rpcapd.exe

WinPcap

CACE Technologies, Inc.

The executable rpcapd.exe, “Remote Packet Capture Daemon” has been detected as malware by 35 anti-virus scanners. It runs as a separate (within the context of its own process) windows Service named “Remote Packet Capture Protocol v.0 (experimental)”. This virus which infects .exe files stops various security software and prevents some core Windows utilities from running. It also tries to download other files from a remote server, including other malware.
Publisher:
CACE Technologies, Inc.

Product:
WinPcap

Description:
Remote Packet Capture Daemon

Version:
4.1.0.2001

MD5:
e474b10a90dfaff06d6783c84a0395f3

SHA-1:
1cf9b90915d7d391601e9547512d5774469935e8

SHA-256:
382a2ee40e282ac4af6f44781689b119ca8a772ba7708612deb8a9d5717ed73e

Scanner detections:
35 / 68

Status:
File is infected by a Virus

Explanation:
The file is infected by a polymorphic file infector virus.

Analysis date:
4/19/2024 8:32:27 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Win32.Sality.3
1017

Agnitum Outpost
Win32.Sality.BL
7.1.1

AhnLab V3 Security
Win32/Kashu.E
14.04.23

Avira AntiVirus
W32/Sality.AT
7.11.145.12

avast!
Win32:SaliCode
2014.9-140423

AVG
Win32/Sality
2015.0.3495

Baidu Antivirus
Virus.Win32.Sality.$Emu
4.0.3.14423

Bitdefender
Win32.Sality.3
1.0.20.565

Bkav FE
W32.Sality.PE
1.3.0.4959

Comodo Security
Virus.Win32.Sality.Gen
18157

Dr.Web
Win32.Sector.22
9.0.1.0113

Emsisoft Anti-Malware
Win32.Sality
8.14.04.23.11

ESET NOD32
Win32/Sality.NBA
8.9714

F-Prot
W32/Sality.gen2
v6.4.7.1.166

F-Secure
Win32.Sality.3
11.2014-23-04_4

G Data
Win32.Sality
14.4.24

IKARUS anti.virus
Virus.Win32.Sality
t3scan.1.6.1.0

K7 AntiVirus
Virus
13.176.11861

Kaspersky
Virus.Win32.Sality
14.0.0.3970

McAfee
W32/Sality.gen.z
5600.7151

Microsoft Security Essentials
Virus:Win32/Sality.AT
1.10502

MicroWorld eScan
Win32.Sality.3
15.0.0.339

NANO AntiVirus
Virus.Win32.Sality.beygb
0.28.0.59492

Norman
Sality.ZHB
11.20140423

nProtect
Win32.Sality.3
14.04.23.01

Panda Antivirus
W32/Sality.AA
14.04.23.11

Qihoo 360 Security
Malware.QVM19.Gen
1.0.0.1015

Quick Heal
W32.Sality.U
4.14.12.00

Sophos
Mal/Sality-D
4.98

Total Defense
Win32/Sality.AA
37.0.10895

Trend Micro House Call
PE_SALITY.RL
7.2.113

Trend Micro
PE_SALITY.RL
10.465.23

Vba32 AntiVirus
Virus.Win32.Sality.bakc
3.12.26.0

VIPRE Antivirus
Virus.Win32.Sality.at
28554

ViRobot
Win32.Sality.N
2011.4.7.4223

File size:
182.5 KB (186,896 bytes)

Product version:
4.1.0.2001

Copyright:
Copyright © 2005-2010 CACE Technologies. Copyright © 2003-2005 NetGroup, Politecnico di Torino.

Original file name:
rpcapd.exe

File type:
Executable application (Win32 EXE)

Language:
Language Neutral

Common path:
C:\Program Files\winpcap\rpcapd.exe

File PE Metadata
Compilation timestamp:
6/25/2010 7:47:50 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows Console

Linker version:
8.0

CTPH (ssdeep):
3072:1L7m5RTfrUna0m2BezRQNnsZ5FQlLgbt0ktdVg029hLRbPpjap+giJx7f3dbxMp:57m5RTEasezWVsZYgjT2dPpK+giLV6p

Entry address:
0x9025

Entry point:
88, DC, 4B, 84, CD, 89, DE, 8A, C5, F6, C0, DC, 42, 8B, F1, 22, E8, 0F, AF, C9, 2B, C7, 75, 04, F6, C0, 93, 49, C7, C1, 09, B9, BB, 2A, 84, E0, 69, FD, AB, 9D, A3, E7, 68, 50, FC, 43, 00, 68, 52, EE, 3E, 00, 0F, BF, D5, 1C, C8, 41, F6, C0, 32, 1A, DD, E8, 18, 00, 00, 00, B8, 05, 4A, C4, ED, 87, EA, BE, A8, A5, 48, 0E, 8A, C4, 89, C1, FE, C9, 81, FB, 2D, E2, 00, 00, 8A, C6, 4B, 0F, BF, DB, 04, 48, 3C, 06, 81, EA, 05, 93, 01, 00, 21, C0, 3C, F1, F2, 81, C2, D7, 63, 01, 00, 5D, FE, C8, FF, C7, 57, B0, 2B, 22...
 
[+]

Entropy:
7.1457

Code size:
76 KB (77,824 bytes)

Service
Display name:
Remote Packet Capture Protocol v.0 (experimental)

Service name:
rpcapd

Description:
Allows to capture traffic on this machine from a remote machine.

Type:
Win32OwnProcess


Remove rpcapd.exe - Powered by Reason Core Security