COD
This malicious spyware usually infects the computer as a macro from *.DOC files . Once the user runs this file, spyware activates and starts performing its actions. First of all, it tries to infect IRC and, in case of success, gets a partial control over it. This means logging user's keystrokes and writing them into a special log file, which is freely available for the hacker. This means a very high possibility of losing private data, such as passwords.
File System Modifications
- The following files were created in the system:
# File Name 1 pornlist.doc
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.