This is an Internet worm, which spreads in IRC networks. Once executed, it starts its spreading routine and may have a payload. It may infect personal documents, corrupt system files or delete several programs. The worm may be used by attackers to control your system remotely.
• Hides from the user
It might be that we are affiliated with any of our recommended products. Full disclosure can be found in
our Agreement of Use.