Trojan:Win32/Vundo.gen!AW
Trojan:Win32/Vundo.gen!AW is the generic detection for components of Win32/Vundo - a multiple-component family of programs that deliver 'out of context' pop-up advertisements. They may also download and execute arbitrary files.
Win32/Vundo is often distributed as a DLL file and installed on an affected computer as a Browser Helper Object (BHO) without a user's consent. This family uses advanced defensive and stealth techniques to escape detection and to hinder removal.
For more information, please see the Win32/Vundo analysis elsewhere in the Microsoft Malware Protection Center encyclopedia.
Win32/Vundo
Vundo is often installed as a browser helper object (BHO) without your consent, by other malware.
This family uses advanced defensive and stealth techniques to escape detection and to hinder removal.
TrojanDownloader:Win32/Vundo
Windows Defender detects and removes this threat.
This threat is classified as a trojan downloader. It tries to download and install other malware or unwanted software.
Some downloader trojans target specific files on remote websites. Others target a specific URL that points to a website with exploit code that can automatically download and run software or malicious code on your PC.
More details are available in the Win32/Vundo family description.
Worm:Win32/Vundo.A
Trojan:Win32/Vundo.gen!F
Trojan:Win32/Vundo.gen!BY
Trojan:Win32/Vundo.gen!BY is a generic detection for members of the Win32/Vundo family, a multi-component family that delivers 'out-of-context pop-up advertisements'. Trojan:Win32/Vundo.gen!BY has also been observed modifying and redirecting search engine results on specified web browsers.
Trojan:Win32/Vundo.BR
Trojan:Win32/Vundo.HM
Trojan:Win32/Vundo.KZ
Trojan:Win32/Vundo.LO
Trojan:Win32/Vundo.gen!BF
Trojan:Win32/Vundo.gen!BJ
TrojanDownloader:Win32/Vundo.HIY
Trojan:Win32/Vundo.JC.dll
Trojan:Win32/Vundo.KO
Trojan:Win32/Vundo.RM
Trojan:Win32/Vundo.JD.dll
Vundo is often spread as a DLL file and installed on your PC as a Browser Helper Object (BHO) without your consent. The family also uses advanced techniques to avoid detection and removal.
This particular component is used to download and run files.