x
48h OFFER
If you're already a customer of
our homeusers protection,
renew now with a 50% off
RENEW NOW
x
SPECIAL OFFER
If you're already a customer of
our homeusers protection,
renew now with a 50% off
RENEW NOW
x
HALLOWEEN OFFER
take advantage of our
terrific discounts
BUY NOW AND GET A 50% OFF
x
CHRISTMAS OFFER
Buy the best antivirus
at the best price
BUY NOW AND GET A 40% OFF
x
SPECIAL OFFER
Buy the best antivirus
at the best price
BUY NOW AND GET A 50% OFF
x
BLACKFRIDAY OFFER
Buy the best antivirus
at the best price
TODAY ONLY UP TO 70% OFF
x
CYBERMONDAY OFFER
Buy the best antivirus
at the best price
(Only for homeusers)
TODAY ONLY UP TO 70% OFF
Active Scan. Scan your PC free
Panda Protection

Virus Encyclopedia

Welcome to the Virus Encyclopedia of Panda Security.

Encyclopedia GetVirusCard True 0

Trile.C

 
Threat LevelModerate threatDamageHighDistributionNot widespread
Common name:Trile.C
Technical name:W32/Trile.C
Threat level:Low
Alias:W32/Nofear.C
Type:Worm
Effects:  It infects a large number of files and ends active processes belonging to antivirus and security programs.

Affected platforms:

Windows XP/2000/NT/ME/98/95

Detection updated on:June 23, 2003
StatisticsNo

Brief Description 

    

Trile.C is a worm that infects a large number of files on infected computers by copying itself to the beginning of them and ends active processes belonging to antivirus and security programs.

This worm mainly spreads via e-mail and the P2P (peer to peer) file sharing programs KaZaA and Shareaza. When it spreads via e-mail, Trile.C reaches computers in a message that includes an attached file with variable characteristics. For a list of these files click here.

When it has infected a computer, Trile.C sends itself out to all the contacts in the Address Book in Outlook.

Visible Symptoms 

    

Trile.C is easy to recognize, as after infecting a computer, Trile.C displays one of seven different error messages on screen, for example:

In order to see the other six possible error messages displayed by Trile.C, click here.