Jump to content


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.

Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.


Might be infected with "Java.Exploit.CVE-2011-3544.I"

  • Please log in to reply
1 reply to this topic

#1 JoeKnoke


  • Members
  • 6 posts
  • Local time:07:55 PM

Posted 08 June 2015 - 03:48 PM

Hello Bleeping computer community! Recently I was browsing the internet I was browsing the internet, I was redirected to one of those "Your java version is out of date!" pages, were I exited the page. But when I turned on my computer the next day, I got a notification my Bit Defender saying something about "Java.Exploit.CVE-2011-3544.I". But I'm not sure if Bit defender fully removed it, or if it had already downloaded more files. If anyone could help me make sure that everything id fine again, I will be truly grateful, Thanks!

BC AdBot (Login to Remove)


#2 severac


  • Members
  • 872 posts
  • Gender:Male
  • Location:Serbia
  • Local time:01:55 AM

Posted 08 June 2015 - 04:09 PM

If you want to doublecheck, you can download Malwarebytes from this link: https://www.bleepingcomputer.com/download/malwarebytes-anti-malware/ and scan your computer. 


Download install file for Malwarebytes Anti-Malware (MBAM) ver.2.0 and install it. 
Double click on mbam-setup.exe and follow installation procedure. When installation is over, click Finish.
- After first run, MBAM will start "Update" for fresh database signatures. 
Or ... click on 'Update Now >>' link or button for fresh database signatures.
• Also, on Settings tab, set under Detection and Protection next options: 
1. 'Scan for rootkits'
2. Non-Malware Protection, for 'PUP detections', check 'Threat detections as malware' option.
Click on Scan tab, then on 'Scan Now >>' to begin with scanning.
• After the scan is complited, click on Apply Action button if threat is detected.

• While still on the Scan tab, choose View detailed log. In the window that opens, click the Export button, choose Text file (*.txt) and save the log to your Desktop.

• Click on Yes if message for computer restart is displayed. 

Edited by severac, 08 June 2015 - 04:44 PM.

I would like to help you to remove malware. Let's look inside.   :busy:

But I don't know to solve all PC problems.  :smash: 


0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users