msert.exe sample submitted on 2011-05-12 and identified as a threat. Alias: Threat File:msert.exe Submit time:2011-05-12 Excute time:6 min 29 sec Level of Spread:2 Level of Threat:4 type:P2P-Worm.Win32.Palevo Filesize:48K Bytes 0K Bytes 1K Bytes Files type msert.exe is Windows exe file. MD5:nByMMH5k6NDHpBLwO3Au75oKs71hQ0sF SHA1..:vj2UupP6AveI8dT2WJi1CQ8s0EM5YK0G16JddxxA Path: D:\System Volume Information\ _restore…\msert.exe D:\System Volume Information\msert.exe Report Countries: United Kindom Faroe Islands Antivirus Program [...]

Why You should remove spyware, malware and viruses from your PC?

Trojan horses are designed to allow a hacker remote access to a target computer system. Once a Trojan horse has been installed on a target computer system, it is possible for a hacker to access it remotely and perform various operations. The operations that a hacker can perform are limited by user privileges on the target computer system and the design of the Trojan horse.

Antivirus software is designed to detect and delete Trojan horses, as well as preventing them from ever being installed. Although it is possible to remove a Trojan horse manually, it requires a full understanding of how that particular Trojan horse operates. In addition, if a Trojan horse has possibly been used by a hacker to access a computer system, it will be difficult to know what damage has been done and what other problems have been introduced. In situations where the security of the computer system is critical, it is advisable to simply erase all data from the hard disk and reinstall the operating system and required software.