TrojanDownloader:Win32/Cutwail.S
PWS:Win32/Paymilon.A
Worm:Win32/Ambler.A
Backdoor:Win32/Canoswei.A
Exploit:Java/CVE-2009-3869.R
Exploit:Java/CVE-2009-3869.R is the detection for malicious Java applets that exploits a stack overflow vulnerability in the Java Runtime Environment (JRE) versions 5 and 6 and described in CVE-2009-3869.
Exploit:Java/CVE-2011-3544.N
Exploit:Java/CVE-2011-3544.N is a malicious Java applet stored within a Java Archive (.JAR) file. It attempts to exploit a vulnerability in the Java Runtime Environment (JRE) component in Oracle JAVA SE JDK and JRE 7, 6 Update 27 and earlier. The vulnerability allows an unsigned Java applet to gain elevated privileges and potentially have unrestricted access to run arbitrary Java code outside of the "sandbox" environment.
TrojanDownloader:Java/Rexec.H
TrojanDownloader:Java/Rexec.H is a Java-based trojan that is generated by the "Blackhole" exploit kit, and may download and execute other malware.
Virus:Win64/Sirefef.B
Virus:Win64/Sirefef.B is the 64-bit user-mode component of Win32/Sirefef - a multi-component family of malware that moderates your Internet experience by changing search results and generating pay-per-click advertising revenue for its controllers. The family consists of multiple parts that perform different functions, such as downloading updates and additional components, hiding existing components, or performing a payload.
Caution: Win32/Sirefef is a dangerous threat that uses advanced stealth techniques in order to hinder its detection and removal. If you are infected with Sirefef, we recommend you take the following steps to remove this threat from your computer:
Before you begin you will need:
- A computer that is not infected and is connected to the Internet. You will use this computer to download a copy of the Microsoft Safety Scanner
- A blank CD, DVD or USB drive. You will use this CD, DVD or USB drive to run the Scanner on your infected computer
- Download a copy of the Microsoft Safety Scanner from a clean, uninfected computer
- Save a copy of the Scanner on a blank CD, DVD, or USB drive
- Restart the infected computer
- Insert the CD, DVD, or USB drive into your infected computer and run the Scanner
- Let the Scanner clean your computer and remove any infections it finds
After running the Scanner, ensure that your antivirus product is up-to-date. You can update Microsoft security products by downloading the latest definitions at this link: Get the latest definitions.
As a consequence of being infected with this threat, you may need to repair and reconfigure some Windows security features. Please see Additional remediation steps in this entry for more information.
Virus:Win32/Sirefef.R
Virus:Win32/Sirefef.R is a detection for Windows system drivers that are modified to perform certain behaviors, such as downloading and executing arbitrary files. This malware is a component of Win32/Sirefef - a multi-component family of malware that moderates an affected user's Internet experience by modifying search results, and generates pay-per-click advertising revenue for its controllers. The family consists of multiple parts that perform different functions, such as downloading updates and additional components, hiding existing components or performing the payload.
Caution: Win32/Sirefef is a dangerous threat that uses advanced stealth techniques in order to hinder its detection and removal. If you are infected with Sirefef, we recommend you take the following steps to remove this threat from your computer:
Before you begin you will need:
- A computer that is not infected and is connected to the Internet. You will use this computer to download a copy of the Microsoft Safety Scanner
- A blank CD, DVD or USB drive. You will use this CD, DVD or USB drive to run the Scanner on your infected computer
- Download a copy of the Microsoft Safety Scanner from a clean, uninfected computer
- Save a copy of the Scanner on a blank CD, DVD, or USB drive
- Restart the infected computer
- Insert the CD, DVD, or USB drive into your infected computer and run the Scanner
- Let the Scanner clean your computer and remove any infections it finds
After running the Scanner, ensure that your antivirus product is up-to-date. You can update Microsoft security products by downloading the latest definitions at this link: Get the latest definitions.
As a consequence of being infected with this threat, you may need to repair and reconfigure some Windows security features. Please see Additional remediation steps in this entry for more information.
Exploit:Java/CVE-2012-0507.CG
Exploit:Java/CVE-2012-0507.CG is a variant of the Exploit:Java/CVE-2012-0507 family - a family of malicious Java applets that exploit a vulnerability in the Java Runtime Environment (JRE) up to and including version 7, update 2 (described in CVE-2012-0507).
The Java applet, detected as Exploit:Java/CVE-2012-0507.CG, will attempt to trigger the CVE-2012-0507 vulnerability, which allows the Java applet to run with elevated privileges so that it can download and run files from a remote host.
The files that are downloaded and run could be any of the attacker's choice and could include additional malware.
For an explanation of Java applets, Java classes and elevated privileges, please see the Additional information section in this entry.
Trojan:Win32/Banload.E
Windows Defender detects and removes this threat.
This threat can give a malicious hacker unauthorized access and control of your PC.