Did Trend Micro provide a specific file(s) name associated with the malware threat(s) detected and if so, where is it located (full file path) at on your system?
Each security vendor uses their own naming conventions to identify various types of malware
. Names with Generic
are a very broad category. See Understanding virus names
detections are usually a heuristics engine detection
of possible new variants of malware
before the vendor can get samples and update the program's definitions for detection. Heuristics uses non-specific detection methods to find new or unknown malware which allows the anti-virus to detect and stop if before doing any harm to your system. Heuristic scanning methods vary depending on the vendor. Some claim to allow emulation of the file's activities in a virtual sandbox. Others scan the file more intensively, searching line by line inspecting the code in a file to see if it contains virus-like characteristics. If the number of these characteristics/instructions exceeds a pre-defined threshold, the file is flagged as a possible virus
to using heuristics is that it is not as reliable as signature-based detection (blacklisting) and can potentially increase the chances that a non-malicious program is flagged as malicious. With heuristics, there is always a potential risk
for a "False Positive
" when the heuristic analysis flags a file as suspicious
that contains no malware. Sometimes lowering the program's heuristic settings and rescanning may provide more accurate results
Submitting file samples to the vendor for further analysis allows the lab techs to quickly investigate and confirm if the detection is actually malware. Some security programs have built-in options for submitting a file directly from the quarantined area to the vendor's lab for analysis. Most user guides will explain how to do that. Other anti-virus solutions automatically submit files or provide an alert to do so if you have checked the option to "Submit for analysis
in the program's settings. If those options are unavailable, you can also look for documentation on the vendor's web site on how to submit file samples.