Need help? Ask the community or hire an expert.
Go to Avira Answers
Date discovered:01/10/2013
In the wild:No
Reported Infections:Low
Distribution Potential:Low
Damage Potential:Low
Static file:No
VDF version:
IVDF version:

 General APPL/ - Application

This class of detection flags applications that if used unproperly or with malicious intent might damage or compromise security on the local system, remote systems or network infrastructure. These are legitimate applications that can be used to extract protected information, provide remote access to the local machine, modify advanced system settings or perform advanced operating system or networking functions.

This detection doesn't mean that the file is malicious. However, if the file got on the system without the user's knowledge the system's security might be compromised.

Disabling this detection is recommended for advanced users that understand the risks and how to use these applications.
Method of propagation:
   • No own spreading routine

   •  Sophos: Somoto BetterInstaller
   •  Avast: Win32:Somoto-K [PUP]
   •  AVG: AdInstaller.Somoto
   •  Eset: Win32/Somoto.A
   •  DrWeb: Adware.Somoto.17

Platforms / OS:
   • Windows 2000
   • Windows XP
   • Windows 2003
   • Windows Vista
   • Windows Server 2008
   • Windows 7

 Special detection  APPL/Somoto.Gen2

A generic detection routine designed to detect common family characteristics shared in several variants.

This special detection routine was developed in order to detect unknown variants and will be enhanced continuously.

Description inserted by Soe-liang Tan on Thursday, October 3, 2013
Description updated by Andrei Gherman on Friday, October 4, 2013

Back . . . .