CWS Downloader Trojan

CWS Downloader virus description
Technical details:
Categories: Trojan,Downloader

CWS Downloader Files:
[%PROGRAM_FILES%]\AutoPrint\srvany.exe
[%PROGRAM_FILES%]\AXIS Communications\AXIS ThinWizard\SRVANY.EXE
[%PROGRAM_FILES%]\Favorite Ware\Reminder.exe
[%PROGRAM_FILES%]\Gateway\EzTune\DTSRVC.exe
[%PROGRAM_FILES%]\Gateway\EzTune\dtsslsrv.exe
[%PROGRAM_FILES%]\gnway\ddns\gnsrv.exe
[%PROGRAM_FILES%]\LAN-Control\srvany.exe
[%PROGRAM_FILES%]\Network Monitor\netmon.exe
[%PROGRAM_FILES%]\Power Translator\LogoMedia TranslateDotNet Server.exe
[%PROGRAM_FILES%]\Priva\Priva Office\tools\srvany.exe
[%PROGRAM_FILES%]\RAdmin\r_server.exe
[%PROGRAM_FILES%]\Remote Task Manager\rtmservice.exe
[%PROGRAM_FILES%]\SAMSUNG\FW LiveUpdate\FWManager.exe
[%PROGRAM_FILES%]\SAPpc\SapGui\srvany.exe
[%PROGRAM_FILES%]\timbuktu pro\tb2launch.exe
[%PROGRAM_FILES%]\WinAntiVirus 2005 Pro\AVKernel.exe
[%PROGRAM_FILES%]\WinAntiVirus Pro 2006\FWSvc.exe
[%PROGRAM_FILES_COMMON%]\SNAPST~1\Common\X10nets.exe
[%PROGRAM_FILES_COMMON%]\WinTools\WToolsS.exe
[%PROGRAM_FILES_COMMON%]\X10\Common\X10nets.exe
[%SYSTEM%]\$sys$filesystem\$sys$DRMServer.exe
[%SYSTEM%]\acs.exe
[%SYSTEM%]\altsvc.exe
[%SYSTEM%]\aniServ.exe
[%SYSTEM%]\CfgSrvc.exe
[%SYSTEM%]\dllcache\win32\winlogon.exe
[%SYSTEM%]\drivers\etc\smss.exe
[%SYSTEM%]\FreezeScreenSaver.exe
[%SYSTEM%]\lsas.exe
[%SYSTEM%]\msCMTsrvc.exe
[%SYSTEM%]\ndesjcoq6.exe
[%SYSTEM%]\rtmservice.exe
[%SYSTEM%]\r_server.exe
[%SYSTEM%]\slee503.exe
[%SYSTEM%]\SnoopFreeSvc.exe
[%SYSTEM%]\Srvany.exe
[%SYSTEM%]\ujqdrj.exe
[%SYSTEM%]\windlls.exe
[%SYSTEM%]\x10nets.exe
[%WINDOWS%]\am9yZGFu\command.exe
[%WINDOWS%]\aQ\command.exe
[%WINDOWS%]\b3duZXI\command.exe
[%WINDOWS%]\c2FpZg\command.exe
[%WINDOWS%]\cmFj\command.exe
[%WINDOWS%]\IA\command.exe
[%WINDOWS%]\iejs.exe
[%WINDOWS%]\IGRvbg\command.exe
[%WINDOWS%]\Lg\command.exe
[%WINDOWS%]\QmFyYmFyYSBNIEhhd2tpbnM\command.exe
[%WINDOWS%]\QnJpYW4\command.exe
[%WINDOWS%]\QWFyb25z\command.exe
[%WINDOWS%]\RGFycmVu\command.exe
[%WINDOWS%]\RmFtLiBkZSBHcmVlZg\command.exe
[%WINDOWS%]\RWR3YXJkIEZvcnRlc2N1ZQ\command.exe
[%WINDOWS%]\S3Jpc3Rlbg\command.exe
[%WINDOWS%]\SG9tZQ\command.exe
[%WINDOWS%]\Sm9lIFN0ZXJu\command.exe
[%WINDOWS%]\SmFtYWhs\command.exe
[%WINDOWS%]\SmFtZXMgRCBWb3lsZXM\command.exe
[%WINDOWS%]\SmFtZXMgTGF1cmVuY2UgV2hpdGluZw\command.exe
[%WINDOWS%]\SmVhbmV0dGUgTGV1c2luaw\command.exe
[%WINDOWS%]\SmVmZiBNb3JhbGVz\command.exe
