The Internet threat alert status is currently normal. At present, no major epidemics or other serious incidents have been recorded by Kaspersky Lab’s monitoring service. Internet threat level: 1


Detected Mar 10 2011 12:13 GMT
Released Mar 10 2011 20:32 GMT
Published Apr 19 2011 14:24 GMT

Technical Details
Removal instructions

Technical Details

This Trojan downloads another program and launches it on the victim machine without the user's knowledge or consent. It is a Java Script scenario within an HTML document. It is 181 bytes in size.


Once an infected page is opened in the browser, the Trojan in a hidden frame attempts to open the resource, located at the following link:


At the time of writing, this link was inactive.

Removal instructions

If your computer does not have antivirus protection and has been infected by this malicious program, follow the instructions below to delete it:

  1. Delete the original Trojan file (its location will depend on how the program originally penetrated the infected computer).
  2. Empty the Temporary Internet Files folder, which contains infected files (How to delete infected files from Temporary Internet Files folder?):
    %Temporary Internet Files%
  3. Perform a full scan of the computer using Kaspersky Anti-Virus with up-to-date antivirus databases (download a trial version).

[MD5: 31c75535c2eb59aa0dcc6009634e492a]

[SHA1: 756c84435997fe36e203904dbf535316fddbc1d2]

Bookmark and Share

Programs classified as Trojan-Downloader download and install new versions of malicious programs, including Trojans and AdWare, on victim computers. Once downloaded from the Internet, the programs are launched or included on a list of programs which will run automatically when the operating system boots up.

Information about the names and locations of the programs which are downloaded are in the Trojan code, or are downloaded by the Trojan from an Internet resource (usually a web page).

This type of malicious program is frequently used in the initial infection of visitors to websites which contain exploits.

Other versions