|Type||Anti-malware technology, possible indication of malware|
|Short Description||Suspicious Cloud is designed to detect malware without it being included in any database. False positives are possible.|
|Symptoms||Suspicious Cloud notifications.|
|Distribution Method||Implemented in the AV program.|
|Detection tool||Download SpyHunter, to See If Your System Has Been Affected By Suspicious.Cloud|
Suspicious.Cloud is an anti-malware technology created in 2010. It is designed to detect malicious software without it (the malware) having to be included in a malware database. Suspicious.Cloud will just go after the features of known malware threats. A Suspicious Cloud notification can be regarded as a sign of a malware infiltration, be it a virus or a Trojan. However, the very same notification may be about mild software alterations.
Research indicates that Suspicious Cloud has several variants. For instance, Suspicious.Cloud.7.EP, Suspicious.cloud.5, Suspicious.cloud.9.5 may be regarded as various alterations of the same technology.
For your information, the primary file of Suspicious.Cloud.7.EP is a .dll type and may be situated in the \AppData\ folder. Continue reading to find out how to determine if the file belongs to malware or is a false positive.
What Does a Suspicious.cloud Notification Mean? Suspicious.cloud.A Specifics
Security researchers explain that some AV solutions are more sensitive than others. If you are currently experiencing a Suspicious Cloud detection by your AV, you may want to be alert since a previously unknown intruder may have located itself onto the system. However, it is also quite possible that, because the technology is very sensitive, false positives may be generated.
What you may want to do is identify and manually locate each file that has been detected as Suspicious Cloud. Then, submit collected files to your AV program to determine if it is malicious or a false positive. If you truly suspect that malware is residing in the system, you will need to take immediate measures to detect and remove any threats.
If the file turns out to be okay, you may need to restore it manually so that the performance of your applications is not affected.
According to researchers at Enigma Software, Suspicious.cloud.A the technology has lots of aliases and various detection names. Here is a list:
- Trojan.Generic.KD.761924 – detected by MicroWorld-eScan
- Artemis!3E967233D5EF – McAfee
- W32/Kryptik.BRN Norman
- Trojan.Win32.Inject.evjk – Kaspersky
- Trojan.Rodricter.21- DrWeb
- Backdoor.Win32.Hupigon (v) – VIPRE
- DR/Delphi.Gen8 AntiVir
- Trojan.Generic.KD.761924 (B) – Emsisoft
- a variant of Win32/Injector.YIQ – ESET-NOD32
- Backdoor.Win32.Simda – Ikarus
- W32/Simda.C!tr – Fortinet
- BackDoor.Generic16.ABN – AVG
- Trojan.Generic.9045646 – MicroWorld-eScan
- PWS-Zbot-FAXY!1A2D26A18DCD – McAfee
- Trojan.Foreign!EPUmStA4Jas – Agnitum
Suspicious.cloud.A is also known to create a list of files:
Image Source: Enigma Software
What Should I Do to Determine the Origin of Suspicious.Cloud?
If you see, for example, a Suspicious.Cloud.7.EP notification, you will definitely want to know how to proceed since it may be annoying and persistent. What you should do first is scan the system via AV software. Then, identifying and submitting suspected files may be required to determine if malware is residing in the background.
To be certain that your PC stays malware-free, you should update your AV application and:
- Use file sharing protection.
- Browse the Web safely.
- Monitor your email account for spam.
- Keep your software up to date to avoid vulnerability exploitation.
Spy Hunter scanner will only detect the threat. If you want the threat to be automatically removed, you need to purchase the full version of the anti-malware tool.Find Out More About SpyHunter Anti-Malware Tool / How to Uninstall SpyHunter