Category: Computer Virus
Active & Spreading
Asia, North and South America, and some parts of Europe and Australia
30 Mar 2009
The W32/Xanib.A program is a virus that affects multimedia and executable files on a compromised computer, typically it affects windows operating system such as Windows XP, Windows 98, Windows Me, Windows NT, Windows Vista, Windows Server 2003, and Windows 2000.
W32.Xanib.A Removal Tool
If you have Malware on your computer it will cause annoyances and will damage your system. You should either:
A. Manually remove the infected files from your computer, or
B. Automatically scan your system using trusted software
We recommend that you scan your system for malware. Our partner has a computer virus removal tool to automatically clean W32.Xanib.A from your computer.
More details about W32.Xanib.A
W32.Xanib.A can use 1 or more methods to infect the compromised computer. This worm is a spyware that can take control of the entire system. The worm can infect your computer through browser security loop holes while you are surfing the Internet, through e-mail attachments that are unexpected, through access to instant messenger applications, network shares and removable media devices. W32.Xanib.A repairs, recreates, and updates itself to prevent deletion. This virus changes its files, registry keys, and DLLs. A reputable scanner can only remove the program but remains other parts of it and allows the other remaining files to perform procedures to update and repair.
The W32.Xanib.A program may enter a computer through security errors that are present on a computer. It may be downloaded by other Trojan applications on a computer. It is also found on unsecure websites that are embedded with illicit codes. This application starts up each time the computer is opened or rebooted by the user. This application creates a backdoor on the compromised computer. A remote user is capable of taking control of the affected system by sending commands through HTTP (Hypertext Transfer Protocol). Some of these commands include deleting of files from the affected computer, uploading and downloading of data and participating on web attacks.