is the name given by avast for Java.ByteVerify
which is actually a method to exploit a security vulnerability
in the Microsoft Virtual Machine that is stored in the java cache as a java-applet. The vulnerability arises as the ByteCode verifier in the Microsoft VM does not correctly check for the presence of certain malformed code when a java-applet is loaded. Attackers can exploit the vulnerability by creating malicious Java applets and inserting them into web pages that could be hosted on a web site or sent to users as an attachment. Trojan Exploit ByteVerify indicates that a Java applet - a malicious Java archive file (JAR) - was found on your system containing the exploit code.
When a browser runs an applet, the Java Runtime Environment (JRE) stores the downloaded files into its cache folder (C:\Documents and Settings\username\Application Data\Sun\Java\Deployment\cache) for quick execution later and better performance. Malicious applets
are also stored in the Java cache directory
and your anti-virus may detect them and provide alerts. Notification of these files as a threat does not always mean that a machine has been infected
; it indicates that a program included the viral class file but this does not mean that it used the malicious functionality.
These malicious applets are designed to exploit vulnerabilities in the Microsoft VM (Microsoft Security Bulletin MS03-011). If you are using the Sun JVM as your default virtual machine, these malicious applets cannot cause any harm to your computer.
A number of anti-virus programs (AVG, avast, eTrust, etc) and scanners will find Java/ByteVerify (Java:Djewers) but cannot get rid of them. If you have the Java-Plugin installed, then deleting them from the Java cache should eliminate the problem. The Java Plug-In in the Control Panel is only present if you are using Sun's Java. If you don't have the Java-Plugin installed then just delete the files manually. The Microsoft Virtual machine stores the applets in the Temporary Internet Files.Recommended Solution
When Windows crashes or you experience a Blue Screen Of Death (BSOD)
, the system writes a file called memory dump
which contains "Debugging
" info.. Minidumps are created in the C:\Windows\Minidump folder and the file has a random name with a .DMP extension. Memory.DMP
is a full memory dump file which is saved to the C:\Windows\ folder. The detection of the file could be a false positive. See this discussion thread
You can download and install Microsoft Debugging Tools
to read and investigate minidump files.