Once detected, the F-Secure security product will automatically block the program and prompt the user for a desired action.
More information on the scanning and removal options available in your F-Secure product can be found in the Help Center.
You may also refer to the Knowledge Base on the F-Secure Community site for more assistance.
The suspect file identified by this detection shows code characteristics or behaviors that matches known trojans.
The detection name indicates whether the suspect file matches a trojan from a particular family or whether it was generically detected. For example:
F-Secure Security Cloud is a cloud-based reputation service that hosts up-to-date lists of popular or common files and web sites. Each listed file or site has been analyzed and given a reputation rating that indicates if it is considered 'safe' or 'harmful'.
Whenever an F-Secure security product encounters a questionable file or site, it sends a query over the Internet to the Security Cloud to check for the file or site's latest reputation rating. Based on that information (and if needed, further analysis), the product may then delete, quarantine or block the file or application, or allow it to proceed.
This reputation-based analysis provides an important additional layer of security and is used to complement Generic Detections and local behavioral analysis (Heuristic Detections) to provide comprehensive protection. For more information about the Security Cloud, see: