Need Instructions for Deleting Troj Agent Variants

Posted on 2004-10-16
Last Modified: 2010-04-11
Hi Everyone:

        Tonight, I went online at and checked for viruses/trojans even though my latest McAfee did not find any infections.  When scanning from, 5 different trojans appeared, (1) Troj Agent.AE, (1)Troj Agent.BF, and (3) Troj Agent.BN.  Unfortunately, the entire pc locked up and had to be restarted following this.  At this point, I am needing any suggestions which come to mind for deleting the trojan files.  

       I look forward to hearing from everyone regarding this post.

       Thank you

Question by:GMartin
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
  • 2
  • +4

Accepted Solution

shahrial earned 200 total points
ID: 12331373
Download Lavasoft Ad-Aware SE Personal Edition below:

Run the update and scan your system and see if it can safely remove the trojans...;-)

LVL 15

Assisted Solution

Cyber-Dude earned 100 total points
ID: 12331654
Heres a link for a banch of software may able to assist you. My reccomendation is vary; If it is a spyware or an addware than you may use any Spybot or Ad-Aware software. If it is truely a Trojan, I would suggest you try using Bazooka software. Etherware all of them are 'Freeware':

A great software but NOT free is 'Spy Sweeper':

Hope this is a helpful post



Assisted Solution

woodendude earned 50 total points
ID: 12331872     download and install Stinger, reboot into safemode  and run this application.
Three Reasons Why Backup is Strategic

Backup is strategic to your business because your data is strategic to your business. Without backup, your business will fail. This white paper explains why it is vital for you to design and immediately execute a backup strategy to protect 100 percent of your data.

LVL 49

Assisted Solution

sunray_2003 earned 50 total points
ID: 12332283
Are you able to login to safe mode and then scan using trendmicro ?
Does it say the location of those file...

If it says, go to those locations and remove them ..  Make sure those exe files are not running in task manager .If they are running , you got to kill those exe files before removing them..

Some of the experts here have helped in compiling all the important spyware tools and they are listed in this thread

My recommendation would be to start with Spybot ,Ad-ware ,CWshredder.After installing them, First Update them and then run

Once running all the above tools and others given in that thread, download and run Hijackthis.
Download Hijacthis from here
Get the log from Hijackthis and save the log and paste it here to analyze it. The analyser site is used so that you donot gum up the thread with the entire log.

Remove the bad ones that the site reports. If it says unknown process, then use a search engine to check if those are bad ones. If bad remove them , if you still cannot find then post those files alone here.
LVL 12

Assisted Solution

rossfingal earned 50 total points
ID: 12332302

Download a2 Anti-Trojan (free version) from:
Update it
Run it, and take note of any infected files or folders.
Then, reboot into "safe" mode and run it again.
It has an option to destroy files, which I've had some success with.

Here's links to some info on Tro Agent.AE -

Let us know.

Good luck!

LVL 18

Assisted Solution

chicagoan earned 50 total points
ID: 12332945
regarding "any Spybot or Ad-Aware software" , I think that's a sweeping generalization. Some free software actually componds the problem by installing it's own adware and spyware agents. The reason anti-virus software doesn't pick up these apps is that the user is conned into installing something when visiting a page. Terms like "macromedia compatible toolbar" and "media player' are used to lull the unsuspecting surfer into clicking the YES button.

I've used SPYBOT S&D with good success, though if the machine operator is prone to poor decisions, a commercial product that constantly monitors things may be in order (i.e. Pest Patrol). 

Author Comment

ID: 12334849
Hi Everyone:

       Before I begin, I want to thank each expert for their input.  I found each response rich in content and germane to this post which certainly made it difficult when it came time to award points.  In any case, I want each person to acknowledge how much I value the quality of responses by my attempt to distribute points to each person.  

       Now, to the problem which is now resolved.  It started out with the detection of Trojans by with the pc locking up during the scan.  Secondly, the problem asl manifested itself by the browswer's home page changing to about:search with the inability to change it within the Properties section of Internet Options. And, finally, there was a noticeable slow down of all internet activity with respect to the loading of pages and downloads.  

       With respect to the utilities ran, I found a wide array of differences with respect to outcome of scanning.  For instance, one utility called Trojan Remover, did not detect anything.  However, when I ran Adaware SE Personal Edition, CWShredder, and the a2 program which detected the malware, several problems were found.  While I was unsure of every entry found as being corrupted by the utilities, I simply went ahead and deleted all of them.  Now, my pc is running much smoother with regards to internet functionality.  

        Thanks again everyone for your help.

LVL 49

Expert Comment

ID: 12334888
Thanks George for your timely closing of question and Happy that you got ur issue solved..

LVL 12

Expert Comment

ID: 12335271

Me too!

And thanks!
(Stop back, if other problems!)
"Clown Boy"  :)

Expert Comment

ID: 12335322
Thank you George, keep Stinger handy you will find it useful.

Featured Post

Use Case: Protecting a Hybrid Cloud Infrastructure

Microsoft Azure is rapidly becoming the norm in dynamic IT environments. This document describes the challenges that organizations face when protecting data in a hybrid cloud IT environment and presents a use case to demonstrate how Acronis Backup protects all data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Change administrator password on server 13 116
disable USB on Dell Printers 14 40
Home firewall recommendations 11 91
Well known ports and optimal ports scanning range 12 100
Ransomware continues to grow in reach and sophistication, putting data everywhere at risk. Learn how to avoid being caught in its sinister clutches with these 11 key tips.
Recently, Microsoft released a best-practice guide for securing Active Directory. It's a whopping 300+ pages long. Those of us tasked with securing our company’s databases and systems would, ideally, have time to devote to learning the ins and outs…
Sending a Secure fax is easy with eFax Corporate ( First, just open a new email message. In the To field, type your recipient's fax number You can even send a secure international fax — just include t…
Sending a Secure fax is easy with eFax Corporate ( First, Just open a new email message.  In the To field, type your recipient's fax number You can even send a secure international fax — just include t…

733 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question