb66b71c02
TrojWare.Win
32.Agent.FKD
No N/A N/A Internal Submission N/A
2 MBTY Executable c23455cf602fa400
10d78ce43e1cc41e
3321454e
db7ac46550a6c92e
5f2b4b39889cf56a
TrojWare.Win
32.TrojanDow
nloader.Agen
t.~d018
No 12.09.06 N/A 10.224.1.117/32 N/A
3 N/A Executable 44cf12046be3132f
d00f7851569a96cf
5d84c32e
cffce5f11cadfb84
99287ac8ce7b64c8
Win32.Neshta
.A
No N/A N/A Romania N/A
4 N/A Executable fca1d47a5e953f73
841705503784ac03
eb70a97b
cc083be718c0c5e8
ab773a95887643a2
Unclassified
Malware
No 1.0.0.0 1.0.0.0 Internal Submission N/A
Display 4 items per page
  • 4 items per page
  • 8 items per page
  • 16 items per page
  • 32 items per page
33

Safe Entries

First Seen: 15 February 2009 at 11:29 am
No. Company File Type SHA1 MD5 Digitally
Signed
File
Version
Product
Version
Submitted
From
1 liony Executable e9b9d99d3b7f98fd
fa9b528309a7acdb
b7a48417
ff7c55645a82121a
22d896bc1cee776c
No 1.0.0.0 1.0.0.0 Internal Submission
2 N/A Executable a8ac58c40851633d
7abd7743171cd6d6
9c7c20f3
b9835ee472fe92d6
93abddf4030cfb0a
No N/A N/A Internal Submission
3 N/A Executable d5a4dd6e50290854
e1a20eb14fa08629
880de29f
d0ba254d2af52a68
a17da074b029ba2d
No N/A N/A Internal Submission
4 N/A Executable b6daf46e35bc4930
c4f05fa3e054d44d
41a1f01b
01d44d1df55476be
ca119d558f8ba8c7
No N/A N/A 10.224.1.115/32
Display 4 items per page
  • 4 items per page
  • 8 items per page
  • 16 items per page
  • 32 items per page
 
Exclusive Offer
Get Free Endpoint Protection
Get Advanced
Endpoint
Protection

Award-Winning Security to Protect Your Clients from Cyber Attacks

Comodo Internet Security Pro

Antivirus Protection protection from hackers! Get the ultimate Antivirus solution to keep your PC clean and to remove viruses from a slow or infected PC. Improve the PC performance at home or use it on-the-go!

Get Comodo Internet Security Comodo Internet Security