|Detected||Jun 28 2007 08:49 GMT|
|Released||Oct 08 2007 03:40 GMT|
|Published||Jun 28 2007 08:49 GMT|
Once launched, the Trojan extracts a BMP file from itself and will display it on the victim machine.
The images show may vary according to the Trojan variant.
The Trojan replaces user files with the BMP file contained in its body.
As a result, the operating system will become non-functional.
If your computer does not have an up-to-date antivirus, or does not have an antivirus solution at all, follow the instructions below to delete the malicious program:
This type of behaviour covers malicious programs that delete, block, modify, or copy data, disrupt computer or network performance, but which cannot be classified under any of the behaviours identified above.
This classification also covers “multipurpose” Trojan programs, i.e. those that are capable of conducting several actions at once and which demonstrate several Trojan behaviours in a single program. This means they cannot be indisputably classified as having any single behaviour.