Selected viruses, spyware, and other threats: sorted alphabetically
Short descriptionThe trojan is designed to artificially generate traffic to certain Internet sites.
InstallationWhen executed the trojan copies itself in the following locations:
- [HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersion
"SHELL" = "explorer.exe, "%localappdata%microsoftwindowswtnmm.exe""
Other informationThe trojan sends HTTP requests to simulate clicks on banner advertisements, to inflate web counter statistics etc.
The trojan is sent data and commands from a remote computer or the Internet.
The trojan contains a list of (1) URLs. The HTTP protocol is used.
It can execute the following operations:
- download files from a remote computer and/or Internet
- run executable files