Just like the AIDS-2 virus, this one is in the form of a .COM file, which will locate a .EXE file and create a corresponding .COM file, exploiting the fact that DOS will first execute the .COM file, containing the virus. The virus will then later execute the .EXE file.
In addition, the virus hides infected files, when it is active in memory.
Based on the settings of your F-Secure security product, it will either move the file to the quarantine where it cannot spread or cause harm, or remove it.
Date Created: -
Date Last Modified: -