This program delivers advertising content to the user. It is usually annoying but harmless, unless it is combined with spyware or trackware.
Based on the settings of your F-Secure security product, it may block the file from running, move it to the quarantine where it cannot spread or cause harm, or ask you to select an action.
A False Positive is when a file is incorrectly detected as harmful, usually because its code or behavior resembles known harmful programs. A False Positive will usually be fixed in a subsequent database update without any action needed on your part. If you wish, you may also:
Check for the latest database updates
First check if your F-Secure security program is using the latest updates, then try scanning the file again.
Submit a sample
After checking, if you still believe the file is incorrectly detected, you can submit a sample of it for re-analysis.
Note: If the file was moved to quarantine, you need to collect the file from quarantine before you can submit it.
Exclude a file from further scanning
If you are certain that the file is safe and want to continue using it, you can exclude it from further scanning by the F-Secure security product.
Note: You need administrative rights to change the settings.
Adware:W32/LinkOptimizer is an adware application with active rootkit technology.&
This adware& tries to use social engineering to convince the user to download and execute it by imitating one of the following file names:
The files using the COM extension can actually be executed exactly the same as EXE, CMD, SCR and other Windows executable formats; despite the COM extension, the file is actually the downloader that will download LinkOptimizer adware and its rootkit component.
Once the downloader is executed, it will download and drop the following files:
LinkOptimizer adds itself to the registry as a browser helper object (BHO) to maintain control of Internet Explorer instances.
While the browser is running, LinkOptimizer displays pop-up windows at random intervals.
&It also hijacks the default search page and attempts to connect to various hard-coded sites in order to download and execute files.
Adware.LinkOptimizer is installed as a BHO by adding the following registry subkey:
Adware is loaded to the following registry subkey:
The DLL file and the registry key are hidden by the rookit.
The program also overwrites the default URLSearchHooks onHKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\URLSearchHooks in order to hijack Internet Explorer address bar searches:
More recently, LinkOptimizer has been bundled with a powerful rootkit named Gromozon. Gromozon's main purpose is to hide its own presence (and the LinkOptimzer component's) using numerous techniques such as:
As part of its stealth functionality, the rootkit installs a range of hooks (see above).
Attempts to connect to:
Installs these hooks: