Categories: Trojan,Downloader,Hacker Tool
This loose category includes a variety of Trojans that damage victim machines or threaten data integrity, or impair the functioning of the victim machine.
Multi-purpose Trojans are also included in this group, as some virus writers create multi-functional Trojans rather than Trojan packs.
This family of Trojans downloads and installs new malware or adware on the computer. The downloader then either launches the new malware or registers it to enable autorun according to the local operating system requirements.
The names and locations of malware to be downloaded are either coded into the Trojan or downloaded from a specified website.
These utilities are designed to penetrate remote computers in order to use them as zombies (by using backdoors) or to download other malicious programs to computer.
Exploits use vulnerabilities in operating systems and applications to achieve the same result.
Visible Symptoms:
Files in system folders:
[%WINDOWS%]\assembly\temp\jpegreg.exe
[%WINDOWS%]\assembly\temp\jpegreg.exe
How to detect Agent.cv:
Files:
[%WINDOWS%]\assembly\temp\jpegreg.exe
[%WINDOWS%]\assembly\temp\jpegreg.exe
Registry Values:
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\runonce
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
Removing Agent.cv:
You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.
Or buy it to remove ALL viruses from your computer.Also Be Aware of the Following Threats:
Removing Bitch.Controller Trojan
Keylogger.Spy.Software Spyware Removal instruction
Malum.ANBG Trojan Removal instruction
Delf.cw Trojan Symptoms
Sex.Niche.Guide Toolbar Symptoms