Malware

Application.Deceptor.PY removal

Malware Removal

The Application.Deceptor.PY is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Application.Deceptor.PY virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Presents an Authenticode digital signature
  • Creates RWX memory
  • Dynamic (imported) function loading detected
  • Reads data out of its own binary image
  • Drops a binary and executes it
  • The binary contains an unknown PE section name indicative of packing
  • Attempts to modify proxy settings
  • Harvests cookies for information gathering

How to determine Application.Deceptor.PY?


File Info:

name: 6BE4E14A9B17B4D5F088.mlw
path: /opt/CAPEv2/storage/binaries/d4e949aa0d8cedec6369b81c713540cbcc1212fc5fa421d01109b2532a1801e5
crc32: 88C1AEF7
md5: 6be4e14a9b17b4d5f0884567a0706c25
sha1: cc76e1f77c1f100645f25c8f0a1cfe9935b503dc
sha256: d4e949aa0d8cedec6369b81c713540cbcc1212fc5fa421d01109b2532a1801e5
sha512: 6fb7fccf68582559afb5bbc142378db368025ef3ae0751141d181526fa50dbe6e655cbe54a95082577487b461827a24425824723313c63eb3ee6ccd6f7e3e1fb
ssdeep: 98304:QUp+qAakvt7fj4Xh9DkxMFjQJ4hxBOnQT+tb1KQO/9q/Y7rzEi2fn0ab:7et7fwDQmF8J4hxLTcZVe9qATYfh
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T14C363372A240C866D3E17674CF16D1A103156E0D262491E772F83CBF7FADAB3C99C296
sha3_384: 0a910fcf199ab6ab792104600956144d949538289b819754e223aa1f262de763c454228a2800103a53c55819cf0729a4
ep_bytes: 558bec83c4c453565733c08945f08945
timestamp: 1992-06-19 22:22:17

Version Info:

Comments: This installation was built with Inno Setup.
CompanyName: NETGATE Technologies s.r.o.
FileDescription: FortKnox Personal Firewall Setup
FileVersion:
LegalCopyright:
ProductName: FortKnox Personal Firewall
ProductVersion:
Translation: 0x0000 0x04b0

Application.Deceptor.PY also known as:

MicroWorld-eScanApplication.Deceptor.PY
CylanceUnsafe
VIPREApplication.Deceptor.PY
K7AntiVirusTrojan ( 00534eda1 )
K7GWTrojan ( 00534eda1 )
Cybereasonmalicious.a9b17b
ESET-NOD32Win32/UwS.FortKnoxFirewall
BitDefenderApplication.Deceptor.PY
EmsisoftApplication.Deceptor.PY (B)
SophosNETGATE FortKnox Personal Firewall (PUA)
GDataApplication.Deceptor.PY
ArcabitApplication.Deceptor.PY
MicrosoftRansom:MSIL/Gorf
MalwarebytesPUP.Optional.BundleInstaller
MaxSecureTrojan.Malware.106483327.susgen
FortinetW32/NETGATE_FortKnox_Personal_Firewall.FORTKNOXFIR

How to remove Application.Deceptor.PY?

Application.Deceptor.PY removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment