This is actually a method to exploit a security vulnerability in the Microsoft Virtual Machine that is stored in the java cache as a java-applet. The vulnerability arises as the ByteCode verifier in the Microsoft VM does not correctly check for the presence of certain malformed code when a java-applet is loaded. Attackers can exploit the vulnerability by creating malicious Java applets and inserting them into web pages that could be hosted on a web site or sent to users as an attachment.
To read more about this issue see here
AVG will find Java/ByteVerify but cannot get rid of them. If you have the Java-Plugin installed, then deleting them from the Java cache will eliminate the problem. If you don't have the Java-Plugin installed then just delete the files manually.Clear the Java Runtime Environment (JRE) cache
. To do this:
- Click Start > Control Panel.
- Double-click the Java icon in the control panel.
-The Java Control Panel appears.
- Click "Settings" under Temporary Internet Files.
-The Temporary Files Settings dialog box appears.
- Click "Delete Files".
-The Delete Temporary Files dialog box appears.
-There are three options on this window to clear the cache.
- Delete Files
- View Applications
- View Applets
- Click "OK" on Delete Temporary Files window.
-Note: This deletes all the Downloaded Applications and Applets from the cache.
- Click "OK" on Temporary Files Settings window.
- Close the Java Control Panel.
You can also view these instructions along with graphics here
.VERIFY your JAVA Software Installation & Version here.