Categories: PUA

PUA:Win32/LoadMoney removal instruction

The PUA:Win32/LoadMoney is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What PUA:Win32/LoadMoney virus can do?

  • Presents an Authenticode digital signature
  • Detected script timer window indicative of sleep style evasion
  • A process attempted to delay the analysis task.
  • Attempts to connect to a dead IP:Port (10 unique times)
  • Reads data out of its own binary image
  • A process created a hidden window
  • Drops a binary and executes it
  • HTTP traffic contains suspicious features which may be indicative of malware related traffic
  • Performs some HTTP requests
  • A scripting utility was executed
  • Uses Windows utilities for basic functionality
  • Steals private information from local Internet browsers
  • Attempts to modify proxy settings
  • Attempts to interact with an Alternate Data Stream (ADS)
  • Collects information to fingerprint the system

Related domains:

installpack.net
www.google-analytics.com
stats.g.doubleclick.net
img.installpack.net
apps.identrust.com
isrg.trustid.ocsp.identrust.com
ocsp.pki.goog
crl.pki.goog

How to determine PUA:Win32/LoadMoney?


File Info:

crc32: 43F2CB09md5: a3fe09a0346d8772c9cba02c1a64ef15name: client.exesha1: c403b96f1909e84bd30c32818bcb74b5107865c5sha256: 259be1d6d0e472073e078c4a294ed47dc1f5fb47f55f8b893e2d75d5c6a6a7b6sha512: f793acb670f3751c0b2ed00693103660bc7f29a2785c159fee25cd5dcfab405a6cc0f3531b9209648bac71eb1040074e232125d075fafeb010ae996a5fae4126ssdeep: 49152:BdW6CS8SpEgIvbW8eLIl/aY95VZQDIx2Mh4NHLVMegO696:BdyS80EgS68FhaY/VuIFgr6egttype: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

LegalCopyright: Copyright xa9 2005-2016 Oleg N. ScherbakovInternalName: 7ZSfxModFileVersion: 1.7.0.3900CompanyName: Oleg N. ScherbakovPrivateBuild: April 1, 2016ProductName: 7-Zip SFXProductVersion: 1.7.0.3900FileDescription: 7z Setup SFX (x86)OriginalFilename: 7ZSfxMod_x86.exeTranslation: 0x0000 0x04b0

PUA:Win32/LoadMoney also known as:

MicroWorld-eScan Trojan.GenericKD.32537027
CAT-QuickHeal PUA.Insitegrou.Gen
McAfee Artemis!A3FE09A0346D
Cylance Unsafe
VIPRE Trojan.Win32.Generic!BT
K7AntiVirus Adware ( 0051fed31 )
K7GW Adware ( 0051fed31 )
Cybereason malicious.0346d8
Arcabit Trojan.Generic.D1F079C3
Invincea heuristic
F-Prot W32/Installpack.A
ESET-NOD32 a variant of Win32/InstallPack.C potentially unwanted
APEX Malicious
Kaspersky not-a-virus:HEUR:Downloader.Win32.InstallPack.gen
BitDefender Trojan.GenericKD.32537027
NANO-Antivirus Trojan.Win32.InstallPack.fofhrd
ViRobot Adware.Installpack.1866904.A
Rising Trojan.Generic@ML.100 (RDMK:Z2AqTBw9LlpxDn1SBcU2MQ)
Endgame malicious (high confidence)
Emsisoft Application.SoftInstall (A)
Comodo ApplicUnwnt@#1xf6ra83hsi48
F-Secure PotentialRisk.PUA/Softobase.ME
DrWeb Adware.Softobase.15
TrendMicro PUA.Win32.InstallPack.A
McAfee-GW-Edition Artemis!PUP
Fortinet Riskware/InstallPack
FireEye Trojan.GenericKD.32537027
Sophos InstallCore (PUA)
Ikarus PUA.Bundler
Cyren W32/Installpack.NMYX-2817
Jiangmin HackTool.Agent.dhf
Webroot Pua.Opencandy
Avira PUA/Softobase.ME.1
MAX malware (ai score=99)
Microsoft PUA:Win32/LoadMoney
ZoneAlarm not-a-virus:HEUR:Downloader.Win32.InstallPack.gen
AhnLab-V3 PUP/Win32.Softobase.C2756334
VBA32 BScope.Adware.Softobase
ALYac Trojan.GenericKD.32537027
Ad-Aware Trojan.GenericKD.32537027
Malwarebytes PUP.Optional.Softomate
TrendMicro-HouseCall PUA.Win32.InstallPack.A
Yandex PUA.Downloader!
MaxSecure Win.MxResIcn.Heur.Gen
GData Win32.Adware.Softobase.B
Panda PUP/RnkBend

How to remove PUA:Win32/LoadMoney?

  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.
Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Recent Posts

MSIL/GenKryptik.GXIZ information

The MSIL/GenKryptik.GXIZ is considered dangerous by lots of security experts. When this infection is active,…

2 days ago

Malware.AI.2789448175 (file analysis)

The Malware.AI.2789448175 is considered dangerous by lots of security experts. When this infection is active,…

2 days ago

Jalapeno.1878 removal instruction

The Jalapeno.1878 is considered dangerous by lots of security experts. When this infection is active,…

2 days ago

What is “Trojan.Heur3.LPT.YmKfaKBcBekib”?

The Trojan.Heur3.LPT.YmKfaKBcBekib is considered dangerous by lots of security experts. When this infection is active,…

2 days ago

How to remove “Worm.Win32.Vobfus.exmt”?

The Worm.Win32.Vobfus.exmt is considered dangerous by lots of security experts. When this infection is active,…

2 days ago

About “TrojanDownloader:Win32/Beebone.JO” infection

The TrojanDownloader:Win32/Beebone.JO is considered dangerous by lots of security experts. When this infection is active,…

2 days ago