Trojans are malicious applications that pose themselves as legitimate software in order to trick users to install them. Once on the victim's machine, it may run any number of malicious process to steal vital information or inflict damage to other software.
Logs keystrokes and captures data from the windows clipboard, cached passwords,information from windows protected storage area and tries to steal Internet and mail account passwords and usernames.
Attempts to log finiancial and other information using the window titles containing the following strings:
Changes the behaviour of Internet Explorer and Windows Explorer and opens up a random listening port for remote access.
Sets mappings in the windows host file to prevent access to Anti-virus and security sites.