The Internet threat alert status is currently normal. At present, no major epidemics or other serious incidents have been recorded by Kaspersky Lab’s monitoring service. Internet threat level: 1


Detected Mar 21 2008 15:42 GMT
Released Mar 21 2008 19:28 GMT
Published Sep 02 2008 13:45 GMT

Technical Details
Removal instructions

Technical Details

This Trojan downloads other files via the Internet and launches them for execution on the victim machine without the user’s knowledge or consent. The program is an HTML page which contains Java Script scenarios. It is 1527 bytes in size.


Once launched, the Trojan decrypts itself and injects its code into the memory of the process which has the following mutex in the system registry:


The Trojan then uses a vulnerability in the Microsoft.XMLHTTP ActiveX component to download a file from the following URL:


This file is 45717 bytes in size. It will be detected by Kaspersky Anti-Virus as Trojan-Downloader.Win32.Delf.jfj.

The Trojan uses the ADODB.Stream Active X component to save the downloaded file to the Windows directory as "~Temp<rnd>.tmp" (<rnd> is a randomly chosen number from 1 to 9999).


The downloaded file will then be launched for execution.

Removal instructions

If your computer does not have an up-to-date antivirus, or does not have an antivirus solution at all, follow the instructions below to delete the malicious program:

  1. Use Task Manager to terminate the process shown below:
  2. Delete the original Trojan file (the location will depend on how the program originally penetrated the victim machine).
  3. Delete the following file:
  4. Delete all files from %Temporary Internet Files%.
  5. Disable the vulnerable ActiveX object (see How to stop an ActiveX control from running in Internet Explorer
  6. Update your antivirus databases and perform a full scan of the computer (download a trial version of Kaspersky Anti-Virus).

Bookmark and Share

Programs classified as Trojan-Downloader download and install new versions of malicious programs, including Trojans and AdWare, on victim computers. Once downloaded from the Internet, the programs are launched or included on a list of programs which will run automatically when the operating system boots up.

Information about the names and locations of the programs which are downloaded are in the Trojan code, or are downloaded by the Trojan from an Internet resource (usually a web page).

This type of malicious program is frequently used in the initial infection of visitors to websites which contain exploits.

Other versions


Trojan-Downloader.JS.Agent.bnc (Kaspersky Lab) is also known as:

  • Trojan: Exploit-MS06-014 (McAfee)
  • Mal/Psyme-A (Sophos)
  • JS.Downloader-35 (ClamAV)
  • JS/Psyme.EP (FPROT)
  • TrojanDownloader:HTML/Adodb.gen!A (MS(OneCare))
  • Trojan.DownLoader.38327 (DrWeb)
  • JS/TrojanDownloader.Psyme.KF trojan (Nod32)
  • Exploit.HTML.Agent.AA (BitDef7)
  • HTML.Psyme.Gen (VirusBuster)
  • JS:Downloader-AP [Trj] (AVAST)
  • Trojan-Downloader.JS.Psyme.kf (Ikarus)
  • JS/Psyme.NQ (AVG)
  • JS/Dldr.Agent.ZY (AVIRA)
  • Downloader (NAV)
  • HTML/Agent.F (Norman)
  • Exploit-MS06-014 (NAI)
  • Trojan.DL.JS.Agent.lio (Rising)
  • Trojan-Downloader.JS.Agent.bnc [AVP] (FSecure)
  • JS_DLOADER.MQD (TrendMicro)
  • Trojan-Downloader.JS.Psyme.kf (v) (Sunbelt)
  • HTML.Psyme.Gen (VirusBusterBeta)