I have the same problem downloading an ActiveX control DvROcx.cab. McAfee identifies it as a trojan virus. Peter's post does not seem to be any help. I am using Windows XP. This is my McAfee version info.
Version number: 220.127.116.119
McAfee AntiSpyware Enterprise Module
Version number: 18.104.22.168
VirusScan Enterprise + AntiSpyware Enterprise
Version number: 8.7i (22.214.171.1240)
Anti-virus License Type: licensed
Scan engine version (32-bit): 5400.1158
DAT version: 6424.0000
License Type: licensed
Message was edited by: Ex_Brit on 01/08/11 12:58:42 EDT PM
Moved from Community/Home to VirusScan Enterprise for better attention.
Just a little background: I'm running the Web Application Manager for a Q-See camera system. I have had it working for months and then today it wanted to download an ActivieX application. When I try I get a warning that it is not verified. When I say to go ahead anyway, IE closes and McAfee produces a virus scan alert detected as Downloader.a!by which supposedly is a Trojan.
Can you please submit the file which is getting detected as Downloader.a!by. We will forward the sample to our Research team and get it reviewed.
You can submit the file for analysis to email@example.com and provide the analysis id you receive.
Since VSE is not allowing the file to be downloaded, the first thing you can do is to disable the On-Access Scan temporarily till the file is downloaded.
You can do this by Right click on the VSE icon -> Disable On-Access Scan.
Once the file is downloaded on your system, the next step, is for you to send us the file/sample in a password-protected ZIP file (password - infected). You can find detailed instructions for how to do this at http://www.mcafee.com/us/mcafee-labs/resources/how-to-submit-sample.aspx
Also if possible please let us know the exact link from where you are trying to download the ActiveX application.
when this file is detected, you can check if any file is added to the Quarantine folder.
zip that file with password 'infected' and submit to firstname.lastname@example.org