Introduction - If you have any usage issues, please Google them yourself
Code implements a simulated signature-based scanning Trojan gadget. All contents of the disk can scan signature matching, if found suspicious files can be deleted immediately. MD5 signature algorithm