Backdoor:W32/IRCBot.GNS can arrive on a system by being dropped via other malware.
When executed it will create a copy of itself in the following location:
Note: %windir% is the Windows directory, usually C:\Windows\
It creates a registry launchpoint to start itselt on system startup.
The malware will attempt to establish a connection to the following IRC Server and join the channel #pBot:
The presence of outbound network traffic to this address is a symptom of infection.
It creates this value:
It creates this file:
Actions that Backdoor:W32/IRCBot.GNS can be ordered to carry out include: