Aliases: No associated aliases
Windows Defender detects and removes this threat.
This threat uses an Internet Explorer vulnerability to download and run files on your PC, including other malware.
It runs when you visit a hacked or malicious website and you have a vulnerable version of Internet Explorer.
The following Internet Explorer versions are vulnerable:
Use the following free Microsoft software to detect and remove this threat:
You should also run a full scan. A full scan might find other, hidden malware.
It's also important to keep your other software up to date:
If you’re using Windows XP, see our Windows XP end of support page.