
Afterwards, it attempts to overwrite the target file and later deletes the created *.vir file. (Note: %Start Menu% is the current user's Start Menu folder, which is usually C:\Windows\Start Menu or C:\Documents and Settings\.vir, which contains the infected copy of the target file. It searches for target files in the following folders: It lets you edit or search for your files remotely, as well as set transfer speed limits. You can resume interrupted transfers due to lost connection for files larger than 4GB.

You may also set filename filters to quickly locate specific documents. The overwritten code is saved in the virus body. This design makes it easier for you to compare directory contents in one glance. It then appends the virus body to the target file. This file infector overwrites code found in the entry point of a target file. This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

Payload: Steals information, Collects system information, Connects to URLs/IPs
