Java.ByteVerify.exploit trojan is actually a method to exploit a security vulnerability in the Microsoft Virtual Machine that is stored in the java cache as a java-applet. The vulnerability arises as the ByteCode verifier in the Microsoft VM does not correctly check for the presence of certain malformed code when a java-applet is loaded. Attackers can exploit the vulnerability by creating malicious Java applets and inserting them into web pages that could be hosted on a web site or sent to users as an attachment.
AVG, eTrust EZ Antivirus, Pest Patrol will find Java/ByteVerify but cannot get rid of them. If you have the Java-Plugin installed, then deleting them from the Java cache will eliminate the problem. If you don't have the Java-Plugin installed then just delete the files manually. See: here
The Java Plug-In in the Control Panel is only present if you are using Sun's Java.
The Microsoft Virtual machine stores the applets in the Temporary Internet Files.Clear the Java Runtime Environment (JRE) cache
. To do this:
- Click Start > Control Panel.
- Double-click the Java icon in the control panel.
-The Java Control Panel appears.
- Click "Settings" under Temporary Internet Files.
-The Temporary Files Settings dialog box appears.
- Click "Delete Files".
-The Delete Temporary Files dialog box appears.
-There are three options on this window to clear the cache.
- Delete Files
- View Applications
- View Applets
- Click "OK" on Delete Temporary Files window.
-Note: This deletes all the Downloaded Applications and Applets from the cache.
- Click "OK" on Temporary Files Settings window.
- Close the Java Control Panel.
You can also view these instructions along with graphics here
Then perform these online Virus scans
:[Watch the Address bar in IE. You may receive alerts that "This site might require the following ActiveX control...Click here to install...". Click on that alert and then Click Install ActiveX component.]Trend Micro Housecall ScanPanda ActiveScan