Malware

Application.LoadMoney.545 malicious file

Malware Removal

The Application.LoadMoney.545 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Application.LoadMoney.545 virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Sample contains Overlay data
  • Presents an Authenticode digital signature
  • Performs HTTP requests potentially not found in PCAP.
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • Unconventionial binary language: Russian
  • Unconventionial language used in binary resources: Russian
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Detects Bochs through the presence of a registry key
  • Checks the version of Bios, possibly for anti-virtualization
  • Attempts to modify proxy settings
  • Accessed credential storage registry keys
  • Deletes executed files from disk
  • Attempts to interact with an Alternate Data Stream (ADS)
  • Yara rule detections observed from a process memory dump/dropped files/CAPE

How to determine Application.LoadMoney.545?


File Info:

name: 075E406CB2AA56965DDF.mlw
path: /opt/CAPEv2/storage/binaries/8abdb3a2055fec0c7d25fef7892fd69802e85e849f4e97b9abe269305eb8d0a5
crc32: 3D7C4D52
md5: 075e406cb2aa56965ddf2517d6e71dc6
sha1: 02f87b217822832c0a8e09fc2bc77f2af4ed1d9a
sha256: 8abdb3a2055fec0c7d25fef7892fd69802e85e849f4e97b9abe269305eb8d0a5
sha512: 2991f792c6a75df4ae94a997d04183bfc3a39c46477c89b9cea228a69bc3480d6f7332b41d2cd839409e3ceac194dfd749d656439aea89c58ffb7c6bdf158d06
ssdeep: 12288:5VJ1UjOsVv2RrndXRZYswbO205saPWqcn:5ROOsB2PXRZYsOqsaPW3n
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T171B4BD526C46B161E9B304F1C4F204C539FADCBEDFE7A0CB9ACC6B5911B99C08871D6A
sha3_384: a995220771f126faa685960dd99cb13d503e1d71b5c94c59db5b15bbede08c61d71bfa0fb3696e0e88d6c7e392965897
ep_bytes: 6a606810564700e885170000bf940000
timestamp: 2015-10-06 06:47:58

Version Info:

FileVersion: 1, 23, 19, 125
CreateCopyright: SecInc
ProductVersion: 1, 23, 19, 129
Translation: 0x0419 0x04b0

Application.LoadMoney.545 also known as:

BkavW32.AIDetectMalware
LionicRiskware.Win32.FakeWindow.1!c
tehtrisGeneric.Malware
MicroWorld-eScanGen:Variant.Application.LoadMoney.545
FireEyeGeneric.mg.075e406cb2aa5696
CAT-QuickHealPUA.Praktisooo.Gen
MalwarebytesLoadMoney.Adware.Bundler.DDS
ZillyaAdware.LoadMoneyCRTD.Win32.1903
SangforSuspicious.Win32.Save.ins
K7AntiVirusTrojan ( 004f58c41 )
AlibabaMalware:Win32/km_2430f.None
K7GWTrojan ( 004f58c41 )
CrowdStrikewin/grayware_confidence_60% (W)
VirITTrojan.Win32.Crypt5.AZE
CyrenW32/S-af6ed004!Eldorado
SymantecML.Attribute.HighConfidence
Elasticmalicious (high confidence)
ESET-NOD32a variant of Win32/Kryptik.DZLS
TrendMicro-HouseCallADW_LOADMONEY.SMC
CynetMalicious (score: 99)
Kasperskynot-a-virus:Downloader.Win32.FakeWindow.a
BitDefenderGen:Variant.Application.LoadMoney.545
NANO-AntivirusTrojan.Win32.FakeWindow.ekmzdt
SUPERAntiSpywarePUP.LoadMoney/Variant
AvastWin32:MalwareX-gen [Trj]
TencentMalware.Win32.Gencirc.10b3132f
EmsisoftGen:Variant.Application.LoadMoney.545 (B)
BaiduWin32.Trojan.Kryptik.nc
F-SecureHeuristic.HEUR/AGEN.1342591
DrWebTrojan.LoadMoney.1032
VIPREGen:Variant.Application.LoadMoney.545
TrendMicroADW_LOADMONEY.SMC
McAfee-GW-EditionPacked-LZ.d!075E406CB2AA
Trapminemalicious.moderate.ml.score
SophosMal/Generic-S
GDataGen:Variant.Application.LoadMoney.545
JiangminTrojan.Yakes.afy
WebrootPua.Downloadmanager
AviraHEUR/AGEN.1342591
Antiy-AVLRiskWare[Downloader]/Win32.FakeWindow
XcitiumApplication.Win32.LoadMoney.TMP@5vhh68
ArcabitTrojan.Application.LoadMoney.545
ZoneAlarmnot-a-virus:Downloader.Win32.FakeWindow.a
MicrosoftPUAAdvertising:Win32/LoadMoney
AhnLab-V3PUP/Win32.LoadMoney.R194215
Acronissuspicious
VBA32Downloader.FakeWindow
MAXmalware (ai score=75)
Cylanceunsafe
PandaTrj/Genetic.gen
APEXMalicious
RisingPUF.LoadMoney!8.161 (TFE:5:YtpMiJuBX7K)
IkarusTrojan.Win32.Crypt
MaxSecureTrojan.Malware.73381400.susgen
FortinetW32/Kryptik.EAKD!tr
AVGWin32:MalwareX-gen [Trj]
Cybereasonmalicious.cb2aa5
DeepInstinctMALICIOUS

How to remove Application.LoadMoney.545?

Application.LoadMoney.545 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment