TrojanDownloader.Win32.Lookme Downloader

TrojanDownloader.Win32.Lookme virus description
Technical details:
Categories: Downloader
TrojanDownloader.Win32.Lookme Aliases:
[Panda]Adware/Look2Me

TrojanDownloader.Win32.Lookme indications of infection

This symptoms of TrojanDownloader.Win32.Lookme detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Tofger.bd Spyware Information
Wotron Worm Symptoms

Sinister.Uploader Trojan

Sinister.Uploader virus description
Technical details:
Categories: Trojan,Downloader
Sinister.Uploader Aliases:
[Kaspersky]TrojanDownloader.Win32.Apher.g;
[Panda]Trj/W32.Apher;
[Computer Associates]Win32/Apher.G!Downloader

Sinister.Uploader indications of infection

This symptoms of Sinister.Uploader detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Bat.Bat Trojan
Vxidl.ARE Trojan Information
Mmcs Backdoor Information
Flasher Trojan Removal instruction

Vbbot Trojan

Vbbot virus description
Technical details:
Categories: Trojan
Vbbot Aliases:
[McAfee]W32/Vbbot

Vbbot indications of infection

This symptoms of Vbbot detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Matrix.Chat RAT Removal
Removing SpywareQuake Trojan
Pigeon.EUK Trojan Removal instruction

SRDL Trojan

SRDL virus description
Technical details:
Categories: Trojan,Spyware
SRDL Aliases:
[Kaspersky]TrojanSpy.Win32.Srdl.13;
[Panda]Trojan Horse;
[Computer Associates]Win32/Srdl.13!DLL!Trojan

SRDL indications of infection

This symptoms of SRDL detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Hamesup3 Backdoor Information
Removing Vxidl.ALN Trojan

DisableErase Trojan

DisableErase virus description
Technical details:
Categories: Trojan,Backdoor
DisableErase Aliases:
[Panda]Backdoor Program;
[Computer Associates]DisableErase.A!Trojan

DisableErase indications of infection

This symptoms of DisableErase detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Funkypic DoS
Win32.SpyKing Backdoor Removal instruction

DlAtaka Backdoor

DlAtaka virus description
Technical details:
Categories: Backdoor,Downloader
DlAtaka Aliases:
[Panda]Bck/IRC.Sx2;
[Computer Associates]Win32.DlAtaka,Win32/DlAtaka!Downloader

DlAtaka indications of infection

This symptoms of DlAtaka detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Statman DoS
Vxidl.APJ Trojan Removal instruction

Obfuscated.GX Trojan

Obfuscated.GX virus description
Technical details:
Categories: Trojan

Obfuscated.GX indications of infection

This symptoms of Obfuscated.GX detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Cellfree Trojan Removal
Keith.&.Big.Poppa's.Bomber DoS Cleaner
Removing Eclypse Backdoor
Gsmfree DoS Cleaner

att.com Tracking Cookie

att.com virus description
Technical details:
Categories: Tracking Cookie

att.com indications of infection

This symptoms of att.com detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
MailSpam.Aenima DoS Symptoms

Pigeon.AUD Trojan

Pigeon.AUD virus description
Technical details:
Categories: Trojan

Pigeon.AUD indications of infection

This symptoms of Pigeon.AUD detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Vxidl.AHF Trojan Removal
MetaDirect.Keyword Adware Cleaner

AIM.Watch Trojan

AIM.Watch virus description
Technical details:
Categories: Trojan,Backdoor
AIM.Watch Aliases:
[Kaspersky]Backdoor.AIMFrame;
[Eset]Win32/AIMFrame.A trojan;
[McAfee]AIM-Watch;
[F-Prot]security risk or a "backdoor" program;
[Panda]Backdoor Program,Bck/Generic;
[Computer Associates]Win32.AimWatch.20,Win32/AimFrame.IP_Stealer.Trojan,Win32/Aimframe.Trojan

AIM.Watch indications of infection

This symptoms of AIM.Watch detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Univ Trojan Information
FreeGatez Trojan Removal
Removing JS Adware

YB Trojan

YB virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
YB Aliases:
[Kaspersky]TPE.YB.2330,YB.2277,YB.466;
[Panda]YB-2,YB.426,YB.466;
[Computer Associates]YB.2328,YB.426,YB.2277,YB.300,YB.466

YB indications of infection

This symptoms of YB detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Banload.fc Trojan Symptoms
Ping Backdoor Removal instruction

ht Adware

ht virus description
Technical details:
Categories: Adware

ht indications of infection

This symptoms of ht detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
AdvCfg Trojan Cleaner
Roomnuke DoS Symptoms

BandObjects.eStart BHO

BandObjects.eStart virus description
Technical details:
Categories: BHO,Toolbar

BandObjects.eStart Registry Keys:
HKEY_CLASSES_ROOT\clsid\{8786386e-4b22-11d6-9c60-e5da06d87378}
HKEY_CLASSES_ROOT\software\microsoft\windows\currentversion\explorer\browser helper objects\{8786386e-4b22-11d6-9c60-e5da06d87378}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{8786386e-4b22-11d6-9c60-e5da06d87378}


BandObjects.eStart indications of infection

This symptoms of BandObjects.eStart detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Mutator1 Hostile Code
Solid.Key.Logger Spyware Removal instruction

PSW.Delf.ca Trojan

PSW.Delf.ca virus description
Technical details:
Categories: Trojan,Hacker Tool
PSW.Delf.ca Aliases:
[Panda]Trj/MsnFake.B

PSW.Delf.ca indications of infection

This symptoms of PSW.Delf.ca detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Pigeon.EXW Trojan
Bancos.HRN Trojan Cleaner
SillyDl.BYP Trojan Removal

Bancos.DZU Trojan

Bancos.DZU virus description
Technical details:
Categories: Trojan

Bancos.DZU indications of infection

This symptoms of Bancos.DZU detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Ehg.ESPN.Hitbox Tracking Cookie Symptoms
Win32.BO2K.Plugin.SimpleRicq Trojan Removal instruction
Win32.KillProc Trojan Removal

Virhider Trojan

Virhider virus description
Technical details:
Categories: Trojan
Virhider Aliases:
[Eset]VirHider.A trojan;
[Panda]Trojan Horse.LC;
[Computer Associates]Virhider!Trojan

Virhider indications of infection

This symptoms of Virhider detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing SillyDl.DGW Trojan
Removing Pluto Trojan
Removing SeeqBar Adware

Volkoser Trojan

Volkoser virus description
Technical details:
Categories: Trojan,Backdoor
Volkoser Aliases:
[Kaspersky]Backdoor.Volkoser.01;
[Panda]Backdoor Program

Volkoser Folders:
[%WINDOWS%]\temp\adware


Volkoser indications of infection

This symptoms of Volkoser detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove CAZ Trojan

realtechnetwork.net Tracking Cookie

realtechnetwork.net virus description
Technical details:
Categories: Tracking Cookie

realtechnetwork.net indications of infection

This symptoms of realtechnetwork.net detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
RBot.GRU Spyware Symptoms

Voltam Trojan

Voltam virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Voltam Aliases:
[Panda]Oigres.478.A

Voltam indications of infection

This symptoms of Voltam detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Windows.Activity.Logging.Interface Spyware
Removing One.com Trojan
CWS.MSConfig Hijacker Cleaner

BlueMountain.com Tracking Cookie

BlueMountain.com virus description
Technical details:
Categories: Tracking Cookie

BlueMountain.com indications of infection

This symptoms of BlueMountain.com detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Deakom Trojan
Remove Bancos.GCJ Trojan
Remove TradeExit Adware
Removing Create Trojan
Look2Me.ab Adware Cleaner

Qinq Trojan

Qinq virus description
Technical details:
Categories: Trojan
Qinq Aliases:
[Other]Win32/Qinq.2ff!Dropper

