What do trojans do? From the wiki article on them:
http://en.wikipedia.org/wiki/Trojan_horse_(computing)
notice the entry for modification and deletion of files? Well, when I updated the bot to remember where you dragged it and what abilities/quests you had used the last operation, I had to add/modify a configuration file.
So now you can look at your error information, First word being Heuristics and last word being generic.
A heuristic scan just looks at the programs (from wiki also):
Heuristic analysis - Wikipedia, the free encyclopedia
and lastly, notice the word generic. It means that the antivirus doesnt know which of the thousands of trojans have actually been discovered my bot is most like, it is just a generic one.
Your guess is a good as mine as to why it is a virus.
So, you have two options either send me $374.89 USD before midnight tonight and we keep your discovery between ourselves, or you can risk everything you have worked on! J/K, but seriously donate.
http://en.wikipedia.org/wiki/Trojan_horse_(computing)
Code:
Operations that could be performed by a hacker on a target computer system include: Use of the machine as part of a botnet (e.g. to perform automated spamming or to distribute Denial-of-service attacks) Data theft (e.g. retrieving passwords or credit card information) Installation of software, including third-party malware Downloading or uploading of files on the users computer Modification or deletion of files Keystroke logging Watching the users screen Crashing the computer Anonymizing internet viewing
So now you can look at your error information, First word being Heuristics and last word being generic.
A heuristic scan just looks at the programs (from wiki also):
Heuristic analysis - Wikipedia, the free encyclopedia
Code:
Most antivirus programs that utilize heuristic analysis perform this function by executing the programming commands of a questionable program or script within a specialized virtual machine, thereby allowing the anti-virus program to internally simulate what would happen if the suspicious file were to be executed while keeping the suspicious code isolated from the real-world machine. It then analyzes the commands as they are performed, monitoring for common viral activities such as replication, file overwrites, and attempts to hide the existence of the suspicious file. If one or more virus-like actions are detected, the suspicious file is flagged as a potential virus, and the user alerted.
Your guess is a good as mine as to why it is a virus.
So, you have two options either send me $374.89 USD before midnight tonight and we keep your discovery between ourselves, or you can risk everything you have worked on! J/K, but seriously donate.