MIRC Abuser
MIRC Abuser usually sneaks into the computer by pretending being a useful tool, but instead of performing useful actions it infects mIRC and allows the anonymous hacker to control the computer through it. The hacker becomes able to produce harmful actions and, what is more, use the infected machine as a DoS attack tool.
File System Modifications
- The following files were created in the system:
# File Name 1 cd-r doubler.exe 2 mirc32.exe
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.