-
<attr name="filename">C:\Program Files\redshark\redshark.exe</attr>
<attr name="finding">@EID_Id_trj</attr>
<attr name="virusname">Generic10.AINU</attr>
</rec>
- <rec time="2008/06/05 12:29:15" user="Owner" source="General">
<value>@HL_TestStarted</value>
<attr name="testname">@TestName_02</attr>
</rec>
- <rec time="2008/06/05 12:30:09" user="Owner" source="Virus">
<value>@HL_ActionTaken</value>
<attr name="filename">C:\Program Files\redshark\redshark.exe</attr>
<attr name="action">@HL_ActCleaned</attr>
</rec>
</history>
FYI
1. EID_Id_trj = TROJAN
2. I WAS RUNNING THE MOST UPDATED AVG
3. I WAS RUNNING THE MOST UPDATED RED SHARK
4. Generic10.AINU = THIS IS SOMETHING TO WORRY ABOUT THIS IS A NAME THAT THE VIRUS SCANNER GIVE ITS SELF SO THAT IT KNOWS HOW TO HEAL THIS PROBLEM Generic10.AINU MEANS When it heals, it attempts to remove the malicious code, or in the case of avast, replaces it with a backed up copy of the process and removes the whole thing to a virus chest JUST TO HEAL THAT IS NOT GOOD. THE PROGRAM WILL NOT WORK AFTER THIS IS HEALED
5. Generic10.AINU = THIS ALSO MEANS THAT THIS IS A SPREADING VIRUS (OR A WORM) AND CAN INFECT YOUR WHOLE COMPUTER IN TIME. HOW IS THIS NOT SOMETHING TO WORRY ABOUT WOW!
6. In the context of computing and software, a Trojan horse, or simply trojan, is a piece of software which appears to perform a certain action but in fact performs another such as transmitting a computer virus. Contrary to popular belief, this action, usually encoded in a hidden payload, may or may not be actually malicious, but Trojan horses are notorious today for their use in the installation of backdoor programs. Simply put, a Trojan horse is not a computer virus. Unlike such malware, it does not propagate by self-replication but relies heavily on the exploitation of an end-user (see Social engineering). It is instead a categorical attribute which can encompass many different forms of codes. Therefore, a computer worm or virus may be a Trojan horse. The term is derived from the classical story of the Trojan Horse.
In the field of computer architecture, 'Trojan Horse' can also refer to security loopholes that allow kernel code to access anything for which it is not authorized.
~ From Wikipedia, the free encyclopedia
7. I am the smartest man here ba ha ha
8. fish are smelly
9. if your still looking for a reason go back to reason # 1
Looks a lot more like a false positive to me.
Generic10.* viruses aren't actual virus signature matches, they're heuristic matches that think they found something, and they're pretty much always wrong, at least with AVG -- it's heuristic engine is terrible.
If you downloaded it from PokeBeach, I can tell you it's not infected. I'd turn off heuristic matching and save yourself a lot of unnecessary worry.
When it reads the footprint of a file, it seems a pattern common to code within a virus and automatically assumes
I know what your talking about
I never blow off worms, they are simply too dangerous to dismiss. Even a false alarm merits some attention. And yes i did get it from beach