Skip to main content
Skip to main content
Microsoft Security Intelligence
Published Aug 11, 2008 | Updated Sep 15, 2017

Exploit:Win32/Senglot.V

Detected by Microsoft Defender Antivirus

Aliases: Exploit.JS.BO.D (BitDefender) Exploit.HTML.IESlice.z (Kaspersky) Exploit-YIMCAM.gen (McAfee) Downloader (Symantec) EXPL_EXECOD.A (Trend Micro) Mal/JSShell-B (Sophos)

Summary

Exploit:Win32/Senglot.V is a generic detection that detects malicious code, often hosted in HTML files, that attempts to download and execute arbitrary files. They usually arrive in a system when a user visits a compromised website.
Manual removal is not recommended for this threat. To detect and remove this threat and other malicious software that may have been installed, run a full-system scan with an up-to-date antivirus product such as the Microsoft Safety Scanner (http://go.microsoft.com/fwlink/?LinkId=212742). For more information, see http://www.microsoft.com/protect/computer/viruses/vista.mspx.
Follow us