Once executed, the virus tries to download an executable file to C:net.exe from one of the following locations:
and executes it. The downloaded file is a fileinfector which infects other files with this type of virus.
Most of installer packages become corrupted because the virus modifies the overlay data in an irredeemable way.
But the rest of files and all code data from executables can be restored.
Find out more about this security threat .