GTAL.EXE - Dangerous

%SysDir%\GTAL.EXE

Manual removal instructions:

Antivirus Report of %SysDir%\GTAL.EXE:
%SysDir%\GTAL.EXE Trojan.Generic [PCTools] Trojan Horse [Symantec] Backdoor.Win32.AutoIt.ac [Kaspersky Lab] Mal/Generic-L [Sophos] Trojan:Win32/Rimod [Microsoft] Backdoor.Win32.AutoIt [Ikarus] packed with UPX [Kaspersky Lab].
%SysDir%\GTAL.EXEDangerous
%SysDir%\GTAL.EXEHigh Risk
%sysdir%\gtal.exe
We suggest you to remove GTAL.EXE from your computer as soon as possible.
GTAL.EXE is known as: Trojan.Generic [PCTools] Trojan Horse [Symantec] Backdoor.Win32.AutoIt.ac [Kaspersky Lab] Mal/Generic-L [Sophos] Trojan:Win32/Rimod [Microsoft] Backdoor.Win32.AutoIt [Ikarus] packed with UPX [Kaspersky Lab].
MD5 of GTAL.EXE = 4D6C2CCAAD7F427F44AF506FFD32E9F5
GTAL.EXE size is 281843 bytes.
Full path on a computer: %SYSTEM%\GTAL.EXE
Related Files:
%TEMP%\PROGRAMA.EXE
%WINDIR%\SYSTEM\ADMDLL.DLL
%WINDIR%\SYSTEM\ASS\192.168.2.128\07.04.2011?. ? 03?.52???.43???..DAT
%WINDIR%\SYSTEM\ASS\192.168.2.128\07.04.2011?. ? 03?.53???.57???..DAT
%WINDIR%\SYSTEM\ASS\192.168.2.128\IE\INDEX.DAT
%WINDIR%\SYSTEM\ASS\192.168.2.128\IE\%USERNAME%@NAROD[1].TXT
%WINDIR%\SYSTEM\ASS\192.168.2.128\IMAGE.JPG
%WINDIR%\SYSTEM\ASS\192.168.2.128\INSTALLPROG.DAT
%WINDIR%\SYSTEM\ASS\192.168.2.128\IPCONFIG.DAT
%WINDIR%\SYSTEM\ASS\192.168.2.128\PROCESS.DAT
%WINDIR%\SYSTEM\BACKUP.EXE
%WINDIR%\SYSTEM\FILE\FILE.EXE
%WINDIR%\SYSTEM\INFO.EXE
%WINDIR%\SYSTEM\RADDRV.DLL
%WINDIR%\SYSTEM\SCRSS.EXE
%WINDIR%\SYSTEM\VISEDLL.DLL
%WINDIR%\SYSTEM\WINDOWSUPDATER.EXE
%WINDIR%\SYSTEM\WINUPDATE.INI
%WINDIR%\SYSTEM\WMIASPVR.EXE
%WINDIR%\SYSTEM\WMIRPVSE.EXE
%SYSTEM%\GTAL.EXE

Remove GTAL.EXE now!

Dmitry Sokolov:

I created UnHackMe in 2006 to fix the problem that antivioruses did not fix: detecting rootkits.

Since that time I work every day to fix the issues that antiviruses cannot.

If your antivirus have not helped you solve the problem, you should try UnHackMe.

We are a small company and you can ask me directly, if you have any questions.

Testimonials

You can read UnHackMe testimonials here.