|This article needs additional citations for verification. (May 2015)|
Methods of infection
This Trojan is considered obsolete, and there are no known variants in the wild. However, an official from the Department of Homeland Security is quoted in a 2011 article as saying that the worm keeps evolving, is quite prolific and still infects computers. 
Affected operating systems
The following operating systems are known to be affected.
Agent.AWF displays virus activity in that it replaces files on a user's computer with a copy of itself, and moves the original, legitimate file to a bak sub-folder. It is known to attempt to terminate security software, and the Trojan downloads a backdoor onto the computer, allowing the attacker to further compromise the computer. It is also known to modify the Windows registry.
During installation, the following files are created, and may be present on a compromised system.
- The Economist, December 6, 2008, "The worm turns"
|This malware-related article is a stub. You can help Wikipedia by expanding it.|