Crack

How to remove “Application.ProcessHacker.1 (B)”?

Malware Removal

The Application.ProcessHacker.1 (B) is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Application.ProcessHacker.1 (B) virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • A file was accessed within the Public folder.
  • Sample contains Overlay data
  • Presents an Authenticode digital signature
  • Reads data out of its own binary image
  • Drops a binary and executes it
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • CAPE detected the embedded pe malware family
  • Attempts to identify installed AV products by installation directory
  • Deletes executed files from disk
  • Yara detections observed in process dumps, payloads or dropped files

How to determine Application.ProcessHacker.1 (B)?


File Info:

name: 54DAAD58CCE5003BEE58.mlw
path: /opt/CAPEv2/storage/binaries/28042dd4a92a0033b8f1d419b9e989c5b8e32d1d2d881f5c8251d58ce35b9063
crc32: D91BEB8F
md5: 54daad58cce5003bee58b28a4f465f49
sha1: 162b08b0b11827cc024e6b2eed5887ec86339baa
sha256: 28042dd4a92a0033b8f1d419b9e989c5b8e32d1d2d881f5c8251d58ce35b9063
sha512: 8330de722c8800ff64c6b9ea16a4ff7416915cd883e128650c47e5cb446dd3aaa2a9ba5c4ecda781d243be7fb437b054bbcf942ea714479e6cc3cef932390829
ssdeep: 49152:l9hfV/U5NkLXXzGZjt6kFTCVP6hWE0wvmk/eE+FrAl+NGsOSE6IX8pq:Dh9/ULkjKxtTGP6VZd2rAcvOSE6Nq
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T14CA53303DF540D3BD5B79B76973FCB154E6A734528346C63B20D5C8E8BA47A288923B2
sha3_384: a0ddc51cb24dc39c2125c78a430e30e31a1c45b0818d24c3b431507f2cbdbcb79581b2919f80ac897e86152c0a7745b5
ep_bytes: 558bec83c4c453565733c08945f08945
timestamp: 1992-06-19 22:22:17

Version Info:

Comments: This installation was built with Inno Setup.
CompanyName: wj32
FileDescription: Process Hacker Setup
FileVersion: 2.39 (r124)
LegalCopyright: Copyright © 2010-2016, Process Hacker Team. Licensed under the GNU GPL, v3.
ProductName: Process Hacker
ProductVersion: 2.39 (r124)
Translation: 0x0000 0x04b0

Application.ProcessHacker.1 (B) also known as:

BkavW32.Common.8261D340
LionicRiskware.Win32.ProcHack.1!c
CAT-QuickHealHackTool.ProcHacker.P5
Cylanceunsafe
CrowdStrikewin/grayware_confidence_100% (W)
K7GWUnwanted-Program ( 005447311 )
K7AntiVirusUnwanted-Program ( 005447311 )
ArcabitApplication.ProcessHacker.1
SymantecHacktool.ProcHack
Kasperskynot-a-virus:HEUR:RiskTool.Win32.ProcHack.gen
BitDefenderApplication.ProcessHacker.1
EmsisoftApplication.ProcessHacker.1 (B)
DrWebTool.ProcessHacker.3
VIPREApplication.ProcessHacker.1
TrendMicroPUA.Win32.ProcHack.A
FireEyeApplication.ProcessHacker.1
SophosProcess Hacker (PUA)
JiangminRiskTool.ProcHack.hi
Antiy-AVLTrojan/Win32.SGeneric
KingsoftWin32.Troj.Generic.jm
XcitiumApplicUnwnt@#134ggy9regjgg
ZoneAlarmnot-a-virus:HEUR:RiskTool.Win32.ProcHack.gen
GDataApplication.ProcessHacker.1
ALYacMisc.Riskware.ProcHack
PandaHackingTool/ProcHack
TrendMicro-HouseCallPUA.Win32.ProcHack.A
YandexRiskware.ProcessHacker!Z+ABec4nlz0
MaxSecureTrojan.Malware.10181834.susgen
FortinetRiskware/ProcHack
Cybereasonmalicious.8cce50
DeepInstinctMALICIOUS
alibabacloudRiskware:Win/ProcHack.gen

How to remove Application.ProcessHacker.1 (B)?

Application.ProcessHacker.1 (B) removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment