Support would normally steer you to their virus removal service which, as with other security software makers, is a chargeable service, but there's always a free alternative, see the last link in my signature below.
Artemis is the name McAfee gives unknowns that are detected and automatically submitted to the labs for analysis.
If you think it's a false detection, which sometimes it can be, then read here: https://community.mcafee.com/thread/2016
Unfortunately you can't believe everything you read on the Internet.
Artemis is the code name for the McAfee system which tries to detect malware much earlier than our researchers and data centers - it can be 5 to 30 days in front of typical detection methods.
Basically, whenever your machine sees a new piece of code, it hashes it (creates a mathematical "signature" of the code), pulls out some attributes, like whether the code is signed, 64bit mode etc, and then asks the McAfee brain in the cloud whether this file has been seen before.
Depending on who else is asking about that same thing, and the unique attributes of it, the McAfee brain (Artemis) may decide that it's unwise to run that program - That's when you get an Artemis warning message.
Your program may be ok, but it's reached a threshold that it's more than likely bad. We don't know anything else about the function of the file at this time, only that it matches the characteristics of other files which have turned out to be bad. If the file no longer exists, then probably your system already deleted it. Maybe it was a temp file? What folder was it in?
If you want to do a deep scan of your system, you can use Stinger - http://www.mcafee.com/us/downloads/free-tools/stinger.aspx
This is a valid hit and identified as ZeroAccess variant.
You may read more about this malware, including the remediation steps, from the following resource:
Use the following Rootkit Removal tool to confirm that the infection is cleaned successfully:
We also recommend you to submit the suspicious samples using one of the methods mentioned at:
The e-mail method should be suitable here. Kindly include the detection logs in your submission.
You may also use GetSusp to check if there are any more suspicious files on the affected machine.
Do let us know the submission ID received on making a successful submission. We will respond to your submission with specific instructions to remediate this.
Note: If the machine has Windows Vista or higher or has UAC(User Access Control) enabled, the above tools should be run from an Administrator account. Otherwise, you may right click on the tool and select 'Run As Administrator.'
Message was edited by: showvik on 5/6/13 5:40:09 AM CDT