ARE YOU FACING ANY PC OR INTERNET RELATED PROBLEMS?
FREE SUPPORT INCLUDED. CALL US 24/7
powered by Anytech365
Virus Encyclopedia
Welcome to the Virus Encyclopedia of Panda Security.
Chernobyl | |
Threat Level![]() ![]() ![]() |
On April 26, Chernobyl activates and carries out the following actions:
The routine followed by Chernobyl in order to carry out its infection is:
Chernobyl does not use any special means of transmission. It can spread through the means normally used by viruses: e-mail messages, computer networks, FTP file transfers, CD-ROMs, floppy disks, etc.
In order to give you further information about Chernobyl, below is a list of interesting facts:
The variant Chernobyl.1010 activates on June 26 and its code contains the following string: CIH v1.3 TT IT.
The variant Chernobyl.1019 activates on the 26 of any month and its code contains the following string: CIH v1.4 TATUNG.
ARE YOU FACING ANY PC OR INTERNET RELATED PROBLEMS?
FREE SUPPORT INCLUDED. CALL US 24/7
powered by Anytech365
Hello!
You’re about to visit our web page in English
Would you like to continue?
If this is not what you’re looking for,