Vous êtes sur la page 1sur 5

W32/Autorun.bfr!a!

721751BD4501

Risk Assessment: Date Discovered: Date Added: Origin: Length: Type: Subtype: DAT Required:

Home Low | Corporate Low 7/13/2011 7/13/2011 Unknown 353595 Virus Win32 N/A

Removal Instructions

Overview Virus Characteristics Removal Instructions

Description
Viruses are self-replicating. They are often spread by a network or by transmission to a removable medium such as a removable disk, writable CD, or USB drive. Viruses may also spread by infecting files on a network file system or a file system that is shared by another computer.

Indication of Infection
This symptoms of this detection are the files, registry, and network communication referenced in the characteristics section.

Methods of Infection
Viruses are self-replicating. They are often spread by a network or by transmission to a removable medium such as a removable disk, writable CD, or USB drive. Viruses may also spread by infecting files on a network file system or a file system that is shared by another computer.

Generic.dx!zyx!A11B910A6C9D
Threat Search

Print Share

Risk Assessment: Date Discovered: Date Added: Origin: Length: Type: Subtype: DAT Required:
Removal Instructions

Home Low | Corporate Low 7/14/2011 7/14/2011 Unknown 330752 Trojan N/A

Overview Virus Characteristics Removal Instructions

Description
This is a Trojan detection. Unlike viruses, Trojans do not self-replicate. They are spread manually, often under the premise that they are beneficial or wanted. The most common installation methods involve system or security exploitation, and unsuspecting users manually executing unknown programs. Distribution channels include e-mail, malicious or hacked Web pages, Internet Relay Chat (IRC), peer-to-peer networks, etc.

Indication of Infection
This symptoms of this detection are the files, registry, and network communication referenced in the characteristics section.

Methods of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial. Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.

Banker!gyd!C12000A359A3
Threat Search

Risk Assessment: Date Discovered: Date Added: Origin: Length: Type: Subtype: DAT Required:
Removal Instructions

Home Low | Corporate Low 7/14/2011 7/14/2011 Unknown 225280 Trojan Password Stealer N/A

Overview Virus Characteristics Removal Instructions

Description
This is a Trojan detection. Unlike viruses, Trojans do not self-replicate. They are spread manually, often under the premise that they are beneficial or wanted. The most common installation methods involve system or security exploitation, and unsuspecting users manually executing unknown programs. Distribution channels include e-mail, malicious or hacked Web pages, Internet Relay Chat (IRC), peer-to-peer networks, etc.

Indication of Infection
This symptoms of this detection are the files, registry, and network communication referenced in the characteristics section.

Methods of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial. Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.

Adware-HotBar.d!053C1F98D0AA
Threat Search

Print Share

Risk Assessment: Date Discovered: Date Added: Origin: Length: Type: Subtype: DAT Required:
Removal Instructions

Home Low | Corporate Low 7/14/2011 7/14/2011 Unknown 216752 Program Adware 6406

Overview Virus Characteristics Removal Instructions

Description
McAfee Labs&trade recognizes that this program may have legitimate uses in contexts where an authorized administrator has knowingly installed this application. If you agreed to a license agreement for this or another bundled application, you may have legal obligations with regard to removing this software, or to using the host application without this software. Please contact the software vendor for further information. See http://vil.nai.com/vil/DATReadme.aspx for a list of program detections added to the DATs. See http://vil.nai.com/vil/pups/configuration.aspx for information about how to enable, disable, and exclude the detection of legitimately installed programs. This software is not a virus or a Trojan. It is detected as a "potentially unwanted program" (PUP). PUPs are any piece of software that a reasonably security- or privacy-minded computer user may want to be informed of and, in some cases, remove. PUPs are often made by a legitimate corporate entity for some beneficial purpose, but they alter the security state of the computer on which they are installed, or the privacy posture of the user of the system, such that most users will want to be aware of them.

Symptoms
This symptoms of this detection are the files, registry, and network communication referenced in the characteristics section.

Method
This is not a virus or Trojan. PUPs do not "infect" systems. They may be installed by a user individually or possibly as a part of a software package (in a bundle, for example).

Generic StartPage!yy!35582BC82B6B
Threat Search

Print Share

Risk Assessment: Date Discovered: Date Added: Origin: Length: Type: Subtype: DAT Required:
Removal Instructions

Home Low | Corporate Low 7/14/2011 7/14/2011 Unknown 57057 Trojan N/A

Overview Virus Characteristics Removal Instructions

Description
This is a Trojan detection. Unlike viruses, Trojans do not self-replicate. They are spread manually, often under the premise that they are beneficial or wanted. The most common installation methods involve system or security exploitation, and unsuspecting users manually executing unknown programs. Distribution channels include e-mail, malicious or hacked Web pages, Internet Relay Chat (IRC), peer-to-peer networks, etc.

Indication of Infection
This symptoms of this detection are the files, registry, and network communication referenced in the characteristics section.

Methods of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial. Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.

Vous aimerez peut-être aussi