During infection, it creates three files to the root directory of the C: drive.
First it creates a file containing the virus code. To name this file the virus uses user's initials (for example, "JD" for John Doe).
After that it infects the global template. It creates a new module ("ThisDocument") to the global template containing the code that will get control when the Word is started.
Then it creates a file using the name "True.bat" or "False.bat". This file is used to copy the infected template to the Word's startup directory.
When Word is started and the infected template gets control through the copy in the startup directory, the virus checks if the virus has been removed from the global template, for example user has deleted the "NORMAL.DOT". If so it creates yet another file, "v1.bas". This file is used to restore the virus to the global template.
When the global template is infected, the virus will attempt to infect every document that is closed.
Additionally the virus hooks both the "Tools/Macros/Macro" and "Tools/Macros/Visual Basic Editor" menus.
When an infected document is opened, the virus will test if minutes of the system time is 30 and seconds are greater than 15. If the test passes then one of the two payloads will be activated.
Every 10th of each month it will display a dialog with a following title:
and the following text:
The dialog contains two buttons. If user selects "Yes", the dialog will be redisplayed, but if user selects "No" the dialog will be closed and no futher action will be taken.
In every other day it will change the Word's window caption to:
This text will be scrolled in the status bar as well. After scrolling Next, it changes the status bar to:
At this point the title text will be changed once more to:
Microsoft Word Loves (UserName)
where "(UserName)" will be the current user name. The same text will be inserted to the active document.