W95/Bumble.1736a, W95.Bumble.1738, Win95.Bumblebee.1736, W95/Becoming, Win95/Becoming.1738
W32/Bumblebee.1738, Win95:Bumblebee, W95/Bumblebee, Win32.Bumble.1738 , W95/Bumble.1738
Category: Computer Virus
Active & Spreading
Asia, North and South America, and some parts of Europe and Australia
29 Apr 1999
The W95.Bumblebee.1738 program is a self-mutating Trojan that modifies system files in Windows Win 32 by exploiting the system’s security vulnerability without the victim’s knowledge. It also disables security tools, allowing it to further download Trojans from outside servers.
W95.Bumblebee.1738 Removal Tool
If you have Malware on your computer it will cause annoyances and will damage your system. You should either:
A. Manually remove the infected files from your computer, or
B. Automatically scan your system using trusted software
We recommend that you scan your system for malware. Our partner has a computer virus removal tool to automatically clean W95.Bumblebee.1738 from your computer.
More details about W95.Bumblebee.1738
This program facilitates the downloading of files and programs from the Internet. The Internet site from which the files or programs are downloaded from is a site that had been predetermined by the creator of the program’s server component. In some instances, the program downloads malicious software without the consent or the knowledge of the user. The program’s ability to download malicious files from the Internet is also a means through which viruses, worms and other malware can be spread easily to all networked computers.
The W95.Bumblebee.1738 program, just like any other Trojan, makes use of deceptive pretenses in order to enter the system of the targeted computer. It is installed without seeking the consent of the user since it does not present any End-User License Agreement (EULA) prior to its installation. Moreover, the software does not reveal too the user any possible privacy risk associated with its installation. The program usually takes advantage of systems that lack adequate spyware protection. The most common point of entry of this Trojan is through downloading files and programs from a Peer-to-Peer (P2P) network that carries the Trojan. Other means include visiting malicious websites that downloads and installs the program, as well as freeware and shareware.