| 1. | Either delete or restore from backup the file mirc . ini 删除或从备份回存mirc . ini档案。 |
| 2. | With the mirc client installed , i launched the mirc application from the 安装mirc客户机后,我从 |
| 3. | Delete all files named remote32 . ini in your mirc folders 删除所有在你的mirc资料夹中以remote32 |
| 4. | If you have mirc program installed , please execute following extra steps 如果已安装mirc程式,请执行以下的额外步骤。 |
| 5. | If mirc is installed , it allows the computer to be used in dos attack 如果安装了mirc ,她会利用受感染的电脑进行dos攻击。 |
| 6. | It uses mirc to install a backdoor through scripts contained in the dropped remote32 . ini file 蠕虫会在mirc中遗下一个remote32 . ini档案来安装后门程式,然后她会在mirc |
| 7. | If mirc . ini file is found , the infected computer send the url ot other user over irc network 如果找到mirc . ini档案,受感染的电脑会传送自己url至irc网络上的其他使用者。 |
| 8. | I chose to install the popular mirc client for windows . at the time of this writing , v6 . 16 was the most current version 我选择安装用于windows的常见的mirc客户机(在撰写本文时, v6 . 16是最新版本) 。 |
| 9. | If irc is installed , this worm can also insert mirc scripts that will enable the computer to be used in denial of service ( dos ) attacks 如果被感染电脑已安装irc ,她还会插入一个mirc脚本程式来使受影响的电脑进行阻断服务( denialofservice )的攻击。 |