Home / Spyware Encyclopedia / Clicker.Aplugin << Back

Recommendation to Automatically remove Clicker.Aplugin


Our products can remove Clicker.Aplugin and thousands of other Virus and Spyware automatically and instantly.

Clicker.Aplugin Details


  • Category Clicker
  • Discovered 5/6/2009 6:25:58 PM
  • Modified 10/30/2009 3:56:00 PM
  • Threat Level Low
  • Category Description
    This family of Trojans redirects victim machines to specified websites or other Internet resources. Clickers either send the necessary commands to the browser or replace system files where standard Internet urls are stored. Clickers are used: 1. To raise the hit-count of a specific site for advertising purposes. 2. To organize a DoS attack on a specified server or site. 3. To lead the victim to an infected resource where the machine will be attacked by other malware (viruses or Trojans).

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
Trojan-Spy.Win32.Banker.atd.exe 8192 2.0.0.05c51524333901bda6190a3e70c363b1f 
download.exe 176640  fedc90e292105efa20b02daaacf8b4ef 
Trojan-Spy.Win32.Banker.au.exe 229985  160823fca34df66282702e27f7a2cc3e 
TROJAN-SPY.WIN32.BANKER.AW.EXE 5184  015f6c916d184b6bd2cef437affa52c0 
Trojan-Spy.Win32.Banker.atb.exe 111480Microsoft Corporation1.0.0.97fdbd7285b134ed515d83dcfa21855a52 

The following Registry Entries were created:
..\Software\Microsoft\Windows\CurrentVersion\Run\\"System"\"%WIN.SYS32%\sound.scr"
..\Software\Microsoft\Windows\CurrentVersion\Run\\"order_Shell"\"%DAS.AU%\order_skuw.exe"
..\Software\Microsoft\Windows\CurrentVersion\Run\\"OLE"\"%WIN%\TROJAN-SPY.WIN32.BANKER.AW.EXE"
..\Software\Microsoft\Windows\CurrentVersion\Run\\"Apoint System"\"%DAS.AU.LS%\Temp\trojan-spy.win32.banker.awk.exe"
..\Software\Microsoft\Windows\CurrentVersion\Run\\"svchost64"\"%WIN.SYS32%\svchost64.exe"
..\Software\Microsoft\Windows\CurrentVersion\Run\\"Taskmgo"\"%WIN.SYS%\download.exe"

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware