F-SECURE ANTI-VIRUS FOR MICROSOFT EXCHANGE 8.00 - Administrator's Manual - page 245
CHAPTER 10
245
1. Trojan or other standalone malware (malicious programs)
If you are sending a sample of a suspected standalone malware
(worm, backdoor, trojan, dropper), specify the location of the file on
the infected system and the way it was started (Registry, INI files,
Autoexec.bat, etc.). A description of the source of the file is also
useful.
2. A false alarm from one of our antivirus products
If you receive a missed or incorrect detection, or a false alarm with
F-Secure Client Security, try to send us the following:
the file in question
the F-Secure Client Security version number
the last virus definition updates date
a description of the system configuration
a description of how to reproduce the problem
the F-Secure Client Security scanning report file. For instructions
on how to save the file see:
http://support.f-secure.com/enu/home/virusproblem/samples/
index.shtml
3. A new virus or trojan
If you think an unknown infection is in the computer system and an
antivirus program does not find anything, please send us:
If you are running Windows XP the msinfo32 report. To create the
report:
i.
Select
Start > Run...
ii. Type msinfo32 and click
OK
iii. While viewing the System Summary node select
File > Save
.
some Windows configuration files (WIN.INI, SYSTEM.INI) and
DOS configuration files (Autoexec.bat, Config.sys)
a full or partial export from a System Registry (this can be done
with the Regedit utility that all Windows versions have)
the contents of the \Start Menu\Programs\Startup\ folder
4. Virus that infects executable files