Malicious application detected

When System Watcher detects an application whose behavior completely matches the activities of malicious applications, a notification is displayed on the screen.

The notification provides the following information:

  • Threat description.
  • Type and name of the malicious application.

    The Internet Security info pict Malicious application detected icon is displayed next to the name of the application. Click it to open the window with information about the application.

  • ID of the process and name of the application file, including the path to it.
  • Link to the window with the application emergence log.

You can select one of the following actions:

  • Quarantine – close the application, move the application file to Quarantine where it poses no threat to your computer’s security.

    A certain folder, where all possibly infected objects are placed, which were detected during scans or by real-time protection.

    With further scans of Quarantine, the status of the object may change. For example, the object may be identified as infected and can be processed using an updated database. Otherwise, the object could be assigned the not infected status, and then restored.

    If you manually move to Quarantine a file that turns out to be not infected at the next scan, its status changes to OK only if the file has been scanned for three days after it had been moved to Quarantine, or later.

  • Terminate – interrupt the application from running.
  • Allow – allows the application to run.

Internet Security arr Malicious application detectedPage top

Malicious application detected