This Trojan-Proxy connects to a remote server and enables the sending of email messages from the infected system.
Based on the settings of your F-Secure security product, it will either move the file to the quarantine where it cannot spread or cause harm, or remove it.
Once executed, this Trojan attempts to connect to a remote server. Once connected, it acts as a proxy server and enables the sending of email messages using the infected system.
Some of the remote servers it may connect to are as follows:
This Trojan has a stealth feature that hides the following files if they are present in the Windows system directory:
Date Created: -
Date Last Modified: -