|Detected||Feb 21 2007 09:07 GMT|
|Released||Jun 13 2007 13:31 GMT|
|Published||Feb 21 2007 09:07 GMT|
Once launched, the Trojan modifies values in the following system registry key parameters to:
The Trojan then ceases running and deletes its executable file.
If your computer does not have an up-to-date antivirus, or does not have an antivirus solution at all, follow the instructions below to delete the malicious program:
This type of behaviour covers malicious programs that delete, block, modify, or copy data, disrupt computer or network performance, but which cannot be classified under any of the behaviours identified above.
This classification also covers “multipurpose” Trojan programs, i.e. those that are capable of conducting several actions at once and which demonstrate several Trojan behaviours in a single program. This means they cannot be indisputably classified as having any single behaviour.