Trojan:JS/Redirector.V
Exploit:Win32/Pdfjsc.M
Exploit:JS/Mult.AH
Exploit:JS/Mult.AH is a malicious JavaScript that attempts to execute multiple instances of code to exploit a potentially vulnerable operating system environment. The malware could download arbitrary files and send details about the affected computer to a remote attacker.
Exploit:Win32/Pdfjsc.L
Exploit:JS/Mult.BS
Exploit:Win32/Pdfjsc.BK
Exploit:Java/CVE-2008-5353.B
Exploit:Win32/Pdfjsc.CR
Exploit:Win32/Pidief.gen!B
Exploit:Win32/Pdfjsc.FG
Exploit:Win32/CVE-2010-1885.A
TrojanDownloader:JS/Adodb.F
TrojanDownloader:JS/Adodb.G
Exploit:Win32/Pdfjsc.FM
Exploit:Win32/CVE-2010-1885.gen
Exploit:Win32/CplLnk.A
Windows Defender detects and removes this threat.
This is a generic detection for specially crafted, malicious shortcut files that target the vulnerability exploited by the Win32/Stuxnet family.
When you browse a folder that has the malicious shortcut using an app that displays shortcut icons, the malware runs instead.
Exploit:Win32/Pdfjsc.GR
-
CVE-2009-0927 - the "Collab.getIcon" method
-
CVE-2008-2992 - the "util.printf" method
-
CVE-2007-5659 - the "Collab.collectEmailInfo" method
Exploit:Win32/ShellCode.gen!C
Windows Defender detects and removes this threat.
Exploit:Win32/ShellCode.gen!C is a generic detection for JavaScript files that have malicious code. Generally, attackers use this malicious code to infect your computer with other malware.
These files are often downloaders which use the malicious code to exploit vulnerabilities in various software.
A vulnerability is like a hole in your software that malware can use (or exploit) to get on your computer. These holes are fixed by installing updates to the vulnerable software; this is why it is extremely important to keep all of the programs on your computer up to date.
See here for information on how to update some software.
As this is a generic detection, we cannot identify the precise files that use this code or the particular exploits that the code uses.