Where to Buy Trend Micro Products

For Home

For Small Business

1-888-762-8736
(M-F 8:00am-5:00pm CST)

For Enterprise

1-877-218-7353
(M-F 8:00am-5:00pm CST)

Not in the United States?
Select the country/language of your choice:

Asia Pacific Region

Europe

The Americas

Not in the United States?
Select the country/language of your choice:

Asia/Pacific

Europe

America

Login

For Home

For Business

For Partners

Threat Encyclopedia

MAL_HIFRM-2


PLATFORM:

Windows 2000, Windows XP, Windows Server 2003

OVERALL RISK RATING:
REPORTED INFECTION:

  • Threat Type:Others

  • Destructiveness:No

  • Encrypted:

  • In the wild: Yes

OVERVIEW


TECHNICAL DETAILS

Heuristic Detection

This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware:

If your Trend Micro product detects a file under this detection name, do not execute the file.

SOLUTION

Minimum Scan Engine:

9.300

NOTES:

Submitting Samples

If you identified suspicious files, you may submit them to us. Sample files for submission must be in ZIP format and should be password-protected. To submit a ZIP file, file compression software such as Winzip must be used. A trial version of Winzip is available here.

To compress a file, please follow the steps below:

  1. Right-click on the file and select Add to Zip.
  2. Enter a file name for the zip file.
  3. On the Options menu, choose Encrpyt. In the input box, type virus. This serves as the password for the zip file.
  4. Send the sample through the following channels:
    • For Trend Micro Premium customers, please submit a virus support case by clicking here:
    https://psc.trendmicro.com/eservice_enu/start.swe?SWECmd=Start&SWEHo=psc.trendmicro.com
    • For Trend Micro non-Premium customers, please contact your local support network by visiting your Trend Micro regional website.
    • For non-Trend Micro customers, scan your system with HouseCall, our highly popular and capable on-demand scanner for identifying and removing viruses, Trojans, worms, unwanted browser plug-ins, and other malware.


Did this description help? Tell us how we did.

Featured Stories

Connect with us on