Description is a label for PC threats that are based on programs that have been maliciously altered in some way (AKA ‘morphed’ or ‘mutated’) while still lacking many of the characteristics of traditional PC threats. Because this label has sometimes been known to produce false positives, malware researchers recommend that you manually check any suspects before you use anti-malware software to remove files that are associated with may be classified as either a Trojan or a virus due to its nature of code modification, and you should scan your entire PC to catch a potential infection if you suspect that has altered a file or program in an undesirable way. – Fiddling with Your Files Since 2010 was first identified in September of 2010 as a virus-based modification of other files, processes and applications. Because can be applied to many different types of viruses that share its limited set of traits, symptoms of may not be highly-evident or consistent. However, malware experts note that viruses like are sometimes detectable by excessive RAM, CPU and other system resource expenditures by normal processes. These expenditures can be viewed from Task Manager’s processes tab, as well as in similar applications that also allow you to view active processes (if Task Manager is blocked or otherwise inaccessible).

Since doesn’t possess many of the characteristics that would allow to be traditionally labeled as another form of PC threat, other symptoms from can be minor or even nonexistent.

» Learn more about SpyHunter's Spyware Detection Tool
and steps to uninstall SpyHunter.

In most cases, using anti-malware applications to find is more practical than trying to detect by yourself, and, as a broad group of similar PC threats, also lacks a distinctive propagation method. A Cloud You Can Feel Free to Wave into Dispersal

Current rates of infections that are related to are reported to be low, and reputable anti-malware companies also note that removal of is relatively easy. However, since code-alteration attacks like those that are exhibited by may also be employed to steal private information, disable your security applications, change your browser’s settings or install other PC threats, malware experts recommend that you take seriously and remove if you’ve verified its malicious nature. Distinct payloads for, however, are lacking, since, as a general label, may be applied to many types of PC threats that lack shared purposes or functions.

However, in cases of false positives for, you can feel free to set as an exception for your anti-malware programs to be ignored. Removal of false positive files is highly likely to cause damage to harmless files or programs, and for this reason, malware experts recommend that you closely examine any alert before you take action against by removing


BackDoor.Generic16.ABN [AVG]W32/Simda.C!tr [Fortinet]Backdoor.Win32.Simda [Ikarus]a variant of Win32/Injector.YIQ [ESET-NOD32]Trojan.Generic.KD.761924 (B) [Emsisoft]DR/Delphi.Gen8 [AntiVir]Backdoor.Win32.Hupigon (v) [VIPRE]Trojan.Rodricter.21 [DrWeb]Trojan.Win32.Inject.evjk [Kaspersky]W32/Kryptik.BRN [Norman]

More aliases (2083) Automatic Detection Tool (Recommended)

Is your PC infected with To safely & quickly detect we highly recommend you run the malware scanner listed below.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.
Posted: January 19, 2012 | By
Rate this article:
1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)
Loading ... Loading ...
Threat Metric
Threat Level: 7/10
Detection Count: 27,396
Home Malware ProgramsMalware

Leave a Reply

What is 3 + 3 ?
Please leave these two fields as-is:
IMPORTANT! To be able to proceed, you need to solve the following simple math (so we know that you are a human) :-)