Crack

Application.ProcessHacker.1 (B) (file analysis)

Malware Removal

The Application.ProcessHacker.1 (B) is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Application.ProcessHacker.1 (B) virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • A file was accessed within the Public folder.
  • Sample contains Overlay data
  • Presents an Authenticode digital signature
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • Drops a binary and executes it
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • CAPE detected the embedded pe malware family
  • Attempts to identify installed AV products by installation directory
  • Deletes executed files from disk
  • Yara detections observed in process dumps, payloads or dropped files

How to determine Application.ProcessHacker.1 (B)?


File Info:

name: 32624D4D970A1F610BED.mlw
path: /opt/CAPEv2/storage/binaries/1b757e06cc05a64603ec15d1c7fbd9390fa59a814705d495104e5504f5975800
crc32: 0FCD869F
md5: 32624d4d970a1f610bed6d245b38a98a
sha1: 8953d402f80d18423e8744edb05eb6582ed11019
sha256: 1b757e06cc05a64603ec15d1c7fbd9390fa59a814705d495104e5504f5975800
sha512: d960b040b5adf7a6be73b3e2b1b353acfd53e436f24e65885a57d534db7c37363a91f76e742d76d9cc226e0b8ff83374b5a012bab40eb69e929698cf3bbb51ab
ssdeep: 49152:m9MVjO2VeLtKBpWRLFHiRdSwQx0sPobShOSE6IX8pq:wMrqSkRBoEEbkOSE6Nq
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T128A53343DB695830D9B2DE70F8BBD0724E286C8E48A5265EB69C4E1CDF503D3126EBC4
sha3_384: 9c0de446e745ac51d9c2fef19ccc7565cc5e58968610a108aedbf9d80dfe748afa56ab349d96eec98465e38ca39e809b
ep_bytes: 558bec83c4c453565733c08945f08945
timestamp: 1992-06-19 22:22:17

Version Info:

Comments: This installation was built with Inno Setup.
CompanyName: wj32
FileDescription: Process Hacker Setup
FileVersion: 2.38 (r343)
LegalCopyright: Copyright © 2010-2016, Process Hacker Team. Licensed under the GNU GPL, v3.
ProductName: Process Hacker
ProductVersion: 2.38 (r343)
Translation: 0x0000 0x04b0

Application.ProcessHacker.1 (B) also known as:

BkavW32.Common.A366DE22
CAT-QuickHealHackTool.ProcHacker.P5
ALYacApplication.ProcessHacker.1
Cylanceunsafe
K7AntiVirusUnwanted-Program ( 005447311 )
K7GWUnwanted-Program ( 005447311 )
Cybereasonmalicious.d970a1
SymantecHacktool.ProcHack
Kasperskynot-a-virus:HEUR:RiskTool.Win32.ProcHack.gen
BitDefenderApplication.ProcessHacker.1
RisingMalware.Undefined!8.C (CLOUD)
EmsisoftApplication.ProcessHacker.1 (B)
DrWebTool.ProcessHacker.5
VIPREApplication.ProcessHacker.1
FireEyeApplication.ProcessHacker.1
SophosProcess Hacker (PUA)
GDataApplication.ProcessHacker.1
JiangminRiskTool.ProcHack.hi
VaristW32/GameHack.AB.gen!Eldorado
Antiy-AVLGrayWare/Win32.Presenoker
ArcabitApplication.ProcessHacker.1
ZoneAlarmnot-a-virus:HEUR:RiskTool.Win32.ProcHack.gen
GoogleDetected
PandaHackingTool/ProcHack
MaxSecureTrojan.Malware.12221730.susgen
FortinetRiskware/ProcHackTool
DeepInstinctMALICIOUS
CrowdStrikewin/grayware_confidence_100% (W)
alibabacloudRiskware:Win/ProcHack.gen

How to remove Application.ProcessHacker.1 (B)?

Application.ProcessHacker.1 (B) removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment