This virus adds itself to the end of infected files and encrypts the full file after that.
Depending on the settings of your F-Secure security product, it will either automatically delete, quarantine or rename the suspect file, or ask you for a desired action.
More scanning & removal options
More information on the scanning and removal options available in your F-Secure product can be found in the Help Center.
You may also refer to the Knowledge Base on the F-Secure Community site for more information.
When run, the virus decrypts the original program and writes it to the file called HOOTERS.EXE. Then it executes this file and finally deletes it - sometimes leaving a zero byte HOOTERS.EXE behind.
A side-effect of this is that the memory map might list - for example - an infected mouse driver as HOOTERS.EXE instead of MOUSE.EXE.
Hooters was found in the wild in Australia in September 1996. It has been spread over the internet.
Description Details: Mikko Hypponen, F-Secure