TrojanDownloader.Win32.Slime.b, Downloader-CL, Trojan.Slime, W32/Slime-B, TROJ_SLIME.A,
TR/Dldr.Slime.B.11, Win32:Trojan-gen., Downloader.Generic.KCR, Trojan.Downloader.Slime.B, Trojan Horse,
Category: Trojan Horse
Active & Spreading
Asia, North and South America, and some parts of Europe and Australia
23 Apr 2004
The W32.Slime Trojan program tries to download pieces of data from a predefined site, and then opens it. It is a virus that contaminates portable executable files with an .exe extension.
W32.Slime Removal Tool
If you have Malware on your computer it will cause annoyances and will damage your system. You should either:
A. Manually remove the infected files from your computer, or
B. Automatically scan your system using trusted software
We recommend that you scan your system for malware. Our partner has a trojan horse removal tool to automatically clean W32.Slime from your computer.
More details about W32.Slime
The W32.Slime program is a Trojan horse. It tries to get a file from a website, and then opens it. A Trojan horse contaminates portable executable files that have an .exe extension. This Trojan horse is compressed with “tELock”. When a document is contaminated with W32.Slime, the Trojan makes the file “%System%\Rundll.exe”, which is the viral part of the virus. It is 27 megabytes in length. The W32.Slime changes the value of the registry key to “@="%System%RUNDLL.EXE “%1” %*"”, so that the Trojan opens each time an .exe or executable file is launched. The Trojan connects to a website to get and execute a file. The contents of these files may differ depending on what the Trojan makes. When an .exe file is launched, the Trojan adds its code to the host file. It also adds 250 bytes to the host file. The contaminated file raises 27 megabytes in size.
Security experts claim that the W32.Slime program is a malware because it brings about unauthorized changes to the infected computer. It redirects the user’s homepage to unwanted websites and cause more than normal amount of pop-ups on the user’s desktop. Emails originating from the victim computer may be sent and lost in favor of unauthorized parties. Finally, the user experiences a decelerated computer performance since system resources are inappropriately consumed by the malware.