[%WINDOWS%]\SmVmZnJleQ\command.exe
[%WINDOWS%]\SnU\command.exe
[%WINDOWS%]\SnVhbiBGIExlemFtYQ\command.exe
[%WINDOWS%]\srvany.exe
[%WINDOWS%]\svcproc.exe
[%WINDOWS%]\SW5tYW4\command.exe
[%WINDOWS%]\SYSTEM\DRIVER\ntsrv.exe
[%WINDOWS%]\SYSTEM\DRIVER\ntuser.exe
[%WINDOWS%]\T0VN\command.exe
[%WINDOWS%]\T3duZXI\command.exe
[%WINDOWS%]\TGFycnkgTWFjaW9jaQ\command.exe
[%WINDOWS%]\TGlhbmUgV2hpdG5leQ\command.exe
[%WINDOWS%]\Tm9taXM\command.exe
[%WINDOWS%]\TmljayBTdGVyY3phbGE\command.exe
[%WINDOWS%]\TUlOSCBMRQ\command.exe
[%WINDOWS%]\TW9sbHkgQXJub2xk\command.exe
[%WINDOWS%]\twain_32\SiPix\SCBlink2\srvany.exe
[%WINDOWS%]\TWF0dCBaZXR6\command.exe
[%WINDOWS%]\TWU\command.exe
[%WINDOWS%]\U2V3YSBTaW5nYWw\command.exe
[%WINDOWS%]\U3RhbiBTbWl0aA\command.exe
[%WINDOWS%]\U3RlcGhlbiBBcndpbmU\command.exe
[%WINDOWS%]\UEI\command.exe
[%WINDOWS%]\UGF0IERlc2hhdw\command.exe
[%WINDOWS%]\UHJlZmVycmVkIEN1c3RvbWVy\command.exe
[%WINDOWS%]\UkQ\command.exe
[%WINDOWS%]\Um9iZXJ0bw\command.exe
[%WINDOWS%]\UXVhbGNvbW0\command.exe
[%WINDOWS%]\V2lsbCBNaXRjaGVsbA\command.exe
[%WINDOWS%]\VXNlcg\command.exe
[%WINDOWS%]\WGlhb0Jyb3RoZXI\command.exe
[%WINDOWS%]\YmI\command.exe
[%WINDOWS%]\YmVybmFyZCBj\command.exe
[%WINDOWS%]\YWRtaW4\command.exe
[%WINDOWS%]\zeta.exe
[%WINDOWS%]\ZHk\command.exe
[%WINDOWS%]\Zm8\command.exe
[%PROGRAM_FILES%]\AutoPrint\srvany.exe
[%PROGRAM_FILES%]\AXIS Communications\AXIS ThinWizard\SRVANY.EXE
[%PROGRAM_FILES%]\Favorite Ware\Reminder.exe
[%PROGRAM_FILES%]\Gateway\EzTune\DTSRVC.exe
[%PROGRAM_FILES%]\Gateway\EzTune\dtsslsrv.exe
[%PROGRAM_FILES%]\gnway\ddns\gnsrv.exe
[%PROGRAM_FILES%]\LAN-Control\srvany.exe
[%PROGRAM_FILES%]\Network Monitor\netmon.exe
[%PROGRAM_FILES%]\Power Translator\LogoMedia TranslateDotNet Server.exe
[%PROGRAM_FILES%]\Priva\Priva Office\tools\srvany.exe
[%PROGRAM_FILES%]\RAdmin\r_server.exe
[%PROGRAM_FILES%]\Remote Task Manager\rtmservice.exe
[%PROGRAM_FILES%]\SAMSUNG\FW LiveUpdate\FWManager.exe
[%PROGRAM_FILES%]\SAPpc\SapGui\srvany.exe
[%PROGRAM_FILES%]\timbuktu pro\tb2launch.exe
[%PROGRAM_FILES%]\WinAntiVirus 2005 Pro\AVKernel.exe
[%PROGRAM_FILES%]\WinAntiVirus Pro 2006\FWSvc.exe
[%PROGRAM_FILES_COMMON%]\SNAPST~1\Common\X10nets.exe
[%PROGRAM_FILES_COMMON%]\WinTools\WToolsS.exe
[%PROGRAM_FILES_COMMON%]\X10\Common\X10nets.exe
[%SYSTEM%]\$sys$filesystem\$sys$DRMServer.exe
[%SYSTEM%]\acs.exe
[%SYSTEM%]\altsvc.exe
[%SYSTEM%]\aniServ.exe
[%SYSTEM%]\CfgSrvc.exe
[%SYSTEM%]\dllcache\win32\winlogon.exe
[%SYSTEM%]\drivers\etc\smss.exe
[%SYSTEM%]\FreezeScreenSaver.exe
[%SYSTEM%]\lsas.exe
[%SYSTEM%]\msCMTsrvc.exe
[%SYSTEM%]\ndesjcoq6.exe
[%SYSTEM%]\rtmservice.exe
[%SYSTEM%]\r_server.exe
[%SYSTEM%]\slee503.exe
[%SYSTEM%]\SnoopFreeSvc.exe
[%SYSTEM%]\Srvany.exe
[%SYSTEM%]\ujqdrj.exe
[%SYSTEM%]\windlls.exe
[%SYSTEM%]\x10nets.exe
[%WINDOWS%]\am9yZGFu\command.exe
[%WINDOWS%]\aQ\command.exe
[%WINDOWS%]\b3duZXI\command.exe
[%WINDOWS%]\c2FpZg\command.exe
[%WINDOWS%]\cmFj\command.exe
[%WINDOWS%]\IA\command.exe
[%WINDOWS%]\iejs.exe
[%WINDOWS%]\IGRvbg\command.exe
[%WINDOWS%]\Lg\command.exe
[%WINDOWS%]\QmFyYmFyYSBNIEhhd2tpbnM\command.exe
[%WINDOWS%]\QnJpYW4\command.exe
[%WINDOWS%]\QWFyb25z\command.exe
[%WINDOWS%]\RGFycmVu\command.exe
[%WINDOWS%]\RmFtLiBkZSBHcmVlZg\command.exe
[%WINDOWS%]\RWR3YXJkIEZvcnRlc2N1ZQ\command.exe
[%WINDOWS%]\S3Jpc3Rlbg\command.exe
[%WINDOWS%]\SG9tZQ\command.exe
[%WINDOWS%]\Sm9lIFN0ZXJu\command.exe
[%WINDOWS%]\SmFtYWhs\command.exe
[%WINDOWS%]\SmFtZXMgRCBWb3lsZXM\command.exe
[%WINDOWS%]\SmFtZXMgTGF1cmVuY2UgV2hpdGluZw\command.exe
[%WINDOWS%]\SmVhbmV0dGUgTGV1c2luaw\command.exe
[%WINDOWS%]\SmVmZiBNb3JhbGVz\command.exe
[%WINDOWS%]\SmVmZnJleQ\command.exe
[%WINDOWS%]\SnU\command.exe
[%WINDOWS%]\SnVhbiBGIExlemFtYQ\command.exe
[%WINDOWS%]\srvany.exe
[%WINDOWS%]\svcproc.exe
[%WINDOWS%]\SW5tYW4\command.exe
[%WINDOWS%]\SYSTEM\DRIVER\ntsrv.exe
[%WINDOWS%]\SYSTEM\DRIVER\ntuser.exe
[%WINDOWS%]\T0VN\command.exe
[%WINDOWS%]\T3duZXI\command.exe
[%WINDOWS%]\TGFycnkgTWFjaW9jaQ\command.exe
[%WINDOWS%]\TGlhbmUgV2hpdG5leQ\command.exe
[%WINDOWS%]\Tm9taXM\command.exe
[%WINDOWS%]\TmljayBTdGVyY3phbGE\command.exe
[%WINDOWS%]\TUlOSCBMRQ\command.exe
[%WINDOWS%]\TW9sbHkgQXJub2xk\command.exe
[%WINDOWS%]\twain_32\SiPix\SCBlink2\srvany.exe
[%WINDOWS%]\TWF0dCBaZXR6\command.exe
[%WINDOWS%]\TWU\command.exe
[%WINDOWS%]\U2V3YSBTaW5nYWw\command.exe
[%WINDOWS%]\U3RhbiBTbWl0aA\command.exe
[%WINDOWS%]\U3RlcGhlbiBBcndpbmU\command.exe
[%WINDOWS%]\UEI\command.exe
[%WINDOWS%]\UGF0IERlc2hhdw\command.exe
[%WINDOWS%]\UHJlZmVycmVkIEN1c3RvbWVy\command.exe
[%WINDOWS%]\UkQ\command.exe
[%WINDOWS%]\Um9iZXJ0bw\command.exe
[%WINDOWS%]\UXVhbGNvbW0\command.exe
[%WINDOWS%]\V2lsbCBNaXRjaGVsbA\command.exe
[%WINDOWS%]\VXNlcg\command.exe
[%WINDOWS%]\WGlhb0Jyb3RoZXI\command.exe
[%WINDOWS%]\YmI\command.exe
[%WINDOWS%]\YmVybmFyZCBj\command.exe
[%WINDOWS%]\YWRtaW4\command.exe
[%WINDOWS%]\zeta.exe
[%WINDOWS%]\ZHk\command.exe
[%WINDOWS%]\Zm8\command.exe

