Home > Threat descriptions >

Application

Classification

Category:  PUA

Type:  Application

Platform:  W32

Aliases:  Application, Application:w32/.[variant], Application.win32.[variant], Application.[variant]

Summary


A program or file that has code or behavior which can introduce additional security risks if used in a harmful or unauthorized manner.

Removal


Automatic action

Based on the settings of your F-Secure security product, it will either prompt you for a desired action, allow the program to run, block access to the program but leave it in place, or move it to the quarantine where it cannot harm your device.

Allow blocked files and exclude files from scanning

If you are confident that you are aware of the risks involved in using the program and consent to its use, you may choose to allow the program to run. You can also change the settings of the F-Secure security product to exclude it from further scanning. Note: you need administrative rights to change the settings.

Knowledge Base

Find the latest advice in our Community Knowledge Base.

About the product

See the manual for your F-Secure product on the Help Center.

Contact Support

Chat with or call an expert for help.

Submit a sample

Submit a file or URL for further analysis.

Technical Details


A program is classified as an application if it has code or behavior which can introduce additional security risks if used in a harmful or unauthorized manner. Examples of such programs include:

  • Remote administration programs
  • File transfer protocol (FTP) servers
  • Internet relay chat (IRC) clients
  • Data packet sniffers

Such programs are usually considered legitimate and useful, if they are used properly and by an authorized user. If used in an unauthorized context or by an attacker however, these programs can:

  • Give unauthorized access to confidential information
  • Give unauthorized user privileges
  • Direct the system to perform a harmful action

If you are confident that you are aware of the risks involved in using the program and consent to its use, you may choose to keep it installed. You may also choose to exclude it from further scanning.