Home Malware Programs Trojans Trojan.Vikadclick

Trojan.Vikadclick

Posted: May 12, 2014

Threat Metric

Threat Level: 9/10
Infected PCs: 33
First Seen: May 12, 2014
Last Seen: October 31, 2022
OS(es) Affected: Windows


Trojan.Vikadclick is a Trojan that may carry out click-fraud activity on the infected computer system. Once Trojan.Vikadclick is loaded, it creates potentially malicious files on a corrupted PC. Trojan.Vikadclick also deletes existing files on the targeted PC. Trojan.Vikadclick creates the registry entries. Trojan.Vikadclick may contact remote servers. Trojan.Vikadclick allows cybercriminals to gain remote unauthorized access and control over the attacked computer system.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



%UserProfile%\Application Data\locallow\[RANDOM CHARACTERS].dll File name: %UserProfile%\Application Data\locallow\[RANDOM CHARACTERS].dll
File type: Dynamic link library
Mime Type: unknown/dll
Group: Malware file
%UserProfile%\Application Data\roaming\[RANDOM CHARACTERS].dll File name: %UserProfile%\Application Data\roaming\[RANDOM CHARACTERS].dll
File type: Dynamic link library
Mime Type: unknown/dll
Group: Malware file
%System%\[5 TO 7 RANDOM DIGITS].[3 RANDOM LETTERS] File name: %System%\[5 TO 7 RANDOM DIGITS].[3 RANDOM LETTERS]
Mime Type: unknown/[3 RANDOM LETTERS]
Group: Malware file
%System%\sysprep\cryptbase.dll File name: %System%\sysprep\cryptbase.dll
File type: Dynamic link library
Mime Type: unknown/dll
Group: Malware file

Registry Modifications

The following newly produced Registry Values are:

HKEY..\..\{Value}HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DirectDraw\MostRecentApplication\"Name" = "[TROJAN PATH]"HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DirectDraw\MostRecentApplication\"ID" = [RANDOM DIGIT]

Additional Information

The following URL's were detected:
Asgardmen.comAzogroman.comFuturama88.comGoeorhbmsd.comQwertyport.comRamatuar12.com
Loading...