Virus Name: Remote Explorer

This page last updated 12/30/98

 

Indications you are hosting the virus:

Virus Characteristics

Remote Explorerthe most outstanding characteristics is that it can move/transport itself without typical user intervention (passed on floppy, via email) and replicate.

 

Products available to users for protection against the "Remote Explorer" infection

Virus signature updates are available for version 4.x , version 3.x and version 7.x engines. These signature updates DETECTION but do not clean/remove Remote Explorer. This will allow you to quarantine infected EXE and data files.

The first 4.x engine products for VirusScan and NetShield NT have also just been released. Links are included to these products for reference. If you have already installed these products there is no reason to re-install. If you have not and are marshalling your network administrators to protect against this threat, we encourage you to move to this version.

 

 

UPDATES

For VirusScan 3.xx users:

For VirusScan 4.xx users:

Please note this process will overwrite any Extra.DAT/DRV that is in the subdirectory. If you using an Extra.DAT/DRV to detect and clean a virus and the virus is still not in the full set of DATs (you can be certain this is not the case by updating to the 4006DAT) call technical support for assistance in merging them.

If you are using the

Recommended steps for fighting infection

NT Server/Workstation systems:

The following instructions have been replaced by the use of RESCAN.EXE - they are included for persons unable to retrieve RESCAN.EXE utility-

Windows 95/98 Desktop Infections

Once it is determine the virus has infected a Windows Desktop these steps are appropriate:

- McAfee Labs AVERT