A Generic Detection of a program that has features or behavior indicative of known malicious threats, such as trojans, worms or viruses.
Once detected, the F-Secure security product will either automatically disinfect the suspect file or the user will be prompted to select a desired action. For more information, see: Support Community article: Automatic actions for viruses also used for suspicious items .
More scanning & removal options
More information on scanning or removal options is available in the documentation for your F-Secure security product on the Downloads section of our Home - Global site.
You may also refer to the Knowledge Base on the F-Secure Community site for more assistance.
A program identified by Generic Detection appears to have characteristics that resemble known malware. This may indicate the presence of a malware infection on the system, or that the suspect file itself is malicious.
Generic Detections are a type of detection used by antivirus programs to identify files with malicious characteristics.Unlike single-file detections which identify unique files, a Generic Detection looks for broadly applicable code or behavior characteristics to evaluate a file's potential for causing harm; a single Generic Detection can therefore efficiently identify dozens, or even hundreds of malware.
Generic Detections can be used to identify particular types of malware, based on general physical or behavioral characteristics:
In this case, the Generic Detection identifies threats based on their actions. Alternatively, a Generic Detection can be used to identify specific groups of malware (or families) based on similarities in their code:
Generic Detections using the name format "Generic.malware.[variant]", "Suspicious:w32/malware.[variant]!online" or similar may also occasionally detect a crack file, which is used to bypass the protection mechanisms of recently released games and other popular applications. While not strictly malicious, in some countries such files may be considered illegal. In addition, such files may be distributed bundled together with other unsolicited or outrightly malicious files.