|Detected||Jul 18 2007 06:26 GMT|
|Released||Jul 18 2007 06:26 GMT|
If you’d like to find out more about how programs of this type function, please read about the general behavior of programs in the same class or sub-class (see right).
Because many programs of this type are slight modifications of older versions, the descriptions for these older versions may be of interest. Links to any available descriptions are displayed under the general description on the right of the screen.
If you can’t find a suitable description on our site, you can get more help from the Contact Us section.
This type of behaviour covers malicious programs that delete, block, modify, or copy data, disrupt computer or network performance, but which cannot be classified under any of the behaviours identified above.
This classification also covers “multipurpose” Trojan programs, i.e. those that are capable of conducting several actions at once and which demonstrate several Trojan behaviours in a single program. This means they cannot be indisputably classified as having any single behaviour.