PACKET32.DLL - Dangerous

%TEMP%\PACKET32.DLL

Manual removal instructions:

Antivirus Report of %TEMP%\PACKET32.DLL:
%TEMP%\PACKET32.DLL Mal/Generic-A [Sophos] Trojan.Horse [Ikarus].
%TEMP%\PACKET32.DLLDangerous
%TEMP%\PACKET32.DLLHigh Risk
%temp%\packet32.dll
We suggest you to remove PACKET32.DLL from your computer as soon as possible.
PACKET32.DLL is known as: Mal/Generic-A [Sophos] Trojan.Horse [Ikarus].
MD5 of PACKET32.DLL = B4EEBBF00CA5DE44183382D09E49DAAF
PACKET32.DLL size is 5632 bytes.
Full path on a computer: %TEMP%\PACKET32.DLL
Related Files:
%TEMP%\CGI\CGINOTIFY.TXT
%TEMP%\CGI\README.TXT
%TEMP%\CGI\SETUP.CGI
%TEMP%\CGI\SUBSEVEN.MEM
%TEMP%\CGI\SUBSEVEN.CGI
%TEMP%\CGI\SUBSEVEN.SET
%TEMP%\COMMANDS.CFG
%TEMP%\CONSOLE.LOG
%TEMP%\EDITSERVER.EXE
%TEMP%\HELP\CLIENTPLUGINFILE.TXT
%TEMP%\HELP\SENDKEYS.TXT
%TEMP%\HELP\SKINS.TXT
%TEMP%\ICQMAPI.DLL
%TEMP%\MENU.CFG
%TEMP%\PACKET32.DLL
%TEMP%\PAGES.CFG
%TEMP%\PLUGINS\ICQPWSTEAL.DLL
%TEMP%\PLUGINS\ICQPWSTEAL.TXT
%TEMP%\PLUGINS\MATRIX.DLL
%TEMP%\PLUGINS\MATRIX.TXT
%TEMP%\PLUGINS\RECMIC.DLL
%TEMP%\PLUGINS\RECMIC.TXT
%TEMP%\PLUGINS\S7ADVANCED.DLL
%TEMP%\PLUGINS\S7CAPTURE.DLL
%TEMP%\PLUGINS\S7FUN1.DLL
%TEMP%\PLUGINS\S7FUN2.DLL
%TEMP%\PLUGINS\S7KEYS.DLL
%TEMP%\PLUGINS\S7MOREINFO.DLL
%TEMP%\PLUGINS\S7PASSWORDS.DLL
%TEMP%\PLUGINS\S7SCANNER.DLL
%TEMP%\PLUGINS\S7SNIFFER.DLL
%TEMP%\PLUGINS\S7TAKEOVER.DLL
%TEMP%\PLUGINS\SNIFFER.LOG
%TEMP%\PREDEFINED.CFG
%TEMP%\README.TXT
%TEMP%\S7CONFIG.CFG
%SYSTEM%\UPLN.EXE
%TEMP%\SIN.EXE
%TEMP%\SKINS\WEED_SKIN.ZIP
%TEMP%\SKINS\WIN3000.ZIP
%TEMP%\SKINS\_TEMP\SKIN.INI
%TEMP%\SUB7.EXE
%TEMP%\ZPACKET.VXD
%WINDIR%\NOHXIJ.OIE

Remove PACKET32.DLL now!

Dmitry Sokolov:

I created UnHackMe in 2006 to fix the problem that antivioruses did not fix: detecting rootkits.

Since that time I work every day to fix the issues that antiviruses cannot.

If your antivirus have not helped you solve the problem, you should try UnHackMe.

We are a small company and you can ask me directly, if you have any questions.

Testimonials

You can read UnHackMe testimonials here.