We're gradually updating threat actor names in our reports to align with the new weather-themed taxonomy. Learn about Microsoft threat actor names
Exploit:Win32/Senglot.V
Detected by Microsoft Defender Antivirus
Aliases: Exploit.JS.BO.D (BitDefender) Exploit.HTML.IESlice.z (Kaspersky) Exploit-YIMCAM.gen (McAfee) Downloader (Symantec) EXPL_EXECOD.A (Trend Micro) Mal/JSShell-B (Sophos)
Summary
Exploit:Win32/Senglot.V is a generic detection that detects malicious code, often hosted in HTML files, that attempts to download and execute arbitrary files. They usually arrive in a system when a user visits a compromised website.
Manual removal is not recommended for this threat. To detect and remove this threat and other malicious software that may have been installed, run a full-system scan with an up-to-date antivirus product such as the Microsoft Safety Scanner (http://go.microsoft.com/fwlink/?LinkId=212742). For more information, see http://www.microsoft.com/protect/computer/viruses/vista.mspx.