CWS Downloader Registry Keys:
HKEY_LOCAL_MACHINE\system\currentcontrolset\enum\root\legacy__11f*00df*00e4*0006#*00b7*00ba*00c4*00d6`i
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\ 11F%DF%E4%06#%B7%BA%C4%D6`I
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\$sys$DRMServer
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\%8F 6Q%D4%F5%13'%AA%B4%C6%D08
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\ACS
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\ANISERVICE
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\AppSched
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\AppSched10
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Asset Management Daemon
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\AutoPrintPro
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\AVKernel
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Blink2PnP
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\CfgSrvc
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\cmdservice
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\DanaReg
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\DanaSubst
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\DistRestart
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Domino
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\DTSRVC
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Endcust
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\FreezeScreenSaver
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\FWSvc
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\GHServer
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\gnwayDDNS
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\HsspConfig
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\IBAffinity
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LAN-MySQL
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LogDataMgr
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LogoMedia TranslateDotNet Server
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Maximizer1
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\msCMTSrvc
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Netbios Helper Service
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Netddehard
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Network Monitor
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Network Switching Alerter
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NTBOOT
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NTLOAD
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NTSVCMGR
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Office Mail
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\PosysMirror
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\promtdbmsserver
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\promtmonitor
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\PSecret
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\PsqlWge
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\QcomPostInstall
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RecTracBroker
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RRAANXGN
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RTM
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\r_server
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SAP IGS Service
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SLEE_503_SERVICE
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SnoopFreeSvc
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SurferService
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SvcProc
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\sv_logger
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\tadxrgsb6
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tb2Launch
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\ThinWizard
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\TunnelBroker
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Windows smss
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\wintoolssvc
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\x10nets
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\ZESOFT

CWS Downloader Registry Values:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run-
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices


CWS Downloader indications of infection

This symptoms of CWS Downloader detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Win32.Startpage.BN!downloader Trojan Removal instruction
BO.plugin.RCR Backdoor Symptoms
Schrunch Trojan Cleaner

No comments: