What specific Runtime errors are you getting?
Did avast provide a specific file(s) name associated with the malware threat(s) detected and if so, where is it located (full file path) at on your system?
With that information you can get a second opinion, by submitting the file(s) to one of the following online services that analyzes suspicious files:
In the "File to upload & scan
" box, browse to the location of the suspicious file and submit (upload) it for scanning/analysis.
Each security vendor uses their own naming conventions to identify various types of malware
. Names with Generic
are a very broad category. See Understanding virus names
detections are usually a heuristics engine detection
of possible new variants of malware
before the vendor can get samples and update the program's definitions for detection. Heuristics uses non-specific detection methods to find new or unknown malware which allows the anti-virus to detect and stop if before doing any harm to your system. Heuristic scanning methods vary depending on the vendor. Some claim to allow emulation of the file's activities in a virtual sandbox. Others scan the file more intensively, searching line by line inspecting the code in a file to see if it contains virus-like characteristics. If the number of these characteristics/instructions exceeds a pre-defined threshold, the file is flagged as a possible virus
to using heuristics is that it is not as reliable as signature-based detection (blacklisting) and can potentially increase the chances that a non-malicious program is flagged as malicious. With heuristics, there is always a potential risk
for a "False Positive
" when the heuristic analysis flags a file as suspicious
that contains no malware. Sometimes lowering the program's heuristic settings and rescanning may provide more accurate results
Submitting file samples to the vendor for further analysis allows the lab techs to quickly investigate and confirm if the detection is actually malware. Some security programs have built-in options for submitting a file directly from the quarantined area to the vendor's lab for analysis. Most user guides will explain how to do that. Other anti-virus solutions automatically submit files or provide an alert to do so if you have checked the option to "Submit for analysis
in the program's settings.
If avast quarantined
the file and moved it into the virus vault, that file is safely held there and no longer a threat
. The file is essentially disabled and prevented from causing any harm to your system through proprietary security routines which may copy, rename, encrypt and password protect the file as part of the moving process. Quarantine is just an added safety measure
which allows you to view and investigate the files while keeping them from harming your computer. When the quarantined file is known to be malicious
, you can delete
it at any time by launching the program which removed it, going to the Quarantine tab, and choosing the option to delete.