Skip to main content
Skip to main content
Microsoft Security Intelligence
9 entries found.
Updated on Apr 11, 2011
TrojanDropper:Win32/Meciv.A is a trojan that installs Backdoor:Win32/Meciv.A, a remote access trojan. In the wild, we have seen TrojanDropper:Win32/Meciv.A to be distributed as part of the payload on successful exploitation by Exploit:Win32/CVE-2010-3333.
Alert level: severe
Updated on Apr 11, 2011
Backdoor:Win32/Meciv.A is a detection for a remote access trojan. In the wild, we have seen this malware being installed by TrojanDropper:Win32/Meciv.A, which was distributed as part of the payload on successful exploitation by Exploit:Win32/CVE-2010-3333.
Alert level: severe
Updated on Feb 12, 2011
Alert level: severe
Updated on Feb 15, 2011
Alert level: severe
Updated on Sep 27, 2011
Alert level: severe
Updated on Mar 02, 2012
Alert level: severe
Updated on Mar 17, 2016
Alert level: severe
Updated on Aug 13, 2021
Alert level: severe
Updated on Feb 24, 2014

Windows Defender detects and removes this threat.

Exploit:Win32/CVE-2010-3333 is a detection for specially-crafted RTF files that try to exploit a vulnerability in Microsoft Word. The vulnerability is discussed in CVE-2010-3333 and resolved with the release of Microsoft Security Bulletin MS10-087.

If you open a document using a version of Microsoft Word that's not updated to the latest secure version, malicious code within the file can run in your PC. We've seen this threat download and drop other malware.

In the wild, we've received samples masquerading as files related to the "Bilawar Bhutto Sex Scandal" and a "New Year's Greeting Card" (with both the file name and message written in Russian).

Alert level: severe