Qinq Files:
[%PROFILE_TEMP%]\webhitlogtmp.dat
[%SYSTEM%]\d3d1caps.SRG
[%SYSTEM%]\downews.ini
[%SYSTEM%]\mprmsgse.axz
[%SYSTEM%]\mywebhit.ini
[%WINDOWS%]\mywinsys.ini
[%PROFILE_TEMP%]\bind_50202.pif
[%PROFILE_TEMP%]\p_star_1.jpg
[%PROFILE_TEMP%]\SCI10.tmp
[%SYSTEM%]\11680262935.exe
[%SYSTEM%]\11680264376.exe
[%SYSTEM%]\11680264767.exe
[%SYSTEM%]\11680271234.exe
[%SYSTEM%]\11680271975.exe
[%SYSTEM%]\11680272941.exe
[%SYSTEM%]\drivers\restore.dll
[%SYSTEM%]\drivers\restore.ini
[%SYSTEM%]\drivers\s1218.exe
[%SYSTEM%]\drivers\wsuuxv47.sys
[%SYSTEM%]\js1168026106.web
[%SYSTEM%]\js1168027022.web
[%SYSTEM%]\mywebhit.ini.tmp
[%SYSTEM%]\popnews.ini
[%SYSTEM%]\QQhx.dat
[%SYSTEM%]\s1168026049.web
[%SYSTEM%]\s1168027022.web
[%WINDOWS%]\hitpop_tmp.txt
[%WINDOWS%]\system\10034.exe
[%WINDOWS%]\system\dodolook069.exe
[%WINDOWS%]\system\Setup-139.exe
[%PROFILE_TEMP%]\webhitlogtmp.dat
[%SYSTEM%]\d3d1caps.SRG
[%SYSTEM%]\downews.ini
[%SYSTEM%]\mprmsgse.axz
[%SYSTEM%]\mywebhit.ini
[%WINDOWS%]\mywinsys.ini
[%PROFILE_TEMP%]\bind_50202.pif
[%PROFILE_TEMP%]\p_star_1.jpg
[%PROFILE_TEMP%]\SCI10.tmp
[%SYSTEM%]\11680262935.exe
[%SYSTEM%]\11680264376.exe
[%SYSTEM%]\11680264767.exe
[%SYSTEM%]\11680271234.exe
[%SYSTEM%]\11680271975.exe
[%SYSTEM%]\11680272941.exe
[%SYSTEM%]\drivers\restore.dll
[%SYSTEM%]\drivers\restore.ini
[%SYSTEM%]\drivers\s1218.exe
[%SYSTEM%]\drivers\wsuuxv47.sys
[%SYSTEM%]\js1168026106.web
[%SYSTEM%]\js1168027022.web
[%SYSTEM%]\mywebhit.ini.tmp
[%SYSTEM%]\popnews.ini
[%SYSTEM%]\QQhx.dat
[%SYSTEM%]\s1168026049.web
[%SYSTEM%]\s1168027022.web
[%WINDOWS%]\hitpop_tmp.txt
[%WINDOWS%]\system\10034.exe
[%WINDOWS%]\system\dodolook069.exe
[%WINDOWS%]\system\Setup-139.exe


Qinq indications of infection

This symptoms of Qinq detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove ScreenGrab RAT
Bancos.HRV Trojan Symptoms
Goldun.ar Spyware Removal

Shen Trojan

Shen virus description
Technical details:
Categories: Trojan
Shen Aliases:
[Panda]Trj/Laoshen.A;
[Computer Associates]Win32/Shen.15872!Trojan

Shen indications of infection

This symptoms of Shen detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SillyDl.CTR Trojan Symptoms
Colondoff DoS Cleaner
Tydpec Trojan Cleaner
Bancos.EOY Trojan Removal instruction

Bancos.IFO Trojan

Bancos.IFO virus description
Technical details:
Categories: Trojan

Bancos.IFO indications of infection

This symptoms of Bancos.IFO detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing tumri.net Tracking Cookie
Removing Qroject.WebDownloader Trojan
Infostealer Trojan Symptoms
Agent.ce Trojan Removal
BrowserAid.ABCSearch BHO Symptoms

SpySender.88i Backdoor

SpySender.88i virus description
Technical details:
Categories: Backdoor,RAT
SpySender.88i Aliases:
[Kaspersky]Backdoor.SpySender.b;
[McAfee]SpySender;
[F-Prot]security risk or a "backdoor" program;
[Panda]Bck/SpySender.B;
[Computer Associates]Backdoor/SpySender.B

SpySender.88i indications of infection

This symptoms of SpySender.88i detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
The.Communicator Toolbar Symptoms

Pigeon.AWM Trojan

Pigeon.AWM virus description
Technical details:
Categories: Trojan

Pigeon.AWM indications of infection

This symptoms of Pigeon.AWM detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Vefisi Trojan Removal
Remove Win.Protector RAT
Bisier Trojan Removal instruction
Kyrdor Trojan Removal instruction
MDSA.Sentinel Spyware Removal

Delf.49664!Trojan Trojan

Delf.49664!Trojan virus description
Technical details:
Categories: Trojan

Delf.49664!Trojan indications of infection

This symptoms of Delf.49664!Trojan detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Win32.TrojanProxy.Omnitex Trojan Removal instruction
Sadist Trojan Information
MediaLoads.Enhanced BHO Cleaner

Pigeon.AVY Trojan

Pigeon.AVY virus description
Technical details:
Categories: Trojan

Pigeon.AVY indications of infection

This symptoms of Pigeon.AVY detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Netpool.adhostcenter.Tracking.Cookie Tracking Cookie Cleaner
Seekmo Adware Symptoms
SaveNow.Download Adware Symptoms
Removing Kilo Backdoor
TrojanDownloader.Win32.Agent.aw Downloader Information