This infection has Rootkit functionality keeping "%Windir%\<RandamNumbers:RandamNumbers.exe>" hidden and hooking various user mode functions.
The Trojan also performs backdoor activity by contacting a Command and Control server on port 22292 or 80. The IP address of the server may be one of the following: